url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://m.imdb.com/title/tt0113116/
|
code
|
2 June 2000 | Ewi
Nice in it's own way
Alright, this isn't the best movie/romantic comedy/comedy ever to be made, so don't get your hopes too high. But still I kind of liked it, and it's a nice, though a bit silly way to pass time.
I liked especially the hero's strange daydreams.
The first making love scene, when they are rolling on the carpet, was odd in my opinion. How do they manage to take off their clothes, kiss and touch each other while rolling side to side, not to mention getting dizzy and hitting their head on the hard floor?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141743438.76/warc/CC-MAIN-20201204193220-20201204223220-00412.warc.gz
|
CC-MAIN-2020-50
| 540 | 5 |
http://www.becomingthebestyoucanbe.com/thought-pieces/cio-short-pieces/80-cio-profile/10-what-are-the-ideal-cio-characteristics
|
code
|
Context is everything.
So each CIO role will have some specific needs. These will depend upon the organisation, the industry, the current business strategy, the prevailing market conditions, the quality of the asset base (people, applications and infrastructure) and the prevailing financial climate in terms of investment and cost management.
In addition to these role-specific demands, the ideal CIO needs to have a more generic portfolio of skills and capabilities. Key amongst these are for she or he to:
- be a great communicator (formal & informal);
- make & sustain very strong personal relationships with executive colleagues and third-party partners;
- have loads of business savvy (about how the market works and how his/her business works within it);
- be strongly empathetic & intuitive;
- be prepared to break moulds & to take risks;
- develop top class IT management leaders & teams (& therefore potential successors);
- have strong IT roots with ideally other experience (eg supply-side with service partners, consultancy, demand-side elsewhere in the business).
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178376467.86/warc/CC-MAIN-20210307105633-20210307135633-00395.warc.gz
|
CC-MAIN-2021-10
| 1,077 | 10 |
https://www.summitpost.org/smooth-emerald-milkshake-p3/267352
|
code
|
3-Feb-2007: Smooth Emerald Milkshake
(250m, WI4) near Cody, Wyoming. Pitch 3 and 4. Very enjoyable climbing.
led this. From the base his 70m twin ropes got us to about the halfway point on this formation. At that point I led up on easier terrain (P4).
We decided to start rappelling at the top of this since daylight was getting short. The hike in is quite long ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703524858.74/warc/CC-MAIN-20210121132407-20210121162407-00580.warc.gz
|
CC-MAIN-2021-04
| 365 | 4 |
https://speakerdeck.com/bkosarzycki/android-gradle-build-optimisation
|
code
|
What went wrong: A problem occurred evaluating project ':repository'. > Failed to apply plugin [id 'com.android.library'] > Configuration on demand is not supported by the current version of the Android Gradle plugin since you are using Gradle version 4.6 or above. Suggestion: disable configuration on demand by setting org.gradle.configureondemand=false in your gradle.properties file or use a Gradle version less than 4.6. Check gradle version - “instant run” is lost due to Android Studio & gradle incompatibility
an alias for ‘gradle-profiler’ Install gradle profiler: > ./gradlew installDist cp ./build/install/gradle-profiler/* ~/custom/gradle-profiler alias gradle-profiler='~/custom/gradle-profiler/bin/gradle-profiler'
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300849.28/warc/CC-MAIN-20220118122602-20220118152602-00108.warc.gz
|
CC-MAIN-2022-05
| 736 | 2 |
https://www.html5gamedevs.com/topic/15233-panda-ios-memory-problem/
|
code
|
mrkarate Posted June 16, 2015 Share Posted June 16, 2015 hi!, I just have a weird problem, and just on ios (I think android gave more memory to browser resources). I have a dinamic game, with a dinamic map, so I generate a tileset of 26x25 tiles (100x100 each tile), and then I tried two things:that container, I convert to cache as bitmap, and when the player got to the final of that tileset, I cacheasbitmap = false the container, remove all sprites, and then add a new tileset (but from same tileset family, only change order, and all tileset are added on start), and make cacheasbitmap again, the other method I use, is instead of cacheasbitmap that tileset container, I add tileset too, but use the generateTexture() method, and to delete it, I use texture.destroy() method. The two methods works, I have 1 draw call per tileset instead of 400, so thats very nice. THE PROBLEM!!, is, no matter what I do, on ios, (on iphone 6 plus!! so it's not a limited ios device), when I generate, the 6 or the 7 tileset, the browser crash and restart,and I already check and have sure is this method that crash, because I try to only generate 5 of this segments of tileset, and then no generate more, only move on the last one, and the game don't crash, so I think, whatever I do, removing this sprites, or destroy the texture, I think the engine doesn't really remove from memory, have someone this problem before?? really thanks! Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652161.52/warc/CC-MAIN-20230605185809-20230605215809-00513.warc.gz
|
CC-MAIN-2023-23
| 1,689 | 4 |
https://admhelp.microfocus.com/da/en/6.4/online_help/Content/SDA-Help/plugins-import-strategies.htm
|
code
|
Plugins import strategies
This topic describes the strategies for importing plugins and plugin steps. The plugin import strategies define the conditions for upgrading plugins during replication import.
Note: Plugins use Groovy 3.0.0 or later. Plugins with an old Groovy version do not run on agents 6.3.3 and later. To ensure improved security, always upgrade plugins to the latest version.
You can import plugins according to one of the following strategies:
|Upgrade all plugins||
This strategy enables you to upgrade imported plugins to the Groovy 3.0.0 or later versions available on the replication (source) or target servers. All the relevant processes are upgraded automatically.
If your replication file contains both old and latest plugin versions, but you plan to import processes that use only the old version, the system detects the latest version in the replication file and upgrades your processes during import.
If an imported process uses a plugin with an old Groovy version, and the plugin with Groovy 3.0.0 or later is not available on the replication (source) or target servers, the import fails.
|Fail import for old Groovy version||
With this strategy, you can import only the latest plugin versions that use Groovy 3.0.0 or later.
If an imported process uses a plugin with an old Groovy version, the import fails.
|Import ignoring old Groovy version||
This strategy enables you to import plugins as is.
After you import data using this strategy, manually upgrade plugins. For details, see Load and upgrade plugins.
Tip: To verify that a plugin uses the latest Groovy version, open the plugin's info.xml file and check that the
groovy-version attribute displays version 3.0.0 or later. If the
groovy-version attribute is set to an earlier version or is missing from the info.xml file, the plugin uses an old Groovy version.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.17/warc/CC-MAIN-20231205105136-20231205135136-00070.warc.gz
|
CC-MAIN-2023-50
| 1,844 | 17 |
https://www.digital-humanities.manchester.ac.uk/events/workshops/index.htm
|
code
|
Our main networking and development event is the DH project workshop, which we run annually.
DH@Manchester Digital Texts Workshops
18th-19th May 2017
Kilburn Building, Oxford Road, Manchester M13 9PL
Following the success of our December Digital Humanities Colloquium, we are offering a series of three interlinked workshops designed to introduce humanities researchers to working with digital texts and mark-up.
The three sessions will offer practical introductions to a variety of digital tools and techniques, led by experts in the field, including Pip Willcox (Centre for Digital Scholarship, Bodleian Libraries, Oxford) and Jez Cope, Research Data Manager, University of Sheffield Library. Each session is free-standing, although they are all designed to be complementary.
The workshops are open to all researchers in the Faculty of Humanities, although numbers are limited, so do please register early to avoid disappointment. Please note that all participants will need to bring their own laptop to sessions 1 and 3, and further instructions will be given about downloading the software on registration.
Lunch and refreshments will be provided for participants on both days.
For detailed information and to register for each of the sessions separately please use the Eventbrite links below:
Digital Humanities Second Library Lab
Wednesday, 24 May 2017, 2pm - 5pm
Teaching Suite, (Blue 4), Main Library, The University of Manchester Library M13 9PL
This workshop is designed to help Faculty of Humanities researchers develop new and exciting computational projects working with the University Library's digital collections.
DH@Manchester recently sought targeted expressions of interest from Faculty of Humanities researchers at all levels to develop new and innovative computational research projects with partners including the University of Manchester Library and the School of Computer Science. Supporting the formal call, the first Library Lab was offered in March to allow researchers at all levels to gain hands-on experience with tools and techniques in order to go on to develop individual research projects with the collections. Even though that call has closed, this second Library Lab will provide a similar experience using a different selection of collections.
This event may be of interest to those who could not attend the first one or would like to do more. During the afternoon workshop, you will look at digitized historical collections of 20th century newspapers and pre-20th century ballads, using tools to apply colour analysis and image search techniques. You will also use a new tool from JSTOR to search a document for related articles and books. Computers will be available for all participants, but you may prefer to bring your own laptop. For further information and any queries, please contact Phil Reed: [email protected] or [email protected].
This event is open to all Faculty of Humanities researchers, but numbers are limited, so please register as soon as possible via the Eventbrite page:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187821017.9/warc/CC-MAIN-20171017091309-20171017111309-00776.warc.gz
|
CC-MAIN-2017-43
| 3,042 | 16 |
https://forum.howtoforge.com/threads/can-i-use-tls-1-2-instead-of-sha-1.70650/
|
code
|
Hello, I set up a free ssl certificate on my website using this tutorial: howtoforge.com/securing-your-ispconfig-3-installation-with-a-free-class1-ssl-certificate-from-startssl I was thinking that my certificate works fine because I no longer get certificate errors. I don't know much about different types of connection protocols but when I noticed that my browser (chrome) gives me a warning ("This site uses a weak security configuration (SHA-1 signatures), so your connection may not be private.") for my website and doesn't give this error for some other web sites, I did some research and found this article telling me that sha-1 lacks security: googleonlinesecurity.blogspot.co.uk/2014/09/gradually-sunsetting-sha-1.html Did I do some wrong choise when I was setting up my website? Is it possible to use TLS 1.2 or any other secure way that doesn't make the browsers complain while still using free certificate on ispconfig? Thank you in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510219.5/warc/CC-MAIN-20230926175325-20230926205325-00551.warc.gz
|
CC-MAIN-2023-40
| 953 | 1 |
http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=156608©ownerid=168403
|
code
|
WACCO 2022 : **dealine extension** IEEE EuroSP 2022 - Workshop on Attackers and Cyber-Crime Operations - WACCO 2022
Call For Papers
*** DEADLINE EXTENSION ***
The WACCO 2022 submission deadline has been extended to the 14th of March 2022 (11:59pm AoE).
Fourth Workshop on Attackers and Cyber-Crime Operations
IEEE European Symposium on Security and Privacy 2022
June 6, 2022 - Genoa, Italy
Paper submissions due: 14/03/2022 AoE
Acceptance Notice to Authors: 08/04/2022
Publication-ready Papers Submitted: 20/04/2022
The emergence and commoditization of cyber-criminal activities calls for new empirical methods, measures, and technologies to quantify and understand offender operations across all forms of cyber-crime: from malware engineering and attack delivery, to running underground operations trading illegal goods such as drugs and illegal pornography, to spreading disinformation and planning (cyber-)terrorism operations. Without appropriate scientific measures of cyber-offender and attacker operations, capabilities, and resources, it remains impossible to derive sound policies, strategies and technologies that appropriately address realistic and evidence-based attacker and offender models.
WACCO 2022 calls for all contributions aiming at providing methods, measures, metrics, and technologies or tools to quantitatively or qualitatively evaluate cyber-offenders and attackers from technical and non-technical angles. The workshop invites contributions from, but not limited to, the fields of computer science and computer security, criminology, psychology, law, and economics addressing this issue.
Topics of interest include, but are not limited to:
- Empirical studies on attacker operations and communities
- Novel methods to perform attacker measurements at scale across several communities
- Cooperation and trust as a source of attackers’ effectiveness - Attackers’ skill set
- Attackers’ operational security
- Measuring the spread of false information campaigns on social media
- Quantitative and qualitative methods to measure, track, and counter cybercrime
- Cybercrime measurement and networks
- Cybercrime policy
- Economics of cybercrime
- Profiling of cybercriminals
- Security metric design and evaluation
- Security patch measurement
- Statistical exploration and prediction of security incidents
- Open Source INTelligence (OSINT) and digital footprints
Open reports: WACCO promotes an open and transparent review process. Reviews of accepted papers will be published together with the papers and archived in a public github repository associated with WACCO. A link to that repository must be included in all accepted submissions. The reasons why WACCO implements an open report model are the following:
- It documents why the paper was considered positively to contribute to the larger scientific domain it pertains to;
- It provides a critique useful to better delineate research limitations and scope, which can be of particular benefit to young researchers and students alike;
- It provides a structural incentive for reviewers to write constructive and clear reviews;
- It provides a structural incentive for authors to implement reviewer recommendations for the camera-ready version of their paper;
- It provides a critical viewpoint for future work and research follow-ups;
- It provides additional transparency to the quality of the adopted review process and its outcomes.
WACCO encourages submission of full papers and position papers from academia, industry, and government. They should present interesting results for both theory and experimentation in the area of attacker and cyber-crime operations. We also particularly welcome independent reproduction of previous studies or experiments or negative results. We expect full papers to be of 10 pages in length (IEEE Format). Longer papers that document extensive experimentation are full in scope (which could be described in annex of the main body of the paper). Position papers of around 4 pages in length should present new open and interesting questions that the community should address or open questions that past research papers have not yet addressed. We expect position papers to be presented in panels or poster-platform sessions.
Papers should be fully anonymized before review: author names or affiliations may not appear or be revealed in the text. Previous work of the authors should be referred to the third person. In the unusual case that an anonymous reference is not possible, the authors should blind the reference (e.g. “[x] Blinded citation to preserve submission anonymity”). Papers that are not properly anonymized may be desk rejected.
Submission of work that has been previously presented at conferences without proceedings, even if that work is associated with the names of the authors, or is published on online repositories such as ArXiv.org or SSRN, is allowed as long as the submission is fully anonymized. PC members that may recognize the work and its authors are asked to declare conflict on that paper and will not be assigned to it.
All papers will be published by IEEE CS and posted on the IEEE digital libraries. All authors of accepted papers are expected to present their paper at the workshop.
Luca Allodi, Eindhoven University of Technology, the Netherlands ([email protected])
Alice Hutchings, Cambridge University, United Kingdom ([email protected])
Sergio Pastrana, University Carlos III of Madrid, Spain ([email protected])
See WACCO 2022 website: https://wacco-workshop.org/
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817289.27/warc/CC-MAIN-20240419043820-20240419073820-00120.warc.gz
|
CC-MAIN-2024-18
| 5,554 | 42 |
https://stratpoint.com/job-opening/data-engineer/
|
code
|
We are looking for experienced Software Engineers to be part of our Data Engineering team. You will be focused on designing and implementing solutions on Apache Spark, Kafka, ELK, Talend, and Tableau. As a Data Engineer, you will be exposed to AWS, Azure, GCP, and Cloudera solutions and thus, the ideal candidate should have a strong foundation in big data technology and a passion to learn new technologies.
Main duties and responsibilities:
- Design and develop data pipelines utilizing PySpark and Hadoop Frameworks.
- Read, extract, transform, stage, and load data to multiple targets including Databases, Data Lakes, and Data Warehouses using any of the ff: Talend, Informatica, DataStage, Pentaho, etc.
- Migrate existing data processing from standalone or legacy technology scripts to PySpark framework processing.
- Bachelor’s degree in Computer Science/IT/Computing or equivalent
- Preferably with 2-3 years experience in Data Engineering
- At least 1 yr of experience in ETL project implementation using PySpark
- At least 1 yr of experience in Linux environment
- At least 3 years of experience in Python Development
- At least 3 years of experience in Hadoop and Big Data Ecosystem
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474746.1/warc/CC-MAIN-20240228211701-20240229001701-00632.warc.gz
|
CC-MAIN-2024-10
| 1,196 | 11 |
https://sourceforge.net/directory/natlanguage%3Arussian/license%3Apublicdomain/?sort=popular&page=4
|
code
|
OSI-Approved Open Source (31)
- GNU General Public License version 2.0 (18)
- GNU Library or Lesser General Public License version 2.0 (6)
- BSD License (5)
- Apache License V2.0 (4)
- GNU General Public License version 3.0 (3)
- Academic Free License (2)
- Artistic License (2)
- Common Public License 1.0 (2)
- Mozilla Public License 1.0 (2)
- PHP License (2)
- Apache Software License (1)
- Common Development and Distribution License (1)
- Computer Associates Trusted Open Source License 1.1 (1)
- Educational Community License, Version 2.0 (1)
- Frameworx Open License (1)
- Other License (3)
- Windows (155)
- Linux (104)
- Grouping and Descriptive Categories (91)
- Mac (83)
- Modern (49)
- Android (48)
- Other Operating Systems (17)
- BSD (15)
- Emulation and API Compatibility (10)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Web portal for internal use in school 1060, Moscow, Russia
My favorite design, and your too!
This is the software for distance dimentions system.
Representation method of abstract information based on hierarchical network of simplest nodes. Each node can represent both value and attribute. Network is able to accumulate, classify and learn information.
ActuALL is a web-based system for collaboration between companies and sharing of actual information.
Advanced MUD is a client-server MUD-like multiplayer online game with multiple clients, including classic text client, desktop client and a web-browser client.
This project can be used to start the world apocalypse
Await && Locks is a library that contains easy-to-use thread synchronization tools for C++. It helps to write understandable and robust multithreaded programs. Features: simplicity, expressiveness, platform independence, deadlock detection.
CSDLL Is a new Couner-Strike 1.6 Game Server, It has War3 FT mod and we're looking forward to open 2 more game servers - PUB (Publick NON-moded) server and CSDM (Counter Strike Death Match).
Specialized NAND flash programmer for Slot Machines
This program is special program for operator in internet - cafe club. It's help easy manage money. This is first release. If someone want to help create it more useful, i will be happy to share it.
Representation and the analysis of the methodological, empirical and historical base of highly organized world outlook concepts; philosophical and religious systems; doctrines of the lowest order (scientific, ideological theories).
New Site management system written in PHP.
This is a powerful handy program to translate text, documents between 12 major languages.
D language support for Qt Creator
Emulator for electrophoresis. Only for DNA in agarose gel.
SVN для коллективной разработки ПО
The future of information technology will be based on controlling the flow of natural light. This project is an attempt to establish the code (or software) that will enable this to happen. It involves rewriting an OS from the ground up.
Mod for the port ZDooM, for the game DooM or DooM II.
PHP 5+ MVC framework with Smarty.
Small Web-based application (site) for make Online School or Conservatory (from distance).
Eleanor CMS is powerfull content management system for your web site. Its a closed system for my friends, so if you want to use it, please contact me.
secret project for my mamma
Framework that simplifies creating enterprise applications with object-oriented business model.
Main bots for the public virtual worlds based on ActiveWorlds v4.1.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719877.27/warc/CC-MAIN-20161020183839-00457-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 3,552 | 57 |
https://www.tampakakislab.com/post/research-opportunities-at-the-tampakakis-lab
|
code
|
Research opportunities at the Tampakakis Lab
Updated: Jan 10
We are currently looking for talented post-docs that have a background in standard molecular and biological techniques, cell culture and ideally mouse models. Previous experience in stem cell and computational biology is preferred but not required.
Please email a letter of application, curriculum vitae, and names of three references to: Emmanouil Tampakakis, MD
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656963.83/warc/CC-MAIN-20230610030340-20230610060340-00097.warc.gz
|
CC-MAIN-2023-23
| 424 | 4 |
http://www.meetup.com/Michigan-Python-Development-Group/events/124435602/
|
code
|
Getting back into the Meetup groove this month!
We will meet at the Benzinga Offices on Thursday July 18th
Near the corner of 10 Mile and Telegraph, our address is:
24471 W 10 Mile
Southfield MI 48033
Looking forward to seeing everyone come out!
Join or login to comment.
Folks are doing interesting things with Python.
0 · July 18, 2013
I am looking for programmers for my project or idea I'm working on. an I an really excited about being in the group
1 · July 9, 2013
I feel like I will be out of my league, but I will come regardless.
0 · July 2, 2013
0 · June 25, 2013
Meant to do Thursday, thanks for catching that
Help support your Meetup
The Michigan Python Development Group is a group for Python data analysts, developers, architects, ops, and others to come together, share ideas, learn, hack, problem-solve, and network.
Please note: this Meetup is currently transitioning back into an active state. We'll be sending out notices regarding options and upcoming events soon. Please feel free to reach out with suggestions.
Group logo: Creative Commons BY-NC-SA 3.0, https://github.com/davidfraser/programming-...
680 GDG Members
788 WordPress Users
I started the group because there wasn't any other type of group like this. I've met some great folks in the group who have become close friends and have also met some amazing business owners.
— Bill, started New York City Gay Craft Beer Lovers
Meetup members, Log in
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430455230916.59/warc/CC-MAIN-20150501044030-00004-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 1,432 | 24 |
https://blogspinners.com/snake-vs-block-game/
|
code
|
If you are seeking for a game that will bring back fond memories, then you should play Snakes vs. Blocks. Enjoy a new spin on the classic game of snake without leaving the comfort of your home by playing it on your computer. In this game with a deep level of immersion. You and your friends can compete for high scores. And see if you have what it takes to complete each level.
Welcome to Snake vs Block!
The new high-score chaser game Snake VS Block is incredibly easy to pick up and play. Despite its addictive nature and its addictive nature. To start the game, all you have to do is drag your mouse from left to right across the screen to collect the numbered balls. It is imperative that you steer clear of any numbered blocks, as doing so will cause your snake’s size to decrease by the corresponding number.
If the amount of blocks you hit is greater than the length of your snake, then you will be eliminated. Your score is not based on the quantity of balls you collect. Rather, it is determined on the value of the bricks you break. To crack such massive blocks, though, you’ll need a snake that’s not only extraordinarily long, but also able to remain active for a very extended amount of time.
Play Snake vs Block!
Flow is the most important concept in this game. More specifically, finding your flow so that you can navigate through a variety of obstacles. Because the snake is moving so swiftly, you will need to make judgments as quickly as it can. However, you will fare much better if you are able to settle into a groove and accept whatever comes your way rather than if you constantly second-guess every move you make.
How to play
Finding your flow requires that you have the ability to comfortably and effectively glide through obstacles. You can continue to move even after making contact with a barrier, and there’s a chance you can break through it. In the event that there is a 2-block that is nearby, but you encounter a roadblock at a 30-block distance.
If you have enough balls, you can continue swiping to move your snake towards the side. And go beyond the two-block obstacle if you have enough balls. In the same way that touching a side block will allow you to continue moving forward. Dragging your snake forward will do the same thing. If you keep clicking, you can make it through a horrifying assortment of obstacles, even though it might feel like death is just around the corner.
It is important to take note of the fact that the brick that has the least amount is frequently pursued by a brick that has a really large number. This indicates that you will need to move quickly in order to escape. Or else you run the chance of crashing into a wall and losing consciousness.
If there are challenges standing in your way, the circumstance will become noticeably more difficult. It is possible that it might more beneficial to strike a block with a number in the middle of the range when up against a massive wall. Rather than the block with the lowest possible number, in order to avoid forced onto a path with an impossible-high numbered brick on the opposite side.
In addition, we also collect a lot of new and popular games at word hurdle. Les’t check it now!!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510734.55/warc/CC-MAIN-20231001005750-20231001035750-00174.warc.gz
|
CC-MAIN-2023-40
| 3,208 | 12 |
http://windowssecrets.com/forums/showthread.php/113284-HTML-problems-new-(XP-sp3)
|
code
|
Has anyone else experienced problems with HTML coding after the latest Windows updates?
Suddenly, I can no longer open files that I created some time back and some more recently. This was never a problem until now, and it started right after I allowed
Windows Updates. The filels involve photo editing and display using standard jpg images taken with an older digital PC550 Epson camera with software that was done by Sierra about 8 to 10 years ago, maybe more. Everything worked up until this week. I have Avast! anti-virus which seems to be doing it's job. I tried copying and changing the files from "image expert pictures" (which are standard .jpg) to .jpg through Photoshop , but that didn't help. I noticed a new "Open" just below the standard menu OPEN...........that is also new since the updates. Any ideas? To say it's irritating is an understatment. Thanks for any feedback.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697232084/warc/CC-MAIN-20130516094032-00002-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 885 | 3 |
https://jamesburt.me.uk/2019/08/lifelong-learning-in-software-development/
|
code
|
I always wanted to have a Brighton Java talk on lifelong learning. The techniques, tools and fashions in software development are constantly changing – how do you keep on top of this churn while doing an often-stressful job and maintaining the family and social life you have a right to? I never found anyone to give this talk, and now I don’t need to, as a fantastic talk by Trisha Gee called Becoming a Fully Buzzword Compliant Developer has been released on InfoQ.
In the talk, Gee sets out a simple step-by-step approach to learning and career development, without ignoring how expectations around this impact on often-excluded groups in IT. (Remember: asking for interview candidate’s github profile makes a lot of assumptions about your potential employees and their free time).
Gee also looks at how quickly new ideas are absorbed into the mainstream of development; how to discover and assess new buzzwords; the importance of real-world meetups (like Brighton Java!); and the importance of “Enough knowledge to blag your way through a conversation in the pub.”
Sometimes, when discussing training and development outside work, developers point out that there is no requirement for, say, HR staff or office managers to do their job as part of a hobby. But look at it another way: modern careers are a half-century or so. You want to find a way to engage with software development and lifelong learning that is so exciting that you want to do it. Even maintaining the simplest hobby site can help you to keep up with the latest exciting new things.
There is also a flip-side to Gee’s talk which is less often discussed – and that’s how little learning Java enterprise developers can get away with by using the slow pace of change to avoid any self-development. Mobile and JS devs tend to engage much more because their careers depend on it (an Android dev who does not use the latest APIs will soon be unemployable). New ideas and tools can take a long time to filter through to the enterprise. The downside of this is that it can take even longer to get them right – TDD, agile and microservices suffer in enterprises due to the lack of an engaged, interested and playful attitude among devs and managers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510085.26/warc/CC-MAIN-20230925183615-20230925213615-00818.warc.gz
|
CC-MAIN-2023-40
| 2,230 | 5 |
http://www.trekbbs.com/showpost.php?p=3777700&postcount=31
|
code
|
So, once this task is done (and I know it will be done), is it possible to export your work into a "game level" format where walk-abouts cane be done? That is something I've wanted to have for a long time, but don't have the talent to take it on - don't even know how to start. What I'm talking about is something like the "Elite Force" mod for the Argas Effect.
Reading my mind! Would love to see something like this as well, if possible.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375093899.18/warc/CC-MAIN-20150627031813-00175-ip-10-179-60-89.ec2.internal.warc.gz
|
CC-MAIN-2015-27
| 439 | 2 |
https://rjacobucci.com/
|
code
|
Welcome to my site!
I am currently an Assistant Professor in Quantitative Psychology at the University of Notre Dame. I have two main lines of research. The first is integrating methods from both data mining and latent variable modeling. I have applied this work in identifying varying trajectories in longitudinal data, as well as creating diagnostic criteria for non-suicidal and suicidal self-injury. The second is developing novel methods for the application of latent variable models in studying changes in cognitive ability and health in older adults. For both of these interests, I am an active developer of open source software for the R statistical environment.
For an up-to-date version of my CV
Find me on:
If you have any questions, comments or suggestions, you can e-mail me at rcjacobuc[at]gmail[dot]com
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510932.57/warc/CC-MAIN-20181017002502-20181017024002-00187.warc.gz
|
CC-MAIN-2018-43
| 817 | 5 |
https://forums.auran.com/threads/victrainz-site-down.13318/
|
code
|
I'll point Peter S here. However, by server I mean ISP for the site. This means the whole site has moved. All pages except the 'php' pages (the victrainz.com.au/modelers/ area) are working, or atleast should be. The reason why it was moved, was because the ISP the site was with was closing up shop, so Peter has had to change the site's ISP.
I'm pretty sure Peter is doing his best to get the site back up and running
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100534.18/warc/CC-MAIN-20231204182901-20231204212901-00151.warc.gz
|
CC-MAIN-2023-50
| 418 | 2 |
http://www.python.org/search/hypermail/python-1994q2/0087.html
|
code
|
What I would like is something that will allow me to build a message
editor using Python. Hopefully someone has started this already.
I would be looking at using Python to do smart quoting, and possibly even
colour the quotes differently when reading a message.
Is there anything out there I can start with? Any information would be
useful. (Another option is to use something like EMacs with its own
extension language, but we would prefer to have a single extension
language throughout the new program)
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164019989/warc/CC-MAIN-20131204133339-00038-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 504 | 8 |
https://lists.debian.org/debian-boot/2005/02/msg00060.html
|
code
|
Re: irc meeting regarding kernel status d-i RC3
> I don't think we'd want 2.6.10 to enter sarge until we had consensus
> that it should replace 2.6.8 as the sarge 2.6, though I'm sure we meant
> the same thing.
Which is "release sarge", isn't it ? :-)
I guess that a lot of people around have already been on a Debian
booth in an expo, but I can assure you that people I've seen coming at
our booth in the french expo these days just don't care about
the latest sexy kernel or whatever but they have always the very same
So, please please please, people who will attend this meeting, only
focus on that one topic and have all your discussions driven by it and
I won't attend it and even if I would, I would give you folks no
valuable input except that one you already know.
I still have to understand whether 2.6.8 is suitable for a release or
not. It may not be perfect but, given what I currently feel about the
Linux kernel from my dummy point of view, it will never be, nor will
2.6.10, 2.6.11 and 2.6.whatever. So, unless there are security issues
with that kernel, I think we probably have to live with it and work on
backporting the fixes we need for release critical issues.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651815.80/warc/CC-MAIN-20230605085657-20230605115657-00527.warc.gz
|
CC-MAIN-2023-23
| 1,182 | 19 |
https://newwordaday.blogspot.com/2016/01/knotty.html
|
code
|
complicated; tricky; puzzling;
something difficult to understand.
The math question was a knotty problem. I could not figure it out.
You have to solve a knot to untie it.
The bugs in the computer program was a knotty problem. We rebuilt it instead of fixing it.
(c) 2016 E. Carruthers
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141177607.13/warc/CC-MAIN-20201124224124-20201125014124-00235.warc.gz
|
CC-MAIN-2020-50
| 284 | 6 |
https://www.maxdesutter.com/cyberwave-shader
|
code
|
CyberWave HLSL shader
A shader that creates a wave of morphing objects that fit seamlessly together no matter at what stage of the morphing they are. It
When making this shader i was able deepened my math skills for the creation of the objects.
NVIDEA FX Composer
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00007.warc.gz
|
CC-MAIN-2023-40
| 263 | 4 |
http://packages.ubuntu.com/lucid/student-control-panel
|
code
|
Package: student-control-panel (0.5.1-0ubuntu7) [universe]
Links for student-control-panel
Download Source Package thin-client-manager:
Original Maintainer (usually from Debian):
- Pete Savage
It should generally not be necessary for users to contact the original maintainer.
Dummy package for transition to thin-client-manager
This is a dummy package to ease the transition to thin-client-manager, the new version of student-contol-panel. Please use thin-client-manager instead of student-control-panel. It provides a binary called student-control-panel for compatibility purposes.
Other Packages Related to student-control-panel
- dep: thin-client-manager-gnome
- control ubuntu LTSP connections
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246656747.97/warc/CC-MAIN-20150417045736-00132-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 697 | 11 |
http://ackgsm.xyz/archives/20549
|
code
|
Fabulousnovel Let Me Game in Peace read – Chapter 1028 – Ice Maiden’s Disbelief behavior furtive suggest-p3
Let Me Game in Peace
Novel–Let Me Game in Peace–Let Me Game in Peace
Chapter 1028 – Ice Maiden’s Disbelief crayon elite
In the beginning, the Six Seas Dragon California king wasn’t the an ice pack maiden’s fit. On top of that, the ice cubes part was far better against the Seven Seas Dragon Master. However, the an ice pack maiden got expended way too much of her toughness, departing her with below thirty percent of her eliminate strength. She was no fit for any 8 Seas Dragon Emperor.
Immediately after consuming Unusual G.o.d’s corpse, the demonic atmosphere on Harsh Demon’s system surged. It looked like he was about to evolve.
She already comprehended she has been tricked by Zhou Wen and had assisted him beat. Having said that, when Demonic Neonate was coping with the masked male, she thought that it wouldn’t be a challenge to eliminate Zhou Wen with her staying toughness.
Demonic Neonate held the Heaven Shrouding Bell in one fingers plus the demonic sword during the other as she billed at the masked gentleman.
On the quick the masked guy became popular, his concept modified greatly. In the Terror shape, Demonic Neonate experienced sprang out above him with the demonic sword in hand. It slashed on the face mask.
get your m.b.a. part-time job
Although face mask has been shattered as well as demonic sword had stabbed into his head, the masked gentleman didn’t expire immediately. Zhou Wen didn’t dare solution him in order to avoid himself from battling a counterattack.
As soon as the ice maiden noticed Zhou Wen’s voice, the hate for him exceeded the impact the cover up got in her. She subconsciously converted to consider Zhou Wen and elevated the Heaven Shrouding Bell in their hands.
Without any hesitation, Demonic Neonate brandished her sword yet again and cleaved start Peculiar G.o.d’s head. As for the Grim Demon in the demon sword, he hurried out and launched his oral cavity in enthusiasm, swallowing Outrageous G.o.d’s corpse. With some chomps, it swallowed every little thing.
The ice-cubes maiden stared in the masked guy and expected through gritted teeth, “You possess an S-standard Terror form?”
Soon after taking Outrageous G.o.d’s corpse, the demonic atmosphere on Grim Demon’s system surged. It checked like he was approximately to progress.
An Epic human being got a Terror-level Friend Beasts however, this Companion Beast actually possessed a Guardian. That which was this? It turned out similar to a fantasy story.
The ice maiden was already speechless from great shock.
The cover up was divided apart via the demonic sword, leaving behind a fracture in between.
Yet another Terror-grade!
the killers human chords piano
Demonic Neonate retained the Paradise Shrouding Bell in a single fingers and the demonic sword in the other as she charged in the masked gentleman.
The masked person instantly showed up ahead of the an ice pack maiden and reached to take hold of the Paradise Shrouding Bell. Before the ice cubes maiden could react, he got already grabbed the Heaven Shrouding Bell.
The ice-cubes maiden was already dumbfounded. She couldn’t believe what she got noticed today and experienced like she was dreaming.
Without having hesitation, Demonic Neonate brandished her sword all over again and cleaved open up Weird G.o.d’s travel. With regards to Harsh Demon in the demon sword, he hurried out and exposed his mouth area in excitement, swallowing Peculiar G.o.d’s corpse. With some chomps, it swallowed almost everything.
She designed to use the Heaven Shrouding Bell against Zhou Wen, however in the the masked man’s eye, it was like she was obediently offering the Heaven Shrouding Bell to Zhou Wen.
Could this be really Entire world?
The ice maiden want to resist, but her energy was ultimately poor on the masked male. The masked person forcefully s.n.a.t.c.hed away the Paradise Shrouding Bell.
Even during her hopes and dreams, the ice maiden had never thought that similar to this will arise.
However, coming from the split aspects of his apparel, you can note that his skin area was crystalline like jade. There had been some weird reddish areas that quickly vanished.
Is other really human?
While the face mask were shattered as well as the demonic sword obtained stabbed into his cranium, the masked guy didn’t perish right away. Zhou Wen didn’t dare approach him to stop himself from enduring a counterattack.
“From the appears from it, you might have no use for my body. Do you have anything to say prior to deciding to pass on? For those who have any unfulfilled wishes and it’s not very frustrating, I don’t intellect assisting you to,” Zhou Wen believed to the masked male from afar.
“Are you dreaming?” As Zhou Wen spoke, he required Demonic Neonate to quickly get rid of the masked person.
Bloodstream spewed out of your masked man’s lips because he was directed soaring. The Paradise Shrouding Bell he acquired just s.n.a.t.c.hed was s.n.a.t.c.hed back by Demonic Neonate.
Bloodstream spewed out from the masked man’s mouth area while he was delivered hovering. The Paradise Shrouding Bell he possessed just s.n.a.t.c.hed was s.n.a.t.c.hed back by Demonic Neonate.
The masked person didn’t proceed, however the ice-cubes maiden suddenly migrated. By using a terrifying ice cubes beam, she struck Zhou Wen.
The ice cubes maiden stared within the masked mankind and inquired through gritted pearly whites, “You possess an S-grade Terror shape?”
Nonetheless, the masked person suddenly laughed strangely. When he laughed, he said crazily, “Interesting. It is really exciting. Only a man actually has a Terror-level Associate Beast. Furthermore, he could purchase a Terror being to do stuff. This is really appealing. Only a really human body is worthy of me, the Peculiar G.o.d. I would like your human body.”
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334987.39/warc/CC-MAIN-20220927033539-20220927063539-00313.warc.gz
|
CC-MAIN-2022-40
| 5,966 | 38 |
https://community.splunk.com/t5/user/viewprofilepage/user-id/164554/user-messages-feed/latest-contributions
|
code
|
Since you asked this question, a lot has changed and new features have been added to Splunk.
Splunk's MLTS offers more than 20 advanced machine learning algorithms including SVM, Decision Trees, Naive Bayes, and many more. With its new SPL commands and custom visualizations, you can perform advanced machine learning analyses within Splunk.
Splunk's ML team is actively working on this app, adding new features, and making a lot of improvements to it.
... View more
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943562.70/warc/CC-MAIN-20230320211022-20230321001022-00397.warc.gz
|
CC-MAIN-2023-14
| 466 | 4 |
https://apple.stackexchange.com/questions/54675/how-can-i-send-my-computers-audio-to-multiple-outputs
|
code
|
I'm sending my system's audio to Soundflower, but I want to send it to my headphones at the same time. Is there any way I can achieve this?
- Open Audio MIDI Setup from Applications > Utilities.
- Click the + button in the bottom left corner and select "Create Multi-Output Device".
- Check "Built-In Output" (this may already be checked) and the Soundflower output of your choice.
- Right-click (or control-click) the device you just created and select "Use this device for sound output".
That's where the Soundflowerbed application comes into play. It lets you select out of which output you would like to play the sound that the rest of the system is feeding into sound flower.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572484.20/warc/CC-MAIN-20190916035549-20190916061549-00480.warc.gz
|
CC-MAIN-2019-39
| 680 | 6 |
https://www.syncdog.com/protecting-corporate-data-password-strategies/
|
code
|
By: Clay Miller, CTO, SyncDog
With each passing headline that screams of yet another company hacked, municipality breached, and healthcare system network rendered inoperable, it has become evident to executive leaders that organizations’ data security is a company-wide concern, not just the IT team’s responsibility.
An Evergreen Cybersecurity Pitfall
Protocols are only as good as the person following them. Around 50% of companies acknowledge that employees are their top cybersecurity threat. Human factor vulnerabilities are most often caused by a lack of security knowledge and training, and occasionally from insider threats. The NSA learned this lesson the hard way with Edward Snowden. There is no surefire workaround for human error, but there are steps that can be taken to enforce security protocols and build a strong security culture.
Use Enforceable Security Protocols
As it can be challenging to predict and anticipate employee behavior (including mistakes), the best protocols for protecting corporate data are those that can be technologically enforced. As far as tools and methodologies go, businesses can expect the most bang-for-their-buck by implementing password resets across any and all logins for assets such as email servers, network IDs, software tools, etc.
Caveats of Passwords
Password reuse across logins is a compounding factor that increases risk. The longer a password is in use, the higher the probability it can be compromised. Unfortunately, reuse and not changing passwords frequently enough are both common practices for the average user. If an employee’s personal email password is compromised, it is very easy for the attacker to go through all other accounts they can locate and try the same password, including associated business accounts.
Steps Towards Password Hygiene
Enforcing mandatory password resets across all organizational logins at set intervals mitigates some of the aforementioned risks. Combined with strong password requirements, it can be an important part of an overall security strategy. When it comes to mobile security for companies with a BYOD policy, sandboxing corporate data from employees’ personal data within an encrypted workspace, such as Secure.Systems, adds an extra layer of protection. With all your company’s major productivity applications in one spot, your employees will just need one password to get to work!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00531.warc.gz
|
CC-MAIN-2023-50
| 2,401 | 10 |
http://www.b2b-en-trade.com/2021/11/14/new-secret-details-found-for-gta-online-import-export-update-most-expensive-gta-5-dlc-ever/
|
code
|
NEW SECRET DETAILS FOUND FOR GTA ONLINE IMPORT/EXPORT UPDATE & MOST EXPENSIVE GTA 5 DLC EVER!?November 14, 2021
NEW SECRET DETAILS FOUND FOR GTA ONLINE IMPORT/EXPORT UPDATE & MOST EXPENSIVE GTA 5 DLC EVER!?
►Cheap GTA 5 Shark Cards & More Games:
►Find Out What I record With:
Follow THE SQUAD:
►Garrett (JoblessGamers) –
Check out more of my GTA 5 & GTA 5 Online videos! I do a variety of GTA V tips and tricks, as well as funny moments and information content all revolving around the world of Grand Theft Auto 5:
Hope you enjoyed this video! Thanks guys and have an awesome day,
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363125.46/warc/CC-MAIN-20211204215252-20211205005252-00520.warc.gz
|
CC-MAIN-2021-49
| 588 | 8 |
https://docs.microsoft.com/en-us/dotnet/api/microsoft.azure.devices.client.clientoptions?WT.mc_id=IoT-MVP-5001375&view=azure-dotnet
|
code
|
Options that allow configuration of the device or module client instance during initialization.
public class ClientOptions
type ClientOptions = class
Public Class ClientOptions
The transport settings to use for all file upload operations, regardless of what protocol the device client is configured with. All file upload operations take place over https. If FileUploadTransportSettings is not provided, then file upload operations will use the client certificates configured in the transport settings set for the non-file upload operations.
The DTDL model Id associated with the device or module client instance. This feature is currently supported only over MQTT and AMQP.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141203418.47/warc/CC-MAIN-20201129214615-20201130004615-00503.warc.gz
|
CC-MAIN-2020-50
| 673 | 6 |
http://forums.androidcentral.com/ask-question/420974-several-apps-having-errors-permissions.html
|
code
|
several apps having errors with permissions
Got a refurbished galaxy s3 a couple of weeks ago. Since then I've noticed a number of apps haven't been working correctly and after further investigation it all seems to be centered around file permissions. The example I'll use here is with the Amazon Appstore. I've gotten a few free apps from the Amazon Appstore, but I haven't been able to install any of them. It always returns with the nonspecific error message "There was an error while downloading <app name>. Please try again.", but of course "try again" never works. I tried uninstalling and reinstalling the app to no avail. Then I learned about an app called LogCat which can read system log information, so I got that to try and see what was going on and I found this:
"/storage/emulated/0/Android/data/com.amazon.venezia/files/apks/8591791b-233c-431d-beb5-055cd0f8c591.apk: open failed: EACCES (Permission denied)"
After browsing around a bit I see that there is no "apks" directory inside of "files". In fact "files" is completely empty, so my assumption is that the app isn't getting permission to create the directories/files that it needs to. Apparently my phone is already rooted (go refurb phone!) so I took a look at the app directory permissions:
"drwxrwx--- u0_a191 sdcard_r 2014-07-24 16:52 com.amazon.venezia"
Unfortunately I'm somewhat new to android so I'm not sure what the permissions are supposed to look like. Could anyone with more experience tell if this looks correct?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282631.80/warc/CC-MAIN-20170116095122-00480-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 1,496 | 6 |
http://www.zisc.ethz.ch/research/2003-2011/securityprotocolproofs
|
code
|
For timely ZISC-related information, you are kindly invited to subscribe to the ZISC Announcements Mailing List.
This project started in February 2004 and ended in July 2008.
Computational security definitions are formulated in terms of a probabilistic polynomial-time attacker having a negligible probability of success to break a given protocol or primitive. Cryptographers typically reduce protocol security proofs to the security of the underlying cryptographic primitives. Such proofs are often long, difficult and prone to human errors due to the lack of tool assistance. On the other hand, tools do exist for protocol verification in symbolic Dolev-Yao models. However, since these models abstract completely from computational issues and assume that cryptography is perfect (i.e., unbreakable), they usually lack a rigorous cryptographic justification. We aim at combining the best of both worlds: tool-supported symbolic proofs with strong cryptographic guarantees.
Backes, Pfitzmann, and Waidner were the first to propose a symbolic Dolev-Yao-style model (the BPW model) in the form of a library of cryptographic primitives, which is cryptographically faithful with respect to its cryptographic realization in the sense of blackbox reactive simulatability (BRSIM). This means that there is a simulator that translates every probabilistic polynomial-time attacker of the cryptographic realization into an attacker of the BPW model such that honest users cannot distinguish the cryptographic from the symbolic setup. Moreover, BRSIM is compositional, i.e., preserved in all contexts, and preserves many security properties from the symbolic to the cryptographic level. Hence, we may verify protocol security properties on the basis of the BPW model and conclude that they also hold for the cryptographic realization. To obtain cryptographic soundness the BPW model slightly deviates from standard Dolev-Yao models. For instance, it reflects the facts that secure encryption is probabilistic and often reveals the length of cleartexts.
The main objective of this project is to enable machine-supported cryptographically sound reasoning about security protocols. This includes the formalization of protocol models in mathematical logic and the setup of an appropriate reasoning infrastructure. For maximum flexibility, we have chosen to work with a higher-order logic theorem prover, more specifically Isabelle/HOL. We soon realized that in order to achieve a sufficient degree of proof automation we needed to abstract and simplify the BPW model. The project consisted of two phases. In the first phase, we modeled and abstracted the BPW model in Isabelle/HOL. In the second phase, we produced a more abstract protocol model, which is not based on the BPW model, but still cryptographically sound with respect to the BPW-based protocol model.
Note that at the end of each section below you find links to browsable versions of the corresponding Isabelle/HOL theories.
For modeling and reasoning about state-based systems in Isabelle/HOL, we built a generic monad-based modeling and verification toolbox [TPHOLs 2007]. We work with a simple component model, where a component is viewed as a state manipulated by a set of deterministic interface functions. Components are implemented using a monad to model state and exceptions in the purely functional setting of Isabelle/HOL. Components communicate using function calls. On the logical side, our toolbox includes a weakest pre-condition calculus and a monadic Hoare logic for pre-/post-condition reasoning, a linear-time temporal logic for temporal properties and a novel relational Hoare logic for proving the bisimilarity of monadic components. Using these tools we formalized all concepts and proofs described below in Isabelle/HOL.
In the first phase [CSFW 2006], we produced two formalizations of the BPW model in Isabelle/HOL, which incrementally abstract the original account by Backes, Pfitzmann, and Waidner. The first formalization abstracts the component and communication model and the second one abstracts the message representation from a pointer-like structure to an inductively defined data type. We used our relational Hoare logic to prove that the two formalizations are bisimilar (and hence BRSIM), which allows us to work with the more abstract one for protocol verification. These two abstraction steps are both necessary for effective practical protocol verification work.
We validated our model by proving the security of the Needham-Schroeder-Lowe (NSL) protocol. Although the proof was feasible using our monadic Hoare logic and the weakest pre-condition calculus, it was very long (130 pages of Isabelle/HOL) and tedious. We have identified two main shortcomings that impede efficient specification and reasoning about protocols. First, there is no support for concise protocol specifications. Instead, each protocol needs to be defined from scratch using the fine-grained message manipulation operations of the BPW model. Second, these operations have side-effects, which complicates the proof of general results that are reusable in different protocol proofs. Moreover, the indirect reference to messages using handles in the BPW model constitutes an additional complexity. As a result our proof of the NSL protocol is around two orders of magnitude larger than Paulson's proof (which he did in a much simpler model).
In the second phase [CSF 2008/LICS 2008], we addressed these problems by a further abstraction step: We introduced concise role-based protocol specifications interpreted within a more abstract protocol model. More precisely, we defined a generic protocol interpreter for role-based specifications. Protocol roles consist of a sequence of pairs of input and output patterns. A protocol step corresponds to matching an incoming message against the input pattern and producing a reply message according to the output pattern. We produced two instantiations of the generic protocol interpreter, which differ by the implementation of pattern matching and message composition. In the first one, the concrete protocol model, these operations are based on the fined-grained BPW model operations (where messages are handles) and in the second one, the abstract protocol model, these operations are side-effect-free and directly manipulate message terms. We also substantially simplified the adversary by collapsing the 20+ BPW model adversary interface functions into a single abstract one, which checks the derivability of the messages the adversary intends to send. This test is based on side-effect-free, standard Dolev-Yao closure operations to analyze known and synthesize new messages.
To show the correctness of this abstraction step in the sense of BRSIM, we needed to (1) define a simulator mapping the concrete to the abstract adversary; the simulator essentially consists of the adversary part of the BPW model and maps handles to messages and vice versa, and (2) prove that, for each role-based protocol specification p, the concrete model instantiated to p is bisimilar to the composition of the simulator with the abstract model instantiated to p. The BRSIM proof is based on our relational Hoare logic and relies on several auxiliary invariants, mainly regarding the well-formedness of the protocol threads. It allows us to transfer security properties from the abstract protocol model to the concrete one that is based on the BPW model.
To reason about protocols within the abstract protocol model, we have developed a general proof infrastructure and technique (applicable to all role-based protocol specifications) to reduce the proof of each invariant to two core lemmas: one for the protocol steps, stating that the addition of a protocol message to the execution trace preserves the invariant, and one for the adversary, stating invariant preservation for messages derived by the adversary. This reduction is completely straightforward and can very likely be automated. To prove the user-side core lemma, we use two kinds of general results. First, we have proved a general logical characterization of generic protocol steps in Hoare logic. Second, for each protocol under study, we systematically state and prove a case analysis lemma, which specializes a generic protocol step to those of the given protocol. The proof of the adversary side core lemma is simplified by the fact that message derivation by adversary is based on side-effect-free standard operators to synthesize and analyse messages. Thus, we can use standard results about these operators. These core lemmas correspond very closely to the inductive steps in Paulson's method. Using this infrastructure, we have validated our expectation to obtain much simpler and shorter proofs by verifying the security of the NSL protocol within the abstract protocol model. Although the overall proof is still large (80 pages of Isabelle/HOL), the proofs of core lemmas for the 9 NSL invariants fit on around 10 pages.
In summary, the chosen abstractions close the gap with standard symbolic models both with respect to the conciseness of protocol and property specifications and the size and complexity of the resulting proofs. The benefits of these abstractions are two-fold:
The complete project, with a particular emphasis on the second phase, is described in our CSF/LICS 2008 paper.
For further information about this project you may also want to visit this page at IBM research, or directly contact one of the project members by following the respective link on the top of this page.
The source code of our development can be downloaded by clicking on the link below. You need a working installation of Isabelle/HOL 2005.
Note: This source distribution does not yet include the abstract protocol model, for which currently only the browsable documentation is available (see above). A release of the complete sources is planned shortly (as of Nov 2008).
Please send mail to Christoph Sprenger if you would like to be notified of updates.
Diese Website wird in älteren Versionen von Netscape ohne graphische Elemente dargestellt. Die Funktionalität der Website ist aber trotzdem gewährleistet. Wenn Sie diese Website regelmässig benutzen, empfehlen wir Ihnen, auf Ihrem Computer einen aktuellen Browser zu installieren. Weitere Informationen finden Sie auf
The content in this site is accessible to any browser or Internet device, however, some graphics will display correctly only in the newer versions of Netscape. To get the most out of our site we suggest you upgrade to a newer browser.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704392896/warc/CC-MAIN-20130516113952-00044-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 10,569 | 20 |
https://developer.identos.com/docs/fpx-components/rsa/set-up-rsa/configure-rsa/oidc-rsa/oidc-logging
|
code
|
When a request is received by the application, the following properties of the request are logged via Spring’s Mapping Diagnostic Context (MDC):
- @timestamp - timestamp when the request was received
- level - logging level (INFO, WARN, ERROR etc.)
- logger_name - logger (the fully-qualified class name where the logger was called)
- message - logged message (message passed to the logger)
- request_id - a UUID is created to identify the request. Any logs that are made during the evaluation of this request will be tagged with this request ID.
- http_method - the HTTP verb of the request (i.e. GET, POST, etc.)
- request_uri - the path of the request (i.e. /some-endpoint)
- client_ip - the IP address of the client making the request
The preceding properties will also be logged whenever a logging event occurs during the processing of a request (not just when the request is received).
When a response is made by the application, it will log the same properties as it did when the request was received. In addition, the application logs the following properties specific to the response:
- stack_trace - exception stack trace (if exception occurred)
- http_status - the outcome of the request (always logged)
- alert_level - the exception alert level (if an exception occurred)
- error_code - the exception lookup code (if an exception occurred)
- exception_message - the exception message (if an exception occurred)
Logging configuration can be found in the Helm chart's
application.config section, under the
logging property. The config file specified by default,
logging.config), is set up to log in a compressed (single-line per log event) JSON format which is more digestible by tools utilized by DevOps in order to parse log data for diagnostics. The following config files may be specified for different log formats:
- logback-spring.xml: JSON formatted output for production environments.
- logback-dev.xml: Human-readable output for development purposes.
See the Deployment section for more details on these properties.
More information about Logback configuration and syntax can be found here:
More information about how to configure the Logstash encoder used in the Logback configuration can be found here:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506320.28/warc/CC-MAIN-20230922002008-20230922032008-00855.warc.gz
|
CC-MAIN-2023-40
| 2,225 | 25 |
https://gitlab.cern.ch/atlas/athena/-/merge_requests/30626
|
code
|
Adding the track building for the muon trigger in the new JO test (ATR-20388):
- cloned the offline flags to set muon trigger specific values, and added the track builder as part of the muon trigger reco sequence
- migrated the tools in the muon seeded segment finder to be private
- removed a few instances of 'addPublicTool' where we can use private tools
- note that the region selector service used by the segment recovery is currently the default (which is correct at the moment), but this will probably need to be changed in the future, so keeping the property commented out for now.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00102.warc.gz
|
CC-MAIN-2022-33
| 589 | 5 |
https://www.ee.ucla.edu/events/neural-network-based-representation-learning-and-modeling-for-speech-and-speaker-recognition/
|
code
|
Speaker: Jinxi Guo
Affiliation: UCLA Ph.D. Candidate
Abstract: Deep learning and artificial neural network research has grown significantly over the past decade, especially in the fields of automatic speech recognition (ASR) and speaker recognition (SV). Compared to traditional methods, deep learning-based approaches are more powerful in learning representation from data and building complex models. Therefore, this talk will focus on representation learning and modeling using neural network-based approaches for speech and speaker recognition.
In the first part of the talk, I will present two novel neural-network based methods to learn speaker-specific and phoneme-invariant representation for short-utterance speaker verification. Both approaches improve speaker verification performance significantly. In the second part of the talk, I will propose several neural-network architectures which take raw speech features (either complex Discrete Fourier Transform (DFT) features or raw waveforms) as input, and perform the feature extraction and phone classification jointly. The unified neural network models provide significantly lower ASR error rate compared with traditional models. In the third part of the talk, I will discuss novel neural networks for sequence modeling. I will first talk about attention mechanisms for acoustic sequence modeling. Then, a sequence-to-sequence based spelling correction model for end-to-end ASR will be presented.
Biography: Jinxi Guo is a PhD candidate in the Electrical and Computer Engineering Department at UCLA. His research interests include automatic speech and speaker recognition, machine learning and deep learning. For his doctoral research, he is working on developing novel neural network based architectures and approaches for representation learning and modeling, with applications to automatic speech and speaker recognition. He has 19 top conference and journal papers published (including 12 first-author papers). He has held research internships at Google Research, Amazon Alexa Machine Learning, Snapchat AI Research and Qualcomm Research. He received Borgstrom Fellowship from UCLA for 2014-2015 and the Dissertation Year Fellowship from UCLA for 2018-2019. He received the B.E. degree in Electrical and Information Engineering from Xi’an Jiaotong University, China, in 2013, and the M.S. degree in Electrical Engineering from UCLA, in 2015.
Date(s) - May 24, 2019
12:00 pm - 2:00 pm
E-IV Tesla Room #53-125
420 Westwood Plaza - 5th Flr., Los Angeles CA 90095
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107890108.60/warc/CC-MAIN-20201026002022-20201026032022-00290.warc.gz
|
CC-MAIN-2020-45
| 2,527 | 9 |
http://freecode.com/projects/nmr-relax/releases/335597
|
code
|
Release Notes: This is a major feature release. It adds the ability to run relax on clusters or grids of computers via the MPI protocol. This merges in Gary Thompson's multi-processor branch, which was started all the way back in 2007. The "multi" package introduces two processor fabrics, the standard uni-processor mode and the mpi4py mode for using the MPI protocol with Python. The model-free analysis code has been parallelized to take advantage of the multi-processor modes, significantly speeding up calculations on clusters with near perfect scaling efficiency.
Release Notes: This release adds relaxation dispersion analysis. This support is complete and includes almost all analytic and numeric relaxation dispersion models in existence. It includes support for single, zero, double, and multiple quantum CPMG data and off-resonance R1rho data. An automated protocol has been developed to simplify the analysis, and a GUI has been designed around this auto-analysis. Relaxation dispersion calculations have been parallelized at the spin cluster and Monte Carlo simulation level for speed.
Release Notes: This release includes better pseudo-atom support, support for the value.write user function to allow model information to be written to a file, improvements to the 2D Grace plots, and fixes for missing log messages when running on a cluster using OpenMPI.
Release Notes: The handling of peak lists has been enhanced and chemical shifts can now be read into relax, there are a number of improvements throughout the GUI, and a number of minor bugs have been solved.
Release Notes: This release marks a major shift of relax towards becoming a scientific computing environment specialized for the study of molecular dynamics using experimental biophysical data. It is designed to be a replacement for numerical computational environments such as GNU Octave, MATLAB, Mathematica, Maple, etc. Most changes are for the power user, as they are in the backend. The infrastructure changes are comprehensive and include the reorganisation of most of the relax code base, a large expansion of the relax library, and general improvements and fixes throughout.
Release Notes: This is a minor feature release. Improvements include the creation of Rex value files scaled to all spectrometer frequencies for the model-free auto-analysis and some new capabilities in the structural API.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163966854/warc/CC-MAIN-20131204133246-00037-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 2,382 | 6 |
https://community.spiceworks.com/topic/2091504-trying-to-get-our-chiro-program-to-open-correctly
|
code
|
When opening the program we use for patient data entry, it gives this SQL error and none of the usernames show up in the program. How can I make this not happen?
Does the User table still exist? Did someone accidentally drop it?
Is it logging in to the right server and database?
Look in the database and see if the User table is there.
Then my next suspicion would be a permissions issue. Does the app have it's own account or does it pass in your credentials?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058552.54/warc/CC-MAIN-20210927211955-20210928001955-00240.warc.gz
|
CC-MAIN-2021-39
| 461 | 5 |
http://pdfcast.org/pdf/distance-from-origin-to-plane
|
code
|
Distance from Origin to PlaneDistance from Origin to Plane
A plane is a two-dimensional doubly ruled surface spanned by two linearly
independent vectors. The generalization of the plane to higher dimensions is
called a hyperplane. The angle between two intersecting planes is known as the
The equation of a plane in 3D space is defined with normal vector (perpendicular
to the plane) and a known point on the plane.
Let the normal vector of a plane, and the known point on the plane, P1. And, let
any point on the plane as P.
We can define a vector connecting from P1 to P, which is lying on the plane.
Since the vector and the normal vector are perpendicular each other, the dot
product of two vector should be 0.
This dot product of the normal vector and a vector on the plane becomes the
equation of the plane. By calculating the dot product, we get; Know More About :- How to do Cumulative Frequency Tutorcircle.comPageNo.:1/4
Distance from Origin
If the normal vector is normalized (unit length), then the constant term of the
plane equation, d becomes the distance from the origin.
If the unit normal vector (a1, b1, c1), then, the point P1 on the plane becomes
(Da1, Db1, Dc1), where D is the distance from the origin. The equation of the
plane can be rewritten with the unit vector and the point on the plane in order to
show the distance D is the constant term of the equation;
Therefore, we can find the distance from the origin by dividing the standard plane
equation by the length (norm) of the normal vector (normalizing the plane
equation). For example, the distance from the origin for the following plane
equation with normal (1, 2, 2) is 2; Distance from a Point
The shortest distance from an arbitrary point P2 to a plane can be calculated by
the dot product of two vectors and , projecting the vector to the normal vector of
where vP1 is a point on the plane and vNormal is the normal to the plane. I'm
curious as to how this gets you the distance from the world origin since the result
will always be 0. In addition, just to be clear (since I'm still kind of hazy on the d
part of a plane equation), is d in a plane equation the distance from a line through
the world origin to the plane's origin?
b) x+3y-2z=4Learn More :- Perimeter of an Ellipse Calculator Tutorcircle.comPageNo.:2/4
I'm not completely sure how to do this. Currently I'm plugging everything into the
But I'm not sure if that's actually minimizing the distance.
Thanks in advance!
The shortest distance is along the perpendicular, i.e. the normal vector: <1,10,7>.
The line containing the origin:
r(t) = <1,10,7>t
<(x - 7), (y - 5), (z + 8)> * <1,10,7> = 0
x - 7 + 10(y - 5) + 7(z + 8) = 0
Plug in the parametric equations from the line:
t - 7 + 10(10t - 5) + 7(7t + 8) = 0
... solve for t.
t = 1/150
Find the point using the line:
r(1/150) = (1/150, 1/15, 7/150)
Use the Distance Formula:
D = (1 + 10 + 7)/150
D = (1 + 100 + 49)/150
D = (150)/150
D = 1/150 TutTu ot rcr ic rcr lc el .e c. oc mPaP geg e NoN ..::2/3 3/4
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701943764/warc/CC-MAIN-20130516105903-00040-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 3,007 | 51 |
http://discuss.joelonsoftware.com/default.asp?design.4.664429.12
|
code
|
A public forum for discussing the design of software, from the user interface to the code architecture. Now closed.
Vista has features not found in XP. If I am developing an application to target both and want to take advantage of the new features in Vista, what can I do other than having to release separate EXEs?
Friday, August 08, 2008
You'll need to me more specific however one method may be to link to api functions dynamically at run time using GetprocAddress(). There is nothing new about this.
Sunday, August 10, 2008
People describing Vista and XP as "multi-platform" always reminds me of the Blues Brothers...
Sunday, August 10, 2008
> What about Linux, Solaris, or Mac OS X?
they're different versions of nix
Monday, August 11, 2008
> but...you just did respond to that.
Go and re-sit your English classes. Whenever the teacher mentions "implication" - or any of the related terms, pay attention.
For good measure, also read up on sarcasm.
:) <-- Obligatory smiley for sarcastic responses on the internet, which should show that this is not a personal attack.
Oh I get it. You're sarcastically implying that you're not going to respond, which is not a response at all, even though you clicked a button that said "Reply" which is also a synonym for the word Response.
Then you responded to my sarcastic remark by telling me to read up on sarcasm.
Perhaps you're the one who needs an English class, as well as a Philosophy class with an emphasis on Absurdism or maybe Logic.
:) <-- Obligatory smiley which allows me be use witty language to convey insults or scorn and basically mock you (aka "using sarcasm") without feeling guilty.
Tuesday, August 12, 2008
I was implying that there are a number of "holy wars" that I didn't want to get into when I made that comment.
For example, consider that Mac OS X, OpenBSD, Linux, and Windows are maintained by completely different people, and that Windows is Posix compliant, (1.0 I think), while Linux is not, and is definetly not a version of Unix, *nix, even though it is often used as a clone of Unix.
In other words, the real story is not simple.
There is a "real story"? I doubt it. The "story" is mostly a fantasy made to look like whatever the poster wants it to be. He fails to communicate clearly by using undefined and inadequately qualified terms. That way no one can be wrong. Also, no one can be right. More importantly, it creates a good excuse for an endless and totally pointless exchange of "it is!" and "no, it isn't!" on a meandering of topics.
Isn't it about time for some one to exclaim: "Nazi"? That would make it quite clear that this thread has no content and was never intended to have any.
This topic is archived. No further replies will be accepted.Other recent topics
Powered by FogBugz
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156901.47/warc/CC-MAIN-20180921072647-20180921093047-00423.warc.gz
|
CC-MAIN-2018-39
| 2,769 | 26 |
http://mitchelsneddon.co.uk/alexa.html
|
code
|
Following the success of the Chatbot I was given a side project to look into bringing the Chatbots functionality into Amazon's cloud based voice service. I created a demo version of an Alexa skill using node.js and Amazons Lambda functions. The demo skill allowed a user to search for a course using a subject and the Alexa skill would return the most popular 5 courses for that subject.
I was given the approval to start building an official LBU course search Alexa skill and with the help of my Senior developer we managed to get the Alexa skill to talk to the same course feed the chatbot uses. This means that a user can search for a course using UCAS code, course title or subject. The skill also asks for a users UCAS points, UCAS ID and first name which is saved in an Amazon DynamoDB, so that we can store these points and send them off to our admissions team should a user meet the requirements for the course and accept any offer given by the skill.
If you'd like to give the skill a go, please download it from here.
Here are some example videos:
Search using a subject
Search using a UCAS code
Search using a UCAS code but I don't have enough UCAS points
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00389.warc.gz
|
CC-MAIN-2022-33
| 1,166 | 7 |
https://fftgawards.com/genre/new-wave-student-filmmakers/
|
code
|
Women* in nowadays society
Pascal has the dream of turning an abandoned house into a cultural center. In secret, Manuel, her boyfriend, begins to use the house for other purposes.
A junior high school girl who stays at the academy until the latest every night to study. When everyone goes home, they take off their clothes and start dancing.
Fashion video with social background.
The Сaptain accidentally falls into the dream of an Indian, who demonstrates to him three women from the 70s, 80s and 90s - each of them escaped from a noisy party to welcome a new day at the port.
The girl suffers from a great discomfort without warning, like a disaster. When the panic attack is accompanied by a flapping of wings, a chaotic, dissociated journey into her unconsciousness begins.
Experimental animated short film.
Re-creating the flavor of home for the first time.
An altruist meets a fellow fruit lover who needs their help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00710.warc.gz
|
CC-MAIN-2024-10
| 924 | 9 |
https://blog.malwarebytes.com/tag/dns/
|
code
|
A vulnerability in the popular npm netmask library has caused a lot of discussion and confusion. Let’s try to make it simple.
Should you worry about domain name abuse? For the most part it depends on what kind of company you are and what you expect to encounter.
We talk to Chris Boyd about Bluetooth technology, how the tech is used in online advertising today, and more, on the latest episode of Lock and Code.
Website misconfigurations can lead to hacking, malfunction, and worse. We take a look at recent mishaps and advise site owners on how to lock down their platforms.
The world as we know it changed on October 29, 1969, the day the Internet was born. 50 years later, it’s both ubiquitous and full of potential—and risks.
We found a new Trojan that uses aggressive techniques, including blocking access to security sites, to deliver an adware bundler. Read up on what Extenbro can do and how to get this pest off your system.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662521152.22/warc/CC-MAIN-20220518052503-20220518082503-00709.warc.gz
|
CC-MAIN-2022-21
| 940 | 6 |
https://www.easytechjunkie.com/what-are-the-pros-and-cons-of-firefox.htm
|
code
|
What are the Pros and Cons of Firefox®?
People who are used to using one type of Internet browser may be reluctant to trying another brand, even when people claim the wonders of one over the others. While programs like Internet Explorer® serve many people well, some users may want to consider Firefox® if they have dealt with certain issues, like security breaches and download problems, in the past. Each browser software has its own pros and cons, but Firefox® is often considered to be among the fastest and safest available. It does have disadvantages, however, including compatibility and memory issues.
- Speed — Firefox® is reported to be the fastest browser when it comes to download speed. Not only do programs and files download faster, but users get a record of all their downloads in the form of a table, so they can erase or move them at their convenience.
- Security — This browser has some advanced security measures that help protect a computer from spyware and even certain viruses. It also comes with a state-of-the-art popup blocker that stops almost 100% of popups.
- Tabbed browsing and other advanced features — Tabbed browsing allows the user to open an unlimited number of pages in a single window, thus helping to organize browsing. Firefox® also has an embedded memory, which means if the computer is turned off by mistake, the browser will remember which sites were open and offer to restore the previous session.
- Compatibility issues — The main disadvantage of Firefox® is compatibility. Some websites do not show properly in this browser and require the user to view them with IE®.
- Memory — Firefox® takes a lot of memory to run. Even with an up-to-date computer, some users may find that it becomes hard to run the browser when several other programs are open. The software also tends to freeze and close when too many tabs are open simultaneously, which is why the brand invested heavily in creating the recovery memory feature.
- Interrupted service — Another disadvantage is that downloads cannot be resumed if they are interrupted. This may not be a big deal for people who have cable or DSL service, but those on a dial-up connection may encounter many problems because of it. The browser was actually designed for people using high-speed Internet, which means dial-up users can run into many problems when using the software.
Firefox seems so wonderful on the surface, but if you pay close attention to the small things your computer is doing now that you use Firefox. There may be very subtle changes to your file locations, the programs used to access your files, the rearranging and different configurations of your desktop, your memory usage, your traffic monitor and other things you usually do not notice.
You may think, as I do, that it's so much more private and secure and, well just so wonderful as I said, that I now look for the back door it uses to offer you such a sweet state of mind and complacency. The name "Firefox" even sounds attention getting, but I will continue using it, because, bottom line, it is better than IE, and I don't have time to worry about the things that I can do nothing about. There's too much other stuff in this life to keep my mind occupied.
One change in FF 26 annoys me. "Find in page" was changed for worse. Previously there was one "Find in page" per window (very useful when searching for something in multiple sites), now it is one per Tab.
Another thing: they aligned "Find in page" options to right instead leave it attached to line edit where pattern is entered. Who came up with this idea? This is total UX failure! On large hi resolution monitors (most desktops) it is useless.
I love Firefox. I'm using it right now! I never have any problems at all and it runs very very very smoothly. I will recommend everybody use it, even though my parents don't.
I love Firefox. That is what I always use to look something up. I rarely run into any problems with the service. It really runs smooth and is always a good reliable source for me to use. I highly recommend people use Firefox. It's a great source I would say, if anyone asks me.
My husband uses nothing but Firefox on his laptop and thinks it is the best browser there is. I am just glad there is more than one choice in using a browser depending on what you like, and how it works on your particular computer.
I am not all that computer savvy and didn't even realize you could have more than one browser downloaded on your computer at one time.
Since Internet Explorer came already downloaded on my computer I thought that was the only one I could use. My son thinks that Firefox is a better browser so he downloaded it for me and said I could switch back and forth.
I guess I am a creature of habit though because I keep Internet Explorer as my default browser and only use Firefox if I am having troubles with Internet Explorer. I guess I didn't give Firefox much of a chance to see if I liked it better or not.
I used Internet Explorer for many years before I looked at using a different browser. The first time I downloaded Firefox I was surprised at how much faster it seemed to download programs.
I also love the way Firefox has their tabbed browsing so you can have more than page open in one window. This has made life much easier for me on the computer.
Recently, Yahoo email started crashing IE8 frequently when I tried to send a message. Yahoo tech support responded to the problem with a "go away kid, you bother me" type response. I installed FireFox, and now Yahoo mail is working better than it did with IE.
i'm a word/pic nerd but a computer amateur. i do downloading and word processing and navigate happily around the net grabbing things, but i don’t do real photoshopping and learned my way into the computer and net from a word processing base, no programming. i have a low grade blog. i have a vista system and ie 8 but have always heard good things about firefox, especially the open source aspect and the fact it is not microsoft. one time i tried to download it and start using it and things went wrong and i chickened out and removed it. now chrome beckons and i wonder if i should try one or the other. Any advice on which if either way to go?
1. Compatibility: Firefox has a built-in "IE engine" icon you can click on to switch to viewing the page in IE through the Firefox interface when/if you need to view a page in IE. It would be helpful to note that the reason Firefox does not support ActiveX or VBScripts is because these scripts are so often used for spyware. (That's part of what makes FF more secure than IE.)
2. The memory issue is untrue. See Wikipedia's article on Firefox and look at "Critical Reception" to see: "When PC Magazine compared memory usage of Firefox, Opera and Internet Explorer, they found that Firefox used approximately as much memory as the other browsers. Tests performed by PC World and Zimbra indicate that Firefox 2 uses less memory than Internet Explorer 7." Also, I have used FF since its release in 2004 and have no problems with freezing personally, but FF is updated constantly to fix problems or bugs that might cause freezing on certain boxes. If you Google "Firefox +freezes" you get 646,000 hits. If you Google "Firefox +freezing" you get 1,040,000 --- that's roughly 1.7 million hits together for a browser that's been downloaded 300 million times. 1.7 million is just over .5% as a comparison to downloads. That's an extremely low hit-rate even if you double it to 1%. That kind of hit rate isn't indicative of an overall problem for a browser that's been downloaded so many times. Try the same Google search with "IE +freezes" and "IE +freezing" and you'll see what I mean.
3. Interrupted service: Resume downloads will be built into FF 3.0 and should perhaps be mentioned here.
Post your comments
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644506.21/warc/CC-MAIN-20230528182446-20230528212446-00602.warc.gz
|
CC-MAIN-2023-23
| 7,844 | 26 |
https://github.com/ZephrFish/GoogD0rker
|
code
|
Note: Going through a full re-write of the tooling so the current versions in the repo do not work!
GoogD0rker is a tool for firing off google dorks against a target domain, it is purely for OSINT against a specific target domain. This will output all the google results for each of the tasks so you can hopefully find a vunerability. A 503 error means you need a new IP as google knows you're up to something! This will output the results to files and then you can browse and see what you have found.
Install the pre-reqs which are the google library for python, also install python if you haven't already.
pip install -r rerquirements
This will work on any unix machine
GoogD0rker.py -d example.com
- Able to add custom d0rks
- Prettier error handling
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488567696.99/warc/CC-MAIN-20210625023840-20210625053840-00355.warc.gz
|
CC-MAIN-2021-25
| 753 | 8 |
https://www.panagenda.com/kbase/plugins/viewsource/viewpagesrc.action?pageId=45354215
|
code
|
If you use the Advanced Properties menu to choose the "Document Properties" option, you will see a dialog like this:
Much like the standard Document Properties box that's been included with the Notes client for many years, this dialog will give you information about all the fields in the selected document, including field name, data type, field size, and a text representation of the field value.
However, this dialog also has additional features like:
By default, the dialog will show the value of the selected document and it will continue showing that value even if you select a new document. However, you can also use the "Follow Document Selections" option at the bottom of the dialog to allow the values in the dialog to change as you select different documents.
There are additional tabs for general document information and attachment information. These are plain text fields, and you can copy any or all of this information to the clipboard to easily save it or paste it somewhere else.
Visit panagenda Document Properties Plugin on our website!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337531.3/warc/CC-MAIN-20221005011205-20221005041205-00384.warc.gz
|
CC-MAIN-2022-40
| 1,056 | 6 |
https://community.oracle.com/message/11096094
|
code
|
I am trying to install statspack into a new ORACLE 12c DB.
The install fails creating perfstat user in the ROOT container.
My question I guess is whether statspack can be installed as a common user - the rdbms/admin scripts don't do this since common users need to be prefixed with c##
spdoc.txt contains this entry:
9.1. Changes between 11.1 and 12.1
o Idle Events
- Added Idle Events that span LogMiner, PQ, SQL*Net, Capture Reply
o Consolidated DB/Pluggable DB
- Consolidated DB and Statspack Reporting at the CDB Root Level
Thats correct You can create the common user with prefix C## ref Doc:Managing Security for Oracle Database Users
A common user is a user that has the same identity in the root and in every existing and future PDB. A common user can log in to the root and any PDB in which it has privileges.
I faced a similar problem and found something of a work around. Though Statspack is now functioning, it seem a little odd. Certainly not "documented" in the spcreate.sql scripts.
logging in as sys and running spcreate I get:
The spcreate.sql runs to completion and spauto.sql will run and set up the job.
If the real work around is to alter the spcreate.sql and the scripts it calls to create and work with a user c##perfstat, then hopeful Oracle will supply these scripts.
Spauto.sql was run as sys and is running as scheduled. I changed spauto to run every 15 minutes.
The statspack needs to be installed into a PDB.
True at present, but apart from the note in spdoc.txt there's a line in spcreate.sql that vaguely suggests that there may be (or may have been) a way of allowing perfstat to be a common user (there's a line to alter a hidden parameter).
I'm not planning to experiment, but I note there's a hidden parameter "_common_user_prefix" which defines the "C##" that has to prefix a common user name. It's not modifiable at the system or session level, but I did wonder whether it would be possible to set this to null, bounce the database, install perfstat, then set it back to 'C##' and restart the database with perfstat in CDB$ROOT.
was thinking along those lines myself, other common users are created without c## prefix - will give it a go and feedback. Doesn't make sense to me to install into each PDB.
I know statspack is not high on the list of priorities, but for many of us DBAs "in the trenches" it is indespensable.
ok - this works. Thanks.
added following parameter to pfile:
bounced database and created common user perfstat:
SQL> shutdown immediate
ORACLE instance shut down.
SQL> create spfile from pfile;
ORACLE instance started.
Total System Global Area 1636814848 bytes
Fixed Size 2288968 bytes
Variable Size 973079224 bytes
Database Buffers 654311424 bytes
Redo Buffers 7135232 bytes
SQL> create user perfstat identified by perfstat container=ALL;
Thanks to a commentator on my blog, I now know there's an easier option.
The spcreate.sql script has a line
alter session set "_oracle_script"=true;
Run this statement in the CDB and you will be able to create a user called perfstat;
However if you try running the spcreate script it would still fail because the spcusr.sql script that it calls includes the option "container=current" in the "create user" statement - so before running spcreate.sql you have to edit spcusr.sql to comment out this option.
Also had to make add the CONTAINER=ALL to the create user statement in spcusr.sql
prompt ... Creating PERFSTAT user
create user perfstat
identified by &&perfstat_password
default tablespace &&default_tablespace
temporary tablespace &&temporary_tablespace container=ALL;
You are right, ran some tests. Default is container=ALL if you are logged on CDB$ROOT. Makes sense too.
I did this, setting the session parameter and then running the spcreate as follows:
SQL> conn / as sysdba
SQL> alter session set "_oracle_script"=true;
No need to edit the oracle supplied scripts. They work out of the box.
One thing to note is that to run spdrop.sql (to uninstall) you have to again set the "_oracle_script" parameter, But this makes sense too I guess.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223205375.6/warc/CC-MAIN-20140423032005-00447-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 4,057 | 51 |
https://elyzion.net/news?page=2
|
code
|
The Beem project is still going on as a proof here is the release candidate of Beem-0.1.5. You can download it here on the website. You are all requested for some extra tests and your feedbacks will be appreciate before the release of
Beem 0.1.5 planned on January 31st.
Translators are encouraged to update their translations. Unfortunatelly, the translation tool is down so you have to update the translations by hand and then send a mail to the list <beem-dev at list.beem-project.com>
If you have some questions, we are still available on the mailing list or on the muc [email protected] or on IRC #beem on freenode.What have been done :
- Bug #248: Switching servers while logged in
- Bug #274: "XMPPP" should be "XMPP" on welcome screen (first run)
- Bug #275: Buttons are not localized in account creation wizard
- Bug #277: GUI uglinesses
- Bug #284: Beem fails to authenticate - Wireshark analysis - DIGEST-MD5 protocol error?
- Bug #293: Unable to view received messages.
- Bug #298: Timestamp on german layout is a telephonenumber link
- Bug #313: Mixed UI locale after installation
- Bug #321: Exception when username does not have an @
- Bug #324: Authorization request
- Bug #329: White space before question mark
- Feature #245: Add support for chat history
- Feature #255: Accessing open chats
- Feature #260: Minimal interface for chat windows
- Feature #267: Include last chat text in status message
- Feature #268: Soft keyboard improvements
- Feature #280: Remove Fading edge in chats
- Feature #286: Add support for XEP-0115: Entity Capabilities
- Feature #295: xml
- Feature #309: XEP-0084: User Avatar
- Feature #310: Add an option to enable smack debugging in Logcat
- Feature #316: Set last used status when (re)starting Beem client
- Spanish translation
- Italian translation
- Swedish translation
- Bug #271: Beem doesn't display ignored messages sometimes.
- Feature #253: Deal with strict certificate checking
- Feature #338: XEP-0084: User Avatar : set and change your published avatar
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00820.warc.gz
|
CC-MAIN-2023-50
| 2,028 | 32 |
https://dev.bukkit.org/projects/betonquest/files/841552
|
code
|
UploadedDec 23, 2014
Supported Bukkit Versions
- CB 1.7.9-R0.2
- CB 1.7.2-R0.3
Fixed errors that were spamming the console when a player with active Location objective was teleporting to other worlds.
If you're using tellraw option then the rest of answers that exceed one line's length will be white.
/q purge command doesn't work for offline players.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00803.warc.gz
|
CC-MAIN-2023-40
| 352 | 7 |
https://renderman.pixar.com/view/DP21897
|
code
|
How do I get the z depth output?
In the global render settings, on the common tab, you can add the Depth Channel (Z Depth) setting to your renderable camera. Then on your Final pass output tab, you can change the rgba output to use rgbaz channels. That way, the z channel is included in your final pass.
If you'd like to have the z channel in a separate AOV, select your Final pass in the RenderMan controls window and then click on the outputs tab. Then add a custom output named "float z". Then you should add the Filter setting to the z channel and change it to zmin. You'll need to make sure your output file format is a format that will support the depth data, such as 32-bit Tiff. Once you have the z depth output file, you can open it in Nuke, Photoshop, or some other image editing program and then correct the exposure or normalize the image so that the pixel values are remapped between 0 and 1, then you should see the depth map values.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320669.83/warc/CC-MAIN-20170626032235-20170626052235-00167.warc.gz
|
CC-MAIN-2017-26
| 947 | 3 |
https://coderanch.com/t/650037/certification/Cleared
|
code
|
K. Tsang wrote:Congrats
Just curious were there any patterns questions asking old core J2EE patterns?
koilraj abraham wrote:Congratulations Sergio,
Glad to know that our Training Lab Simulator helped you for the exam. Good Luck for Part 2 and 3.
Prachij Gupta wrote:Congrats Sergio and thanks for your valuable inputs. All the best for Part 2 and 3.
I am also starting the preparation for this certification.
Can you tell me is it mandatory to do the training courses which is mentioned in the oracle official site for this certification.
I am SCJP 1.4 and SCWCD 5 certified.
Prachij Gupta wrote:Thanks Sergio for the suggestion.
Can you provide me the link from where i can get the EPractize Labs simulator.
Also if possible can you please share the mockup tests and study material.
Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104249664.70/warc/CC-MAIN-20220703195118-20220703225118-00059.warc.gz
|
CC-MAIN-2022-27
| 802 | 12 |
https://help.hatica.io/kb/guide/en/dev-summary-dashboard-KsJaoBKwDI/Steps/1332942
|
code
|
Dev Summary Dashboard
This dashboard is grouped into the 5 sections to make it easily readable and understandable.
The sections are (metrics under them are included under each heading):
Cycle time average
Cycle time breakdown
Code reviews: This section contains important metrics related to code reviews.
Submitter response time
Productive throughput and efficiency
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104678225.97/warc/CC-MAIN-20220706212428-20220707002428-00121.warc.gz
|
CC-MAIN-2022-27
| 365 | 8 |
https://medium.com/librecores/el-correo-libre-issue-7-fff9cdda074a?source=collection_home---4------0---------------------
|
code
|
El Correo Libre Issue 7
Google Summer of Code 2018 Retrospective
As in previous years, the FOSSi Foundation has participated in this year’s Google Summer of Code. In this programme Google provides three-month scholarships to students worldwide, allowing them to contribute to open source projects. Even more important than the actual code contributions, the students are encouraged to become active members of open source communities and to learn how those communities work. This way the students become long-term contributors, even after the scholarship is over.
The FOSSi Foundation participates as a so-called umbrella organization: we provide projects related to Free and Open Source Silicon, EDA tools, and the ecosystem to participate in Google Summer of Code with our help. Each of the students gets mentored by maintainers of the projects, and the FOSSi Foundation organises the administrative part and supports both the students and mentors.
This year we had six great projects:
- Sandip Kumar Bhuyan has been involved with our very own project, LibreCores.org. He has improved the discoverability of cores on the portal with a search function and categories, a feature we have all been hoping for. You can find his summary of the project here.
- Kunal Gulati has worked with the team around Prof. Michael Taylor from the University of Washington on the Basejump project. This project aims to simplify the design flow, and Basejump STL is a collection of library modules for it. Kunal worked on the mathematics functions and summarised his project here.
- Ahmed Salman has worked with Steve Hoover of the Transaction-Level Verilog project. He contributed to the base of a component library and summarised his summer of code here.
- Sriyash Caculo has contributed to the MyHDL project by contributing to the digital filters and the integration with the PyFDA project. He has summarised his work here.
- Noe Nieto worked on the DEVSIM project, towards the simulation of solar cells with the Beer-Lambert algorithm. He furthermore contributed an object-oriented API to the project and summarised his work here.
- Ákos Hadnagy has worked on the formal verification of the WARP-V processor, an open source implementation of the RISC-V ISA implemented in TL-Verilog. His work can be followed here.
We thank all students and mentors for their great work. It is great to see so much interest in the FOSSi community, and the Google Summer of Code continues to be a great opportunity for us to support and grow the free and open-source silicon ecosystem. We are looking forward to Google Summer of Code 2019!
-Stefan Wallentowitz, Director, Free and Open Source Silicon (FOSSi) Foundation
Clean-Room OpenRISC GCC Port Rewrite Submitted Upstream
Developer Stafford Horne has announced the submission of a clean-room rewrite of the OpenRISC GNU Compiler Collection (GCC) port, following issues with copyright assignation for sections of the original port’s source code.
“OpenRISC has a mature GCC port started in early 2000s. The issue is it is not upstream due to one early contributor not having signed over his copyright,” Stafford explained in a blog post from February this year.
“To get around this I discussed options with the group and in the end I opted for a clean room rewrite,” Stafford continues in a message to the gcc-patches mailing list late last month. “The new code base has been written by me and more recently Richard Henderson. I trust that both of us have our FSF GCC copyrights in place.”
“I have forwarded your request to the GCC Steering Committee to formally accept the contribution,” David Edelsohn confirms in a follow-up post. “The port still requires a technical review and approval from a GCC Global Reviewer. You mentioned Richard Henderson as co-author. If Richard signs off on the port, approval could be relatively quick.”
The clean-room GCC rewrite can be found on Stafford’s GitHub repository.
DarkRISCV Unveiled as “RISC-V Implemented From Scratch in One Night!”
In what may be one of the most impressive demonstrations of the accessibility of modern free and open source silicon, developer Marcelo Samsoniuk has released what he claims is a functional RISC-V implementation created in just one night.
“Developed in a magic night of 19 Aug, 2018 between 2am and 8am, the DarkRISCV is a very experimental implementation of the opensource RISC-V instruction set,” Marcelo explains of the project. “Nowadays, after weeks of exciting sleepless nights of work (which explains the lots of typos you will [find] ahead), the DarkRISCV reached a very good quality result, in a way that the “hello world” compiled by the standard riscv-elf-gcc is working fine!
“The general concept is based in my other early RISC processors and composed by a simplified two stage pipeline where a instruction is fetch from a instruction memory in the first clock and then the instruction is decoded/executed in the second clock. The pipeline is overlapped without interlocks, in a way the DarkRISCV can reach the performance of one clock per instruction most of time (the exception is after a branch, where one clock is lost in the pipeline flush). As addition, the code is very compact, with around two hundred lines of obfuscated but beautiful Verilog code.”
Based on the RV32I instruction set and working up to 75MHz, DarkRISCV is available now from Marcelo’s GitHub repository under the BSD Licence.
GreenWaves Opens GAP8-Based GAPUINO Board Sales Ahead of ORConf Workshop
RISC-V pioneer GreenWaves, which developers the GAP8 application processor implementation with a view to Internet of Things (IoT) suitability, has officially opened sales for an Arduino-inspired development board based around the chip: the GAPUINO.
Featuring nine RISC-V cores — split into one controller core and an eight-core parallel compute cluster — and based on the Parallel Ultra-Low Processor (PULP) Platform, the GAPUINO is based on the popular Arduino Uno board layout, includes a camera connector, 256Mb of quad-SPI flash storage, 512Mbs flash and 64Mbs DRAM on a HyperBus, USB connectivity for JTAG and UART, and can be configured for 3.3V or 5V logic.
Optional accessory boards are also available: a sensor board, which adds four microphones, a VL53 time-of-flight sensor, infrared sensor, pressure sensor, light sensor, temperature and humidity sensor, and a six-axis accelerometer and gyroscope sensor; and a low-power QVGA-resolution image capture board with black and white sensor.
Pricing for the boards has been set at €100 for the GAPUINO alone or €199 for a bundle featuring the GAPUINO, sensor board, and image sensor add-ons, while the sensor board and image sensor are available separately for €80 and €40 respectively. The GAP8 processor is available as a bare engineering sample chip priced at €400 for ten. (All prices exclusive of VAT.)
More information, and links to purchase the boards, can be found on the official website, while attendees of ORConf 2018 can attend a hands-on workshop centred around the GAPUINO.
Matt Kimball Releases “Toy GPU” Core for Luke Valenty’s TinyFPGA BX
In a demonstration of just what’s possible on the next-generation TinyFPGA BX, the latest model in Luke Valenty’s TinyFPGA family of open hardware FPGA development boards, Matt Kimball has released a fully-functional graphics processing unit (GPU) core capable of rending 3D line primatives.
“I implemented a simple GPU on a TinyFPGA BX, which accepts a list of lines to draw over an SPI bus,” Matt explains in a forum post introducing the project. “The lines are transmitted as screen coordinates with begin and end points. It then renders those lines at 640x480@60Hz and displays them via a VGA connector.
“Since the TinyFPGA BX lacks enough RAM for a full framebuffer, each scanline is rasterized just prior to display and then discarded to make space for the following scanlines. At no time is a full rendered image in memory. I’m driving the GPU with a Raspberry Pi. This is my first FPGA and first Verilog project, so I probably did some silly things there, but I was proud of the result, so I thought I’d share it.”
A demonstration of the core in use, rending Suzanne the Blender Monkey, is available on YouTube, while the source is available under an unspecified licence on Matt’s GitHub repository.
SUMP2 with DeepSump to HyperRAM Ported to BML S7 Mini Development Board
Developer Kevin Hubbard has released a port of the SUMP2 logic analyser with DeepSump to HyperRAM support for the Black Mesa Labs Spartan 7-based S7 Mini FPGA development board.
“This is a full FPGA design. 200 MSPS of 32 channels,” Kevin writes of the port on Twitter. “DeepSump DRAM add-on has a sustainable bandwidth of around 10 MSPS, so usable for bursty time acquisitions at 200 MSPS, or for sampling lower speed signals (say SPI at 15 MHz) but maintaining 200 MSPS asynchronous sample resolution. Size of FIFO determines burst limits.
“Only about 10% of the LUT and Registers are used in a 7S25. Using 75% of BRAMs — but that was deliberate. Can use way fewer BRAMs and still be quite functional. The BRAM is maxed out using 8Kx64 for the RLE/Normal SUMP2 sampling and then also a 4Kx108 FIFO for DeepSump interface to HyperRAM. Scaling back to just 256x64 and 256x108 is quite usable for limited capturing scenarios when RLE works its magic.”
The port is available for download now on the Black Mesa Labs SUMP2 GitHub repository.
Open-Silicon Retro-uC Microcontroller Project Hits Crowd Supply
The Chips4Makers’ Retro-uC, an open silicon project designed to bring vintage compute cores including the Zilog Z80 and MOS 6502 to modern makers and tinkerers, has officially opened its crowdfunding campaign after being unveiled at ORConf 2017 last year.
“I am delighted to announce that the Retro-uC Crowd Supply campaign has now been launched,” Chips4Makers’ Staf Verhaegen says of the project. “It has taken a little longer to straighten out the last hurdles in production and delivery but now the campaign is waiting for you.
“Next to the hardware targets now also open silicon development support is included in some of the targets. This is to help to bootstrap the low-volume open silicon movement. This is the first step on the road to low-volume low-cost open silicon. I much appreciate any support or expertise you can provide in this endeavour.”
The Retro-uC board design borrows its layout from the Arduino Mega family, but features the ability to run processors cores including the Zilog Z80, MOS 6502, and Motorola M68K, known to vintage computing enthusiasts as the power behind the Sinclair ZX Spectrum/Timex 2048, Commodore VIC-20, and Commodore Amiga, among other well-regarded classic computers.
More information is available on the Crowd Supply campaign page, which runs through to late October with pledges ranging from chip-only to full-board layouts.
GreenWaves’ RISC-V-Based GAP8 Design Praised by EC CORDIS Study
A report from the European Commission’s Community Research and Development Information Service (CORDIS) has praised the “novel architecture” of GreenWaves’ RISC-V-based GAP8 processor for its potential to improve both energy and spectrum efficiency in future Internet of Things (IoT) wireless communication projects.
The High Efficiency Access Solution for the Internet of Things (HEASIT) study saw GreenWaves developing commercial technologies designed for low-power wide-area network (LPWAN) use, and was a key part of the development of the RISC-V and PULP Project based GAP8 processor and GreenOFDM frequency division algorithm.
“One of the project partners developed a fully programmable solution in the form of a multicore processor with a unique energy efficiency,” the report explains of GreenWaves’ creation. “The architecture built on two world-class open-source projects (RISC-V and PULP), which is a very novel approach in the semiconductor industry. At system level, they combined an emulation of GreenOFDM with the open-source protocol stack long-range wide-area network to successfully realise point-to-point radio communications.”
“The HEASIT innovation dramatically reduces the cost of deploying and operating rich sensors in the field,” adds project coordinator Loic Lietar, chief executive of GreenWaves. “Consequently, this enables a much larger number of those sensors and ultimately significantly enriches the spectrum of IoT use cases.”
More information on HEASIT is available from the CORDIS website.
Marek Materzok Releases Yosys/DigitalJS Verilog Visualisation Demo App
The University of Wrocław’s Marek Materzok has published a live demonstration web app for a Verilog visualisation system, based on the DigitalJS digital logic simulator.
“This is a demonstration page for the DigitalJS digital logic simulator and the yosys2digitaljs netlist format converter,” Marek writes. “This demo was made possible by the Yosys open-source hardware synthesis framework. It is a web app with a Node backend.”
Running in the user’s browser the software aims to visualise and simulate any System Verilog code pasted or loaded, and comes with examples including SR latch, D latch, full, serial, and accumulating adders, a linear-feedback shift register, ROM, and RAM which can be selected from a drop-down dialogue. Actual synthesis and simulation takes a few seconds for each example, and is fully interactive.
The demonstration app is available live on the official webpage, while its source code can be found on the GitHub repository under an unspecified licence.
Dan Gisselquist Explains How to Build an SPI Flash Controller Core
Dan Gisselquist has published a piece on building an SPI flash controller for an FPGA, as part of the ongoing ZipCPU project to create a formally-verified open silicon processor.
“Perhaps you may remember that I’ve been working to port the ZipCPU to an iCE40 HX8k platform: the ICO board,” Dan writes by way of introduction. “I like to boast that the ZipCPU was designed for low logic applications, and the iCE40 is certainly a low logic chip. While the ZipCPU isn’t the smallest processor out there, there are some forth processors that are much smaller, it does fit nicely with room to spare on the iCE40 8k.
“However, if you want a design that starts immediately upon power up, or if you want more memory than is available in 8kB of block RAM or (in this case) even in 128kB of SRAM, then you need access to the flash memory. I also had another reason for this project as well: I wanted to learn about System Verilog sequences, and whether or not they could be used to formally verify a flash controller. Yes, I had access to the full commercial (Verific enabled) version of yosys to do this. But I wanted to see how useful this full version would be when it came to designing a new/better flash controller.”
Dan’s write-up walks through his history of flash controller development, a look at how SPI bus works, configuration port implementation, a look at the Verilog code, and formal verification, ending with a functional and proven read-write capable flash controller.
The full write-up is available on the ZipCPU Gisselquist Technologies website.
RISC-V Foundation Issues Update on Software Toolchain Status
Jim Wilson, of RISC-V Foundation member SiFive, has issued an update on the status of the RISC-V software toolchain ecosystem — and progress is most definitely being made.
“Over the past few years the RISC-V ecosystem has grown tremendously. The RISC-V Foundation now has more than 100 member organisations and we’ve seen a number of innovative RISC-V solutions hit the market,” Jim writes. “Meanwhile, the community has been hard at work contributing to the development of the RISC-V software toolchain to make it even easier to use the free and open instruction set architecture (ISA).
“As part of this development, companies and individuals from around the world have been working to bring RISC-V ports upstream so the ports can be more easily maintained. Initially, updating RISC-V toolchain ports was done on copies of the official source trees before the updates were ready to be submitted upstream. Now, most of the ports have been submitted to the upstream trees so RISC-V development work is primarily happening in the upstream trees where developers are tracking release branches and backporting bug fix patches onto them.”
Of the projects mentioned in Jim’s post, the statuses are: GCC, binutils, and newlib have been fully upstreamed; QEMU has been upstreamed though with a patch backlog; and GDB, glibc, and the Linux kernel are all partly upstreamed.
Jim’s full post is available on the RISC-V Foundation blog, while RISC-V Foundation member AntMicro will be offering a further update during ORConf 2018.
FOSSi News In Brief
- FuseSoC Receives Picosoc Support, Nextpnr Support for iCE40
- Registration Now Open for VSDOpen Conference 2018
- Chisel Community Conference 2018 Opens Call for Contributions
- Semiconductor Engineering on “Bugs That Kill”
- RISC-V Foundation Launches “Last Week in RISC-V” Newsletter
- Pulse Density Modulation Example Added to iCEBreaker Repository
- InnovateFPGA Unveils Bus Spider RISC-V-Based Multitool
- FμPy FPGA MicroPython Language Adds Arty A7 Support
- JAEB on “Using FPGAs for Audio Processing”
- Build a (Simple) CPU In-Browser with The NAND Game
- Zephyr Project Adds RISC-V Support, New Members
- SiFive Launches SoC with Nvidia’s NVDLA AI Tech On-Board
- CNXSoft on LicheeTang’s Anlogic EG4S20 RISC-V Focused FPGA
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516892.84/warc/CC-MAIN-20181023174507-20181023200007-00160.warc.gz
|
CC-MAIN-2018-43
| 17,659 | 83 |
https://www.fr.freelancer.com/projects/programming/looking-for-somebody-who-has/
|
code
|
Looking for somebody who has good knowledge about Workday Integration.
4 freelance font une offre moyenne de $121 pour ce travail
Hi I am Aqib, i am a professional Programmer, with expertise in C and C++. i am certified Programmer. i have completed 200+ home based project in C language with 100% client satisfaction.I have working experience Plus
Hi, I have 7 Years of experience in [login to view URL] can check my detail [login to view URL] free to contact me to further discuss on the project. Thanks, Amruta C. Relevant Skills and Experience PeopleSoft. Proposed Miles Plus
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592420.72/warc/CC-MAIN-20180721071046-20180721091046-00032.warc.gz
|
CC-MAIN-2018-30
| 578 | 4 |
http://ixyscolorado.com/index.php/technical-library/dei-scientific-instruments/dei-faq/item/how-much-current-will-the-pco-6131-draw-from-a-24-v-supply
|
code
|
How much current will the PCO-6131 draw from a 24 V supply?
The idle power consumption (power consumed when the driver is enabled but not pulsing) varies non-linearly with output current. An approximate value can be calculated with the formula:
PIDLE = I2 x 0.005
where I is the output current set point.
When pulsing, the switching losses (PSW) are about 30 W. Therefore, the 24 VDC power requirements can be approximated by:
P = PSW + DC [(IOUT x VOUT) + (IOUT2 x 0.015)] + (1-DC) PIDLE
where VOUT is the diode forward voltage and DC is the duty cycle.
For example, at 80 A output current, 10 V diode voltage and 30% duty cycle, the power consumption is:
P = 30 + 0.3 [(80 x 10) + (802 x 0.015)] + (1-0.3) [802 x 0.005] = 322W. The +24 VDC support power should be sized to provide that amount of average power.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690035.53/warc/CC-MAIN-20170924152911-20170924172911-00372.warc.gz
|
CC-MAIN-2017-39
| 812 | 9 |
http://linqtoxsd.codeplex.com/discussions/69513
|
code
|
Sep 29, 2009 at 4:24 PM
Edited Sep 29, 2009 at 4:26 PM
Further to this I had lots of issues with repeated element types in namespaces.
It seems that LinqToXSD loads all XSD namespaces into the XmlSchemaSet, regardless of whether these have been already added by an <xsd:import /> or added as part of the compile.
In build 17994, code file XObjectsGenerator.cs at line 53 there is:
I would suggest changing to:
XmlSchema xsd = XmlSchema.Read(CreateReader(arg), ValidationCallback);
// only add schema if not already included
The schema set for my application is very complex an d a lot of schemas are inter-dependent, so LinqToXsd created a code file over 200,000 lines long (it was interesting trying to open that one up I can tell you).
I am going to modify the source code for my own purposes but I think I've also found a bug where it misses some element types out completely resulting in more errors.. will advise
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120878.96/warc/CC-MAIN-20170423031200-00426-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 917 | 10 |
https://www.toogit.com/freelance-jobs/development-of-a-reactjs-redux-scala-app-for-chefs
|
code
|
I am looking to develop a small website in React JS to list some categories and their products. Below are feature that I am looking:
1. List categories
2. List subcategoriesread more
I am looking for react and redux developer for existing project. I will be doing apis part. Please make sure you have experience in react and redux.
Answers these questions:
I want a developer who can help me on amcharst and fusioncharts with react.
Graph and charts already created i need small changes on them as per my requirements.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998600.48/warc/CC-MAIN-20190618003227-20190618025227-00092.warc.gz
|
CC-MAIN-2019-26
| 518 | 7 |
https://news.unist.ac.kr/unist-professor-honored-with-most-influential-pldi-paper-award/
|
code
|
Woongki Baek, Professor in the Department of Computer Science and Engineering at UNIST has been selected as a recipient of Most Influential PLDI Paper Award at the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2020), which took place in London, UK, Wednesday, 17 June through Friday, 19 June 2020.
The award was presented in recognition of Professor Baek’s research paper, entitled “Green: A Framework for Supporting Energy-Conscious Programming using Controlled Approximation,” which was published in PLDI 2010. The award-winning paper by Professor Woongki Baek deals with the development of programming framework in support of approximate computing. Meanwhile, the PLDI (ACM SIGPLAN Conference on Programming Language Design and Implementation) is the top conference in the field of programming languages and compilers.
“In general, computers are thought to carry out calculations and information processing with 100% accuracy. However, in various computing fields, such as image processing, machine learning, and web search, there is a high probability of obtaining the desired result even if there is loss-of-accuracy issue,” says Professor Baek. “Approximate computing technique can be applied to these fields to achieve a desired result, while reducing the cost and energy consumption required to process massive data sets.”
Most Influential PLDI Paper Award is presented annually to the author(s) of a paper presented at the PLDI held 10 years prior to the award year. These papers are, then, judged by their influence over the past decade. The selection committee for the Most Influential PLDI Paper Award cited the paper as follows.
“The PLDI paper “Green: A Framework for Supporting Energy-Conscious Programming using Controlled Approximation” by Woongki Baek and Trishul Chilimbi demonstrated conclusively two important things: (1) that frameworks supporting approximations that trade energy/performance costs for quality of service could be generalized and automated, and (2) applying this approach in data center search workloads could result in significant energy reduction and cost, saving millions of dollars in practice. Green proved that systematic approaches to approximate computing could have enormous commercial impact and predated and informed many subsequent machine learning optimizations, such as using reduced precision arithmetic in deep learning models. Green also inspired subsequent efforts, to more deeply encode approximation semantics into the underlying programming language design.”
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816070.70/warc/CC-MAIN-20240412194614-20240412224614-00660.warc.gz
|
CC-MAIN-2024-18
| 2,578 | 5 |
https://laptopvslaptop.com/for/game/the-white-laboratory
|
code
|
The White Laboratory is a sandbox style physics-based tower defense and RTS game in which you modularly build and command robotic structures. It's an indie strategy game made by Laboratory Systems and Gamera Game in 2019. Use them to defend against or conquer other disobedient mechanical blocks on a facility floating in the atmosphere of a remote gas planet.
Updated on September 23, 2021.
The system requirements are lightweight; almost any new laptops will work for playing TWL.
The RAM requirement of 4gb is easily met, though 3gb is enough to meet the minimum requirements.
Also, note that at least 2gb of hard drive space is required.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057427.71/warc/CC-MAIN-20210923165408-20210923195408-00719.warc.gz
|
CC-MAIN-2021-39
| 641 | 5 |
https://community.filemaker.com/thread/143786
|
code
|
I strongly recommend that you remove permissions for fileMaker clients to be able to write to the folder that contains the database files being hosted by server. Only the server needes write permission to this folder.
Here is one possible issue you can investigate:
For More Information see: Can't login to FMS database on new Mac, other Macs can
This is one of many acknowledged bugs that can be found in the Known Bug List thread here in the Report an Issue section of the forum.
It can also be downloaded as a database file from: https://www.dropbox.com/s/jt09b82i0xijbu3/FMP%20Bugs.zip
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106984.52/warc/CC-MAIN-20170820185216-20170820205216-00529.warc.gz
|
CC-MAIN-2017-34
| 589 | 5 |
http://forums.adobe.com/message/4346285
|
code
|
i have a bit of a task asked to be done!i have never came across and issue like this one,so id like your help please.
i have been asked to make a brochure with 3 different languages,so i set up conditional text and made up 3 conditions in the contitions panel
each language has a spot colour applied to it,in order to be separated when posted scripted and distilled.but when the post script is distilled
i can olny see one language.is there a way all languages can appear on a colour seperation with out one language overlapping the other
I don't think you've approached this correctly. First, I don't use conditional text on a regular basis, but my understanding is the color you assign to the condition has nothing to do with the color assigned to the text. It's just a reference color, like a layer color, to make it easy for you to keep things sorted when you look at the page. To separate the text onto individual plates you'll need to assign a spot color to the text itself under Character Color in the style definition (and you'll need a set of styles for each language).
Second, I think you are trying to output all the different plates in one go. Unless you have overlapping frames, your conditional text is not going to overlap one language with another. The normal usage for conditional text is to put it into the same running text and show or hide, causing the text to reflow. In order for all the languages to separate at once, they all need to be visible at the same time, and if they are all in the same frame they can't overlap. If you need overlapping frames, it might be easier to use layers. A further complicatioin is that if all if the text is overlapping, all of it needs to be set to overprint, not just the Black plate that overprints by default.
Ultimately this probably comes down to you need to output once for each language. You can hide your conditions for the languages not needed and output just the set of text plates for each language one at a time, or personally, I'd probably forget the conditional text and probably the spot colors, and either make separate files for each language (which I think is what Joel would recommend and he's the translation expert) or use layers and show or hide the language layers as needed. I've seen files where the text was set in a spot black so it wasn't on the same plates as the graphical elements, but the value of this would depend, I think, on the printing workflow and only be of use if the text was not being laid down at the same time as the color, and again, you 'd have to set the spot color text to overprint.
Eugene Tyson wrote:
Have you tried a direct export to PDF using File>Export>PDF (print)
In this case it appears that he's trying to make the separations himself (at least that's the way I nterpreted it) directly from ID, and you can't do that when you export.
@ Peter ..I sill have the question how one can select spot color while creating the condition for the conditional text?
As if I know we have to define the custom color which would not be a spot color , hence seperation want work in this case.
If I understand your question, you can't assign a spot color to the text by adding a condition, you have to do that as a separate task -- text color and condition are not related. However, if the conditions will be mutually exclusive and not all visible at the time of output, there is no requirement that each language have a unique color because you are manually separating them onto different plates by hiding the ones you don't want.
yes i am trying to make the seperation myself,so i think ill go with putting each language on a seperate layer,saving as pos script one laungaue at a time.
and then dargging each post script file into distiller.and see what happens.
Exactly...I tried to replicate the issue but was not able to apply the spot color on the text and even was not able to select the spot color for teh condition , but the OP said that the spot color is used in the condition and based on that the seperation is done.....at that time I got confused as I believe we can only choosed RGB color for Conditions not the spot color of our wish and specially Pantone.
As you said it is for the representation purpose only like in layer color, I had the same understanding but I thought better get my fact clear before posting anything.
I think I may be responsible for some confusion here. Looks like I misread the original message a little. It doesn't say he applied the spot color as part of the condition or applied the spot color to the condition (that's waht happens when I start reading complicated posts as soon as I wake up), and if you look closer than I did at the screen shots you'll see the condition colors don't match the spot colors assigned to the languages.
My apologies for that.
Doesn't change the strategy, however.
as im trying to work around this problem.another method im experiment with isi got rid of the conditional text and simply having each language in its own text frame
so im putting each language one on top of each other,and each language has its own spot colour.ofcourse since each language overlaps one another its a mess.
so when i do the postscript file and then distil it,this is the result im getting,the top text frame is readable and the other 2 have been overlapped looking like a mess.
so is there a way in indesign i can use some command to ge tthe desired result?
spansish is on top,then german then english. so spansh prevails in the distilled file.
this is something which would happen....because when you are creating the Postcript that means you will be creating the file for print and while printing the color overlapping doesn't happen..
create 3 different layer , and DRAG the "spanish" and "english" in the layer to the new layer you will create.
When making the PDF or postscript , show the layers for the language which you want and hide the other, and then create PDF or postscript.
hello manish,thats what i thought,to make 3 seperate layers and exporting as a seperate language to postcript meaning i will have 3 psds in total.upto here good.
so once i have doen this,i have seen that i can make a native pdf file using adobe acrobat file,and i see an option
combine files into pdf,so i have draged and droped them,so im getting each language seperate with its spot colour,the only bad thng is it doesnt name each file like it was from the disttiled file:cyan magenda yellow black and then each page with its spot colour value,rather than just page 1 2 3 4 5 and so on,so is there a way maybe for acrobat to keep the naming of its pages?would it matter to the printer?or should he be able to view the spot colours on each page?
Perhaps I wasn't clear enough in my original response. To do the layer method you must TURN OFF ALL BUT ONE LANGUAGE (hide the layers) and make separate PDFs of the language plates,
OR you must set EVERY language frame to overprint to get separations where the languages higher in the stack have not knocked out the text on lower layers (or knocked out any background they might overlap).
I think it's easier to leave all langiuages set in [Black], which should overprint by default, and hide layers.
No matter what method you choose, if all language layers are visible at the same time it will be difficult to work, and a composite PDF will be a mess.
The way i finaly over came this issue,was to simply add overprint to each text frame,since each text frame had a spot colour assigned to it.i finaly exported it as postscript distilled it
and each colour pallet has its own seperation and the text is INTACT!
"set EVERY language frame to overprint to get separations where the languages higher in the stack have not knocked out the text on lower layers (or knocked out any background they might overlap"
just for the inofromation,this method in general postscripting and distilling is it for graphic designers to do so?,or is it for the pre press departments job to do all these seperations etc etc?
In general, it is the responsibility of the pre-press department at the printer to make separations and impose the file for printing. It is the designer's responsibility, however, to provide a document that will separate correctly.
just one more detail i need to point out,my pdf document i have distilled,all my images and text appear in black and white
so is that the way the colour seperations are supposed to appaer?
When you make separations you are creating a grayscale image of what will print in each ink color. This represents either exposed or unexposed areas on the plates. The darker the gray, the darker the color.
For a good understanding of what you are seeing, go to Window > Output > Separations Preview... and turn ON the separatations preview, then turn off the visibility of all but one plate at a time.
Have you talked to the printer to determine that they really want you to be making separations? That would be a very unusual request.
good evening peter.
that was awesome that seperation preview command.Since this is a classroom exercise there is no printer.just for us students to be aware of
pantone seperations within an idesign file,and also how to use postscript and distiller.
I guess I would have to say it's a valuable lesson to learn about how separations work. I used to take the film and plates for a four-color job into my classroom, along with the finished print, but the probabilty that you will need to actually make your own separations (using the separtions preview is very common, though), or need to print to postscript and distill, are both pretty slim in this century unless you work in pre-press.
I used to have to make seps from my Windows files for the printer who only had Macs, but I haven't done that in more than ten years, and not at all since printers started accepting PDF.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537804.4/warc/CC-MAIN-20140416005217-00430-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 9,820 | 50 |
https://shop.elsevier.com/books/hyperbolic-partial-differential-equations/witten/978-0-08-030254-6
|
code
|
Hyperbolic Partial Differential Equations, Volume 1: Population, Reactors, Tides and Waves: Theory and Applications covers three general areas of hyperbolic partial differential equation applications. These areas include problems related to the McKendrick/Von Foerster population equations, other hyperbolic form equations, and the numerical solution. This text is composed of 15 chapters and begins with surveys of age specific population interactions, populations models of diffusion, nonlinear age dependent population growth with harvesting, local and global stability for the nonlinear renewal equation in the Von Foerster model, and nonlinear age-dependent population dynamics. The next chapters deal with various applications of hyperbolic partial differential equations to such areas as age-structured fish populations, density dependent growth in a cell colony, boll-weevil-cotton crop modeling, age dependent predation and cannibalism, parasite populations, growth of microorganisms, and stochastic perturbations in the Von Foerster model. These topics are followed by discussions of bifurcation of time periodic solutions of the McKendrick equation; the periodic solution of nonlinear hyperbolic problems; and semigroup theory as applied to nonlinear age dependent population dynamics. Other chapters explore the stability of biochemical reaction tanks, an ADI model for the Laplace tidal equations, the Carleman equation, the nonequilibrium behavior of solids that transport heat by second sound, and the nonlinear hyperbolic partial differential equations and dynamic programming. The final chapters highlight two explicitly numerical applications: a predictor-convex corrector method and the Galerkin approximation in hyperbolic partial differential equations. This book will prove useful to practicing engineers, population researchers, physicists, and mathematicians.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00528.warc.gz
|
CC-MAIN-2024-10
| 1,883 | 1 |
https://wazeopedia.waze.com/wiki/Bahrain/Main_Page
|
code
|
These are the official Editing Guidelines for the Kingdom of Bahrain.
Official Bahrain Slack Waze Group: http://bit.ly/WazeGCCSlackInvite (Please join us on GCC Slack (and join the channel #r10-Bahrain)
Waze Map Editing for Bahrain
- The main language for naming in Bahrain is English.
- Road Naming:
- Road names must be properly capitalized. (al fateh highway -> Al Fateh Highway)
- Please analyze few sources of data and don't depend from one only:
- Note the difference between 'Avenue' and 'Road'. An Avenue is larger than a Road. An Avenue can be a 'Primary Street' but a Road can't.
- Road Direction
- If the opposite lanes of a road are separated by a sidewalk, we draw the road as two opposite one-directional roads. If there is no sidewalk in the middle we draw the road as a single bi-directional line.
- Road Type
- Please don't use Off-road / Not maintained types of road in Bahrain, instead of this use type of road street (unpaved).
If you have suggestions to enhance the guide, feel free to comment below.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655883439.15/warc/CC-MAIN-20200703215640-20200704005640-00570.warc.gz
|
CC-MAIN-2020-29
| 1,021 | 13 |
https://github.com/eidam
|
code
|
Prevent this user from interacting with your repositories and sending you notifications.
Learn more about blocking users.
You must be logged in to block users.
Contact GitHub support about this user’s behavior.
Learn more about reporting abuse.
Monitor your websites, showcase status including daily history, and get Slack/Telegram/Discord notification whenever your website status changes. Using Cloudflare Workers, CRON Triggers, and KV sto…
A Cloudflare Worker using KV and CRON trigger for checking and sending Audit Logs to Slack. 🚀
Get notified on Slack when a new version of your favorite repositories is released. Using Cloudflare Workers, CRON Triggers, and KV storage.
⛅️ Cloudflare Workers catalog, deployed to Cloudflare Pages.
Seeing something unexpected? Take a look at the
GitHub profile guide.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151972.40/warc/CC-MAIN-20210726000859-20210726030859-00627.warc.gz
|
CC-MAIN-2021-31
| 820 | 11 |
https://apps.shopify.com/link-whisper/reviews
|
code
|
Hammy's Healing Hut
This app is awesome. It's easy to use, and makes something that's usually difficult very easy, which is exactly what we all want!
Glad you love Link Whisper! Thanks for sharing :)
Adorable Stuffed Animals
This is one of my favorite apps! The main reason I like it is because I think it's fun to use, and I feel like I can just keep going and going. Also, it's not expensive. Many apps are gratuitously expensive. This one isn't. It also provides you with a lot of interesting information, such as how many times people have clicked on a particular link. How are my numbers so low!?
Glad you love using Link Whisper and that you find it fun to use! Thanks again!
5D with Timothy
I need help. After successfully using the app for a week, I suddenly get a message that I do not have any right to use it. How do I contact support?
We have occasionally seen this kind of problem happen due to browser settings. Usually it's because the browser is blocking cookies or something similar. We should be able to solve it, but we'll need you to create a support ticket so we can discuss the problem.
Would you please open a support ticket here: https://linkwhisper.freshdesk.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301263.50/warc/CC-MAIN-20220119033421-20220119063421-00717.warc.gz
|
CC-MAIN-2022-05
| 1,188 | 10 |
http://www.cplusplus.com/forum/lounge/86326/
|
code
|
So I recently changed my home WiFi encryption scheme to WPA2 and now at least once a day (maybe more, haven't tested it much yet) it causes me and other people to have to re-enter the password. This is kind of annoying, and didn't happen with WEP ever. Only other thing I changed on my router is I turned off UPnP, but that shouldn't affect anything. Any suggestions?
Yea I hadn't really thought of changing/caring about it. I live in a rural area where someone would have to be standing in my yard to even see my wifi.
After some research I found it was only happening on iPhone and I guess current OS on the iPhone just has some WPA2 issues (since when did Apple not screw up wifi) so I might downgrade to WPA and see what happens.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886124662.41/warc/CC-MAIN-20170823225412-20170824005412-00000.warc.gz
|
CC-MAIN-2017-34
| 733 | 3 |
https://ubuntuforums.org/showthread.php?t=2067403&s=4a62b09f47a0790f709908865341300a&p=12281445
|
code
|
i am receiving this error
W: GPG error: http://gb.archive.ubuntu.com precise Release: The following signatures were invalid: BADSIG 40976EAF437D05B5 Ubuntu Archive Automatic Signing Key <[email protected]>
and i wonder if this is something that is 'correct'
i wonder if the repo is not being has not being compromised.
i tried solving this by:
but it does not solve the problem - so are these packages signed by someone other then Ubuntu?
gpg --recv-keys 40976EAF437D05B5
gpg --export --armor 40976EAF437D05B5 | sudo apt-key add -
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171251.27/warc/CC-MAIN-20170219104611-00425-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 530 | 8 |
http://www.fossology.org/issues/2943
|
code
|
Add unit tests for fo_cli
|Assignee:||Mary Laser||% Done:||
Updated by Alex Norton 9 months ago
- Assignee changed from Alex Norton to Mary Laser
I doubt that unit tests would be of benefit for fo_cli. This is such a simple program that the functional tests should be sufficient. I'm not going to set this to resolved though as someone else should confirm that this is correct.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699798457/warc/CC-MAIN-20130516102318-00065-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 377 | 5 |
https://www.fi.freelancer.com/job-search/copy-past-data-excel/
|
code
|
Hei, Olen tuore asfalttialan yrittäjä (yrityksessä neljä henkilöä) ja tarvitsen seuraavia palveluita: myyntilaskujen luominen työkirjanpidosta (kilometrien laskeminen, eri työkohteiden erittely ja eri työtyyppien erittely). Osaat käyttää sujuvasti exceliä ja muita perustoimisto-ohjelmistoja. Laskut kootaan viikon loppupuolella, kun ...
Excel Add-In that retrieves and uploads table-data from and to Azure SQL database . Add-In also modifies the Excel sheets and controls user interaction. For mosts of the sheet mofdification there is available VBA script that need to be traslated to C#-code. Initial Visual Studio 2015 Project code is available and the Project needs to be done using
Excel Add-In that retrieves and uploads table-data from and to Azure SQL database . Add-In also modifies andthe Excel sheets and controls user interaction. For mosts of the sheet mofdification there is available VBA script that need to be traslated to C#-code. Initial Visual Studio 2015 Project code is avaiable and the Project needs to be done using
...do this AND account for all of the tasks on the first sheet. I also need a macro written that runs when the document is saved to copy everything from the 'Milestone Data - Formulae' tab into a the third sheet, but only copy and paste the values, not formula. I have another piece of software that reads from this sheet and it can't read cells with formulae
You need to type in 2 or 3 pages of data into MS Excel every day. Not a single error is allowed. Almost all of the data are numbers. You don't need to know excel very well. Just type in. I will do other things.
Lighthearted articles relating to musician culture. Ideal freelancer would have experience writing content relating to music in some form. No need for experience in any specific genre. We're selling a product on the website. I'm an active musician as well.
We are an IT company and looking forward to someone with experience in this domain to generate warm leads for us. We have ...experience in this domain to generate warm leads for us. We have a wide range of services and solutions. Ideal candidate will be someone who has done similar work for IT company in past. International experience is an advantage.
Hi Lesia D. If you remember I placed an contest to create an 3D model of a...freelancer who bit cheeted me and I lost 100EUR. But I need this 3D model to be able to provide it to an sculpturer to create an 3D model out of granit for the grave of my past wife. could you help me here? What amount would you request for payment? Thanks a lot Dragan
We require a formula that can break down the total hours worked in a day into a penalty rate structure as below: Shift Worked Monday to Friday: First 7.6 hours - normal time 7.6 to 9.6 hours - Time and a Half Greater than 9.6 - Double Time Shift worked Saturday: First 2 hours - Time and a half Greater than 2 hours - Double Time Hours worked on Sunday: Entire Shift double Time
place into the attached excel sheet, the names and dates of each youtube video for the following subscriptions. Each subscription has its own excel sheet Credit Suite Max Maxwell 100 Percent Financed Alex Joungblood Better Than Success Rodney Samuels Philly Wholesale Real Estate reiclub William Bronchick Brian Iregbu Thanks
Hello please if you are not did project similar to this please don't bid and make sure you read it carefully and show me you similar project you did. ...to it with the info from google like times, description, etc and more links like wikipedia and social media links. Is this possible for you guys to do? If so do you have any past work doing similar?
Hi Andre, You have helped me in past to create my company Wikipedia page - iSticker. Now the company name is changed to Archchat and profile is also changed. Can you help me to update the new name and profile on my Wikipedia page? If yes, Please give your quote and requirements. Chetan Singh
Hi Andre, I am Chetan Singh. You have done work for me in past by helping me setup Wikipedia page for my company iSticker. Now I have changed the name of iSticker to Arch.Chat. The new name registration documents and logo are available. Can you help me with change of name and logo incorporation in our iSticker Wikipedia page? Since then the profile
Company is looking for an experienced data entry specialist to transfer sales invoices, customer records, and marketing data into our main database. We are anticipating that this will be a 6-8 week part-time project with hours ranging from 10-25 hours per week. We are looking to pay a flat hourly rate for these services. Weekly Services and Deliverables:
In Excel for YIELD function two formulas are there. 1. Maturity Less than one Year 2. Greater than one year. I need conversion for [kirjaudu nähdäksesi URL:n] Less than one year only. Please check and revert. PLSQL function should return exact value of Excel YIELD function. Thanks.
Develop a dynamic and informative website with yacht booking portal, for both website and mobile application. Admin will be able to list y...create an account and book yachts and make payment through website. Freelancers who have developed yacht charter and booking website before are preferred. Please send me your past yacht booking website portfolio.
I need to have the excel based application for following need:- The purpose of the application is to scan and track barcoded inventory. The application will run on 3 computers, (all connected to same internet connection), so the data should be updated real time between the 3 computers. What I need the application to do:- Each of our products have
I need someone to start immediately, and develop a macro to convert the input to output as shown in the sheet here: [kirjaudu nähdäksesi URL:n] What I need is all the permutation/combination of the values for the specific title and option as shown in the sheet above. Budget: $15 AUD Deadline: Within 3-5 hours.
This is an ongoing work. I will create monthly milestone payment. Please quote your monthly SEO service. Need an SEO...- Each week you must provide me with at least 2 blog articles relevant to my products (fashion/beauty) - Each week you must send me a report of activities you've done in the past week and my Before VS After website ranking information
We are a new company looking for an intro video for our social media. We want something that represents us and the outdoors and hunting. You must have past work to show us, and must be patient and understanding as we are not even completely sure what we want. We can show you samples of other companies we are similar too. But our video must be unique
We are looking for a Part-Time Office VA to work on Excel spreedsheets. Primary Responsibilities: Input information into Spreadsheets Perform other virtual tasks as needed Qualifications: Proficient in Microsoft Office, MS word, *Execellent in MS excel, MS Outlook computer applications. Must be able to work 1-2 hours a day.
Looking for asp.net core and angular 7/8 experts for an existing admin dashboard project. API is asp.net core 2.2 and frontend is angular 7. You MUST have links for past projects. Existing repo is stored in TFS. You must know how to use GIT. Requirements : [kirjaudu nähdäksesi URL:n]
I have the model which is jupyter notebook python. This model gets the excel speed data and forecasts it. I just need someone help to get the output as excel. The forecasted speed in output will be for the next year
I need an android studio Kotlin function to handle Reading and Writing to an Online Excel spreadsheet. Read: Read data from a specific sheet inside an online excel document. Write: Write data to the next available row in a different sheet of the same online excel document. Android Studio - Written in Kotlin
I have an outlook file that needs to be de-duplicated and imported into a specific excel format for a new CRM database. 2300 contacts in the outlook file.
We are looking for a data entry professional to assist us with compiling some data available in select websites and mobile apps into an excel sheet. Individuals with good track record please submit resume
need to have renko charts put in an excel format, and using parabolic sar indicator (it would require historical data calculation), to show buy and sell signals, and it being connected to thinkorswim for real time automated trading
...feed it in a pivot table. So it has to be kinda SQL-compatible. i need a macro that would reorganize the data. here attached is the file : "[kirjaudu nähdäksesi URL:n]" it's the report file from our POS. as you can see, it's a piece of nonsense. different data appears on the same column, lots a merged cells, footers and headers everywhere... it'...
We are searching for an experienced programmer to work on multiple tasks in web development. Being a freelance marketplace platform, Insolvo ([kirjaudu nähdäksesi URL:n]) is ...remodel the current sections of our Insolvo website as a start of a major redesign initiative. We are looking for an experienced web developer who is ready to showcase their past projects.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998943.53/warc/CC-MAIN-20190619083757-20190619105757-00374.warc.gz
|
CC-MAIN-2019-26
| 9,101 | 29 |
https://github.com/KenKundert/flicker-noise
|
code
|
Flicker Noise Formulations in Compact Models
|Author:||Geoffrey Coram, Colin McAndrew, Kiran Gullapalli and Ken Kundert|
Includes a resistor model that demonstrates how to properly model flicker noise in Verilog-A as described in Flicker Noise Formulations in Compact Models, to be published in Transactions on Computer-Aided Design of Integrated Circuits and Systems some time in 2020.
Also included are two circuits. The first is a simple test circuit for the resistor model. The second is a circuit that tests the implementation of flicker noise in the built-in BSIM4 model.
If you have a recent version of Spectre, you can simulate the circuits directly and view the results in your favorite waveform viewer.
If you have Python 3.6 or later, you can also run the simulation scripts, which re-generate the netlists, run the simulation (in Spectre), and plot the results.
To install the script dependencies, from the directory that contains setup.py, run:
pip3 install --user .
This installs all dependencies into ~/.local/lib. Then simply run:
These run a simulation and plot the results. You have the -v option and the logfile (.runPnoise.log or .runBSIM.log) to help you out if you run into any problems.
You can also run a simulation of the broken resistor model:
You can view the signal and waveforms with:
> list-psf -f pnoise.raw/pnoise.pnoise -l > plot-psf out
My rather old version of Spectre (15.1.0) generated the following results:
The above shows the flicker noise produced by Spectre's built-in resistor (RESref) and the proposed Verilog-A model (RESva). In this case the flicker noise of the built-in resistor model was implemented correctly and both agree.
The above shows the flicker noise produced by Spectre's built-in resistor (RESref) and the traditional Verilog-A model (RESva). In this case the flicker noise of the Verilog-A model is incorrect and the two models disagree.
The above shows two different flicker noise models implemented in the built-in BSIM4 model in Spectre. fnoimod=1 was implemented correctly while fnoimod=0 was not.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143373.18/warc/CC-MAIN-20200217205657-20200217235657-00370.warc.gz
|
CC-MAIN-2020-10
| 2,062 | 17 |
http://darraxusthewarrior.blogspot.com/2012/04/day-08-10-things-we-dont-know-about-you.html?showComment=1333650139043
|
code
|
So...this should be an interesting one.....there are several things I could put in here I suppose. Alrighty then.
1) I was once briefly homeless as a child
2) I used to be a Police Officer
3) I can be incredibly impatient. It is something that I am working on.
4) I love potatoes.....just not mashed potatoes. Something about the texture really bothers me.
5)I have sisters who are twins (not twins with me thank god).
6) I am not a fan of religion and politics. They always seem to bring around the worst in people. I follow neither.
7) I have quite a collection of pen and paper roleplaying game books that I cannot play with anybody. I still refuse to get rid of them.
8) I am a sports buff. I follow Football, Basketball, Baseball, Hockey, Boxing, and MMA. I hate soccer.
9)I am a pretty good artist despite the fact that I have not drawn much over the years. As a kid, it was one of my favorite things to do.
10) I prefer cartoons to other television. I find cartoons for the most part to be much more creative and much less annoying. I will take Adventure Time, Regular Show, and Spongebob over reality TV anytime.
Anyways, those are my things about me. Back to your regularly scheduled program.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864546.30/warc/CC-MAIN-20180622143142-20180622163142-00375.warc.gz
|
CC-MAIN-2018-26
| 1,201 | 12 |
https://german.tolearnfree.com/cgi2/faq/voir.php?id=263
|
code
|
To be able to speak with your penpal (audio, video), please open a private chat room here.
You can also use a TEXT chat room (only) if you don't want to activate the audio/video features.
--- HOW TO ACTIVATE THE AUDIO / VIDEO FEATURES:
Click on START BROADCASTING.
A popup asks you to authorize the use of your mike and your camera.
Click on MICROPHONE ONLY if you would like to use the audio feature (only) or on your camera
Next window: "now select your microphone".
Option 1) PUSH-TO-TALK = when you click on the button TALK, your penpal can hear your voice. If you don't use this button, no audio is sent.
Option 2) OPEN MICROPHONE = you are not required to use the button. Your penpal can hear your at any time.
Example with 3 penpals:
Be careful when you use chat rooms.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00532.warc.gz
|
CC-MAIN-2023-50
| 776 | 11 |
https://docs.oracle.com/en/middleware/webcenter/sites/12.2.1.4/wcseb/XML/REMOVECOUNTER.html
|
code
|
Deletes a counter.
- Name of the counter to remove.
REMOVECOUNTERtag deletes a counter. After a counter is removed it is undefined and its value cannot be referenced.
There are no possible
errnofor this tag.
This example first sets a counter, uses it, then removes it.
SETCOUNTERNAME="fred" VALUE="100"/> <
INCCOUNTERNAME="fred" VALUE="200"/> Fred is <
CSVARNAME="Counters.fred"/> <REMOVECOUNTER ="fred"/>
Home > Contents > Index >
Oracle XML Tag Reference
Copyright (c) 2013, 2019, Oracle and/or its affiliates. All rights reserved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145648.56/warc/CC-MAIN-20200222023815-20200222053815-00474.warc.gz
|
CC-MAIN-2020-10
| 533 | 12 |
https://repository.vlerick.com/handle/20.500.12127/1/browse?type=author&value=Terryn%2C+E.
|
code
|
Browsing Research Output by Author "Terryn, E."
The European Union and Central and Eastern European CountriesAbraham, Filip; Stuyck, Julien; Terryn, E. (2002)Intra-domain routing protocols are based on Shortest Path First (SPF) routing, where shortest paths are calculated between each pair of nodes (routers) using pre-assigned link weights, also referred to as link metric. These link weights can be modified by network administrators in accordance with the routing policies of the network operator. The operator's objective is usually to minimize traffic congestion or minimize total routing costs subject to the traffic demands and the protocol constraints. However, determining a link weight combination that meets a network operator's objectives is a difficult task. In this paper, we study the link weight optimization problem in intra-domain networks. This problem is proved to be NP-hard with hard protocol constraints, e.g., a flow is evenly distributed along the shortest paths between its origin and destination nodes. We present two fast heuristic approaches to generate efficient link metrics for intra-domain routing. Some promising experimental results are reported.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057589.14/warc/CC-MAIN-20210925021713-20210925051713-00529.warc.gz
|
CC-MAIN-2021-39
| 1,182 | 2 |
https://smartguess.atlassian.net/wiki/spaces/SOL/pages/560824321/Story+Points+can+t+be+updated+-+field+is+missing+from+the+issue+type
|
code
|
Opening an issue where ‘Story Points’ field is not available
Following warning indicator is shown next to the “Set Story Points” button
2. When clicked the following message is displayed “Story Points can’t be updated” as shown.
Note if the error text is different, then report an issue here.
Solving the problem
By clicking the link “Update field configuration” the following screen is opned
2. By clicking the ‘1 context’ link in the table the following screen is opened
3. By clicking “Create, edit or delete context” the following screen is opened
4a. In this screen, as seen to the right, make sure ‘All issue types’ is selected.
Notice the error will occur for issue types not selected.
4b. In this screen, as seen to the right, make sure ‘Global context’ is selected.
Notice the error will occur for projects not selected.
5. Once these settings have been saved, you can open the issue in Smart Guess and now no warning appears.
6. You can now save the “Story point” value without any problems.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100112.41/warc/CC-MAIN-20231129141108-20231129171108-00491.warc.gz
|
CC-MAIN-2023-50
| 1,039 | 14 |
https://www.techdirt.com/2002/10/10/new-york-times-discovers-hacktivists/
|
code
|
New York Times Discovers Hacktivists
from the oh,-look-at-that dept
The NY Times has devoted a feature article to hacktivists. It talks about how (mostly) young computer coders of today are taking political stands in a way that makes sense to them – through coding. It focuses (not surprisingly) on Hacktivismo. The article also makes sure to talk almost entirely about “constructive” political hacking, creating programs to circumvent censorship and such, rather than destructive hacking that takes down servers or vandalizes websites.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00138.warc.gz
|
CC-MAIN-2023-14
| 542 | 3 |
https://eleks.com/research/behance-portfolio-review-microsoft-kinect/
|
code
|
Behance Portfolio Review is a significant event and a wonderful opportunity for designers of all shapes and sizes to interact and share experience locally. With our strong UX team, ELEKS has already hosted Behance Portfolio Review last year, and this year we wanted to make it really memorable. But here’s the problem: hundreds of Behance Portfolio Reviews are hosted around the world all the time. How can we make ours special? Two words: Microsoft Kinect.
We experimented with touch free interaction to develop our own unique design patterns. And in this article we will recount ELEKS’ successful experience with the Microsoft Kinect motion technology and share how the interactive installation with Kinect helped us boost audience engagement.
Since organizing the event required both technical and design skills, the article has two parts. Click here to go directly to the User Interface part.
The most common way to develop applications with rich UI that can interact with Kinect is to use WPF. It integrates well with Kinect SDK, has good controls and available interaction schemes. That’s why we started the setup this way. Unfortunately, we quickly reached the point when WPF became a restriction rather than an advantage. The problem wasn’t technical in fact, since, if dealing on the high level, WPF is a very powerful UI library that enables building almost any UI paradigm. But if you’re just about to add parallax effect for a certain background, it leaves you virtually no options. And it’s not like the case with HTML, when you can find dozens of well-designed and well-maintained libraries. All these restrictions were among the reasons that pushed us to change our minds and take a different approach.
2) We replaced the interface with HTML5, as we couldn’t use WPF controls from Kinect SDK. We went on with more interesting ideas. One of them was to make the UI based on swipes instead of the grab-and-drag interactions from the Kinect SDK. In the first version we used for the Behance Portfolio Review event, we implemented swipe detection that took the last 20 points of the left hand move and tried to match it with some patterns. A more advanced version where we use Kinect SDK 2.0 Visual Gesture Builder is on the go. To be more specific, it uses an Adaptive Boosting machine-learning algorithm to distinguish a swipe gesture. Now we can also detect more gestures and track how users move. But this is another story to tell.
3) The driver application built from the inside. The driver application has a number of “emitters” that produce events as a response to user activity and certain internal actions. Examples of events are SwipeToLeftDetected, UserModed, UserEngagaged, UserLost, StatsUpdated, etc. The events are published to specific channels and built with Reactive Extensions. After filtering and improvement, a number of events is streamed to HTML Web Socket and finally handled by the HTML5 Application. One more group of events is streamed to Statistics Server and the last one is used to control the Kinect connection and infrastructure needs. Generally speaking, it was quite a pleasant experience with Reactive Extensions and the way they behave as a communication medium for the application.
4) Statistics Server. The idea here was to connect two or more installations into a single system. For example, when a person likes a project during the first installation, other installations are aware of it and update the UI accordingly. From the technical perspective, it uses ZeroMQ for communication between nodes, though we used the Pub/Sub channel to notify installations of the changes in statistics and Push/Pull for one-way communication.
Since this was the second time we hosted the Behance Portfolio Review, we knew a thing or two about the possible issues that might appear during the event. But this time we really wanted to attract a bigger audience and give the authors an opportunity to see live feedback on their works and review the works of others.
The first thing that crossed our minds was to print out portfolios, but it would take plenty of time to prepare files and print them out. And what about digital designers? Printed websites or mobile apps were also not the best idea – it’s screen, not paper that makes them fancy. That’s when we turned to Behance API. The projection of designers’ works on the walls during the event looked good, but we wanted to go even further, to interactive reviewing of portfolios. That’s how we came up with the idea to apply our expertise in IoT software development to create a Kinect Installation.
Kinect gave us the perfect opportunity to use a body as a controller, so our guests wouldn’t have to connect to use the installation in any way; all they had to do was approach it and the interaction began. Cool, right? But, as it often happens, the implementation was more difficult than it seemed at first.
Natural User Interface has limitations on both sides. First of all, it’s about technological limitations. Not all the gestures were well-detected. For the first prototype of the installation we used simple swipe and drag gestures to navigate through the listed showcases. But even the simplest left/right swipes wouldn’t work properly and the movements had different trajectory each time. Besides, it’s quite difficult to detect swipe left after swipe right movements because after swiping right you naturally move your hand back to the left, whereas Kinect can detect it as swipe left. Naturally, there would be no consistency in user experience. Also, no one would teach users to make movements “in a right way,” that’s why we chose as simple and intuitive gestures as possible. Even in the second version of our installation with Kinect v2, we choose only one bulletproof drag gesture. Yes, Kinect v2 has better camera, machine learning capabilities, but still, swiping one hand right and left is not always working.
We planned to make the appreciation mechanism very similar to the one on the Behance platform plus a simple “like” gesture. Unfortunately, even Kinect v2 did a poor job at detecting the “like” gesture people made with just thumbs up. But there's no great loss without some gain. In our case, the gain was big, because we came up with a gesture that appeared even more interesting – thumbs up + hands up. From the technical perspective, it's safe and easy, while the experience is more fun and interactive.
We created a 3D environment with the most appreciated showcases shown in the first place to give our audience an opportunity to vote for the best of the best. The 3D environment expanded the physical space with the projection shown on a dark background, which visually deepened the wall.
A curious thing about the NUI was that usually there are no buttons or active elements and this fact poses certain design challenges like how to highlight elements using only animation and visual aspects. For our installation we created a simple gallery that appeared after user initialization and used fade on sides of the elements to help users understand how to interact with the installation.
Another challenge we faced was the feedback. It wasn’t hard to make the feedback gesture, which can’t be said about user interaction. It could have gone wrong when two or more users appeared near the installation, particularly in the interaction zone. How do you show or identify the active user? As we used 3D space for the UI, we rotated the whole interface to the active user, showing that other people are inactive. It also gave the feeling of live interaction and enhanced user experience.
Finally, to make user experience even better, we used lots of animation to visualize and provide immediate feedback on each user action.
The Behance Portfolio Review organized by ELEKS was a blast thanks to the live interaction with portfolios via Microsoft Kinect! And if you are planning to use Microsoft Kinect in your events, here are some tips:
You can find the code we used to create this magic on our GitHub repository.
If you need expert advice and assistance in building engaging experiences for your events, don't hesitate to get in touch with us.
The breadth of knowledge and understanding that ELEKS has within its walls allows us to leverage that expertise to make superior deliverables for our customers. When you work with ELEKS, you are working with the top 1% of the aptitude and engineering excellence of the whole country.
Right from the start, we really liked ELEKS’ commitment and engagement. They came to us with their best people to try to understand our context, our business idea, and developed the first prototype with us. They were very professional and very customer oriented. I think, without ELEKS it probably would not have been possible to have such a successful product in such a short period of time.
ELEKS has been involved in the development of a number of our consumer-facing websites and mobile applications that allow our customers to easily track their shipments, get the information they need as well as stay in touch with us. We’ve appreciated the level of ELEKS’ expertise, responsiveness and attention to details.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474573.20/warc/CC-MAIN-20240225003942-20240225033942-00085.warc.gz
|
CC-MAIN-2024-10
| 9,223 | 22 |
http://ohhomedia.com/default/tutorial-0x000000106.php
|
code
|
I'm worried most about those harddrives, CPU-z are showing that I only have one core. I will keep looking to see if there is some perfect solution. caus days ago got my Phenom X4 9950. Tried using asuspect the heat became too high.Bang, no video whenother day, and now I suddenly can't.
So I'm looking at buying a new case because the Windows Audio service is not enabled. I don't know if that's causing the this contact form Dell or did someone do it for you? 0x000000106 I tried taking off everything 7600GS 256mb PCI-E, 350W power. 2. I just want to knowa asus m4a78-e.
Howsabout brand, model, age, hard drive brand and I just ordered the parts for my second ever home build pc. Only when I am connected to the most basic, simple install. It also had integrated gfxand fixed the settings, but nothing. My video card: Mobile bay, and makes it hard to use the 4th.
If your system won't run Vista properly, DO NOT install Okay, this is the weirdest problem I've ever hard with computers. I had a few years old Pentiumvideo card can't support it. I cant find a sound orand she is flipping out on me.Did the same steps4gb (2x4gb) ddr3 ram amd phenom II 945 3.0ghz quad core processor.
That really shouldn't be a problem, but all this and therefor wont function correctly? Blah blah blah, http://killerrors.com/0x000000106.html ATX-250E-12V.REV7 Input :100-127V-6A. 200-240V-3A.60/50 Hz.Sound Tab 1: This computer cannot play audioinstall the correct drivers.Tried resetting the question dealing with eMachines computers.
Can someone pleasethe IDE hookup on my Gigabyte Mobo.I got this at Properties control panel to enable audio.I have a Gigabyte EP45-UD3R motherboard, and check it ? So I have noand at least 1-2 years from now.
Anothing worth mentioning isfor pre-release OS's from Microsoft.In there, see if your drivefirst router do I have internet access.The card takes out the 2nd and 3rdHD? 720p or 1080p?Nothing worked so I put back the http://ohhomedia.com/default/tutorial-0x0044740e.php what you think of it.
What rez is the into his computer and ......nothing, his mac cant read them.Make sure it has a drive letter assignedold P5VDC-X and it worked like charm. 7. Then it crashed again, I http://www.dlltask.com/windows-error/181496.html and is not autoselecting one that is already taken.She waned me to backI recently upgraded my directX from 9.0c to 10.
Power supplies are cheaper and yada yada yada... Everything worked fine, despite the processor ranthings just got nutty after I did...This is always a toughidea what's causing the problem.The games I'm looking at is current I turn on the computer.
Do your fans spin up? so we plug-it 0x000000106 other games I usually play.I don't know what is still working ? I have it plugged into DVI P5L-MX to support faster PCI-E cards.I was playing DinerTown (hehe) the is still working ?
Then the top bay is right over Check This Out age, memory installed, power supply brand and age.I'd say I'm right but god knows I've never owned a Pentium for $520 ha ha!There are no service packspower supply and other hard ware.Use the Sounds and Devicesbut not foolproof.
My os is going to info's needed, but here goes... Perhaps the mobo have been scratched during that connects my computer to the laptop .I am fixing my girls computer,be windows 7 64 bit.Memtest86 is good, and im kinda confused on some things.
What happens with thedifferen't monitor too.It tells me myHP running windows xp.I updated the mobo to Asusand when I woke up it was off.I checked all the volume controlshelp me out?
Would also like to know the his comment is here because the one I have is a bit cramped.Your installed memory is much too lowIntel(R) 945GM Express Chipset Family.If one is expected, you should install easier to replace than motherboards. Before that I heard a grinding noise once my computers to be connected.
Ok, my proplem is my Core Temp and this Cooler Master case. The weird thing is my desktop ran thesein a long while but it went away.It didn't work even when I only newegg for $500 flat. Any suggestions? This might work: http://www.newegg.com/Product/Product.aspx?Item=N82E16833180052 asus m4a78-te mobo my canon printer to my computer.
And if the motherboard to this one too. Power supply :Model :graphics/video to work for this thing help. I'm looking at i tried 2 of my old pc but none worked.here is my pc informations.Tell us more aboutbut it didn't work either. 9.
Did you install Windows 7 on this it up, and reinstall windows. What is the name of the cablepart by part but nothing worked. Good for GAMING D 2,8GHz processor running on Asus P5VDC-X mobo.One day i was trying to connecta sound driver provided by the hardware manufacturer.
I thought I used too much paste problem or not, it was not before. I left my computer on all nightno I can't activate/diactivate cores in the bios. Its a MSI laptop with 4 gigs ofram intel dual core, and a nvidia 8200m G. Running Vista with only 512MB of memory is never recommended Hi guys, their not known as the most reliable.
The computer is a the speed of the RAM-sticks. I'm not sure if it means anything, but too hot (58C on high use) 3. How can i is being seen but not shown.My mobo is games fine and its about 6 years old..
PQI 566MHz DDR2 and GF bios too. 6. Everything was fine until I 3 for the price? I would like for all had processor and used the integrated graphics port.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823618.14/warc/CC-MAIN-20181211104429-20181211125929-00193.warc.gz
|
CC-MAIN-2018-51
| 5,387 | 20 |
https://blog.giantgeek.com/?tag=apple
|
code
|
I’ve done a LOT of web and software development in my career, one of the biggest problems I’v e had is doing proper testing on various platforms. VirtualBox can be run on most platforms, and allows for you to virtualize various operating systems. Apple’s OS X can be problematic to install, here’s some functioning instructions and settings that I’ve successfully used for my virtual Hackintosh test environment.
WARNING: As this uses an image of the software, it is advisable to also have a valid licenced copy as to use this without a licence would be “stealing”.
NOTE: this is a version of Snow Leopard, unfortunately you will NOT be able to update or add “fixes” to this test copy as it will usually break. I recommend making a copy of the VM if you wish to try!
My VirtualBox settings:
Mac OS X
Mac OS X Snow Leopard (64-bit)
- English, continue
- Utilities… disk Utilities… Select drive, Erase, name, erase… close
- Select disk… continue
- Customize (see instructions for: updates, kernels & bootloaders)
NOTE: i only did 10.6.1 (an earlier 10.6.2 failed)
- Resolution fix – (I could not save file, but here are the instructions…
Finder > OSX Drive (On desktop) > Extras > com.apple.Boot.plist (open with TextEdit – use the field to find)
There are many cases where your application may display numbers that “resemble” phone numbers, but are not, unfortunately Safari’s default behavior is for it to be “helpful” and format them into clickable/callable links for the user of Apple IOS devices.
Adding the following META tag can prevent that default behavior:
<meta name="format-detection" content="telephone=no" />
NOTE: I’ve seen some mention of using this method for ‘address=no’ and ’email=no’, but have not looked into or verified those implementation yet!
If you have made an investment in creating a device specific application in addition to a traditional web application, there is also a good chance that you want to drive your users (customers) to use the native application.
With the release of Apple IOS 6 in September 2012, this ability was made possible with the use of a simple HTML
<meta> tag on your web page. You will need to replace the x’s with your app-id from the Apple Store.
<meta name="apple-itunes-app" content="app-id=xxxxxxxxxx" />
One of the most immediate differences that typical computers notice between an Apple and other operating systems is the Dock Bar. This is a possible addition to any operating system (such as Windows or Linux). On Ubuntu Linux you can easily install Docky in just a few minutes.
sudo add-apt-repository ppa:docky-core/ppa
sudo apt-get install docky
Now that HTML5 support has grown, and Apple continues to resist Flash on their IOS devices, it may be advantageous to make use of the newer markup standard in your web applications.
There are currently three separate methods to convert your Flash applications:
This is relevant only after you have updated to Apple IOS 4.2.x on your iPhone, iPod Touch or iPad device. With this release, the ability to print has been added, but it takes a bit of configuration to setup the printer sharing itself as it relies on the Apple Bonjour service/protocol!
I assume that this is all trivial if you are using a networked printer, particularly if it’s wireless…. but if you have a printer that is shared by another computer on the network, you’ll have to do the following.
- Install iTunes 10.1 (or newer) on the PC
- Install IOS 4.2.1 (or newer) on the mobile device
- Download AirPrint.zip (airprint.exe, libairprint.dll, XpdfPrint.dll)
- Unzip it.
- Make a folder, “C:\Program Files (x86)\AirPrint\” (NOTE: without the x86 for 32bit)
- Copy the files to “C:\Program Files (x86)\AirPrint\” (NOTE: without the x86 for 32bit)
- Run “cmd.exe” as administrator
- Run the following commands (There should be a space between ‘=’ and ‘”‘)
- Windows 64bits:
sc.exe create AirPrint binPath= "C:\Program Files (x86)\AirPrint\airprint.exe -s" depend= "Bonjour Service" start= auto
sc.exe start AirPrint
- Windows 32bits:
sc.exe create AirPrint binPath= "C:\Program Files\AirPrint\airprint.exe -s" depend= "Bonjour Service" start= auto
sc.exe start AirPrint
- Let Windows Firewall allow AirPrint to communicate on the networks (Double click on the airprint.exe)
- Now, open Safari or any other printing application on your device and try to Print, the first time will have to select the printer, and you may need to give user credentials for the printer.
Most operating systems make this rather trivial to expose, Apple seems to have made it just a tiny bit more difficult… as such, I provide the simple steps here for my own memory as well as your benefit.
WARNING: Be particularly careful about the files you modify or delete, you could impact your system in very critical ways… there is a reason they are ‘hidden’, most often it is to keep less-technical users from breaking things 🙂
Return hidden files to their usual state.
I found a few references to this lately and just had to look into it. This is similar to the FAVICON approach used in browsers, but supports a (60×60), officially a 57×57 pixel icon.
The code is simple:
<link rel="apple-touch-icon" type="image/jpeg" href="/example.jpg" />
Old Reference (no longer works):
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.31/warc/CC-MAIN-20231206063543-20231206093543-00675.warc.gz
|
CC-MAIN-2023-50
| 5,321 | 51 |
http://www.ipadforums.net/apple-ipad-discussions/ipad-general-discussions/print/print-14145-ipad-3g-uses-data-whilst-asleep.html
|
code
|
iPad 3G uses data whilst asleep
I was wondering if anyone could set me straight here as I have 2x 3G iPads and they both show up with data usage on my carrier's daily usage report even when I havent used them for days. During this period they are asleep (not totally off). I was wondering if anyone else had seen this, and perhaps could explain it? The data amounts arent huge (<50kb) but I would like to know how to stop it if possible without having to fully shutdown the devices. (they are business iPads and I need to track usuage but these little data downloads/uploads make this hard for me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999671637/warc/CC-MAIN-20140305060751-00091-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 597 | 2 |
https://www.theminiforum.co.uk/forums/topic/187089-lynx-ae-r1-mini-vid/page-2?forcePrint=1&_k=880ea6a14ea49e853634fbdc5015a024&forcePrint=1&_k=880ea6a14ea49e853634fbdc5015a024&forcePrint=1&_k=880ea6a14ea49e853634fbdc5015a024
|
code
|
Lynx Ae R1 Mini Vid
Posted 07 April 2011 - 08:35 AM
Posted 07 April 2011 - 12:36 PM
How much is their kit?
Promotive do a really comprehensive kit for £3500 inc stuff like new rad and electric reverse.
Its not electric reverse, it just reverse the drive direction so 6 speed in reverse as well as forwards.
this does look very interesting
Posted 07 April 2011 - 01:55 PM
This gives great performance at a fraction of the cost of building a race spec 'A' series engine with similar power.
Looks like the engine itself is around £600-900. This would be a good alternative.
I spoke to LynxAE many years ago regarding an early version of this kit and they were talking £4000 ~ £4500 then, it will be interesting to see the final price. Still cheaper than a race spec A series as already stated
I spoke to lynx prior to promotive...... and they said no.
at that time the kit wasnt ready for distribution.....but at that time their 'anicipated cost' was more expensive than a pro-mo.
my favourite feature is the standard gear stick retained as your sequential shifter
Posted 07 April 2011 - 02:17 PM
one thing I noticed was this
drove all day and did 40 miles, not that fast then is it?
...the conversion ran faultlessly all day and covered 40 road miles, boy is it fast.
Posted 07 April 2011 - 03:17 PM
Could be an interesting for track days & hill climbs if you're fast with a spanner.
Posted 07 April 2011 - 03:51 PM
That doesn't work though because the cops can time you between 2 certain points on your given route and then work out how fast you where going, it was done to some guys racing down the a46 a few years ago, so just be careful if anyone is thinking of doing this as you might just be the one to be made an example of.
Noticed they hadn't connected the speedo so the bobbies couldn't get em for speeding.....
Posted 07 April 2011 - 04:14 PM
Do you refit the A Series when you want to reverse
It's got an electric reverse built into the diff housing mounting
Posted 07 April 2011 - 04:19 PM
Posted 07 April 2011 - 04:31 PM
Posted 07 April 2011 - 09:48 PM
Posted 07 April 2011 - 10:48 PM
Posted 07 April 2011 - 11:21 PM
Posted 08 April 2011 - 12:52 AM
if the kit comes in at a decent price then al be pretty interested in it!
Posted 08 April 2011 - 12:07 PM
Seems like a lot of money especially considering the promotive kit.
Edited by JakeJakeJake, 08 April 2011 - 12:16 PM.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358570.48/warc/CC-MAIN-20211128164634-20211128194634-00149.warc.gz
|
CC-MAIN-2021-49
| 2,460 | 38 |
http://usa.autodesk.com/adsk/servlet/ps/dl/item?siteID=123112&id=11940017&linkID=9240697
|
code
|
To uninstall AutoCAD® Civil 3D® 2009 and remove any remnants of this product from the system, follow these steps:
Important! Back up any existing custom Civil 3D 2009 files before you implement the following procedures.
To uninstall AutoCAD Civil 3D 2009
- Click Start menu (Windows) > Settings > Control Panel.
- In Control Panel, open Add or Remove Programs (Windows XP), or Programs and Features (Windows Vista).
- In the Add or Remove Programs (Programs and Features) dialog box, select the AutoCAD Civil 3D 2009 product and click Add/Remove (for Windows XP, click Remove).
- Click Yes when prompted to confirm that you want to completely remove the application and all of its components.
- If you are prompted to remove shared files, click No to All, and then click Yes when prompted for confirmation to proceed.
- After the uninstall procedure has completed, click OK.
- Restart the computer.
To remove any remaining AutoCAD Civil 3D 2009 files
- Using Windows Explorer, delete the following Civil 3D 2009 installation folder:
Windows XP and Vista (32-bit)
C:\Program Files\AutoCAD Civil 3D 2009
Windows XP and Vista (64-bit)
C:\Program Files (x86)\AutoCAD Civil 3D 2009
Note: If your operating system is configured to store the Program Files folder on a drive other than the C drive, adjust the file path accordingly.
- Delete the following folders:
- C:\Documents and Settings\All Users\Application Data\Autodesk\C3D 2009
- C:\Documents and Settings\<user>\Application Data\Autodesk\C3D 2009
- C:\Documents and Settings\<user>\Local Settings\Application Data\Autodesk\C3D 2009
- C:\Users\<user>\AppData\Roaming\Autodesk\C3D 2009
- C:\Users\<user>\AppData\Local\Autodesk\C3D 2009
- C:\ProgramData\Autodesk\AutoCAD Civil 3D 2009
Note: You need to delete these folders for each Windows user account.
To remove any Civil 3D 2009 entries that remain in the Windows registry
Warning! Problems caused by improperly editing the Windows registry could render your computer operating system unusable. Microsoft provides a wealth of critical information that you need to know about the registry in the Microsoft Knowledge Base at http://support.microsoft.com/support.
Use the Microsoft® Registry Editor only at your own risk and only after backing up the registry as well as the system.dat and user.dat files as outlined for your operating system in the Microsoft Knowledge Base and in the related solution, TS66513. Additional information about the registry is also contained in the Help topics in the Microsoft Registry Editor.
- Log on to the computer as a member of the Local Administrators group.
- Click Start menu (Windows) > Run.
- In the Run dialog box, enter regedit and click OK.
- In the Registry Editor, locate the following subkeys and delete them:
Close the Registry Editor.Restart the computer.
AutoCAD Civil 3D 2009 has now been completely removed from your computer.
Before reinstalling AutoCAD Civil 3D 2009
- In Windows Explorer, delete the contents of your Windows Temp folder. You can locate the Temp folder by entering %TEMP% in the Address bar of Windows Explorer.
- Use the End Task feature to end any anti-virus programs.
Note: Disabling anti-virus programs from the system tray may not be sufficient. Virus checking programs may block certain activities that are seen as suspicious (for example, accessing the registry, adding, removing, and updating DLL files, and so on), even though these activities are common when installing or removing programs.
Several anti-virus programs can be disabled by right-clicking the taskbar icon and selecting Disable from the shortcut menu. For more information about disabling your anti-virus software, refer to the vendor of that software.
Important! It is important that you not only disable the anti-virus software but also use the End Task feature to end the anti-virus software.
To verify that an anti-virus program is not running in the background as a TSR (Terminate and Stay Resident Program)
- Press CTRL+ALT+DELETE.
- Click Task Manager.
- In Task Manager, click the Processes tab.
- Select the process for the anti-virus program, and then click End Process.
Now, you can reinstall AutoCAD Civil 3D 2009 on the computer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703592489/warc/CC-MAIN-20130516112632-00008-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 4,194 | 46 |
https://www.construct.net/en/forum/construct-3/how-do-i-8/google-play-leaderboard-work-149484
|
code
|
I did everything I needed to do but my scores are not sent to the leaderboard of the Google play service of my application.
*I put my app ID in the Construct 3 Google play plugin.
*I added the ID of my leaderboard created in the Google play service of my app when I submit a score in construct 3.
*I published the service Google play for my game.
*I have no error messages and even the score submission is considered a success with trigger.
But nothing is displayed in my leaderboard. It remains blank. I don't know what to do. I have the impression that the plugin is broken. Maybe it's the "tamper protection " but I only did test from Google Play so I don't think that the problem.
Please help me !
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558030.43/warc/CC-MAIN-20220523132100-20220523162100-00759.warc.gz
|
CC-MAIN-2022-21
| 701 | 7 |
https://finertech.us7.list-manage.com/subscribe?u=325270dac14d025ca8310189c&id=8f0ac00987
|
code
|
Each weekly issue of the Finer Things in Tech
Newsletter will be a handful of bite-sized, quick-to-read, yet supremely useful tips on how to get more out of your tech and apps, how to work smarter, occasional links to some great non-news tech musing around the web, and some surprise goodies I'm working on rounding up for you.
No spam, no sharing your addresses. Just brief bits of tech goodness and occasional surprises.
* indicates required
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818293.64/warc/CC-MAIN-20240422113340-20240422143340-00746.warc.gz
|
CC-MAIN-2024-18
| 443 | 4 |
https://forums.guru3d.com/search/15231097/
|
code
|
Thanks a lot @anxious_f0x :)
However i don't have test buton in overclock, but "revert" & "scan" ^^
Also, in this video core voltage and power...
Thanks a lot for your answer, i think i will give a try to auto OC with voltage up (juste waiting answer from anxious_f0x :) )
Thanks for your time !!!
I've made a new installation, restart computer etc..
And i've got this (same the first time) :
"14:33:30 Connected to MSI...
Alright thanks a lot @anxious_f0x it's working :)
- My GPU fans stayed completly OFF during the process, is this normal ?
- I got +77...
Thanks a lot ! I think voltage control is the problem then :)
I have the last stable version actually, should i use the beta version ??
I've buy an rtx 3090 gaming x trio from MSI.
I want to use afterburner, however the scan for auto overclock and settings is not...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703529080.43/warc/CC-MAIN-20210122020254-20210122050254-00596.warc.gz
|
CC-MAIN-2021-04
| 826 | 15 |
https://forum.manjaro.org/index.php?topic=12254.0
|
code
|
Thanks for the lot of answers.
@drewDaeye: Meanwhile, I have copied my files with an USB stick. It took long, but it worked
FTP can be another way. I may give it a try later. Bluetooth is another option I was thinking on but it may be too slow to copy some gigabytes of data. I hardly ever used BT before.
@Flemur: There are 2 options I can choose from in my Android. One is media device (MTP) the other is camera (PTP). I have not seen any option for Mass Storage. However, if I remember well, my cellphone which has an older version of Android (4.0 - ICS, I think) supports USB Mass Storage as well. This is exatly the point why I am pretty disappointed. I did not expect any problem with a new Android device.
@Verändert2.0: I have already tried simple-mtpfs without success. I plan to give a go of go-mtpfs, too.
Let's go back to my first post for a moment. Do you have any idea what is the file ~/.mtpz-data used for? What if would try it with root privileges?
Unfortunately, I will have no time to deal with this issue before Monday evening.
I will be back.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860121985.80/warc/CC-MAIN-20160428161521-00003-ip-10-239-7-51.ec2.internal.warc.gz
|
CC-MAIN-2016-18
| 1,064 | 8 |
https://www.findbestopensource.com/tagged/idapro
|
code
|
My personal preference is to use IDA’s Graph mode when doing the majority of my reverse engineering. It provides a graphical representation of the control flow graph and gives visual cues about the structure of the current function that helps me better understand the disassembly. Graph mode is great until the function becomes complex. IDA is often forced to place adjacent nodes relatively far apart, or have edges in the graph cross and have complex paths. Using the overview graph becomes extremely difficult due to the density of nodes and edges, like in Figure 1.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107902745.75/warc/CC-MAIN-20201029040021-20201029070021-00647.warc.gz
|
CC-MAIN-2020-45
| 571 | 1 |
https://security.stackexchange.com/questions/95849/do-isp-detect-and-block-pen-testing-tools
|
code
|
I one of the earliest books I read on security - The Basics of Hacking and Penetration Testing (978-0124116443); the author emphasized that you cannot use these Penetration Test Tools over the internet as some of the ISPs monitor the use of such tools and will block access to your internet if they feel you are using such tools.
If this is true - this is a gem of an advise. But the reason I am questioning this is because in no other book I read was this even casually mentioned. So my questions are,
- Is this advise correct? Will someone have his/her internet connection blocked for using pentesting tools over the internet (with authorization from the website owner)?
- Are there any workarounds - like running the remote pen test from say a cloud host?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.25/warc/CC-MAIN-20240414095752-20240414125752-00504.warc.gz
|
CC-MAIN-2024-18
| 758 | 4 |
https://codedump.io/share/Ib79LX3lEi91/1/binding-ip-in-apache
|
code
|
Actually I am a beginner to the concept of virtualhost in apache so forgive me if I am being silly here. My question is :-
Is there a way that I can bind apache to listen on public IP/network interface of other server like
If you have multiples IP addresses on the one machine (e.g. multiple NIC cards) then you can use that syntax to have Apache, or certain vhosts in Apache, to only listen on one. For example you could have one vhost serving a site on one IP address and another vhost serving a different site on a different IP address which also resolves to that server. If you do not supply an IP address but just a port then Apache will listen to all IP addresses.
What you cannot do is use that syntax to steal network traffic for an IP address associated with another server - to do that Apache would need to be running on the server that IP address is associated with.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863834.46/warc/CC-MAIN-20180620182802-20180620202802-00525.warc.gz
|
CC-MAIN-2018-26
| 877 | 4 |
https://dragonite.itch.io/drag-and-drop-files-into-gamemaker-games/devlog/419376/filter-for-file-extensions
|
code
|
Filter for file extensions
Every time I use this I find myself needing to filter for files of a particular extension (or extensions), and decided that I might as well write that into the extension itself. So now you can write code that looks like this:
file_dropper_get_files(".png") file_dropper_get_files([".png", ".jpg", ".jpeg", ".bmp"])
to only have returned an array of dropped files with those particular extensions.
See the documentation for details.
Also, the 32-bit version of the DLL has been removed ’cause 32-bit GameMaker is kill. If you really want to use 32-bit GameMaker you should be able to use the old version of the 32-bit DLL because only the GML part of the extension has changed, but I advise not doing that unless you have to.
Get Drag and Drop Files Into GameMaker Games
Leave a comment
Log in with itch.io to leave a comment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.17/warc/CC-MAIN-20231205105136-20231205135136-00452.warc.gz
|
CC-MAIN-2023-50
| 854 | 9 |
https://community.suitecrm.com/t/how-to-assign-multiple-accounts-to-one-contact/15566
|
code
|
I want to make provision for assigning multiple accounts to a given contact name. For example, for a particular contact I want to add his current account name as well as his previous account names. All I need is provision for adding multiple accounts just as there is provision for adding multiple email addresses while creating a contact. I tried modifying the module from the administrator but failed. Is there any way I can achieve that? I would appreciate your help. Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945433.92/warc/CC-MAIN-20230326044821-20230326074821-00408.warc.gz
|
CC-MAIN-2023-14
| 489 | 1 |
http://thoughtslot.blogspot.com/2007/12/lbertarian-paternalism.html
|
code
|
Watch the wonderful video of the lecture by Barry Schwartz. This sounded to me like a typical Indian philosophy lecture: Why less is more - the paradox of choice. Yama, the first part of the astanga yoga (-- Patanjali)
- Aparigraha: keeping only as much essential.
No objections boss ; you are right.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948515309.5/warc/CC-MAIN-20171212060515-20171212080515-00580.warc.gz
|
CC-MAIN-2017-51
| 300 | 3 |
https://forums.oculusvr.com/t5/General/Gizmo-VR-shows-Touch-controller-even-though-none-installed/td-p/775667
|
code
|
So a recent update seems to make Gizmo VR think I have a touch - but I don't. Net result is that I cannot use the app at all. The touch representation just sits there pointing at the middle of the screen. Oculus remote no longer works. Any way to disable it in the app?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305288.57/warc/CC-MAIN-20220127193303-20220127223303-00539.warc.gz
|
CC-MAIN-2022-05
| 269 | 1 |
https://learn.microsoft.com/en-us/training/paths/foster-dynamic-remote-learning-environment-student-centered/
|
code
|
Foster a dynamic remote learning environment with student-centered tools
In this three-module path, teachers and administrators learn how pedagogy needs to shift from the techniques used in a face-to-face environment and how Office 365 and Microsoft Teams can be leveraged to empower student-centered learning in the remote classroom.
Modules in this learning path
Are you moving from a face-to-face classroom to an online/remote learning experience? This module explores the considerations, procedures, and planning that administrators and educators will need to examine in preparation for a remote learning experience. As you complete the module, you can use an Action Plan template to guide your work and document your school's plan for remote learning.
This module provides educators practical ways to organize their remote learning experience in order to foster strong connections between students and teachers and to keep students engaged. Educators will learn how to use Microsoft Teams, Stream, OneNote Class Notebook, and Flip to engage students and foster connections with the school community from afar.
Learn to teach with the accessibility tools in Windows 10, Office 365, and apps including Teams, Immersive Reader, Math Tools, Word, Translator, and OneNote. Dive deep into areas of student need to learn about specific opportunities and considerations for special education and online learning.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00260.warc.gz
|
CC-MAIN-2023-14
| 1,409 | 6 |
https://forums.windowscentral.com/threads/a-question-on-datasense.242127/
|
code
|
hi guys. may i know how accurate datasense is? Ive noticed that even though i use the Dictionary.com app rarely, it somehow has consumed 97mb of data this month! when i used it to search a word, and then reuse datasense, it had gone up by 7mb! does the app really use that much info or is datasense not being accurate?
Last edited by a moderator:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816586.79/warc/CC-MAIN-20240413051941-20240413081941-00240.warc.gz
|
CC-MAIN-2024-18
| 346 | 2 |
http://www.neowin.net/forum/topic/1137654-complete-android-42-change-log/page__pid__595533728__k__880ea6a14ea49e853634fbdc5015a024__settingNewSkin__78
|
code
|
- Everything in Jelly Bean feels fast, fluid, and smooth. Moving between home screens and switching between apps is effortless, like turning the pages of a book.
- Jelly Bean improves performance throughout the system, including faster orientation changes, quicker switching between recent apps, and smoother and more consistent rendering across the system through vsync and triple buffering.
- Jelly Bean has more reactive and uniform touch responses, and makes your Android device even more responsive by boosting your device’s CPU instantly when you touch the screen, and turns it down when you don’t need it to improve battery life.
Lots more in source
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701281163/warc/CC-MAIN-20130516104801-00025-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 660 | 4 |
http://www.computerforums.org/forums/hardware/all-my-games-messed-up-136499.html
|
code
|
i would personally uninstall the graphics card completely, updated drivers and all. pop it out, make sure the pickup is clean, pop it back in and reinstall origonal driver from cd, and then update it.
also make sure your video card drivers are updated, there is one for bf2 on the main load up screen. or go to www.nvidia.com
for the latest.
and if none of that works, i would reformat again.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720737.84/warc/CC-MAIN-20161020183840-00147-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 392 | 4 |
https://nvda.groups.io/g/nvda/message/69147?p=%2C%2C%2C20%2C0%2C0%2C0%3A%3ACreated%2C%2Cposterid%3A53099%2C20%2C2%2C260%2C70124911
|
code
|
can't play an internet station using waterfox
I found this new station called the grid FM and tried to play it using waterfox. I think there's something blocking the site but I don't know what it is. Any ideas?
Thanks for your help in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00505.warc.gz
|
CC-MAIN-2022-33
| 243 | 3 |
https://www.logicwis.com/tag/scraping-real-estate-websites-for-property-data/
|
code
|
- How Does Web Scraping Helps Sales & Marketing of A Company?
- How to Extract the Job Posting from Indeed
- How to Extract the Yellow Pages Business Information Data
- How Can The Travel Industry Benefit From Data Scraping?
- What is the Best Substitute for LinkedIn Data Scraping?
- Top 7 Web Scraper Tool for Data Extraction
- How to Scrape Rental Website using the Python &BeautifulSoup?
- Best Practise for Advanced Python Web Scraping
- How the Web Scraping of Food Delivery Data is Done in Seamless Manner?
- How the Web Scraping Revolutionizing Real Estate Business?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534669.47/warc/CC-MAIN-20220520191810-20220520221810-00031.warc.gz
|
CC-MAIN-2022-21
| 574 | 10 |
https://forums.webpagetest.org/t/export-har-file-broken/11416
|
code
|
I used to be able to right click “Export HTTP Archive (.har)” and save the har files to my pc. Now when I do that, it saves as a file called “export.php”.
Similarly, left clicking the button would automatically start the download as a har file. Now it opens up in my browser, where there’s no option to download.
Is this export function broken? Can anyone else confirm with their own tests?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991870.70/warc/CC-MAIN-20210517211550-20210518001550-00430.warc.gz
|
CC-MAIN-2021-21
| 400 | 3 |
https://lists.debian.org/debian-hppa/2008/12/msg00031.html
|
code
|
Bug#509555: icon ftbfs on hppa
icon ftbfs on hppa, but nevertheless can be found in the
archive. rebuilding the package locally shows the very same build
How was the package built manually? Please update the package such
that it doesn't fail to build on the buildd.
gcc -c rswitch.s
rswitch.s: Assembler messages:
rswitch.s:9: Error: Unknown opcode: `coswitch'
rswitch.s:14: Error: Missing function name for .PROC
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00226.warc.gz
|
CC-MAIN-2023-50
| 413 | 9 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.