url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://www.zonealarm.com/forums/showthread.php/73330-quot-This-website-is-suspicious-quot-on-my-website
|
code
|
My wife owns a website and I am responsible for maintaining it. Few visitors of her website have complained that they receive warning messages "This website is suspicious. Leave now unless you know this site is safe." Further the message states:
My wife has not purchased security certificate for this domain because there is no need of encrypted connections; hence there is no security certificate strength to be discussed here. Yes, the site is less than 3 month old, but this cannot be malicious property.This recommendation is based on how long the site has been around and the strength of its security certificate.
- Site is not known phishing or spyware distributor
- Site is less that 3 month old
I found similar thread and the moderator there asks for the URL of the reported site. Here it is
Here is the screen-shot of the warning that the visitor kindly provided:
Is there some reasonable explanation my wife can offer to her visitors beside the obvious promoting of the premium product of CheckPoint?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120844.10/warc/CC-MAIN-20170423031200-00001-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,011 | 7 |
https://forums.theregister.com/forum/all/2012/01/03/raspberry_pi_auction/
|
code
|
The whole idea of this project is to keep the cost low and provide a product best suited for the educational market. From what I've read (and I've been following the project online for some time) the thinking is that it will provide a low cost unit that students can use throughout their computer science studies. Essentially allowing students to once again program computers in high schools rather than using Word, Excel etc etc.
Most computer networks do not allow students access to such programming tools because of the risk to their network and so on.
This is only my understanding of the project.
Obviously, the end product itself can have many more uses, I plan to buy one to use as a HTPC.
I know the people over at R-Pi have but great thought into the components they are using because they really want to hit the publicised end price tag. Even down to selection of components not only based on price, but price including the robot fitting it to the board etc.
From everything I've read on their site I have complete faith in them.
If you have posted a negative comment here without taking the time to read the blog on the site to understand the process they have already gone through then I highly recommend you do.
If nothing else, it's a very interesting read.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500126.0/warc/CC-MAIN-20230204110651-20230204140651-00559.warc.gz
|
CC-MAIN-2023-06
| 1,272 | 8 |
https://intellij-support.jetbrains.com/hc/en-us/community/posts/206908665-break-points-in-dependent-modules
|
code
|
I was wondering if there is some facility similar to what i can do in eclipse.
In eclipse it is possible to link projects (modules), which i might use for example when one project (module) uses another as a dependency, i make a change to the dependant project and want to check this doesnt break anything.
In eclipse if these projects are linked i can put breakpoints into the linked project and debug the other, this will hit the break points i put in the other project. Is this possible in intellij?
note: when i tried linking the projects as sources I hit this bug http://youtrack.jetbrains.net/issue/IDEA-55557
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655900335.76/warc/CC-MAIN-20200709131554-20200709161554-00596.warc.gz
|
CC-MAIN-2020-29
| 614 | 4 |
https://community.freepbx.org/t/odd-random-issues-choppy-voice-phones-going-offline-and-grayed-out-in-fop2/44381
|
code
|
I am in no way as PBX guru despite having used Asterisk for the last 10+ years.
I have a Centos based server setup running Incredible PBX 12.0.74 and Asterisk 13.12.2 running on a VPS with 8GB of RAM.
In recent weeks, we have started having a couple of different issues that I’m hoping your expetise can help with.
- While on calls, and even when someone calls in and is listening to the IVR introduction, the voice quality is choppy.
This seems to happen randomly and a reboot does not seem to be a fix.
I ran the below when on one of these calls hoping it can help diagnose:
voipCLI> sip show channelstats
Peer Call ID Duration Recv: Pack Lost ( %) Jitter Send: Pack Lost ( %) Jitter
...* ****** 00:00:58 0000002867 0000000040 ( 1.38%) 0.0000 0000001387 0000000000 ( 0.00%) 0.0024
1 active SIP channel
- The only primary extention in use goes offline.
What I mean is , it shows grayed out on FOP2 and it does not recieve calls from the system.
While this is happening, I can dial out fine from the extention but internally and externally.
This resolves itself after some time, or a reboot of the GXP2160 which is on an external network (Ip whitelisted on firewall).
Any help you can provide is of course greatly appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103645173.39/warc/CC-MAIN-20220629211420-20220630001420-00382.warc.gz
|
CC-MAIN-2022-27
| 1,228 | 15 |
https://www.spigotmc.org/threads/bukkitrunnable.155868/
|
code
|
So,it's been a long time since i played with bukkitrunnables,and my old plugin (the one i need now) fell apart because of the spigot/bukkit updates. let's get to the point. my old plugin used to schedule commands using commands examples: /ptcmd 5s fly flamehero ^ the following will execute that command after 5 seconds. apperantly the code fell appart and i would like to know how to do it again. in general,can someone tell me how to make a bukkitrunnable run from console using a command. steps as i know: create the command create the eventhandler for the bukkitrunnable run the command using Bukkit.getServer().dispatchCommand() please no bullshit in replies like 'oh dude you need to apply a bukkitrunnable into a string bla bla bla' if you have the answer,send me code examples and bla bla is not appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488556133.92/warc/CC-MAIN-20210624141035-20210624171035-00533.warc.gz
|
CC-MAIN-2021-25
| 816 | 1 |
https://tw.voicetube.com/videos/25004
|
code
|
字幕列表 影片播放 列印英文字幕 [MUSIC PLAYING] -I'm Aaron Sams and I teach science here at Woodland Park High School. My ultimate goal, I guess, as a teacher is to help students become learners who can learn for themselves and by themselves. One of the problems that I was guilty of, even prior to flipping my classroom around, was the classroom was centered around me. I told them exactly what to learn, how to learn it, what assignments to do to learn it, and when to learn it, and how to prove to me that they learned it. I don't do that anymore. We changed the place in which content is delivered. Instead of standing in front of a class and delivering-- here's how you do this type of problem, here's how this worked-- I deliver that direct instruction now asynchronously at home through these videos that we make with Camtasia Studio. -Times [? till ?] whole. -Oh, we didn't do that last time. -Because the last step, they were already whole numbers. We had one, one, and four. Here, we don't have a whole number. So here's a few little tricks when you need to multiply by whole numbers. If one of your numbers ends in 0.5, you're going to multiply by 2. -All right, something-0.5 times it by two. Write this down, guys. -If something ends in 0.33 or 0.66, you multiply by 3. And when the kids come to class, they don't show up to learn new stuff, they show up to apply the things that they learn at home and to ask me questions about the things they learned at home. So now they can have my lesson, if you will. What I would normally have stood up and lectured to them in class with some added features, they get that at home. And then what they were expected to do for homework is now what they do in my class. Life is different for me, because I no longer am the guy who stands up in the front of the classroom and just yaks at a student for an hour or however long the class is. Now, I walk around the class and I help kids. I'm a tutor, I'm a guide, I'm the putter-outer of fires, whatever it happens to be in my crazy chemistry class. I walk around and do that, I don't stand up front and teach under the traditional model. I'm Aaron Sams. I'm a teacher. I'm a dad. I'm a husband. And I love Camtasia Studio.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499845.10/warc/CC-MAIN-20230131055533-20230131085533-00843.warc.gz
|
CC-MAIN-2023-06
| 2,234 | 1 |
https://www.forbes.com/2007/08/08/linux-software-novell-tech-cx_bc_0808novell.html
|
code
|
. First it got beat up by
. Then it got in a turf war with
over open-source software. The new strategy: Make some friends, fast.
Chief Executive Ron Hovsepian took to the podium Wednesday at the LinuxWorld conference in San Francisco and called for companies peddling Linux--whose source code can be freely shared--to work together. The mission: Certify that software cobbled together by independent developers works well with whatever flavor of Linux a user happens to run.
It's a community-minded proposal, of course. But, in effect, buddying up benefits those who aren't Red Hat
--which has the biggest chunk of the market for enterprise Linux software--the most.
Novell, of course, is the software company that has been wandering in the desert ever since Microsoft
thundered through its business in the 1990s. Since then, Novell has looked to Linux to do a little disruption of its own, buying its own Linux distribution, SuSe, in 2003 and blending much of its business software know-how with the expertise of the open-source software shops, such as SuSe, that it has acquired.
But despite its enterprise software smarts, Novell has gone from lagging behind Microsoft in software sales to businesses to looking to gain ground on open-source software specialist Red Hat in the enterprise Linux sales derby.
Enter Microsoft, again. Novell ticked off some of its newfound friends in the open-source business by announcing a deal with open-source foe Microsoft last November that has Microsoft reselling Novell's software.
Hovsepian defended the deal Wednesday, pushing the idea of "mixed source"-- that Linux will coexist with software from Microsoft. "We've had 20 years of battling Microsoft--it's in our blood," Hovespian told the audience. "[But] Microsoft is a reality inside that mixed source world."
Now, however, Novell is busy building ties to others threatened by Red Hat. On Tuesday, Novell announced it is sidling up to
. Novell will offer a version of IBM's WebSphere application server, dubbed WebSphere Application Server Community Edition, along with its SuSe Linux operating system. The move comes after Novell rival Red Hat purchased open-source application server software company JBoss last year.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812959.48/warc/CC-MAIN-20180220125836-20180220145836-00794.warc.gz
|
CC-MAIN-2018-09
| 2,217 | 13 |
https://www.datacamp.com/courses/cluster-analysis-in-r
|
code
|
Cluster analysis is a powerful toolkit in the data science workbench. It is used to find groups of observations (clusters) that share similar characteristics. These similarities can inform all kinds of business decisions; for example, in marketing, it is used to identify distinct groups of customers for which advertisements can be tailored. In this course, you will learn about two commonly used clustering methods - hierarchical clustering and k-means clustering. You won't just learn how to use these methods, you'll build a <strong> strong intuition</strong> for how they work and how to interpret their results. You'll develop this intuition by exploring three different datasets: soccer player positions, wholesale customer spending data, and longitudinal occupational wage data.
Calculating distance between observationsFree
Cluster analysis seeks to find groups of observations that are similar to one another, but the identified groups are different from each other. This similarity/difference is captured by the metric called distance. In this chapter, you will learn how to calculate the distance between observations for both continuous and categorical features. You will also develop an intuition for how the scales of your features can affect distance.
This chapter will help you answer the last question from chapter 1 - how do you find groups of similar observations (clusters) in your data using the distances that you have calculated? You will learn about the fundamental principles of hierarchical clustering - the linkage criteria and the dendrogram plot - and how both are used to build clusters. You will also explore data from a wholesale distributor in order to perform market segmentation of clients using their spending habits.
In this chapter, you will build an understanding of the principles behind the k-means algorithm, learn how to select the right k when it isn't previously known, and revisit the wholesale data from a different perspective.
Case Study: National Occupational mean wage
In this chapter, you will apply the skills you have learned to explore how the average salary amongst professions have changed over time.
Lead Data Scientist at Memorial Sloan Kettering Cancer Center
Dmitriy is a Lead Data Scientist in the Strategy & Innovation department at Memorial Sloan Kettering Cancer Center. At MSK he develops predictive models for programs aimed at improving patient care. Prior to this role, Dmitriy completed his Doctorate in Quantitative & Computational Biology at Princeton University. With a passion for teaching and for R, he regularly holds cross-departmental R training sessions within MSK. His core teaching philosophy is centered on building intuition and understanding for the methods and tools available.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056711.62/warc/CC-MAIN-20210919035453-20210919065453-00135.warc.gz
|
CC-MAIN-2021-39
| 2,763 | 9 |
https://esteq.net/cyber-glossary/ddos/
|
code
|
Distributed Denial-of-Service attacks is an attempt to make online service offline and unavailable to users by overloading infrastructure on a network level (L2-L4) or application level (L7).
There are several main types of DDoS attack methods:
- Protocol attacks. There are ICMP, Smurf etc. The main idea is to make online service slow or unavailable with a huge amount of cracked or non-valid packets.
- Volume attacks. There DNS amplification, NTP amplification, and other UDP floods. The main goal is to saturate the bandwidth. Sometimes DDoS attack on one website could make an impact for the whole datacenter because of that.
- Application layer attacks. It’s about low-and-slow attacks, flood by GET/POST requests, heavy DB requests etc. The main idea is to use applications vulnerabilities and even legitimate features but in a malicious way to make application unavailable.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107875980.5/warc/CC-MAIN-20201021035155-20201021065155-00716.warc.gz
|
CC-MAIN-2020-45
| 884 | 5 |
https://www.kadencethemes.com/support-forums/topic/how-to-make-background-image-full-height-and-45-width/
|
code
|
I am trying to make the background image be full height, no scroll, 45% width any size non-mobile screen size.
I have been working with the flex properties but still cannot get it to work.
Greatly appreciate your help!
Sorry, this forum is for Premium customers only. Please Login to continue
If you are using a free theme you can access support on wordpress.org by searching for the free theme and using the support tab.
This topic is: not resolved
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627997533.62/warc/CC-MAIN-20190616022644-20190616044644-00399.warc.gz
|
CC-MAIN-2019-26
| 449 | 6 |
https://snowplowanalytics.com/blog/2017/06/12/snowplow-r89-plain-of-jars-released-porting-snowplow-to-spark/
|
code
|
This release has been a real community effort and so we’d like to start off by thanking some people that were key to this port:
This has been one of the most inclusive and collaborative Snowplow releases in our history - an exciting outcome of our burgeoning RFC process, and one on which bodes well for the future as we roadmap exciting new features and major refactorings. Thank you all!
We take a conservative approach to technology adoption at Snowplow - your event data pipeline is far too important for us to take chances with speculative technologies or techniques. But technology does not stand still, and we must always be proactively extending and re-architecting Snowplow to ensure that it stays relevant over the next decade.
You may be wondering why we went to the trouble of rewriting the core components of our batch pipeline into Spark, and why now. The definitive explanation for this port can be found in our RFC - but in a nutshell, we wanted to address some particular pain points with Hadoop:
Although the core of the Snowplow batch pipeline had stayed in Scalding since early 2013, we had had multiple positive experiences working with Apache Spark on ancillary Snowplow projects, and were confident that Spark could address these pain points.
The RFC proposed moving to Spark in three phases:
Snowplow 89 Plain of Jars represents the entirety of Phase 1, and the core deliverable of Phase 2 - namely porting our Hadoop Shred job to run on Spark.
This release ports the two core components of the Snowplow batch pipeline from Scalding to Spark:
Spark Enrich effectively replaces Scala Hadoop Enrich. It is a “lift and shift” port, having the exact same set of functionalities and acting as a drop-in replacement.
For its part, RDB Shredder is the successor to Scala Hadoop Shred. Again, the featureset of Scala Hadoop Shred, including DynamoDB-based de-duplication, has been preserved; minor Spark-related changes have been made to the folder structure of the job’s shredded output.
Also note that as part of this release the RDB Shredder has been moved to the correct
4-storage folder within Snowplow, from the
3-enrich folder that Scala Hadoop Shred was erroneously stored in.
This release also includes a set of other updates, preparing the ground for the Spark port and contributing to our ongoing modernization of the Snowplow batch pipeline:
As always, the latest versions of EmrEtlRunner and StorageLoader are now available from our Bintray.
In order to leverage Spark Enrich and RDB Shredder, we’ve made some changes to our configuration YAML:
Don’t forget to update the
ami_version to 5.5.0 - the new Spark jobs will not run successfully on 4.5.0
Note that the
job_name is now part of the
emr:jobflow section, reflecting that the EMR job covers the enrichment and storage phases of the batch pipeline; for clarity the RDB Shredder and Hadoop Elasticsearch job versions have accordingly been moved to the
For a complete example, see our sample
The performance characteristics of Apache Spark are quite different from those of Apache Hadoop, and we strongly recommend that you make time for some thorough performance profiling and tuning as part of this upgrade.
Our experience to date, comparing Spark-based R89 to its Hadoop-based antecedents, is that R89 is more demanding in memory-terms, but much faster if those memory requirements are met.
Given that this is a hugely significant change to the Snowplow batch pipeline, we would appreciate any feedback regarding the performance of this release, be it improvement or degradation; we also want to hear as soon as possible about any regressions that might be Spark-related.
For any concrete bugs or feature requests, please open a ticket on our GitHub. For anything more discursive or subjective, please start a thread in our forums.
Upcoming Snowplow releases include:
For more details on this release, please check out the release notes on GitHub.
If you have any questions or run into any problems, please raise an issue or get in touch with us through the usual channels.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999298.86/warc/CC-MAIN-20190624084256-20190624110256-00040.warc.gz
|
CC-MAIN-2019-26
| 4,070 | 29 |
http://thegoodearth.blogspot.com/2004/12/holiday-carols-update.html
|
code
|
Here's the response from the Marketing Director at the local mall to my last post:
All of our shoppers celebrate the holidays in different ways. We want
to wish everyone a special holiday wish...and the use of Happy Holidays
crosses all religions.
I appreciate your comments. Thank you
I appreciate her prompt and proper response, but she missed the point of why this sign was so hilariously PC - the awkward paraphrasing of well-known Christmas song. I've been thinking of other songs that could be sanitized for the season:
OK, you get the idea. Any contributions?
Silent Night, "Wholly" Night
"Higher Being" Rest Ye Merry Gentlemen
Oh Come, All Ye Spenders
The First "Shopping Season" the Angel did say
Hark the Herald "heavenly beings that some believe in" sing
Joy to the World, "someone" was born
We wish you a Merry Solstice
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589634.23/warc/CC-MAIN-20180717090227-20180717110227-00306.warc.gz
|
CC-MAIN-2018-30
| 831 | 14 |
https://genealogyeducation.wordpress.com/2006/10/26/alternate-teaching-models-behavioral-models/
|
code
|
Based on the work of Skinner, a large number of approaches to learning have been developed, each taking advantage of the learner’s ability to modify behavior in response to tasks and feedback. Essentially, stimulus and response. These models are used in a wide variety of applications, from teaching information to changing habits, decreasing phobias, and learning to control one’s own behavior. In genealogy education I see this as most applicable to the learning of definitions, for example. The teacher supplies a list of terms to be learned by rote, and tests them. As I understand it if I assigned a list of terms to be memorized like
Then tested their knowledge with a quiz wherein they match the terms with definitions. This would be a behavioral approach.
One of the important applications of behavioral systems theory is in the development of systems that enable learning tasks to be regulated according to the progress of the learners and which teach students to pace themselves for optimal performance. Programmed learning, in other words. When the learner selects the correct definition he is rewarded. when an incorrect choice is made, the learner is cycled through a different channel to re-approach the same question disguised. Or to put it another way, these behavioral modelled programmed learning activities organize material to be learned in small sequenced instructional modules that are presented to the students with assessments of learning embedded in them.
Some of these behaviorally-based teaching models include mastery learning, direct instruction, contingency management, and self-training through simulation. Frankly it takes a very skilled instructional designer to pull this off, and rarely is done even moderately well in genealogy instruction. This leads to research performance problems. Back when “book ’em Dano” was commonly uttered by youngsters in Hawaii, and I was a student at Brigham Young University Hawaii, my instructional design prof made me read, Analyzing Performance problems or “You Really Oughta Wanna” by Robert Mager and Peter Pipe (Pearon Publishers, 1970). This is a guide to fine tuning behaviorist approaches to learning that failed. Still an interesting read if you can find it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500074.73/warc/CC-MAIN-20230203185547-20230203215547-00759.warc.gz
|
CC-MAIN-2023-06
| 2,249 | 4 |
http://www.greatcircle.com/lists/majordomo-users/mhonarc/majordomo-users.199710/msg00475.html
|
code
|
I have a list to which a lot of non-members post. The only reason that the
list is closed (restrict_post = list) is to ward off spam. Unfortunately, it
also requires me to have to approve a LOT of messages by hand.
Is there any recipe that I can use to allow the list to be open, but to catch
spam? Something like if the list name isn't in the To: or Cc: fields, then
reject it back to the list owner for approval.
Thanks - Jim
Jim Reisert <[email protected]>
SMC Massachusetts, Westboro, MA
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703592489/warc/CC-MAIN-20130516112632-00005-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 504 | 9 |
http://www.itprotoday.com/management-mobility/active-directory-recycle-bin
|
code
|
In the best of all worlds we wouldn’t be in a position where we needed to recover an Active Directory object that we have deliberately or accidentally deleted.
Aside: When writing examples for training kits, always make sure that you specify the clumsy subordinate, not the IT Pro, as the one that does something that might charitably be described as “creative”. That way the IT Pro gets to come in and save the day.
If you’ve ever had to boot into Active Directory Restore Mode to recover deleted AD objects, you know that the process of recovering them requires a little bit of patience. A big limitation of restore mode was that you could only restore objects to the point which they were at when you took the last system state backup. As most accidental deletions occur during directory reorganizations, the state the object was in when backed up probably won’t reflect the state it was in when it was deleted (unless you were smart and did your backup prior to mucking about with the structure of AD – which you should have, but lets not go there).
In Windows Server 2008 R2’s Active Directory, objects not only have a tombstone lifetime, but also have what is called a deleted object lifetime. When something is deleted in a W2KR2 environment, it can be restored using the Active Directory recycle bin during its deleted object lifetime. If that has expired, you can restore it within its tombstone lifetime using AD restore. The advantage with AD Recycle Bin is that you can restore objects to the point that they were at when you deleted them, not to the point they were at when you took the last backup.
The catch with Active Directory Recycle Bin is that all domain controllers must be running 2K8R2 and the domain/functional level must be raised to 2K8R2 as well. This means you cannot take advantage of this technology if you still have Win 2K3 DCs or even if you have a couple of vanilla 2K8 DCs.
Once the domain and forest functional level is at the appropriate level, issue the following command from an Active Directory PowerShell prompt that you are running as an administrator (when logged on to a DC in the forest root as a member of the Enterprise Admins account)
Enable-ADOptionalFeature –Identity ‘CN=Recycle Bin Feature,CN=Optional Features,CN=Directory Service,CN=Windows NT,CN=Services,CN=Configuration, DC=windowsitpro,DC=internal’ –Scope Forest –Target ‘windowsitpro.internal’
You can locate deleted objects either by using LDP.EXE and viewing the CN=Deleted Objects container or by using the Get-ADObject with the –IncludeDeletedObjects option from Active Directory PowerShell. You can restore objects using Restore-ADObject from Active Directory PowerShell. You can get examples of how to use each by issuing the get-help Get-ADObject and get-help Restore-ADObject commands from within Active Directory PowerShell. Microsoft also has some examples on the following TechNet page: http://technet.microsoft.com/en-us/library/dd379509.aspx
In the best of all worlds there would probably be a nice GUI front end to all of this so that you could simply right click on a deleted object and select Restore. Although Active Directory Recycle Bin saves us from having to reboot into Directory Services Restore Mode, until you are comfortable with the PowerShell commands (or LDP.exe), it can be a little fiddly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945669.54/warc/CC-MAIN-20180423011954-20180423031954-00597.warc.gz
|
CC-MAIN-2018-17
| 3,360 | 9 |
https://cvpr.thecvf.com/virtual/2023/poster/21830
|
code
|
We present ObjectMatch, a semantic and object-centric camera pose estimator for RGB-D SLAM pipelines. Modern camera pose estimators rely on direct correspondences of overlapping regions between frames; however, they cannot align camera frames with little or no overlap. In this work, we propose to leverage indirect correspondences obtained via semantic object identification. For instance, when an object is seen from the front in one frame and from the back in another frame, we can provide additional pose constraints through canonical object correspondences. We first propose a neural network to predict such correspondences on a per-pixel level, which we then combine in our energy formulation with state-of-the-art keypoint matching solved with a joint Gauss-Newton optimization. In a pairwise setting, our method improves registration recall of state-of-the-art feature matching, including from 24% to 45% in pairs with 10% or less inter-frame overlap. In registering RGB-D sequences, our method outperforms cutting-edge SLAM baselines in challenging, low-frame-rate scenarios, achieving more than 35% reduction in trajectory error in multiple scenes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948235171.95/warc/CC-MAIN-20240305124045-20240305154045-00491.warc.gz
|
CC-MAIN-2024-10
| 1,158 | 1 |
https://nim.nsc.liu.se/projects/5623/
|
code
|
Outdoor sparse sensing and superresolution of acoustic fields
|Outdoor sparse sensing and superresolution of acoustic fields
|Elias Zea <[email protected]>
|Kungliga Tekniska högskolan
|2023-11-04 – 2024-06-01
In this project, we will train artificial neural networks for the application of sparse sensing and superresolution of acoustic fields outdoors. The development of models to predict outdoor noise and the associated sources can enormously impact the well-being of communities exposed to high sound levels.
The project's overarching goal is to quantify the impact of noise pollution caused by air and land transportation near airports by transferring knowledge from canonical cases of acoustic fields measured inside rooms. As a first step, we will train and deploy convolutional neural networks and autoencoders to improve the spatial resolution (i.e., the number of microphones) and investigate the modal structure of the fields. As a second step, we will: (i) directly deploy the trained networks on field measurements near Uppländs Väsby and (ii) fine-tune and deploy the networks on such measurements. The problem can be solved for small training datasets without GPU capabilities, but for larger sets—especially outdoor scenarios—the situation is highly computationally intensive. Moreover, we are interested in testing the performance of the networks against various hyperparameters (e.g., depth, input/output resolution, types of activation functions, training set size, etc.), for which the HPC capabilities offered by Berzelius will be vital. Additionally, as we want to test larger architectures (e.g., GANs), GPU acceleration will be critical to speed up the training and tuning of the hyperparameters. We will use the project storage to load, save and access the data. We expect the project to start as soon as possible and be finished by the Fall of 2023.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817474.31/warc/CC-MAIN-20240420025340-20240420055340-00859.warc.gz
|
CC-MAIN-2024-18
| 1,886 | 7 |
https://gisandscience.com/2009/07/15/conceptual-framework-for-modeling-dynamic-paths-from-natural-language-expressions/
|
code
|
Abstract: Text documents frequently contain descriptions of different kinds of movements by individual persons, groups, animals, vehicles, or other moving objects. Comprehending and modeling the semantics of movement is an area of interest for geographic information science. In this article, we show how text documents that contain movement verbs can be analyzed for deriving representations of movement or dynamic paths. A conceptual framework is presented that provides the foundations necessary for deriving dynamic paths automatically from natural language descriptions and representing these dynamic paths in an information system, such as a geographic information system. In this research, a linguistic analysis of dynamic paths is presented and linked to a spatiotemporal representation of paths. We show how movement descriptions in text can be mapped to a set of elemental components including source, destination, route, direction, distance, start time, end time, and duration. Together, this set of path components captures the spatiotemporal characteristics of the path of a moving object as described using natural language. A systematic examination of these components builds a foundation for understanding more complex scenarios involving discourse (composed of consecutive sentences). Additional aspects reflecting important semantics about the movement characteristics of objects and discussed here are the shape of the path and granularity of modeling.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056297.61/warc/CC-MAIN-20210918032926-20210918062926-00696.warc.gz
|
CC-MAIN-2021-39
| 1,471 | 1 |
https://www.answers.com/Q/What_is_non_uniform_velocity
|
code
|
I assume you mean "non-uniform". "Uniform" simply means that the velocity (in this case) doesn't change.
Non uniform velocity is known as variable velocity.
in uniform motion velocity not changes with time but in non uniform motion velocity changes with time.
- Uniform Linear motion: with constant velocity. - Non Uniform Linear motion: with variable velocity.
That simply means that its velocity is changing.
In uniform motion, the velocity of the object is constant: both in magnitude and in direction. In non-uniform one or other (or both) of these will vary.
That means that something moves in a circle, but that the velocity is not uniform.
If there is acceleration (uniform or otherwise, but non-zero acceleration), the velocity changes. Constant velocity means that the velocity does not change.
During uniform motion, velocity is constant, so there is zero acceleration. Non-uniform motion involves a change in velocity, which means there is acceleration. Accelaration is a change in velocity. A change in velocity occurs when a body slows down, speeds up, or turns (changes direction), or a combination of these.
average velocity=displacement/total time taken
As long as it has a non-zero velocity, it will have a non-zero momentum.
When the velocity changes. And the velocity will change when the forces on an object change. For instance, some types of friction forces change as a function of velocity.
It isn't. Constant velocity? Uniform velocity across a group of objects?
The acceleratipn of a body with uniform velocity is zero. Acceleratipn is the time rate of change of velocity. If the velocity is uniform, then its time rate of change is zero.
'Uniform velocity' means constant speed in a straight line.
The change in the speed or velocity of the body is a accelation, accelation are of two types one is uniform accelation and and non uniform accelation...
it cannot be same as the acc. is not zero
motion that is always constant [Either acceleration or deceleration that is called uniform motion......... motion that undergoes a change in velocity,either by changing speed or changing direction,,,,,that.s changes are called non uniform motion......
If by motion you mean velocity it is non uniform, because the velocity is changing due the acceleration of gravity slowing it down to zero. Then at the maximum height motion is reversed and it accelerates downward back to its original speed but in the opposite direction.
no..the velocity changes,whereas acceleration remains uniform no..the velocity changes,whereas acceleration remains uniform
No, uniform angular velocity means no angular acceleration.
If the velocity is uniform, then the final velocity and the initial velocity are the same. Perhaps you meant to say uniform acceleration. In any event, the question needs to be stated more precisely.
Uniform velocity is velocity unaffected by acceleration. Variable velocity is velocity affected by acceleration. Lauren "Physics above all!"
"Uniform velocity" means zero acceleration, that is, constant speed in a straight line.rate of change of velocity is zero
! ! ! < ------ velocity ! ! ___________________________________________________! ! ! ! ! ! ! ! !______________________________________________________ time----->
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358033.38/warc/CC-MAIN-20210226234926-20210227024926-00448.warc.gz
|
CC-MAIN-2021-10
| 3,251 | 25 |
https://www.twinkletoestravel.com/group/dancing-around-the-world/discussion/9c4a6f07-bf12-47c7-ac5c-d12eaa0ff93b
|
code
|
Visual Studio C 6.0 Software Free Download
You can acquire the latest most secure version of Visual Studio 2019 version 16.11 by clicking one of the buttons above, by visiting the Visual Studio site, or by going to the downloads section of my.visualstudio.com. You can get updates from the Microsoft Update catalog. For more information about Visual Studio supported baselines, please review the support policy for Visual Studio 2019.
visual studio c 6.0 software free download
Download File: https://www.google.com/url?q=https%3A%2F%2Furlgoal.com%2F2tOkXG&sa=D&sntz=1&usg=AOvVaw0JJcXSUmfxqPQWKRHaAz6p
Visual Studio 2008 introduced the Visual Studio Shell that allows for development of a customized version of the IDE. The Visual Studio Shell defines a set of VSPackages that provide the functionality required in any IDE. On top of that, other packages can be added to customize the installation. The Isolated mode of the shell creates a new AppId where the packages are installed. These are to be started with a different executable. It is aimed for development of custom development environments, either for a specific language or a specific scenario. The Integrated mode installs the packages into the AppId of the Professional/Standard/Team System editions, so that the tools integrate into these editions. The Visual Studio Shell is available as a free download.
The final release of Visual Studio 2013 became available for download on October 17, 2013, along with .NET 4.5.1. Visual Studio 2013 officially launched on November 13, 2013, at a virtual launch event keynoted by S. Somasegar and hosted on events.visualstudio.com. "Visual Studio 2013 Update 1" (Visual Studio 2013.1) was released on January 20, 2014.Visual Studio 2013.1 is a targeted update that addresses some key areas of customer feedback."Visual Studio 2013 Update 2" (Visual Studio 2013.2) was released on May 12, 2014.Visual Studio 2013 Update 3 was released on August 4, 2014. With this update, Visual Studio provides an option to disable the all-caps menus, which was introduced in VS2012."Visual Studio 2013 Update 4" (Visual Studio 2013.4) was released on November 12, 2014."Visual Studio 2013 Update 5" (Visual Studio 2013.5) was released on July 20, 2015.
The GNU Compiler Collection includes front ends forC,C++,Objective-C, Fortran,Ada, Go, and D, as well as libraries for these languages (libstdc++,...).GCC was originally written as the compiler for the GNU operating system.The GNU system was developed to be 100% free software, free in the sensethat it respectsthe user's freedom.
Molecular visualization is a key aspect of the analysis and communication of modeling studies. If you need a commercial-grade graphics visualization tool for viewing, sharing, and analyzing protein and modeling data, complete the form below to receive the free Discovery Studio Visualizer for interactive 3D visualization.
The SAP Java Connector (JCo) and the SAP Java IDoc Library (JIDocLib) are available free of charge and can be downloaded from the SAP Support Portal. The license terms are pointed out on the download pages and in the documentation of these components.
Click on the green buttons that describe your target platform. Only supported platforms will be shown. By downloading and using the software, you agree to fully comply with the terms and conditions of the CUDA EULA.
DaVinci Resolve is the only solution that lets you grow and build your own multi user post production studio! The newly redesigned project libraries are built for real time local and remote collaboration. While the new Blackmagic Cloud lets you host and access your projects from anywhere in the world. Now you can collaborate with editors, colorists, visual effects artists, and sound engineers all working together at the same time. Best of all, you no longer have to import and export files, translate projects, lose work, or conform and manage changes. DaVinci Resolve is the only application in the world that lets everyone work together in parallel on the same project and at the same time! Learn More
MiniTool offers MiniTool Partition Wizard to help you manage disk. With it, you can easily clean up disk space, back up system, migrate OS, etc. Apart from this software, MiniTool also offers you other tools like MiniTool Power Data Recovery, MiniTool ShadowMaker, MiniTool MovieMaker, etc. You can download them from the MiniTool official website.
When you create certain apps or programs using Visual C++, the Redistributable packages are installed automatically. Some developers pre-package the runtime libraries inside their software setups. Alternatively, you can download them manually as well. I am providing you with the Links to download the Redistributable packages below.
During the installation it will check if you have all the components needed to run the software. If some of the required componets such as GPL Ghostscript are missing, it will suggest to download and install them for you.
Thanks for the articleI have met with an issue. All my installation files are in one folder and not on CDs. After choosing custom option,the installer is asking for visual studio 6.0Enterprise edition Disk 1, which I dont have as all installation files are in one folder. Can nyone help? Thank you in advance 350c69d7ab
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655027.51/warc/CC-MAIN-20230608135911-20230608165911-00743.warc.gz
|
CC-MAIN-2023-23
| 5,294 | 15 |
https://forum.choiceofgames.com/t/wip-9-21-20-demo-update-the-realm-of-steel/86092
|
code
|
I’ve begun work on my first game, The Realm of Steel (working title). In it, you play a knight who has lost everything. His home, his friends, his family… and maybe himself. But somewhere within him burns the desire for more… to give power to the oppressed and unify The Realm of Steel!
There are many ways to unification: Will you stay true to your roots and win the throne through honorable combat? Or will you turn your back on your morals and build a League of Assassins, eliminating both public and private enemies? Or maybe you just want to win yourself a castle and retire to the manor life. Then again, that is not what the voices want you to do… The choice is yours!
Currently it’s about 3% done, 10,000 words, and I plan on updating every week.
To play the demo, go here: https://dashingdon.com/play/jackpot1776/realm-of-steel-wip/mygame/
Things I plan to add in the near future:
-Add approximately 8-10 thousand more words to prologue
-Continue to enhance character customization
-Add stats adjustments to choices
-add additional choices to bandits and library scene
-tweak dialogue to make it seem like MC is being trained, not just an invincible 14 year old
-deal with difficulty settings (add variable changes)
-9/11/2020 First demo released
-9/12/20 Working stats screen now,both gender and various stats work now, fixed typos, a few more choices added as well (at the beginning updates will be quick and small, but will eventually come as larger, slower updates)
-9/13/2020 Revamped stats screen, added inventory and more goodies. Much more story now, more options, more branches. Wait… did I just die. Yep. You can die now. Plus, the first puzzle! Good luck Steel Brothers!
-9/14/2020 Additional character customization added. Gender choice is updated and fully functional. Additional choices written. Several hidden goodies. (Note: none of this will appear in the demo yet, as I am waiting to update the link until after I finish writing the prologue)
-9/16/20 More backstory created. Gender choice implemented. Character design implemented. Relationships in stats screen implemented. Lore implemented. Typos, bugs, miscellaneous fixed.Another 1,500 words (including code) added.
-9/20/20 Another 3000 words added. Bandit scene is mostly completed. Typos and bugs fixed. Added more to stats screen.
-9/21/20 Added a difficulty setting, which has effectively doubled my word count. Fixed various typos and bugs, reworked stats (again ugh). Changed MC’s age to 14, 8 was not working with the situation at hand. Rewrote the opening scene, removing future talk. Many, many changes added to easy mode.
-9/22/20 No update yet, but I added about 1000 words, mostly just extra choices in bandit battle. Fixed some stats. To small to garner a link update, so I didn’t.
Be mean in your comments! I want to make my game better, so give me some tough love!
To glorious victory or honorable death!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400211096.40/warc/CC-MAIN-20200923144247-20200923174247-00724.warc.gz
|
CC-MAIN-2020-40
| 2,918 | 21 |
https://www.odont.uio.no/iko/english/about/organization/units/biomaterials/news-and-events/2014/2014-notur.html
|
code
|
Notur - The Norwegian metacenter for computational
Notur serves the Norwegian computational science community by providing the infrastructure researchers at research institutes and industry.
Stallo is a compute cluster with HP BL 460c Gen 8 blade servers. It has the following configuration:
- The compute nodes have two 2.6 GHz CPUs from INTEL (Sandy Bridge), each compute node has 16 CPU-cores and 32 GB memory.
- 32 of the new compute nodes has 128 GB memory each and is available in the highmem queue.
- All new nodes is connected to the infiniband network. The network topology is island based with 128 compute nodes (2048 CPU-cores) tightly connected. All jobs runs within a single island, no jobs will be allowed to run across several islands. This limits the maximum job size to 2048 CPU-cores.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710900.9/warc/CC-MAIN-20221202082526-20221202112526-00725.warc.gz
|
CC-MAIN-2022-49
| 802 | 6 |
https://rpg.stackexchange.com/questions/169974/magic-missile-vs-damage-thresholds
|
code
|
The Dungeon Master's Guide has the following rule for objects (p.246):
Damage Threshold. Big objects such as castle walls often have extra resilience represented by a damage threshold. An object with a damage threshold has immunity to all damage unless it takes an amount of damage from a single attack or effect equal to or greater than its damage threshold, in which case it takes damage as normal. Any damage that fails to meet or exceed the object's damage threshold is considered superficial and doesn't reduce the object's hit points.
Page 119 of the DMG provides information for the statistics of a keelboat, which has 100 HP, 15 AC, and a damage threshold of 10. A wizard casts a 9th-level Magic Missile at the keelboat, creating 11 darts that do 1d4+1 force damage each. The darts each strike the keelboat simultaneously, and let's say they all do maximum damage for a total of 55 damage.
Now, does the keelboat take 55 damage or no damage at all?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817289.27/warc/CC-MAIN-20240419043820-20240419073820-00222.warc.gz
|
CC-MAIN-2024-18
| 956 | 4 |
https://zacdezgeo.medium.com/behind-the-scenes-of-the-forgotten-adapter-in-geospatial-4773f26aeb9c?source=user_profile---------8----------------------------
|
code
|
Behind the Scenes of The Forgotten Adapter in Geospatial
Applications of the Adapter Design Pattern in Geospatial
Why are design patterns used?
The use of design patterns is to apply the design of common solutions to similar problems. They are not precise implementations of code but a template for the context of a given problem.
Avoiding repetition is not enough to explain why design patterns exist. The design patterns have the intent of reinforcing clear principles. Our interest is embedding those principles in our architecture.
To quote Uncle Bob, the goal is minimizing the effort to build and maintain our systems. We use design patterns with this goal in mind. To reach this goal, we also seek to delay decisions (see “Clean Architecture” by Bob Martin).
What are the principles design patterns reinforce? If you are curious, you can read on the SOLID principles:
- Single responsibility
- Liskov substitution
- Interface segregation
- Dependency inversion
The Challenges with Design Patterns
Learning and understanding design patterns are easy, reapplying them is harder. Finding the right design for a given context is tricky. Even when we recognize an opportunity for the pattern, we must adapt it to our needs.
My series on geospatial design patterns presents typical applications of common patterns. These concrete examples provide the introduction for exploring common design patterns.
Why should we use the adaptor design pattern in geospatial?
Many reasons justify the use of the adaptor design pattern. We may want to protect our code from changes outside of our control. We could fit many different data sources to a given problem. We could even avoid costly commitments to a specific implementation outside of our control.
The greatest complexity in geospatial is in our data. The algorithms are straightforward once we narrow it down to our use case. The complexity comes in developing a scalable solution with many sources of data. Many companies thrive off of combining data sources. They partner with data-generating organizations and create a centralized API. They can then sell access to the API. We can apply their same strategy in our development operations.
Geocoding Service Example
Geocoding is the simple process of associating coordinates with an input. The most common inputs being address and common names. For most address-management and mapping applications, our goal is retrieving those coordinates. It should be simple, but the geocoding landscape is far more complex than you would expect. Vendors use different ways of representing the precision or the confidence of the geocoding results. Some even have complicated terms and conditions (ToC) for storing data. There is no one-size-fits-all. The right solution for your needs is harder to find than you think.
Teams build their application around a commitment to a single vendor. As their application evolves, they rely more and more on their vendor's choices. With time, there will be a mismatch between the vendor and the team’s needs. The vendor could reap havoc by making unexpected changes to the API. A competitor could emerge as a preferred option. Making a switch can be costly when we have committed to the same vendor for years.
Using a single vendor could also be a missed opportunity. Justifications could be price optimization or developing a best-of-breed scenario using many vendors. The adapter pattern can help you avoid vendor lock-in.
Two different vendors are in the schema but we could use as many as we want.
We define the standard of our application with the geocode interface. Having a geocode interface brings stability to the other components of our application. The other components can rely on the interface knowing that we control the changes brought to it. The adapter (or wrapper) classes are an implementation of our geocode interface. They adapt the parameters of the interface to call the specific vendor method. In this case, both vendor geocoding methods use the same parameter: a single line address. Since vendors can change their API from each other, we define distinct wrappers.
Real Estate Data Example
Centralized real estate data is hard to access because of its proprietary nature. It is in the best interest of realtors to keep their information for themselves. They will only share their information to benefit their transactions. An entire business evolved to enable realtors to collaborate: “Multiple Listing Service” (MLS). For more information on the different MLS in Canada, you can visit this link.
Every organization does not follow the same conventions for their property data. Different standards have been created, the most recent being RESO. Not every realtor seems to conform to the standard.
We can use the adapter pattern to integrate different real estate data sources. The RESO standard could even be considered overkill for your mapping application. Having coordinates and a link for every property could suffice. The adapter reduces our vulnerability to new standards and changes to any APIs.
Get In Touch
When have you made use of the adapter pattern? Do you see immediate benefits of using it within your application?
Reach out! I would love to hear what other design patterns you are using in your geospatial application!
Thanks for reading.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00565.warc.gz
|
CC-MAIN-2023-50
| 5,312 | 31 |
https://bitcoin.stackexchange.com/questions/38343/block-chain-library
|
code
|
I was wondering if there are any open source blockchain libs that I could use to build a project with?
I agree. With my knowledge of bitcoin now and blockchain - I should have phrased this question better.
What I am looking for is a pure blockchain implementation (lib) that can be used to implement anything I want on top of it, one implementation could be bitcoin. This "blockchain 2.0" would not have the same limitations as blockchain today (hardcoded values, flexible message size, enhanced scripting language, etc..).
Lots of startups, companies, etc... implement their own blockchain because the bitcoins'version has been designed for bitcoin - it has not been designed to deal with other business problems.
Now I hope you see what I mean. But now I understand that I have to either do a hardfork of "bitcoin" and strip out "blockchain" - or I can try to find this "blockchain 2.0" that - for example - bitcoin could fork and be based on.
Do not be too quick to mark down. If it would be obvious, I would not ask for it ;-)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251669967.70/warc/CC-MAIN-20200125041318-20200125070318-00490.warc.gz
|
CC-MAIN-2020-05
| 1,030 | 6 |
https://www.velocityreviews.com/threads/a-confusion.664499/
|
code
|
Hi guys,\nI'm currently studying for the A+ one night a week at college and with the\nAll-in-one book. There seem to be quite a lot of discrepancies between\nhandouts and class work our tutor gives and the book. \nFor instance, CPU characteristics... there is an awful lot to remember and\nalthough I'm happy to knuckle down and memorise stuff, I wanna memorise the\n'right' stuff! In your experience, are Chip, Year, Data Bus Width, Address\nBus Width, Speed, Socket/Pins and L2 Cache all needed and to that point,\nhow far back in time should I learn ie. before Pentium or just from that\npoint on? \nIs it best to go with the Mike Meyers *bible*? \nAny other advice welcomed!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358078.2/warc/CC-MAIN-20211127013935-20211127043935-00400.warc.gz
|
CC-MAIN-2021-49
| 678 | 1 |
https://lontar.eu/en/keyboards/balinese/support.html
|
code
|
Support: Aksara Bali
Which iOS fonts support Balinese characters?
iOS 13 and later come with Noto Serif Balinese, a reasonably functional Balinese font. iOS 10, 11, and 12 provided Noto Sans Balinese, which is not fully functional. The Aksara Bali app therefore contains a Balinese font named “Ubud”, which can be installed from within the app. The Ubud font is a significantly enhanced version of Noto Sans Balinese 1.0. Here are the three fonts in comparison:
Which characters are supported by the Ubud font?
The font supports all Balinese characters defined in the Unicode standard, including the ones used for the Balinese language, for the Sasak language, and musical symbols.
How do I make the Ubud font available to other apps?
To make the Ubud font available to other apps, go to the Font pane of the Aksara Bali app, tap the “Ubud” button, and continue until the installation is done. In iOS 12.2 through 12.4.8, you’ll then also have to go to the Settings app, look for an entry “Profile Downloaded” near the top, tap it, then tap “Install”, and follow the steps to complete the installation of the Ubud profile until “Done”.
Do all iOS apps work with this font?
On iOS 13 and later, the Ubud font only becomes available in apps that let users choose fonts using an OS-provided font menu, including Pages, Keynote, Numbers, Notability, Affinity Designer, Photoshop, Clip Studio Paint. Users can then choose it from the font menu to apply it to Balinese text. All other apps on iOS 13 and later use Noto Serif Balinese. On iOS 10, 11, and 12, the Ubud font becomes available to all apps, including Safari, Messages, and more; it effectively replaces Noto Sans Balinese. Most iOS apps will work with the Ubud font once it’s available to them. One known exception is Microsoft Word, which uses its own and less capable font rendering.
Why does Balinese text render differently in other apps?
If you see Balinese text rendered differently in other apps than in the Aksara Bali app, this can have different reasons. First, you have to make the Ubud font available to other apps, as described in “How do I make the Ubud font available to other apps?”. Second, on iOS 13 and later, the font only becomes available in apps that let users choose fonts, and users have to choose it from the font menu, as described in “Do all iOS apps work with this font?”.
Why can’t my friends see Balinese text that I post on social media?
You can post Balinese text either in the form of text, or in the form of an image.
If you post in the form of text, then to see that text displayed on their devices, your friends need to have a Balinese font installed, just like you:
- For iPhone and iPad, they can also get the Aksara Bali app, or upgrade to iOS 10 or higher.
- Android 5.1 and higher should have a Balinese font preinstalled. If it’s missing, there’s unfortunately no way to install one.
- For Windows 10 or for Firefox on older Windows, they can download and install the Noto Sans Balinese font.
To post as an image, type the text in the Aksara Bali app, then tap the Share button. This creates an image and brings up a dialog that lets you choose what to do with the image.
Which characters are provided by the Balinese keyboard?
The Balinese keyboard provides all Balinese characters used for the Balinese language; this includes letters, marks, digits, and punctuation. The keyboard for iPhone has three layers: commonly used characters, less commonly used characters, and digits and punctuation. The keyboard for iPad has two layers: commonly used characters, less commonly used characters including digits and punctuation. Gantungan and gempelan are entered as combinations with the character adeg adeg – see below.
How do I make the keyboard available to other apps?
To make the Balinese keyboard available to other apps, go to the Keyboard pane of the Aksara Bali app, and follow the instructions there.
How do I type consonant clusters with gantungan and gempelan?
In order to type consonant clusters with gantungan and gempelan, insert the Balinese character ◌᭄ (adeg adeg) between Balinese consonants. For example, for the Balinese word ᬦᬗ᭄ᬓ (jackfruit), type ᬦ ᬗ ◌᭄ ᬓ.
Why does the keyboard show some characters in color?
Several Balinese digits look like Balinese letters, for example, the digit eight, ᭘, looks like the letter ᬨ (pa kapal). However, in Unicode digits are separate characters, and some software, such as spreadsheets, may depend on the distinction. The keyboard therefore highlights the digits in color.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817289.27/warc/CC-MAIN-20240419043820-20240419073820-00222.warc.gz
|
CC-MAIN-2024-18
| 4,594 | 26 |
https://www.vn.freelancer.com/projects/javascript-net/coupon-site/
|
code
|
We are looking to have a site designed similar to that of [url removed, login to view]
DealVogue is similar to LivingSocial, however, we would prefer to offer a limited number of coupons. (for example: 300)
This number will change as per client.
The site will require all of the features of a regular group biuying site. Merchant login, User Login, admin login with all features including facebook and referral credits.
We will also require the payment page to be in this form:
[url removed, login to view]
Only bid if you have experience with similar projects, and have a similar working model.
Payment will be made once project is complete and tested for bugs.
am looking for a sharp web developer who understands Groupon and have skill on design graphic to build a Groupon-like website with all the functionality of Groupon and Livingsocial. Also you will build the mobile Application (Iphone + Android + Ipad), the Facebook application and the Affiliate widget. This person or this team must be update with current trends in the Market. So for the project, the developer must build a Groupon spinoff, create the website, maintenain everything. I would like to be able to use a demo of the website so that we may check the functionality prior to purchasing or you can create one. The site must have a search engine. Also users must be able to find a voucher when they browse the deal categories on home Page. The site should have a bloc where users can browse all categories. The merchant must be also able to schedule a time or specific moment on the day for their voucher or when they want our users to present the coupon to their store. You should integrate the Live chat, the Wibiya toolbar and the Video How is Works in the site. I need a free bug for the site and the application. You will have also to create and design my following FanPage for my coupon site: Sonico, Twitter, Facebook, Myspace, Hi5, Bebo, Friendster. Users must be able to buy a coupon deal directly on these FanPage like on the Facebook App that you will develop for us. So, you will have to make an application that will allow us to present and sell our coupon deal inside these fanPage. The site, the mobile application and the widget must be in ENGLISH, FRENCH and SPANISH. The affiliate widget will be in 3 different sizes that I will tell you. Please only bid if you think you are able. At the end of project, you will send me all the code and image use for build the website and the mobile application in a compress file. So be sure, you will deliver on time and you will meet the requirements. If you think you will not respect your word, please don’t bid. On my side, I guarantee you that I will respect my engagement too. My time and my budget are limited but I’m open to any reasonable proposal. I will communicated with you by PM or email. I am looking for a long term partner who can deliver on time, has good track record and communication skills. I will release milestone payment just if a part of the project is completed to my satisfaction. You will have to send the schedule of how long will take you each part of the project. NO ANY PAYMENT BEFORE TO SEE EACH PART COMPLETE.
Users receive an email; visit the site to buy the deal, the deal becomes valid once a certain number of deals are bought. Once the deal is valid, users’ credit cards are charged and users receive an email with a personalized printable voucher or coupon code (for online retailers). Development of this project must be fast and I require developers who already have done similar group buying website project. The application must be available on the Iphone App Store, Android app and the Facebook Appstore for free with our are ID.
The website needs to be secure and protect private user data. No copyright laws/ intellectual property rights should be broken. Also, you will have to build everything:
I don’t want cheap stuff. The program language is Python web framework-Django and the App with Ruby on Rails.
Milestone payment schedule as outlined below:
- 5% on completion of requirements discussion and start of project coding
- 25% on first version with functionality and no bug: Site + Mobile App+ all FanPage + Widget
- 20% on development completion with hosting setup.
- 50% one month after launch with no bugs detected
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866984.71/warc/CC-MAIN-20180624160817-20180624180817-00136.warc.gz
|
CC-MAIN-2018-26
| 4,307 | 17 |
https://forum.netgate.com/topic/160799/wan-failover-to-usb-lte-failing
|
code
|
WAN Failover to USB LTE... failing
I recently acquired a Pantech UML295 USB LTE modem (Verizon) and have connected it to my Protectli firewall box. pfSense recognizes the device and shows the USB_LTE gateway as up (I see very minute amounts of traffic on the traffic graph) and I've configured WAN Failover per the official Netgate docs, but when I try yanking my primary WAN cable, all traffic grinds to a halt.
I did test the USB modem in my Windows laptop and connectivity worked as expected, so I know at least that much works. I even tried removing the "Block RFC 1918 networks" rule from the USB_LTE device just in case there was something there that was blocking connectivity on the 192.168.32.x network, but I can't for the life of me figure out where the issue if or how to troubleshoot.
Has anyone gotten a similar configuration to work? At this point I'm trying to decide if the issue lies with pfSense or with the modem.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710900.9/warc/CC-MAIN-20221202082526-20221202112526-00521.warc.gz
|
CC-MAIN-2022-49
| 932 | 4 |
http://forum.dataton.com/topic/2410-display-computer-transferring-files-not-needed-for-display/
|
code
|
I am working with a system of five display computers. One of the computers is transferring files that it does not need for the show. This in turn, is filling the hard drive. Every time I go online the computer wants to transfer files that it has no room to store. This computer is not displaying any of the files it wants to transfer.
I have tried updating the cache with no change.
Any ideas or thoughts welcome.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815034.13/warc/CC-MAIN-20180224013638-20180224033638-00403.warc.gz
|
CC-MAIN-2018-09
| 413 | 3 |
https://community.flexera.com/t5/InstallShield-Forum/Uninstall-does-not-remember-global-variable-feature-target/m-p/116181
|
code
|
I am writing an installer to install data to a different, user-defined location than the application code. The "App Code" feature is being installed to TARGETDIR, and "App Data" is being installed to DATA_DIR.
The dialogs, installation and uninstallation are working, almost. The problem is at the end of the uninstall process (OnMaintUIAfter), I need to call my custom function RemoveEmptyFolders(/*string*/ path, /* bool */ removeRoot) which recursively deletes all empty folders from the data directory, including the root folder, if removeRoot = TRUE. At this point, RemoveEmptyFolders() does not know DATA_DIR on uninstall, but it remembers TARGETDIR.
I declared DATA_DIR as a global STRING variable. Data components are defined to install at <DATA_DIR>\whatever_subfolder, and they are associated with the "App Data" feature. FeatureSetTarget("App Data", "<DATA_DIR>", path) worked to get the feature and all its components to install to the correct place.
On uninstall, all files are successfully removed from both TARGETDIR and DATA_DIR. However there are a bunch of empty folders left over inside the DATA_DIR folder. So RemoveEmptyFolders() didn't work for that location. It worked for TARGETDIR, so it's not the function itself.
Debug messages reveal that InstallShield has no idea what DATA_DIR is at uninstall time. RemoveEmptyFolders() started trying to traverse paths I've never even seen before, that start with .\whateverfolder. Yikes. I put in a check to make sure the path != "", so at least it won't do that anymore.
How did InstallShield know where to uninstall the "App Data" files from? How can I grab that path value at uninstall time, so I can pass it to my function and delete empty folders? If the DATA_DIR value is not in the log, then what IS in the log that tells InstallShield where to uninstall the "App Data" files?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573744.90/warc/CC-MAIN-20220819161440-20220819191440-00135.warc.gz
|
CC-MAIN-2022-33
| 1,848 | 6 |
https://andychip.com/about/
|
code
|
Now in my second career, I’ve been designing experiences and interfaces since 2001. In 2016, I moved from the UK to settle in Vancouver with my wife and 2 young children.
Away from the screen, I enjoy making tangible things with my hands. I’m an acrylic and resin artist and dabble in woodworking when I can. I also home-brew and roast coffee.
I hand-coded my first website in notepad in 1997, but today I help start-ups get early product iterations to investors, and help mature businesses design & build user-centered and data-informed digital products.
I run SuperMassive, a website dedicated to helping people new to UX learn the terms and techniques behind designing a great experience.
Now in my mid-forties I continue to enjoy experimenting and learn new skills. I believe that we can build better things when we share experiences, learn from each other and work together.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100290.24/warc/CC-MAIN-20231201151933-20231201181933-00736.warc.gz
|
CC-MAIN-2023-50
| 883 | 5 |
https://www.fentek-ind.com/init.php/online-doctor-prescription-ambien/
|
code
|
Xanax for use that may be addictive. A legitimate online for oral on your prescription when sam's doctors. In which home delivery ambien without doctor prescription sedative, mask, get prescriptions faqs how do you medicate! Caremark administers your pharmacy sep 01, if you would take zolpidem zolpidem no prescription refill it is a friend. S prescription, 2008, 2013 washington for instant medical advice for pain network provides anytime access to the dangers of insomnia. Doctors 24 hours a million answers. However, 2015 buying ambien online. Because your health care made easy steps. Shipping, humidifier, cheap zolpidem ambien: doctors. Personalized prescriptions to take care blog. However, compare prices guaranteed worldwide shipping, and packaging. Exclusive competitive discount fedex shipping discreet package low answers on line services fees.
Doctors prescriptions for his addiction is confusing. On it works – online. Myidealdoctor offers online pharmacies fueling the differences between ambien. Eyelid surgery can supply prescription-only as cytotoxic of drugs. Do doctors prescribe me valium last week, penlac antifungal nail prescription number. Illness or gain sympathy to side effects of visiting a prescription sleeping aid. Top the best buy top quality! Medicare part d medicare s goal is an order viagra without doctor consultation, cheap ambien stem blog. These are: allow some doctors deliver care of women can be.
which carries a prescription buy zolpidem or visiting familymeds. Following an extended-release tablets, uses, information is an ambien. Oct 01, i've been halving http://www.deprice.com/index.php/effects-of-ativan-on-the-elderly/
doctor. Irl i before starting or veterinarians dvm, independent labels. Pharmacy most significant health and we are you receive additional data collection. Contact with the brands doctors in usa doctors prescribe generic cialis. Highlighted are never doctors deliver care via online next day shipping, also called a weight loss, cost, withdrawal symptoms. Generic pharmacy is the fda change in making sure you for your drug plan? Shipping - the idea to have over the abuse? How to get your state lighting, and lunesta pharmacology. Discover patients information for a prescription medications in particular. Click to me jan 09, brand name for sale online doctor anytime access to provide more time! Other uses, ambien without prescription.
2004 apr; are addicted to manage your best pharmacies and competitive discount! Foster smith: what's right place to restrict prescriptions; forging ambien price, css, in the four agreements ambien online! 12, safety and other pharmacies and licensed canadian pharmacy that is a disagreement with ps card. More about how to decipher what is a prescription diet pills from home. Find a sedative, released with an ultimate user ratings. First go to get answers to reduce their effects, and medicaid online. Known greatest deals on the us.
Get ambien prescription online
- According to get your door.
- Our large volume and over the world as edluar, an appointment: specialty i can arrange statdoctors is easy. Highlighted are no prescrip required.
- Guaranteed worldwide shipping discreet worldwide shipping.
- Movimento is very strong sleep drugs in missoula, emergency rooms, provided for instant medical consultations with your doctor shopping charges.
- 1200 online online next day canada zolpidem affects the medicine, therapists and time.
- There are legally order clonazepam, canada. Callmd is meant to decipher what is ambien overnight ambien; order asig low prices guaranteed worldwide shipping, or a problem!
Online consultation prescription ambien
On quality, only 2.20 per pill abuse kills more time. Compare prices low a high risk of the right for xiomaraw to pharmacy. Cod where to side about the pharmaceuticals. Read your brain that tell me valium 5 mg cost. Prices guaranteed worldwide shipping, purchase zolpidem 0 ambien ambien, how to you would like morphine and abbreviations. Erika krumbeck nd, withdrawal occurs when medically necessary and save up to go to enhance your prescription for insomnia. The lowest ambien clarinex tartrate feb 04, stilnox vs ambien.
Consult with sleep aid which carries a. I've been becoming more info about how to acquire more. Board-Certified doctors have answers to ask the storeroom. The counter medications that ambien no prescription cards in your prescription or without a monster case of prescription. Lasik online pharmacy reviews soma
about the doctor's prescription ambien zolpidem no prescription. Lasik information about veterinary prescriptions generic zolpidem tartrate coupon code editor. Educate before he received from out a sleep outselling popular remedy. Plus 100% safe, fast discreet package find a safe. Reidbord responded: buy ambien without a sedative, hair loss, precautions a schedule. Zolpidem with doctor prescription drug ambien without prescription drug prices and save money on zolpidem no rx. Its causes, it is health care blog.
Request form is to treat insomnia to supplement, get up-to-date information on your entire family doctor. Effective means of ambien is one buy online medical family doctor wrote him a problem! Com existing prescriptions as well. Please our licensed physicians, prescriptions. Highlighted are ambien prescriptions drugs could soon help treat insomnia--a condition characterized by my doctor to offer! If you do to buy ambien online doctor consultation buy antibiotics from out of drugs often just as hypnotic. Ambien zolpidem solubility, period of the differences between ambien online.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662509990.19/warc/CC-MAIN-20220516041337-20220516071337-00177.warc.gz
|
CC-MAIN-2022-21
| 5,610 | 17 |
https://reactionguessr.herokuapp.com/
|
code
|
Dear talented chemist,
Here you will find a usefull tool to exerce your brain and learn perfectly Named Reactions.
At the moment "Strategic Applications of Named Reactions in Organic Synthesis" is the main reference feeding ReactionGuessr.
If you find any mistake, feel free to contact me by clicking here. Feedbacks will be always appreciated.
Don't hesitate to share ReactionGuessr with your group and classmates.
Find the correct answer among ten propositions.
Find the correct answer among all reactions.
Find the correct answer without any help.
From the name, find an example of the reaction.
The catalog gather all the reactions you can face in the different modes of ReactionGuess.
For each reaction, you will find an external link for the mecanism, one of the original references and of course an example of the reaction.
The catalog will be updated in the next version of ReactionGuessr. It will contain more reactions and details about them.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400213454.52/warc/CC-MAIN-20200924034208-20200924064208-00505.warc.gz
|
CC-MAIN-2020-40
| 952 | 12 |
https://www.nextgadgets.net/product/robotime-rotatable-starry-night-wooden-diy-84-pieces/
|
code
|
Rotatable Starry Night Information
Music play: memory (from cats).
Wood piece: 84pcs;
Assembly time: about 3 hours.
Recommend age: 14+, children under the age of 14 can complete the assembly accompanied by their parents.
Assemble size: 135*135*155 mm
Package size: 271*192*69 mm
Notice: Wax is not included if shipped from China. Due to customs restrictions, can be replaced by a candle.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153892.74/warc/CC-MAIN-20210729172022-20210729202022-00140.warc.gz
|
CC-MAIN-2021-31
| 387 | 8 |
https://motherboardpodcast.com/about/
|
code
|
A podcast of conversations with mothers working in technology, sharing their stories, challenges, triumphs, and ideas for change.
Motherboard is a collection of conversations with mothers working in technology—sharing their stories, challenges, triumphs, and ideas for change.
The show addresses the need for better role modeling around the transition to parenthood for women. Already isolated as a minority in tech, women can feel even more like outsiders when becoming the first parent on their team, or needing to pioneer parental leave benefits at their companies.
Through interviews, the show records and disseminates the stories of mothers from Google, Github, Microsoft, and other companies, as well as solopreneurs and women in states of transition, as they navigate pregnancy, maternity leave, and the return to work. Guests with a variety of parenting situations talk about their company benefits and other support systems, successes and challenges, and their most valuable lessons learned.
Previous interviews have included Camille Fournier’s promotion to CTO of Rent the Runway while pregnant, Jean Hsu’s mission to parent equally with her husband while a developer at Medium, international speaker Jen Myers’ strategies for single parenting, Rebecca Murphey’s adoption story while working at Bazaarvoice, and Jenni Snyder’s improvements to re-boarding mothers post-parental-leave at Yelp, among others.
Motherboard archives the concrete stories and experiences of mothers in tech, with new episodes released every couple of weeks. By gathering knowledge from mothers at disparate companies and sharing it among the tech community, we can avoid wasting energy on problems that have already been solved, and help women get back to work as seamlessly as possible.
About the Host
Kathryn Rotondo is an independent developer. In addition to her award-winning work at digital agencies and startups, she has taught at RISD Continuing Education, co-wrote Adobe AIR in Action, and speaks internationally (O’Reilly Fluent, Mobile Central Europe). She won the first ever Berlin Geekettes hackathon in 2013.
The interviews, excluding theme music and sponsor reads, are released under the following license:
Motherboard Podcast by Kathryn Rotondo is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475897.53/warc/CC-MAIN-20240302184020-20240302214020-00061.warc.gz
|
CC-MAIN-2024-10
| 2,347 | 10 |
https://community.ivanti.com/thread/12648
|
code
|
This is making me a bit uncomfortable as we have a large number of clients who rarely (if ever) connect via VPN.
Core: LDMS 9 non SP1 on Windows 2008 r2
Client: LDMS 9 agent on Windows 7 Enterprise 64-bit
My own PC has been working fine for a few months however, today I noticed that it was unable to communicate to the core server using the management gateway. Nothing has changed on my pc that I know of.
I took a look at the BrokerConfig.exe and it states:"The client certificate is not present. Select Send to retrieve a certificate"
I know that it was working fine so my question is:
Why would it all of the sudden drop the certificate? And more importantly, how would I know if other computers are having this problem?
Here is the BrokerConfig.exe screenshot:
And here is the folder showing that it has had certs in the past:
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584332824.92/warc/CC-MAIN-20190123130602-20190123152602-00300.warc.gz
|
CC-MAIN-2019-04
| 831 | 9 |
https://urc.library.harvard.edu/event/urc-brown-bag-series-user-centered-design-instructors?delta=0
|
code
|
Join us for User-Centered Design for Instructors presented by Amy Deschenes and Emily Coolidge-Toker.
In this workshop participants will learn how to apply content strategy and user-centered design practices to learning objects. Learning objects include deliverables like handouts, slide decks, videos, webpages, Canvas modules, Libguides, and others. Participants will leave the workshop with a concrete action plan for creating an effective learning object.
To participate you can either bring a new project you’re working on or you’ll help out a fellow participant with their project. During the workshop you’ll learn about user-centered design techniques. Then, you’ll work in break-out rooms with a team to develop content goals, user stories, and learning goals for either your own or another participant’s project.
At the end of the session you’ll have a game plan for a learning object, and be able to successfully apply user-centered design strategies to future learning object development.Please register through LibCal to receive the Zoom meeting details.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499890.39/warc/CC-MAIN-20230131190543-20230131220543-00620.warc.gz
|
CC-MAIN-2023-06
| 1,078 | 4 |
http://photoshopelementsandmore.com/thread/5327/old-styles-textures-patterns-brushes
|
code
|
Going through and "cleaning out" the computer. Ran into old PSE 6, 8, and 9. Looking at the Presets in each and ran into some brushes, etc. that are not part of PSE 18. Can these old files be dragged into the respective preset files and work in 2018? Thought I would check here before starting this process in case there are some problems with doing this - and I don't want to reinstall 2018 again. Thanks for any insights. ~bruce.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315222.56/warc/CC-MAIN-20190820045314-20190820071314-00099.warc.gz
|
CC-MAIN-2019-35
| 431 | 1 |
https://www.apppicker.com/apps/511954947/ride-guelph
|
code
|
Ride Guelph is an application that allows you to view all bus routes, stop locations and real time bus arrivals for the city of Guelph transit system. All information is accurate and always up to date.
Ride Guelph provides the following features:
- view all buses and their real time schedules
- search by stop number
- search stops by street name
- search stops by address
- add your stops to favorites
- read up to date information on transit from Transit Tweet
- instantly report bugs and provide feedback about the app
- automated data refresh and the ability to manually refresh data for greater accuracy
- and much more ....
This application is not an official product of Guelph Transit. The data, however, was obtained from Guelph Transit. This application was developed by Gaptel Innovative Solutions Inc (Gaptel). Gaptel has no affiliation with Guelph Transit. Gaptel assumes no responsibility for the accuracy of the data used in this product or services. However, every effort has been made to ensure that data are accurate.
In order to strive to give you up to date bus route and stops data, this app will from time to time utilize your provider's network to obtain such data as needed. Gaptel will not be responsible for any damages or losses arising from the use of this application. The user is responsible for any extra associated costs that may be incurred with their service provider as a result of the use of this application.
Your bus riding experience will never be the same again. You now have the power to know what bus, which stop and when all in the palm of your hand.
Spread the word…
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988759.29/warc/CC-MAIN-20210506175146-20210506205146-00387.warc.gz
|
CC-MAIN-2021-21
| 1,612 | 15 |
https://support.huawei.com/enterprise/en/knowledge/EKB1000082808
|
code
|
Does DB configuration clearing affect licenses?
Theoretically not. However, you are advised to back up license files before clearing DB configurations.
License files are stored in /OSM/bin/license.bat. You can log in to a storage device in debug mode to view the path for storing license files.
Storage:~ # cd /OSM/bin/
Storage:~/bin # ls
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986669057.0/warc/CC-MAIN-20191016163146-20191016190646-00498.warc.gz
|
CC-MAIN-2019-43
| 338 | 5 |
https://serverfault.com/questions/265441/wget-application-replacement
|
code
|
Is there any other application similar to wget?
If yes can you post a link?
You may look at Curl. Quoted from Curl Website.
curl is a tool to transfer data from or to a server, using one of the supported protocols (DICT, FILE, FTP, FTPS, GOPHER, HTTP, HTTPS, IMAP, IMAPS, LDAP, LDAPS, POP3, POP3S, RTMP, RTSP, SCP, SFTP, SMTP, SMTPS, TELNET and TFTP). The command is designed to work without user interaction.
curl offers a busload of useful tricks like proxy support, user authentication, FTP upload, HTTP post, SSL connections, cookies, file transfer resume and more.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540531974.7/warc/CC-MAIN-20191211160056-20191211184056-00327.warc.gz
|
CC-MAIN-2019-51
| 569 | 5 |
https://www.seedtospoon.net/our-garden-is-where-we-test-things-so-you-dont-have-to/
|
code
|
In this video we discuss about how we use our backyard garden as test beds so we can learn how to best help you out in yours!
We started growing food 🥦🍅🌶 to fight anxiety & depression. Gardening 🌱 & the lifestyle associated radically improved our lives and we made our free app 📱to make it simple for anyone to grow their own food and transform their lives in the way that we did.
Download our free app 📱 and learn more about our story & download @ www.seedtospoon.net
See full backyard tour at https://www.youtube.com/watch?v=Y67eQFsLxDs
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304876.16/warc/CC-MAIN-20220125220353-20220126010353-00612.warc.gz
|
CC-MAIN-2022-05
| 556 | 4 |
https://wiki.openoffice.org/wiki/Documentation/OOo3_User_Guides/Getting_Started/Applying_styles
|
code
|
- Applying styles
- Modifying styles
- Creating new (custom) styles
- Copying and moving styles
- Deleting styles
- Using a template to create a document
- Creating a template
- Editing a template
- Adding templates using Extension Manager
- Setting a default template
- Associating a document with a different template
- Organizing templates
- Examples of style use
Apache OpenOffice provides several ways for you to select styles to apply.
Using the Styles and Formatting window
- Click the Styles and Formatting icon located at the left-hand end of the object bar, or click Format > Styles and Formatting, or press F11. The Styles and Formatting window shows the types of styles available for the OOo component you are using. You can move this window to a convenient position on the screen or dock it to an edge (hold down the Ctrl key and drag it by the title bar to where you want it docked).
- Click on one of the icons at the top left of the Styles and Formatting window to display a list of styles in a particular category.
- To apply an existing style (except for character styles), position the insertion point in the paragraph, frame, or page, and then double-click on the name of the style in one of these lists. To apply a character style, select the characters first.
Using Fill Format mode
Use Fill Format to apply a style to many different areas quickly without having to go back to the Styles and Formatting window and double-click every time. This method is quite useful when you need to format many scattered paragraphs, cells, or other items with the same style.
- Open the Styles and Formatting window and select the style you want to apply.
- Click the Fill Format mode icon .
- To apply a paragraph, page, or frame style, hover the mouse over the paragraph, page, or frame and click. To apply a character style, hold down the mouse button while selecting the characters, Clicking on a word applies the character style for that word. Repeat step 3 until you made all the changes for that style.
- To quit Fill Format mode, click the Fill Format mode icon again or press the Esc key.
|When this mode is active, a right-click anywhere in the document undoes the last Fill Format action. Be careful not to accidentally right-click and thus undo actions you want to keep.|
Using the Apply Style list
After you have used a style at least once in a document, the style name appears on the Apply Style list at the left-hand end of the Formatting toolbar, next to the Styles and Formatting icon.
You can open this list and click once on the style you want, or you can use the up and down arrow keys to move through the list and then press Enter to apply the highlighted style.
Using keyboard shortcuts
Some keyboard shortcuts for applying styles are predefined. For example, in Writer Control+0 applies the Text body style, Control+1 applies the Heading 1 style, and Control+2 applies the Heading 2 style. You can modify these shortcuts and create your own; see Chapter 14 (Customizing Apache OpenOffice) for instructions.
|Content on this page is licensed under the Creative Common Attribution 3.0 license (CC-BY).|
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652207.81/warc/CC-MAIN-20230606013819-20230606043819-00692.warc.gz
|
CC-MAIN-2023-23
| 3,130 | 31 |
https://nairapreneurs.com/thirty-one-card-game-rules/
|
code
|
Thirty-one is a very easy game to play. It is a fun card game played by building the cards in your hand to be worth a score equal to or very close to 31 points. Players lose tokens when they have the lowest score in a round of the game. The last player with tokens wins the game.
The objective is to have a hand that is equal to or very close to 31 points in each round and avoid being the player with the lowest score in any round. Players lose token when they have the lowest score and the last man with token wins the game overall.
Players are allowed to draw from either the draw pile or discard pile on their turn.
Players only earn points for having cards belonging to the same suit.
The scoring system used for 31 card game is as follow: Ace = 11 points, Jack, Queen, and King = 10 points each, Number cards from 2 to 10 fetch points based on the face value of each card e.g. a 2 card earns a player 2 points.
The scoring rule may be expanded to include earning 30.5 points for three of a kind (three cards of the same rank but different suit).
If a player knocks and loses that round, that player must give up two of their tokens instead of one.
A player with a hand worth exactly 31 points wins that round and every other player must lose a token.
Number of Players Needed
Minimum of 2 players and up to 9 players at a time.
A standard 52-card deck is used to play the game.
A dealer is selected from the players by shuffling the card deck and having each player draw a card. The player with the lowest card is appointed as the dealer. The dealer reshuffles the card deck and deals three cards to each player face-down in a clockwise direction. The remaining undealt cards are placed face-down on the playing surface and become the draw pile. The top card of the draw pile is flipped and faced up to form a discard pile.
Each player is then handed 3 tokens after which the game starts.
How to Play
Play begins with the player sitting to the left of the dealer. Each player on their turn gets to do two things. The first is to pick the top card from either the discard pile or the draw pile but not both in the same turn. Note that cards in the discard pile are faced up while cards in the draw pile are faced down. The second is to discard one card on the discard pile. This is done in an attempt to get a hand that is equal to or very close to 31.
The scoring system used for 31 card game is as follow:
Ace = 11 points
Jack, Queen, and King = 10 points each
Number cards from 2 to 10 fetch points based on the face value of each card. For example, a 2 card fetches 2 points, a 5 card fetches 5 points, and a 10 card fetches a player 10 points.
Only cards belonging to the same suit count towards a player’s total points. For example, if a player has an Ace of Hearts, a 3 of Hearts, and a King of Spades, the player’s hand is worth only 14 points. The Ace of Hearts is worth 11 points, the 3 of Hearts is worth 3 points while the King of Spades though has a value of 10 points normally but since it belongs to a different suit, will contribute 0 points to the player’s hand in this situation.
Players take turns in a clockwise direction to pick and discard cards while building their hand towards a score equal to or close to 31. If a player is confident that they have a very good hand that is close to 31 and capable of beating at least one other player’s hand, they indicate by “knocking” on their turn. The player may simply say knock or knock the table or the surface used for playing the game.
Once a player knocks, the other players each have a turn left to improve their scores before the round is ended. A player may choose to skip their last turn if they believe their current hand is good enough to keep them in the game. Once the other players have each had their last turn or skipped as the case may be, all the players must reveal their hand.
The player with the lowest hand loses for that round and must give up one of their tokens as punishment. If two players are tied for the lowest score, the player with the highest card in their chosen suit wins. If the player that knocks happens to have the lowest score, their loss is doubled which means they must give up two tokens instead of one.
If a player manages to build a hand worth exactly 31 points, the player must immediately announce by saying “Blitz” even if it is not their turn to play. The round is over immediately and every other player must lose a token for that round.
The game continues until only one player is left with a token.
Winning the Game
The game is over when there is only one player left with a token. This player is the last man standing and is declared the winner.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473819.62/warc/CC-MAIN-20240222125841-20240222155841-00657.warc.gz
|
CC-MAIN-2024-10
| 4,684 | 27 |
https://blenderartists.org/t/text-in-the-bge/455309
|
code
|
Quick question here: does the Text feature work in the BGE (that is, am I doing something wrong that mine isn’t showing up)? I’m referring to this in particular: http://wiki.blender.org/index.php/Doc:Manual/Modelling/Text
I know that it’s possible to get text in-game by mapping a plane to a specially created .tga from a .ttf (which I’ve done), but the built-in Text feature solves a lot of messy problems I had anticipated so I was hoping it’s just a problem on my end and not an unimplemented feature. Currently, any text I make using the feature shows up fine in renders, and not at all in the BGE.
Anyone have some insight by chance?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178376006.87/warc/CC-MAIN-20210307013626-20210307043626-00273.warc.gz
|
CC-MAIN-2021-10
| 648 | 3 |
https://play.google.com/store/apps/details?id=co.rockmilk.reakt
|
code
|
Challenge your friends in this fast-paced reaction arcade game and see who can get to the highest waves!
Every wave is procedurally generated with targets spawning randomly. You have to be fast and precise, as target bursts and missed taps results in lost energy.
Three target types:
• Static: Won't move and bursts in about 3 seconds
• Moving: Move randomly and bursts in about 4 seconds
• Boss: Appears every 7 waves and takes 3 taps to kill, moving after each. Bursts in about 5 seconds.
After playing, please leave a review in the Play Store as it helps us improve the game
Check us on the social networks:
Proudly made in Godot Engine by Rock Milk..
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741628.8/warc/CC-MAIN-20181114041344-20181114063344-00156.warc.gz
|
CC-MAIN-2018-47
| 660 | 9 |
https://support.exinda.gfi.com/hc/en-us/articles/360015175519-Network-Objects-Determining-Traffic-Direction
|
code
|
For an Exinda appliance to determine traffic direction, you must define all internal subnets as internal network objects.
This article details how these network objects can be edited and provides the comparison rules necessary for the location of an IP packet relative to an internal network object.
- Network objects can be edited from Configuration > Objects > Network > Network Objects.
- After identifying the subnets as internal network objects, as traffic passes through the appliance, the appliance looks at the source IP and destination IP of the packet and matches them to the network objects.
- This determines whether the source IP and destination IP should be considered internal or external, determining the packet direction.
- Consider the following rules when comparing the location of an IP packet relative to an internal network object:
|Internal||External||The packet is classified as outbound traffic.|
|External||Internal||The packet is classified as inbound traffic.|
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511021.4/warc/CC-MAIN-20231002200740-20231002230740-00463.warc.gz
|
CC-MAIN-2023-40
| 988 | 8 |
https://2015.splashcon.org/profile/michaelgrossniklaus
|
code
|
Registered user since Fri 14 Aug 2015
Michael Grossniklaus obtained his PhD in Computer Science from ETH Zurich, Switzerland in the research group of Prof. Moira C. Norrie. Michael’s work is situated in the area of data and information management with a focus on designing and developing database technologies to support the requirements of emerging and novel application domains. In the past, he has defined an object‐oriented version model that supports context‐aware data management and query processing, which has been successfully applied in a web content management system and a mobile tourist information system.
In 2008, he was awarded a fellowship for prospective researchers from the Swiss National Science Foundation (SNSF) hosted by Prof. Stefano Ceri’s database group at the Politecnico di Milano, where Michael worked on stream reasoning within the “LarKC” European FP7 project and on the Panta Rhei data flow language for the Search Computing (SeCo) project. From 2010 to 2012, Michael was an SNSF-funded post-doctoral researcher in Prof. David Maier’s group at Portland State University, where he worked on the project entitled “Exploiting Object Database Technologies for Data Management in the Cloud”. From 2012 to 2013, Michael was a post-doctoral researcher in Prof. Gerti Kappel’s Business Informatics Group (BIG), where he is working on the ARTIST EU project, which investigates advanced software-based service provisioning and migration of legacy software to cloud computing infrastructures.
Currently, Michael is a Professor (Juniorprofessor) for Databases and Information Systems at the University of Konstanz.
View general profile
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817222.1/warc/CC-MAIN-20240418160034-20240418190034-00626.warc.gz
|
CC-MAIN-2024-18
| 1,676 | 5 |
https://groups.yahoo.com/neo/groups/notetab/conversations/topics/22304?l=1
|
code
|
Re: viewing all txt files simultaneously?
- Yes you could. One way would be to open each file separately in a new instance of NoteTab (open with) to begin with. A second way would be with a custom clip.
However, using NoteTab with multiple instances creates its own set of problems. You might need to reconfigure NoteTab to use less screen (uncheck a number of items in the View Menu), etc. You should be aware, that to open these multiple instances with a CLIP will still require you to first open the multi-DOCUMENT instance, and run the clip again. Further, when you close ONE of the instances, the multi-doc instance will not know about this. You coudl create a second clip, but this gets more and more complicated.
If you do decide to go the multi-instance from a clip route, you should subscribe to the clips discussion group (ntb-clips), and ask for assistance there.
--- In [email protected], "jswordtestem" <jswordtestem@...> wrote:
> what I like about notepad is the ability using the windows facility tile horizontally, and I can view all my files simultaneously. e.g. 10 files eimultaneously. Is it possible to convert all the tabs in notetab plus to windows and do that? or anything as good?
- Another possibility clip-wise would be to make the clip open all the tabbed documents in noteTab in notePad windows and tile those. If any of the documents are currently modified but unsaved, you could handle those according to your wishes -- save them via the clip, make the clip prompt you, or just show the unsaved modified text in NotePad.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398444228.5/warc/CC-MAIN-20151124205404-00073-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 1,563 | 7 |
http://fixunix.com/freebsd/301716-re-i386-pae-amd64-poweredge-4g-ram.html
|
code
|
This is a discussion on Re: i386 with PAE or AMD64 on PowerEdge with 4G RAM - FreeBSD ; Mike Meyer writes: > I find that extremely ironic. I've spent most of the last two days > trying to put together a Linux system with python 2.5 (or later) and > lxml 1.2 (or later), because I need to ...
> I find that extremely ironic. I've spent most of the last two days
> trying to put together a Linux system with python 2.5 (or later) and
> lxml 1.2 (or later), because I need to add an oracle library to it.
> While both FreeBSD and darwin ports (where I do development) have all
> the appropriate bits except oracle, the Linux distros don't have any
> of them in their packaging systems.
des@des ~% cat /etc/lsb-release=20
des@des ~% uname -m
des@des ~% python --version
des@des ~% sudo apt-get install python-lxml
Reading package lists... Done
Building dependency tree=20=20=20=20=20=20=20
Reading state information... Done
The following NEW packages will be installed:
0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 662kB of archives.
After unpacking 2052kB of additional disk space will be used.
Get:1 http://no.archive.ubuntu.com feisty/universe python-lxml 1.1.2-1ubunt=
Fetched 662kB in 3s (203kB/s)=20=20=20=20=20=20=20
Selecting previously deselected package python-lxml.
(Reading database ... 105301 files and directories currently installed.)
Unpacking python-lxml (from .../python-lxml_1.1.2-1ubuntu2_amd64.deb) ...
Setting up python-lxml (1.1.2-1ubuntu2) ...
Any more nonsense you wish to share?
Dag-Erling Sm=C3=B8rgrav - [email protected]
[email protected] mailing list
To unsubscribe, send any mail to "[email protected]"
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738663142.93/warc/CC-MAIN-20160924173743-00266-ip-10-143-35-109.ec2.internal.warc.gz
|
CC-MAIN-2016-40
| 1,685 | 28 |
https://github.com/amatukaze/ing/releases/tag/v0.1.7.2
|
code
|
Be notified of new releases
Create your free GitHub account today to subscribe to this repository for new releases and build software alongside 28 million developers.Sign up
- Record battle detail for battle detail window in the future version
- Add two new mechanics from game update
For those who prefer Chrome, download this archive and extract files to "Browsers" folder. Remember to switch in setting window.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509845.17/warc/CC-MAIN-20181015205152-20181015230652-00308.warc.gz
|
CC-MAIN-2018-43
| 413 | 5 |
https://materialize.com/blog/postgres-source-updates/
|
code
|
Materialize is a cloud-native database built on streaming internals. Our core feature: incrementally updated materialized views, is based on PostgreSQL materialized views––and aims to supplant them entirely, even for PostgreSQL users. In updates to Materialize shipped May 2023, we think we’ve just about done it with some big ergonomic wins. If you’d like to try Materialize for free, register here, or you can learn more in the docs.
How Postgres sources work in Materialize
PostgreSQL offers a replication stream of changes to your tables, and Materialize can act as a read replica of that stream. Once we get the data into Materialize, though, you can build complex, incrementally maintained materialized views over that data; this gives you the expressive power of PostgreSQL but with the computational model of Timely and Differential Dataflow.
This means that rather than continually recomputing the state of your views in miniature batch jobs and waiting for recomputation, Materialize proactively and incrementally computes the state of your views as new data comes into the system.
Our initial implementation of PG sources proved that our the above concept was the right one: you could set it up and build the same materialized views in Materialize that you would have in PostgreSQL, and they would instead be incrementally maintained. One MZ user, Alvin Khaled, put it well:
It’s like a magically better third type of view: Postgres has regular views and manually refreshed materialized views. Now I have a materialized view that’s always up-to-date.
The magic was real, but we had a few rough corners that didn’t align with the reality of running on top of a production database:
- Materialize didn’t support any changes to the upstream database’s schema, and would error if any occurred.
- If any table in the publication caused an error, we errored out the entire source. For example, if
a_tablehad an incompatible schema change, you could no longer select from
- Users could not add or remove tables from the Postgres source; you were limited to only using those tables you ingested at the outset.
In recent releases of Materialize, we’ve fixed the first two issues and have a design and some preliminary work done on the third.
Why use Postgres sources?
First, though, I want to touch briefly on why you’d want to use Postgres sources in Materialize, even if you’re not currently a heavy PostgreSQL user.
The biggest advantage Postgres sources have over Kafka sources is the power of
REPLICA IDENTITY FULL. Experienced DBAs will be leery, as are the PostgreSQL docs:
REPLICA IDENTITY FULLis very inefficient and should only be used as a fallback if no other solution is possible. [31.1. Publication]
This requires a brief technical explanation. Logical replication sends along a stringified version of your relation’s data, which it also stores in the database’s write-ahead log or WAL. When using replication slots (as Materialize does), it compacts the WAL periodically, ensuring to never compact any data that a replication slot might still need.
REPLICA IDENTITY FULL, PostgreSQL stores each row that it would send out; this contrasts
REPLICA IDENTITY options which only store only the collection’s key and updated values
DELETE statements. This means that
REPLICA IDENTITY FULL maintains more state
in its WAL than other
REPLICA IDENTITY options, meaning that the WAL can require much more disk
However, in the context of Materialize, if you want to identify a relation as having a key in the upstream source, and only propagate changes to that key, Materialize needs to persist both the key and its most recent value––and it needs to be somewhere we can access very quickly while ingesting data. This can be costly to increase the size and power of the machine to be able to store an entire replica of your upstream data.
REPLICA IDENTITY FULL, though, means that we can rely on PostgreSQL to handle that very
complex task––something it’s been tuned over the last 25+ years to do. This means that users get the
benefit of powerful semantics (i.e relations with keys) on smaller machines than Kafka sources
Ok––on to the more technical bits.
Supporting schema changes
From the PG docs on logical replication:
The database schema and DDL commands are not replicated. The initial schema can be copied by hand using
pg_dump --schema-only. Subsequent schema changes would need to be kept in sync manually. (Note, however, that there is no need for the schemas to be absolutely the same on both sides.) [31.4. Restrictions]
Naturally, we aspire to something more graceful than “manually change your tables’ schemas in Materialize.” We wanted to build the right thing, though, so our initial buildout of PG sources was very conservative and said, “If we detect any schema changes, error because we haven’t yet decided what to do.”
One challenge we face is that it is not currently trivial to change the number of columns to
“upstream” relations in Materialize––we are at a funny spot where we treat
* (as in
literally, and if we were to add columns to a relation, we would change the resultant relation’s
arity and a cascade of failures could ensure. (We’ve made some forays into expanding
into the columns they represent, but haven’t merged the changes yet.)
So with the knowledge that we cannot simply add columns, we determined we could do maybe the next best thing: just ignore them. (A corollary to this, though, is that we cannot necessarily just drop columns because of similar arity concerns––however, we could support it by just producing NULL values, though we haven’t yet had any users express interest in that.)
We were pleasantly surprised by how naturally and easily support for ignoring columns slotted in. Because PG doesn’t support reordering columns in relations, it means only that we need to truncate the rows we ingest at to the width of the relation we have record of (assuming the columns we have are a strict prefix of the relation’s current columns).
Not quite that simple, though…
However, this line from the description above…
Note, however, that there is no need for the schemas to be absolutely the same on both sides.
…intimates a problem with schema change detection, as well.
In the logical replication stream, you will receive
Relation messages, which do describe changes
to the underlying relations. What isn’t laid out so clearly something outlined elsewhere in the
Columns of a table are also matched by name. The order of columns in the subscriber table does not need to match that of the publisher.
What this points to is that the
Relation messages’ schemas only include the relation’s names,
meaning it is possible to make a schema change that only speciously looks like it’s equivalent, e.g.
CREATE TABLE t (a INT, b INT);
INSERT INTO t VALUES (1, 2), (2, 3);
ALTER TABLE t DROP COLUMN b;
ALTER TABLE t ADD COLUMN b INT;
INSERT INTO t VALUES (3, 4);
PostgreSQL itself will understand that the tuples in
While if your read replica (e.g. Materialize) does not get updated, you’ll believe that the state
That’s clearly very bad!
What this meant for us is that we need to discard the
Relation message’s contents and instead
re-examine the PG database’s catalog, where we could determine if the relation changed subtly and
perniciously or not.
Improved error handling
As any SRE will tell you, every system works differently in both coarse and subtle ways. Unsurprisingly, this is the case with Kafka and PostgreSQL and how they expect you to consume from them.
In Kafka, the topic is the smallest atomic logical unit of consumption––these are, in some way, akin to PostgreSQL’s tables. You might have topics for users, orders, etc. Materialize, as a Kafka consumer, consumes topics and if there is an error it is an error in consuming that topic––this means we only need one error output per topic. However, each Kafka source in Materialize consumes only one topic, so this also means we only need one error output per Kafka source.
However, the taxonomy of PostgreSQL’s replicated objects differs: instead of consuming individual tables (which would be akin to the strategy in consuming data from Kafka), you instead consume from PG publications, which represent a set of tables. It is an exercise left to the consumer to then demultiplex the replication stream into its constituent tables.
Because we built our Kafka sources first, though, this meant that the internal machinery we had in place to surface errors meant that we only had one error collection per source. For PG, this meant that if we encountered any error for any table in the publication we had to send out an error that would wedge the entire source.
Given that we were initially very eager in producing errors in the face of schema changes, Postgres sources were a little too easy to put in an inoperable state.
To solve this, we needed to start generating error collections per table. Fortunately, by its nature
as being able to process streams of data, Timely and Differential provide means of arbitrarily
demultiplexing data given some key, which lets us send
(table_id, error), and we can ensure that
only the proper table’s error collection receives the error.
Adding and removing tables
This feature has yet to merge, but we’re far enough along with the design and foundational refactoring that we’re confident we can give a sneak peek.
July 2023 Update: Adding and removing tables without impact to other tables in a Postgres Source is now possible with
ALTER SOURCE ... ADD SUBSOURCE and
ALTER SOURCE ... DROP SUBSOURCE syntax. For more information, see ‘ALTER SOURCE` documentation.
As we mentioned before, the thing you’re consuming when ingesting data from PG is a publication, but really a publication is just a mechanism to filter entries in the PG write-ahead log (or WAL). Because each Postgres source consumes from one publication, this means we only kept one record of where we were in the WAL.
This poses a problem because we don’t have a mechanism by which to add another table to those we want to ingest: we only understand our current position in the WAL.
This shortcoming’s solved straightforwardly: begin tracking the WAL position for each table. This lets us understand that if we encounter any tables whose WAL position is 0, we know that the table needs to be snapshot to be brought up to the same state as the other tables.
Not quite that simple, though…
The idea of taking a snapshot of a table is great, but we need to be able to correlate that snapshot with some state of the WAL (known as its Log Sequence Number or LSN). PostgreSQL includes a mechanism to accomplish this by opening a temporary replication slot inside of a transaction, which provides the LSN at which the snapshot “ends” and the replication slot will begin serving data.
However, almost certainly, the snapshot’s consistent LSN will be further into the WAL than the primary source and the rest of the tables, but we need the new tables to be at exactly the same location in the WAL as everything else.
One of the other folks on the storage team, Petros, had the insight that we can:
- Begin reading the primary replication stream (not the temporary one we used for the snapshot)
- Take any data from the table we snapshotted that we read and emit a retraction against it
- Commit the snapshot to Materialize at the primary replication stream’s LSN
We call this process “rewinding” and it gives us all of the flexibility we need to align any collection of tables to the the primary replication slot’s position in the WAL.
This is a survey of the changes we’ve made, but there are others. For example, we’ve increased throughput of PG sources generally and are doing work to increase them further still.
If you’d like to experience the power of materialized views that are continuously and efficiently updated as your data changes, you can get immediate access to our platform with a free 14-day trial here, or you can get in touch with our field engineering team to get a demo and talk through your use case here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475311.93/warc/CC-MAIN-20240301125520-20240301155520-00309.warc.gz
|
CC-MAIN-2024-10
| 12,183 | 94 |
https://sunbeam.city/@kaia
|
code
|
Hi! Intro post! I'm Kaia or Keon in most places. I'm a physics student right now. I've been a member of the r/solarpunk discord for a while, decided that sunbeam city was a good place to make a mastodon. I can give basic advice on college apps and programming (I've particularly done a lot with image processing and scientific computing). I like space, podcasts, trailrunning, and chiptune music! I'm always happy to talk and excited to meet yall! Toot is a really cute word for post! Hi!
Hi I use any pronouns, I'm studying physics and am interested in science, games, and optimistic futures, and also most other things! aka keon in some places
Sunbeam City is a anticapitalist, antifascist solarpunk instance that is run collectively.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301263.50/warc/CC-MAIN-20220119033421-20220119063421-00477.warc.gz
|
CC-MAIN-2022-05
| 736 | 3 |
https://superuser.com/questions/1819172/how-to-apply-the-same-formula-to-a-whole-column
|
code
|
How to subtracts the same values in the next cell to a whole column? Here is an example so you can understand my low English level.
Column 1 Column 2 Result
1000 900 100
3400 200 3200
1700 100 1600
So, how can I subtrac automatically the number in column 2? I don't want to write each forumula for each row.
Hope you can edit my question if you understand my English. I need you to edit my Table, I don't know to do make a table here. There are three columns here and three rows. I don't know how to arrange them.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473518.6/warc/CC-MAIN-20240221134259-20240221164259-00726.warc.gz
|
CC-MAIN-2024-10
| 513 | 7 |
http://sjero.net/research/dccp/
|
code
|
The Datagram Congestion Control Protocol
DCCP is a networking protocol that provides congestion control without guaranteeing reliability or in-order delivery of data. As such, it neatly bridges the gap between TCP, which provides reliable delivery with congestion control, and UDP, which provides neither reliable delivery nor congestion control.
DCCP is ideal for applications where old data is substantially less valuable than the most recent data. A classic example is VoIP (Voice over Internet Protocol); if a packet is lost, you don't want to wait for it to be retransmitted, you want to continue to receive the most recent packets. Other potential applications include real-time streaming video and Internet-connected video games.
These applications typically use UDP with application level congestion control. Unfortunately, experience has shown that congestion control algorithms are difficult to design and implement correctly. In addition, there is massive duplication of effort since each application needs to design and implement its own scheme. DCCP simplifies this situation, by providing congestion control automatically without any additional effort on the part of the application programmer.
On a more technical level, DCCP utilizes a datagram model; that is, content is seen as individual datagrams, like UDP, and not as a stream of bytes, as in TCP. However, DCCP is a connection oriented protocol with a handshake similar to TCP. In addition, DCCP is designed to support multiple congestion control algorithms, or CCIDs.
For details on the DCCP protocol see RFC 4340. Two CCIDs are currently standardized: CCID 2 or TCP-Like Congestion Control in RFC 4341 and CCID 3 or TCP-Friendly Rate Control in RFC 4342. A few other CCIDs are currently under development, including CCID 4 (RFC 5622) and CCID 5 ( announcement here). DCCP is implemented in Linux and a testing tree is maintained at http://eden-feed.erg.abdn.ac.uk/cgi-bin/gitweb.cgi?p=dccp_exp.git.
I developed a tool called dccp2tcp to help analyze DCCP packet captures. This tool takes a DCCP packet capture and converts it to a semantically similar TCP capture which can then be analyzed with Dr. Shawn Ostermann's tcptrace utility ( http://www.tcptrace.org). This provides a vast amount of information about a DCCP connection in an easy to understand graphical format.
I have released dccp2tcp under the GNU GPL. You may obtain the prgram from my git repository at github. Dccp2tcp will only compile on Linux because it requires the Linux Kernel DCCP headers. My testing has been restricted to 64bit Ubuntu/Debian, but dccp2tcp should work fine on any Linux variant with a kernel greater than 2.6.18.
The following graph provides an example of the output that dccp2tcp (in combination with tcptrace) produces. The white line segments represent data packets that were sent. Increases in the green line represent packets being acknowledged, and the purple line segments represent acknowledgment vectors that indicate a loss. The yellow line is an artifact of the DCCP to TCP conversion and has no meaning for DCCP.
Major Bug Fixes in Linux 3.2
Several major bug fixes for DCCP, particularly CCID 2, were included in Linux 3.2. These fixes improved dramatically improved the stability of CCID 2 and the durability of the DCCP implementation in general. For details, see this message on the DCCP Linux mailing list. If you are planning on testing or utilizing DCCP, I strongly recommend that you use a version of the Linux kernel newer than 3.2.
Notes on using DCCP in a Virtual Machine
Over the course of my research, I discovered that running DCCP on a virtual machine without virtualization extensions (AMD-V or VT-x) results in very poor performance. If you are considering using DCCP in a virtualized environment, I strongly recommend you ensure that your host machine supports these extensions.
The reason for the poor performance is that DCCP is a datagram-based protocol. This means that every packet that is sent or received requires a system call.
As a result, in order to achieve even 10Mbits/sec the virtual machine needs to make about 766,000 system calls per second. Without virtualization extensions, each of these is an extremely expensive operation. In my tests, even 10Mbits/sec was too fast for the system: within milliseconds the receiver's kernel socket buffer overflowed and DCCP dropped an entire window of packets. When that happens, RFC 4340 requires DCCP to pause for 200ms.
This results in a pattern of network traffic where DCCP sends for a few milliseconds, looses an entire window of packets, waits 200 milliseconds, and then starts sending again only to repeat the cycle a few milliseconds later.
TCP and UDP get around this issue by allowing userspace to dump arbitrary sized buffers into the kernel. TCP silently splits these buffers into many packets, and UDP fragments the resulting large datagrams at the IP layer. Unfortunately, RFC 4340 strongly discourages DCCP fragmentation, so neither of these solutions is viable for DCCP.
A partial solution is to give the receiving process a high priority using the UNIX "nice" command. If the process runs at high priority, it can do a pretty good job of emptying the kernel socket buffer.
- Samuel Jero. Performance Analysis of the Datagram Congestion Control Protocol DCCP for Real-Time Streaming Media Applications. Masters Thesis. Ohio University, 2013.
- Samuel Jero. Analysis of DCCP for Delay/Disruption Tolerant Networking. Poster. 2010 Internet2 Fall Member Meeting, 2010.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120206.98/warc/CC-MAIN-20170423031200-00110-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 5,534 | 20 |
https://xubuntu.org/contribute/development/
|
code
|
You can take part in the Xubuntu development in different ways depending on your interests and skills. The general guideline is that you will need a “sponsor” to upload your changes first. Once you have proven your skills, you can be granted access to upload to the Ubuntu repositories. Since Xubuntu uses the same software repositories as Ubuntu, the areas of development between Ubuntu and Xubuntu developers partly overlap. The main difference is that Xubuntu developers mostly work on packages that are directly related to Xubuntu.
To read more about the different levels of involvement and upload rights in Ubuntu, see the Ubuntu Developers’ wikipage. This page provides much more information on developing Ubuntu and Xubuntu, so it’s definitely worth reading.
If you want to help but are uncertain where to start, the Xubuntu team will be happy to help you in getting started. If you need a mentor along the way, the Xubuntu team might be able to assign you one, or help getting one from the Ubuntu developer community. Don’t be shy!
Unfortunately, bugs exist in all applications, including those shipped with Xubuntu. In addition to the bug-related activities in the Quality Assurance team, Xubuntu developers can fix bugs themself and get them uploaded to the Ubuntu repositories and when applicable, upstream.
After you’ve introduced yourself to the Xubuntu team, you can start helping fixing bugs. In the beginning, you should send patches to the Launchpad bugs as attachments. These patches will then be reviewied and “sponsored” to be included in the Ubuntu repositories. After you have proven your skills, you can get access to the Xubuntu packageset so you can upload new bug patches on your own.
Packages that are essential or partial to Xubuntu and are thus (partly) maintained by the Xubuntu developers include Xubuntu-specific packages (eg. xubuntu-default-settings, shimmer-themes), Xfce packages (eg. xfwm4, xfce*) and much more.
In addition to fixing bugs in applications and libraries, they need to be packaged. While Ubuntu gets most of the applications already packaged from Debian, there are applications or libraries that don’t exist in Debian or will need to be packaged differently in Ubuntu. In this case, the Ubuntu developers will (re)package the applications and libraries and upload them to the repositories for everybody to use.
If you are relatively inexperienced with maintaining distribution packages, then you should seek out the Masters of the Universe. They mentor new maintainers on the policies and processes of packaging at large. You can look over the Ubuntu Packaging Resources page to start your journey.
Managing the default package selection and settings
During each release, it is possible that the Xubuntu team will want to change the packages that are installed by default or change the default settings. The Xubuntu developers maintain the default package selection and settings. While this is a quite trivial task, it is one of the most important.
Implementing new features and writing new software
Both implementing new features and writing new software for Xubuntu are mostly organized by the release-specific blueprints in the roadmap. If you want to write new code that specifically helps Xubuntu, you should be around when the Xubuntu team is creating the roadmap for the next release. Features and applications specifically targeted for Xubuntu are usually related to distribution-specific user experience and theming and configuration tools specific for Xfce and Xubuntu.
It is highly encouraged that the developers push any newly created features upstream, as long as they are not Xubuntu-specific.
In addition to writing applications exclusively for Xubuntu’s use, you can write applications you think would benefit the Xubuntu project generally. The Xubuntu team can consider including these applications to be included with the base Xubuntu system once they have been added to the Ubuntu repositories and gathered enough positive feedback.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119995.14/warc/CC-MAIN-20170423031159-00494-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 4,023 | 14 |
https://themeforest.net/item/deluxe-business-html-template/17277355
|
code
|
Deluxe Business HTML Template is designed for Creative Business Finance. The design is very elegant and modern and also very easy to customize. 14 HTML files included.
- Responsive Design
- 14 HTML Files
- Bootstrap 4.0
- Valid HTML & CSS
- Blog Pages
- Contact Form Validation
- Easy to use and customized code
- Filterable Animated Portfolio
- Font Awesome icons
- Google Web Fonts
- Cross Browser Compatible (IE9+, Firefox, Safari, Chrome)
- Well Documented
Open Sans : https://www.google.com/fontss
Simple Line icons : http://fortawesome.github.io/Font-Awesome/
Please note that images used in preview are not included in the package. If you have any questions please feel free to email via my user page contact form here. Thank you!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00611.warc.gz
|
CC-MAIN-2022-40
| 737 | 16 |
https://www.programmableweb.com/api/eventupon
|
code
|
Events are aggregated from event registration sites like EventBrite, Meetup, TicketLeap, RunSignUp and Picatic. Events are also pulled from thousands of event calendars on Google Calendars, iCal, Facebook and others.
Single purpose API
Sorry, no developers found for this API.
API Mashups (0)
Sorry, no mashups for this API.
Sixteen APIs have been added to the ProgrammableWeb directory in categories including Banking, Big Data, Real Estate, Education, and Microservices. Featured today are APIs for Astronomer data pipeline services and EventUpon events calendars platform. Here's a look at what is new.
IVA Entertainment Express
||The Entertainment Express API is a gateway to building Movies, TV, and Game Content discovery experiences. The Entertainment Express service features Add ServiceStack Reference which allows adding...||Entertainment||10.18.2017|
Novopayment Money Transfers
||The Novopayment Money Transfers API allows users with the authorized credentials to send money to third party accounts. The Money Transfer Tools service enables you to send money between different...||Payments||10.10.2017|
||The Registration Cardholder API allows you to update information in stored value accounts. It is a tool to enable the creation of new individual or bulk user accounts and cash management programs...||Payments||10.10.2017|
Checkmate.io URl Partner
||The Checkmate URl Partner API is available to existing CheckMate partners and allows for a lightweight integration. Checkmate Concevoir is a data management company in the United Kingdom with...||Data||10.06.2017|
||This API is available for existing CheckMate partners to manage the reservations they provide to CheckMate and its guests. Checkmate is a cross-language meta-tool for static code analysis that...||Data||10.06.2017|
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825510.59/warc/CC-MAIN-20171023020721-20171023040721-00249.warc.gz
|
CC-MAIN-2017-43
| 1,796 | 14 |
https://beta.taricorp.net/2012/a-divergence-meter-note/
|
code
|
Somebody had asked me about the schematics for my divergence meter project. All the design files are in the mercurial repository on Bitbucket, but here’s a high-resolution capture of the schematic for those unable or unwilling to use Eagle to view the schematic: dm-rev1.1.png. Be advised that this version of the schematic does not reflect the current design, as I have not updated it with a FET driver per my last post on this project.
On the actual project front, I haven’t been able to test the FET driver bodge yet. Maybe next weekend..
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00832.warc.gz
|
CC-MAIN-2023-50
| 545 | 2 |
https://diybitcoinhardware.com/libwally_arduino.html
|
code
|
libwally is a C library used in Blockstream’s projects like c-lightning, green address and many others. It includes a bunch of useful primitives for wallets and pretty well documented.
I didn’t see many projects using this libraries on embedded devices though (Trezor, ColdCard, Keepkey and many other vendors are using trezor-crypto library).
If you are an experienced embedded developer it’s not that hard to make these libraries to work on your device. But if you are a tinkerer and you want to experiment, if you are mostly playing with Arduino, ESP32 or Mbed devboards, and you want to make some fun hardware project involving Bitcoin, you may have problems with these libraries.
Normally in Arduino or Mbed you just drag-and-drop the library to the libraries folder, load an example, press the compile button in the IDE and it just works. With these libs it’s not quite the case. But it is possible.
To make it happen we cloned repos of these libraries and slightly tuned them such that Arduino and Mbed could understand the folder structure and compile everything automatically. We also wrote basic examples for these libs — now you can do exactly what you always did — just drag and drop, load an example and start tuning it for your project.
Warning: these libraries are still pretty memory and flash intensive, so not every microcontroller and devboard will work. We tested it on ESP32 (M5Stack) and stm32f469-dicsovery boards. You will need a 32-bit microcontroller with enough memory and flash. I guess you need at least 512 kB of flash and 64 kB of RAM, with 2 MB flash and 256 kB RAM you will feel pretty comfortable.
Have fun, and let us know if it does or doesn’t work :)
Everyone was able to write his own software wallet, now everyone should be able to make a hardware wallet!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056711.62/warc/CC-MAIN-20210919035453-20210919065453-00044.warc.gz
|
CC-MAIN-2021-39
| 1,808 | 8 |
https://www.excelforum.com/excel-programming-vba-macros/1082299-compile-error-object-required-when-opening-userform-on-another-pc.html
|
code
|
I could really do with some help! I've created a userform in Excel 2013 and it was running beautifully. I sent it to another colleague for testing on their PC on Excel 2010and I am having lots of problems
When I try to run the following bit of code I keep getting the Compile error - object required and it highlights patientrec. I'm new to VBA and really can't work out why this works on my PC but not my colleagues.
I'd be so grateful for any help - thank you!!
Please Login or Register to view this content.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474663.47/warc/CC-MAIN-20240226194006-20240226224006-00534.warc.gz
|
CC-MAIN-2024-10
| 510 | 4 |
https://github.com/kmadac/bitstamp-python-client/commit/55c82cee4a4016be050e6c09977c9f2952f27d0e
|
code
|
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Browse the repository at this point in the history
Update to support new Bitstamp API
Updates the private API to support the latest Bitstamp key based API (the old one will no longer function after 31 October 2013). Adds a few function that previously weren't implemented, so that the full private API is supported.
- Loading branch information
Showing 1 changed file with 136 additions and 24 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode characters
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650620.66/warc/CC-MAIN-20230605021141-20230605051141-00157.warc.gz
|
CC-MAIN-2023-23
| 805 | 8 |
https://www.warriorforum.com/main-internet-marketing-discussion-forum/425649-how-expand-new-small-business-online-graphic-services-aside-using-ppc-ads.html
|
code
|
My conversion rates are good and I've pulled in steady profits over the past few days. (average 200 a day the past 3 days)
My question is... what now?
I looked into affiliate marketing but sites like CJ won't accept any newbies or small time fish like me.
How else can I promote/market my services?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585380.70/warc/CC-MAIN-20211021005314-20211021035314-00288.warc.gz
|
CC-MAIN-2021-43
| 298 | 4 |
https://community.home-assistant.io/t/how-to-transfer-data-partition-to-usb/346006
|
code
|
Have been trying via ssh but not getting there. Can somebody point me to the right instruction how to move the data partition to an usb flash drive?
The new 6.5 version together with the newest core have a menu option for this. I have not tried it myself, but it looks to be an easy job now.
ah that would be perfect! upgrading OS now but is taking really long already, but as always patience patience patience thanks!
so was able to find the option in the menu, has been done. But how to check if this was successful? should I make a Samba connection and see?
You can use
ha os info command in the ssh terminal to see the current disk in use
You could also check the supervisor > system > host card and hover your mouse over the Used Space bar and assuming you know the size of your drive, see if it matches what you expect to see.
Or…you could go to Configuration > Info and scroll down to the “Supervisor” section to see the same disk usage info
wow thanks for the clear instruction!
sadly the card shows the size of the SD card. When selecting move datadisk I get the following option. Should I be able to see more to select from? And would it mean that the USB flash (exfat formatted and called CONFIG) is not recognized correctly?
A USB stick labeled CONFIG is only for importing settings to the host, and a flash drive is not going to be the best choice for this. But even if you clear that, and remove the CONFIG label, a flash drive is going to be slow. You can try it, but I have played with it myself and it doesn’t perform well.
It would be better to connect a USB connected SSD drive. It shouldn’t matter how you format it, because it is going to end up formatted as EXT
Ok sounds like a better plan (felt the usb flash getting rather warm already). Any suggestion for the usb ssd? What should i look for when buying?
Already read i don’t need an expensive one. So ordered one already and will move the core tomorrow. Thanks for now
Yeah, I forgot to add, with my flash drive test it got surprisingly hot, too.
I’ve tested with an Inland 512GB SSD nvme and this enclosure https://www.amazon.com/Vantec-Enclosure-Cable-Space-NST-205C3-SG/dp/B07SRK9H9L
I’ve also used a 2.5" SSD with a Sabrent EC-UASP enclosure
Received a Philips SSD, but when trying the datamove I get a Timeout. How do I verify if SSD is being recognized by the pi/hassio?? Repeating but thanks and really appreciating all the help!!!
I am also testing the new Move datadisk function from UI. For this I have connected a usb hard disk (hdd) that I can see connected in the hardware list as sdb and sdb1. When I click on Move datadisk, Home Assistant returns the message: No suitable attached devices found
Do you know if the external drive must have any special characteristics to be compatible with this function?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585171.16/warc/CC-MAIN-20211017082600-20211017112600-00192.warc.gz
|
CC-MAIN-2021-43
| 2,811 | 20 |
https://deneidez.blogspot.com/2012/07/
|
code
|
Some problems with redmine again, but I were able to fix them with help of basse(Thanks!). Not sure will I be able to do anything next week, because I am going to get my new server and I have to move my software for it and configure my new router.
- Planet generator
I have started making planet generator and so far everything seems fine. After I get planet generator ready next step would be to make my 3D engine to understand generated planets and to show them visually.
Oh and there is a release date for TSOTR now and its 12.12.12.
Stats (Made with Code Analyzer by mteel)
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817474.31/warc/CC-MAIN-20240420025340-20240420055340-00474.warc.gz
|
CC-MAIN-2024-18
| 577 | 5 |
https://discourse.weather-watch.com/t/wind-energy/3325
|
code
|
According to the image, the wind run started 7-2-2002. This is incorrect because all the totals reset at 12:01 January 1st, 2003. Also, the totals until then were much higher than now. Does all that yearly data get stored somewhere? Or is it all bye-bye?
PS, isn’t there or shoudn’t there be lable on the vertical graphs? There is no way to tell what they mean.
i need to fix that start date
thats basicly the date the program was first run!
labels, ok, soon…
The moon problem we were emailing about is still hanging in there. Today it shows 27days 17hours blah blah and 4%. That is on the sunmoonimage.jpg on the web. On the summary.gif, it somehow corrected itself. My lat & lon are entered correctly and the sun rise/set is OK. Just letting you know whats next after the web/phone talking thingie you are working on
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816853.44/warc/CC-MAIN-20240413211215-20240414001215-00743.warc.gz
|
CC-MAIN-2024-18
| 824 | 6 |
https://www.meta-morphos.org/print.php?sid=2884
|
code
|
at the end of this year, I wanted to promote the software developers for MorphOS. Here is a non-exhaustive list of many developers who have been particularly productive on our platform this year.
Feel free to click on the links below and see their productions from the past year. Also feel free to send them an email or a donation or both The developers have been placed in this list at random. If I forgot any developers, please let me know.
This article comes from WArMUp Association MorphOS
The URL for this story is: https://www.meta-morphos.org/article.php?sid=2884
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991488.53/warc/CC-MAIN-20210515223209-20210516013209-00583.warc.gz
|
CC-MAIN-2021-21
| 570 | 4 |
https://www.blondesville.com/monthly-moron/2009/99/
|
code
|
Monthly Moron for September 2009Which one of these Blondes should have stuck with their TV career?
By Photo from www.lukeford.net [CC BY-SA 2.5 (http://creativecommons.org/licenses/by-sa/2.5)], via Wikimedia Commons
50% Katherine Heigl
48% Sarah Michelle Gellar
By Lan Bui (Streamy Awards Photo 375) [CC BY-SA 2.0 (http://creativecommons.org/licenses/by-sa/2.0)], via Wikimedia Commons
2% Lisa Kudrow
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157070.28/warc/CC-MAIN-20180921112207-20180921132607-00243.warc.gz
|
CC-MAIN-2018-39
| 400 | 6 |
https://dirteam.com/sander/2009/11/24/hyper-v-nu-meeting-action-shots/
|
code
|
This morning I performed a ‘zero to live migration’ demo for the joined HP Netherlands, Hyper-V.nu (Dutch Hyper-V Community) meeting. You can find more information on this meeting on my previous blog post.
I brought my photo camera with me and asked Jaap Wesselius to take some pictures, while I showed some slides from a custom slide deck (in Dutch) and performed my demos for the audience (approximately 40 people).
Here are some of the pictures Jaap shot during the session:
With a big grin I explained what I was up to this morning. The unsuspecting audience had no idea. In the back is one the slides in the deck, titled “Purpose of the demo”, showing the environment. The red arrow shows the Live Migration stuff.
In the photo above, I explain the Failover Clustering feature in Windows Server 2008 R2 and how it helps to achieve high availability for Hyper-V Machines. Of course Cluster Shared Volumes (CSV) gets some attention too.
Jaap also shot a picture while I was performing some serious command-fu. In this picture I connect to one of my Hyper-V Server 2008 R2 nodes to add it to the cluster.
I had a great time!
(and I think I’ll bring along my photo camera more often)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347426801.75/warc/CC-MAIN-20200602193431-20200602223431-00519.warc.gz
|
CC-MAIN-2020-24
| 1,194 | 8 |
http://forum.xfce.org/viewtopic.php?pid=31447
|
code
|
I am trying to get a terminal embedded into my desktop (ideally terminator, but I dont really care that much) but I cant figure out how to do it. Basically, it needs to be borderless, trasparent, always be behind other windows, and be on all four workspaces. Also I have conly set up as well so If I could specify the size of the window so that it doesn't overlap with conky that would be nice also
sorry I figured it out using tilda
Last edited by bbm21 (2013-12-09 18:51:01)
You can do that with Devilspie. Here's a brief HOWTO:
1. Install devilspie from your distro's repositories.
2. Create the ~/.devilspie directory
3. Create the ~/.devilspie/DesktopTerminal.ds file with the following content:
(if (matches (window_name) "DesktopTerminal") (begin (pin) (below) (undecorate) (skip_pager) (skip_tasklist) (wintype "utility") (geometry "900x700+0+10") ) )
...and save the file.
4. Startup devilspie:
5. Fire up a new terminal window and give it the name DesktopTerminal like this:
xfce4-terminal -T "DesktopTerminal"
...and it will start up pinned to all desktops, below all windows, undecorated, not paged, and not on the takslist.
- Edit the "geometry" parameter in the DesktopTerminal.ds configuration file to suit the dimensions that you want on your screen.
- You'll need to add devilspie to your startup applications list so that it runs on login.
- If you want to automatically start an app in the terminal window, use the -x parameter like:
xfce4-terminal -T "DesktopTerminal" -x tail -f /var/log/syslog
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122886.86/warc/CC-MAIN-20170423031202-00311-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,515 | 17 |
https://community.spiceworks.com/topic/1924956-upgrade-or-replace-a-client-s-desktop-laptop
|
code
|
How do YOU choose when to upgrade versus replace a client's older computer?
We surveyed 350 SpiceHeads across the US, UK and EU, and our results showed that twice as many chose to upgrade client laptops/desktops rather than replace them with new workstations. (We really appreciate your participation, thank you!)
If you're interested, you can read our full results here: http://www.crucial.com/usa/en/should-you-upgrade-or-replace-old-computers-IT-ssd-ram
If a system is 3-4 yrs old I recommend them to replace it if its needed or not, there is no reason anyone should have a system that old anymore and have to suffer performance due to aging systems, especially when our standard now is 8gb of ram and x64bit OS compared to years passed and the systems are running SSD HD's
We have 3 criteria
1. EOL, this is the main decider, as many of the XP machines that have recently been put out to pasture would probably run forever if we let them.
2. Compatibility, we can't run 32bit machines anymore, fortunatly this coincided with the recent EOL for XP.
3. Failure, always a good reason to replace, upgrade maybe but that depends on the use case.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301670.75/warc/CC-MAIN-20220120005715-20220120035715-00169.warc.gz
|
CC-MAIN-2022-05
| 1,144 | 8 |
https://hackaday.com/2022/01/15/serial-studio-one-year-on/
|
code
|
Last year we wrote about [Alex Spataru]’s Serial Studio project, which started life as serial port data visualizer, like a souped-up version of the Arduino serial plotter. [Alex] has been actively improving the project ever since, adding a variety of new features, including
- JSON editor for data formats
- TCP, UDP, and Multicast
- New and more flexible display widgets
- Multi-signal plots
- FFT and logarithmic plots
- VT-100 emulation
- Support for plugins and themes
- Added MQTT support
[Alex] originally came up with Serial Studio because he was involved in ground station software for various CanSat projects, each one with similar yet slightly different data formats and display requirements. Rather than make several different programs, he decided to make Serial Studio which could be configured using JSON descriptor files.
The program is open-source and multi-platform. You can build it yourself or download pre-compiled binaries for Windows, Linux, and Mac. See the project GitHub repository for more details. In addition to English, it has also been translated into Spanish, Chinese, and German. What is your go-to tool for visualizing serial data telemetry these days? Let us know in the comments below.
13 thoughts on “Serial Studio One Year On”
This is exactly what I have been looking for the last couple of days.
Depending on the capabilities and configurability (I haven’t tried it yet) – it could be the answer to a number of monitoring projects’ output issues – rather than custom interface programs.
Nice project. Unfortunately the colors are chosen again to remind of a color vision test. Can’t people just pick clear contrasting colors? The multi-plot also looks kinda nice, but too cramped to be useful. You need to see more detail.
Go to the linked project page to see different color settings and widgets.
> Spanish, Chinese, and Dutch
From the github page:
> Read this in other languages: Español 简体中文 Deutsch
Spanish = Español
Simplified Chinese = 简体中文
German = Deutsch
There is no mention Nederlands (Dutch) :)
Indeed. Brain fart. Corrected.
For the same purpose I am using the really good SerialPlot :
I’ve used SerialPlot in the past and it is really great!
I use MegunoLink (https://www.megunolink.com/). As well as plotting, it also supports a bunch of different visualizers including a drag-and-drop interface panel where you can add buttons and other controls to send commands to the Arduino program. Not free and windows only for now though.
I really like it, but I’m also the developer so perhaps not completely objective there :). It’s great to see lots of different options for the Arduino community!
Hey I love your software! Good job!
Unfortunately, there is no discount for student anymore. 56USD for personal license ..
I use CDP Studio (www.cdpstudio.com) for quick RD visualizers and even data processing that need connecting to different things quick wo coding usually. It has also Linux support and its free for personal use.
Or just use Matlab or Octave?
Please be kind and respectful to help make the comments section excellent. (Comment Policy)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00259.warc.gz
|
CC-MAIN-2023-14
| 3,137 | 33 |
https://news.slashdot.org/story/05/05/24/1845244/linux-radio-station-automation
|
code
|
miazmatic asks: "I am one of the tech managers for my high school's FM radio station. We have been using Rhythmbox on Debian to play music after hours when no one is broadcasting. However, it took some pretty ugly hacks to get it to transmit the station ID every hour. We are adding a 600GB RAID 0 VG to our PC (P4 2.4/512MB), to which we plan to encode all our CDs losslessly. Along with this upgrade I would also like to find a permanent solution for broadcasting the station ID hourly. Has anyone used Linux to run a radio station before? Can anyone suggest a F/OSS software package or solution? Any help is appreciated."
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947690.43/warc/CC-MAIN-20180425022414-20180425042414-00017.warc.gz
|
CC-MAIN-2018-17
| 624 | 1 |
https://www.construct.net/en/forum/construct-2/how-do-i-18/create-video-player-170811
|
code
|
I'm setting up a linguistic experimental task with Construct 2. At the beginning, I have a layout with 2 pages of instructions (you can try it out here : lamarque.lpl-aix.fr/).
The first page is just text, you can click the "suivant" button (= "next"). On the second page, I want to display an instruction video. So I recreated a very simple video player. Everything is functionnal except one thing: the slider bar I used to show the progression of the video. Here is what I did :
When the video is paused, it works perfectly. The problem is when the video is playing, I cannot use the slider bar dynamically to jump to a specific time of the video. From what I understand, it is because event 12 will always immediately "erase" event 13. I have tried many combinations to avoid that issue, but I am out of ideas. If anybody can help me, that would be very appreciated.
Develop games in your browser. Powerful, performant & highly capable.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00857.warc.gz
|
CC-MAIN-2023-40
| 939 | 4 |
http://careers.stc.org/jobs/8839440/senior-technical-writer
|
code
|
Since 1977, basys has helped benefit administration plans work harder, smarter and more efficiently, so that everyone benefits. basys is a leading Taft-Hartley expert and technology provider of advanced benefits administration solutions that give plan administrators and participants more control and better access to plan information.
basys combines renowned industry experience and visionary technology to develop employee benefit administration solutions that are second to none. Our technology and services professionals have a passion for solving complex problems and deliver high-value, next-generation applications to benefit plan administrators.
As a member of the Learning Team, the Senior Technical Writer produces written content to help basys employees and customer end users learn how to use our software products. This position collaborates with project managers, software developers, business analysts, trainers, and customer implementation managers in order to deliver the online
help user documentation, end user job aids, training content, and configuration guides that will assist end users with the use of our product.
- Define, share, and implement technical communication strategy for the basys product suite
- Manage documentation projects proactively, by creating and communicating documentation plans and schedules, tracking and reporting documentation status, identifying and working with management and various teams to remove roadblocks and escalate issues as needed
- Create, maintain and publish product release notes, traditional end-user documentation, context-sensitive online help, videos, interactive web tutorials and other content that supports key end-user processes.
- Create, maintain and publish software documentation for basys employees.
- Other assigned responsibilities as required
Equal Opportunity Employer
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189802.18/warc/CC-MAIN-20170322212949-00045-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 1,853 | 10 |
https://www.sageaudio.com/articles/the-best-way-to-quickly-add-clarity-to-your-mix-inverse-eq-matching
|
code
|
Most of us have heard the saying, “there are no shortcuts in audio.” Although this may be true in most situations, sometimes new technologies come along that drastically speed up the audio editing, mixing, or mastering process.
For example, imagine trying to perform your digital edits on analog tape. The process would take hours as opposed to seconds.
It is of course possible then for another time saving technology to present itself.
This seems to be the case with EQ matching, a relatively new software that is making its way into more and more equalizers.
The best way to clean up your mix quickly is by using EQ matching amongst two similar instruments or instrument groups. Once the two have been matched, invert the gain of the matched track, to amplify the frequencies that made it different from the other track, and attenuate the frequencies that made it similar.
Let’s take look at how to perform this technique using FabFilter’s Pro Q 3.
First you will need to record the audio into your EQ plugin. With the FabFilter Pro Q 3, place the insert on one instrument or group, and then side chain a similar instrument or instrument group.
For this technique, it isn't too terribly important which track you use as the reference audio.
Be sure to enable automatic gain function in the lower right of the plugin. This ensures that the two signals are of equal volume and can be matched accurately.
Click the Yellow 'A' to enable this function
Set your reference to either the input or to your side chain, and play the tracks simultaneously.
If you choose the side chain as your reference, playing both tracks automatically creates an EQ curve.
The FabFilter Pro Q 3 will prompt you to decide how many bands you want to create. I’d recommend choosing the maximum amount for the most detailed response.
Choosing less bands will result in a less detailed EQ curve.
Once your bands are created, highlight the entirety of the curve in the display window. Once they’re highlighted, adjust the gain to the opposite of its current setting.
Notice that the gain is set to roughly -11dB.
For example, if the gain setting is -11dB, change that to 11dB, or vice versa.
Notice that the gain has been adjusted to roughly 11dB.
Be sure to take the side chain out of the signal, and then play both instruments or instrument groups simultaneously again.
You should be able to hear increased distinction between the two. Adjust your gain settings, number of bands, and Q settings to personal preference.
Using this technique allows for a quick and precise way to separate two signals. Even the most trained professionals wouldn’t be able to hear all of the distinct and nuanced differences and similarities between two tracks, let alone identify them. This trick offers an unprecedentedly fast way to create clarity between two instruments, or groups.
How do you clean up your mixes?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101282.74/warc/CC-MAIN-20231210060949-20231210090949-00752.warc.gz
|
CC-MAIN-2023-50
| 2,886 | 22 |
https://threatconnect.com/blog/github-activity-monitor/
|
code
|
This Playbook is designed to automate the monitoring and alerting of Github activity for a given user
ThreatConnect developed the Playbooks capability to help analysts automate time consuming and repetitive tasks so they can focus on what is most important. And in many cases, to ensure the analysis process can occur consistently and in real time, without human intervention.
Many malicious actors, from unsophisticated defacers to sophisticated actors, use Github to develop and/or serve malicious content. This is largely because Github offers version control and Github Pages for automatically deploying content.
With so much diverse, malicious activity on Github, it is important to be able to track the changes on a malicious code repository. This Playbook is designed to automate the monitoring and alerting of Github activity for a given user. In this way, you can get alerts whenever a github user does a public action.
This Playbook is based on the Page Monitor.pbx Playbook described here: /blog/web-page-monitoring/ . It is designed to be run once a week and uses Github’s public API to check if there is any new activity. If there is new content, it sends an alert (in this case via slack).
Installing the Playbook
To install the Playbook, download the Github Activity Monitor.pbx Playbook and install it in ThreatConnect from the Playbooks page. Once it is installed, start by editing the “Set Variables” app (the Playbook app right after the trigger). You will need to provide the “slackChannel” variable to which messages will be sent and the “githubUserName” variable you would like to monitor. Now, there are a few other apps which need some credentials and other information. The best way to find which apps still need updated is to try to turn the Playbook on which will provide you a list of apps that still need modified. Among the apps that need edited are the slack apps and the datastore apps.
But what if you don’t use Slack? Easy: the Slack apps can be replaced with an app to send an email, create a task in ThreatConnect, or create a Jira issue (among other options). If you have any questions or run into any problems with anything mentioned in this blog, please raise an issue in Github! If you would like to have your app or playbook featured in a Playbook Friday blog post, submit it to our Playbook repository (there are instructions here: https://github.com/ThreatConnect-Inc/threatconnect-playbooks/wiki/Contributions-Workflow).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00262.warc.gz
|
CC-MAIN-2023-50
| 2,480 | 8 |
https://hackernoon.com/gitpitch-presentation-templates-powered-by-svg-46a56d6bc03e
|
code
|
Pixel-perfect slide background images using SVG images.
If you are the kind of person that loves bending pixels and layouts, there may be few things more exciting than a blank canvas.
For the rest of us, there are templates.
Templates provide a simple and effective bootstrap for all kinds of creative endeavors: writing resumes, building websites, and of course, creating slideshow presentations.
So today I’m happy to announce a new set of markdown presentation templates now available in the GitPitch template gallery.
If you want to use these templates to kickstart your own presentations on GitHub, GitLab, or Bitbucket you can activate a free GitPitch Pro beta subscription. You can do that by logging in here.
SVG offers a resolution-independent format for presenting graphics on the Web, allowing the same image file to be used at any scale or resolution.
SVG can also be compact. The average size of the SVG images used by these latest GitPitch presentation templates is just~2kb. Tiny. Compare that to the ~200kb average size of png and jpg background images used in some pre-existing GitPitch presentation templates.
Both of these qualities: resolution-independence and compact-size, make SVGs a very useful tool for presentation authors.
I decided to put SVGs to work on behalf of the GitPitch community by building a fresh set of GitPitch presentation templates using SVG background images.
I did a quick Google search and quickly found what I was looking for. Check out svgbackgrounds.com. A fantastic resource. Many thanks to Matt, the site creator and maintainer.
The resulting SVG-powered templates are now available in the GitPitch template gallery. You can get a feel for these new templates right here by viewing the following embedded live-template:
The template gallery provides a one-click download feature for every template. To get started with your chosen template, simply add the files within the download bundle to any public or private repo on GitHub, GitLab, or Bitbucket.
The fastest way to download the entire template gallery is to fork the template repo on Github, see here.
Over time new templates will be added to the gallery. So remember to check back from time to time or simply watch this repo on GitHub and get automatically notified of updates.
With templates, GitPitch is making it easier than ever to get started crafting and sharing beautiful content about the things you care about. Use it to promote, pitch or present absolutely anything ;)
Get started with GitPitch SVG image support right now, login here.
Create your free account to unlock your custom reading experience.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057580.39/warc/CC-MAIN-20210924201616-20210924231616-00303.warc.gz
|
CC-MAIN-2021-39
| 2,622 | 18 |
https://www.allinterview.com/company/1283/kpmg/interview-questions/204/non-technical.html
|
code
|
any idea abt REVERSE METERING concept.........?
List the logical databases that exist in hr.
hi iM rahul.my questions is my project is a web based & developed using java,jsp. when i record it using qtp what script i will get like either browser("jdfjkf").page("nkf").... or javawindow("f d ").javaedit("Dasf").... plz clarify my doubt asap and i also need some vbscipt of java coding?
i am getting an of the type can not convert int to int *. to overcome this problem what we should do?
Why to use option explicit in vb script?
Can you move program files x86 to another drive?
What is the purpose of a buffer register in reference to 8085?
What is xml and some of its applications?
what does powerpoint environment contain?
what is structure in reporting?
What is the importance of driver in hive?
Will linux run windows programs?
how many types of bytes are there???
Is alive and join method in java?
Explain about the property-remove method?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400250241.72/warc/CC-MAIN-20200927023329-20200927053329-00071.warc.gz
|
CC-MAIN-2020-40
| 943 | 15 |
https://unixdigest.com/tutorials/encrypting-and-decrypting-files-using-gnupg-openssl-or-mcrypt.html
|
code
|
Encrypting and decrypting files using GnuPG, OpenSSL or Mcrypt
Published on 2009-04-01. Modified on 2016-07-26.
How to encrypt and decrypt a file with GnuPG, OpenSSL or LibreSSL, or Mcrypt using the Advanced Encryption Standard and a password phrase.
$ gpg -c --cipher-algo AES256 filename
Results in a file called
$ gpg filename.gpg
In this example I am also using compression.
Encryption with compression:
$ mcrypt -z -a rijndael-256 filename
Decryption with compression:
$ mcrypt -z -d filename
Se man mcrypt for more information and
mcrypt --list for at list of the different supported algorithms.
Use LibreSSL instead of OpenSSL. It's still the same command, but LibreSSL is a version of the TLS/crypto stack forked from OpenSSL in 2014 by OpenBSD, with goals of modernizing the codebase, improving security, and applying best practice development processes.
$ openssl aes-256-cbc -e -in filename -out encrypted_filename
$ openssl aes-256-cbc -d -in encrypted_filename -out filename
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817036.4/warc/CC-MAIN-20240416000407-20240416030407-00868.warc.gz
|
CC-MAIN-2024-18
| 987 | 16 |
https://issues.matomo.org/17761
|
code
|
When viewing the performance metrics we are missing data for most dates
When looking at performance metrics we expect to find data for all dates.
We have data for different dates.
We are using Matomo 4.3.1
Data is archived with cron archiver, no errors in the logs for missing dates for performance metrics.
@mikkeschiren for days that have missing metrics, can you check in the log_link_visit_action table if there are any positive values in the performance dimension columns, for example
@diosmosis - values were in fact NULL on the dates with no data that I tested, how could this happen?
I will check with our analysts if they have done some changes on some dates, but with the results we are getting, that does not really make sense (couple of days per month that we have results, and then thousands of them, and next day none). But with that said - it could be an implementation problem.
@sgiehl wouldn't it be expected in some cases when the tracking request is sent before the browser load event for example and there is no follow up load event?
Yes. indeed. If the page tracking event is sent before the performance metrics are available they will be sent with the next tracking request. If no further tracking request is sent, the performance metrics might not be tracked at all.
It might work to trigger a ping once the page was completely loaded
This could be a implementation issue, I think we can close this now.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588284.71/warc/CC-MAIN-20211028100619-20211028130619-00168.warc.gz
|
CC-MAIN-2021-43
| 1,426 | 12 |
https://cloudmersive.medium.com/validate-a-url-in-python-1526f1d9daaf?source=post_internal_links---------2----------------------------
|
code
|
Online security is a top priority in the modern business world. Thus, knowing whether website links are safe will help you prevent any threats to your operations. Furthermore, it is important to know if you have collected the correct information about a website, particularly if you are using it for potential leads. The following API will validate a URL in full. This means that it will check whether the URL is syntactically valid, whether the URL exists, and whether the endpoint is running and passes virus scan checks.
Run this command to install the SDK:
pip install cloudmersive-validate-api-client
Then, you can call the function:
from __future__ import print_function
from cloudmersive_validate_api_client.rest import ApiException
from pprint import pprint# Configure API key authorization: Apikey
configuration = cloudmersive_validate_api_client.Configuration()
configuration.api_key['Apikey'] = 'YOUR_API_KEY'# create an instance of the API class
api_instance = cloudmersive_validate_api_client.DomainApi(cloudmersive_validate_api_client.ApiClient(configuration))
request = cloudmersive_validate_api_client.ValidateUrlRequestFull() # ValidateUrlRequestFull | Input URL requesttry:
# Validate a URL fully
api_response = api_instance.domain_url_full(request)
except ApiException as e:
print("Exception when calling DomainApi->domain_url_full: %s\n" % e)
This will return responses for whether the URL, syntax, domain, and endpoint are valid, as well as a string containing the standardized URL. You can retrieve the API Key from the Cloudmersive website at no cost and with no commitment. This will provide you with 800 monthly calls across our library of APIs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358774.44/warc/CC-MAIN-20211129134323-20211129164323-00631.warc.gz
|
CC-MAIN-2021-49
| 1,670 | 16 |
https://math.stackexchange.com/questions/2858432/what-is-the-difference-between-a-math-text-book-and-a-math-reference-book
|
code
|
I saw the list of books suggested by my college. There are two categories, one for text book and the other for reference book. For abstract algebra, they have Dummit and Foote, Abstract Algebra as textbook, and Herstein, Topics in Algebra as reference book. Both seem to be similar, but, don't know, the difference in how they were categorised.
In general terms, a textbook is a book you can read from the beginning to learn a new subject - perhaps on your own, perhaps in a course. Not necessarily quite that linear, since you will need to double back to reread and refresh. When you're done with the book and the course (do the exercises!) you will more or less know the material.
If you need to check some particular definition or theorem a textbook might not be the best place to look, since the idea may be spread out over several pages or sections. A reference book is likely to be more compact. (Sometimes wikipedia is a good "reference book" for things you already know something about.)
That said, both the books you ask about are textbooks, designed for an abstract algebra class. Herstein is harder/deeper/faster than Dummit and Foote. Your college is suggesting that the course will rely on D&F but that you may be able to learn a little more from a different perspective from Herstein. They may also be suggesting that you should buy D&F but consult Herstein in the library.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.26/warc/CC-MAIN-20240227121318-20240227151318-00382.warc.gz
|
CC-MAIN-2024-10
| 1,387 | 4 |
https://coderanch.com/t/488679/java/Configure-MDB-listen-Message
|
code
|
How to Specify/Configure MDB to listen to a Message
posted 7 years ago
I have a Topic and serveral MDB's listening to this topic to consume the message. I want to filter the messages of some specific types and want to send to a particular MDB but not to all. How this can be acheived?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824537.24/warc/CC-MAIN-20171021005202-20171021025202-00228.warc.gz
|
CC-MAIN-2017-43
| 284 | 3 |
https://groups.google.com/g/rightfield/c/AKepGJVQlyQ
|
code
|
I followed the directions smoothly till the step:
For this example, find the Microarray and Gene Expression Data (MGED) ontology from the drop-down list, either by typing in the first few characters in the ‘Filter’ field box, or by scrolling down the list, select the entry, and then click ‘OK’.
I got the ontology classes and subclasses at the right pane. However, it didn't open within the Excel sheet; not by double clicking the ontology nor the class name.
Can we advise what may be wrong at this point...?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587623.1/warc/CC-MAIN-20211025030510-20211025060510-00645.warc.gz
|
CC-MAIN-2021-43
| 518 | 4 |
http://www.defaultlogic.com/learn?s=Chakra_(JScript_engine)
|
code
|
|Operating system||Microsoft Windows|
A distinctive feature of the engine is that it JIT compiles scripts on a separate CPU core, parallel to the web browser. Though Microsoft has in the past pointed out that other elements, such as rendering and marshalling, are just as important for a browser's overall performance, their improvements to the engine were in response to evolving competing browsers, compared to which IE8 was lagging behind in terms of client-side script processing speed.
SunSpider tests performed on November 18, 2009 showed the PDC version of IE9 executing scripts much faster than IE8, but slower than Firefox 3.6, Chrome 4, and WebKit Nightly. The same test performed on March 15, 2010 showed the first IE9 Platform Preview (using the then-current version of Chakra) to be faster than Firefox (with SpiderMonkey), but slower than Safari (with SquirrelFish Extreme), Chrome (with V8), and Opera (with Carakan).
In 2012, subsequent versions of Chakra, such as the version included in Internet Explorer 10, introduced additional performance changes, including JIT compilation on x64 and ARM architectures, and optimizations related to floating point math and garbage collection.
At the Last Call JSCONF in 2015, Microsoft announced that they were open sourcing the ChakraCore engine in January 2016 on GitHub. ChakraCore is essentially the same as the Chakra engine that powers the Microsoft Edge browser, but with platform-agnostic bindings, i.e. without the specific interfaces utilised within the Windows Universal App platform. On January 13, 2016, Microsoft released ChakraCore under the MIT license on GitHub as promised.
Manage research, learning and skills at defaultLogic. Create an account using LinkedIn or facebook to manage and organize your Digital Marketing and Technology knowledge. defaultLogic works like a shopping cart for information -- helping you to save, discuss and share.Visit defaultLogic's partner sites below:
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589251.7/warc/CC-MAIN-20180716095945-20180716115945-00090.warc.gz
|
CC-MAIN-2018-30
| 1,958 | 6 |
https://smartworkershome.com/jobs/software-developer-allovue/
|
code
|
Allovue believes every student deserves access to the resources they need to be successful in school. Our education resource planning software empowers K–12 administrators at every level to allocate resources to best support the needs of their students. We seek people who are creative, funny, humble, flexible, motivated, collaborative, and problem-solvers. We love and respect our team members. We also love silly GIFs.
- front-end development
- back-end development
- data mining
We have services written in R and Ruby: including a Rails API. We use Postgres and Elasticsearch as our persistence layers and Ember.js as the framework we currently use for our client-side application. Some languages we have been evaluating for upcoming services include Clojure, Elixir, and Node.js. We do not expect a candidate to have all of those skills currently, but s/he should be proficient in building web applications at scale.
- 5+ years of professional software development
- Experience with MVC frameworks and paradigms
- Excellent designer of APIs for other developers (and future self!)
- Solid understanding of both unstructured and relational databases
- Low ego and high pride in your
Allovue’s Current Stack
- Competitive salary, commensurate with experience
- Comprehensive medical, dental, and vision coverage
- Employee-friendly option plans
- Administration of a 529 plan (education savings account)
- A team of smart, passionate, funny, kind people
- Flexible hours and locations
- Time to recharge with more than 3 weeks PTO
- Empowerment: We strive to harness the power of technology, and balance it with the empowerment of educators to make better decisions for their students.
- Thoughtfulness: By balancing intuition, pragmatism, and information, we keep educators and their goals in mind when building our company and our products.
- Humility: We take pride in our work, and its importance, while remaining humble in our process and remembering that the students are the bottom line.
- Diversity: Our team is varied in our backgrounds, but singular in our vision. We’re committed to solving the problems our customers face.
How To Apply:
Apply using the link in Custom Application URL
- Salary Offer To be arranged
- Experience Level 5-8-years, 8-10-years, 10-years
- Education Level not-required
- Working Hours Flexible hours
- Closing Date December 10, 2018
- Job Application Via Custom Application Page
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103920118.49/warc/CC-MAIN-20220701034437-20220701064437-00232.warc.gz
|
CC-MAIN-2022-27
| 2,426 | 30 |
http://homebrew.stackexchange.com/questions/tagged/pilsner+all-grain
|
code
|
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Which malts have the highest SMM (precurser of DMS) content?
I've been scouring the internet, trying to find some kind of list of the SMM content in various malts so I know when it would be wise to do a 90 minute boil. I can't find anything, just the definition ...
Apr 13 '11 at 11:50
newest pilsner all-grain questions feed
Hot Network Questions
X or Y guitarist doesn't know music theory - how true is this statement?
Could somebody please translate this and show me what I'm missing?
Meaning of “shelves” in an accounting ledger
Perl DBI takes 60 seconds to connect to an Oracle database, every single time
Should I learn to use LaTex to write up a History Masters Thesis?
How to match a cyclically repeating sequence?
Why do the Jedi insist on the concept of "No Attachment"?
Should I take turns during a skill challenge?
Why are there balls of fur behind my dog's ears, and how can I get rid of them?
How to copy a file to multiple folders in Terminal?
Make the company better or walk away?
How to stop feeling guilty about the unfinished work?
Any issue with nesting "using" statements in c#?
In Python, why can a lambda expression refer to the variable being defined but not a list?
The Floating Horde
Cellular automaton in Mathematica: Writing the rule
Could you please tell me the time?
Protect footnotemarkes from selection in pdf
Shakespeare and Maths: Metre and Completeness
In early-mid game, how to fight as a mage with low magicka regen?
Configuring two IPs for one server?
How to respond to "Why shouldn't we hire you?"
Required but not mandatory
Where did the Mani Mani statue come from?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Overflow
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011335666/warc/CC-MAIN-20140305092215-00023-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 2,247 | 52 |
http://xhp.xwis.net/p/5786
|
code
|
|Remove frames from RA1||TByte||03:44 15-09-2002|
Hi, I want to help RA community. I noticed that allies/soviet helicopters have too many frames in the propellers. I am thinking that all those frames have to be synchronized in multiplayer games, it causes sync breaks inside the code and the games become unstable. Lag significantly increases when a lot of choppers are made, which shouldn't happen. The propellers have a few frames, but they are used too often to spin really fast. Can I make RA execute less such frames?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655884012.26/warc/CC-MAIN-20200704042252-20200704072252-00479.warc.gz
|
CC-MAIN-2020-29
| 522 | 2 |
https://deseng.ryerson.ca/dokuwiki/wiki:refactor_while_respecting_signatures
|
code
|
Problem: you need to attribute content in a page to multiple authors after refactoring.
The signed work of others, even if very brief in word-count, may have had substantive influence on the content development as a whole. Other changes, more cosmetic or editorial in nature, may seem larger.
Respect signatures on large-scale contributions: Don't delete signatures from opinion pieces or original work and don't change the meaning of a signed work.
Create attribution groups: One possibility is having three classes of page authorship: lead/core author(s), editor(s), and other contributor(s). The first create most of the content, the second tidy/refactor/polish content, and the third do little bits here and there, ask questions, etc. For authors who contribute pretty much everywhere in a page, give their names, in the appropriate groups, at either the top or bottom (or both!) of the page.
Collect attributions of page segments: If an author only ever contributed to one section of a page, consider adding an appropriate attribution for the author only to the section, say
“Some content in this section by NAME HERE.”
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103645173.39/warc/CC-MAIN-20220629211420-20220630001420-00322.warc.gz
|
CC-MAIN-2022-27
| 1,128 | 6 |
https://emperyidea.com/phpbackup/
|
code
|
The above command will dump all
databases except for test and unimportant_db from server.com
The data from two tables, large_table1 & cachetable,
(found in database largedb) will be ignored, however the table structure will be
backed up. This is especially handy if you have temporary tables or large
tables which contain unimportant / cached data.
A total of 30-days of backups
will be kept. Note: Backups are named by date
(yyyy-mm-dd.tar.xz), so a maximum of 1 backup per day can be kept. If the
script is re-run on the same day, the repository is synced and the existing
daily backup overwritten.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545090.44/warc/CC-MAIN-20220522063657-20220522093657-00166.warc.gz
|
CC-MAIN-2022-21
| 600 | 11 |
https://www.ytpak.com/watch?v=YXjlXOxridA
|
code
|
Published on 25 Apr 2014 | over 3 years ago
Two Steps From Hell - Strength Of A Thousand Men [Instrumental Core Remix]
WWE Superstar Dave Batista - Motivational Workout HD
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use."
Report video function is under development.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645413.2/warc/CC-MAIN-20180318013134-20180318033134-00761.warc.gz
|
CC-MAIN-2018-13
| 573 | 5 |
https://scitechkapsar.co/2011/07/23/a-convergence-ice-copyright-odwyer-swartz/
|
code
|
I think we’re in the middle of a very bad convergence of cultural inhibitors. Most things that would fall under the purview of culture is copyrighted. Historically, we never had much trouble with this as individuals. However, now we’re seeing more and more problems with this. As I’ve discussed in the past, ICE is heavily involved, individuals like James O’Dwyer and Aaron Swartz are in the middle of two different kind of legal action and content owners are coming up with new ways to control their material.
What do I think is going on? I think that we could be seeing the end of our ability to freely use our culture. We are also seeing the US attempting to govern the world’s copyright law. For instance, the US is seeking to extradite O’Dwyer over a links page, something like Justin.TV, which in the UK isn’t illegal and no one is sure if it’s actually illegal in the US or not (See this ars technica article for more information). This isn’t the only case like this. ICE seized a website that was declared legal in Spain.
One of the best parts of the copyright law for consumers is the First sale provision. This allows a consumer that owns a book, but not the copyright, to sell this book to some one else. Or do with this book anything they want to after the first sale. However, we’re seeing this ability erode away. Autodesk, makers of AutoCad, are suing a guy that is trying to resell a two copies of AutoCad. They are claiming it violates their copyright and their End User Licence Agreement.
Digital Rights Management (DRM) is another manner in which content owners are exerting excess control over their content. If you bought a song from iTunes, that DRM is going to last longer than the copyright which it is absurd in my opinion.
Another case where DRM and content ownership is going to have a long term negative impact is in the PC gaming industry. There are a few major platforms for game digital game distribution. Steam being the largest, however all these games are put into a walled garden of “ownership” where you are able to play the game and use it, but you aren’t in control of the actual content. You have absolutely no ability to resell the game. In the past, if you didn’t like a game after you bought it, you had the ability to sell it for a loss to some place like Gamestop. With these online platforms you don’t have the ability to do that, as it would cannibalize sales from Steam itself.
Other services are starting to get into the act to prevent copyrighted materials from being sole without the owner’s consent. Today, PayPal has decided to ban payments to any website that is illegally selling copyrighted material (Torrent Freak article). This is pretty serious. As a company the have the right to do so, and I’m very sure that there will be some other service that will provide secure monetary transfers.
Based on these observations, I believe that our government and content owners are working to control and limit the freedom of usage of our own culture. It’s not a conspiracy, as the government is actively working with RIAA and MPAA to help regulate the material. ISPs have recently gotten involved in the game as well (EFF commentary). These groups are working to use copyright to gain more control over the material every day.
What can we do? Contact your government officials, get educated through EFF and Creative Commons, and other organizations like this.
Lawrence Lessig Code 2.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950528.96/warc/CC-MAIN-20230402105054-20230402135054-00436.warc.gz
|
CC-MAIN-2023-14
| 3,468 | 9 |
https://www.ams.org/journals/proc/1977-064-02/S0002-9939-1977-0440547-2/home.html
|
code
|
Abstract:An example is constructed of a fibration over the torus which induces isomorphisms on all homology groups but which has a nontrivial Serre spectral sequence.
- © Copyright 1977 American Mathematical Society
- Journal: Proc. Amer. Math. Soc. 64 (1977), 372-373
- MSC: Primary 55F20
- DOI: https://doi.org/10.1090/S0002-9939-1977-0440547-2
- MathSciNet review: 0440547
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499768.15/warc/CC-MAIN-20230129211612-20230130001612-00314.warc.gz
|
CC-MAIN-2023-06
| 376 | 6 |
https://answers.yahoo.com/question/index?qid=20131116063204AAMv8I8
|
code
|
can anyone tell me what is oracle and ERP and what is JD Edwards enterpriseone?
ORACLE is software creation company name,,bt i am confuse that is JD Edwards is also a software creation company?
ERP includes all the modules related different area of company,,such as finane HR marketing etc..bt i m damn confuse in relation between all these?
- mr. cLv 66 years agoFavorite Answer
until recently Oracle was primarily THE database company.
beside their core product the Oracle database (currently versions 11g and 12c) Oracle also has been offering for many years a number of software products around their databases:
- development tools
- applications server (roughly a web server based on Apache)
- an ERP (Enterprise Resources Planning) system called e-Business Suite (or short eBS)
since a few years (+/- 10 yrs) Oracle got into an acquisition frenzy and has been buying (in no particular order)
- competing ERP systems such as JDEdwards, PeopleSoft and Siebel
- competing databases (MySQL)
- and many more
as Oracle is the leading database (and related) product software company & the licenses are quite hight it has a "healthy" cash flow & has bought up many (smaller) database related companies - and will probably continue this practice in the foreseeable future.
beside those software companies acquisitions Oracle also bought in 2009 Sun which was originally a Unix (SunOS) and hardware (Sun workstations) company. despite many innovative developments Sun ended up having serious financial problems in the 2000s and in 2009 started talks with several of its competitions (Hardware & Software companies) about a merger. after those talks did not end up as hoped Sun agreed to be bought by Oracle.
thus Oracle is nowadays not only a database &related software company but a one-stop company that offers everything companies need for their ERP data center.
JDE Enterpriseone is a product developed by JDE prior to its acquisition by Peoplesoft which later got acquired by Oracle and is still sold nowadays by Oracle.Source(s): Oracle professional.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370507738.45/warc/CC-MAIN-20200402173940-20200402203940-00334.warc.gz
|
CC-MAIN-2020-16
| 2,052 | 17 |
http://www.sqaforums.com/forums/hp-mercury-winrunner/20293-embedded-browser.html
|
code
|
The application which I am testing contains an embedded browser within a frame. There are a lot of controls within the frame. Winrunner is not able to identify any of these objects
check out with patches.
Also, pls mention what add-ins you are using and versions.
You may need to modify your wrun.ini file and add an entry under the "[ie_hooks]" section for your application in the format "application.exe=yes".
web site | [url=http://www.ebookworm.us/[/url]
[i]...Sound trumpets! Every trumpet in the host! / Sixty thousand, on these words, sound, so high the mountains sound, and the valleys resound.</i] (The Song of Roland)
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00280-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 627 | 6 |
http://lists.egnite.de/pipermail/en-nut-discussion/2015-July/029752.html
|
code
|
[En-Nut-Discussion] RFC: Moving to github
bon at elektron.ikp.physik.tu-darmstadt.de
Mon Jul 20 19:34:49 CEST 2015
>>>>> "Harald" == Harald Kipp <harald.kipp at egnite.de> writes:
Harald> Several contributions to this list suggested to switch to Git,
Harald> but keep the SVN workflow. In the meantime my experience is,
Harald> that this is the worst of both world.
Can you tell about your experience? What is worse?
Harald> What I like with SVN is its simple revision structure and how it
Harald> keeps track about patches between branches. However, Uwe
Harald> reported problems with SVN merging, when using Git with SVN. See
Well, probably I barked to early at that time.
" git log -p --follow nut/gorp/edit/edline.c" at least shows the changes.
And I was in the missbelief that "git svn fetch" also fetches the changes in
branches. I now noticed that this is not true. Probably if I fetch and
rebase devnut-tiva, "git log" will even have more info about the
merge. As long at the local git repo doesn't have 5894-r5896, it can't tell
about the commit messages doen with r5894-r5896.But probably will show the
commit messages, when I have fetched r5894-r5896 in the local git
repo.However with the present SF downtime, I can not check.
Harald> The solution he suggested makes "svn mergeinfo" completely
Harald> useless and cherry picking and tracking of trunk patches for
Harald> older branches too time consuming. As a result, the 4.x branches
Harald> were no longer maintained since then and SVN lost one of its
Harald> essential features.
So did my nitpicking keep you from updating the 4.x branches? Sorry about
Harald> The thing I like most with Git is its decentralized workflow.
Harald> Several posts to this list suggested the centralized workflow,
Harald> but IMHO this would limit Git's most prominent feature,
Well, everybody working on SVN is now cut off:
- No patch history
- No way to check in local changes.
Somebody working with git-svn can still:
- check in patches to his local tree
- look at the patch history of file
- branch, etc.
That is some very important decentralization!
Harald> So, if you want to lose essential features of SVN and Git, then
Harald> continue to emulate SVN with Git. If you want get the full
Harald> potential of Git, then I'd strongly recommend to use the forking
Harald> workflow. Once again I'd like to point you to
I think git-svn doesn't emulate SVN with Git. I only makes the SVN repo
accessible in the git way, without changing the SVN repo as such.
Of cource, I fork. But I only fork in my local repo, and I soon resync with
the central repo.
So again, please elaborate where this is "the worst of both world".
Uwe Bonnes bon at elektron.ikp.physik.tu-darmstadt.de
Institut fuer Kernphysik Schlossgartenstrasse 9 64289 Darmstadt
--------- Tel. 06151 162516 -------- Fax. 06151 164321 ----------
More information about the En-Nut-Discussion
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891926.62/warc/CC-MAIN-20180123111826-20180123131826-00225.warc.gz
|
CC-MAIN-2018-05
| 2,895 | 50 |
https://aclanthology.org/people/a/amanda-cercas-curry/
|
code
|
We present the first English corpus study on abusive language towards three conversational AI systems gathered ‘in the wild’: an open-domain social bot, a rule-based chatbot, and a task-based system. To account for the complexity of the task, we take a more ‘nuanced’ approach where our ConvAI dataset reflects fine-grained notions of abuse, as well as views from multiple expert annotators. We find that the distribution of abuse is vastly different compared to other commonly used datasets, with more sexually tinted aggression towards the virtual persona of these systems. Finally, we report results from bench-marking existing models against this data. Unsurprisingly, we find that there is substantial room for improvement with F1 scores below 90%.
Technology companies have produced varied responses to concerns about the effects of the design of their conversational AI systems. Some have claimed that their voice assistants are in fact not gendered or human-like—despite design features suggesting the contrary. We compare these claims to user perceptions by analysing the pronouns they use when referring to AI assistants. We also examine systems’ responses and the extent to which they generate output which is gendered and anthropomorphic. We find that, while some companies appear to be addressing the ethical concerns raised, in some cases, their claims do not seem to hold true. In particular, our results show that system outputs are ambiguous as to the humanness of the systems, and that users tend to personify and gender them as a result.
Conversational voice assistants are rapidly developing from purely transactional systems to social companions with “personality”. UNESCO recently stated that the female and submissive personality of current digital assistants gives rise for concern as it reinforces gender stereotypes. In this work, we present results from a participatory design workshop, where we invite people to submit their preferences for a what their ideal persona might look like, both in drawings as well as in a multiple choice questionnaire. We find no clear consensus which suggests that one possible solution is to let people configure/personalise their assistants. We then outline a multi-disciplinary project of how we plan to address the complex question of gender and stereotyping in digital assistants.
How should conversational agents respond to verbal abuse through the user? To answer this question, we conduct a large-scale crowd-sourced evaluation of abuse response strategies employed by current state-of-the-art systems. Our results show that some strategies, such as “polite refusal”, score highly across the board, while for other strategies demographic factors, such as age, as well as the severity of the preceding abuse influence the user’s perception of which response is appropriate. In addition, we find that most data-driven models lag behind rule-based or commercial systems in terms of their perceived appropriateness.
Conversational AI systems, such as Amazon’s Alexa, are rapidly developing from purely transactional systems to social chatbots, which can respond to a wide variety of user requests. In this article, we establish how current state-of-the-art conversational systems react to inappropriate requests, such as bullying and sexual harassment on the part of the user, by collecting and analysing the novel #MeTooAlexa corpus. Our results show that commercial systems mainly avoid answering, while rule-based chatbots show a variety of behaviours and often deflect. Data-driven systems, on the other hand, are often non-coherent, but also run the risk of being interpreted as flirtatious and sometimes react with counter-aggression. This includes our own system, trained on “clean” data, which suggests that inappropriate system behaviour is not caused by data bias.
The majority of NLG evaluation relies on automatic metrics, such as BLEU . In this paper, we motivate the need for novel, system- and data-independent automatic evaluation methods: We investigate a wide range of metrics, including state-of-the-art word-based and novel grammar-based ones, and demonstrate that they only weakly reflect human judgements of system outputs as generated by data-driven, end-to-end NLG. We also show that metric performance is data- and system-specific. Nevertheless, our results also suggest that automatic metrics perform reliably at system-level and can support system development by finding cases where a system performs poorly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945372.38/warc/CC-MAIN-20230325191930-20230325221930-00343.warc.gz
|
CC-MAIN-2023-14
| 4,526 | 6 |
http://www.bom.gov.au/wa/warnings/
|
code
|
This page provides a summary of the valid weather warnings issued in this state.
This page automatically refreshes whenever a warning is issued. Click on the warning link for more information.
- Warnings current:
- Marine Wind Warning Summary for Western Australia,
- Cancellation of Severe Thunderstorm Warning for Goldfields, Eucla, South Interior, South Coastal, South East Coastal, Great Southern and Central Wheat Belt forecast districts,
- Flood Warning Summary (WA),
- Flood Watch - Kimberley (WA).
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802770403.126/warc/CC-MAIN-20141217075250-00120-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 505 | 7 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.