url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://lists.wikimedia.org/hyperkitty/list/[email protected]/message/5SYNYWKOBCKBOSVZWNJ35YIEY3PXPSNK/
code
As the (main) author of the new software, I'd like to contribute some things to this debate: - Watching the actions of a signed-up user will be very simple, even if he/she logs in from different machines. - Counting edits/new articles will be as simple. - After each "karma point" addition, the status could be checked and basic rights could be given. - All pages can be locked to give write access only to people with the necessary user rights. So, no technical problem with that. But, think about what I originally had in mind (I mentioned that somewhere already) : - Have about a dozen "sysops"/administrators. Larry, Jimbo, a few others (and currently myself, for maintnance;) - Sysops can do everything: edit other user's rights, delete pages (and I mean delete, not just remove the contents), mess directly with the database - Sysops can create "editors", which have less rights, but of whom there are - *Everybody* can edit pages in the normal wikipedia namespace - Good articles can be advanced into an "approved" namespace (by everybody, or by a special "reviewer" class) - Editors can advance articles from the "approved" namespace to the namespace, or remove it from "approved" - The "stable" namespace can only be edited by sysops "Reviewers" and maybe "editors" could also be generated by karma by LSD ;) Additionally, central pages could still be protected, and my new variables will change the date and the number of articles on the HomePage A word to "blocked IPs": Almost everyone who goes online via an ISP gets a random IP from the ISP every time he/she dials in. Blocking such an IP would not stop trolls, but it would stop other harmless people who come in through the same ISP at a later time. We don't want "wikipedia colateral damage", now do we?
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711200.6/warc/CC-MAIN-20221207153419-20221207183419-00137.warc.gz
CC-MAIN-2022-49
1,770
31
https://profriehle.com/2022/04/21/using-open-source-to-align-academic-client-supplier-relationships/
code
Open source is a boon for academic project collaboration. As long as the collaboration is not only voluntary, but also on equal footing, everyone can contribute and benefit under the guidance of an open source license and processes. However, as soon as money flows between the partners, the lawyers will want to have their say, and things get complicated. Fortunately, open source can fix this as well. The setup: One of the two academic partner is sponsoring the other, for example, based on a larger grant. Economically, this creates a client supplier relationship between the partners, and the lawyers of the client university are likely to ask for a full rights transfer in return for the sponsorship. The lawyers of the supplier university in turn will often insist that anything but a gift cannot be accepted. Between these two extremes, open source is the common ground. Specifically the strategies that can be learned from commercial open source vendors. Applying the model to university collaboration asks for two things: - The supplier university grants the client university a non-exclusive usage right to any intellectual property that the supplier is creating as part of the project. - The client university grants the supplier university the right to contribute their intellectual property under a strong copyleft license to a shared open source project. The beauty of a strong copyleft license is that while it is not strictly anti-commercial, it does curtail certain business models. More specifically, no company will build a product based on a strong copyleft licensed open source project. However, the two universities have extra rights beyond the open source license, and their world as well as the professors’ is in order: - The supplier university maintains the rights to the intellectual property they create sans the non-exclusive usage right they granted the client university. They can turn around and sell usage rights to their work to any other third party that comes asking, - The client university receives the usage rights to the supplier’s work; they don’t need more than that because they combine this intellectual property with their own, effectively creating intellectual property that only they can license out exclusively. - The professors get their open source project and are happily collaborating ever after. A key assumption here is that the professors don’t care much about commercial exploitation. (The universities have to, at least in name, because that is indeed part of the job of a modern university). Should the professor of the client university care about commercial exploitation, they will usually take further steps, most notably use contributor agreements to acquire usage rights from other contributors than the supplier university. But that’s another story.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476137.72/warc/CC-MAIN-20240302215752-20240303005752-00397.warc.gz
CC-MAIN-2024-10
2,823
11
https://blog.adafruit.com/2017/07/17/dr-mozhdeh-shahbazi-talks-autonomous-gps-free-navigation-with-the-drone-girl-drone-droneday/
code
Two drone girls discussing drones! From The Drone Girl: Dr. Mozhdeh Shahbazi wants to make it easier for drones to fly — even in areas where GPS isn’t reliable — places like street canyons, indoors, and even forests. Shahbazi received her BSc degree in civil/surveying engineering in 2009, her MSc degree in geomatics/photogrammetry engineering in 2011, and then moved on to doing PhD research focused on the development of drones for 3D modeling at the Université de Sherbrooke in Canada. She is currently an assistant professor of geomatics engineering at the University of Calgary in Canada. Read the full interview and more about Dr. Mozhdeh Shahbazi on TUN.com and Schulich School of Engineering Welcome to drone day on the Adafruit blog. Every Monday we deliver the latest news, products and more from the Unmanned Aerial Vehicles (UAV), quadcopter and drone communities. Drones can be used for video & photography (dronies), civil applications, policing, farming, firefighting, military and non-military security work, such as surveillance of pipelines. Previous posts can be found via the #drone tag and our drone / UAV categories. Join 6,000+ makers on Adafruit’s Discord channels and be part of the community! http://adafru.it/discord CircuitPython in 2018 – Python on Microcontrollers is here! Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts. Join us every Wednesday night at 8pm ET for Ask an Engineer! Follow Adafruit on Instagram for top secret new products, behinds the scenes and more https://www.instagram.com/adafruit/ Maker Business — @the_prepared is Soliciting Original Content on Diversity, Equity, and Inclusion Wearables — Victorian Arduino pizzazz Electronics — Long live labels! Biohacking — Cryosauna Applications Python for Microcontrollers — Building robots with Python, CRICKITS of the week, upcoming hackchat’ & more… Get the only spam-free daily newsletter about wearables, running a "maker business", electronic tips and more! Subscribe at AdafruitDaily.com No comments yet. Sorry, the comment form is closed at this time.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267859923.59/warc/CC-MAIN-20180618012148-20180618032148-00475.warc.gz
CC-MAIN-2018-26
2,144
18
http://fora.tv/podcasts
code
- Share your favorite videos with friends - Comment on videos and join the conversation - Get personalized recommendations - Enjoy exclusive offers Do you Tweet? Follow us and stay up to date on our latest tweets. Like us on Facebook! Subscribe to FORA.tv on Youtube! Subscribe to FORA.tv on Hulu! Connect with FORA.tv on LinkedIn!Connect on LinkedIn
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802775085.124/warc/CC-MAIN-20141217075255-00119-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
350
9
https://community.articulate.com/discussions/articulate-storyline/direct-linking-to-resources-republishing-storyline-ignore-address-in-trigger-uses-player-address
code
When I direct link to a Resource, it works the first time. But then it fails when I republished. 1) In the Player, I'm uploading a .pdf Resource from my hard drive. 2) Then, as described in in this article, I'm linking an object to the resource. The first time I publish, it works fine. But then, when I republish, in the published course, the link to the resouce ignores the address/folder structure established in step 2. Instead, it tries to open the resource using the address/folder structure in step 1. Yet, in the Storyline source file, the step 2 address/folder structure still exists. I included captures that show what I described above since I can't upload the file.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358074.14/warc/CC-MAIN-20211126224056-20211127014056-00238.warc.gz
CC-MAIN-2021-49
677
5
http://www.linuxquestions.org/questions/linux-newbie-8/centos-linux-system-command-help-plz-585941/
code
Redhat (which CentOS is derived from) has a service utility that is rather easy to use, provided you know the name of the services. The 'service' command allows you to start, stop and restart services quickly. It's as easy as 'service httpd stop' (or 'start' or 'restart') The 'chkconfig' command makes configuring services to start in defined runlevels easy. The 'service' and 'chkconfig' commands are your friends ... well, at least they're mine.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171834.68/warc/CC-MAIN-20170219104611-00461-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
448
4
https://github.com/matburt/mobileorg-android
code
A new implementation of MobileOrg, an Org mode app for Android. The app is under heavy refactoring and is not out yet: a first release should be out in the following weeks. - Modern design using Android’s Material Design guidelines - Automatic Git synchronization (via SSH and HTTP). Access to the raw files in case of conflict to solve. - Independent of Emacs: it is no longer required to use it in conjunction with Emacs. - Agenda view and Todo list view generated from the org files. - Folding of items and sub-items. - Item management: reordering of items by swiping them - Share files button - Agenda notifications See Android-Studio setup if you want to build the project. Here are a few screenshots of the current state of the app.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541396.20/warc/CC-MAIN-20161202170901-00065-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
740
12
https://community.quickfile.co.uk/t/invoice-national-account-for-work-carried-out-at-different-locations/15992
code
I need to be able to invoice a national account for work carried out at various different loactions and Identify this on the invoice other than have to type it into the description of the invoice everytime. Is there a solution to this. The description search only takes the first 35 characters of the first invoice line, so that wouldn’t work in your case. However, I think this may be a good use case for the project tags. You could create several tags, one each for each location. You can view the tags individually and find out what invoices are associated with it, or you can view all tags associated with invoices from the invoice management screen. There’s more info on the tags at the page below: I hope this helps, but please don’t hesitate to contact us if you need further help Many thanks for your reply, I may be missing somthing, I created a project tag… “work carried out at Banbury” but this dosnt print out on the invoice which is what I need it to do so that the Head Office know where the work has been done.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662573053.67/warc/CC-MAIN-20220524142617-20220524172617-00666.warc.gz
CC-MAIN-2022-21
1,038
6
http://www.societyofrobots.com/robotforum/index.php?topic=4104.0
code
I am a novice student, who's just gotten use to using digital I/O for Atmega MCU series. I am using Atmega48, and I can use basic digital sensors (Ultrasonic,touch). I have a pretty strong background in programming, but I am new to hardware stuff. So here is my question... I know that Atmega48 has A/D input pins. If I want to use analog sensors (IRsharp), do I have to get an external A/D converter? From the 50$ robot code, it seems like you connect the sensor directly to the MCU... Does this mean the MCU is able to read analog data? Also, how can a MCU "read" analog data with just one pin? From the source code, "IR_value = analogRead(0);//use pin 0 for analog" If I type this, does it read analog value from the sensor? From my understandings, analogRead () is not a command known in C language...o.O Can someone explain to me the logic behind A/D in MCU?
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218205046.28/warc/CC-MAIN-20170322213005-00156-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
863
13
https://www.androidpolice.com/2013/11/20/motorola-confirms-android-4-4-updates-for-the-droid-razr-maxx-hd-droid-razr-m-atrix-hd-what-and-more/
code
Motorola is continuing its tradition of being transparent about which devices are on the docket for OTAs. The company's online tool has been updated to indicate several new devices will be joining the Android 4.4 fold. According to Motorola's site, the Droid RAZR HD (regular and developer edition), Droid RAZR MAXX HD, Droid RAZR M (regular and developer edition), Electrify M, and the Atrix HD. So, there are some surprises in there, especially the Atrix HD on AT&T. That device never really caught on, and the developer edition isn't listed as getting the 4.4 update – only the AT&T version. We can't rule out that this is a mistake. The tool only says the updates are coming, not when. Some will obviously arrive sooner than others, mainly the devices added in the last update. At any rate, there are sure to be some happy Motorola customers today.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038073437.35/warc/CC-MAIN-20210413152520-20210413182520-00443.warc.gz
CC-MAIN-2021-17
854
3
https://dnncommunity.org/forums/aft/54
code
The OC tempalte I created for the DNN connect site is used on some pages (extension lib.) and stopped working when Composite files was switched on. None of the css of js files is loaded I found out. After some research it seems this is because there's a space in the template folder name (weird). I was able to reproduce this locally, if I remove the space from the path the template works with composite files switched on. 1. Rename the folder "OpenContent\Templates\Dnn Extensions" to "OpenContent\Templates\Dnn-Extensions" 2. Switch to this "new template" for the module that are using it. These Forums are dedicated to discussion of DNN Platform. For the benefit of the community and to protect the integrity of the ecosystem, please observe the following posting guidelines: Awesome! Simply post in the forums using the link below and we'll get you started.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500365.52/warc/CC-MAIN-20230206212647-20230207002647-00024.warc.gz
CC-MAIN-2023-06
862
9
http://www.prismtech.com/spectra/resources?page=3
code
The following Spectra Resources are currently available. Please select a resource from the menu below. Some resources require you to be logged in/registered to access them. Webcast ArchiveMore Webcasts > This webcast will demonstrate the steps for unit testing the standard SCA interfaces of an SCA component with Spectra CX. This webcast introduces the Spectra IP Core architecture, its main functions and its performance benchmarks. This webcast continues the overview of the SCA Next specification provided in the first SCA Next Webcast This webcast will discuss why the JTRS Program Executive Office (JPEO) is aggressively procuring SDR consortium and industry assistance to spearhead a high impact evolution of the SCA. PresentationsMore Presentations > View our YouTube Videos and Slideshare Presentations.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513804.32/warc/CC-MAIN-20181021073314-20181021094814-00163.warc.gz
CC-MAIN-2018-43
812
8
https://www.ssl247.ie/support/create-csr/zeus
code
Creating your Certificate Signing Request (CSR) for ZEUS Web Server v3 Follow these instructions to generate a CSR for your Web site. When you have completed this process, you will have a CSR ready to submit to ssl247.com in order to be generated into a SSL Security Certificate. Note: The following assumes you have already configured a virtual web to be SSL-enabled. Please refer to the ZEUS documentation at http://knowledgehub.zeus.com/. - Select the Web icon from the Admin Server control panel. - Select SSL Configuration. On the Edit Server panel, choose SSL ON to enable SSL. - Select SSL Quick Setup to begin creating your Private Key and Certificate Signing Request (CSR). - Enter the full path for your Private Key file under Generate Your Private Key, select key size (e.g., 1024). - Enter the Distinguished Name Field information under Create a Certificate Request. When creating a CSR you must follow these conventions. The following characters can not be accepted: < > ~ ! @ # $ % ^ * / \ ( ) ?. Distinguished Name Field Explanation Example Common Name The fully qualified domain name for your web server. This must be an exact match. If you intend to secure the URL https://www.yourdomain.com, then your CSR's common name must be www.yourdomain.com. Organization The exact legal name of your organization. Do not abbreviate your organization name. Your Organization, Inc Organization Unit Section of the organization Marketing City or Locality The city where your organization is legally located. Atlanta State or Province The state or province where your organization is legally located. Can not be abbreviated. Georgia Country The two-letter ISO abbreviation for your country. Please click here for the complete list of ISO country codes. US = United States - Hit the Setup Server button and check the Verbose box to view progress. The Private Key information and CSR contents will be presented. - Copy this CSR text; be sure to include the line "-----BEGIN NEW CERTIFICATE REQUEST-----" and everything up to and including the "-----END NEW CERTIFICATE REQUEST-----" lines. - You are now ready to submit your CSR for the certificate you wish BRAND. Additional instructions can be found on the ZEUS web site.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738595.30/warc/CC-MAIN-20200809222112-20200810012112-00498.warc.gz
CC-MAIN-2020-34
2,225
15
https://www.drawingnow.com/forum/thread/33/i-39-m-now-taking-drawing-requests/
code
Due to issues with my computer including the busy schedule I have over the summer, I'm afraid that I won't be able to take anymore drawing requests, nor will I be able to finish the other drawing requests. I'm sorry for this, as I really wish that I could continue drawing requests. O_o, lol meg I know who you are, and sure I'll draw him for you! I'll draw him digital, since you didn't specify what you want. The drawing should be ready about a week from now. o3o Hello there! im meg im a fan of something called hetalia,now can you draw him from the show?: The website that runs the program of which I draw your requests down had an error and it wasn't working for a bit. Now that site is up again, and I'm going straight to drawing your requests. So this means your drawings are going to be here a little late. Thank you for your understanding (This onleh effects the older request; newer request will be fine though!)
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499890.39/warc/CC-MAIN-20230131190543-20230131220543-00664.warc.gz
CC-MAIN-2023-06
922
5
http://www.devshed.com/c/a/Administration/Configuring-LoadBalanced-Clusters/
code
Ifquiescentisyes, a faulty realserver gets a weight of0but remains in the LVS routing table; we’ve set it tono, so dead servers will be removed from the pool. The weight of a server reflects its capacity relative to the other servers. For a simple LB scheme like ours, all live servers have a weight of1and dead ones have a weight of0. Ifchecktypeisnegotiate, the director will make an HTTP request to each of the realservers for the URLrequest, and see if its contents contain the string value forreceive. If the value ischeck, only a quick TCP check will be done, andrequestandreceivewill be ignored. The system startup files in /etc for ldirectord should have already been created during the installation. Ultra Monkey also installed Heartbeat, which we aren’t using yet, so let’s disable it for now: # update-rc.d heartbeat remove update-rc.d: /etc/init.d/heartbeat exists during rc.d purge (use -f to force) The load balancer monitors the health of the web servers by regularly requesting the file we specified in ldirectord.cf (request="director.html"). Since this server will be responding to web requests at the VIP address (220.127.116.11), we’d better tell the server about it. Edit /etc/network/interfaces and add these lines to create the alias deviceeth0:0: auto eth0:0 iface eth0:0 inet static address 18.104.22.168 netmask 255.255.255.248 # These should have the same values as for eth0: network ... broadcast ... gateway ...
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609530895.48/warc/CC-MAIN-20140416005210-00589-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,448
7
https://docs.oracle.com/cd/B14117_01/win.101/b10118/img_text/runform.htm
code
This is a screenshot of the actual form as it appears when it runs, with sample data. The screenshot shows the following: label Employee Number, field 7369 label Employee Name, field Smith label Employee Job, field Clerk. At the bottom, appears the Oracle Data control, with next, previous, first, and last arrows.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627997731.69/warc/CC-MAIN-20190616042701-20190616064701-00321.warc.gz
CC-MAIN-2019-26
314
6
https://forum.eclipseaudio.com/topic/360-degrees-phase-jump/
code
Dear Eclipse Audio Support, I need your advice. I prepared ppt file to make it clear, so I can send you graphs. I designed a filter to be a liner phase response by FIR Creator. After applying the filter to miniDSP OpenDRC, I took a measurement by REW. There is 360 degrees phase jump during 700 – 900 Hz occurred. I guess I took a mistake to use FIR Creator correctly. Would you please give me your advice on this? What was wrong.. Oct smooth?? Sorry, this forum is for logged in users only. Please Login to continue This topic is: Awaiting Feedback
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817002.2/warc/CC-MAIN-20240415142720-20240415172720-00597.warc.gz
CC-MAIN-2024-18
551
9
https://bugs.mojang.com/browse/MCL-1842
code
Today I bought Minecraft, downloaded the exe and ran it, all I get is a frozen launcher screen. The version is actually 1.3.3 but your website does not accept that. I have tried the following: Restarting the computer Removing the .minecraft folder completely Redownloading the minecraft.exe Diagnostic startup with MSCONFIG Ran minecraft.exe as administrator Disabled windows defender Also tried old launcher which also freezes as soon as it opens I get the same thing every time. I would like my money refunded if the game isn't going to work.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655143.72/warc/CC-MAIN-20230608204017-20230608234017-00566.warc.gz
CC-MAIN-2023-23
544
12
https://connect.mozilla.org/t5/user/viewprofilepage/user-id/13597
code
View all badges No posts to display. Re: Bring back PWA (progressive web apps) The lack of PWA support is the only thing keeping me from switching from Chrome to Firefox. It’s essential for developer workflow. Mozilla this is a feature we NEED.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510603.89/warc/CC-MAIN-20230930050118-20230930080118-00632.warc.gz
CC-MAIN-2023-40
246
4
https://github.com/nodecast/mongo-cxx-driver
code
this is a mirror of mongodb c++ driver (http://dl.mongodb.org/dl/cxx-driver) get stable version from branches Join GitHub today GitHub is home to over 31 million developers working together to host and review code, manage projects, and build software together.Sign up mongodb c++ driver mirror (http://dl.mongodb.org/dl/cxx-driver) Fetching latest commit… Cannot retrieve the latest commit at this time. |Type||Name||Latest commit message||Commit time| |Failed to load latest commit information.|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203378.92/warc/CC-MAIN-20190324063449-20190324085449-00080.warc.gz
CC-MAIN-2019-13
498
8
http://www.planet-9.com/porsche-care-and-detailing/29130-applying-zymol-cleaner-wax.html
code
Hi Guys so I've been tinkering with a few products to clean my new cayman (black)...I used the Meguire's wash, polish, and Zymol wax. I followed the instructions perfectly. However about a day, it seemed as though the areas where I applied the wax were attracting dust. There was actually a pretty distinct delineation between waxed/nonwaxed areas. Did I just not do a good enough job of wiping of the wax?
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049273946.43/warc/CC-MAIN-20160524002113-00072-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
406
1
https://meatec.ae/page/products?p=secureauth
code
Better identity security. Better user experience. No compromise. The SecureAuth® Identity Platform provides the flexibility required to meet the security and usability requirements for your diverse population of identities — workforce and cus- tomer. We offer the most multi-factor authentication choic- es, the most adaptive authentication risk checks, support all major federation protocols for single sign-on, and deliver self-service tools to keep your users productive while reduc- ing help desk calls. Request a Demo Visit Site
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00169.warc.gz
CC-MAIN-2023-50
536
3
http://ajax.sys-con.com/node/2524093
code
|By Sven Hammar|| |January 24, 2013 03:07 AM EST|| In 2013, mobile devices will pass PCs to be most common Web access tools. By 2015 media tablet shipments will reach around 50 percent of laptop shipments and over 80 percent of the handsets sold in mature markets will be smartphones. These trends were highlighted by Gartner research in their ”Top 10 Strategic Technology Trends for 2013” presentation at Gartner Symposium/ITxpo, last October in Orlando. Apple App Store has over 700 0000 apps¹, Android Market over 700 000 apps² and Windows Market Place has in only 13 months reached 50 000 apps³. They amount of developers working on Windows apps has increased significantly in the last couple of months. When Windows Phone 7.5 was released more than 10 000 new apps were uploaded in a period of 40 days. The competition in the app space is fierce with user demands increasing, one being the responsiveness of the services behind the pretty front ends. How to make sure you are keeping up with the increasing demands ? Apica, as provider of performance testing and monitoring services for cloud and mobile applications, is giving customers and software vendors a new way to track mobile application performance. Apica’s next generation WebPerformance Monitoring(WPM) service now has extended mobile application testing functionality. With this new WPM service Apica allows for mobile application performance testing – a cruical part of the Mobile Application Management lifecycle. Apica now has the ability to measure the performance of a mobile application from over 100 locations worldwide. The success of a new mobile application is more likely if the performance and responsiveness are tested before a public launch or version release. By constantly monitoring and gathering performance data of the app over time the user experience is maintained. When response time deviate alarms should be sent to the application owner. Through scripting typical usage scenarios can be tested and potential flaws may be detected,fixed and re-tested by the developers. ”Along with the increased usage of mobile devices for web browsing and web application access the related server platform must be able to cope with the increased load. We now have the ability to record and test application calls from three of the largest mobile platforms in the market. The development of more capabilities are under way with a Windows Phone 8 release planned for the summer timeframe.” - Thomas Wiik, Apica Test Specialist and Lead Developer. ¹ - http://ipod.about.com/od/iphonesoftwareterms/qt/apps-in-app-store.htm ² - http://en.wikipedia.org/wiki/Google_Play ³ - http://www.prisjakt.nu/pryl/tele/1586_50_000_appar_pa_windows_phone_marketplace In the midst of the widespread popularity and adoption of cloud computing, it seems like everything is being offered “as a Service” these days: Infrastructure? Check. Platform? You bet. Software? Absolutely. Toaster? It’s only a matter of time. With service providers positioning vastly differing offerings under a generic “cloud” umbrella, it’s all too easy to get confused about what’s actually being offered. In his session at 16th Cloud Expo, Kevin Hazard, Director of Digital Content for SoftL... Mar. 28, 2015 01:00 PM EDT Reads: 1,333 The WebRTC Summit 2014 New York, to be held June 9-11, 2015, at the Javits Center in New York, NY, announces that its Call for Papers is open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 16th International Cloud Expo, @ThingsExpo, Big Data Expo, and DevOps Summit. Mar. 28, 2015 01:00 PM EDT Reads: 1,418 SYS-CON Events announced today Sematext Group, Inc., a Brooklyn-based Performance Monitoring and Log Management solution provider, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Sematext is a globally distributed organization that builds innovative Cloud and On Premises solutions for performance monitoring, alerting and anomaly detection (SPM), log management and analytics (Logsene), search analytics (S... Mar. 28, 2015 01:00 PM EDT Reads: 3,325 @ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the... Mar. 28, 2015 12:45 PM EDT Reads: 4,588 SYS-CON Events announced today Arista Networks will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Arista Networks was founded to deliver software-driven cloud networking solutions for large data center and computing environments. Arista’s award-winning 10/40/100GbE switches redefine scalability, robustness, and price-performance, with over 3,000 customers and more than three million cloud networking ports depl... Mar. 28, 2015 12:45 PM EDT Reads: 2,378 Hosted PaaS providers have given independent developers and startups huge advantages in efficiency and reduced time-to-market over their more process-bound counterparts in enterprises. Software frameworks are now available that allow enterprise IT departments to provide these same advantages for developers in their own organization. In his workshop session at DevOps Summit, Troy Topnik, ActiveState’s Technical Product Manager, will show how on-prem or cloud-hosted Private PaaS can enable organ... Mar. 28, 2015 12:45 PM EDT Reads: 982 Countless business models have spawned from the IaaS industry. Resell Web hosting, blogs, public cloud, and on and on. With the overwhelming amount of tools available to us, it's sometimes easy to overlook that many of them are just new skins of resources we've had for a long time. In his General Session at 16th Cloud Expo, Phil Jackson, Lead Developer Advocate at SoftLayer, will break down what we've got to work with and discuss the benefits and pitfalls to discover how we can best use them t... Mar. 28, 2015 12:15 PM EDT Reads: 1,372 The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on T... Mar. 28, 2015 12:00 PM EDT Reads: 1,353 Getting started is often the hardest part of any project, and converting your data center into a Git Repository is no different. In his session at 16th Cloud Expo, Christopher Gallo, Developer Advocate for SoftLayer, an IBM Company, will discuss some of the more popular configuration management suites, with some practical examples showing off the power of SaltStack. Hopefully, by the end of this presentation, you’ll be ready to stop deploying changes manually and enter the magical world of sof... Mar. 28, 2015 12:00 PM EDT Reads: 1,319 SYS-CON Media announced that IBM, which offers the world’s deepest portfolio of technologies and expertise that are transforming the future of work, has launched ad campaigns on SYS-CON’s numerous online magazines such as Cloud Computing Journal, Virtualization Journal, SOA World Magazine, and IoT Journal. IBM’s campaigns focus on vendors in the technology marketplace, the future of testing, Big Data and analytics, and mobile platforms. Mar. 28, 2015 11:15 AM EDT Reads: 1,599 SYS-CON Events announced today the IoT Bootcamp – Jumpstart Your IoT Strategy, being held June 9–10, 2015, in conjunction with 16th Cloud Expo and Internet of @ThingsExpo at the Javits Center in New York City. This is your chance to jumpstart your IoT strategy. Combined with real-world scenarios and use cases, the IoT Bootcamp is not just based on presentations but includes hands-on demos and walkthroughs. We will introduce you to a variety of Do-It-Yourself IoT platforms including Arduino, Ras... Mar. 28, 2015 11:00 AM EDT Reads: 2,004 DevOps tasked with driving success in the cloud need a solution to efficiently leverage multiple clouds while avoiding cloud lock-in. Flexiant today announces the commercial availability of Flexiant Concerto. With Flexiant Concerto, DevOps have cloud freedom to automate the build, deployment and operations of applications consistently across multiple clouds. Concerto is available through four disruptive pricing models aimed to deliver multi-cloud at a price point everyone can afford. Mar. 28, 2015 11:00 AM EDT Reads: 844 SYS-CON Events announced today that SafeLogic has been named “Bag Sponsor” of SYS-CON's 16th International Cloud Expo® New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. SafeLogic provides security products for applications in mobile and server/appliance environments. SafeLogic’s flagship product CryptoComply is a FIPS 140-2 validated cryptographic engine designed to secure data on servers, workstations, appliances, mobile devices, and in the Cloud.... Mar. 28, 2015 11:00 AM EDT Reads: 1,355 SYS-CON Events announced today that the DevOps Institute has been named “Association Sponsor” of SYS-CON's DevOps Summit, which will take place on June 9–11, 2015, at the Javits Center in New York City, NY. The DevOps Institute provides enterprise level training and certification. Working with thought leaders from the DevOps community, the IT Service Management field and the IT training market, the DevOps Institute is setting the standard in quality for DevOps education and training. Mar. 28, 2015 10:30 AM EDT Reads: 869 Plutora provides enterprise release management and test environment SaaS solutions to clients in North America, Europe and Asia Pacific. Leading companies across a variety of industries, including financial services, telecommunications, retail, pharmaceutical and media, rely on Plutora's SaaS solutions to orchestrate releases and environments faster and with integrity. Products include Plutora Release Manager, Plutora Test Environment Manager and Plutora Deployment Manager. Mar. 28, 2015 10:15 AM EDT Reads: 1,525 SYS-CON Events announced today the DevOps Foundation Certification Course, being held June ?, 2015, in conjunction with DevOps Summit and 16th Cloud Expo at the Javits Center in New York City, NY. This sixteen (16) hour course provides an introduction to DevOps – the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will res... Mar. 28, 2015 10:00 AM EDT Reads: 1,514 Mar. 28, 2015 09:45 AM EDT Reads: 1,448 Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch ... Mar. 28, 2015 09:15 AM EDT Reads: 2,158 Modern Systems announced completion of a successful project with its new Rapid Program Modernization (eavRPMa"c) software. The eavRPMa"c technology architecturally transforms legacy applications, enabling faster feature development and reducing time-to-market for critical software updates. Working with Modern Systems, the University of California at Santa Barbara (UCSB) leveraged eavRPMa"c to transform its Student Information System from Software AG's Natural syntax to a modern application lev... Mar. 28, 2015 09:00 AM EDT Reads: 766 SOA Software has changed its name to Akana. With roots in Web Services and SOA Governance, Akana has established itself as a leader in API Management and is expanding into cloud integration as an alternative to the traditional heavyweight enterprise service bus (ESB). The company recently announced that it achieved more than 90% year-over-year growth. As Akana, the company now addresses the evolution and diversification of SOA, unifying security, management, and DevOps across SOA, APIs, microser... Mar. 28, 2015 08:30 AM EDT Reads: 1,999
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131297628.55/warc/CC-MAIN-20150323172137-00167-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
12,897
52
https://bagoscoop.github.io/videos/watch/meek-mill-middle-of-it-feat-vory-official-video
code
Meek Mill - Middle Of It feat. Vory [Official Video] Share this & earn $10 Published at : 02 Jan 2021 Subscribe to Meek Mill Meek Mill - Middle of It (feat. Vory) Listen to Meek's 'QUARANTINE PACK' out now: Subscribe for more official content from Meek Mill: Follow Meek Mill The official YouTube channel of Atlantic Records artist Meek Mill. Subscribe for the latest music videos, performances, and more. comments powered by Disqus. Why Should I Help Maximum profit from small place - Jalaludeens Agro Paradise Why are you here? Finding purpose to persist in education and life | Bryan Taylor | TEDxMSU LeetCode Day 19 - Search in Rotated Sorted Array SAP ABAP - Types of Enhancements Polo G ft. Lil TJay - Pop Out (Lyrics) Become a candidate Road Rage on the M1 Motorway UK. Idiot car driver causes accident. The Paternity Bet | House M.D. You Are Determining Your Reality 8 Actors Before And After They Got The Call From Marvel Satisfactory Official News Update 4 Release Date Confirmed Achi Biwi (A Good Wife) | OZZY RAJA WE CAN PLACE VENTS ANYWHERE! | Among Us Mods Replaced (Glmm) sad Project Life Process 2021- Week 1 Why haven't I gotten a decision yet? Is January too late to apply? + the worst PS we've ever seen FROM THE ARCHIVES: Scott Peterson Talks About The Disappearance Of His Wife Laci Uriel Bible Study - JOHN 3:16 - HOW TO OBTAIN ETERNAL LIFE WITCHCRAFT AND THE ♌ CONSTELLATION Making INFORMAL or FORMAL requests & permission / MODAL VERBS (Can I, May I, Could we.... ) The Growlers - "Problems III" (Official Video) When the wolf owes you a favor, it will repay you to the end. How to Apply to CBE Vacancy Commercial Bank of Ethiopia Nelly - Kelly Rowland "Dilemma" THE BOMB DIGZ ft Lucki Starr Cover Surface Area of Three Dimensional Figures, Composite Solids, and Missing Dimensions Looking Out For Angels - Line Dance (Dance & Teach in English & 中文) เล่าหนัง มีอะไรกับคนแปลกหน้า จนทำให้ติดเชื้อไวรัสประหลาดที่ทำให้ "เน่า"!!| Contracted (2013) August Alsina - Pretty (Visualizer) After Brexit, there are numerous opportunities for trade between Pakistan and the UK - Asim Yousaf The Who’s Pete Townshend Answers His Most Googled Questions | According To Google | Radio X Many Homes in Kyoto, Japan Using the new #UNIQUE function to Extract #DISTINCT list entries from #Data List, Columns in EXCEL "It's MASSIVE!" - Mew2King Analyzes Sephiroth Alternative splicing ( mechanism and its regulation ) Podiatry nail trimming advice Basic Concept of Database Normalization - Simple Explanation for Beginners Seeking a Friend for the End of the World ( 2012). Original (English). Difference between specially and especially Nastya and dad - jokes with sweets Choosing the Right Chords in Minor Keys - Music Composition 로다 (M.O.N.T) - '무기력' Music Video Ailment - Multiplayer Development(Unity 2018/Photon) - Part 7 - Final THE POSSESSION OF HANNAH GRACE - Official Trailer (HD) An Alternative Pixar Intro Explain Design Criteria Preferred Series - Mechanical Engineering Design - Machine Design 1 Buss It Challenge Gone Too Far on TikTok! It's unbelievable what that girl did! How to Make Cardboard Gun (Very Simple ) I THOUGHT WE'D BE ABLE TO FILM IN HERE
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988741.20/warc/CC-MAIN-20210506053729-20210506083729-00377.warc.gz
CC-MAIN-2021-21
3,321
58
http://sobieski.com.cn/ftp.html
code
ftp.phil.uni-sb.de, maintained by Benni Lorenz, used to have a large archive of Linux/m68k sources and binaries. Most of this archive was superseded by the Debian and Red Hat ports. There is also a mirror of ftp.uni-erlangen.de here (in mirror.erlangen/). [Germany] David Huggins-Daines has set up a Linux/m68k for Mac FTP site (also available via David also has a CVS repository for the Mac kernel tree. You can also access it directly using anonymous CVS at using module name "linux-mac68k" and password I keep some binaries that I'm working on at www.clark.net (follow this link for a list of what's available). General Linux Sites If you're looking for sources for something, chances are it's available at one of these three sites: The mother of all Linux sites is metalab.unc.edu (also accesible via HTTP).
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154408.7/warc/CC-MAIN-20210802234539-20210803024539-00256.warc.gz
CC-MAIN-2021-31
811
16
https://community.dreamfactory.com/t/sqlsrv-is-not-installed-or-loaded/2030
code
I have used bitnami-dreamfactory-2.0.4-0-windows-installer and continue to pump my head against the “Required extension or module ‘sqlsrv’ is not installed or loaded.” error. I have combed through this particular post in hopes of finding a solution to the issue and have had no success. I have used the msodbcsql.msi, SQLSRV30.exe, as well as moved php_pdo_sqlsrv_55_ts.dll and php_sqlsrv_55_ts.dll into …php\ext location and added “extension=php_pdo_sqlsrv_55_ts.dll” and “extension=php_sqlsrv_55_ts.dll” into php.ini. Nothing is working for me. Any help would be deeply appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027319470.94/warc/CC-MAIN-20190824020840-20190824042840-00114.warc.gz
CC-MAIN-2019-35
602
4
https://jayisgames.com/review/cgdc6-update-3.php
code
CGDC6 update №3 Just a quick competition update to announce that due to some technical issues with getting the new competition page ready, we are extending the deadline by 2 weeks. We don't want to delay getting the entries up once the deadline has passed, and so we are extending the deadline to give us a little more time to prepare for it. So, you still have a little more than 2 weeks left to finish up a browser game that incorporates the theme "EXPLORE". - 1st place: - Armor Games Awards: - $500 - to each of the top 3 Flash games for a non-exclusive license to appear at Armor Games. ($1500 total to be awarded.) - Audience award: - $500 - determined by JIG community popular vote. We thank our sponsors for their kind support: See the official competition announcement for all competition details about entering. Note: Comments are disabled for this entry. Please continue to use the official competition announcement page for posting questions and comments. Cheers!
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00435.warc.gz
CC-MAIN-2022-40
977
11
http://rectenna.xyz/archives/2251
code
Novel–Guild Wars–Guild Wars Chapter 286 – The Orchard 3 bumpy observation Draco’s coronary heart has become tranquil, although he was enclosed by many Get ranking 2 ent.i.ties. Possessed there been Captain Get ranking or higher, he could well be extremely challenged to carry out anything at all, but the styles facing him had been only Medical specialist Ranking. They could be fantastic to test out the abilities of his Divine Cla.s.s. Instantly, Draco fired the Phoenix Weep arrow and activated its productive expertise. When he was suitably far ample, Draco discontinued and published his Draconic Aura. His sight even turned into serpentine slits since he glared for the Longer Snappers and roared. Though Draco was controlling the Ferocious Chargers, he needed to stay away from the nimble and harmful Lengthy Snappers. So, he kited the Ferocious Battery chargers and the Very long Snappers clear of Qiong Qi and Clarent. Abruptly, Draco fired the Phoenix, az Cry arrow and initialized its busy talent. The Ferocious Rechargers had been not stressed by his bloodline, thus it was only the raw electrical power of his arrows that was able to knock them back and interrupt their energy. Clarent dodged these problems and burnt off a few other folks regarding his standard flames inhalation. Due to pure the number of spinners, he was very quickly caught in a situation where he located himself struggling to do anything whatsoever but shield himself continuously. Clarent didn’t attempt to fight with a range this time also. He swooped in and made use of his claws in addition to his tooth enamel to rip and rip them separate. The carapace with the Silent Spinners was a lot more strong than your regular arachnid, but it really was like newspaper to some Correct Dragon. Now, together with his new cla.s.s’ pa.s.sives, it increased considered one of Draco’s most important abilities that enhanced his ability. Clarent dodged these strikes and burned some other folks regarding his default flames breath. Caused by utter the number of spinners, he was quickly caught in times where he observed himself can not a single thing but fight for himself continually. The Fantastic Boar was obviously a huge boar that appeared frenzied. It got very sharp and long tusks, a mane of black color hair and brief but powerful thighs. It was slightly frothing for the mouth because of severe bloodl.u.s.t. Angel’s Good thing! Chapter 285 – The Orchard 2 Ultimately, Clarent was required to depart from the Muted Spinners he was assaulting in the event the ones with relatively milder debuffs began firing at him. The excellent piece was how the forgotten images hit their allies and limited then, so Clarent smiled wickedly. susan clegg and a man in the house Together with his higher mental acuity as well as the completely supercharge from Devil’s Guile, he could develop his very own tactics four times more quickly. This, as well as his already higher skills, made him a monster. Qiong Qi swiped within the Lithe Stalkers, who had been an additional feline kinds, as well as Killer Boars. The Lithe Stalkers have been extremely nimble and easily eliminated his strike even though setting up a selection of their very own. The Quiet Spinners did actually have accepted him his or her objective at the same time, as they have been truly the only monsters of this team with ranged assaults. They skittled around quickly, firing webs and nets from other spinnerets. the japanese art of fencing crossword Cooldown: 30 minutes」 Qiong Qi swiped at the Lithe Stalkers, who were also a feline species, and the Great Boars. The Lithe Stalkers have been extremely agile and easily prevented his invasion while setting up a selection of their own. This immediately altered the specific situation substantially, as Clarent grew to become in a position to bust out of his encirclement and rush a few of the fragile Quiet Spinners. A blackish heartbeat was released from his body system and pa.s.sed over every enemy within the range of the expertise. People were all suffering with many debuffs starting from That was much like the gunshot before a race, as discord immediately broke out. Clarent rapidly took to the sky and started out firing out his fire. His focuses on were the monsters more prone to flame, just like the Muted Spinners. the kiltartan history book There was much more that existed on the orchard who didn’t enroll in this encirclement because they were actually too far to care and attention. At some point, Clarent was required to depart from the Private Spinners he was attacking when the types with relatively milder debuffs begun firing at him. The great component was how the forgotten photos hit their allies and sure then, so Clarent smiled wickedly. It turned out their phone numbers that designed issues look grim. Draco chose to provide help from the lower back, considering the fact that Clarent could take to the sky and should be agile ample to protect yourself from most conditions. After Reincarnating Into This Game World I Seemed to Have Taken Over the Control of Status The toned harm was 2,000 with every taken Draco fired. Along with his price of flame that had been 3 per next, he dealt a level 6,000 destruction of the Ferocious Chargers. It was actually their figures that made issues appear harsh. Draco wanted to supply assist out of the lower back, given that Clarent might take to your heavens and may be nimble sufficient to prevent most attacks. The quicker encirclement possessed raised his alertness for the maximum, and the stunted overcome sense from working in heart and soul form for so long was slowly becoming regained on his new body. Ultimately, Clarent were forced to move away from the Silent Spinners he was assaulting when the kinds with relatively milder debuffs commenced firing at him. The favorable piece was that this missed photos hit their allies and sure then, so Clarent smiled wickedly. Clarent didn’t make an attempt to beat originating from a length this period as well. He swooped in and utilized his claws and his pearly whites to rip and damage them a part. The carapace of your Silent Spinners was a great deal more resilient than your common arachnid, nevertheless it was like newspaper to some Accurate Dragon. The splash damage was his secret weapon to success, as the Ranking suppression performed his power much weaker. If he attempted to use his swords to address, he would stop being getting it nearly as basic as he was now. “Reduced Species, obey your Ancestor!” Now, in reference to his new cla.s.s’ pa.s.sives, it improved considered one of Draco’s most important knowledge that enhanced his skill. Angel’s Good thing! The splash destruction was his way to succeed, when the Get ranking suppression rendered his potential significantly weaker. If he attempted to use his swords to combat, he would not really experiencing it nearly as easy as he was now. The earlier encirclement obtained elevated his alertness for the highest, and the stunted overcome feeling from being in spirit shape for such a long time was slowly being regained in his new system. This eventually left the Prolonged Snappers and the Ferocious Rechargers for Draco to address. He managed to achieve it with many semblance of steadiness. His images had been aimed at the Ferocious Rechargers generally, and since these were arranged with each other, the Sonic Influx pa.s.sive dealt a sound problems for them. The Extended Snapper was a massive python which had been even longer compared to Emperor Cobra. It experienced simple wings in its back again, as well as its scales glistened with all sorts of reflective colours. Its fangs were actually very long and sharpened, releasing a blackish poison the way it hissed. Once this poison hit the earth, it corroded it conveniently. Out of the blue, Draco fired the Phoenix, arizona Cry arrow and turned on its energetic ability. Novel–Guild Wars–Guild Wars
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711074.68/warc/CC-MAIN-20221206060908-20221206090908-00823.warc.gz
CC-MAIN-2022-49
7,987
46
http://www.seanconvery.com/weblog/2008/03/25/network-world-8021x-tests/
code
Continuing the 802.1X conversation, Network World recently put out test results for 10G access switches and included a whole section on 802.1X functionality. The article does a pretty good job running through many common 802.1X scenarios and highlights the breadth of functionality most modern switches have. While I’m not sure 10G to the desktop is necessary for all but the most demanding environments, most of the 802.1X functionality described here is available on much lower speed (and more affordable) switches from the same manufacturers. Wired 802.1X has seen quite a surge of interest of late as this article corroborates. Technorati Tags: 802.1X
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707440693/warc/CC-MAIN-20130516123040-00037-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
657
2
https://sourceforge.net/directory/science-engineering/earth-science/os:other/
code
- Other Operating Systems (6) - Windows (6) - Linux (5) - Modern (4) - Grouping and Descriptive Categories (3) - Android (2) - Mac (2) - Embedded Operating Systems (1) - Emulation and API Compatibility (1) - OS: Other × QMapControl is a Qt widget which enables your applications to use map data from different sources on desktop or mobiles. Maps can be enriched by custom objects which will be drawn into the map.126 weekly downloads A finite volume groundwater simulator4 weekly downloads Tabla periódica completa con funciones especiales únicas.1 weekly downloads This project can be used to start the world apocalypse Simple application that connects to USGS to retrieve the list of latest earthquakes and display them on an interactive map. Inspired from "Beginning Nokia Apps Development - Qt and Html5 for Symbian and Meego" (ISBN: 978-1-4302-3177-6). WeatherFleks is written in Adobe Flex 2. The program retrieves weather actual and historical data like temperature, humidity, pressure, windspeed and winddirection for many locations in the world.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698540915.89/warc/CC-MAIN-20161202170900-00060-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
1,057
16
http://lists.mailscanner.info/pipermail/mailscanner/2008-October/087862.html
code
Mqueue.in just keeps growing... Alex Neuman van der Hans alex at rtpty.com Thu Oct 9 01:58:55 IST 2008 There's the stuff at: Which is good for sendmail users. The same concepts applied to postfix (plus some more built into postfix) would also help. Oh, and if you're using postfix, you have to remember MailScanner causes swapping! <ducks> On Oct 8, 2008, at 7:08 PM, Kevin Miller wrote: > There are a couple of things that you may be able to do quite easily. More information about the MailScanner
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00282.warc.gz
CC-MAIN-2023-40
498
12
https://itqna.net/questions/11000/invert-value-0-or-1-column
code
I have a table that has many records and a column called It only receives the value 0 for blocked and 1 for released. Now with a precise change, invert these values, where this has to be 1 and where this 1 has to be 0. How do I do this in update of MySQL?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103877410.46/warc/CC-MAIN-20220630183616-20220630213616-00452.warc.gz
CC-MAIN-2022-27
255
5
https://www.switchup.org/bootcamps/unique-system-skills-bootcamp
code
The Python programming language is easy to learn, making it a popular choice among beginners. Python offers many frameworks for web development such as Pyramid, Django, Web2py, etc. Here, you will learn the Django framework which is renowned for its simplicity, flexibility and reliability. Django is a Python web framework for creating backend web applications. By learning Django, you will learn URL dispatchers, querying models, and automating tasks. Upon completing this course, you will learn Django REST that enables you to interact with images, authentication, and API endpoints. Learn from the Basics of Programming Get to know the basics of programming. You can learn Python from the basics all the way to creating your own apps. Beginning with the basics of Python syntax, students will move on to more advanced topics such as dictionaries, custom functions, and sorting algorithms. Learn From Experts The instructors have been carefully selected based on their educational background, relevant work experience, and teaching abilities. We have highly qualified trainers with at least ten to twelve years of teaching experience in the industry. Students with good feedback are also kept on our faculty. Learn a High-level, Versatile Language Python is an incredibly versatile language. Both small and complex tasks can be carried out with it, and it has been used across many different fields - from data science and software engineering to environments like artificial intelligence, machine learning, and mobile app development. Due to its readable style and rapid editability, the development process is relatively simple and efficient TUITION & FINANCING Tuition: $5,380.00 | Duration: 7 weeks | 140 hours Tuition: $5,480.00 | Duration: 8 weeks | 160 hours (includes Python certification) Python, SQL, Django, Web Development
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510085.26/warc/CC-MAIN-20230925183615-20230925213615-00014.warc.gz
CC-MAIN-2023-40
1,837
11
https://www.cnet.com/forums/discussions/please-help-computer-not-connecting-226112/
code
Sorry, forgot to add some other info: My computer is an Advent, using Windows XP. The wireless network adaptor is an Intel(R) PRO/Wireless 2200BG Network Please ask if there is any more information you require. Thanks again, I have a somewhat curious problem. I use wireless internet at home. But for two days a couple of weeks ago, our internet was stopped. However, as soon as it came back, my desktop computer has not been able to connect to the wireless router anymore. This laptop (that I am on now) connects to the wireless box fine, so it is obviously a problem with the desktop. When i click to 'View Available Wireless Network Connections', it sees my wireless box - a Speedtouch66D1DC, and when I click to 'connect', it asks me for my wireless key, which I type in, but then it never gets any further. It just fails to connect to it. What makes this problem even stranger is: 1) The fact over 2 weeks ago it had no problem connecting to my Speedtouch66D1DC 2) The signal being excellent 3) My laptop having no trouble, and 4) My desktop having no trouble connecting to an unsecure wireless network, and thus it can't be a wireless receiver problem, as it can still access the internet remotely, just not from our transmitter. I thought this might have been a spyware problem, but have posted a help post on a different forum (see link) to no avail: http://forums.digitaltrends.com/sho...66429#post66429 Any ideas on why my computer is not connecting to this specific wireless box would be appreciated. Thanks in advance, p.s. - happy new year!
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743247.22/warc/CC-MAIN-20181116235534-20181117021534-00203.warc.gz
CC-MAIN-2018-47
1,553
15
https://ratucps.online/cfimage-convert-97/
code
The ImageRead function performs the same operation as the cfimage read action . However, you cannot use the cfimage tag to read and create. You can use the cfimage tag to perform common image manipulation operations as a border; captcha; convert; info; read; resize; rotate; write; writeToBrowser. The other day, I needed to do some on-the-fly conversion of PNG image files to JPG format in ColdFusion. This was part of stop-gap measure at. |Published (Last):||27 July 2018| |PDF File Size:||12.11 Mb| |ePub File Size:||4.22 Mb| |Price:||Free* [*Free Regsitration Required]| The read action requires name attribute. If you look at the source of the page with the rendered inline image, you will see something like this:. CFImage provides us with tag-based access to only a small subset convegt the image cfimwge including:. The first part will cover basic reading and writing of images using CFImage and the related image manipulation functions. When you resize an image, if you specify a value for the width, you can let ColdFusion calculate the aspect ratio by specifying “” as the height. Image object, I have listed them below skip past this if you have no idea what I’m talking about. If I matched the cfimage dimensions to the imagenew which makes perfect sensethen you end up with having this white border on the top, right, and bottom. When you resize an image, if you specify a value for the height, you can let ColdFusion calculate the aspect ratio by specifying “” as the width. You cannot display a GIF image in a browser. Add a red border of 5 pixels to an image, write the output to a variable. You can use the cfimage tag to perform common image manipulation operations as a shortcut to Image functions. ColdFusion Help | ImageRead A value between 0 and 1 that can be used to set the JPG quality. As with reading in images, writing them can be done by using the CFImage tag as well as the image functions. The valid range of blur factor is between convwrt Sign up using Email and Password. This gives us the same output, but the source attribute is “http: The next one on the list is the Web-relative path: The following example shows how to reduce the size of an image and display it in the browser: Interpolation algorithms Interpolation algorithms let you fine-tune how images are resampled. Does it make any difference if you code the conversion of the image within the cfdocument tag attributes instead of within the tags? You can specify this tag’s attributes in an attributeCollection attribute whose value is a structure. String, boolean – returns: The border is added to the outside edge of the source image, increasing the image area accordingly. The border is added to the outside edge of the source image, increasing the image area accordingly. The com image format is not supported on this operating system. ColdFusion’s new image functionality is just plain awesome. If you want to actually read the image into a ColdFusion variable in the form of the coldfusion. However, WriteToBrowser actually returns the image inline to the page. Tag syntax for reading an image from a URL. ImageWrite take three arguments potentially:. Image data typeuse the action “READ”:. I don’t want to start writing a lot of images to the browser only to find out that it is clogging up this temp directory. For a hexadecimal value, use the form ” xxxxxx” or “xxxxxx”. I don’t deal with Base64 encoded images all that often, but this seems like something that could be very useful when put into clever hands. These return comma-delimited lists of the file types that ColdFusion can deal with. To overcome this, you can set the Overwrite attribute to true defaults to false – this will overwrite any existing files of the same name. Image file requests go the Web server, not the ColdFusion application server. Of course, there is a hack to get around this: Specify the structure name in the attributeCollection attribute and use the tag’s attribute names as structure keys. If you specify false default or omit the argument, the Base64 is written to the file without any headers. Also, cfimabe quality cfiage degrade; for example, PNG images support bit color, but GIF images support only colors. You might notice that the ImageNew uses x and the cfimage uses x Now, with CFImage and an abundance of image-related functions, ColdFusion has done to image manipulation donvert it has done to almost every other aspect of Web applications development – it has made it simple. Separate multiple fonts with commas. The ColdFusion image on which this operation is performed. Let’s quickly cover writing images. This kind of functionality can be super useful if you are interfacing with another Java component that handles image manipulation using the java. Notice that the destination path is not an absolute server path – it’s a path relative to the current Web page. Each algorithm balances image quality against performance: The blur factor used for resampling. When you read in an image in this fashion, the source attribute is empty. ColdFusion Help | Converting images In-memory files speed processing of transient covnert. It takes four arguments:. Due to the wide array of image functionality in ColdFusion 8, I am going to try and break this tutorial up into several small and manageable parts.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506580.20/warc/CC-MAIN-20200402014600-20200402044600-00430.warc.gz
CC-MAIN-2020-16
5,350
24
http://help107.weebly.com/aspiring-writing
code
By Michael Villari What is an animal? A living organism that feeds on organic matter. Michael’s Argument: Are there animals that are more capable than humans ever can be? First, I would like to say that I believe that animals are not smarter than humans because there are a lot of things that animals can’t do that we can, such as doing math, talking, or even just simple things like writing. My first animal is a chimpanzee. They are very smart but are they smarter than humans? No because if you look at different aspects of the monkeys you can see that they can’t do some of the stuff we can like speak English, use sign language, drive, and build something with technology. This is important because people need to know how we can understand how animals function differently than humans can and that they can do stuff we can’t, such as speak their language, eat some of the foods they eat, and see what they see out of their eyes. Critics say the same as well. Octavia’s Argument: I understand that there are a lot of things that chimps can’t do that humans can. Chimps lack varying things, that doesn’t make them less competent then us. I am also sure they have their own language. Humans can’t speak chimpanzee and they adapt to society and that humans take a little longer to do so. They know to speak vocally. There are other animals that can do stuff we can’t. For example, birds they can fly, but can we? And to end it I admit that we may be smarter than chimps, but there are other animals that can do things we can’t.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584350539.86/warc/CC-MAIN-20190123193004-20190123215004-00454.warc.gz
CC-MAIN-2019-04
1,549
4
https://www.r-bloggers.com/2011/08/bayes-factors-and-martingales/
code
A surprising paper came out in the last issue of Statistical Science, linking martingales and Bayes factors. In the historical part, the authors (Shafer, Shen, Vereshchagin and Vovk) recall that martingales were popularised by Martin-Löf, who is also influential in the theory of algorithmic randomness. A property of test martingales (i.e., martingales that are non negative with expectation one) is that which makes their sequential maxima p-values of sorts. I had never thought about likelihood ratios this way, but it is true that a (reciprocal) likelihood ratio is a martingale when the observations are distributed from p. The authors define a Bayes factor (for P) as satisfying (Section 3.2) which I find hard to relate to my understanding of Bayes factors because there is no prior nor parameter involved. I first thought there was a restriction to simple null hypotheses. However, there is a composite versus composite example (Section 8.5, Binomial probability being less than or large than 1/2). So P would then be the marginal likelihood. In this case the test martingale is Simulating the martingale is straightforward, however I do not recover the picture they obtain (Fig. 6): x=sample(0:1,10^4,rep=TRUE,prob=c(1-theta,theta)) s=cumsum(x) ma=pbinom(s,1:10^4,.5,log.p=TRUE)-pbinom(s-1,1:10^4,.5,log.p=TRUE,lower.tail=FALSE) plot(ma,type="l") lines(cummin(ma),lty=2) #OR lines(cummin(ma),lty=2) lines(log(0.1)+0.9*cummin(ma),lty=2,col="steelblue") #OR cummax When theta is not 1/2, the sequence goes down almost linearly to -infinity. Obviously, I have not read the paper with the attention it deserved, so there may be features I missed that could be relevant for the Bayesian analysis of the behaviour of Bayes factors. However, at this stage, I fail to see the point of the “Puzzle for Bayesians” (Section 8.6) since the conclusion that “it is legitimate to collect data until a point has been disproven but not legitimate to interpret this data as proof of an alternative hypothesis within the model” is not at odds with a Bayesian interpretation of the test outcome: when the Bayes factor favours a model, it means this model is the most likely of the two given the data, not this model is true. Filed under: R, Statistics Tagged: Bayes factor, Martin-Löf, martingales, Statistical Science
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494976.72/warc/CC-MAIN-20230127101040-20230127131040-00381.warc.gz
CC-MAIN-2023-06
2,317
9
https://androidforums.com/threads/new-voice-commands-rarely-work.166335/
code
So I've been trying to get the new voice commands to work and I'm having very little success. "SEND TEXT TO" very rarely picks the correct people although it seems to work a bit better if I do a full name "RICHMOND, TREVOR" vs. "SEND TEXT TO TREVOR RICHMOND". Half the time this command will attempt to send a text message to everyone in my address book with the last name of "RICHMOND" which is pretty useless. I watched the instruction video the other day and learned of the "SET ALARM" command which seemed cool until I tried it only to learn that the alarm clock doesn't support it yet...what exactly is this voice feature good for? Anyone have any suggestions?
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986660829.5/warc/CC-MAIN-20191015231925-20191016015425-00336.warc.gz
CC-MAIN-2019-43
665
1
https://msdn.microsoft.com/en-us/library/a12bh7aa
code
Draws one or more Bzier splines. Points to an array of POINT data structures that contains the endpoints and control points. Specifies the number of points in the lpPoints array. This value must be three times the number of splines to be drawn, because each Bzier spline requires two control points and an end point. Nonzero if the function is successful; otherwise 0. This function draws cubic Bzier splines by using the control points specified by the lpPoints parameter. The first spline is drawn from the current position to the third point by using the first two points as control points. For each subsequent spline, the function needs exactly three more points, and uses the end point of the previous spline as the starting point for the next. PolyBezierTo moves the current position to the end point of the last Bzier spline. The figure is not filled. This function draws lines by using the current pen. See the example for CDC::BeginPath.
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661123.53/warc/CC-MAIN-20160924173741-00164-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
946
6
https://demos.devexpress.com/MVCxDockAndPopupsDemos/PopupControl/DataBinding
code
This demo illustrates the XML binding options available to you when using the DevExpress MVC PopupControl extension. To invoke a popup window, move the mouse pointer over menu items displayed on the left. The MVC Popup extension provides a number of data binding methods, including Bind, BindToSiteMap, and BindToXML. In this demo, the MVC Popup extension uses the BindToXML method to bind to a Charts.xml file and obtain data from its <Charts> element. Our ASP.NET MVC extensions allow you to bind their template extensions directly to the corresponding fields of a data source's data object (DataItem). To accomplish this, use the DataBinder.Eval method, and pass Container.Window.DataItem and a field name as method parameters. In the demo, the DataBinder.Eval method is used to bind template extensions of a popup window's content region and footer, via the SetWindowContentTemplateContent and SetWindowFooterTemplateContent methods. For the content region, the BigImageUrl field provides the Image control with ImageUrl property values. For the footer, the View bound field provides a label's text. Local Copy of this Demo To inspect the source code for this demo on your machine, you must first install our components via the DevExpress Component Installer. You can open a local copy of this online demo directly from this webpage (if using v20.2.8, 21.1.4 or higher). The source code files for this demo are installed (by default) in the following directory: Open CS Solution \Users\Public\Documents\DevExpress Demos XX.X\Components\ASP.NET\CS\MVCxDockAndPopupsDemos
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00694.warc.gz
CC-MAIN-2023-40
1,573
9
http://icicit.org/event-id/windows-2008-r2-event-id-35.php
code
kryfreemanMay 6, 2010, 3:13 AM I had the same problem and found the answer here:http://social.technet.microsoft.com/Forums/en/itprovistaapps/thread/a4c36078-6419-4424-8a43-ff3832786b59I downloaded the trial of Resource Tuner from http://www.restuner.com/ (because I didn't have Visual Basic), saved a The generic driver may provide only limited functionality for the device. Component identity found in manifest does not match the identity of the component requested. Manage Your Profile | Site Feedback Site Feedback x Tell us about your experience... have a peek here Have 5 machines doing this allW7 Ultimate 64 bit shawn_hollowayApr 9, 2010, 11:21 PM I do experience this same problem. To resynchronize the Windows Time service with the time source: Open a command prompt as an administrator. Click Browse my computer for driver software. By the way, these errors seem to occur about 12:30 AM when I'm asleep. At the top of the Start menu, right-click Command Prompt, and then click Run as administrator. If you are asked to confirm that you want to enable shadow copies, click Yes. Cause This event is related to .NET framework or Side-by-Side Assemblies version mismatch and related failures. As required, reconfigure the properties. This documentation is archived and is not being maintained. Click Sign In to add the tip, solution, correction or comment that will help other users.Report inappropriate content using these instructions. Activation Context Generation Failed Locate the device under the User Mode Bus controller node. Verify To perform this procedure, you must have membership in Administrators, or you must have been delegated the appropriate authority. Event Id 35 Kernel-processor-power Collapse this tableExpand this table Side-by-side is a concept introduced with Microsoft .Net Framework. In Start Search, type Command Prompt. check my blog Shadow703793Dec 24, 2009, 1:22 AM Just took a look at my Event viewer for Win 7 Pro x64 and Server 2008 R2 (Web) and I see no event errors. Event Details Product: Windows Operating System ID: 35 Source: Microsoft-Windows-Time-Service Version: 6.0 Symbolic Name: MSG_TIME_SOURCE_CHOSEN Message: The time service is now synchronizing the system time with the time source %1. Wmi Event Id 10 Resolve Restart Windows Update Agent If updates are available but do not automatically download, Windows Update Agent needs to be restarted. The content you requested has been removed. If an exact match cannot be found, a generic driver, chosen based on the device's compatible ID, is loaded on the RD Session Host server instead. Please see the application event log Side-by-Side error message Can I move windows side-by-side folder (win.sxs) to another drive? news You’ll be auto redirected in 1 second. Event Id 35 Sidebyside Lync The content you requested has been removed. Event Id 35 Sidebyside Citrix SidebySide error in event viewer error sidebyside ? We appreciate your feedback. Event ID 35 — Supported Plug and Play Device Redirection Published: January 8, 2010Applies To: Windows Server 2008 R2 Remote Desktop Services in Windows Server 2008 R2 includes support for redirection of Windows Portable To open Device Manager, click Start, click Run, type devmgmt.msc, and then click OK. http://icicit.org/event-id/event-id-5722-on-windows-2008.html At the command prompt, type W32TM /query /status, and then press ENTER. In Start Search, type Command Prompt. Event Id 36 Restart the NLB cluster To restart the NLB cluster: Open an elevated Command Prompt window. Microsoft Customer Support Microsoft Community Forums United States (English) Sign in Home Windows Server 2012 R2 Windows Server 2008 R2 Library Forums We’re sorry. The Windows Time service can configure a domain controller within its domain as a reliable time source, and it synchronizes itself periodically with this source. All Rights Reserved Tom's Hardware Guide ™ Ad choices To verify that the Windows Time service is synchronizing correctly: Open a command prompt as an administrator. Subscription Licensing Service Failed: -1073418220 Right-click the name of the device, and then click Update Driver Software. I just recently realize i have this problem. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue. This new volume must be an NTFS volume. this contact form Reference is WLMFDS,processorArchitecture="AMD64",type="win32",version="184.108.40.206". On the View menu, click Devices by connection. This should be the name of a domain controller (or administrator-configured time server). Side-by-side configuration is incorrect Event 33 sidebyside Application has failed to start because side-by-side... You’ll be auto redirected in 1 second. Therefore, these errors seem to be solely a Windows 7 thing. Coding error on the part of original Microsoft programmer in creating the manifest.Once patched, MovieMaker will correctly reference the dependent DLL and no errors will be reported... Event ID 35 — WUA Update Detection Updated: December 13, 2007Applies To: Windows Server 2008 The Windows Update Agent Update Detection is designed to check for updates and install them on Manage Your Profile | Site Feedback Site Feedback x Tell us about your experience... Microsoft Customer Support Microsoft Community Forums United States (English) Sign in Home Windows Server 2012 R2 Windows Server 2008 R2 Library Forums We’re sorry. The general advice is to install the Visual C++ Redistributable files. To move the Diff Area to a different volume: Caution: When you change the location of the Diff Area, all previous shadow copies are deleted. If NLB Manager does not already list the cluster, connect to the cluster. Resolve Install a different driver for the device To resolve this issue, install the driver provided by the device’s manufacturer. You’ll be auto redirected in 1 second. Check with the device’s manufacturer to determine if the driver has been updated to support device redirection in Remote Desktop Services. The Windows Time service running on a client will attempt to synchronize its time source with servers that are indicated as being reliable.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156524.34/warc/CC-MAIN-20180920155933-20180920180333-00547.warc.gz
CC-MAIN-2018-39
6,196
15
https://www.activexperts.com/network-monitor/check/windows-servers/microsoft-biztalk/
code
Monitoring MS BizTalk Application Server ActiveXperts solution to monitor MS BizTalk ActiveXperts Network Monitor monitors the status of the MS BizTalk Server services. BizTalk (full name: "Microsoft BizTalk Server") is an Enterprise Service Bus. It uses "adapters" to communicate with different software systems in an enterprise. It enables companies to automate various business processes. An MS BizTalk Server check requires the following parameters: - Services - A list of MS BizTalk Server services that should be running on the target server; - Processes - A list of MS BizTalk Server processes that should be running on the target server; - Performance Counters - A list of MS BizTalk Server performance counters that should be monitored; - WMI Performance Counters - A list of MS BizTalk Server WMI counters that should be monitored. ActiveXperts Network Monitor MS BizTalk check
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943749.68/warc/CC-MAIN-20230322020215-20230322050215-00638.warc.gz
CC-MAIN-2023-14
887
9
http://www.laidbackluke.com/forum/viewtopic.php?f=6&t=1735&start=5550
code
giovanni wrote:tjmidge wrote:DennieMeister wrote:Mick wrote:I know that its a great tip to sample kicks, snares etc but do i have to put these in mono or only when i make my own kicks? Maybe your sampled kick is already in mono, but better safe than sorry; so always put your kick in mono. i was thinking the other day actually that when a track is fully mixed and rendered ready for mastering obviously the kick will be in mono...but then for your master what if you use some kind f stereo widening tool....for instance the one in izotope then wont the kick become slightly stereo too?? Don't be slave to all those rules in music, if it sounds good than leave it like that.. The kick actually does have to be put in mono if sampled, snares don't though
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705352205/warc/CC-MAIN-20130516115552-00037-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
753
5
https://illage3.wordpress.com/2010/06/02/new-official-ipod-touch-twitter-application-twitter/
code
As you’ll have no doubt guessed from the title of this post, twitter have officially released their iPod/iPhone application for free … yes for free which is a good thing, however it took me too damn long to find it. Anyway lets get on with what this application does. As you can see from the screen shot. The application provides a very basic but easy to use interface, and what is great about it is that all of the options for posting updates (such as adding an image) is there for you waiting to be used, it also has an option to allow you to use the iPhone camera to take pictures and then tweet them out automatically. The main time line The main time line pretty much does what it says on the tin. If you scroll upwards the application will make a nice little sound effect and then update for you, which is a nice touch. Also when there is an update on the “@” time line there will be a little blue orb which reminds me of the running indicator from the OSX Dock. The topic search Again this section allows you to search for trending topics, there is not much more to say other than it works. This application allows you to configure how you use the application, it also allows you to install a twitter bookmark to the home screen for instant access to twitter, if you don’t feel like using the application. In my opinion this seems to be unnecessary as it would divert attention away from the application. The application also has a built in web browser that can be configured to set all web pages viewed in the mobile format, this is a nice feature as it saves having to use safari all the time when someone sends a link. I also believe that TweetDeck had such a feature. - Easy to use - Provides all features needed for a twitter application - Was hard to find on the app store - No skinning - Lack of customisation compared to other applications So what do you think about this application? Is it worth the download … let me know in the comments. You can download the application here. - Twitter debuts official Tweet Button bookmarklet (sporkings.com) - Update Your Twitter Feed With What Music You’re Listening To [Mac] (makeuseof.com) - Twitter For iPhone: We’re Looking For A Few Good Ideas (blogherald.com) - SongStumblr – Geosocial Music Discovery comes to the App Store (themactrack.com)
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867095.70/warc/CC-MAIN-20180624215228-20180624235228-00591.warc.gz
CC-MAIN-2018-26
2,321
19
https://physics.stackexchange.com/questions/10823/if-100-of-the-energy-from-the-sun-is-reflected-back-into-space
code
100% of the energy from the sun is reflected back into space, it's just shifted from a low-entropy state to a high-entropy state, and from a high frequency (ultraviolet) to a low frequency (infrared). But does the total number of photons change as a result? Are there more low frequency photons, then, in order to make the same amount of energy? Reflection, by definition, sends the same photons back. So it can't change the frequency of the photons or their number or the entropy (at least locally, it can't). What you probably want to talk about is complete absorption and black-body re-radiation of the energy. That's something else than reflection. Yes, if the planet is in balance, then, of course, it has to emit a higher number of photons that have a lower energy and lower frequency each because the energy of a single photon is related by $E=hf$ to the frequency. The entropy is essentially proportional to the number of photons, so it emits more entropy than it absorbs, and the entropy is increasing.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00491.warc.gz
CC-MAIN-2022-33
1,011
4
https://www.unix.com/man-page/opensolaris/4/lmhosts/
code
|Linux & Unix Commands - Search Man Pages LMHOSTS(4) File Formats and Conventions LMHOSTS(4) lmhosts - The Samba NetBIOS hosts file lmhosts is the samba(7) NetBIOS name to IP address mapping file. This file is part of the samba(7) suite. lmhosts is the Samba NetBIOS name to IP address mapping file. It is very similar to the /etc/hosts file format, except that the hostname component must correspond to the NetBIOS It is an ASCII file containing one line for NetBIOS name. The two fields on each line are separated from each other by white space. Any entry beginning with '#' is ignored. Each line in the lmhosts file contains the following information: o IP Address - in dotted decimal format. o NetBIOS Name - This name format is a maximum fifteen character host name, with an optional trailing '#' character followed by the NetBIOS name type as two hexadecimal If the trailing '#' is omitted then the given IP address will be returned for all names that match the given name, whatever the NetBIOS name type in the lookup. An example follows: # Sample Samba lmhosts file. Contains three IP to NetBIOS name mappings. The first and third will be returned for any queries for the names "TESTPC" and "SAMBASERVER" respectively, whatever the type component of the NetBIOS name requested. The second mapping will be returned only when the "0x20" name type for a name "NTSERVER" is queried. Any other name type will not be resolved. The default location of the lmhosts file is in the same directory as the smb.conf(4) file. lmhosts is loaded from the configuration directory. This is usually /etc/samba or This man page is correct for version 3.0 of the Samba suite. smbclient(1), smb.conf(4), and smbpasswd(1M) The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 was done by Alexander Bokovoy. See attributes(5) for descriptions of the following attributes: | ATTRIBUTE TYPE | ATTRIBUTE VALUE | |Availability | SUNWsmbar, SUNWsmbau | |Interface Stability | External | Source for Samba is available on http://opensolaris.org. Samba(7) delivers the set of four SMF(5) services as can be seen from the following $ svcs samba wins winbind swat STATE STIME FMRI disabled Apr_21 svc:/network/samba:default disabled Apr_21 svc:/network/winbind:default disabled Apr_21 svc:/network/wins:default disabled Apr_21 svc:/network/swat:default where the services are: runs the smbd daemon managing the CIFS sessions runs the nmbd daemon enabling the browsing (WINS) runs the winbindd daemon making the domain idmap Samba Web Administration Tool is a service providing access to browser-based Samba administration interface and on-line documentation. The service runs on software loopback network interface on port 901/tcp, i.e. opening "http://localhost:901/" in browser will access the SWAT service on local machine. Please note: SWAT uses HTTP Basic Authentication scheme where user name and passwords are sent over the network in clear text. In the SWAT case the user name is root. Transferring such sensitive data is advisable only on the software loopback network interface or over Samba 3.0 01/19/2009 LMHOSTS(4) All times are GMT -4. The time now is 05:30 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648003.58/warc/CC-MAIN-20180322205902-20180322225902-00398.warc.gz
CC-MAIN-2018-13
3,657
59
https://developer.arm.com/tools-and-software/server-and-hpc/arm-architecture-tools/arm-performance-reports/release-history/5-1
code
Arm Performance Reports This page lists the Arm Performance Reports release history. Details on Release Versions, and links to the Release Notes and Documentation are provided below. What's new in Allinea Performance Reports 5.1 Allinea Performance Reports 5.1 covers the following releases: - Allinea Performance Reports 5.1.0 Release Note for Release History Allinea Performance Reports 5.1 Changes since Allinea Performance Reports 5.1: - 5.1-45173: Facilitate stopping at MPI_Init when the call is in a dynamic library that is opened with dlopen() by using the MPI_INIT and MPI_INIT_PENDING environment variables. - 5.1-45057: Fix bug that caused Performance Reports to interfere with programs that passed 64 bit file offsets or counts to certain MPI functions. - 5.1-44970: Improve performance of the analysis phase. - Fix bug that caused some MPI methods to fail under Performance Reports when passed a NULL pointer from Fortran. - Fix bug that caused Performance Reports to incorrectly process some functions when they were passed MPI_IN_PLACE. - Fix bug that caused Performance Report to wrap MPI_Wait incorrectly. - Fix bug that caused Performance Report to wrap MPI_File_iwrite_shared incorrectly. - Fix bug that caused MPI_Status parameters to be incorrectly handled by the wrapper. - 5.1-44795: Fix bug that caused one process per node to run much slower and to increase the job wallclock time (because pmi_proxy was running at 100%). - 5.1-44229: Fix failure to launch CUDA jobs when auto-detection fails. - 5.1-44076: Fix failure to launch CUDA jobs when using SLURM(MPMD). - 5.1-43967: Fix MPI wrapper for Fortran MPI_File_* functions. - 5.1-43812: Fix issue launching IntelMPI jobs via Slurm. - Fix back-end debugger selection when the MPI_COMPILER environment variable is set. - 5.1-43607: Give the mpirun specified by the ALLINEA_MPIRUN environment variable precedence over any mpirun in the path. - Fix stack limit bug, causing "Thread creation error: Resource temporarily unavailable" messages. - 5.1-43373: Fix timeout on some network configurations, caused by the backend not trying all known addresses when connecting to the frontend. Changes for Allinea Performance Reports 5.1: - Debugging and profiling support for RHEL 7 x86_64. Debugging and profiling support for SLES 12 x86_64. CUDA 5.5 support has been removed. PGI 13.x is no longer a tested combination. - Energy section added to Performance Reports output (requires Energy Pack add-on). - Removed SSH requirement for MPICH 2 and 3 and Intel MPI.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524685.42/warc/CC-MAIN-20190716180842-20190716202842-00229.warc.gz
CC-MAIN-2019-30
2,529
22
http://www.bookinginheels.com/2012/09/random-reads-6-life-of-pi-by-yann-martel.html
code
This is the sixth consecutive month I'll be participating in Random Reads, hosted by I'm Loving Books, and this is the month that I will get a fiction book. It's not even a question anymore - if the random number generator picks out another non-fiction book, it's clear the world is out to get me. Random Read #1: The League of Extraordinary Gentlemen, Vol. 2 by Alan Moore Random Read #2: Telling Tales: A History of Literary Hoaxes by Melissa Katsoulis Random Read #3: Delusions of Gender by Cordelia Fine Random Read #4: An Utterly Exasperated History of Modern Britain by John O'Farrell Random Read #5: Two Queens in One Isle by Alison Plowden (not reviewed yet) *cries* See? Non-fiction all the way. Cross your fingers people! Want to join in? - If you’re on Goodreads, enable sorting to your to-read shelf (you should see numbers next to each book now). - Go to Random.org and type in the Min as 1 and the Max as how many ever books are on your to-read shelf. - Scroll down to the book matching the number Random.org picks. - Link up to your Random Reads post by clicking on the banner above. (explanation stolen from last month's sign-up post). Can it possibly be!? It is! I got a fiction book - The Life of Pi by Yann Martel. I only bought this last week, but it's likely it would have been a while before I actually got round to reading it, so I'm content with this. Haha, it's made my month! :D
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705790741/warc/CC-MAIN-20130516120310-00074-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,406
15
https://staging.openpowerfoundation.org/how-to-build-a-fully-functional-cluster-using-free-and-open-source-tools-for-installation-setup-and-management-of-hpc-clusters-based-on-accelerated-openpower-servers/
code
02 Feb, 2016 Presentation Abstract to be presented at Summit 2016 During the last decade the large majority of the HPC community have developed several opensource tools for the administration and management of their compute clusters. While these middleware are extremely common on the x86 ecosystem, they have yet to be adopted on POWER architecture. In this presentation, E4 demonstrates how to build a fully functional cluster using free and open source tools for installation, setup, and management of HPC clusters based on accelerated OpenPOWER servers The goal is to provide a conformable user experience to the sys admin and the client of the HPC facility, minimising the learning curve shifting from x86 to POWER while maximising the benefits in terms of performance and flexibility. Thanks to E4’s implementation it’s possible to use several free software tools in an integrated and easy way. The tools used spans from the bare-metal provisioning, up to the job scheduler and the load monitoring. Special focus will be given to the development of software modules that are architecture independent in order for sys admins to manage OpenPOWER based clusters with the same ease of the x86 based ones, but taking advantages from the outstanding performance of OpenPOWER systems. Piero Altoè responsible of the Research and Innovation at E4 Computer Engineering SpA and he brings more than 8 years of experience in computational chemistry and he is author of 30 papers published on international scientific journals. He joined the E4 team as HPC Specialist in 2010. Piero Altoè achieved his Ph.D. in 2007 at the Università di Bologna focusing his attention on the development and applications of hybrid quantum and molecular mechanics methods. Since 2002 he is involved in high performance computing activities related to software development and system administration.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300616.11/warc/CC-MAIN-20220117182124-20220117212124-00147.warc.gz
CC-MAIN-2022-05
1,880
5
http://ego-machine-en.blogspot.com/2013/04/beautify-your-math-code-part-i.html
code
I've discovered few typical mistakes that people often do in matlab/gnu octave/python code. Maybe mistake is strong word, not mistakes, but suboptimal usage of environment capabilities (yes, I know mistake sounds better :)). Since I am familiar with python more that mathab, I'll provide few snippets written on python with numpy and scipy libraries, but idea remains the same in matlab also. We need setup geometry and some initial data: import numpy as np from scitools.numpyutils import meshgrid h = 0.1 L = H = 1. x = np.arange(0, L, h) y = np.arange(0, H, h) u_analytical = lambda x, y: 2*x + np.exp(y) u1 = np.zeros( (len(x), len(y) ) ) for i, x_val in enumerate( x ): for j, y_val in enumerate( y ): u1[i][j] = u_analytical(x_val, y_val) (xx, yy) = meshgrid(x, y, sparse=False, indexing='ij') u1_ = u_analytical(xx, yy) Sparse matricesFirst you should use sparse matrices, they rock! Second you should carefully choose sparse matrix format. As example why it should be done I'll quote documentation: Each sparse format has certain advantages and disadvantages. For instance, adding new non-zero entries to a lil_matrix is fast, however changing the sparsity pattern of a csr_matrix requires a significant amount of work. On the other hand, operations such as matrix-vector multiplication and matrix-matrix arithmetic are much faster with csr_matrix than lil_matrix. A good strategy is to construct matrices using one format and then convert them to another that is better suited for efficient computation.It is not very hard to choose correct sparse matrix format, especially in numerical computations, where in most cases you know all valuable information about your matrix before computation. The saddest thing is that I saw bad written code in examples given by teachers in their numerical courses.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267159193.49/warc/CC-MAIN-20180923095108-20180923115508-00461.warc.gz
CC-MAIN-2018-39
1,808
8
http://runtime-revolution.278305.n4.nabble.com/Image-quality-changes-image-size-td4678482.html
code
2) Import this 32 pixel image in a new stack and resize this really small image as big as 3) Select this image and open the Property Inspector. change the quality of the image from normal to best. Notice how the image grew within it's own boundary. The image do not grows larger, it grew within the If you use a plain image, instead of a png with alpha channel you will notice that the image crops against its boundaries. In my test image of an human eye, the effect is really noticeable. Please, report if you get different results. Thanks in advance!
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256724.28/warc/CC-MAIN-20190522022933-20190522044933-00508.warc.gz
CC-MAIN-2019-22
552
11
https://gc-taylor.com/blog/2009/02/11/django-eve-online
code
For the use of fellow Djangonauts out there, I introspected and fixed upCCP’s SQL dump of EVE Online data. This means you can now get access to everything from the comforts of the Django ORM. The project is still very new, and I’m not even sure it’s going to be attractive given the table layout. At this point, it is a bunch of introspected models and a fixed up database dump. I’ll be adding convenience methods, __unicode__ functions, and etc with time to make it more friendly. Check it out at: For now this will only work on Postgres until some kind soul wants to get the MySQL or SQLite dumps fixed up (some tables need ‘id’ primary keys).
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027331485.43/warc/CC-MAIN-20190826085356-20190826111356-00281.warc.gz
CC-MAIN-2019-35
657
3
http://parkinglotstreetmix.blogspot.com/2009/10/my-winter-pallor-has-returned.html
code
So for the past couple of weeks, I have been working out of the McKinsey office in New York City...we haven't had to be at the client site and the rest of my team is from NYC, so it just makes sense for me to come. To get into the building, you need a security pass. For the past week and a half, I've been getting a guest pass printed for me every day, but since it takes awhile every morning, I decided to get a permanent security badge today. These security badges are pretty standard, just a thick plastic card with a picture on it. So the guy took my picture today and made me a badge and I was thinking that my picture was pretty decent...certainly not Chicago Sun-Times-level awful. After returning to my team room, one of my colleagues asked to see my picture. A little background on him: he is probably in his mid-30s, married with a baby daughter, and just about the least offensive person you could ever meet. His very religion is based upon doing as little harm to the world as possible: http://en.wikipedia.org/wiki/Jainism He looks at my picture and exclaims, "This is a really good shot of you!" After thanking him, he says, "No, really, you look so much healthier here." Apparently, I generally look like some sort of sickly mess. Great.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591683.78/warc/CC-MAIN-20180720135213-20180720155213-00038.warc.gz
CC-MAIN-2018-30
1,253
5
http://c-class.org/2354455a/422792.html
code
Hi everYbody. This is my first post. I didn't found anything about including proprietary libs. I'm trying to build my own rom from official android 2.3.6 source, and actually i don't know what i need to include. In my working rom, are: a vendor folder, under system folder, that have two folder inside, bin and lib. Another, classic lib folder, under system, that contains, i hope, other libs. How can i know what i have to include in my android build structure, and what the exactly structure? thanks to all.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256381.7/warc/CC-MAIN-20190521122503-20190521144503-00007.warc.gz
CC-MAIN-2019-22
509
6
https://pokemondb.net/pokebase/meta/20865/pokestadium-sprites-work-in-questions-but-not-in-answers?show=20942
code
OK I figured out the problem - part of the auto-correction tool I added was replacing "pokemon" with "Pokemon" so it made the URL for the image wrong. I have fixed it so that it only works for regular text. However, I would prefer it if you used our sprites from PokemonDb. Some sites block "hotlinking" images (like Bulbapedia). And IIRC Pokemon Stadium moved all their sprites to different locations, breaking all the old links. And sometimes sites go down, like Pokecheck did a few weeks back. Ours are pretty easy to find, just go to the sprites page, click the desired sprite, copy the code in the third box labelled "Markdown" and paste it directly into the box. The sprite will then come up.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945660.53/warc/CC-MAIN-20180422212935-20180422232935-00503.warc.gz
CC-MAIN-2018-17
698
3
https://calculatorstandarddeviation.com/standard-deviation-of-frequency-table
code
1. For Windows or Linux - Press Ctrl+D 2. For MacOS - Press Cmd+D 3. For iPhone (Safari) - Touch and hold, then tap Add Bookmark 4. For Google Chrome - Press 3 dots on top right, then press the star sign Enter your set of numbers in the input field. Numbers must be separated by commas. Press Enter on the keyboard or on the arrow to the right of the input field. In the pop-up window, select “Find the Standard Deviation of the Frequency Table”. You can also use the search. The standard deviation is the square root of the arithmetic mean of the sum of squares of the deviations from the mean. Strictly and mathematically, but absolutely incomprehensible. This is a verbal description of the formula for calculating the standard deviation, but to understand the meaning of this statistical term, let's deal with everything in order. Imagine a shooting range, target and arrow. The sniper shoots at a standard target, where hitting the center gives 10 points, depending on the distance from the center, the number of points decreases, and hitting the outer areas gives only 1 point. Each shooter's shot is a random integer value between 1 and 10. A bullet-riddled target is a great illustration of the distribution of a random variable.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304961.89/warc/CC-MAIN-20220126192506-20220126222506-00409.warc.gz
CC-MAIN-2022-05
1,241
9
https://onehack.us/t/solved-any-methods-to-create-email-database/64095
code
i want to know if there are any methods to create email database by using software yourself from internet to complete surveys. If any one knows please post full process. You need a minimum of following fields to build emails: - Full Name (split into first name and last name) - The domain of the company like Microsoft(dot)com Once you have these two 3 fields, you can use the following tools to build an email database: WIth both Mailboxlayer and Neverbounce you will have to run 10–15 patterns of emails against each name and domain and see which email is valid. It might be a case that none is valid,so you will have to skip them. The other option is to simply get a customised and verified high-quality database of contacts from companies like EasyLeadz, SMSIDEA… etc. If you google more you get more companies. Hope this helps.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250599718.13/warc/CC-MAIN-20200120165335-20200120194335-00329.warc.gz
CC-MAIN-2020-05
836
8
https://support.opennebula.pro/hc/en-us/articles/115005959343-Solution-Provider-Partner-Program-Guide
code
Solution Provider Partners create solutions around OpenNebula, usually bundled or integrated with other open-source components, and provide direct customer support for it. They redistribute the software under the OpenNebula brand name to end customers as part of their solution following a licensing or a subscription model. The Partner adds value by providing a solution customized to solve a well-defined business problem, usually in vertical-specific domains. Solution Providers are large companies that must have specialized support teams for first and second level support of mission critical production applications. OpenNebula Systems provides the Partner with third level support by helping in the resolution of advanced and specialized operational problems that cannot be solved by Partner’s support team.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474670.19/warc/CC-MAIN-20240227021813-20240227051813-00795.warc.gz
CC-MAIN-2024-10
816
1
http://www.hwcompare.com/27846/radeon-hd-6570-oem-1gb-vs-radeon-r9-m375/
code
Compare any two graphics cards: Radeon HD 6570 (OEM) 1GB vs Radeon R9 M375 IntroThe Radeon HD 6570 (OEM) 1GB features a clock frequency of 650 MHz and a GDDR3 memory speed of 900 MHz. It also uses a 128-bit bus, and makes use of a 40 nm design. It is comprised of 480 SPUs, 24 Texture Address Units, and 8 ROPs. Compare that to the Radeon R9 M375, which comes with clock speeds of 1015 MHz on the GPU, and 1100 MHz on the 4096 MB of DDR3 memory. It features 640 SPUs along with 40 Texture Address Units and 16 Rasterization Operator Units. Power Usage and Theoretical Benchmarks Theoretically, the Radeon R9 M375 should be a lot faster than the Radeon HD 6570 (OEM) 1GB overall. (explain) Texel RateThe Radeon R9 M375 should be much (approximately 160%) faster with regards to texture filtering than the Radeon HD 6570 (OEM) 1GB. (explain) Pixel RateIf running with lots of anti-aliasing is important to you, then the Radeon R9 M375 is superior to the Radeon HD 6570 (OEM) 1GB, by far. (explain) Please note that the above 'benchmarks' are all just theoretical - the results were calculated based on the card's specifications, and real-world performance may (and probably will) vary at least a bit. Memory Bandwidth: Bandwidth is the max amount of data (measured in megabytes per second) that can be moved over the external memory interface within a second. The number is worked out by multiplying the card's bus width by its memory clock speed. If it uses DDR type memory, it should be multiplied by 2 once again. If it uses DDR5, multiply by 4 instead. The higher the bandwidth is, the faster the card will be in general. It especially helps with anti-aliasing, HDR and high resolutions. Texel Rate: Texel rate is the maximum number of texture map elements (texels) that can be applied per second. This figure is worked out by multiplying the total number of texture units by the core speed of the chip. The higher the texel rate, the better the card will be at texture filtering (anisotropic filtering - AF). It is measured in millions of texels applied in one second. Pixel Rate: Pixel rate is the most pixels the video card could possibly record to the local memory per second - measured in millions of pixels per second. The figure is calculated by multiplying the number of Render Output Units by the the card's clock speed. ROPs (Raster Operations Pipelines - sometimes also referred to as Render Output Units) are responsible for filling the screen with pixels (the image). The actual pixel fill rate is also dependant on quite a few other factors, most notably the memory bandwidth - the lower the memory bandwidth is, the lower the potential to get to the maximum fill rate.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998986.11/warc/CC-MAIN-20190619123854-20190619145854-00244.warc.gz
CC-MAIN-2019-26
2,685
12
https://docs.fetch.ai/decentralisation/
code
What are Decentralized Systems?¶ A decentralized system is an interconnected system if no single entity (individual, organization, or group) is the sole authority. In a decentralized system, control and decision-making is in the hands of those participating in the system, and they have (more or less) equal standing in terms of influence. This is in contrast to a centralized system where a single authority is above all others in terms of rights and privileges. A good example of a decentralized system is an ant colony, where control is distributed among the colony's members. Without any form of central control, an ant colony successfully achieves its goals, performs all its required tasks, and effectively responds to the ever changing conditions on the colony's environment through the collective contribution of the individual ants. Another great example is when you fly internationally from one place to another. There are numerous participants working together and communicating efficiently to make that a seamless experience without there being a central unit that manages and plans it all. There are two key characteristics of decentralized systems: Equality of participants: all participants contribute towards the system's decision-making and control, and each of them takes an active role in managing the system. Lack of central authorities: It is not that decentralized systems lack the authority to make changes to the management of the network, rather this authority is distributed among the participants. The system is run by the participants for the benefit of the participants. Decentralized vs Distributed¶ These are very easy to get confused, and sometimes it seems they are used interchangeably but they are actually quite different. A decentralized system is one where there is a lack of central authorities. A distributed system is a system in which the physical location of the participants, the servers, the nodes, and whatever other components involved are in different places. So instead of the system being physically all in one place, different parts of the system are located on physically different places and the processing of tasks are shared between them. The most obvious example of a distributed system is cloud computing, where tasks are shared among numerous computers or a database hosted on more than one computer. What determines whether a system is decentralized or not is whether there are central authorities. What determines whether a system is distributed is whether the processing is done in one or multiple physical locations. Decentralized vs Centralized¶ In a centralized system, there is a central authority that manages the system, makes decisions about how it is run and exercises control over the other components of the system. Some examples of centralized systems: - Expedia: Hotel owners and people looking for hotel rooms connect to each other through Expedia, rather than communicating and transacting directly together. - Messaging services such as WhatsApp: People communicate with each other through a centrally controlled and owned messaging service. - Amazon: Buyers and sellers interact commercially through Amazon. - Client-server model: Clients interact with each other only through the server, a great example of this is email where communication between two users goes through a server. Why are Decentralized Systems Useful?¶ Decentralized systems are useful because they are open and democratic, more transparent, and they are run solely in the interests of their participants by their participants. Democratic: Decentralized systems require participation in order to successfully function, and therefore they are naturally democratic. Open: Participants can freely join or leave as they wish. The system is open to new participants and does not stop existing ones leaving. Public: Because decentralized systems need to be managed and run by their participants (democratic) and anyone can in principle join the system or leave (open), these systems are often public and their inner workings are not kept confidential. Transparent: In order for the participants of a decentralized system to contribute to its liveliness, they must be made aware of how the system works, how it is managed, and so on. Trust minimisation: participants do not have to go through central authorities to interact with others and achieve their goals. Hence, there is no need to trust central entities to handle your needs. Any guarantees needed by the system has to be provided by the system itself and the way it is designed, and (due to transparency) this is typically well known. Speed: Decentralized systems are often slower than centralized systems. Because there is more than one decision maker, decisions have to be made by consensus in the group and arriving at that consensus takes more time than a single entity making the decision. Efficiency: In decentralized systems, decision-making about the system requires participation. This makes it far slower to make changes to the system as it takes time for participants to agree to change. Also, because the system is open, participants can leave/join as they wish, then the system has to be designed to cope with an often changing number of participants. All this added complexity inevitably affects the efficiency of the system's operation. Control: Because a decentralized system is often run collectively by its participants, controlling how the system is managed and the direction of its development is difficult. Simplicity: For any system, it is often more complex to engineer a decentralized version with more than one decisions maker than a centralized one that achieves the same goals via central decision-makers and enforcers.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506420.84/warc/CC-MAIN-20230922134342-20230922164342-00512.warc.gz
CC-MAIN-2023-40
5,748
31
http://codeblow.com/questions/iis-internet-web-service-integrated-authentication-with-php/
code
I've got a .Internet Web Service where I wish to enable Integrated Authentication to be able to lock lower use of specific accounts. The issue I've is enabling this authorization when utilizing PHP along with a Cleaning soap request towards the service. It is possible to right way make it possible for this or at best a guidelines in the PHP side? Otherwise can there be an alternate where certificates can be used as the Cleaning soap request to limit use of techniques within the Web Service? Things I am thinking about doing is: - Switch on integrated authentication in IIS for that Web Service - Set file system ACLs around the *.asmx file(s) that consists of the technique(s) to limit use of individuals who require it It is possible to guidelines regarding how to use a Web service locked lower in this way from the PHP page? Any assistance will be greatly appreciated. Thanks ahead of time.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867220.74/warc/CC-MAIN-20180525215613-20180525235613-00526.warc.gz
CC-MAIN-2018-22
898
5
http://childhealthpolicy.vumc.org/tageh10054.html
code
Quantitative statistics is a branch of mathematics that deals with the collection, analysis, interpretation, presentation, and organization of data. It is used to describe, summarize, and draw conclusions from a set of numerical data. There are numerous project ideas that can be explored using quantitative statistical methods, ranging from simple descriptive statistics to more advanced inferential techniques. Here are a few examples: Survey data analysis: Surveys are a common way to collect data on a variety of topics, such as consumer preferences, political opinions, or health behaviors. You can design a survey and collect data from a sample of individuals, then use quantitative statistical methods to analyze the results. For example, you could use t-tests to compare the mean responses of different subgroups, or use regression analysis to examine the relationship between different variables. Experimental design: Experiments are used to test hypotheses and examine cause-and-effect relationships. You can design an experiment and collect data, then use statistical analysis to determine whether the results support your hypothesis. For example, you could test the effectiveness of a new teaching method by randomly assigning students to different treatment groups, then analyzing the results using ANOVA or other statistical tests. Time series analysis: Time series data refers to observations that are collected at regular intervals over a period of time. You can analyze time series data to identify trends and patterns, forecast future values, or detect unusual events. For example, you could use techniques such as autoregressive integrated moving average (ARIMA) modeling or exponential smoothing to forecast stock prices or sales data. Multivariate analysis: Multivariate analysis involves analyzing data that involves multiple variables. You can use techniques such as factor analysis, principal component analysis, or cluster analysis to examine relationships between variables and identify patterns in the data. Predictive modeling: Predictive modeling involves using statistical techniques to build models that can predict future outcomes based on past data. You can use data mining techniques such as decision trees, neural networks, or support vector machines to build predictive models and evaluate their performance. These are just a few examples of quantitative statistical project ideas. There are many other topics that can be explored using statistical methods, including social network analysis, text analysis, and spatial analysis, to name a few. Whatever topic you choose, it is important to have a clear research question, design a robust study, and use appropriate statistical methods to analyze the data and draw meaningful conclusions. Statistics Project Ideas For College And High School Equally, with e-commerce data, you could look at which prices and products offer the best value for money. Then my friend you are already a statistician. Compare the time your classmates spend watching television with the time they spend reading. Ideally, the lines should be closing together and converging. Statistics Project Ideas for College Students There are tons of college statistics projects examples. Study the effect of air pollution on respiratory health in children. Based on a class survey, predict how many of your classmates will have a pet when they are adults. Top 99+ Trending Statistics Research Topics for Students We are well known among the students of the United States of America USA , Canada, UAE Etc. If your thoughts in statistics are very unclear and lack a good direction, it becomes tough to write a reasonable hypothesis. Some people may actually take any critical observation rather personally. The idea of the analysis should be to steer clear of such extreme responses. It will enable them to be more self-assured while working on their assignments. But we will share the best ideas for statistics projects for college. Here, we have compiled a list of top statistics project ideas for you to consider. Which sidewalk chalk brand is more durable? Must Read about How To Create A Good Topic For Statistics Project? Some project managers are lucky enough to have a single system that enables recording, querying and function as a full-fledged Management Information System at the same time. We know that mathematical science known as statistics is what helps us deal with all this kind of information. How the use of the internet led to an increase in distance learning and home teaching 12. For permission to reproduce this material, please contact PMI or any listed author. Statistics Project Ideas for High School Students Here are some ideas for high school students to get started on their statistics project: 1 Examine the relationship between study habits and grades. Conclusions We have been using metrics for a number of years now for planning, execution and control of projects. 60 Statistics Project Ideas to Get The Best Grades Why do Students in college spend most of their free time on social media? However, the question is, which quantitative research topics for students should you consider as good statistical research topics? Working on a statistics project is not a piece of cake. Conclusion There are plenty of tons or even thousands of statistics projects ideas to work on. You need a subject for this project which is attractive to you. Sometimes a student will be assigned a certain topic but at other times the student will be allowed to choose their own. Reasons why Asian students perform better in Math. Both these figures are readily available from any standard project scheduling software. Apart from that, if you are working on a project and you are not sure that is the topic that excites you to work on it or not. Introduction: The essential element for your statistical project is the data that you research. Do not forget to elaborate the instruments beneficial for studying the research objective. Data visualization project ideas What is data visualization? These systems enable logging of defects, and tracking them to closure. Why might that be? As the name suggests, the research is completely opposite to qualitative research and involves collecting and analyzing non-numerical data such as video, text and audio. Scraping, tidying, and analyzing data is one thing. Determining the Research Methodology The methods section of a quantitative research paper should elaborate on how each objective of your study will be attained. The first thing to remember is that you need to validate that your data source is authenticated. Most times students can choose a topic of their own. The student also develops critical and analytical thinking skills. All the best for your future endeavors. Quantitative research refers to the systematic experimental study of the conspicuous phenomenon. Then you will struggle at the last moment and most probably not going to finish your project on time. Best statistics project ideas to consider while writing — Most of the research-based subjects require statistics projects. The metrics program that will be described in this paper had the following objectives. If you get unorganized data, try to organize it first and then start working. Here in this blog post, we will share with you the list of 99+ awesome statistics research topics. Statistical analysis of peak traffic hours in your city. 51 Best Quantitative Research Topics for your Next Semester You can hire academic assistance for a variety of subjects. Rate this post Statistics is a very popular subject, and students always look for interesting statistics project ideas. Also Read: Trending Statistics Projects 1. College debts are the main reason for the poor performance of students 13. Data scraping project ideas for your portfolio What is data scraping? Because most of the time, the professors give the research questions to the students. . Make sure if the salt is adequate or the spices are proportionate? How probiotics can cause indigestion and diarrhea. Top Statistics Project Ideas for Your Academics 2022 Be Brief And To the Point With Statistical Writing Of course, writing a good statistical paper requires not only choosing a good topic but the right structure too. Using data from a school-wide survey, predict how many students will attend college after graduation. In particular, the correlation between the following parameters is of particular interest to us and the subject of ongoing research. Hypothesis: A well-defined hypothesis is a must for a good statistics project. Humera, where she explains how visualization helps tell a story with data. Using data to investigate the topic.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949958.54/warc/CC-MAIN-20230401094611-20230401124611-00311.warc.gz
CC-MAIN-2023-14
8,707
21
http://www.howardforums.com/showthread.php/1754099-will-i-need-a-sim-to-use-Optimus-1-as-a-wifi-only-device?p=14752432
code
will i need a sim to use Optimus 1 as a wifi only device? I've got an old iphone not setup on any carrier. Just for poking around the web and apps. Now I want to do the same for an optimus one. Will I need a sim if I only want to use it as a wifi device? well i called telus and the tech said it "should" work without a sim card. the vanilla iphone has no sim card and it works so... now to just find one. btw I am using viber on the iphone and making calls and sending sms messages without any carrier. No sim required for wifi use only. I use an optimus 1 in canada on Bell and an optimus t in the us on t-mobile. When I am not using one of the phones, I take out the sim and use it download music or files through wifi with no problem.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700212265/warc/CC-MAIN-20130516103012-00081-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
738
8
https://api-ninjas.com/
code
Work with real, commercial-quality data for your next project Get started on your side project or hackathon project right away! Leverage our APIs to power your next business idea Impress your customers by delivering high-quality data How can API Ninjas help you? Land dream jobs at FANG companies Our APIs make it easy to build side projects, which tech recruiters are trained to look for in resumes. Whether you're looking to get your first software engineering internship or land a senior software engineer role at a FANG company, API Ninjas can open new doors for your careeer. Earn an A+ on your next class project Class projects are now a part of thousands of computer science courses around the world. By leveraging real data from API Ninjas in your work, you can impress your teacher and classmates without pulling all-nighters. Jumpstart your next venture Some of the most successful companies in the world began with engineers hacking together on an idea. With our suite of APIs, founders can build prototypes faster, develop MVPs more efficiently, and get to market earlier. An API is only as good as its documentation. We get that, and that's why we made sure to document our APIs clearly and concisely using example data, sample code and live demos. Go to our API directory and try it out!
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446708010.98/warc/CC-MAIN-20221126144448-20221126174448-00688.warc.gz
CC-MAIN-2022-49
1,301
12
http://www.projet-horizon.fr/article193.html
code
Degraf is a parallel MPI code to degrade in resolution large cosmological initial conditions on a cluster without requiring shared memory, while possibly shifting the box for the purpose of resimulations. The real Fourier transforms are carried in place using fftw, while minimizing the amount of used memory (at the expense of performance), in the spirit of grafic-1. The output of the result(s) is also carried in parallel. It runs interactively using the command: mpirun -np [number of processors] degraf [namelistfile] where namelistfile is a fortran namelist parameter file. The structure of the parameter file is the following: nfiles = 1 inputfiles = 'ic_deltab' degramax = 2 recurse = .false. shift = 0 0 0 * nfiles is the number of input files to be processed * inputfiles is the list of input file names, in simple quotes, separated by white spaces * degramax is a power of 2 (greater or equal to 2) indicating by how much the resolution of the input box(es) is degraded * if recurse is set to .false., the output resolution is uniquely set by degramax. If set to .true., then all resolutions corresponding to degradation factors from to 2 up to degramax (in powers of 2) are computed * if shift is present the whole hierarchy will be shifted according to shift (in relative units of the boxsize). * The output file names are constructed from the input file names, adding at the end of the file names the output linear size of the box in the x direction (note that the code should work also on non-cubic boxes) For velocity fields (or in general for fields where the grid is offset by a fraction of a mesh length), care is taken during the degradation to first shift the grid points back to the original (zero offset) position at full resolution. After degradation, the shift is reapplied, with a value equal to the same offset fraction, but computed in units of the new (bigger) mesh size.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585911.17/warc/CC-MAIN-20211024050128-20211024080128-00637.warc.gz
CC-MAIN-2021-43
1,900
16
http://www.w3.org/TR/2002/WD-xhtml2-20021218/conformance.html
code
This section is normative. The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119]. This section has a distinct DTD bias. We need to make it clear that either the DTD or the Schema can be used to validate XHTML 2.0 documents. A strictly conforming XHTML 2.0 document is a document that requires only the facilities described as mandatory in this specification. Such a document must meet all the following criteria: The document must conform to the constraints expressed in Appendix B - XHTML 2.0 Schema or Appendix D - XHTML 2.0 Document Type Definition. The root element of the document must be The root element of the document must contain an xmlns declaration for the XHTML 2.0 namespace [XMLNAMES]. The namespace for XHTML is defined to be http://www.w3.org/2002/06/xhtml2. An example root element might look like: <html xmlns="http://www.w3.org/2002/06/xhtml2" xml:lang="en"> There must be a DOCTYPE declaration in the document prior to the root element. If present, the public identifier included in the DOCTYPE declaration must reference the DTD found in Appendix E using its Formal Public Identifier. The system identifier may be modified appropriately. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 2.0//EN" "TBD"> Here is an example of an XHTML 2.0 document. <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 2.0//EN" "TBD"> <html xmlns="http://www.w3.org/2002/06/xhtml2" xml:lang="en"> <head> <title>Virtual Library</title> </head> <body> <p>Moved to <a href="http://vlib.org/">vlib.org</a>.</p> </body> </html> Note that in this example, the XML declaration is included. An XML declaration like the one above is not required in all XML documents. XHTML document authors are strongly encouraged to use XML declarations in all their documents. Such a declaration is required when the character encoding of the document is other than the default UTF-8 or UTF-16 and no encoding was determined by a higher-level protocol. A conforming user agent must meet all user agent conformance requirements defined in [XHTMLMOD].
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607802.75/warc/CC-MAIN-20170524055048-20170524075048-00003.warc.gz
CC-MAIN-2017-22
2,174
17
https://www.rapid7.com/blog/post/2014/01/17/news-on-the-embedded-systems-land/
code
Last updated at Wed, 30 Aug 2017 00:09:18 GMT Last year we worked hard to improve the embedded devices capabilities available on Metasploit collaborating with awesome guys like m-1-k-3 to add new modules and capabilities, collaborating and conducting research like in the IPMI related work by HD Moore, or sharing exploiting war stories. And looks like this year won't be different at all. At the beginning of 2014, Eloi Vanderbeken published an awesome research related to a service included on several SerComm based routers, allowing dangerous features like configuration dumping or arbitrary command execution, all of that without authentication! Soon, one of our regular contributors, Matt Andreko, put ready three awesome Metasploit modules in order to detect and exploit the weaknesses: - auxiliary/scanner/misc/sercomm_backdoor_scanner to find vulnerable devices. - auxiliary/admin/misc/sercomm_dump_config to dump the configuration from vulnerable devices, and collecting valuable information such as credentials. - exploit/linux/misc/sercomm_exec to get sessions! He did awesome work, not only writing the modules, but also helping to test all of them in a wide range of devices! You definitely should check his write-up about these modules. Meanwhile, here in Metasploit, we used this new embedded device's story to improve the existent MIPS based payloads and encoders through both optimization and bug fixing. If you're interested in that sort of thing, you can check the commit histories here: - PR #2832: Makes null free the shell_reverse_tcp single payload for MIPS Little Endian. - PR #2844: Fixes an erroneous usage of a temporary register on the shell_reverse_tcp single payload for MIPS Big Endian. - PR #2846: Several optimizations and small fixes for the shell_bind_tcp single payload for MIPS Little Endian. - PR #2847: Adds a null free single shell_bind_tcp payload for MIPS Big Endian. - PR #2849: Fixes the Architecture of the MIPS XOR Byte encoder which we added last year. Also, we've added the new shell/reverse_tcp staged payloads for linux MIPS platforms. You can check the full history on the PR #2881. MIPS is a common architecture on embedded devices and home routers land, so hope all these bunch of fixes and new payloads will make easier for people to evaluate their own exploitability! For sure, this year will be more news related to embedded devices and MIPS exploitation on Metasploit. In the meanwhile, don't forget to check your SerComm based devices: 1) Search for Devices 2) One found, so dump its configuration. 3) Profit! For example, use the information, like the web management credentials, for easy fingerprint. 4) Get your session! Want to try this out for yourself? Get your free Metasploit download now or update your existing installation, and let us know if you have any further questions or comments. Also, don't forget to say thanks to Matt Andreko for his last Metasploit collaboration!
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948632.20/warc/CC-MAIN-20230327123514-20230327153514-00469.warc.gz
CC-MAIN-2023-14
2,943
22
https://www.epiusers.help/t/bulk-delete-unposted-journal-entry-lines/86224
code
Hi. We’re in the process of migrating from E7 to Kinetic. I want to test our bulk import of historical data - and it seems like there is no easy way to bulk delete unposted GL entries in the Journal Entry screen. What would be the easiest way to do this without deleting the lines one at a time? Welcome to the group Howard! This is one of the reasons loading history is strongly discouraged. You will find other gotcha’s along the way. In this case, just post them and then do a reversing entry of that posting.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662588661.65/warc/CC-MAIN-20220525151311-20220525181311-00083.warc.gz
CC-MAIN-2022-21
516
4
https://www.thestudentroom.co.uk/showthread.php?t=7411336
code
1. Is paying back maintenance loan same whether you get loan based on household income or the minimum for eligible students (if that made). after i finish the course and get a degree and I earn certain amount of money, I start repaying? 2. I live with my parents and commute to uni. I didnt know which loan to apply for (like just the minimum one where I can get roughly around £3,597) or one based on household income (which is around 5k-8k i believe). I ended up going for the household income. is there any specific reasons why u should apply for hoisehold income one? or like are there any disadvantages of getting a loan based on household income? 3. I dont know if i will get a lot of money or a little. If i get the money and dont fully use it up in this academic year, what will happen?will i get in trouble?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100523.4/warc/CC-MAIN-20231204020432-20231204050432-00227.warc.gz
CC-MAIN-2023-50
817
3
https://www.catalogueoflife.org/data/source-datasets
code
Taxonomic communities contributing data to COL The data in the current version 2021-11-09 of the COL Checklist have been provided by the resources listed below. Most datasets include one or more sectors that feed into COL and cover all of the world’s species in a particular group of organisms. These result from collaboration and editing by many expert taxonomists, whose names are found in the information for each dataset. A few datasets are listed as containing no species. These contribute to the higher classification for the Catalogue of Life. A detailed summary of sources and their changes to previous releases is available in Checklist Bank.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362589.37/warc/CC-MAIN-20211203030522-20211203060522-00332.warc.gz
CC-MAIN-2021-49
653
4
https://obsessedwith.ai/chatgpt-is-coming-to-android-and-no-more-as-a-large-language-model/
code
In today’s email: 👾 ChatGPT is coming to Android 😻 GitHub’s Copilot Chat AI feature is now available in the public beta 🗣️ Shopify Employee Breaks NDA To Reveal Firm Quietly Replacing Laid-Off Workers With A 🛠 Various AI-related tools and platforms, including Headshot Pro, PitchYourIdea, Zefi, Alicent, Muah, Mixer, Browser AI, SwiftBrief, Vault GPT, Eden, Stream Chat, Onboard AI, CRUDERRA, Airstrip, Sidenote, and more. ChatGPT coming to Android and no more “As a large language model” [Link] The app will be released next week, but you can pre-order it now in the Google Play Store. GitHub’s Copilot Chat AI feature is now available in public beta [Link] GitHub has announced that its new Copilot Chat feature — a ChatGPT-like experience designed to help developers with coding — is now available as a limited public beta for enterprise companies and organizations. GitHub says the Copilot Chat beta will be available to “all business users” via Microsoft’s Visual Studio and Visual Studio Code apps. AI System Helped Cops Identify a Drug Trafficker Just by Analyzing His Driving Patterns [Link] For years, cops have used license plate reading systems to look out for drivers who might have an expired license or are wanted for prior violations. Now, however, AI integrations seem to be making the tech frighteningly good at identifying other kinds of criminality just by observing driver behavior. Shopify Employee Breaks NDA To Reveal Firm Quietly Replacing Laid-Off Workers With AI [Link][Twitter] Superpower ChatGPT 5.0.0 has been released. 🎉 The most powerful release yet with Prompt Chains, AutoComplete Menu, Quick Sync, and many more features. Editor’s Pick ✨ Rezi AI – The smartest GPT-powered resume builder. [Link] Editor’s Pick ✨ Headshot Pro – Professional corporate headshots, without physical photo shoot [Link] PitchYourIDea – Create a Pitch Deck in 3 Minutes with your Voice [Link] Zefi AI – Analyze feedback, build roadmaps, align stakeholders [Link] Alicent – The All-In-One ChatGPT Toolkit for Busy Folks [Link] Muah AI – Cutting Edge AI Companion [Link] Mixer – Create images by blending together images and text with AI. [Link] Browser AI – Chat with AI in Opera Browser. [Link] SwiftBrief – Create high-quality content briefs in 2 mins [Link][Video] Vault GPT – Your On-Demand Content Assistant [Link] Eden – Your Personal Design Assistant [Link] BlogSEO AI Micro Tools – Free AI-powered micro tools for SEO [Link] AI Form Builder – Turn any text, PDF, or doc into an online form [Link][Video] Stream Chat A.I. – Helping to engage audiences for streamers with an AI twist [Link] Onboard AI – Navigate and understand any repo using GPT [Link] Midjourney Prompt Helper – Prompting made easy with suggestions [Link] CRUDERRA – Platform for AI-powered docs & architecture as code [Link] Airstrip AI – Legal made easier for every startup [Link] Sidenote AI – AI copilot for meeting follow-up [Link] Avocado Growth : IT mentor – Unlock your potential with personalized mentorship [Link] BeeDone – Achieve any goal you want to Bee Done. [Link] BlozumAI – Make an AI assistant for your business in seconds [Link](2 months free trial code: BLZPH) Prompt of the Day 🍭 Tell your friend about us. Share this edition via text, social media, or email. Just copy and paste this link: Hope you enjoyed today’s newsletter
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00150.warc.gz
CC-MAIN-2023-40
3,425
42
https://engineering.buffalo.edu/home/research/faculty/women.host.html/content/shared/engineering/materials-design-innovation/profiles/faculty/yao-fei.detail.publications.html
code
F. Yao, H. M. Li, T. S. Kim, J. B. Jiang, J. H. Park, H. Kim, A. Seabaugh and Y. H. Lee, “Monolayer h-BN as a contact buffer layer for MoS2”, in preparation. F. Yao, D. T. Pham and Y. H. Lee, “Carbon-based materials for lithium ion batteries, electrochemical capacitors and their hybrid devices”, ChemSusChem, vol. 8, no. 14, pp. 2284– 2311, Jul. 2015. (citations: 31) F. Yao, B. Li, K. P. So, J. Chang, T. H. Ly, A. Q. Vu, H. N. Mun, C. S. Cojocaru, H. Y. Yue, S. S. Xie and Y. H. Lee, “Silicon and carbon nanofiber composite as an anode material for lithium ion battery”, Carbon, vol. 79, pp. 563-571, Nov. 2014. F. Yao, F. Gunes, H. Q. Ta, S. M. Lee, S. J. Chae, K. Y. Sheem, C. S. Cojocaru, S. Xie, and Y. H. Lee, “Diffusion mechanism of lithium ion through basal plane of layered graphene”, J. Am. Chem. Soc., vol. 134, no. 20, pp. 8646-8654, Apr. 2012. (citations: 111) F. Yao, D. L. Duong, S. C. Lim, S. B. Yang, H. R. Hwang, W. J. Yu, I. H. Lee, F. Gunes, and Y. H. Lee, “Humidity-assisted selective reactivity between NO2 and SO2 gas on carbon nanotubes”, J. Mat. Chem., vol. 21, no. 12, pp. 4502-4508, Feb. 2011. (citations: 25) F. Yao, S. C. Lim, W. J. Yu, I. H. Lee, F. Gunes, H. R. Hwang, S. B. Yang, K. P. So, G. H. Han, and Y. H. Lee, “AC response to gas exposure in vertically aligned multiwalled carbon nanotube electrode”, J. Phys. Chem. C, vol. 114, no. 8, pp. 3659-3663, Feb. 2010. K. P. So, D. H. Keum, H. Y. Jeong, F. Yao, C. Heo, S. C. Lim, J. C. Jeong, J. G. Park, H. K. Park, Y. H. Choi, C. H. Hong, S. H. Joo, H. S. Kim, H. Kim, J. Won, and Y. H. Lee, “Concomitant enhancement of mechanical strength and ductility of a carbon nanotube/metal composite”, submitted to Nano Lett. C. Chen, J. Avila, H. Arezki, F Yao, V. L. Nguyen, Y. H. Lee, J. Shen, Y. Chen, M. Boutchich, and M. C. Asensio1, “Giant lattice expansion in the commensurate phases of monolayer graphene on copper”, Nat. Mater. under revision. B. Li, H. Nam, J. Zhao, J. Chang, N. Lingappan, F. Yao, T. H. Lee and Y. H. Lee, “Nickle containing carbon nanocapsules for oxygen reduction reaction: Nano-reactor effect and ultra-high stability”, Adv. Mater., 2017, vol. 29, no. 7, pp. 1605083, Dec. 2016. S. Adhikari, D. Perello, C. Biswas, A. Ghosh, N. Luan, J. Park, F. Yao, S. Rotkin, and Y. H. Lee, "Determining Fermi level by absorption quenching of monolayer graphene by charge transfer doping", Nanoscale, vol. 44, no. 8, pp. 8710-18717, Nov. 2016. H. Arezki, M. Boutchich, D. Alamarguy, A. Madouri, J. Alvarez, P. Cabarricas, J. Kleider, F. Yao, and Y. H. Lee, "Electronic properties of embedded graphene: doped amorphous silicon/CVD graphene heterostructures", Journal of Physics-Condensed Mater, vol. 28, no. 40, pp. 404001, Oct. 2016. D. T. Pham, T. H. Lee, D. Luong, F. Yao, A. Ghosh, V. T. Le, T. H. Kim, B. Li, J. Chang, and Y. H. Lee, “Carbon nanotube-bridged graphene 3D building blocks for ultrafast compact supercapacitors”, ACS Nano, vol. 9, no. 2, pp. 2018-2027, Feb. 2015. (citations: 74) J. Chang, S. Adhikari, T. H. Lee, B. Li, F. Yao, D. T. Pham, V. T. Le, and Y. H. Lee, “Leaf vein-inspired nanochannelled graphene film for highly efficient micro-supercapacitors”, Adv. Energy Mater., vol. 5, no. 9, pp. 1500003-1-1500003-8, Feb. 2015. B. Li, F. Yao, J. J. Bae, J. Chang, M. R. Zamfir, D. T. Le, D. T. Pham, H. Yue, and Y. H. Lee, “Hollow carbon nanospheres/silicon/alumina core-shell film as an anode for lithium-ion batteries”, Sci. Rep., vol. 5, no. 7659, pp. 01-07, Jan. 2015. (citations: 26) T. H. Ly, M.-H. Chiu, M.-Y. Li, J. Zhao, M. O. Cichocka, H. M. Oh, S. H. Chae, H. Y. Jeong, F. Yao, L.-J. Li, and Y. H. Lee, “Observing grain boundaries in CVD-grown monolayer transition metal dichalcogenides”, ACS Nano, vol. 8, no. 11, pp. 11401-11408, Nov. 2014. B. Rogez, H. Yang, E. L. Moal, S. Lévêque-Fort, E. Boer-Duchemin, F. Yao, Y. H. Lee, Y. Zhang, D. Wegner, N. Hildebrandt, M. Kociak, A. Mayne, and G. Dujardin, “Fluorescence lifetime and blinking of individual semiconductor nanocrystals on graphene”, J. Phys. Chem. Lett., vol. 118, vol. 32, pp. 18445-18452, Aug. 2014. H. Yue, S. Huang, J. Chang, C. Heo, F. Yao, S. Adhikari, F. Gunes, L. C. Liu, T. H. Lee, E. S. Oh, B. Li, J. Zhang, Q. H. Ta, L. Van Nguyen, and Y. H. Lee, “ZnO nanowire arrays on 3D hierarchical graphene foam: biomarker detection of Parkinson’s disease”, ACS Nano, vol. 8 no. 2, pp. 1639-1646, Feb. 2014. (citations: 86) T. H. Ly, D. L. Duong, Q. H. Ta, F. Yao, Q. A. Vu, H. Y. Jeong, S. H. Chae, and Y. H. Lee, “Nondestructive characterization of graphene defects”, Adv. Func. Mater., vol. 23, no. 41, pp. 5183-5189, Nov. 2013. J. Chang, M. Jin, F. Yao, T. H. Kim, V. T. Le, H. Yue, F. Gunes, B. Li, A. Ghosh, S. Xie, and Y. H. Lee, “Asymmetric supercapacitors based on graphene/MnO2 nanospheres and graphene/MoO3 nanosheets with high energy density”, Adv. Func. Mater. vol. 23, no. 40, pp. 5074-5083, Oct. 2013. (citations: 214) H. T. Nguyen, F. Yao, M. R. Zamfir, C. Biswas, K. P. So, Y. H. Lee, S. M. Kim, S. N. Cha, J. M. Kim, and D. Pribat, “Highly interconnected Si nanowires for improved stability Li-ion battery anodes”, Adv. Energy Mater., vol. 1, no. 6, pp. 1154-1161, Nov. 2011. (citations: 89) F. Güneş, G. H. Han, H.-J. Shin, S. Y. Lee, M. Jin, D. L. Duong, S. J. Chae, E. S. Kim, F. Yao, A. Benayad, J.-Y. Choi, and Y. H. Lee, “UV light-assisted oxidative sp3-hybridization of graphene”, Nano, vol. 6, no. 05, pp. 409-418, Oct. 2011. I. H. Lee, U. J. Kim, H. B. Son, S. M. Yoon, F. Yao, W. J. Yu, D. L. Duong, J. Y. Choi, J. M. Kim, E. H. Lee, and Y. H. Lee, “Hygroscopic effects on AuCl3-doped carbon nanotubes”, J. Phys. Chem. C, vol. 114, no. 26, pp. 11618-11622, Jun. 2010. (citations: 24)
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711121.31/warc/CC-MAIN-20221206225143-20221207015143-00481.warc.gz
CC-MAIN-2022-49
5,787
22
http://www.devexpress.com/Support/Center/Question/Details/Q454025
code
This is great news! I'm glad to hear that it works faster for you now. However, we are going to look into our Unit Test Runner service and see why it took a lot of time to process a solution. And just a quick note for everyone experiencing this issue: If a solution build process takes longer than expected, try to disable the Unit Test Service and see if it makes a difference. The Unit Test Service is configurable on the Unit Testing | Test Runner option page (Enable Unit Tests Service) in the CodeRush Options Dialog (accessible via the DevExpress menu). Is your intention to post an answer to your own question? - If so, then proceed. - If you simply wanted to post additional information, ask for further clarification, or to just say "Thanks!", please click Leave a Comment. - If you wish to edit your original question, please use the Edit button in the Toolbox at the top right corner of that entry.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609523429.20/warc/CC-MAIN-20140416005203-00468-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
909
7
http://programming-homework-help30368.thezenweb.com/A-Review-Of-programming-homework-help-15507550
code
Sharing the subject within your thesis with a pal or simply a colleague is a fantastical plan. No paper grader may be as trustworthy as an acquaintance. In addition to, in the process of crafting, you are able to frequently wander off and overlook The purpose. You may have to have an anchor to maintain you ashore. You could potentially Choose a paper rater, but I recommend You furthermore may get this selection into account. By way of example, when I proofread my essay, I choose to share that point with somebody else. Arrays can get replaced by maps or random obtain lists, which confess purely functional implementation, but have logarithmic entry and update periods. As a result, purely practical details buildings can be employed in non-practical languages, However they is probably not quite possibly the most productive Software, particularly when persistence is just not required. The continuous and incremental processing of occasion streams from many resources based upon declarative query and pattern requirements with around-zero latency. An Procedure that saves all changes to databases, cubes, or dimensions created considering the fact that the start of the transaction. A method on a domain service which is subjected to a consumer software. It enables client applications to conduct an motion over the entity which include, query, update, insert, or delete information. You don’t really need to reread The person internet pages for PHP, Apache, and what ever else you insert for the stack. Though the LAMP technology has distinct config data files for almost everything, Node.js avoids that go to website difficulty altogether. Getting every little thing in a single layer suggests much less confusion and fewer prospect of strange bugs produced by weird interactions in between multiple layers. Should you’re definitely stumped for programming Thoughts, test producing something generic similar to a to-do record manager. A ailment whereby partitioned tables and indexes are partitioned As outlined by equivalent partition try these out functions. A way for analyzing dependencies in observations taken sequentially in time, that also supports multiplicative seasonality. A rule that relates to fill colours for polygons, traces, and markers that represent points or polygon Middle factors. Common patterns of recursion is often factored out utilizing greater get capabilities, with catamorphisms and anamorphisms (or "folds" and "unfolds") currently being the most obvious examples. This kind of increased buy functions Enjoy a job analogous to crafted-in control buildings for instance loops in very important languages. I put this application on the general public my sources generate and named it “porno.scr”, after which you can waited for other students to run it. The number of detachable backup media utilized following the Original medium results in being total, allowing for continuation in the backup Procedure.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584332824.92/warc/CC-MAIN-20190123130602-20190123152602-00081.warc.gz
CC-MAIN-2019-04
2,952
13
https://flatmates.com.au/F3274942
code
Hi! I'm Alberto, I'm 25 years old, I come from Italy and I'm currently doing my PhD in Chemical Engineering. I will work at The University of Queensland from May to November 2022 for my PhD research period in Australia and I'm looking for an accomodation during these months. I'm a friendly person, but I also like to have my own space when I am at home after work. My hobbies include sport and work out, reading, hanging out and travel (I hope to do some trekkings to explore the Australian wilderness). I'm looking for a single room (preferrably with its own bathroom) in St. Lucia near the University.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103337962.22/warc/CC-MAIN-20220627164834-20220627194834-00410.warc.gz
CC-MAIN-2022-27
604
1
https://en.m.wikivoyage.org/wiki/User:Renek78
code
|Babel user information| |Users by language| I am just an average guy who is fascinated by all crowdsourcing projects on the internet. I try to support as much as time allows - especially on OpenStreetMap and Wikivoyage. My helpful toolsEdit - Wikivoyage Districtifier - Quick creation of district and region overview maps. - Mapmask <-> GeoJSON Converter - A script which converts GeoJSON to Mapmask and vice versa. - Wikidata Extractor - Quick creation of district summaries. Here is an example of what this tool can do. Manual creation of district overview mapsEdit Some additional explanation In short there are two options to create a district overview map: - 1a. geojson.io only - Go to geojson.io, draw the lines/polygons, give them the desired color and title. Copy the GeoJSON file and proceed to step 2. A certain disadvantage with this solution is, that you cannot merge nodes. So if you have 2 polygons right next to each other, they won't be perfectly aligned. With the solution in 1b this problem is nonexistent. - 1b. JOSM & geojson.io (shown in the video above) - Use JOSM to draw polygons as desired and export as .geojson. Important: The export of polygons to .geojson only works as expected in JOSM, if the polygons have a describing tag assigned to it, which is normally applied to an area (e.g. landuse=residential)! You can assign the title tag to each polygon/line right in JOSM, if you don't want to do it in geojson.io (e.g. title=[[Amsterdam/Noord|Noord]]). - 2. Upload to Commons - Create a new map in Wikimedia Commons and paste in the GeoJSON created in 1. - 3. Create mapmasks - In order to grey out the irrelevant parts of a district article map you can paste the GeoJSON from 2. into the tool Mapmask <-> GeoJSON Converter to create the mapmask code. My current projectsEdit - Rio de Janeiro - Rework the See and Do sections. Maybe best is to archive the current text and start from scratch. Link to district listings as described here. - Rome - Dynamic map of Rome with self-made map in CommonsWikidata items. - Tokyo - Draw Harajuku, Ōimachi, Gotanda, Asakusa, Ebisuand Ueno. Either directly in OSM or upload GeoJSON to Commons. - Slovakia - Copy map with Wikidata items to discussion section of Slovakia & 3 subarticles. Bangkok - Dynamic map of Bangkok with self-made map in Commons.- San Francisco - Dynamic map of San Francisco with self-made map in Commons.- Lisbon - Dynamic map of Lisbon with Wikidata items.- Budapest - Article of Budapest/South Pest and Budapest/East Pest still have to be created.- Berlin - Clean-up overview article. Remove specific listings or link to district article.- Tokyo - Dynamic map of Tokyo with Wikidata items.- Copenhagen - Dynamic map of Copenhagen with self-made map in Commons.- Buenos Aires - New setup of districts, which makes more sense for travellers.- Delhi - Dynamic map of Delhi with Wikidata items. Sync with OSM ongoing currently.- Madrid - Dynamic map of Madrid with self-made map in Commons & Wikidata items.- Beijing - Dynamic map of Beijing with Wikidata items. Keep static maps.- Prague - Dynamic map of Prague with Wikidata items.- Milan - Dynamic map of Milan with self-made map in Commons.- Singapore - Dynamic map of Singapore with self-made map in Commons.- Saint Petersburg - Dynamic map of Saint Petersburg with self-made map in Commons.- Seoul - Dynamic map of Seoul with Wikidata items- Dubai - Dynamic map of Dubai with self-made map in Commons.- Munich - Dynamic map of Munich with self-made map in Commons.- Moscow - Dynamic map of Moscow with self-made map in Commons- Saved on the talk page. Up to the community to use it or not. Barcelona - Dynamic map of Barcelona with Wikidata items- Amsterdam - Dynamic map of Amsterdam with self-made map in Commons- Hamburg - Dynamic map of Hamburg with Wikidata items- Kuala Lumpur - New setup of districts, which makes more sense for travellers. Creation of dynamic map-
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739046.14/warc/CC-MAIN-20200813132415-20200813162415-00534.warc.gz
CC-MAIN-2020-34
3,919
26
https://manuals.gfi.com/en/kerio/connect/content/server-configuration/managing-logs-in-kerio-connect-1126.html
code
Managing logs in Kerio Connect Logs are files where Kerio Connect records information about certain events, for example, error and warning reports and debugging information. Each item represents one row starting with a timestamp (date and time of the event). Messages in logs are displayed in English for every language version of Kerio Connect. See the section Types of logs for detailed information about each log. Logs are available in the Kerio Connect administration interface in the section Logs. When you right-click in a log area, you can configure the following settings (available in all logs): You can save whole logs or a selected part in a You can highlight any part of text in logs for better reference. Specify a substring or regular expressionEnables to define a sequence of characters that specify a search pattern. and all rows containing such text will be highlighted. You can configure regular saves of individual logs, specifying the size and number of saved files. You can also enable external logging to a Syslog server. Information about log settings are recorded in the Config log. The default location of the log files varies by platform: - Windows — - Mac OS X — - Linux — The Config log keeps complete history of configuration changes. It tells you which user performed individual administration tasks and when. The Debug log monitors various kinds of information and is used for problem-solving. You can select which information it displays. - Right-click in the log window and click Messages. - Select any option you want to monitor. - Click OK. Too much information can be confusing and slows Kerio Connect's performance. Switch off the logging if you solve your problem. The Mail log contains information about individual messages processed by Kerio Connect. The Security log contains information related to Kerio Connect's security. It also contains records about all messages that failed to be delivered. The Warning log displays warning messages about errors of little significance. Events causing display of warning messages in this log do not greatly affect Kerio Connect's operation. However, they can , indicate certain (or possible) problems. For example, the Warning log can help if a users complain that certain services are not working. The Operations log gathers information about removed and moved items (folders, messages, contacts, events, tasks and notes) in user mailboxes. It is helpful especially if a user cannot find a particular message in their mailbox. The Error log displays errors of great significance that usually affect the mailserver's operation (in contrast to the Warning log). Typical error messages displayed in the Error log concern service initiation (usually due to port conflicts), disk space allocation, antivirus check initialization, improper authentication of users, and so on. The Spam log displays information about all spam emails stored (or marked) in Kerio Connect. New in Kerio Connect 9! The Audit log displays information about all successful authentication attempts to Kerio Connect accounts, including Kerio Connect Administration, Kerio Connect Client, Microsoft Outlook with KOFF, etc.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510300.41/warc/CC-MAIN-20230927135227-20230927165227-00338.warc.gz
CC-MAIN-2023-40
3,177
32
http://docs.aws.amazon.com/amazondynamodb/latest/APIReference/API_Tag.html
code
Describes a tag. A tag is a key-value pair. You can add up to 50 tags to a single DynamoDB table. AWS-assigned tag names and values are automatically assigned the aws: prefix, which the user cannot assign. AWS-assigned tag names do not count towards the tag limit of 50. User-assigned tag names have the prefix user: in the Cost Allocation Report. You cannot backdate the application of a tag. For an overview on tagging DynamoDB resources, see Tagging for DynamoDB in the Amazon DynamoDB Developer Guide. In the following list, the required parameters are described first. The key of the tag.Tag keys are case sensitive. Each DynamoDB table can only have up to one tag with the same key. If you try to add an existing tag (same key), the existing tag value will be updated to the new value. Length Constraints: Minimum length of 1. Maximum length of 128. The value of the tag. Tag values are case-sensitive and can be null. Length Constraints: Minimum length of 0. Maximum length of 256. For more information about using this API in one of the language-specific AWS SDKs, see the following:
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190181.34/warc/CC-MAIN-20170322212950-00051-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,091
9
https://jones-casey.livejournal.com/789434.html
code
a paradox is always the result of faulty assumptions. the amount of time and space wasted on the discussion of newcomb's "paradox" is mind-boggling. please to be defining your parameters completely. of course, choosing the term "predictor", was the (intentional?) source of the confusion. there is no such thing as an infallible "predictor" because inherent in the word prediction is the possibility of being incorrect. someone who knows what is going to happen, and truthfully states that, is not "predicting", they are simply stating a fact. there is nothing in this problem to debate, and frankly it's rather sad that so many "intelligent" people think there is.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584567.81/warc/CC-MAIN-20211016105157-20211016135157-00656.warc.gz
CC-MAIN-2021-43
665
6
https://community.notepad-plus-plus.org/topic/14260/cr-line-terminators-are-pasting-as-crlf
code
CR line terminators are pasting as CRLF This might be a bug, but if I create a text file in Notepad++, then do a replace of all the CRLF line terminators with CR I end up with a file that looks like If I then copy this text and paste it back into the same document I get The text in the clipboard seems to be just the <CR>, so why when I paste it back do I get <CR><LF>? There’s something in the Paste mechanism that examines the line-ending setting for the current file–see the status bar area where it says “Windows (CR LF)” or “Unix (LF)”–and converts anything that looks like a line-ending to THAT format at the time of the pasting. As far as I am concerned this is the desired behavior. Line ending style is a property of a file. A file should never have mixed different line endings. Copying text (code segments) between files with different endings is common and the fact that Notepad++ converts the line endings according to the destination file style is good. I do agree this is usually the desired behavior. I often copy/paste from various sources and would hate to have all the line endings mixed up. That said, there is a way to turn it off. You’d need to install a plugin such as LuaScript or PythonScript so that you can call SCI_SETPASTECONVERTENDINGS and set it to
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00615.warc.gz
CC-MAIN-2023-50
1,296
10
https://blogs.msdn.microsoft.com/tzink/2012/03/16/the-pros-and-cons-of-graylisting/
code
Graylisting is an antispam technique that works by taking advantage of sender reputation. Specifically, the lack of a good or bad reputation gives the sender a chance to prove themselves worthy of delivery. The basic idea is that a good sender will go to the trouble of demonstrating themselves legitimate, whereas a spammer will not. In graylisting, whenever an incoming email connection is received, the receiver takes a look to see if they have have ever seen email from this IP address before. If not, it issues a 4xx (e.g., 451) level error in SMTP. This is a temporary rejection which tells the sender to retry later (as opposed to a 5xx response which is a permanent rejection). Email servers usually issue 4xx level errors when they are having temporary local problems, but spam fighters have discovered that this is a useful spam technique. The reason is that a legitimate mail server will interpret the 4xx error as a legitimate error. The receiver wants to accept the message but can’t. Therefore, since the email it wants to deliver is important, it will continue to attempt to deliver the message in a little while. How long is a little while? It depends on the software; some do it in 2 minutes, others in 5 minutes, still others in 30 minutes. By contrast, a spammer sending mails from a botnet is concerned with sending as much mail as possible in as small a window as possible. He doesn’t have time resend messages. He’s better off just spamming as much as he can and ignoring errors, based upon the belief that most will get through. Spammers don’t bother retrying because they don’t have time. Most mail servers improve on this performance by implementing blacklists and whitelists. If the sending IP is on a blacklist they issue a 5xx SMTP response (permanent rejection). If it’s on a whitelist or I’ve-seen-mail-from-this-IP-before list, they accept the message. Then, for IPs with no previous sending history, they issue the 4xx response. If the IP tries again, it’s added to the I’ve-seen-mail-from-this-IP-before list and subsequent emails from this IP do not receive the temporary errors. People who have implemented graylisting (greylisting?) have had success with it. For the most part, spammers don’t retry and it cuts down most of the load from the downstream content filter. it works pretty well. But graylisting has a serious drawback – it doesn’t work as well in distributed mail environments. For example, our own service is a geodistributed service. We have data centers (DCs) in Chicago, Texas, Virginia, Dublin and Amsterdam. If someone sends email to one of our clients, the email can be routed to any one of those depending on how much traffic we route through each DC. If we were to implement graylisting, the knowledge of who has sent to the server must be recorded and distributed across the rest of the network. In the above example, the mail receiver keeps track of who has sent it mail by writing to a local file and then comparing each subsequent inbound email against this local list. In a geodistributed environment, just because a new IP has not been seen by that mail server does not mean it hasn’t been seen by a server somewhere else: (Note: this example is hypothetical and is not necessarily representative of our own network, I merely refer to the use of “our” network for convenience). You can see in this example that each server in each data center may be keeping track of who has sent it mail before. But unless the sender retries and happens to send luckily send it to the same recipient they sent it to the first time (and that is controlled by a load balancer, not by the sender), they will receive another Temporary Reject even though they have sent the message once before. The solution for this is that all of the servers in the data center must share IP history with each other. And each data center must share IP history with the other data centers. In order for that to happen: - Each mail server must log its data. - Every once in a while, a process must collect these logs and pull it to a central repository for processing. - These logs must be parsed and compared against previous lists, and new additions updated to the central master list. - These lists must then be replicated back to the mail servers in every data center. This process isn’t that complicated, it’s what we do to generate our internal IP blocklists (we have our own in addition to 3rd party ones). The difficulty is doing this in real time. It takes time to pulls hundreds of thousands of log lines and process them, and then push them back to the mail servers. Data transfer is often the chokepoint (not to mention for some reason this process breaks down from time to time). What’s the big deal? Aren’t we already doing this with our IP blacklists? Yes we are, but blacklists don’t have to be updated in super-fast real time. Even if the IP filter isn’t updated super fast, we still have the content filter as a backup plan. We also have 3rd party lists that catch this spamming IPs and serve as another redundant back up. Thus, to the end user, the spam stays out of his inbox either through an IP blocklist, or by the content filter (and it ends up in his spam folder in the quarantine). With graylisting, this pull-process-push must occur within the retry window of the sending mail server. How long between retries do most mail servers take? I don’t know, but if it’s 2-5 minutes, that’s faster than we can pull, process and push data across a geodistributed network. Worse, there’s no backup for good mail the way there is bad mail. While graylisting works for spam, a good mail server could end up retrying for a long time while the network catches up. This amounts to a whole lot of false positives because a good mail server will not be able to send mail through and it will not arrive at its correct destination. Good IP reputation lists must be built faster than bad IP reputation lists. Mail servers that continually reject good mail have bad reputations on the Internet. People on discussion lists say “Argh, what is <Company X’s> problem?” And then customers of Company X start complaining that their partners can’t consistently send mail to them. And if the lists are continually updated and removed, the whole cycle would start all over again. You may say “So what? How many good mail servers are there? You’d have them sorted out in a week.” Not so. That only works if we have one customer to worry about. But we don’t; we have tens (hundreds) of thousands and we don’t know who they all communicate with. There’s no way we can predict it, either. And unlike spam, there’s no workaround. A customer that doesn’t receive his email in a timely fashion because of a latent whitelist doesn’t get it via some other means. Thus, while graylisting is a technique that works well on a small level, it is less workable on a large scale if a service is geodistributed and trying to build a reputation list on the fly.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201953.19/warc/CC-MAIN-20190319093341-20190319115341-00105.warc.gz
CC-MAIN-2019-13
7,042
25
https://discuss.linuxcontainers.org/t/lxd-manage-gui-need/10408
code
Need suggetion foR a smart GUI. Where I can manage Standalone OR cluster LXD. Thanks in advance. Ill promote my own LXDMosaic It can manage standalone & clusters among other things (user restrictions, VM GUI access, backups & metrics) There are others but im not sure how they compare! I have installed mosaic in a container. But when I am going add lxd server in mosaic it show this message Can’t connect to x.x.x.x is lxd running and the port open? /var/www/LxdMosaic/src/classes/Tools/Hosts/AddHosts.php 93 N.B: I have run those command in my lxd server lxc config set core.https_address [::] lxc config set core.trust_password Open1234 are you using a macvlan network? On macvlan’s containers cant access the host so that configuration wont work! Instead you could also install with snap on your host along side If I create a container without macvlan then I can access LXD server? If i can then can operate macvlans container also? Yep that will work But containers dynamic IP I cant access from network. What can I do? Suppose my pc IP : 192.168.1.2 LXD IP: 192.168.1.3 But mosaic container’s shows this IP : https://10.84.149.243 Now how can I access mosaic web from my PC? You could use a proxy device to map the ports needed to access LXDMosaic On the host with the LXDMosaic container (replace LXDMOSAIC_CONTAINER with your container name) lxc config device add LXDMOSAIC_CONTAINER lxdMosaicHttps proxy listen=tcp:0.0.0.0:443 connect=tcp:127.0.0.1:443 Then in your browser you could go https://192.168.1.3 (im fairly certain that’s all the ports you need, I haven’t tested this setup) I want to backup all container from GUI but it shows this error This is an issue when running backups manually, it has been fixed (here) but is yet to be released. You can schedule a backup to work around the issue or will have to wait for next version (this week or next) I can take backup by script in a remote mount point .But those backup does not show in Mosaic. Ok wait for release. Thnx LXDMosaic wont be able to manage backups created by a script, instead it can do the scheduling of the backups for you! Then where the location to schedule backup store? /root ? You can change the backup location here: LXDMosaic Settings -> If you are using snap you can’t change the backup location! I have install lxd on ubuntu 20.04 . I think it is by default snap lxd and I can change Backup directory. How? Sorry, it doesnt matter which LXD version is matters which LXDMosaic version you use! Container move work as copy command in ur GUI. But when I am move by command from terminal container full move Does it show an error? To avoid cluttering the forums, can you start opening questions / issues on Github?
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056120.36/warc/CC-MAIN-20210918002951-20210918032951-00045.warc.gz
CC-MAIN-2021-39
2,715
38
https://support.simplymichigan.co/articles/104304-how-do-i-update-the-software-andor-maps
code
How do I update the software and/or maps? Updating the software and/or maps on your APIM module is easy and free. Head on over to cyanlabs.net and download their program (windows only, if you are using a Mac you can use bootcamp or parallels to run Windows) and go through the steps as prompted. It will download and install the needed files onto a flash drive for you, then all that you will need to do is insert it into your vehicle and wait about 15 minutes (non-navigation) or 25 minutes (navigation) for it to install. You'll want at least a 16GB flash drive to do this and you'll need to erase it before starting (via the program).
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00202.warc.gz
CC-MAIN-2023-14
637
2
https://www.blackhatworld.com/seo/best-way-to-promote-infographs.380018/
code
What's the best ways to distribute an infographic over the internet to generate links and traffic. Obviously pushing it through social sites is a way for traffic and asking niche bloggers to post it. Does anyone have a list of infographic sites that can publish it? Any ideas are welcome. Cheers.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742338.13/warc/CC-MAIN-20181115013218-20181115034451-00031.warc.gz
CC-MAIN-2018-47
296
1
https://forums.techguy.org/tags/plex/
code
I'm trying to build a PC server mainly for PMS (Plex Media Server). I don't really know how it gonna works but whatever it is, I need to have the PC build first. I have tried looking for NAS, supported system are over my budget. So here I'm asking for build suggestion that cost 250USD... This is a re-post from Reddit where no one seems to want to help. Surface Pro 3 Processor: Intel(R) Core(TM) i5-4300U CPU @ 1.90GHz Video Card: Intel(R) HD Graphics Family RAM: 8.0 GB Description of problem My computer recently has started either...
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738816.7/warc/CC-MAIN-20200811150134-20200811180134-00258.warc.gz
CC-MAIN-2020-34
538
10
https://dotnet-app-modernization.workshop.aws/0-prerequisites.html
code
You can either run all the labs on your own computer or use provided remote Windows VM with all software preinstalled. All required software is preinstalled on the provided remote VM. If you are going to do the labs on your own computer, you will need the following software installed: The labs can be executed either on Windows or Mac. You have to have all these tools installed in order to complete the labs.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988793.99/warc/CC-MAIN-20210507120655-20210507150655-00084.warc.gz
CC-MAIN-2021-21
410
5
https://infoscience.epfl.ch/record/176287
code
Early Cell Death Detection with Digital Holographic Microscopy Background: Digital holography provides a non-invasive measurement of the quantitative phase shifts induced by cells in culture, which can be related to cell volume changes. It has been shown previously that regulation of cell volume, in particular as it relates to ionic homeostasis, is crucially involved in the activation/inactivation of the cell death processes. We thus present here an application of digital holographic microscopy (DHM) dedicated to early and label-free detection of cell death. Record created on 2012-04-19, modified on 2016-08-09
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189589.37/warc/CC-MAIN-20170322212949-00616-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
617
3
https://community.intel.com/t5/Nios-II-Embedded-Design-Suite/Problem-with-get-linux-kernel-source/td-p/141856
code
I have got problems with “git clone … linux-socfpga.git”. The script, git_clone.sh is with Altera 14.0 as follows. # !/bin/bash -ex git clone http://git.rocketboards.org/linux-socfpga.git pushd linux-socfpga && git checkout -t -b socfpga-3.13-rel14.0 origin/socfpga-3.13-rel14.0 && popd When I run this script ./git_clone.sh from an Altera embedded command shell, it never finishes although I have bypassed the company proxy. Therefore, I can’t get the source code of Linux Kernel. I can’t carry on those examples related to Linux Kernel. Is there anything wrong with the script? Is there any other problem? Please help. Thanks
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153966.60/warc/CC-MAIN-20210730122926-20210730152926-00159.warc.gz
CC-MAIN-2021-31
637
2
https://www.gastonsanchez.com/R-coding-basics/input-output.html
code
This part of the book is dedicated to describe the various mechanisms available in R to import and export “data” and other “resources”. Here I’m using the term “resources” in an informal sense to refer to various types of files such as script files, binary files, text files, image files, and things like that. Likewise, I’m using the term “data” in a loosely way to indicate R data objects (e.g. vectors, arrays, lists, data-frames), graphics, code, as well as content of any kind of file. You should know upfront that there’s a wide range of ways and options to import/export “data” in R. To go beyond the topics discussed in the book, and to know more about many of the technicalities behind importing and exporting resources in R, the authoritative document to look at is the manual R Data Import/Export available at: 19.1 Importing and Exporting Resources R has a large number of functions and packages to import and to export a wide variety of resources and files (e.g. script files, binary files, text files, image files). In the following figure, I’m depicting a conceptual diagram to show a couple of common examples for importing and exporting some resources. Perhaps the most common type of importing operation is when we have some data table that we want to read in. For instance, we may have a data file called table.csv, located in our session’s working directory. Assuming that the format of this file is a comma-separated-value (CSV), we could try to import it in R with the help of the # hypothetical data-table importing example = read.csv(file = "table.csv")dat Likewise, we could have one or more functions in an R script file called script.R that we want to import. Assuming that this file is also in our session’s working directory, we could use the function source() to source-in # hypothetical R-script importing example source(file = "script.R") What about exporting resources from R to some external resource? For example, consider a typical situation in which we have a data object, say a data frame, tbl that we want to export into a text file. To be more precise, say we want to export the data frame tbl to a CSV file called output.csv to be located in our session’s directory. In this case, we may want to use the # hypothetical data-table exporting example write.csv(x = tbl, file = "output.csv") 19.1.1 Behind import/export functions Before I tell you more about some of the common—and not so common—import and export operations available in R, I first need to take you down a rabbit hole to explain some technicalities behind the related functions for importing and exporting resources in R. When importing information from an external file, we need to use a certain data-import function, e.g. scan(), etc. As you might expect, each data-import function has specific arguments that let you choose further options for how R should handle this task. Despite their different arguments, all these functions have one thing in common which is the mandatory argument: the name of the input file. The same thing can be said about the data-export functions such as png(), etc. Even though each of these functions differs in its structure and arguments, they all have one thing in common: the mandatory argument consisting of the name of the output file. The figure below illustrates both types of generic situations: importing from an input file, and exporting to an output file. In this diagram, I’m using export() as generic labels for data-import and As I said, the primary argument to the import and export functions is the “name” of the external file. Here the term “name” refers to the file path. In other words, the “name” is not just the name of the file but also its location on the file-system where the file is located. The external file can be located in your computer or somewhere else, like in the “cloud”, which at the end of the day it’s going to be another computer remotely located. Another thing to notice in the diagram has to do with the so-called connections. What I’m trying to indicate in the diagram is that all import and export functions use—under the hood—an internal which plays a fundamental role in this type of operations. What is a connection? Let’s find out. In order for R to be able to import external resources (e.g. data files, script files, image files), it needs to have a way to communicate with the outside world. The same applies to any resource-exporting activity: R needs to open its doors to let resources enter and exit its territory. The mechanism used by R to establish channels of communication with the outside world is given by the so-called connections. To explain this concept let me give you an analogy. In this analogy I’m going to play the role of R. My family, friends, coworkers and students will play the generic role of resources. For example, if I want to communicate with my teaching assistants (TA), I need a mechanism to reach out to them. One way to communicate with my TAs could be talking to them in-person. Another way of communication could be via email (or old-fashion mail). Another possibility may involve me sending them a text-message, or maybe calling them by phone. In summary, there are several ways for me to connect with my TAs. This is precisely the main idea behind R connections. Formally speaking, a connection is the mechanism used by R to establish a line of communication to external resources or files. Technically, connections are implemented by a set of functions, such as gzfile()—to mention but a few—that allow us to create, open and close connections. You can find more information about these functions in their help Let’s go back to my analogy. Say I want to reach out to one of my teaching assistants, and I decide to communicate with a text message sent from my cellphone. In this case we can say that the connection consists of sending a text message. If you think about this exporting operation I need to: use a text-messaging application; this would be the equivalent of an specify the phone number to which my message will be sent; this would be the equivalent of the file path write the content of the message; this would be the equivalent of the “data” to be exported Now, the text-messaging application will take the phone number and “do its magic” to send my message. This “magical” part is the equivalent of the internal connection function. It turns out that you rarely need to explicitly call any of the connection functions in R. If you were using other programming languages, chances are you may very well need to explicitly call a connection function (or its equivalent) to tell the program the kind of operation that you want to perform: for instance open a file in reading mode, or open a file in writing mode, or closing a file. Most of the time in R, though, we don’t need to specify this kind of low-level communication. So why bother talking about connections? I just want you to know that behind any function that allows you to import from a file, and export to a file, there is a connection function. Typically you don’t need to do anything with these internal functions. But if you want or need to take full control over all the details in an importing/exporting operation, connection functions are there for you.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00784.warc.gz
CC-MAIN-2023-23
7,349
62
https://www.macupdate.com/app/mac/52843/paranoia-text-encryption
code
Paranoia Text Encryption is the universal text encryption application. It can encrypt messages, notes, and more! Keeps your messages (sms, emails, social networking, ...), notes and other texts safe from prying eyes. Provides real security - data is encrypted using strong encryption algorithms: Blowfish 448bit, AES 256bit, RC6 256bit, Serpent 256bit, Twofish 256bit, GOST 256bit (+ Threefish 1024bit and SHACAL-2 512bit for PRO Version) ciphers are available. P.T.E. app does not work as a "Vault application". A password is not set to enter the application, but is set for the current encryption/decryption session. You can have an unlimited number of passwords for any purposes (notes, emails, communication with persons A B C, ...). Just copy/paste to/from your favorite applications. Steganography: The Text Encryptor contains a steganographic feature (concealing a text within an image - JPG). A steganographic algorithm (F5 algorithm) is used in combination with chosen symmetric cipher algorithm to make a final steganogram (JPEG image). Fully compatible with Paranoia Text Encryption for iOS (iPhone/iPad/iPod) and Secret Space Encryptor for Android. A free cross platform desktop version (OS X, Windows, Linux, ...) is available on the application home page. An online (web-based) version of the Text Encryptor (AES, client-side) is available on: https://pteo.paranoiaworks.mobi What's new in Paranoia Text Encryption Release notes were unavailable when this listing was updated. Try our new feature and write a detailed review about Paranoia Text Encryption. All reviews will be posted soon.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153897.89/warc/CC-MAIN-20210729203133-20210729233133-00093.warc.gz
CC-MAIN-2021-31
1,603
11
https://veronikaharbachova.netlify.app/
code
My layouts look and work great on any screen size. Easy to understand and navigate user interface (UI/UX). I aim for the shortest loading times for my projects. Designed to function properly with assistive technologies and ensure usability for every visitor. A web app for expressing appreciation to Covid-19 pandemic frontline workers. User-uploaded image with a thank you message is displayed in a popup modal. A collaborative project. A movie web app that requests users to create their personal account to be able to search info on movies, genres, directors and to save favourite movies to their account. A chat application for mobile devices (Android and iOS) that provides users with a chat interface and the possibility to exchange text messages, images and share their location. Yes, the very website you are currently looking at. It is written in pure HTML and CSS with a touch of JS. I itentionally didn't use any framework or library for it. A progressive web application (PWA) which means it works on any platform. The app uses the Meetup API to fetch upcoming events for a selected city. A jQuery app that allows to search through Rijkmuseum art collection API and displays detailed art piece description in a pop-up modal.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818835.29/warc/CC-MAIN-20240423223805-20240424013805-00747.warc.gz
CC-MAIN-2024-18
1,236
13
http://araya-shiki.blogspot.com/2011/03/openjdk-zerosharkfaq.html
code
openjdk : ZeroSharkFaq What is Zero? Zero is an interpreter-only port of OpenJDK that uses no assembler and therefore can trivially be built on any Linux system. 好多香港人, 到左今時今日仍然堅持繼續用 BN(O) 護照, 某程度上都反映左好多香港人對「 中國化」o既極度恐懼, 驚死自己有朝一日會同垃圾國家變得無分別 . . . BN(O) 護照是1997年 之前在香港出生或歸化的「 真正香港人」才可以申請的 . 1997年 之後那些從中國落來香港破壞香港既有生活方式的中國殖民者同蝗蟲永世都無得攞 . . . BN(O) 護照的確係其中一個用來分辨「 真正香港人」同中國殖民者/蝗蟲的指標 Why was Zero written? At present, OpenJDK only supports three processors: x86, x86-64 and SPARC. Linux distributions, however, typically support many more, and porting OpenJDK to a new platform is a non-trivial task. As an example, after the initial release of OpenJDK, Red Hat sponsored the creation of a PowerPC port. Getting this port to the state where it just worked -- where it could run basic applications very slowly -- required over 10,000 lines of very low-level, system-specific code, of which approximately 1,000 lines were assembler. This took of the order of half a person-year. Porting OpenJDK conventionally to every architecture the distributions wanted to support would have taken a considerable amount of time and resources. Zero -- the zero-assembler port -- was started as an experiment to see if an OpenJDK port could be written without using assembly code, such that it could be built on any Linux system without further porting work. What is Shark? Shark is a just-in-time (JIT) compiler for Zero. Why was Shark written? OpenJDK 's virtual machine relies heavily on JIT compilation for performance. As an interpreter-only port of OpenJDK, Zero is very much slower than vanilla OpenJDK on the same hardware. Shark uses the LLVM compiler infrastructure to JIT compile Java methods without introducing system-specific code. Zero and Shark: a Zero-Assembly Port of OpenJDK What is the Future of Apache Harmony? Apache Harmony loses project manager
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867046.34/warc/CC-MAIN-20180525063346-20180525083346-00489.warc.gz
CC-MAIN-2018-22
2,168
19
https://www.dk.freelancer.com/projects/seo/negative-seo/
code
This was a report to me: There has been negative seo done for your site by somebody. The culprit team is simply doing-> "Searching Cape town property and moving to the search result where your [url removed, login to view] is indexed . Then they are clicking tons on the search results(this is planned and manual strategy)." This led Click per Impression ratio for Cape town property, too low for your site and going downwards. This Click per impression ratio needed to improve. The first person who provides me with a solution which will ensure that I overcome this problem with receive $100. I want to be able to load links.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945855.61/warc/CC-MAIN-20180423070455-20180423090455-00316.warc.gz
CC-MAIN-2018-17
625
6
http://www.tomshardware.com/forum/246325-32-raid-norton-ghost
code
I am looking into getting a raid 0 setup. I will have identical 250gb seagate hdds. The question I have is since raid 0 doesnt have mirroring can I use Norton Ghost or some other software to create a backup hdd image on an external hdd? cjl is right, that will work just fine. The raid0 is done by the bios on the raid controller. It then passes the raid0 drive info to the OS, but the OS only sees it as a normal drive so it will treat it the same as any other disk. It doesn't always work out that way. as soon as your system is setup and backup I would go ahead and try to recover so you don't run into unexpected troubles later on. I essential did the same thing with acronis true image and it didn't work I had to fall back on vista ultimates imaging utility.
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982911825.82/warc/CC-MAIN-20160823200831-00089-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
764
3
https://tfwbrooklyn.com/tag/ab-rollout/
code
Most of the time people working towards a pull up focus on the movement itself and the prime mover (main muscle group used), the back. It’s easy to neglect the secondary muscles that help. This is where pull up purchase clomid 50mg accessory lifts come in.… The Ab Roll out One of the oldest and most known ab exercises is also one of the most overlooked. Using an ab wheel may look easy, but why not try these out don’t be fooled because this exercise is deceivingly difficult! If you have difficulty doing a full ab roll out, start with a modified version of the exercise: The Walk Out - Start in a standing position.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574286.12/warc/CC-MAIN-20190921063658-20190921085658-00292.warc.gz
CC-MAIN-2019-39
625
5
https://xtenlang.atlassian.net/browse/XTENLANG-2563
code
Some closures (in particular those generated by the lowerer to implement at and async) need to capture an lval instead of an rval. When generating code for such closures, the backends need to know whether it is the lval or rval of a variable that is being captured. The proposal is to split the closure environment capture information into two lists: lvals and rvals instead of one and then use that information instead of the asyncInit in the backends. A test case that illustrates the various issues is appended. In particular, in TestValInitUsingAt in the two closures coming from the first set of at statements the lval is captured, but in the two closures coming from the second set of ats the rval is captured.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655891884.11/warc/CC-MAIN-20200707080206-20200707110206-00538.warc.gz
CC-MAIN-2020-29
716
2
https://github.com/vectart
code
Marat Dyatko vectartDeveloper Program Member - xamp 2 Framework for fast and pretty web-development based on XML, XSLT, PHP and MySQL - jSync 1 jQuery plugin for synchronization data between windows and frames - chosen 1 Chosen is a library for making long, unwieldy select boxes more friendly. - smush.py 1 A lossless image optimiser script for displaying images on the Web. It's a Python command-line tool which is an implementation of Yahoo's smush.it service that can be run over whole directories of … Repositories contributed to - LateRoomsGroup/moonraker 30 An easy to use lightweight web testing framework for Node, designed for speed, maintainability and collaboration. - racido/broccoli-manifest 16 HTML5 cache-manifest compilation for broccoli - gabesmed/ember-leaflet 138 Ember + Leaflet = Fun with maps - sir-dunxalot/ember-easy-form-extensions 9 Adds a developer-friendly layer to Ember Easy Form that includes form submission handlers, helpers, components, and integration with ember-validations - dockyard/ember-easy-form 527 Easily build semantic forms in Ember Contributions in the last year 46 total Mar 31, 2014 – Mar 31, 2015 Longest streak 3 days February 16 – February 18 Current streak 0 days Last contributed
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131300472.97/warc/CC-MAIN-20150323172140-00214-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
1,239
14
https://rosdok.uni-rostock.de/resolve/id/rosdok_disshab_0000002842
code
Universität Rostock, 2022 Abstract: The goal of this dissertation is to conceptualize and implement privacy-enhancing algorithms for the transfer of sensitive sensor and context information to the analysis tools of assistance systems. Based on the information needs of the assistance system and the privacy needs of the user, the collected data is aggregated as close as possible to the sensor. If not all information can be processed locally, parts of the analysis are relocated to other computing nodes involved in the processing of the data. doctoral thesis free access
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100290.24/warc/CC-MAIN-20231201151933-20231201181933-00727.warc.gz
CC-MAIN-2023-50
573
3
https://dataedo.com/product/metadata-repository
code
Documentation of all your databases in one shared repository Dataedo holds its metadata in global shared repository. Open SQL database Dataedo repository is in fact plain documented and open SQL Server database installed in your environment. You can read and write data to it. Local and secure Dataedo repository is not cloud based, you set it up in your environment that you control. We don't have access to any metadata you store. It is a secure as you make it. Custom scripts and events SQL Server database based open repository means you can write your own SQL scripts that manipulate metadata or use the ones published by us on our website. Different repositories for different environments You can set up a number of repositories, each for different environment (dev, UAT, live) or version of your system. Each containing a number of connected databases. Use scripts or interfaces to copy between repositories. Metadata interface - import metadata from other sources Planned You can use repository database interfacing tables and import procedure to import or migrate metadata (database schema, descriptions, etc.) from external sources - Excel files, data modeling tools, legacy systems.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510697.51/warc/CC-MAIN-20230930145921-20230930175921-00698.warc.gz
CC-MAIN-2023-40
1,194
12
https://sasi-kumar.com/tutorials/adobe-xd-tutorials/how-to-link-external-google-sheet-database-to-adobe-xd-tutorial/
code
🔥Premium Tutorials : 🔥 ⭐⭐ Udemy : https://bit.ly/3bJiajg⭐⭐ ⭐⭐ Patreon: https://www.patreon.com/digitalartcreation ⭐⭐ 🔥🔥Our Shop : https://digitalartcreation.shop/🔥🔥 Hi Guys!, In this short tips I show you guys how to link external google sheet file with adobe xd. With this you can populate the XD Text and images dynamically. You can also use this to create different language designs as well. You will also learn how to use google drive has a image hosting service and using google drive how to use image urls in websites has well. If you like these videos , Please visit my YouTube channel If you like Please subscribe to my you tube channel for new updates and more.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945168.36/warc/CC-MAIN-20230323132026-20230323162026-00142.warc.gz
CC-MAIN-2023-14
704
7