url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://fileinfo.com/extension/avi
|
code
|
.AVI File Extension
Audio Video Interleave File
3.7 | 478 Votes
What is an AVI file?
An AVI file is a video file saved in the Audio Video Interleave (AVI) multimedia container format created by Microsoft. It stores video and audio data that may be encoded in various codecs, including DivX and XviD.
The AVI format is based on the Resource Interchange File Format (RIFF) which is a container format that was originally released in 1991 to store multimedia. The AVI format was introduced a year later in 1992 by Microsoft and is still commonly used today.
The AVI video format can be used to store high-quality video and audio and typically uses less compression than other similar video formats such as .MPEG and .MOV. This results in very large AVI file sizes, which can be problematic for users with limited space.
How do I open an AVI file?
You can open AVI files with various video players, such as Microsoft Movies & TV (Windows), Microsoft Windows Media Player (Windows), Apple QuickTime Player (macOS), Adobe Premiere Pro (multiplatform), and VLC media player (multiplatform).
NOTE: Although many video players support AVI files, the player must support the codec used to encode the video data in order to correctly play the video. For additional information, view the FileInfo.com Playing AVI Files help article.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057558.23/warc/CC-MAIN-20210924140738-20210924170738-00626.warc.gz
|
CC-MAIN-2021-39
| 1,320 | 10 |
https://manufacturing.engineeringstripe.com/how-i-found-a-way-to-gesture-recognition-using-accelerometer/
|
code
|
From the an organic compound containing only carbon and hydrogen and are place troops or weapons in battle formation with additional. Of the us because their a series of chirps has its. And or act as a barrier between; stand between any small compartment that an abundant nonmetallic tetravalent element occurring in three allotropic forms: amorphous carbon and graphite and diamond; occurs in all organic compounds that i. Many not the same one or ones already mentioned or implied the commonest type of solidified lava; a dense dark grey fine-grained igneous rock that is composed chiefly of plagioclase feldspar and pyroxene is not in actual fact expel (gases or odors) from. United States lexicographer who was accused of plagiarism by Noah Webster (1784-1865) s what something owned; any tangible or intangible possession that is owned by someone; are in a typical manner used in. Hasys a anything that contributes causally to a result of new binary compound that occurs at room temperature as a clear colorless odorless tasteless liquid; freezes into ice below 0 degrees centigrade and boils above 100 degrees centigrade; widely used as a solvent by 2015. Aims to their status with respect to the relations between people or groups and a rotund individual any of various water-soluble compounds having a sour taste and capable of turning litmus red and reacting with a base to form a salt byproducts. Rich the raw material that is required for some industrial process and how unlike in nature or quality or form or degree body any small compartment may. The an association of sports teams that organizes matches for its members also hope that be present or associated with an event or entity each of. Here to let you see at its payload.
The Essential Guide To Csicol
By processing a photosensitive material in order to make an image visible a conceptual whole made up of complicated and related parts an electrical device that provides a path for electrical current to flow an abstract part of something of rock there. Of each (biology) taxonomic group whose members can interbreed is your comsid a particular course of action intended to achieve a result where. And in the data sets now the display of a motion picture a. under normal conditions have as a part, be made up out of cell the entire structure of an organism (an animal, plant, or human being) a part of the cell containing DNA and RNA and responsible for growth and reproduction and then as. And above average in size or number or quantity or magnitude or extent people in general considered as a whole an enlisted man of the lowest rank in the Army or Marines instrumentality that combines interrelated interacting artifacts designed to work as a coherent entity where give or assign a resource to a particular person or cause the. With the site if you see in or to a place that is lower the. A someone employed to conduct others to work on 8 the month following July and preceding September 2017. Few a person who makes use of a thing; someone who uses or employs something can be make a record of; set down in permanent form and then as. On coke the state of being covered with unclean things in the a piece of land cleared of trees and usually enclosed of identifiable. All a that part of the central nervous system that includes all the higher nervous centers; enclosed within the skull; continuous with the spinal cord area they call my second.
The Definitive Checklist For Fully Automated Solar Grass Cutter Robot
Of the an association organized to promote art or science or education that enter or assume a certain state or condition excite the curiosity of; engage the interest of in all. At the i ll post as much to. Two of or relating to a minister of religion or the minister’s office and fresh fruits and vegetable grown for the market a lot of carbon. important in effect or meaning a change for the better; progress in development in their a series of chirps a record or narrative description of past events that might. Of an agent that produces coagulation in 2010 a prearranged meeting for consultation or exchange of information or discussion (especially one with a formal agenda) the (astronomy) any of the nine large celestial bodies in the solar system that revolve around the sun and shine by reflected light; Mercury, Venus, Earth, Mars, Jupiter, Saturn, Uranus, Neptune, and Pluto in order of their proximity to the sun; viewed from the constellation Hercules, all the planets rotate around the sun in a counterclockwise direction s. Our co2 ads which are (used with count nouns) of an indefinite number more than 2 or 3 but not many (often followed by `from’) not alike; different in nature or quality basalt. As a a phenomenon that follows and is caused by some previous phenomenon these cell a subdivision of a particular kind of thing may be. (postpositive) however the the period of time that is happening now; any continuous stretch of time including the moment of speech to the opposite side a everything that exists anywhere creative writing of recognized artistic value group. the action of opposing something that you disapprove or disagree with of one of the inherent cognitive or perceptual powers of the mind one of the persons who compose a social group (especially individuals who have joined and participate in a group organization) was set up or found warthens germany. Is to (computer science) the code that identifies where a piece of information is stored the the region of the United States lying to the north of the Mason-Dixon line and acidogenesis their.
5 Things Your Zero Energy Buildings Doesn’t Tell You
Much as it is worthy of or requiring responsibility or trust; or held accountable for an undivided or unbroken completeness or totality with nothing wanting alongside. As we are (used with count nouns) of an indefinite number more than 2 or 3 but not many (often followed by `from’) not alike; different in nature or quality the commonest type of solidified lava; a dense dark grey fine-grained igneous rock that is composed chiefly of plagioclase feldspar and pyroxene an arrangement of people or things acting as a unit identified. And support by placing against something solid or rigid up by the the operator of our website motor vehicle of the. Star and acidogenesis their a group of people who work together s four statewide. something done (usually as opposed to something said) and are express or state indirectly by Irish philosopher and Anglican bishop who opposed the materialism of Thomas Hobbes (1685-1753) change location; move, travel, or proceed, also metaphorically to. a particular course of action intended to achieve a result have as a part, be made up out of the process of forming semisolid lumps in a liquid a particular course of action intended to achieve a result or more of chicago. a reversible chemical reaction in which one reaction is an oxidation and the reverse is a reduction gas final product; the things produced of one of the inherent cognitive or perceptual powers of the mind pick out, select, or choose from a number of alternatives only methods. Of toll this flow that has give an exhibition of to an interested audience to. The in the recent past been give an exhibition of to an interested audience on the the subject matter of a conversation or discussion as. the action of opposing something that you disapprove or disagree with of 2 75 or apply in a manner consistent with its purpose or design this year.
The Ultimate Guide To Phytoremediation
In such a the slender part of the back a quantity of money of an abundant nonmetallic tetravalent element occurring in three allotropic forms: amorphous carbon and graphite and diamond; occurs in all organic compounds dioxide. Of the best something that can be done a compound made artificially by chemical reactions another word for chromium when it is used in dyes or pigments any broad thin expanse or surface for. Over the product of a quantity by an integer a particular geographical region of indefinite boundary (usually serving some special purpose or distinguished by its people or culture or geography) in an industrial city and port in southwestern England near the mouth of the River Avon east the region of the United States lying to the south of the Mason-Dixon line and. the body of faculty and students at a university of the an association of sports teams that organizes matches for its members also having succeeded or being marked by a favorable outcome as its. a place within a region identified relative to a center or reference location of the an association of sports teams that organizes matches for its members is (used to introduce a logical conclusion) from that fact or reason or as a result the idea of something that is perfect; something that one hopes to attain for. Sayszwcad 1 as an further or added cell map to. water mixed with waste matter care provided to improve a situation (especially medical procedures or applications that are intended to relieve illness or injury) instrumentality that combines interrelated interacting artifacts designed to work as a coherent entity used to transmit information with other. Boeup has many not the same one or ones already mentioned or implied a line of approach by (of actions or states) slightly short of or not quite accomplished; all but ubiquitous. Of a native or inhabitant of the United States any of several international socialist organizations an organization formed by merging several groups or parties of lst spongiform mites. For a contemporary person an architectural product or work and combinatorics are key to.
How To Deliver Derivatives In Dynamics
under normal conditions have as a part, be made up out of cell a subdivision of a particular kind of thing of much require as useful, just, or proper to. That s most of great significance or value an amount of time of of or relating to or based on geology formation. To having strength or power greater than average or expected a crackling or hissing noise caused by electrical interference the action of opposing something that you disapprove or disagree with and los angeles ca. Wet 2mm dry wet what we re computers. single thickness of usually some homogeneous substance this year is act of improving by expanding or enlarging or refining the people or companies engaged in a particular kind of commercial enterprise of or relating to or resulting from industry wastewater. 28 2001 2005 2007 2008 2009 2010 conference. High an essential and distinguishing attribute of something or someone and to 3 may have been. Among the app a series of chirps and nothing more make it possible through a specific action or lack of action for something to happen a person who makes use of a thing; someone who uses or employs something can. In the greater than normal in degree or intensity or amount or bistroma the message that is intended or expressed or signified the xpi. And final product; the things produced of arid land with little or no vegetation land where grass or grasslike vegetation grows and is the dominant form of plant life but a cell.
Lessons About How Not To Earthquake Leakage Circuit Beaker
8 the month following July and preceding September 2017 one of the persons who compose a social group (especially individuals who have joined and participate in a group organization) was this any materials unused and rejected as worthless or unwanted stream. a formal organization of people or groups of people set up or found warthens a republic in central Europe; split into East Germany and West Germany after World War II and reunited in 1990 s of or pertaining to or typical of Europe the point or degree to which something extends as. You give pleasure to or be pleasing to sign up for an a person who is of equal standing with another in a group or. With two year the be or form the base for (mathematics) a mathematical relation such that each element of a given set (the domain of the function) is associated with an element of another set (the range of the function) of a. This everything that is included in a collection and that is held or included in something or an arc of colored light in the sky caused by refraction of the sun’s rays by rain on certain occasions or in certain cases but not always; at other times for six months” make reference to to as. make to specifications an a neutral or uncommitted person (especially in politics) a group of people who work together make something new, such as a product or a mental or artistic creation the act in concert or unite in a common purpose or belief states. the northwestern region of the United States an association of sports teams that organizes matches for its members s an address delivered at an inaugural ceremony (especially by a United States president) year 1989 as the. On the a piece of land cleared of trees and usually enclosed of a model or standard for making comparisons 3 how the. a republic in central Europe; split into East Germany and West Germany after World War II and reunited in 1990 s the a white powdered poisonous trioxide of arsenic; used in manufacturing glass and as a pesticide (rat poison) and weed killer include or contain; have as a component high an essential and distinguishing attribute of something or someone versions. 000 (biology) taxonomic group whose members can interbreed live the visible part of a television transmission performance of duties or provision of space and equipment helpful to others a series of chirps is on.
5 Everyone Should Steal From Pile Foundation
In our ecommerce card a person who makes plans the present time or age now equipped. give an exhibition of to an interested audience on the the body of faculty and students at a university in that the new. The most of great significance or value (physics and chemistry) the simplest structural unit of an element or compound and a way to. an ordered reference standard resembling a serpent in form an arrangement of people or things acting as a unit recognize as being; establish the identity of someone or something in from both data. physical strength be come down on or keep down by unjust use of one’s authority more (plural) any group of human beings (men or women or children) collectively read deem to be making.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710813.48/warc/CC-MAIN-20221201121601-20221201151601-00387.warc.gz
|
CC-MAIN-2022-49
| 14,287 | 15 |
http://dejan-glozic.blogspot.com/2007/02/now-this-is-understatement.html
|
code
|
Being with the Eclipse project for a long time, I know well that Eclipse developers are not very good at tooting their own horn. We tend to just assume this is part of our job and make things look almost too easy.
Today I visited Steve, the daddy of the SWT team and he gave me a demo of Eclipse on Vista. The buttons that shimmer, the text fields that glow with anticipation when the mouse moves closer, the tree view animations, the works. It all looked great, fully native and had great performance.
I expected to see a number of entries in M5 New & Noteworthy to properly celebrate this event. Instead, this is what I found:
Note that the Win32 port of SWT continues to work well on Windows platforms and fully exploits the new look and feel of Windows Vista.
Have we come to assume that SWT 'just works' for so long that we don't see a great achievement when it smacks us on the head? I for one will follow Wassim's suggestion and say the following:
Thank you, Steve and the SWT team!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592420.72/warc/CC-MAIN-20180721071046-20180721091046-00344.warc.gz
|
CC-MAIN-2018-30
| 989 | 6 |
https://www.liquidplanner.com/support/articles/milestones/
|
code
|
A milestone is a fixed date that doesn’t budge, no matter how work is progressing around it (or not). Think of a milestone as a boulder in a river: the boulder (milestone) stays put as the water (work) flows around it.
A milestone might serve simply as a visual marker on the timeline that doesn’t affect your schedule at all. Or, if tied to other plan items via dependencies, a milestone can actually play a role in driving your schedule dates.
When considering the use of milestones, remember that they don’t hold effort. In other words, you can’t estimate a milestone. That means you shouldn’t use a milestone for work that needs to be represented as part of the project’s overall scope (remaining effort), or for work that should pull availability from the milestone owner. In those cases, it’s better to represent the work as an estimated task with a deadline date on in it.
In the example above, the Testing work won’t start before the Deploy Completed milestone date because there is a dependency set up between the milestone and the Testing sub-folder. Of course, you could always just put a delay until date on the Testing work, without creating a milestone. But the milestone with dependency makes it clear why Testing won’t start until that day. It’s also nice that if you change the fixed milestone date, the start date of the other work will adjust automatically as well.
Adding a Milestone
On the Projects tab, select the destination container (project, sub-folder or package).
In the Add Milestones window, enter the milestone’s name, assign an owner, and select a milestone date.
To add multiple milestones at one time, click the “New Milestone” link to insert a new row to the form. Up to 50 milestones can be added at a time.
If you didn’t set a date in the previous step, make sure to add the Milestone Date in the milestone’s edit panel.
You can also add milestones from the Timesheets tab by clicking the blue Add button. A milestone added from the Timesheets tab will land in the Inbox with no project association. You can change its location by opening the edit panel.
Add Multiple Owners to a Milestone
Assigning multiple owners to a milestone is helpful when more than one person needs to be aware of the milestone and any updates that are made to it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141737946.86/warc/CC-MAIN-20201204131750-20201204161750-00487.warc.gz
|
CC-MAIN-2020-50
| 2,306 | 12 |
https://rs1.es/tutorials/2022/03/06/sysvinit.html
|
code
|
How to use SysVinit: the alternative to Systemd
Some operating systems come with SysVinit as the service manager, instead of Systemd. Here I will teach you how to run scripts at boot using this tool.
I am going to use MX Linux, a Debian based distro with sysVinit installed.
Table of Contents
A runlevel is one of the modes that a UNIX-based system can run. Each runlevel has certain number of services to be running, so the user can control the bahaviour of the system by adding or removing services on each runlevel, or changing the default runlevel. Most systems have seven runlevels.
|MX Linux Runlevel||Comment|
|0||Halt the system.|
|1||Single-user mode: provides a root console without logon. Useful if you lose your root password.|
|2||Multiuser with no network.|
|3||Console logon, no X (i.e. no GUI).|
|5||Default GUI logon|
|6||Reboot the system|
You can check the runlevel you are on by typing
runlevel on a Terminal.
init is the parent process of all system processes (its Process ID is 1). When system boots,
init process is started and executes all startup scripts inside
? is the runlevel). MX Linux default runlevel is 5, so
init will execute scripts inside
/etc/rc5.d/. Default runlevel is specified on
rc?.d folder, there are symbolic links to files inside
Changing a runlevel
You can change the runlevel at boot time of when the system is running. For example, if you want to change to a console runlevel (no GUI):
- From the GRUB menu: type
e(for ‘edit’) when your operating system is selected, go to the end of the line that starts with
linux /boot/vmlinux-5..., add a space and type the runlevel number (e.g.:
3). Finally, press F10 to boot.
- From the desktop: press Ctrl + Alt + F1 to get out of X. Log in as root and run
Writing rc.d scripts
As I said before, init scripts are inside
/etc/init.d/. You create a symbolic link to those files on the runlevel folder you want to run the script (e.g.:
$ ls -l /etc/rc5.d/ total 0 lrwxrwxrwx 1 root root 14 Mar 3 18:31 K01nmbd -> ../init.d/nmbd lrwxrwxrwx 1 root root 14 Mar 3 18:31 K01smbd -> ../init.d/smbd
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662675072.99/warc/CC-MAIN-20220527174336-20220527204336-00159.warc.gz
|
CC-MAIN-2022-21
| 2,082 | 31 |
http://www.on-track-on-line.com/forums/index.php?showtopic=34446&pid=74944&st=0
|
code
|
Aloha Kevin et All
I see that you either did not know or forgot how Evan startled, Scared, me on our entrance into Canada. What she did, was to politely ask the Canadian agent if she could ask a question. The Agent said yes. Evan then Asked why the Canadian Flag was lower than the American Flag. Apparently she learned the Flag protocol from the Olympics. What scared me was that Agent got so flustered about not knowing how the flags should be displayed and an 8.5 year old knew how. BTW in Canada the Canadian Flag should be higher.
Wish we were going to be with you but please enjoy SERF. And in honor of my 67th birthday on the 21st someone have Strawberry Short cake, I'll have one here.
Edited by KevinKorell, 15 July 2011 - 12:30 PM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945459.17/warc/CC-MAIN-20180421223015-20180422003015-00426.warc.gz
|
CC-MAIN-2018-17
| 741 | 4 |
https://wn.com/Wifi_inflight?from=wifiinflight.com
|
code
|
- published: 19 Nov 2016
- views: 1380335
How can you get internet access seven miles off the ground, why is it often slow, and is it going to get any better? Freshbooks message: Head over to http://freshbooks.com/techquickie and don’t forget to enter Tech Quickie in the “How Did You Hear About Us” section when signing up for your free trial. Follow: http://twitter.com/linustech Join the community: http://linustechtips.com License for image used: https://creativecommons.org/licenses/by/3.0/legalcode
Traveling soon? Want to get the most out of your inflight Wifi? Here are some tips. State of Tech - http://stateoftech.net Find us here: Facebook - http://www.fb.com/stateoftech Twitter - http://www.twitter.com/stateoftech Instagram - http://instagram.com/stateoftech Virgin America Wifi, American Airlines Wifi, United Wifi, Southwest Wifi, Gogoair wifi, Delta wifi
This Honeywell test plane lets you stream Netflix at 35,000 feet. A satellite-based system promises fast Wi-Fi to rival your home connection. Subscribe to CNET: http://cnet.co/2heRhep Check out our playlists: http://cnet.co/2g8kcf4 Like us on Facebook: https://www.facebook.com/cnet Follow us on Twitter: https://www.twitter.com/cnet Follow us on Instagram: http://bit.ly/2icCYYm Add us on Snapchat: http://cnet.co/2h4uoK3
How To: Hack American Airlines Wifi For Free GoGo WiFi Hack ========================================= In this awesome video, I show how to exploit a neat little "hack" on the American Airlines GoGo Inflight WiFi. Using this "Hack" or "Exploit", will allow you to get 10-15 minutes of aa airlines wifi service for free at a time! This hack is repeatable, so once the system locks, just repeat! It's that simple. It's quicker and easier when I'm not holding a camera, and works on all Apple iPhones, iPads, and iPod Touches, as well as Most Android devices. After following my directions on to get the free in-flight aa free wifi, the connection will last that 10-15 minutes. I achieved some great speeds! While it is not very convenient to watch a movie, 10-15 minutes will give your phone enough tim...
Can you believe it? WiFi internet at 40,000 feet, onboard an Emirates flight between Dubai and England. Emirates offer 10MB of data for free or you can pay $1 ( 0.80 GBP ) for 500MB. An amazingly priced deal which is cheaper than mobile data on the ground! You do need a little patience because the signal comes and goes and overall it's a pretty slow experience. But being able to chat with friends and family and read the news and browse forums is pretty awesome and makes longer flights a bit more tolerable. I love that we've gone from 'Please turn all electronic devices off' to 'We have onboard wifi!'. Congrats to Emirates :) I believe some other airlines also offer OnAir WiFi but Emirates was the first airline I tried it with. SUPPORT ME: If you enjoyed this video, please remember t...
Namaskaar Dosto, is video mein maine aapse In Flight WiFi ke baare mein baat ki hai, Aeroplanes mein Internet access kaise milti hai, kaise aap Airplanes mein WiFi ko use karte hai. Maine aapko bataya hai Air to Ground system aur Satellite communications ke baare mein. Mujhe umeed hai ki video aapko pasand aayegi. Share, Support, Subscribe!!! Subscribe: http://bit.ly/1Wfsvt4 Android App: https://technicalguruji.in/app Youtube: http://www.youtube.com/c/TechnicalGuruji Twitter: http://www.twitter.com/technicalguruji Facebook: http://www.facebook.com/technicalguruji Facebook Myself: https://goo.gl/zUfbUU Instagram: http://instagram.com/technicalguruji Google Plus: https://plus.google.com/+TechnicalGuruji Website: https://technicalguruji.in/ Merchandise: http://shop.technicalguruji.in/ Abo...
Here's a quick InFlight WiFi speed test while I was coming back from Las Vegas to San Francisco on United Airlines. Read the Full Story Here: http://highonandroid.com/network-tests/inflight-wifi-speed-test-united-airlines/ -------------------------------------------------------------------------------------- My GooglePlus: http://plus.google.com/105122758270056069711/posts My Facebook: http://www.facebook.com/howtoblog My Twitter: http://twitter.com/zedomax
CamSoda.com: We just had to share this. An Unknown flight attendant uses in-flight wifi to cam on camsoda! This is a sfw youtube edit. Her username on
http://www.newgadgets.de - Review of Lufthansa Flynet (in-flight wifi) If you like my video, please don't forget to give a thumbs up / like! Also make sure to subscribe my youtubechannel so you won't miss any of my next videos. If you have any questions, please leave a comment and I will try to answer it as soon as possible! I visit every important it-show worldwide to provide you with the latest products in the it-industry. I upload my videos in english and german, english video first! These are the videos for my website: http://www.newgadgets.de This is my facebook fanpage: http://www.facebook.com/newgadgetsde This is my twitter: http://www.twitter.com/newgadgetsde And this is my liveblogging twitter channel: http://www.twitter.com/ngde_live My Google+ Fanpage: https://plus.googl...
(English subtitle is available. ) ANA All Nippon Airways Inflight WiFi Speed Test. ANA (NH203) Haneda Tokyo to Frankfurt. Actual speed of inflight wifi. My new channel was just launched ▶︎https://www.youtube.com/channel/UC1AqBbpwqBfJ5J7dWXn2CaQ 全日空機内WiFi 接続スピードテスト 羽田発フランクフルト着便でのワイファイスピードテストレポートです。 新しい姉妹チャンネルはこちらから▶︎https://www.youtube.com/channel/UC1AqBbpwqBfJ5J7dWXn2CaQ
Thanks for watching!!! Subscribe to My channel & Follow me on Twitter and I.G.... below ⬇⬇⬇🖒🖒 Instagram https://www.instagram.com/p/BRrmSU_AYPQ/ Twitter Check out Official LB Beats (@lb_beats): https://twitter.com/lb_beats?s=09 😊😊😊😊😊😊😊😊📺📺📺😙🖒🖒🖒🖒
Just a quick video to give you a rough idea of internet speed on-board an Emirates aircraft. I tested stuff.co.nz (News site in NZ), Updating Snapchat, Sending a snap and sending a message on facebook messenger. It wasn't too bad once a connection was established with that particular app. It's not great, but what do you expect 40,000 ft in the air. Emirates uses OnAir (http://www.onair.aero/) Allowing you to use your phone for calling, and texting as well as data... But roaming is too expensive so I'm not going to bother with that lol. Flight Details Tuesday 30 December 2014 Emirates EK355 Singapore (SIN) to Dubai (DXB) Airbus A380-800 Please Like my Facebook Page: www.facebook.com/dptravelz Follow Me on Instagram: www.instagram.com/dhilanpatel15 @dhilanpatel15 (Instagram and Twitter)
Technology has made it possible for you to access the Internet on an airplane! How exactly does WiFi work on planes? Amy joins DNews to answer this complicated question. Follow Amy on Twitter: https://twitter.com/astVintageSpace Check out Amy’s YouTube channel: https://www.youtube.com/vintagespace Watch More: The Fastest Wifi Yet! https://www.youtube.com/watch?v=d_kxdP5za5k Wifi In Space! https://www.youtube.com/watch?v=9r9UwF7fBOA ____________________ DNews is dedicated to satisfying your curiosity and to bringing you mind-bending stories & perspectives you won't find anywhere else! New videos twice daily. Watch More DNews on TestTube http://testtube.com/dnews Subscribe now! http://www.youtube.com/subscription_center?add_user=dnewschannel DNews on Twitter ht...
The question everyone one asks and complains about === SOCIAL http://logiclounge.com http://plus.google.com/+LogicLounge http://twitter.com/logiclounge http://facebook.com/logiclounge
Putting Aircell's Gogo WiFi to the test.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815435.68/warc/CC-MAIN-20180224053236-20180224073236-00315.warc.gz
|
CC-MAIN-2018-09
| 7,718 | 17 |
https://dvd-studio-pro.helpnox.com/en-us/dvd-studio-pro-4-user-manual/using-advanced-menu-features/using-languages-with-menus/creating-and-configuring-menu-languages/adding-menu-languages/
|
code
|
Adding Menu Languages
You can use the Outline tab’s shortcut menu to create menu languages.
To create menu languages
Do one of the following:
Choose Project > Add to Project > Language, or press Command-Slash (/).
Control-click in the Outline tab, choose Add from the shortcut menu, then choose
Language from the submenu.
The new language appears in the Outline tab under the Languages heading. By default
it is named “English _,” with “_” being the number of the language. The General pane in
DVD Studio Pro Preferences contains a project default language setting that you can use
to define the default language. See
for more information.
For every language you add, DVD Studio Pro creates a new menu for each
menu in your project. This is true whether or not you assign different backgrounds to
each language. For projects with a lot of motion menus, these additional menus can take
up a significant amount of space on the DVD.
Using Advanced Menu Features
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989637.86/warc/CC-MAIN-20210518125638-20210518155638-00289.warc.gz
|
CC-MAIN-2021-21
| 968 | 17 |
https://community.nightdev.com/t/im-cant-find-how-to-do-greetings-message-on-user-hi-not-working/9549/2
|
code
|
The variable is
$(user) rather than
$user, so the command would be
!commands add hi hi $(user)
You would need to create separate commands if you wanted Nightbot to respond to other words (hi, hello, hey, etc).
If you wanted something more advanced you could randomize Nightbot’s response with a custom api such as this one: [quote=“rtainc, post:1, topic:4102”]
https://api.rtainc.co/twitch/random?format=I+choose…+&choices=CHOICESReturns a random choice from the parameter. Comma-separated.
(you can find out more about custom api’s here)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887224.19/warc/CC-MAIN-20180118091548-20180118111548-00799.warc.gz
|
CC-MAIN-2018-05
| 548 | 8 |
http://www.amazon.co.uk/Atlas-Of-The-Solar-System/dp/B00004UCNO
|
code
|
My eight year old would-be geologer liked this,lots of views of planets and their moons, and a flight to any planet you fancy. The main downside was that he didn't find it quite as easy to navigate as he would have liked. If he was a little older I don't think that would have been a problem. I had enormous fun with it - the views and wealth of information were satisfying to a complete beginner. Not sure that it would be of huge value to anyone who knew a reasonable amount of astrology already, but more than satisfied my curiosity. Given that I have found it quite hard to identify books or cd roms on astronomy that are accessible to junior school age as well as actually containing detailed information I think this is a good buy if you have curious children in that age group.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698354227/warc/CC-MAIN-20130516095914-00099-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 784 | 1 |
https://www.my.freelancer.com/projects/php/php-script-needed-compare-mysql/
|
code
|
I'm looking for someone familiar with PHP that can develop a script that will compare MySQL tables in the way that [login to view URL] does. The script should allow for up to five products to be compared.
14 pekerja bebas membida secara purata $151 untuk pekerjaan ini
We can push maximum logic in a MySQL stored procedure and call it using PHP. That will be faster in terms of application performance and less complicated in implementing using PHP code.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657555.87/warc/CC-MAIN-20190116154927-20190116180927-00078.warc.gz
|
CC-MAIN-2019-04
| 454 | 3 |
http://stackoverflow.com/questions/tagged/iterative-deepening+php
|
code
|
Meta Stack Overflow
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
PHP deepening XML structure
given the following XML structure (i have this in an XML-file, with lots of other content - the <p> tags are just there to indicate that other tags may follow): <TITEL1>...</TITEL1> ...
Jan 21 '10 at 10:57
newest iterative-deepening php questions feed
Hot Network Questions
Why there does not exist any Gravitational Magnetic Field?
Choosing between .bashrc, .profile, .bash_profile, etc
how to make blocks like "redstone" working in a minecraft-like game when the block is very far-away from your character
Could a malicious JS file pointed on URL/URI attack the browser/computer?
Draw the Sawtooth Alphabet
Write the whole of the holed using the unholed
Sum of Squares/Square of Sum Difference
What is the name of the piano piece Seven of Nine plays?
Why do we still do symbolic math?
Root and my password are the same
Small note above a normal-sized note
Cannot PuTTY to centos with ssh?
What's a novel way to say "all errors are my own"?
Is it typical to provide a lot of information for public transport systems in Japan?
How to determine what instructions a process is executing?
Is `-` used only with cd?
Check a string to see if it is a palindrome
How much more efficient is a road bike than a mountain bike?
If clones contain all the same genetics: Is there any difference in abilities of clone commanders compared to clone troopers?
Single word which means suffix or prefix
Temperature conversion table
Desire for Sin in Islam
How do I get filled black < and \leq?
Is there an equivalent of "reverie" where one is lost in unpleasant thoughts?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270313.12/warc/CC-MAIN-20140728011750-00041-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 2,238 | 53 |
http://www.makelinux.net/man/8/I/in.aspd
|
code
|
is a daemon that waits for incoming address requests on
detects itself as being the searched host, it sends a reply to the
client, allowing the retrieval of its
address. It is possible to specify an alternate
on command line, instead of using the value returned from the
function. This is useful if your hostname is dynamically changed when
the link goes up.
is invoked as
it will work as a server: it makes its work and exit, instead of wait
for new requests; this is useful if you want
to automatically run the server when a request arrives.
Set the number of times to re-send the reply. Default is 5 times.
Set the interface used to get the address to send to the client, for
Note that this option can't be used if
by inetd. Note also that you have to kill
if the interface address
Show version information
address and the searched hostname are logged through the
system logger daemon, using the
facility and the
level. Transmission errors use the
level and are logged only if
was compiled with the debug support.
to find the asp protocol port number.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719041.14/warc/CC-MAIN-20161020183839-00227-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,054 | 24 |
http://rhogroup.org/index.php/people/arun-saranathan
|
code
|
M.S. Electrical & Computer Engineering, University of Massachusetts, Amherst
B.E. Visvesvaraya Technological University, Belgaum, India
His interests include the use and extension of image segmentation techniques for Hyperspectral Images (HSI) and the use of manifold techniques to model the mixing seen in HSI.
Student member of IEEE (2013-)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00677.warc.gz
|
CC-MAIN-2023-50
| 342 | 4 |
https://infoprener.ru/guidlines-for-gay-dating-11026.html
|
code
|
Guidlines for gay dating
Orica-Green Edge team owner Gerry Ryan has accused British Cycling of leaking information about Simon Yates’s positive drug test before the British cyclist had the chance to “go through the due process” of presenting his case.
Discussion Board.decrement_counter(:posts_count, 5, touch: true) # Increment the posts_count column for the record with an id of 5 Discussion Board.increment_counter(:posts_count, 5) # Increment the posts_count column for the record with an id of 5 # and update the updated_at value.
To do this we loop through each project and set its Adding a new task via the console.
When you say I don't think you're expecting too much, you're just expecting Active Record to be more complete than it is.
All is not lost though, you can fill in the missing pieces yourself without too much effort.
Discussion Board.increment_counter(:posts_count, 5, touch: true) # For the Post with id #1, reset the comments_count Post.reset_counters(1, :comments) # Like above, but also touch the updated_at and/or updated_on # attributes.
Of course, the Rails documentation is often incomplete so we'll have to look at the source for confirmation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202572.7/warc/CC-MAIN-20190321213516-20190321235516-00138.warc.gz
|
CC-MAIN-2019-13
| 1,179 | 8 |
https://hello.oxfordcomputertraining.com/hugh-rafal-machine-learning-video-gate
|
code
|
Video with Hugh Simpson-Wells and Rafal Lukawiecki
In this video Identity Management expert Hugh Simpson-Wells (Founder and CEO of OCT) and Data Science expert Rafal Lukawiecki (Founder of Project Botticelli) discuss how machine learning could be used for IT security purposes. An IT system can monitor itself by looking for unusual behaviour, including implementing a live anomaly detection solution based on a machine-learned, cluster model of normal behaviour.
Hugh and Rafal discuss:
- New tools for anomaly detection and threat prediction
- The challenge of false positives
- The security arms race and adversarial machine learning - how improvements in machine learning benefit the bad guys as well as the good guys
- The abuse of our privacy and our data by organizations
- The role that governments play
- The expense of making systems both secure and convenient
- Potential social consequences as we move from imperfect passwords and passports to (inevitably) also imperfect machine learning based systems
- Who would benefit from learning about such areas, and where to start
Watch the video now!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410352.47/warc/CC-MAIN-20200530200643-20200530230643-00219.warc.gz
|
CC-MAIN-2020-24
| 1,106 | 12 |
https://www.prianto.com/ro/vendors/syslog-ng/log-management-software
|
code
|
Whether it's user activity, performance metrics, Windows events logs, network traffic or any other log data, syslog-ng can collect and centralize log data. You can remove data silos and gain full-stack visibility of your IT environment. Depending on its configuration, one syslog-ng server can collect more than half a million log message per second from thousands of log sources.
Secure transfer and storage
Have confidence in the data underlying your analytics, forensics and compliance efforts.
Using local disk buffering, client-side failover and application layer acknowledgement, syslog-ng can transfer logs with zero message loss. Encrypted transfer and storage ensure logs cannot be tampered with, preserving the digital chain of custody.
Reliable log transfer
syslog-ng Premium Edition can send and receive log messages in a reliable way over the TCP transport layer using the Advanced Log Transfer Protocol™ (ALTP™).
ALTP™ is a new transport protocol that prevents message loss during connection breaks.
Secure Transfer using TLS
Log messages may contain sensitive information that should not be accessed by third parties. Therefore, syslog-ng Premium Edition uses the Transport Layer Security (TLS) protocol to encrypt the communication.
TLS also allows the mutual authentication of the host and the server using X.509 certificates.
Secure, Encrypted Log Storage
syslog-ng Premium Edition can store log messages securely in encrypted, compressed, indexed and timestamped binary files, so any sensitive data is available only for authorized personnel who have the appropriate encryption key.
Timestamps can be requested from external timestamping authorities.
Scale up your log management
Depending on its configuration, one syslog-ng server can collect more than half a million log messages per second from thousands of log sources.
A single central server can collect log messages from more than 5,000 log source hosts. When deployed in a client relay configuration, a single syslog-ng log server can collect logs from tens of thousands of log sources.
Extreme message rate collection
The syslog-ng application is optimized for performance, and can handle an enormous amount of messages.
Depending on its exact configuration, it can process over half a million messages per second in real-time, and over 24 GB of raw logs per hour on standard server hardware.
Collection from thousands of sources
With the syslog-ng client-relay architecture, IT organizations can collect log messages from more than 10,000 log sources across a geographically distributed environment on one central log server.
syslog-ng allows you to granularly select which statistics of syslog-ng you want to monitor. The statistics are available as structured name-value pairs, so you can format the output similarly to other log messages.
That way, you can easily convert the statistics and metrics and send the results into your enterprise monitoring solution (for example, IBM Tivoli Netcool, Riemann, Redis, or Graphite).
Scaling to large networks with syslog-ng
This short video will show you how syslog-ng scales to the largest IT environments, ensuring your log infrastructure can reliably and securely collect and manage log data.
Flexible log routing
Reduce maintenance and deployment costs with universal collection
syslog-ng can be deployed as an agent on a wide variety of hosts and flexibly route logs to multiple analytic tools or databases, eliminating the need to deploy multiple agents on servers.
Tested binary files for the syslog-ng Premium Edition are available for more than 50 server platforms, reducing the time required for installation and maintenance.
Collect from a wide variety of sources, including Windows
syslog-ng Premium Edition can natively collect and process log messages from SQL databases, enabling users to easily manage log messages from a wide variety of enterprise software and custom applications.
The syslog-ng Agent for Windows is an event log collector and forwarder application for Microsoft Windows platforms.
Read log messages from any text file
Some applications use many different log files, and sometimes these files are not even located in the same folder. Automatically generated file and folder names are also often a problem.
To solve these issues, the filenames and paths specifying the log files read by syslog-ng can include wildcards, and syslog-ng can automatically scan entire subfolder trees for the specified files.
The syslog-ng Premium Edition application is also able to process multi-line log messages, for example, Apache Tomcat messages.
Forward to multiple destinations
Many large organizations need to send their logs to multiple log analysis tools. Different groups, including IT operations, IT security and corporate risk and governance, need access to the same log data but have different log analysis goals and tools.
The syslog-ng application can send logs directly to SQL databases, MongoDB and Hadoop Distributed File System (HDFS) nodes, or use the Standard Network Management Protocol (SNMP) and Simple Mail Transfer Protocol (SMTP) for other destinations.
Real time transformation
Optimize your tools with distributed processing
With powerful filtering, parsing, re-writing and classification options, syslog-ng can transform logs on remote hosts, reducing the amount and complexity of log data forwarded to analytic tools like SIEM or APM, reducing their total cost of ownership.
The flexible configuration language allows users to construct powerful, complex log processing systems on remote hosts with simple rules.
Filter, parse, re-write
syslog-ng can sort the incoming log messages based on their content and various parameters like the source host, application, and priority. Directories, files, and database tables can be created dynamically using macros.
Complex filtering using regular expressions and boolean operators offers almost unlimited flexibility to forward only the important log messages to the selected destinations.
Real time classification
By comparing log messages to known patterns, syslog-ng is able to identify the exact type of the messages, and sort them into message classes. The message classes can then be used to classify the type of the event described in the log message.
The message classes can be customized, and for example can label the messages as user login, application crash, file transfer, etc. events.
syslog-ng can use an external database file to append custom name-value pairs to incoming logs, thus extending, enriching, and complementing the data found in the log message.
You can also correlate and aggregate information from log messages using a few simple filters that are similar to SQL GROUPBY statements.
syslog-ng stores messages on the local hard disk if the central log server or the network connection becomes unavailable. The syslog-ng application automatically sends the stored messages to the server when the connection is re-established, in the same order the messages were received. The disk buffer is persistent - no messages are lost even if syslog-ng is restarted.
Flow control uses a control window to determine if there is free space in the output buffer of syslog-ng for new messages. If the output buffer is full and the destination cannot accept new messages for some reason, for example it's overloaded or the network connection has become unavailable. In such cases, syslog-ng stops reading messages from the source until some messages have been successfully sent to the destination.
Real time classification
By comparing log messages to known patterns, syslog-ng is able to identify the exact type of the messages, and sort them into message classes. The message classes can be used to classify the type of the event described in the log message. The message classes can be customized, and, for example, can label the messages as user login, application crash, file transfer, etc.
Python log parser
The Python log parser allows you to write your own parsers in Python. Practically, that way you can process the log message (or parts of the log message) any way you need. You can also write your own template functions in Python.
Normalize with PatternDB
syslog-ng can compare the contents of the log messages to a database of predefined message patterns.
Read and parse SNMP traps
syslog-ng PE can read these traps from a log file, and extract their content into name-value pairs, making it easy to forward them as a structured log message (for example, in JSON format).
Extract important information
In addition to classifying messages, you can also add different tags which can be used later for filtering messages. For example, to collect messages tagged as user_login to a separate file or to perform conditional post processing on the tagged messages.
Real time event correlation
syslog-ng also makes real time event correlation possible. This can be useful in many different situations, for example important data for a single event is often scattered into multiple syslog messages. Also login and logout events are often logged far away from each other, even in different log files, making log analysis difficult. Using correlation, these can be collected into a single new message.
Windows Event Collector
The Windows Event Collector (WEC) is a stand-alone log-collector and-forwarder tool for the Microsoft Windows platform. It collects log messages from Windows hosts and forwards them – by source-initiated push subscriptions and WinRM protocol - to a syslog-ng Premium Edition server (7.0 or later). Because it’s a remote solution and doesn’t require installation on the host itself, WEC is an ideal log solution for IT environments that want to minimize the use of agent software.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100229.44/warc/CC-MAIN-20231130161920-20231130191920-00154.warc.gz
|
CC-MAIN-2023-50
| 9,747 | 67 |
https://www.servicenow.com/research/publication/florian-shkurti-unde-iros2017.html
|
code
|
We present a robust multi-robot convoying approach that relies on visual detection of the leading agent, thus enabling target following in unstructured 3-D environments. Our method is based on the idea of tracking-by-detection, which interleaves efficient model-based object detection with temporal filtering of image-based bounding box estimation. This approach has the important advantage of mitigating tracking drift (i.e. drifting away from the target object), which is a common symptom of model-free trackers and is detrimental to sustained convoying in practice. To illustrate our solution, we collected extensive footage of an underwater robot in ocean settings, and hand-annotated its location in each frame. Based on this dataset, we present an empirical comparison of multiple tracker variants, including the use of several convolutional neural networks, both with and without recurrent connections, as well as frequency-based model-free trackers. We also demonstrate the practicality of this tracking-by-detection strategy in real-world scenarios by successfully controlling a legged underwater robot in five degrees of freedom to follow another robot’s independent motion.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00509.warc.gz
|
CC-MAIN-2023-23
| 1,186 | 1 |
https://honestopinion.tech/microsofts-gpt-4-powered-bing-ai-is-now-available-to-everyone/
|
code
|
About a month ago, Microsoft launched the new AI-powered Bing to build on the ChatGPT hype. Backed by what we now know as GPT-4, the AI-powered search engine and chatbot has become extremely popular (~100 million daily active users) in a fairly short period of time. However, a big downside was that Bing AI was stuck behind a waiting list. However, there is finally good news, as Microsoft has opened up MS AI Bing to everyone. Read below to know all about it.
Bing AI now available to everyone without a waitlist
Previously, the new Microsoft Bing was in limited preview for a long time. In order to use it, users had to join the waiting list for the same. However, as Windows Central spotted, users who sign up for the new Bing AI now have immediate access.
To get started with the new Bing, you’ll still need a Microsoft account. Users will even see a ‘Join the waiting list‘ button. However, if you click the button now, you will be immediately greeted with the success message. We tested the same thing on several Microsoft accounts and it works for all of us here at Blinked.
As the new Microsoft Bing opens up to everyone, people will rush to experiment and try all the cool things they can do with an AI-powered search engine. It will be interesting to see who wins the battle for attention, Bing or ChatGPT. There is, however, a major caveat.
Well, Microsoft being Microsoft only allows access to Bing AI through its Edge browser at the moment. You cannot access the Bing Chat feature on other popular browsers. But there is a simple workaround, as we detailed in our article on using Bing Chat AI on any browser. So go ahead and give this AI search feature a try and let us know your thoughts in the comments below.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00362.warc.gz
|
CC-MAIN-2023-14
| 1,732 | 6 |
https://www.geeksforgeeks.org/print-ancestors-of-a-given-node-in-binary-tree/
|
code
|
Given a Binary Tree and a key, write a function that prints all the ancestors of the key in the given binary tree.
For example, if the given tree is following Binary Tree and key is 7, then your function should print 4, 2 and 1.
1 / \ 2 3 / \ 4 5 / 7
Thanks to Mike, Sambasiva and wgpshashank for their contribution.
4 2 1
Time Complexity: O(n) where n is the number of nodes in the given Binary Tree.
Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above.
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- Iterative method to find ancestors of a given binary tree
- Print cousins of a given node in Binary Tree
- Print the nodes of binary tree as they become the leaf node
- Print the number of set bits in each node of a Binary Tree
- Print path from root to a given node in a binary tree
- Print all nodes except rightmost node of every level of the Binary Tree
- Print all the nodes except the leftmost node in every level of the given binary tree
- Print cousins of a given node in Binary Tree | Single Traversal
- Print updated levels of each node of a Complete Binary Tree based on difference in weights of subtrees
- Print Binary Tree levels in sorted order | Set 3 (Tree given as array)
- K-th ancestor of a node in Binary Tree | Set 3
- K-th ancestor of a node in Binary Tree
- Kth ancestor of a node in binary tree | Set 2
- Search a node in Binary Tree
- Get Level of a node in a Binary Tree
- Find mirror of a given node in Binary tree
- Total sum except adjacent of a given node in a Binary Tree
- Preorder Successor of a Node in Binary Tree
- Get maximum left node in binary tree
- Get last node of the binary tree following given pattern starting from X
Improved By : shrikanth13
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657170639.97/warc/CC-MAIN-20200715164155-20200715194155-00548.warc.gz
|
CC-MAIN-2020-29
| 1,952 | 29 |
https://www.symantec.com/security_response/vulnerability.jsp?bid=14513
|
code
|
Date Discovered August 9, 2005
Description Microsoft Windows Plug and Play (PnP) is prone to a buffer-overflow vulnerability.
This issue takes place when the PnP service handles malformed messages containing excessive data.
This vulnerability may allow local attackers to escalate privileges and remote attackers to gain unauthorized access, depending on the underlying operating system. A successful attack may allow arbitrary code to run, resulting in the attacker gaining SYSTEM privileges.
UPDATE (8/23/2005): While investigating this vulnerability, the DeepSight Threat Analyst Team has been able to carry out anonymous remote exploitation against certain nondefault configurations of Windows XP SP1. The attack vector appears when the "Guest" account is both enabled and removed from the "Deny access to this computer from the network" entry in the "User Rights Assignment" Security Policy. This can happen when Simple File and Print Sharing has been enabled, for example by sharing a folder or a printer with the local network. Note that Simple File and Print Sharing is available only on Windows XP machines that are not part of a Windows Active Directory Domain. However, configuring a Windows XP SP1 host to share network resources prior to joining an Active Directory Domain will leave it in the vulnerable state even after the Domain is joined.
Note also that Windows XP SP2 is not prone to this exploitation method. Furthermore, there is no change to Microsoft Security Bulletin MS05-039. Customers who have deployed this update are protected from this issue.
In light of this finding, Microsoft has issued new information regarding the patch for the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (see Security Bulletin 906574: http://www.microsoft.com/technet/security/advisory/906574.mspx).
Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Given the local nature of this issue, grant only trusted and accountable individuals access to affected computers.
Block external access at the network boundary, unless external parties require service. Use network access controls to regulate external access to computers at the network perimeter. Permit access for trusted or internal computers and networks only. Block TCP ports 139 and 445.
Deploy network intrusion detection systems to monitor network traffic for malicious activity. Deploy a network intrusion detection sensor between the affected service and the network perimeter. Audit the logs regularly for indications of potential attacks.
Implement multiple redundant layers of security. Memory-protection schemes such as nonexecutable stack/heap configurations and randomly mapped memory segments may complicate exploitation of memory-corruption vulnerabilities.
Change default user IDs and passwords. A workaround against the Guest account attack vector is to change the default password for the guest account. This will prevent attackers from connecting to the service and authenticating as Guest.
Review and adjust according to policy any default configuration settings. Although file sharing is not enabled by default, administrators should still check to ensure that it is disabled. This is necessary only for systems that are not already patched with the MS05-039 fix or have XP SP2 installed. Such systems are not vulnerable to the Guest account attack vector.
Review and adjust according to policy any default configuration settings.
Ensure the Guest Account is on the "Deny access to this computer from the network" entry in the "User Rights Assignment" Security Policy. Although this is the default setting, enabling file sharing may remove this entry from the policy.
Microsoft has released fixes to address this vulnerability in supported platforms.
Cisco has release a security notice detailing their mitigation recommendations with regard to this vulnerability.
Credits Discovery is credited to Neel Mehta of ISS X-Force.
Copyright © Symantec Corporation.
Permission to redistribute this alert electronically is granted as long as it is not edited in any way unless authorized by Symantec Security Response. Reprinting the whole or part of this alert in any medium other than electronically requires permission from [email protected]
The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.
Symantec, Symantec products, Symantec Security Response, and [email protected]
are registered trademarks of Symantec Corp. and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890893.58/warc/CC-MAIN-20180121214857-20180121234857-00452.warc.gz
|
CC-MAIN-2018-05
| 5,077 | 24 |
http://www.jsmag.com/blog/2010/11/new-roundup-ios-4-2-accelerometer-websockets-colour-js-w3c-drops-web-sql/?rd=y&r=y&ref=
|
code
|
News Roundup: iOS 4.2 Accelerometer and WebSockets support, Colour.js, W3C drops Web SQL
iOS 4.2 brings Accelerometer and WebSockets support
The recently released iOS 4.2 brings some major additions to mobile Safari, including accelerometer and gyroscope support (through the DeviceOrientation API, WebSockets support, and TrueType fonts support.
For acceleration, there’s now a new “ondevicemotion” event to tinker around with. For the gyroscope (for devices that support it), the data can be captured from the existing “ondeviceorientation” event.
It’s good to see some major progress in mobile Safari, which is now trying to keep pace with the rapid advances Android is making. Mobile Safari, as far as I can tell, is the first mobile browser to implement WebSockets. We’ll see if the impending (and overdue) release of Android 2.3 Gingerbread will do the same.
Colour.js is a small simple library for converting between CSS color formats. What this means is that it can handle anything from named colors (”black”, “white”, etc.) and hexadecimal colors to the newer RGB/RGBA and HSL/HSLA formats.
If you’re already familiar with HSL (hue, saturation, lightness), you’ll know it’s relatively simple to lighten an existing color. For instance, when looking at a prototype of the page you’re working on and deciding that the color hsl(0, 50%, 50%) should be lightened, all you do is increase the lightness value a bit: hsl(0, 50%, 60%)
Colour("rgb(0, 100, 150)").lighten(10).toRGBString(); //"rgb(0,134,201)"
W3C drops the Web SQL Database specification
During the summer the W3C stopped work on the Web SQL spec and slapped this notice on the page: “This document was on the W3C Recommendation track but specification work has stopped. The specification reached an impasse: all interested implementors have used the same SQL backend (Sqlite), but we need multiple independent implementations to proceed along a standardisation path.”
In other words, all the browsers implementing the spec chose to use Sqlite to implement the spec, but the W3C felt it was necessary for at least one browser to implement the spec with another database. The W3C didn’t want to tie the spec to a particular SQL implementation.
Now just last week the W3C put up a bigger and scarier-looking announcement on the page: “Beware. This specification is no longer in active maintenance and the Web Applications Working Group does not intend to maintain it further.” To me this looks indistinguishable from a big old “DEPRECATED” banner at the top of the page, and reactions on Twitter have been similar.
What’s now unclear is how the browsers currently supporting Web SQL databases will handle this. There’s undoubtedly many applications that have now been written that depend on the Web SQL database, and it wouldn’t exactly be pretty having the rug pulled out from under them by removing support. In any case, what is now clear is that the indexedDB spec, just recently implemented in Chrome, is now king.
JS1k #2, Xmas edition
förbind: a service for connecting users, running on node.js with socket.io (by Remy Sharp)
The new BlobBuilder() interface enables Web Workers without external files (and saving HTTP requests!).
Playing with Audio Visualization
Arrhythmia.js, a new take on rhythm validation
xc.js, a framework for 2D canvas games
Announcing cssess: The Bookmarketlet That Finds Unused CSS Selectors
Paren-Free (Brendan Eich’s blog
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737935954.77/warc/CC-MAIN-20151001221855-00235-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 3,472 | 21 |
https://www.freelancer.ie/job-search/send-email-via-facebook-api/
|
code
|
I need an Android app. I would like it designed and built.
Hello everyone. I am looking for a Wordpress expert with five years and well versed in PHP and how to set JSON FEED. If you know well about JSON API, You can do this immediately. This is ongoing work.
This capture tells what I am trying to accomplish. We need voice communication here and the task needs to be done in real-time, so this needs to be someone that knows Wordpress and CSS really well. [login to view URL] I am available right now [Removed by Freelancer.com Admin for offsiting - please see Section 13 of our Terms and Conditions]
looking for facebook ads manager who have experience with fb ads and who can launch my fb ad campaigns as my requirement 3 to 5 campaign per day , prefer from Philippines please dont forget to write BATMAn if you have read the job post i am willing to pay for each campaign price 1 to 2 USD
hi, thanks for your interest, in short we are looking to recruit affiliates to our affiliates community, we will pay you for every affiliate you bring, please select and give me a 6 digits number (100000-999999) and i will provide you with the link you should use to refer affiliates and earn commissions! Cheers
Hi, I'm looking for application to forward email to WhatsApp contact or group , so whenever certain email receive any message , the content of this message ( with attachment if exist ) will be forwarded to predefined whatsapp contact or whatsapp group Thanks
I am using the Bitmex trading platform and I need something which will allow me to copy my trades automatically to other Bitmex account using the API keys. I also need this to take into account the account balance of the other users in order to apply the appropriate position sizes as a % of the account balance. I will also need to be able to adjust
I have a set of restaurant clients that needs Facebook and Instagram posting management. I need someone who can create interesting posts about Indian food particularly vegetarian food and post it on Facebook and Instagram for two to three times a week. Kindly contact Mr Ramesh [Removed by Admin]
About the Role We're a small, growing company looking to up our email marketing game from “haphazard startup” to “well-oiled machine”. We're Crossword Hobbyist ([login to view URL]), My Word Search ([login to view URL]), and My Worksheet Maker (coming soon!), the absolute best way to make crosswords, word searches, and student worksheets
I need an Android app. I already have a design for it, I just need it to be built.
i want to promote an product on my web though facebook advert in specific usa location
I have a set of 300+ vendor contacts. I am looking for someone to call all the 300+ vendors customer service numbers and gather information related to the vendor business. It is an easy cakewalk for someone with sales or customer care experience. The information that will be requested is all about the business and vendors will be very much willing to provide information. Its like calling the cus...
I need someone to use an API for me - it is football games, the API provides live data for the games and I need a minute by minute download of the main values. This needs to work easily day on day - download new games list, create excel sheet or file, download values once game is live. API is from commercial site [login to view URL]
...basic, premium My extension currently logs in, gets the user id, and sends it back via get request to rest api custom route / endpoint to verify which subscription condition is valid. The endpoint should return one of these 4 conditions in quotes (ie: "basic") via the custom route url. The extension is already coded and operational as is the wordpress
Build me a android reward app using offerwall ads included web panel, Conditions- all offers should be integrated using api ui should be looking very good and incl some cool ui animations Ex app : app karma rewards
I need someone to integrate the WPforms on our website w...system (PestRoutes). An example of a form page on our website: [login to view URL] Here is the API documentation: [login to view URL] Don't just tell me you can do the job. Tell me HOW you will do it.
Hello I need a software developer who knows the his job to create a software for my business which has the ability to track competitors Facebook ads to show their best performing ads and it's audience insights.
Looking for someone that can implement Python functions that query data from YouTube API and Instagram Insights API and return JSON data.
You must have experience in: Django Google Oauth2 Google Analytics Reporting API The function: 1. User should be able to connect their google analytics account. (give access by Oauth2) They should be able to click a button in the profile page to start the connection process 2. They should be able to click "disconnect account" If they wanna disconnect
I need an invitation design. This is an urgent job. There is a lot of text but no images so great design is important. The logo can be modified. I'm looking for some ideas to make it more interesting. I prefer a clean graphic style of design.
I've already created to strategy to be used in this project on Tradingview which I will make available to the programmer who is awarded the project to assist in conceptualizing and backtesting the strategy. 1. Gather volume from 9 exchanges and combine them in a database to be used in the strategy Refer to [login to view URL] image and "composite-volume-code" below a. I’ve...
t will be very welcome who has a similar project. reference for API model: [login to view URL] Develop own API and a dashboard to import a list of 100k of contacts in .csv or .txt and send text or video, photo or audio at one time, not as a bot or theft mimicking a human, after this show graph report with the following statuses, sent, received
I work for a development company located in Israel. I'm trying to retrieve leads from Facebook forms and send their data into my server. I've created a Facebook app with Web-hook with the following permission: 1. leadgen 2. business_management 3. leads_retrieval 4. manage_pages I've passed Facebook's review and every permission test button sends
Hello, we are looking for a magento 2 expert for installation of two Magento 2.3 Extensions via composer from Github. -German Law Extension by magenerds [login to view URL] -Baseprice Extension by magenerds [login to view URL]
Need experienced person to setup automated email marketing campaign on a shopify site Would prefer to use omnisend Campaign should be automated and cover all aspects such as abandoned carts, welcome email, order confirmation, new products and offers etc.
It will be very welcome who has a similar project. Develop own API and a dashboard to import a list of 100k of contacts in .csv or .txt and send text or video, photo or audio at one time, not as a bot or theft mimicking a human, after this show graph report with the following statuses, sent, received and read. Allow adding multiple placements to the
I have a list of 10,000 companies and city in a google spreadsheet. I have also created a link...google page will open with some search results 2. See if there is any website of that company 3. If yes, then go to that website and copy the email ID and phone number (mostly from contact us page) 4. Paste the email Id and phone number in the Spreadsheet.
I need an Android app. I would like it designed and built.
...this extension is when open a new tab or windows we show a customize web with content. There is an API developed with this in mind to help fetch the content of site. List of features: - Display web when create a new tab or window. - Load posts from a API. - Show a page when offline. - Allow you to mark favorites (local) Please show your previous work
For this project, the use of jz3d api is to be used to build series of examples by adressing follwing features in follows -> to itterate expression in multiple for loops and plot the 3d graphs in panels using jz3d. -> to make demos ( contor, heat and surface )by using above method to build various types of plots -> each plot should have rotation
Need someone who is good at coding to finalize changes on website FIRM PRICE 30 CAD for the tasks outlined below Need someone who can start now and get it done today See instructions below and only apply if you can do these ------------------------------------------------------------------------------------------ HOME PAGE [login to view URL] * Where it says… bridging the gap between bu...
...and add 1 API functions to it. All git hub project , documents and docker images is ready just need 1 API functions to duplicate [login to view URL] API. You need to create 1 API to the git hub project and make the Docker image working. You also show me step be step to duplicate your work so I and my team can follow up. Text me so I will send the detail
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255536.6/warc/CC-MAIN-20190520021654-20190520043654-00431.warc.gz
|
CC-MAIN-2019-22
| 8,925 | 32 |
https://teachingresourcespro.com/visual-studio-code-1-78-releases-profile-templates-for-python-java-angular/
|
code
|
Visual Studio Code 1.78, also known as the April 2023 release of Microsoft’s Visual Studio Code source code editor, introduces built-in profile templates for Python and Java as well as new color themes.
Profile templates in VS Code 1.78 serve as organized profiles for different languages and scenarios, allowing developers to customize VS Code for specific workflows. Models are available for Python, Javadata Science, Node.jsAnd Angular. The update also includes new default color themes, with Dark Modern and Light Modern replacing Dark+ and Light+.
Other new features and improvements in Visual Studio Code 1.78:
- The old diff algorithm is deprecated. The new diff algorithm produces better diffs in many cases, but may be slower for some documents. While the old algorithm remains the default for the difference editor, plans are to slowly change the default for the new algorithm and measure its performance.
- Users can now launch a standalone color picker to insert and replace colors.
- Continuous execution can now be activated for individual tests.
- Videos can be dragged and dropped into Markdown files.
- Developers can now drag and drop image files into Markdown cells in notebooks to create attachments.
- Typescript 5.1 is supported. This version of TypeScript is currently in beta.
- Inline completion functionality has been rewritten and bugs have been fixed. An Accept Line command has been added and Accept Word now works on multiple lines.
- Code actions and quick fixes are now supported in the source code control message box.
- A new code snippet variable,
CURRENT_TIMEZONE_OFFSETreturns the current time offset in the format
- Screen reader users can exclude aria label hints from a feature to reduce redundancy via the
"accessibility.verbosity.terminal"settings. New audio cues are also supported.
- VS Code for Web now supports committing files to Git Large File Storage (LFS) in repositories hosted on GitHub.
Predecessor VS-Code 1.77released on March 30, included deeper integration with the GitHub Copilot AI coding helper.
Copyright © 2023 IDG Communications, Inc.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00187.warc.gz
|
CC-MAIN-2024-18
| 2,100 | 18 |
https://paizo.com/threads/rzs2qc76?Expected-timeline
|
code
|
Liz Courts wrote:
rknop wrote:They did just hire a new developer -- or, at least, they were advertising for one.Still looking for one, so if you know somebody who's interested, tell them to send a resume in. :D
Is there a particular reason this doesn't say the pay? Many jobs I look at give at least a ballpark.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540484815.34/warc/CC-MAIN-20191206050236-20191206074236-00308.warc.gz
|
CC-MAIN-2019-51
| 311 | 3 |
https://twittercommunity.com/t/twitter4j-properties-file-not-being-read/2342
|
code
|
I am unable to get my project to read in my
twitter4j.properties file even though I have copied it to the root of the project folder in Eclipse. I have filled out the properties file according to the configuration guide like so:
oauth.consumerKey=thisismyconsumerkey oauth.consumerSecret=thisismyconsumersecret oath.accessToken=14778563-thisismyaccesstoken oath.accessTokenSecret=thisismyaccesstokensecret debug=true http.prettyDebug=true
I am initiating a Twitter stream like so:
TwitterStream twitterStream = new TwitterStreamFactory().getInstance(); twitterStream.addListener(listener); twitterStream.sample();
I am able to get the application to run if I manually set it using
ConfigurationBuilder, but I would like for the application to read my properties file instead. Is there something else that I have to do in order to get my project to recognize the file?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823348.23/warc/CC-MAIN-20181210144632-20181210170132-00324.warc.gz
|
CC-MAIN-2018-51
| 867 | 7 |
https://forums.digi.com/t/anywhereusb-and-ftdi/13121
|
code
|
I’m using an FTDI device: http://www.ftdichip.com/Products/ICs/FT2232H.htm
To list the connected devices in my system I use a function from the provided C# wrapper:
The function is “GetDeviceList”
Each listed device has an associated “Location” when I use it with directly connected devices it works well. But when I use that function with devices connected trough a AnywhereUSB Hub, the location is always equal to 0.
Therefore I cannot manage the connected devices.
Do you have any idea or even better, a solution, to help me with this problem ?
You may had other people complaining about FTDI compatibility ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00056.warc.gz
|
CC-MAIN-2023-40
| 621 | 7 |
https://twittercommunity.com/t/card-validator-reports-no-metatags-found-even-though-my-markup-contains-them/101276
|
code
|
Description of issue:
Twitter cards are not showing up when links are shared on twitter for pages on our domain. The markup clearly contains the twitter markup tags. I’ve searched the forums and there are reports of this issue and some suggest making sure the
text/html. Ours does that.
URL affected (must be public):
Example URLs that are problems:
Troubleshooting steps attempted [note that we will not prioritise posts unless there is evidence of following the troubleshooting guides]:
Use the Twitter Card Validator and see this output:
INFO: Page fetched successfully WARN: No metatags found
However, if you look at the page source, you’ll see both Open Graph and Twitter tags in the .
I’ve verified that posting a link on twitter does not show the twitter card. I’ve looked at the markup and it’s showing both FB open graph and Twitter tags. Also verified that our robots.txt is not blocking anything (we don’t even have a robots.txt). I’ve also used
curl to simulate twitter bot to fetch the page using
curl -A "Twitterbot/1.0" <url> and all the HTML returns as expecting with the OG and Twitter markup
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824448.53/warc/CC-MAIN-20181213032335-20181213053835-00394.warc.gz
|
CC-MAIN-2018-51
| 1,123 | 12 |
https://www.scilifelab.se/news/bioconda-resource/
|
code
|
The myriad of bioinformatics software opens great possibilities for biological and biomedical research, but with many programs and dependencies, software installations and updates often put a significant burden on Life Science researchers. Bioconda (https://bioconda.github.io/) is an emerging public resource, aiming to make software installations easier and analyses more reproducible.
In order to promote reproducible research and to provide easy access to bioinformatics tools, SciLifeLab staff at the National Bioinformatics Infrastructure Sweden (NBIS) and the National Genomics Infrastructure (NGI) are active developers of Bioconda. Today, the tool includes almost 3,000 software packages downloaded over 6 million times, as described in a recently released Bioconda bioRxiv preprint article. “Bioconda has simplified our day-to-day work, and we strongly recommend Life Science researchers to explore its possibilities”, says Per Unneberg, a staff bioinformatician at NBIS and one of the coauthors of the Bioconda article.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704798089.76/warc/CC-MAIN-20210126042704-20210126072704-00473.warc.gz
|
CC-MAIN-2021-04
| 1,580 | 4 |
https://keitaito.com/blog/2017/02/08/Swift-String-Index.html
|
code
|
When you want to get a character at n-th index from a string, you usually try to do it something like this:
let string = "pikachu" let character = string // expect "a".
However, it doesn’t work. It’s because Swift
String type has its
String.Index type, and it is different from other
String.Index is declared as
typealias Index = String.CharacterView.Index. On the other hand,
Array.Index is declared as
typealias Index = Int. Both of them are named Index, but under the hood of typealias, they are different types.
let string = "pikachu" let index = string.index(string.startIndex, offsetBy: 3) // 4th index is retrieved.
Now you get an index of type
String.Index. You can use it for subscript.
let character = string[index] print(character) // -> "a" is printed out.
Now you can print out a character from a string using index ⚡️
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499790.41/warc/CC-MAIN-20230130003215-20230130033215-00669.warc.gz
|
CC-MAIN-2023-06
| 839 | 14 |
https://pubmed.ncbi.nlm.nih.gov/32427906/
|
code
|
Floods are a major contributor to natural disasters in Sumatra. However, atmospheric conditions leading to floods are not well understood due, among other factors, to the lack of a complete record of floods. Here, the 5 year flood record for Sumatra derived from governmental reports, as well as from crowd-sourcing data, based on Twitter messages and local newspapers' reports, is created and used to analyze atmospheric phenomena responsible for floods. It is shown, that for the majority of analyzed floods, convectively coupled Kelvin waves, large scale precipitation systems propagating at ∼12 m/s along the equator, play the critical role. While seasonal and intraseasonal variability can also create conditions favorable for flooding, the enhanced precipitation related to Kelvin waves was found in over 90% of flood events. In 30% of these events precipitation anomalies were attributed to Kelvin waves only. These results indicate the potential for increased predictability of flood risk.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704833804.93/warc/CC-MAIN-20210127214413-20210128004413-00166.warc.gz
|
CC-MAIN-2021-04
| 999 | 1 |
http://stackoverflow.com/users/49914/jrotello
|
code
|
I graduated from Northern Illinois University in 2001 with a B.S. in Computer Science. My professional career has been primarily focused around the Microsoft .NET stack up to this point.
205 How can I make Sublime Text the default editor for Git? feb 23 '12
11 Initialising Lookup<int,string> mar 2 '10
6 How do I do this lamba statement as Linq To Sql? mar 3 '10
6 Help with c# and bool on asp.net mvc feb 3 '10
3 Create link for asp.net mvc application mar 2 '10
1 Jquery - change event firing on page load feb 5 '10
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701156448.92/warc/CC-MAIN-20160205193916-00003-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 518 | 7 |
http://forums.orcsmustdie.com/profile/reactions/RuneScaper?reaction=agree
|
code
|
- Last Active
I would also like to point out you're using the flag system incorrectly. Just because you don't agree with my posts it doesn't mean it warrants a flag. You have posted an idea on a community forums, the community will give feedback on your idea aswell as devs potentially looking into it.
I am trying to help you build a reason behind your idea to potentially make the devs interested. My first and second posts offered reasons why it was a bad idea, you was suppose to come back and give me a reason why it actually is a good idea. You didn't take the bait so I proceeded with my third message to explain in depth why you need to add those reasons.
See it from a devs point of view.
your title.. "survival with co op"
your first post "that would fix most my problems with this game"4
Yes, I guess you're right, if I want the accomplishment of having a higher rank then I will need to group up with some people of similar rank and avoid queuing up in solo.
yes I saw your screenshot, that sucks, I must admit I had to laugh when I first saw the picture, because it is quite unbelievable, I do hope he received a warning or some form of punishment though.
And that's also a good point I didn't take into consideration they may not speak English.
I think I just play way too many games of sabotage per day, so if I actually reflect on the newbie to experienced player ratio in actual respect I probably don't get matched with newbies that much, it's just very easy to focus on those times and feel like its happening all the time. (it does happen everyday though) I guess I will just focus on the bigger picture, I mean we're all newbies at one stage1
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886860.29/warc/CC-MAIN-20180117082758-20180117102758-00259.warc.gz
|
CC-MAIN-2018-05
| 1,663 | 10 |
http://www.speech-therapy-information-and-resources.com/syntax.html
|
code
|
ABSTRACT: Syntax refers to the rules that govern how words combine to create meaningful utterances. Morphemes combine to form words, words combine into phrases and phrases combine according to set rules into clauses.
An understanding of morphology demonstrates that there is an accepted sequential order for the addition of bound morphemes to free morphemes. So, the following sequences are acceptable.
However, the following constructions are not permitted by the sequential rules governing the placement of bound morphemes.
In other words, re- and dis- may only function as prefixes and -ation may only function as a suffix.
In just the same way that sequencing rules apply to morphemes, similar sequencing rules also apply at the word level. To illustrate, what does the following word mean?
Two common interpretations would probably be either, ‘without the power of sight’ or ‘a screen for a window’. Now, what does this word mean?
Did you interpret this as meaning ‘a native or inhabitant of Venice’? Perhaps you again considered it to mean, ‘a screen for a window’? But now consider the following.
Is this the same as the following?
It should be obvious that a Venetian blind is not the same as a blind Venetian!
This simple example illustrates very well the notion of syntax. It is apparent that the correct sequencing of words is crucial to convey the appropriate meaning. Syntactic rules, then, govern which words can be associated with which other words in a language, and in what order. Failure to follow the rules of syntax can result in meaningless word combinations, e.g.
to colleague not estranged my chose phone I
[cf. I chose not to phone my estranged colleague]
In contrast, an appropriate application of syntactic rules can lead to a variety of utterances, all of which convey the same essential meaning:
- The weary ploughman homeward plods his way.
- The weary ploughman plods his homeward way.
- The homeward ploughman plods his weary way.
- The homeward ploughman, weary, plods his way.
- The homeward, weary, ploughman plods his way.
- The weary, homeward ploughman plods his way.
- Homeward the weary ploughman plods his way.
- Homeward, weary, the ploughman plods his way.
- Homeward the ploughman plods his weary way.
- Homeward the ploughman, weary, plods his way.
- Weary, the homeward ploughman plods his way.
- Weary, homeward the ploughman plods his way.
- Weary, the ploughman plods his homeward way.
- The ploughman plods his homeward, weary way.
- The ploughman plods his weary homeward way.
- The ploughman homeward, weary, plods his way.
- The ploughman, weary, homeward plods his way.
- The ploughman, weary, plods his homeward way.
These examples of the plodding ploughman appear in an anonymous book written in 1883 entitled ‘English as She is Wrote’ – download a free copy here
Now, as you might expect, words also combine to form larger units. Consider the utterance my favorite soccer star scored the first goal. Notice that the words in this syntactically correct structure appear to combine into three units:
my favorite soccer star
the first goal
We can represent this as follows.
my favorite soccer star
the first goal
These units are known as phrases. Phrases represent an intermediate level of organization between the word and what is known as a clause.
We have seen how phrases may combine to construct larger units, e.g. we + are going + to Judy's + for dinner = we are going to Judy's for dinner. Such larger units are known as clauses. Clauses may be further combined in spoken language into so-called clause complexes, e.g.
|clause 1||conjunction||clause 2|
we are going to Judy's for dinner
it is Paul's birthday today
Here, two clauses are combined (conjoined) using the so-called conjunction because.
|< Prev||Next >|
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705502703/warc/CC-MAIN-20130516115822-00049-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 3,797 | 45 |
https://birbchirp.gitbook.io/switchguide/misc-useful-stuff/hekate-archive-bit
|
code
|
In my testing while not always needed, this is good to do in case your switch won't boot into its emuMMC, steps below can be used to set the archive bits. Also good to run if you're getting corrupted game issues, especially if you use a mac.
Step 1. Inject hekate_ctcaer_X.X.X.bin to your switch (where X.X.X is the release version of Hekate.)
Step 2. Navigate to Tools.
Step 3. Navigate to Archive bit - AutoRCM.
Step 4. Tap on both options under Misc relating to archive bit. This can take awhile (especially if you have Retroarch).
Note: On hekate 5.2.0 and higher, there's only one archive bit option, just run that.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514495.52/warc/CC-MAIN-20210118092350-20210118122350-00052.warc.gz
|
CC-MAIN-2021-04
| 620 | 6 |
https://bvsteenh.itch.io/group-22/devlog/37906/final-devlog
|
code
|
Here it is ! the final devlog of our game and also the final build. A lot has changed these last few weeks. Beside a lot of bugfixing, here is what happened.
To complete the game we added a score system. This way you can keep track of who has won the most rounds. this will be shown in the player UI.
We added some smoother transitions in between the stages of the game and fixed a lot of buggs with the camera.
Added an outline when the caracter is behind an object (like the giant gingerbreadman).
Implemented more sounds.
Implemented more particle effects.
Added a taunt.
You can now go back to the menu when racing.
Lot's of buggfixes
We also noticed that the end of the level to easy to pass. So we spiced it up a little. Now when two player get near the finish , there ll be more opportunities to push each other off the map to decide the winner.
Beside the harder end of the level ,we also added slowtraps on several parts of the track so there are almost no parts where the player can just run his way through. The track has become gradually harder to pass the closer you get near the finish.
Get [Group 22]Can Die Rush
Leave a comment
Log in with itch.io to leave a comment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347432521.57/warc/CC-MAIN-20200603081823-20200603111823-00171.warc.gz
|
CC-MAIN-2020-24
| 1,183 | 14 |
http://support.loaddrive.org/error-connecting-to-dymola-license-server.html
|
code
|
Error Connecting To Dymola License Server
not distributed with Dymola. Your cache You will eventually check it out for the other protocols you only have a single user.
Logging canbe enabled Unity 5.x Editor (including Win 10). Please check that you have entered the Test: can everyone get the equations page showing for mass2? This means that there is no need to remove previous version(s) look at this web-site Modelica 3 semantics and uses Modelica 3 graphical annotations.
how to set it up correctly. Thismay allow Dymola to deduce that the equations are size consistent Compiler tab. Linux To install the Linux 64 bit version of
Installingthis component only will create a directory C:\Program Files\Dymola 7.1\bin wherethe 2016 FD01 trial version from Dassault. be selected using the command Edit > Options…selecting the Versions tab. Dymola can deduce the number automated translation is perfect nor is it intended to replace human translators. SDL disclaims any and all warranties, whether express equations.
Click because the system actually is singular from that respect.could not compile and simulate the example. Does anyone know how http://producthelp.sdl.com/kb/Articles/5347.html you can bring your own model and questions. make this better?
The default the Rational License Server and the product. Running simulation: (20 minutes) Go to simulation tab Press select Run as Administrator.
The requirements on local more info here of Dymola.22Dymola supports Microsoft Visual Studio 2008, both the Professional edition and theExpress edition.
This feature is enabled in the Modelica but where you do not use it.remote host or network may be down. We recommend Visual C++ 2008or later.To change the compiler Dymola
http://support.loaddrive.org/error-connecting-to-registry-on-server.html Manager:Click Start > Programs > ArcInfo > License Manager > License Manager Tools. Try yourself: (30 Starting a test. Reasonable efforts have been made to provide an accurate translation, however, no Start Chat Questions or issues with the site?
+ R] for Window 7/8. The visit article is its English version. Failed compilation on Windows Some users reduction”, the index reduction algorithm focuses on the structure of theequations.
Dymola run-time works both for the DymolaSimulator (dymosim.exe) the request again. Please read corresponding sections in this booklet for more information.Administrator privileges are FD01 and the Modelica Buildings library as described below.
Shuttle takes you directly to building 90.
Type cmd to get models, better possibilities for gooddiagnostics (because e.g. administrator is webmaster. Invision Power Board © a window displaying thediagram layer, with relevant zooming. Yes No We're glad to with the Berkeley Lab shuttle bus sign.
with the product installers might not be configured. Also, possibly the settings of the schedule are such, 2001-2016 Invision Power Services, Inc. We will use the time to debug, http://support.loaddrive.org/error-connecting-device-bluetooth-mac.html both masses as a function of time. Computers where you installed Rational License Server
a schedule in one of the following protocols. Please -R=RR1R=RR2groundL=LL1L=LL2The model has two potential state variables, namely the currents through the inductors: L1.iand L2.i. Therefore you have five (5) users for HTTP, but various stops in downtown Berkeley.
In this example it is easy correct license server name and have network access. We will not information, formatting and images, please click here. Back to top SCENARIO 4 Obtain a to see for a human being.
The C compiler needs to be installed only once,even if you install multiple versions ServerThe option License server is now available when selecting components to install. When the repair is finished, start Studio that has both Rational Performance Tester and IBM Rational License Key Server. SCENARIO 1: Close occurs in different scenarios.
Start the Rational (2) licadmin.exe files on your computer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578806528.96/warc/CC-MAIN-20190426133444-20190426155444-00528.warc.gz
|
CC-MAIN-2019-18
| 3,990 | 19 |
https://bugzilla.xfce.org/show_bug.cgi?id=170
|
code
|
When I push alt-tab, I expect my window to be changed to the last selected
window. But, most of th time, the "Task List" get's in the cycle (because it
just selected the window when you push alt tab), and I cannot readily switch
let me guess - you're using gtk 2.4? if that's the case, wait for 4.0.5, as
it has a number of gtk-2.4-related fixes.
That's because of gtk 2.4, it's already fixed in CVS.
appears to be a stale bug - closing
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880014.26/warc/CC-MAIN-20201022170349-20201022200349-00117.warc.gz
|
CC-MAIN-2020-45
| 436 | 7 |
https://sportsclinictampico.com/life-hack/how-to-resize-your-ubuntu-partitions/
|
code
|
I’ve set my grandson’s laptop to be able to dual boot (Vista and Ubuntu). I’d like to give as much space as possible to Ubuntu as Windows isn’t used much. I’m pretty noob to Linux and have no real idea how to use gparted.
Here is a screenshot of gparted; it’d be great if someone could explain what it means and how to give more space to Ubuntu and less to Windows.
2 Answers 2
This is what to consider before we can change partition size:
- Changing partitions always bears a risk of data loss. Therefore backup all valuable data.
- Only partitions that are unmounted can be altered, i.e. work on a live session (boot Ubuntu “Try out”).
- Ubuntu does not need much space (30 GB) but knowing that the other OS is Vista it may really be better to give Vista as little space as possible but not too small (or remove it entirely if you grandson agreed).
- Ubuntu needs two partitions at least (root partition / , and swap) but it can handle more if needed. Some people recommend a seaparte HOME partition, which eases distribution upgrades and backups.
- Swap needs to be in a single partition with no holes. It is therefore in the way when you enlarge your NTFS partition to hold Ubuntu.
- Windows must not be hibernated.
- We can only have 4 primary partitions in an MSDOS partition table. Make extended partitions to hold Ubuntu.
From your present partition layout it appears that the root partition for Ubuntu is a bit too small, and the swap partition is in the way of increasing your root partition.
It is possible to add a swap partition later but this may be too complicated for a first start into the Ubuntu universe.
Let me therefore recommend that you
- Backup all valuable data
- Delete and remove your existing Ubuntu partitions (this will delete all data in them!)
- Resize (shrink) the Windows partition (to the right side) according to the excellent answer you already have (but you may have to repair your filesystem from a Vista CD), or from Windows. Shrinking may need a defragmentation first.
- Re-install Ubuntu to the now sufficiently large unpartitioned space you will have gained in step 3.
- On re-installation of Ubuntu take care to select the unpartitioned space for installation of / , swap , and if applciable /home on “Do something else”, or let the installer automatically do this for your by choosing “Install alongside of Windows”.
I only have access to the server via a terminal and I can’t use graphical tools such as GParted!
I want to create a new partition from a part of the root (about 768mb) for swap.
3 Answers 3
You cannot shrink/edit a partition if any of the partition on the storage device is mounted. So in order to unmount and edit the root filesystem, the OS need to be shutdown. Then boot into a live system and edit the partition as described in other answers.
As an alternative to creating an entire partition, a swap file offers the ability to vary its size on-the-fly, and is more easily removed altogether. Swap file can be hot plugable. i.e can be added and removed without unmounting/turning off the OS.
Create a 512 MB file called /swapfile . This will be our swap file.
Set the right permissions (because a world-readable swap file is a huge local vulnerability):
After creating the correctly sized file, format it to swap:
Activate the swap file:
Edit /etc/fstab and add an entry for the swap file:
First of all is important to know that you cannot resize to shrink your root partition if you are using it (This is called online shrinking). You can only grow it online. This is supported by the resize2fs command. I will assume the following:
- You don’t want to loose your information on the root partition.
- You don’t have physical access to the hard drive in order to use a LiveCD. This can apply to a virtual environment or a remote one. In the case of a virtual one you can still manage to boot from a LiveCD if you set the VM to boot from a LiveCD. This is assumming the VM supports outputting the Desktop GUI from where you would run the Gparted app to resize easily. But since this is less likely I assume you can not.
There are 2 type of partitions that you can resize, the LVM partitions or Logical Volume Manager partitions which support Online resizing (Shrinking/Growing) since the creation of the galaxy and the standard partitions most of us use. Right now the only one that has almost 100% support of complete online resizing (Shrink/Grow) is the btrfs filesystem (Which is still in development). I will explain how to do the normal partitions most of us use in the ext4 filesystem.
Resizing (Growing) the Partition
To grow your partition you can do it with the root mounted. To do this simply do:
Provided you already have the empty space ready to be merged. Afterwards I recommend rebooting for the changes to take effect correctly. The command above would resize to the maximum permitted. If you wish to resize to a particular size then simply add the size at the end:
Note that if you want to specify 25.4 GB, you can not use the “.”. you would need to go down one unit of measure. In this case from GB to MB, so it would look like this:
This way you will have a partition of 25.4G
Resizing (Shrinking) the Partition
Shrinking the partition is a two step process which involves:
- Reducing the size of the file system by the amount needed.
- Reducing the size of the underlying block device to match that of the file system.
Before reducing the capacity of a file system you need to reduce the size of the block device (Which can be a partition or a logical volume). Since this is not available for any of the ext* file systems you won’t be able to shrink it from 20 GB to 19.5 GB to create the 500 MB swap one.
Even Ext4 does not support online shrinking. If you try to do it you will get the following:
Your only bet as far as I know is to either:
Install another Ubuntu version on the same server (On another partition) that can then be used to shrink the root partition of the original Ubuntu Server.
Install Ubuntu server from scratch with the size you actually want
Use the Ubuntu Server Live Image to resize the partition. For this case, you will need to get to this screen:
And choose the Resize option as shown in the image above. From there you will select what the new size will be since from here you can unmount the unit and shrink it if you want.
As an additional help here is the gparted filesystem suppor http://gparted.org/features.php which gives a very detailed list of supported ones and includes if they have full online resizing. Btrfs is amongst them.
The answer depends on whether you can unmount the partition to shrink, or not. In your case, you probably cannot unmount the partition. In Linux (UNIX/MAC OS), mounting a partition refers to using the file system and mapping it to the mount point (in your case / ). Unmounting means that you stop using the filesystem, and remove the mapping to the mount point. You cannot unmount the filesystem containing your running OS.
If the partition can be unmounted
Lets assume you want to shrink a 200GB ext4 partition on /dev/sda4 mounted to /data . It currently contains music and movies or similar, so you can temporarily unmount it. You want to create a 4GB swap.
to unmount the partition.
to resize the ext4 filesystem to 196 GB, assuming that there is enough space. Now, you have to shrink the partition. I currently belive you need to use cfdisk to delete the existing partition, and recreate a smaller partition in its place. You can then also create a new partition for the swap.
will give you a text-based gui to inspect your partition table. I would recommend you to print the partition table to a file or screen at that point, and take note of the current configuration as backup. You can then select /dev/sda4 and delete the partition. In its place, free space will be displayed. Use new to create a new partition with 196 GB in its place, and set the type to ext4. Then, move to the trailing free space and create the 4GB swap partition with type swap . Note: I did not test these commands, as I can’t play around with my / at the moment.
If the partition cannot be unmounted
You cannot shrink a mounted ext3/4 partition (see manpage of resize2fs ). As you are running your OS from / , you cannot unmount / . That means you have to boot another OS (e.g. from USB key) to do the changes.
In your case, it is a remote server (on KVM most likely), so you might not be able to boot from USB/ a live OS image. There might be other ways to change the partitioning from your vServer provider through an admin GUI. I believe that is your best bet currently.
Updated July 4, 2017, 1:48pm EDT
Whether you want to shrink your Ubuntu partition, enlarge it, or split it up into several partitions, you can’t do this while it’s in use. You’ll need a Ubuntu live CD or USB drive to edit your partitions.
The Ubuntu live CD includes the GParted partition editor, which can modify your partitions. GParted is a full-featured, graphical partition editor that acts as a frontend to a variety of Linux terminal commands.
Boot From CD or USB Drive
If you have the CD or USB drive you installed Ubuntu from, you can insert it into your computer and restart. If you don’t, you’ll have to create a new Ubuntu live media. You can download an Ubuntu ISO from Ubuntu.com and burn it a disc by right-clicking the downloaded ISO file and selecting Write to Disc.
If you’d rather use a USB drive, use the Startup Disk Creator application, which comes with Ubuntu. You’ll find it in the Dash.
Provide the Startup Disk Creator application with a Ubuntu ISO and a USB flash drive and it will create a live USB drive for you.
After creating the live media, insert it into your computer and restart. If the live environment doesn’t start, you may have to enter your computer’s BIOS and change its boot order. To access the BIOS, press the key that appears on you screen while your computer boots, often Delete, F1, or F2. You can find the appropriate key in your computer’s (or motherboard’s, if you assembled your own computer) manual.
While the GParted partition editor isn’t present by default on an installed Ubuntu system, it is included with the Ubuntu live environment. Launch GParted from the Dash to get started.
If you have multiple hard drives in your computer, select the appropriate one from the drop-down box at the top right corner of the GParted window.
Partitions can’t be modified while they’re in use – partitions in use have a key icon next to them. If a partition is mounted, unmount it by clicking the eject button in the file manager. If you have a swap partition, the Ubuntu live environment will likely have activated it. To deactivate the swap partition, right-click it and select Swapoff.
To resize a partition, right-click it and select Resize/Move.
The easiest way to resize a partition is by clicking and dragging the handles at either side of the bar, although you can also enter exact numbers. You can shrink any partition if it has free space.
Your changes won’t take effect immediately. Each change you make it queued, and appears in a list at the bottom of the GParted window.
Once you’ve shrunk a partition, you could use the unallocated space to create a new partition, if you like. To do so, right-click the unallocated space and select New. GParted will walk you through creating the partition.
If a partition has adjacent unallocated space, you can right-click it and select Resize/Move to enlarge the partition into the unallocated space.
To specify a new partition size, click and drag the sliders or enter an exact number into the boxes.
GParted shows a warning whenever you move the start sector of a partition. If you move the start sector of your Windows system partition (C:) or the Ubuntu partition containing your /boot directory – likely your primary Ubuntu partition – your operating system may fail to boot. In this case, we’re only moving the start sector of our swap partition, so we can ignore this warning. If you’re moving the start sector of your main Ubuntu partition, you’ll likely have to reinstall Grub 2 afterwards.
If your system does fail to boot, you can consult the Ubuntu wiki for several methods of reinstalling GRUB 2. The process is different from restoring the older GRUB 1 boot loader.
Click the green check mark icon on GParted’s toolbar to apply the changes when you’re finished.
Back ups are always important. However, back ups are particularly important if you’re modifying your partitions – a problem could occur and you may lose your data. Don’t resize your partitions until you’ve backed up any important data.
After you click Apply, GParted will apply all queued changes. This may take a while, depending on the changes you make. Don’t cancel the operation or power down your computer while the operation is in progress.
Restart your system and remove the CD or USB drive after performing the operations.
I’m using Ubuntu 20.04 and during the installation process I opted for manual partitioning, and I chose to keep root and home separate. So at the end, I obtained this configuration:
- 650 Mb EFI partition (sdb3)
- 20 Gb root partition @ / (sdb4)
- 10 Gb swap partition (sdb5)
- about 650 Gb partition (remaining free space) @ /home (sdb6)
Now I noticed that 20 Gb could be too little for root partition as this partition is already full for 80% of his dimension, so basically I may have been wrong to reserve only 20 Gb for it. I have to say that, at the moment, I haven’t particular problems with this configuration but maybe I could face them in the future.
Can I resize the root partition taking some space from home partition? As I see here How to resize partitions? I must use Gparted from liveUSB since it is not possible to modify mounted partitions, but as I explained home and root partitions aren’t close to each other (there is swap partition in between). Is this a problem?
NB.: There isn’t free space or unallocated space on sdb.
Additional informations: This is a dual boot stystem (on two different drives, win 10 is on sda). I did not mention “sdb1” and “sdb2” because before installing Ubuntu on “sdb” I chose to create (from win 10) a shared ntfs partition for both OS, here called sdb2, while sdb1 is an automatic generated partition labeled “Microsoft reserved partition”
A partition is the name given to each of the divisions that are present on a single physical storage device. For example, to illustrate, if you have several partitions, it is as if you had several hard drives on a single physical hard drive and each would have its file system and operation different from the others.
You can use these partitions for various things. For example you can use them only to store important data with security measures, you could also make backup copies of your files and use them to install different operating systems.
In operating systems such as Linux it will allow you to structure the disk into partitions for all the different files that this system uses. And that’s not all, you can also resize these partitions on your hard drive, and even install an operating system on an external hard drive .
In this article we will show you how to resize hard drive partitions in Ubuntu from your console easily. This time we will use the Ubuntu 13.04 operating system to do all the procedures.
How to resize hard drive partitions?
Although having the Linux system offers you many advantages, the truth is that one of its disadvantages is that unlike Windows, it cannot resize partitions of a hard disk or of a system that you are using. This occurs because in order to do this type of procedure, it is necessary to unmount the volume and resize it . Additionally there are differences between disk partitions .
We say that it is a disadvantage of Linux, since to do this same procedure in Windows you just have to go to its native disk management tool and from there you can resize the volume even if you are using the same drive where the Microsoft operating system is hosted.
Unlike Linux, it will not be necessary to unmount the drive volume and you can do the procedure in just a few minutes.
If you are here it is because you will do this procedure using Linux, but being different from Windows it is necessary that you do it from a Live CD or Ubuntu Live USB. In this article we will show you how to do it from the Live USB of Ubuntu version 13.04 as we mentioned earlier.
The first step you must follow is to reboot your system and boot it with the Ubuntu 13.04 Live USB, this process can be programmed directly from the Bios by selecting the USB device. Once your system has booted with the Live USB, you must open the Yumi program.
Previously installed, and select the Linux distributions option from its main screen and then the option to try Ubuntu 13.04 but without installing it on the hard disk. Once the Ubuntu desktop can be seen on the screen, you must follow these new steps that we will give you below.
What are the steps to follow to resize partitions?
Once you have started your system from the Live Distro, you must go to Dash and type the following: gparted
Now you must click on the icon and a window that is the main one of gparted should automatically appear on the screen, this is the one that will allow you to manage your hard disk drives.
You must select the Linux partition that has the EXT format, you must place your cursor on it and with your mouse right click, and in the options that were displayed choose the Resize / Move option .
You will be able to see a new window unfold where you will have to modify the partition that you have selected but without damaging the Ubuntu 13.04 operating system that will be hosted there.
For you to be able to resize the Linux partition, you have to go directly into the configuration and write in the text box the amount of space you want on the partition or by moving the upper bar to the left or right until you get the desired size.
When you have finished this procedure and you have the desired size or dimension, you must click again on the Resize / Move option and the process will start .
It will take at least a couple of hours until it is ready. And that will be the whole procedure that you are going to carry out, you will already be able to count on your resized Linux partition . Although it may seem a bit complicated, the truth is that when you start the process you will see that it is not difficult at all.
Do you have a hard drive partition on your Linux PC that you’d like to make bigger or smaller in size? Unsure about how to resize hard drive partitions on Linux? Follow along with this guide and soon you’ll know how to use the Gparted partition editor to resize hard drive partitions on Linux!
Resize a non-OS related partition with Gparted
You may have a hard drive partition on your Linux PC that isn’t in use by an operating system that you want to resize. Thankfully, non-OS related partitions don’t need to be accessed via Live disk. Since no operating system is using this partition, it can be resized directly on your current operating system with the Gparted application.
Resizing hard drive partitions on Linux can be done through the command-line and graphical tools. All of the different hard drive management tools available for Linux work quite well. However, in this guide, we’ll be focusing on the Gparted application, as it’s the easiest to understand for beginner Linux users.
Before we go over how to resize non-OS related partitions, you must install the Gparted app on your Linux system. To start the installation, open up a terminal window by pressing Ctrl + Alt + T or Ctrl + Shift + T on the keyboard. Then, follow the installation commands that match the OS you currently use.
Ubuntu users can install the Gparted app directly from the primary Ubuntu software repository with the following Apt installation command.
Gparted is in the “Debian Main” software repository for all versions of Debian Linux. To install it, use the Apt-get command below.
For Arch Linux, the Gparted app is in the “Extra” software repository. To install it on your Arch system, ensure the “Extra” repo is enabled. Then, use the Pacman command below.
Gparted is available to Fedora users in the primary Fedora repo. To install it, use the following Dnf command.
On OpenSUSE Linux, you’ll find the Gparted application in the “Oss all” repo. To install it, use the Zypper command below.
Once the Gparted application is installed on your Linux PC, press Alt + F2 to open up the quick-launcher, then, run the command below to open the newly installed application.
With the partition editor open, look for the drive that holds the partition you’d like to resize, by selecting it in the drop-down menu at the top-right section of the screen.
Let Gparted load the hard drive. After the app is done loading up the drive, find the specific partition you need to re-size, and right-click on it with the mouse to open up the right-click menu.
Choose the “resize” option in the right-click menu, and the “Resize/Move” partition will appear. From here, use the graphical resizer to drag the partition to make it bigger or smaller. Alternatively, find “New size (MiB)” and multiply it by 1024 to get it to exactly the right size. For example, to resize a 10 GB partition to 5 GB, you’d do:
When you’re satisfied with the new size of the hard drive partition, click the “Resize/Move” button, followed by the check-mark button at the top to apply the changes.
Resize your OS partitions with Gparted
Needing to resize a partition on your Linux hard drive that contains your current Linux operating system? If so, you must download the Gparted live disk, as it isn’t possible to resize partitions currently in use.
To get your hands on the Gparted live disk, open up a terminal window by pressing Ctrl + Alt + T or Ctrl + Shift + T on the keyboard. Then, use the wget download tool to grab the latest live image of Gparted.
When the download for the Gparted live ISO file is complete, plug in a USB flash drive into the USB port and use the Etcher imaging tool to create a bootable live disk.
After making your Gparted bootable live disk, reboot the computer and load up the BIOS settings. Look through the BIOS settings and configure it to load from the Gparted live USB.
Once the Gparted live session is loaded up from your USB, let it load up. When it does, do the following operations outlined in the list below.
- For “Configuring console-data” select don’t touch keymap.
- For language, enter a number from the list above. Or, press Enter to go with the default that the OS detected.
- For “Which mode do you prefer” type in “startx” and press the Enter key.
Soon after writing in “startx” in the shell on screen, a graphical environment will appear, along with the Gparted partitioning tool. Using the tool, click the drop-down menu at the top right, and select the drive you’d like to work with.
Once you’ve selected the hard drive you want to work with, locate the hard drive partition which you’d like to re-size, and right-click on it. Then, look through the right-click menu, find “Resize/Move” and click it to open up the partition “Resize/Move” menu.
Inside of the “Resize/Move” menu, use the graphical tool to drag your hard drive partition to make it smaller or larger. Alternatively, click on “New size (MiB)” and multiply the number 1024 by the number of GB to resize it to an exact size.
When you’re happy with the new size of the partition, click the checkmark button at the top of the app to apply the changes.
Reboot when done working with the Gparted live disk. Upon logging back into your OS, the partition should be resized to the size you specified!
- Page History
- Login to edit
If you wish to create a partition (in which to install Ubuntu Linux, for example) on a hard drive which already contains a Windows partition, or if you need to provide more space in an existing partition that is running out of space, you will need to perform one or more partition resizing operations. You can re-allocate hard drive space from one partition to another, or add previously UnallocatedSpace to a partition.
Resizing Windows Partitions requires special attention and is accomplished in a manner different from that used to resize other types of partitions.
” height=”16″ src=”/moin_static198/light/img/icon_cool.png” title=”Info ” width=”16″ /> When shrinking a partition containing data, attention must be given to the amount of free space left in the partition; especially a Windows partition, but true for any filesystem. The less room left in a partition, the more likelihood of fragmentation of files, and the harder it will be to defragment that partition.
Rule of Thumb: Leave at least 10% free space on any partition to reduce fragmentation and make defragmentation easier.
Note that, in order to expand a partition, you must have free space next to it in which to expand. This can be accomplished either by shrinking another partition next to it, or moving a (or some) partition(s) away from it. See the Moving A Partition page for details on moving a partition.
See notes in Additional Notes on Partitions on the Operating Systems And Primary/Extended Partitions page for additional restrictions on resizing operations.
To resize a partition, first make sure the partition is unmounted. If the partition is mounted, most of the options in the menu will be unavailable, except for one that says “Unmount,” which you should select to unmount the partition.
Notice in the image that the partition I am resizing is the Windows NTFS partition that covers the entire hard drive, which I created earlier. A new Windows computer’s hard drive will typically be formatted in this manner; one large partition covering the entire drive.
Once you are sure the partition is unmounted, right click on the partition you wish to resize and select “Resize/Move” from the menu as illustrated above. You will then be presented with the following:
Resizing a partition can be done one of two ways:
Dragging and sliding . Position the cursor over the arrow on either side of the graphical bar shown in the screenshot, left click and hold, then drag the arrow; away from the edge for shrinking or towards the edge (into the free space, if available) to expand it.
Changing the “New Size” or the “Free Space Preceding/Following” sizes. This can most easily be done by changing the size of the partition itself. This is done either by using the up/down arrows to the right of the “New Size” window, or by directly editing the size itself in that Window. Alternately, you can shrink the partition by increasing the non-zero side of the partition in either the “Free Space Preceding” or “Free Space Following” window.
If you attempt to expand the partition by decreasing the non-zero side of the partition (“Preceding” or “Following,” depending on where the free space is), it will move the partition instead of increasing it’s size. The same will apply if free space exists on both sides of the partition. See Moving A Partition for details.
After changing the size of the partition, just click the “Resize/Move” button, and the changes will be recorded and visible in a window at the bottom. When you are sure that you have resized it as you desire, you click the “Apply” button at the top and the partition will be resized. Your hard drive will then be as follows:
HowtoPartition/ResizingPartition (последним исправлял пользователь ben64 2018-01-15 10:38:20)
The material on this wiki is available under a free license, see Copyright / License for details
You can contribute to this wiki, see Wiki Guide for details
By Irene | Follow | Last Updated November 25, 2020
Some users don’t know how to resize Ubuntu partition when they find the partition size is unreasonably. This article will show you how to resize Ubuntu partition under Windows.
Quick Navigation :
- What Is Ubuntu
- Ubuntu Resize Partition
- User Comments
What Is Ubuntu
Ubuntu is a kind of Linux operating system, and it is developed by Mark Shuttleworth on the basis of Debian. This operating system is developed to make it easy to use personal computer. At the same time, it also offers server edition for enterprise.
Users who have used Ubuntu know Ubuntu computer can be used once it opens instead of costing much time to install browser, media player, office suite, and other commonly used software, which promotes the ease of use of the system.
Besides, this operating system provides users with many drives of hardware device. Therefore, Ubuntu is preferred by many Linux fans and has become the best Linux operating system.
However, as time goes by, they may find the Ubuntu partition is unreasonable and want to resize the partition. Under this situation, many users don’t know how to resize partition Ubuntu as Ubuntu operating system is different form Windows and some Windows disk partition resizer cannot be used in Ubuntu.
Since Ubuntu and Windows are different operating system platforms, the simplest way to resize Ubuntu partition is that you can do the Ubuntu partition resizing under Windows if your computer is dual-boot.
It is recommended to use a reliable third-party software to resize Ubuntu partition as Windows built-in Disk Management is much limited when you use its Extend Volume or Shrink Volume to resize partition. See: Why Extend Volume Grayed out and How to Quickly Fix It
Ubuntu Resize Partition
Why Do You Choose MiniTool Partition Wizard Free Edtition
As is known to all, there are many excellent partition managers on the market to help Windows users to resize partition and manage disks and partitions. However, most of them do not support Ubuntu partition resizing.
Luckily, nowadays, dual booting Linux with Windows is always suggestible for the beginners. For this kind of users, they can resize Ubuntu partition under Windows operating system with a third-party partition manager.
You can choose MiniTool Partition Wizard Free Edition to resize Ubuntu partition or Windows partition as this partition manager won’t damage data on related partitions, and you can manage Windows partitions and Ubuntu partition at ease with just one partition manager.
How to Resize Ubuntu Partition with MiniTool Partition Wizard?
Step 1. Download MiniTool Partition Wizard Free Edition by clicking the following button. Install it on your Windows operating system and launch it to get the main interface.
Step 2. Select the Ubuntu partition that you want to change size, and click Move/Resize Partition option from left action panel.
Step 3. In the resizing interface, drag the partition handle rightwards or leftwards to extend or shrink partition. Then, click OK to go back to the main interface.
Step 3. Next, click Apply to perform the pending operation.
You see, it is not impossible to resize partition in Ubuntu. If you are an Ubuntu and Windows dual-boot user, you can resize Ubuntu easily with MiniTool Partition Wizard under Windows.
If you have any question about Ubuntu resize partition with MiniTool Partition Wizard, you can leave a message on the following comment zone and we will reply as soon as possible. If you need any help when using MiniTool software, you can contact us via [email protected] .
Even though my SD card is 16GB, the image I flashed onto it was only 2GB and now I can only see 2GB of storage space on the disk.
How can I resize the image so that I have more space on my root partition?
5 Answers 5
Assuming you are using Debian.
The Short Version:
- Backup your system
- Remove the main and swap partitions (leaving the boot partition alone)
- Recreate the main partition to utilize the remaining disk space (excluding the boot partiton). Make sure to reuse the same start sector as the original root partition.
- reboot the system
- resize the new boot root partition to utilize the full partition size.
Step by Step Instructions
First make a backup of your SD Card using the instructions found here in case something goes wrong.
From the command line or a terminal window enter the following
then type p to list the partition table
you should see three partitions. if you look in the last column labeled System you should have
- W95 FAT32
- Linux Swap
make a note of the start number for partiton 2, you will need this later. though it will likely still be on the screen (just in case).
next type d to delete a partition.
You will then be prompted for the number of the partition you want to delete. In the case above you want to delete both the Linux and Linux swap partitions.
So type 2
then type d again and then type 3 to delete the swap partition.
Now you can resize the main partition.
type n to create a new partition.
This new partition needs to be a primary partition so type p .
Next enter 2 when prompted for a partition number.
You will now be prompted for the first sector for the new partition. Enter the start number from the earlier step (the Linux partition)
Next you will be prompted for the last sector you can just hit enter to accept the default which will utilize the remaining disk space.
Type w to save the changes you have made.
Next reboot the system with the following command:
once the system has reboot and you are back at the commandline enter the following command:
Note: this can take a long time (depending on the card size and speed) be patient and let it finish so you do not mess up the file system and have to start from scratch.
Once it is done reboot the system with the following command:
You can now verify that the system is using the full capacity of the SD Card by entering the following command:
Why This Works:
The real magic here is that you delete the root and swap partitions, then recreate only the root partition (using the original start sector) before writing the data to the disk. As a result you don’t erase the existing data from the root partition.
By removing the swap partition you allow the root partition room to grow beyond its current size and fill the unused portion of the disk (because of the placement of the partitions -the root partition is sandwiched between the boot and swap partitions – it can’t simply be resized leaving the swap partition alone).
You then resize (which is safe to run on a mounted disk) the file system to use all the space in the new root partition.
Using the Debian-Wheezy Beta image, there is a configuration utility built in that makes this easy:
There is a utility called raspi-config . This runs on first boot if you’re connected directly to the RPi. If you’re over SSH you can run it manually using $ sudo raspi-config . (I think you can re-run the tool manually at any time).
The second option on the blue dialog that follows is titled expand_rootfs , with the description “Expand root partition to fill SD card”.
Selecting this will cause your root partition to be resized to fill the card the next time you boot your RPi.
Update for 2015!
I’m coming back to this answer with a note of caution: I have been using a bunch of 16GB SD cards, and I got caught out by maxxing my partition to fill the card I was using. Doing so caused a bunch of problems when switching to a new card which (even though it was stated as 16GB) was about 200MB smaller than the older card.
This came to a head when I switched a couple of RPis from v1 to the new v2 model, which uses Micro SD cards.
I now leave about 1GB free to make absolutely sure that my images can be switched between SD cards without issue.
If you are not very comfortable working on the command line, like in Steve Robillards excellent answer, there are some GUI applications available. In particular gparted works very well.
I think it’s installed by default on a Ubuntu LiveCD but not on an installed system. There is of course an easy fix for this: apt-get install gparted . You can’t do this on the actual Pi, because to resize partitions they need to be unmounted.
The picture below is in Dutch, but don’t let that spoil the fun. It’s very easy to use. This is the layout of the default debian image on a 8gb sdcard.
Right-click the partions to unmount them and then right-click to resize or move the partition. You can also create new partitions and format existing ones. In the picture below I’ve removed the swap partition and now I’m able to resize the root partition to the entire space on the right of it. Don’t fill it entirely, because you still have to add a swap partition.
You can play with the partition layout, changes are only written if you apply the changes (the grayed out ‘return’ key in the first picture).
It’s very easy to move partitions but like in Steve’s answer I’d recommend you remove the swap partition entirely, then resize the root and then recreate a swap. Moving a partition can take a very long time and the swap does not contain data you need to keep.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337360.41/warc/CC-MAIN-20221002212623-20221003002623-00459.warc.gz
|
CC-MAIN-2022-40
| 37,148 | 235 |
http://www.audreyhawkinsnyc.com/blog/2009/07/1000-voices-part-ii.html
|
code
|
This illustration if for my friend Mimi. It illustrates her opinion for Evan Turk's A Picture for a Thousand Voices project.
Often, I do a couple of versions. Here's the other one that I liked:
Equality is achievable if we keep our hopes alive,
because the minute we back down is the minute
they'll think they've won! - Mimi
Mostly I wanted to express Mimi's determination to persevere, and her hope that, through that perseverance, over time we can achieve equality. Since Mimi's opinion was fairly general and abstract, I kept the illustration abstract. I hope she likes it!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665521.72/warc/CC-MAIN-20191112101343-20191112125343-00435.warc.gz
|
CC-MAIN-2019-47
| 576 | 6 |
https://docstrings.github.io/sym/ebnf-print-buffer.html
|
code
|
Generate and print a PostScript syntactic chart image of the buffer.
When called with a numeric prefix argument (C-u), prompts the user for
the name of a file to save the PostScript image in, instead of sending
it to the printer.
More specifically, the FILENAME argument is treated as follows: if it
is nil, send the image to the printer. If FILENAME is a string, save
the PostScript image in a file with that name. If FILENAME is a
number, prompt the user for the name of the file to save in. (fn &optional FILENAME)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143805.13/warc/CC-MAIN-20200218180919-20200218210919-00171.warc.gz
|
CC-MAIN-2020-10
| 517 | 8 |
https://tecadmin.net/fedora-23-released-whats-new/
|
code
|
Fedora 23 final has been released on Nov 3, 2015 and available for download. The release was delayed by a week. Fedora 23 has lots of changes, improvements and security fixes. This article will give you details about few major changes in this release.
Changes in Fedora 23
- Releasing with Linux Kernel 4.2
- Update the Mono stack in Fedora from 2.10 to 4.*
- Disable SSL3 and RC4 cipher by default.
- Perl version 5.22.
- Python 3 as the Default Implementation .
- Changed location of the SELinux policy store.
- Unicode 8.0 support.
- Fedup is being redesigned and integrated into DNF.
Download Fedora 23 Editions
Fedora is now more focused and available to download in 3 variants. Visit the following links to download Fedora 23 variants as per your choice.
1. Work Station Edition – This is useful for desktop and laptop users. It is build with complete set to tools for developers.
2. Server Edition – Fedora servers are fully loaded with data-center technologies. These are best suitable for your servers.
3. Cloud Edition – It provides the minimal operating system with essential tools only. It is designed keeping mind for cloud servers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00678.warc.gz
|
CC-MAIN-2023-50
| 1,151 | 15 |
https://www.cfd-online.com/W/index.php?title=Flux_limiters&oldid=5370
|
code
|
Most of us might have seen the behaviour of numerical schemes in order to capture shocks and discontinuity that arises in hyperbolic equations. Physically, these equations model the convective fluid flow. It has been observed that low-order schemes are usually stable but quite dissipative in nature around the points of discontinuity/shocks. On the other hand higher-order numerical schemes are unstable in nature and show oscillations in the vicinity of discontinuity. One can have a batter understanding of this behaviour by analysing the modified equation of these schemes.
The problem is that one can not have high order accuracy without oscillations and without oscillations one has to compromise for accuracy. One needs to optimize these two extremes in order to have highly accurate and stable oscillation free methods. In order to do so, an idea of flux limiters came into the picture. According to the idea, one tunes the numerical flux in such a way that the resulting scheme gives a second order accuracy in the smooth region of flow and sticks with first order of accuracy in the vicinity of shocks/discontinuities. This kind of schemes are known as high resolution schemes and in 1984 Harten gave a paper on one such scheme in Math. Comp. The idea goes like this:
Define the numerical flux fuction of high resolution conservative scheme as
where are the numerical flux of conservative low order and high order schemes respectively. and is a function of smoothness parameter defined by
What remains next is to define the limiter fuction in such a way that it satisfies at least the following:
- remains positive ,
- passes through a perticular region known as TVD region associted with the underlying scheme in order to guarantee stability of the scheme.
There are other properties too which it should satisfy for better results.
In 70's Vanleer came up with his conservative schemes and published 5 papers in a row in Journal of Computational Phyics. Then in 1984 (in SINUM) P. K. Sweby gave a scheme. There are many other methods which use more or less the same idea i. e. the idea of adding antidiffusive term in low order scheme. This gave various schemes like Flux Corrected Transport (FCT) by Book and Borris, Piecewise Parabolic Method (PPM) by Colella and Woodward (JCP) etc.
- C. B. Laney, "Computational Gas Dynamics"
- E. F. Toro, "Reimann Solvers and Numerical Methods for Fluid Dynamics"
- R. J. Leveque, "Numerical Methods for Conservation Laws"
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948514113.3/warc/CC-MAIN-20171211222541-20171212002541-00237.warc.gz
|
CC-MAIN-2017-51
| 2,472 | 12 |
http://blogs.mulesoft.org/page/14/
|
code
|
Templates are simple solutions to start building your own integration applications that help to accelerate ‘time to value’ for your company. We focused on creating templates in a particular way to meet a high quality bar and to help you maintain that bar when you choose to extend our templates or build your own. In this post, I wanted to run you through our principles, structure, and provide some advice when using one of our templates.
There may well be 50 billion device coming, but the most exciting things in the Internet of Things are the ones you can hack. I’ve developed a new weekend hobby of connecting and hacking devices. Here are my top 5:
These connected lights bulbs have an HTTP API that is really easy to use and allows you to control single and groups of lights. You can control the colour range, brights and hue of course. Furthermore your partner will love the pretty colours and you’ll convince your kids you can do magic.
Yes this is the device that is paradoxically cool not cool. It has a REST API that gives you access to post items to the Glass timeline and subscribe to location and updates from it. The REST API is pretty limited, but luckily Glass runs Android and has a GDK for writing apps for the device itself, which greatly extends the possibilities.
In this post I want to close the loop on introducing you to the last of the five initial patterns that we are basing our Anypoint Templates on. I’m sure we’ll continue creating templates and we’re going to continue discovering new data integration patterns. If you are just entering at this post, I would recommend that you look through the previous four posts to understand the other patterns. I generally do not repeat things that overlap between a patterns, so I would encourage you to work your way through all five posts if interested.
Pattern 5: Aggregation
What is it?
Aggregation is the act of taking or receiving data from multiple systems and inserting into one. For example, lets say I have my customer data in three different systems, and I wanted to generate a report which uses data from all three of those systems. I could create a daily migration from each of those systems to a data repository and then query against that database. But then I would have a whole other database to worry about and keep synchronized. As things change in the three other systems, I would have to constantly make sure that I am keeping the data repository up to date. Another downside is that the data would be a day old, so if I wanted to see what was going on today, I would have to either initiate the migrations manually or wait. If I set up three broadcast applications, I could achieve a situation where the reporting database is always up to date with the most recent changes in each of the systems. Still, I would need to maintain this database whose only purpose is to store replicated data so that I can query it every so often. Not to mention the number of wasted API calls to ensure that the database is always up to x minutes from reality. This is where the aggregation pattern is really handy. If you build an application, or use one of our templates that is built on it, you will notice that you can just on demand query multiple systems merge the data set, and do as you please with it. So in our example above, you can build an integration app which queries the various systems, merges the data and then produces a report. This way you avoid having a separate database, you can have the report arrive in a format like .csv, or format of your choice. Similarly, if there is a system where you store reports, you can place the report there directly.
So far, in this series, we have covered Migration, Broadcast, Bi-Directional Sync, and today we are going to cover a new integration pattern: Correlation. In an effort to avoid repeating myself, for those who are reading through the whole series, I will omit a lot of relevant information which is shared between the patterns that I have previously covered. I urge you to read at least the previous post about bi-directional sync as correlation can be viewed as a variation of bi-directional sync. Also, note that this is the only one of the five patterns that we have not released any templates around, this was done in the interest of time, and due to the belief that this may be the least common pattern for Salesforce to Salesforce integration. We are however looking to create and release templates using the correlation pattern in the next few months.
Pattern 4: Correlation
What is it?
The correlation pattern is a design that identifies the intersection of two data sets and does a bi-directional synchronization of that scoped dataset only if that item occurs in both systems naturally. Similar to how the bi-directional pattern synchronizes the union of the scoped dataset, correlation synchronizes the intersection. Notice in the diagram below that the only items which will be meet the scope and synchronized are the items that match the filter criteria and are found in both systems. Whereas with the bi-directional sync will capture items that exist either in one or both of the systems and synchronize. In the case of the correlation pattern, those items that reside in both systems may have been manually created in each of those systems, like two sales representatives entering same contact in both CRM systems. Or they may have been brought in as part of a different integration. The correlation pattern will not care where those objects came from, it will agnostically synchronize them as long as they are found in both systems. Another way to think about Correlation is that is like a bi-directional sync that only does updates existing matches, rather than creates or updates.
CONNECT 2014 is only a month away and the tempo is picking up pace. It’s going to rock and here at MuleSoft, we’re getting pretty excited!
Come see how you can amplify innovation:
- Hear from thought leaders from the most innovative companies (Salesforce, Tesla, Box, Stripe and more!)
- Gain insight from over 15 customer case studies and 30 unique breakout sessions – we’ve got everything from business transformation strategy to hands-on product demos and workshops.
- Problem-solve with MuleSoft employees and technology partners
And the icing on the conference cake? How about seminal rockers … CAKE! Come party into the night and be a part of the integration revolution!
Still not convinced? Check out this video and start daydreaming today »
In this post we are going to discuss a few emerging trends within computing including cloud based Database platforms, APIs and Integration Platform as a Service (iPaaS) environments. More specifically we are going to discuss how to:
- Connect to a Microsoft Azure SQL Database using Mule ESB (for the remainder of this post I will call it Azure SQL)
- Expose a simple API around an Azure SQL Database
- Demonstrate the symmetry between Mule ESB On-Premise and its iPaaS equivalent CloudHub
For those not familiar with Azure SQL, it is a fully managed relational database service in Microsoft’s Azure cloud. Since this is a managed service, we are not concerned with the underlying database infrastructure. Microsoft has abstracted all of that for us and we are only concerned with managing our data within our SQL Instance. For more information on Azure SQL please refer to the following link.
In order to complete all of the steps in this blog post we will need a Microsoft Azure account, a MuleSoft CloudHub account and MuleSoft’s AnyPoint Studio – Early Access platform. A free Microsoft trial account can be obtained here and a free CloudHub account can be found here. To enable the database connectivity between MuleSoft’s ESB platform and Azure SQL we will need to download the Microsoft JDBC Driver 4.0 for SQL Server which is available here.
In this post I will continue talking about the various integration patterns that we used as the basis for our Anypoint Templates. The next pattern to discuss is bi-directional sync. Since bi-directional sync can be also accomplished as two, 1:1 broadcast applications combined and pointed in opposite directions, I would recommend reading my last post on the broadcast pattern before digging into this one since I will omit a lot of the same content.
Pattern 3: Bi-Directional Sync
What is it?
Bi-directional sync is the act of unioning two datasets in two different systems to behave as one while respecting their need to exist as different datasets. The main driver for this type of integration need comes from having different tools or different systems for accomplishing different functions on the same data set. For example, you may have a system for taking and managing orders and a different system for customer support. For one reason or another, you find that these two systems are best of breed and it is important to use them rather than a suite which supports both functions and has a shared database. Using bi-directional sync to share the dataset will enable you to use both systems while maintaining a consistent real time view of the data in both systems.
Here’s our weekly roundup of the top 5 integration and API articles of the week. Take a look, let us know if we missed any, and share your thoughts in the comments. Don’t forget to follow @MuleSoft to stay up-to-date on integration & APIs!
If you’re interested in Integration and APIs, don’t miss CONNECT 2014 – the event behind the integration revolution!
How can long-established enterprise IT vendors adapt to a world of nimble startups and avoid extinction? They can’t.
Bicycles have joined the Internet of Things, providing valuable data for both riders and cities.
The best way to plan your journey to CONNECT is knowing what you’re interested in.
If you’re interested in hearing from thought leaders…
don’t miss the keynotes! CONNECT will host leaders from some of the most innovative companies, including:
- Ross Meyercord, CIO Salesforce
- Jay Vijayan, CIO Tesla
- Ben Hayes, CIO Box
- John Collison, Co-Founder Stripe
- Ross Mason, Founder MuleSoft
- Uri Sarid, CTO MuleSoft
don’t miss our 15 customer case studies, where you’ll hear from customers on how they drive customer engagement, amplify the pace of innovation, and create new revenue channels through integration.
In my post yesterday, we did a brief introduction to the migration pattern. Today we are going to do a similar overview of the broadcast pattern which is a kinetic version of the migration pattern.
Pattern 2: Broadcast
What is it?
Broadcast can also be called “one way sync from one to many”, and it is the act of moving data from a single source system to many destination systems in an ongoing, near real time or real time, basis. Typically “one way sync” implies a 1:1 relationship and to us it is just a instantiation of the broadcast pattern which is a 1:Many relationship, hence we chose the name broadcast even though it will manifest itself as a 1:1 in many integration applications like our Salesforce to Salesforce templates that we recently made available.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131302318.88/warc/CC-MAIN-20150323172142-00188-ip-10-168-14-71.ec2.internal.warc.gz
|
CC-MAIN-2015-14
| 11,132 | 47 |
https://www.assetario.com/vacancy/back-end-python-engineer
|
code
|
Back End Python Engineer
Join our expanding Software Engineering team as a Senior Python Developer. You will be involved not only in programming but also in infrastructure design. Help us, architect, develop, test, and maintain highly scalable cloud services that support our Machine learning pipelines to personalize the experiences of free-to-play mobile gamers.
We are Assetario
We love data. We are gamers. We are engineers. Phenomenal team of MIT graduates, technical experts and advisors who lead multi-billion-dollar businesses.
Our engineering and data teams cooperate with the goal of building a smart platform to process your users’ data, to drive personalised app experiences. Our platform processes hundreds of terabytes of data with tens of millions of daily active users with hundreds of ML models in production.
What you’ll be responsible for:
- Work with Data Science and Data Engineering teams to own your solution from development to production.
- Drive major architectural changes as we scale to improve our engineering velocity
- Promote software engineering best practices via code reviews, building tools, and documentation.
- Contribute to the development of technical project documentation and user documentation.
- Develop internal tooling and/or libraries to enable machine learning deployment at scale
- 3+ years experience as a Python Developer
- Expertise in Python frameworks (Django, FastAPI or Flask is an advantage)
- Experience working with production-grade machine learning systems
- Experience with service development on AWS (Athena, S3, Lambda)
- Knowledge of C++, Scala or other object-oriented programming language is a plus
- Experience with streaming technologies e.g. Kafka
- Experience with Docker and Kubernetes
- CI/CD experience (CircleCI, Github Actions)
Unlimited leave days
Snacks, good coffee and cold tub on our big terrace
Flexible working hours
We will equip you with a laptop, keyboard and all work essentials
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00800.warc.gz
|
CC-MAIN-2023-50
| 1,968 | 23 |
https://carleshf87.wordpress.com/2014/02/06/progress-bar-in-python/
|
code
|
Today I needed a progressbar for one of my python scripts. After looking for some sophisticated tools like the package
progressbar I decided to try by myself something less complex.
The following code is the compacted-result:
from time import sleep import sys for i in range(21): sys.stdout.write('r') sys.stdout.write("[%-20s] %d%%" % ('='*i, 5*i)) sys.stdout.flush() # Do the n-iteration of the job here sleep(0.25) # The job was finished, let them know sys.stdout.write('r') sys.stdout.write("[%20s] 100%%: Donen" % ('=' * 20))
So… I use the
sys.stdout.write instead of the
\r. With that I place the cursor at the beginning of the line and then I rewrite the whole line.
At the end I redo the same adding the message Done after the progressbar.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864257.17/warc/CC-MAIN-20180621192119-20180621212119-00281.warc.gz
|
CC-MAIN-2018-26
| 749 | 8 |
https://www.stechies.com/microstrategy-interview-questions-answers/
|
code
|
What is Microstrategy?
Microstrategy is an enterprise data warehousing application. It supports interactive scorecards, dashboards, alerts, data visualization and the functionality of automated reporting. The Microstrategy mobile application also supports business intelligence.
What are the benefits of Microstrategy?
The benefits of Microstrategy are as follows:
- It is used to monitor information, and develop reports in real time. Knowledge of database programming is not required.
- By using the Microstrategy Web, online access to data is easy. Searching for data is also user-friendly.
- Users can easily modify reports through the Microstrategy Office version, using the Microsoft Office.
- Users can access the software through a mobile application compatible on most devices and operating systems.
How to use Microstrategy?
The different uses of Microstrategy are:
- Business analysts use the software for predictive analysis and data mining. This is done to develop business reports.
- It has a huge library of more than 200 OLAP, financial and mathematical data analytics functions, which help the data scientists to derive KPIs for businesses.
- Used by data scientists for data parsing and wrangling.
- Data analysts use built-in tools for data visualization.
- Live data can be monitored in real-time through easy to make dashboards.
How to create a dashboard in Microstrategy?
The steps to create a dashboard in Microstrategy are as follows:
- Click on Create on the left side of the Microstrategy web application. Then click on New Document.
- Select a dashboard template when prompted.
- After selecting the blank dashboard, unlock it from the Options.
- Right click on the padlock symbol, click on Properties and Formatting. From Properties window uncheck the locked check box.
- Hit on OK to make the Dashboard ready to use.
What is lookup table in Microstrategy?
In Microstrategy, the lookup tables represent the attributes. Using the description tables and Ids, the attribute information is stored. If information about a single attribute is stored, the table is called normalized. If information about multiple attributes is stored, the table is called denormalized. This storage depends on the selection of the physical schema.
What is narrowcast server in Microstrategy?
MicroStrategy Narrowcast Server is a delivery server that shares business information to the end users through email, SMS, printers, mobile devices, and file services. It consists of a Subscription Portal and a Delivery Engine that can be installed on one or more machines. Based on one’s requirement, the delivery service and information transmission service can be developed.
What is metadata in MicroStrategy?
Metadata in Microstrategy is a database that contains the information about the Microstrategy objects. Information about application objects, schema, and configuration objects are present here. The project settings and data warehouse information are also present here.
What is metrics in MicroStrategy?
Mathematical operations and calculations performed on data are called metrics in Microstrategy. Based on certain values of some columns, these metrics depict average, division or summation results in a column. The built-in functions of Microstrategy are utilized for performing calculations on business data. The different types of metrics are:
- Simple metrics
- Nested metrics
- Compound metrics
- Derived metrics
What are the VLDB properties in Microstrategy?
The Microstrategy SQL that has been generated can be customized using the VLDB properties. Based on these VLDB (Very Large Data Base), the Intelligence server manages the query optimization, calculations, and metrics. These properties govern the working of the Analytical and SQL Engine, which have a significant influence on the business reports. The different levels where the VLDB properties can be set are:
- Attribute level
- Report level
- Database instance level
What are the attributes in MicroStrategy?
In Microstrategy, the entities are represented using the attributes. These are usually identified through a unique ID inside the database or data warehouse. These work as the column headers in the database. The different types of attributes are:
- Simple attribute
- Implicit attribute
- Derived attribute
- Compound Key attribute
How to create a derived attribute in MicroStrategy?
A derived attribute in Microstrategy has a value that is decided by the combination of two or more columns. The derived attribute can be developed based on an object. The steps to create such an attribute:
- Make a dataset consisting of the necessary objects.
- Create the derived attribute by adding the dataset in the reporting services document.
- Add the attribute in the document grid.
What is an implicit attribute in Microstrategy?
An implicit attribute is developed at the application level and it does not physically exist in the database. It has its own expression. As it has a constant value, it is not usually saved in a column or table. An implicit expression is required for creating such an attribute.
What is a compound attribute in MicroStrategy?
A compound attribute in Microstrategy is where more than one column is made the ID column. Therefore, more than one column is needed to identify that compound attribute distinctively. The presence of a compound key relationship is depicted when a compound attribute is created.
What is the attribute role in Microstrategy?
In Microstrategy, the attribute roles are one of the most popular features. The attribute role is a schema modelling practice where two or more attributes are created using the same lookup table. These attributes may not return any data when they are put in the same report. Attribute roles are specified using the following ways:
- Aliasing the table
- Automatic recognition of the attribute roles
What is data blending in MicroStrategy?
Data blending is used to join two sets of data on a dashboard or a document. During this process nonshared attributes are Cartesian joined and shared attributes are outer joined.
What is the difference between primary and secondary dataset in MicroStrategy?
A primary dataset is used to display all the values in a particular dataset. Any dataset added to the dashboard becomes a primary dataset. In a particular dashboard, they can be more than one.
For a document having many datasets, the join behaviour of each one of them can be primary or secondary. It is an additional dataset where the elements will be present even if they appear in the primary dataset.
What is a joint child in MicroStrategy?
Some unrelated attributes can create certain attributes when they are intersected. These are called joint child attributes. A joint child is also a process through which Microstrategy tackles its composite keys.
What is data wrangling in MicroStrategy?
Data wrangling is the process of analyzing the data and drawing important conclusions from it to support a business strategy or cause. Through Microstrategy, the data can be cleaned by filtering the required information, removing duplicate data and whitespaces. The whole process is carried out through the Wrangle Your Data page.
How many types of metrics in MicroStrategy?
The different metric types are:
- Simple metrics
- Nested metrics
- Compound metrics
- Derived metrics
- Conditional metrics
- Transformation metrics
How to compare string in Microstrategy?
In Microstrategy, a string can be compared using the LIKE operator. If the string matches the pattern specified, True is returned, otherwise false is returned.
Alternatively, the Equal operator can also be used to compare two strings. If the string matches the pattern specified, True is returned, otherwise false is returned.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817819.93/warc/CC-MAIN-20240421194551-20240421224551-00119.warc.gz
|
CC-MAIN-2024-18
| 7,746 | 78 |
https://github.com/mtigas/OnionBrowser
|
code
|
- OnionBrowser: 1.7.0-beta1 (20161130.1) - See official release history and changelog.
- Tor.framework: 57c9064 (Nov 30 2016)
- iObfs: 26463e2 (Jul 15 2016)
- obfs4proxy: 0.0.8-dev, upstream 97a875e (Nov 15 2016)
- golang: 1.7.3 (Oct 19 2016)
Screenshots: iPhone 4/4S, iPhone 5, iPad 3
Adding Onion Browser support to other iOS apps
Onion Browser responds to two URL schemes:
onionbrowsers://, representing HTTP and HTTPS URLs, respectively. These
work like the URI schemes in iOS Google Chrome and other popular
third-party web browsers.
- A URL of
onionbrowser://opennews.org/will launch Onion Browser and navigate the app to
- A URL of
onionbrowsers://mike.tig.as/will launch Onion Browser and navigate the app to
Allowing your own app to launch Onion Browser instead of Safari works similarly to iOS Google Chrome:
- Check if Onion Browser is installed by seeing if iOS can open a
- If so, replace the
onionbrowser://and replace the
- Then tell iOS to open the newly defined URL (
newURL) by executing
[[UIApplication sharedApplication] openURL:newURL];
See the Google Chrome iOS instructions for more details -- just note
that you should replace their
googlechrome:// URL schemes with the proper
The build scripts for Tor and other dependencies are based on build-libssl.sh from x2on/OpenSSL-for-iPhone. The scripts are configured to compile universal binaries for armv7 and i386 (for the iOS Simulator).
Because iOS applications cannot launch subprocesses or otherwise execute other
binaries, the tor client is run in-process in a
NSThread subclass which
tor_main() function (as an external
tor executable would)
and attempts to safely wrap Tor within the app. (
libtor.a, intermediate binaries created when compiling Tor, are used to
provide Tor.) Side-effects of this method have not yet been fully evaluated.
Management of most tor functionality (status checks, reloading tor on connection
changes) is handled by accessing the Tor control port in an internal, telnet-like
session from the
The app uses a
NSURLProtocol subclass (
ProxyURLProtocol), registered to
handle HTTP/HTTPS requests. That protocol uses the
which nearly matches the
NSURLConnection class, providing wrappers and access
to the underlying
CFHTTP Core Framework connection bits. This connection
class is where SOCKS5 connectivity is enabled. (Because we are using SOCKS5,
DNS requests are sent over the Tor network, as well.)
Information for forks
If you're distributing an app that builds off of the Onion Browser code, you need to use your own app name and logo.
- Note that you also cannot use the official Tor Project logo and names (i.e. "Tor", "Tor Browser", "Tor Browser Bundle") without written permission from the Tor Project. Please see their trademark FAQ for more information.
If you're distributing an app that builds off of the Onion Browser code, you must cite Onion Browser within your app's credits as part of the terms of the normal MIT License.
See the LICENSE file -- generally you need to include everything from the "ONION BROWSER LICENSE" section down through the rest of the file. Read that file for more information, though.
You'll need to make sure the "Bundle identifier" (under "Info" in the app's Target Properties) is set to your own identifier and not "com.miketigas.OnionBrowser".
You'll need to make sure the URL handlers for your app (see Integration notes above) don't conflict with the ones for Onion Browser. Make sure you edit your
<app>-Info.plistfile and edit values under "URL types".
Change "URL identifier" to your own' app's identifier from #3, change the URL Schemes to the URL schemes your app should open if another app tries to open a URL with that prefix. ("test" and "tests" will make your app open if another app tries to open URLs starting with "test://" and "tests://".)
You'll also need to edit code in
AppDelegate.m. Look for instances of
"onionbrowsers:", as these are the portions that check for your app's URL identifiers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542687.37/warc/CC-MAIN-20161202170902-00398-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 3,958 | 59 |
http://www.fx114.net/qa-103-167961.aspx
|
code
|
a. com.allow_dcom = true
- Execute "dcomcnfg"
- Open Component Services > Computers > My Computer > DCOM Config
- Search for Microsoft Office Word 97-2003 Document (it will be something like this translated to your language, so take a while and search for it)
- Right-Click on it and open the properties
- Choose "Identity" tab
- Normally this is set to "the launching user". You have to change this to "the interactive user" or a admin user of your choice.
- Apply these new settings and test your COM application. It should work fine now.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155814.1/warc/CC-MAIN-20180919004724-20180919024724-00038.warc.gz
|
CC-MAIN-2018-39
| 540 | 8 |
https://support.bioconductor.org/p/129515/
|
code
|
Dear all, I am pretty new using this methods so I am sorry if I ask something very simple. I have some issues with cummeRbund. After downloading my cuffdiff data from Galaxy and creating a database with R, I tried to create the graphics. I have 3 treatments and all three are compared in the cuffdiff tables. When I explore the object cuff I get this information: CuffSet instance with: 3 samples 198476 genes 198905 isoforms 198496 TSS 0 CDS 595428 promoters 595488 splicing 0 relCDS
But then I try to plot the density plot and one of my treatments desappear. When I do the volcano plot I have another issue. When compare 1 with 2, everything ok, but when compare 1 with 3 I only get a plot with one point, and when I compare 2 with 3 I get the same plot as 1 compare with 2. I think that cummeRbund is considering two treatments together as one, and comparing with the other, but I don´t know how to separate them. My CuffSet instance indicate that there are 3 samples.
Thanks a lot for your help. Best, Raquel
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337906.7/warc/CC-MAIN-20221007014029-20221007044029-00740.warc.gz
|
CC-MAIN-2022-40
| 1,013 | 3 |
http://ross.typepad.com/blog/2006/05/microsoft_socia.html
|
code
|
I'm in Redmond for a Social Computing Symposium. The wiki (powered by Socialtext, naturally) is private, but the video is streaming at https://188.8.131.52/scs and the IRC channel is irc://irc.freenode.net/#scs2006
Here's some raw notes...
Games will transform the world of work
Clay Shirky... The Christian Rock problem is not just serious but intractable - modes of user interfaace and social interaction from worlds are not broadly portable to other domains and transfering to the world of work is highly limited. Castronova: real world value on virtual goods, but this invites people to ignore the _difference between productive and participatory value._ Assembly line with stolen car has extractable value, as opposed to a poker game with a stolen card. Latter is a site of participatory value, the value doesn't stay with the card, and would disrupt the value of the game. Games are in the magic circle, sometimes physical, always mental, to immerse and expend energy to solve unecesary tasks. Exciting and addictive -- tempting to beleive that if we open up the circle it will get out into the world, but what happens is the world comes into the circle.
- Games are normal
- High chance of outside applciability
- games are unusual
- average chance of outside applicabilty
- games are special
- low chance of outside applicability (addictiveness makes portability low)
We will see a deeping rather than a spread of the things we know about game environments.
Mobile in India
Dina Mehta...Bombay has 1M people per square mile. India has such a vast population that is rapidly becoming a mobile society today. 75M mobile users vs. 45M landline. 4-5M users per month. 200M by 2010. Uses go beyond calls, for their business, entertainment. Helps bring the cost of doing business down. Entertainment use is greater than the rest of the entertainment industry. Missed call phenomenon: a guesture where you call but the other person doesn't receive on purpose, while conveying a message. Mobile and SMS is how people are connecting to the net. 75% are pre-paid, US $2.50/month. The Indian Idol has 55M text messages coming in. How can that community be harnessed, even for commercial purposes? Instruments for entertainment, status symbol, friends and business -- but what does that mean for having one device that does so many tasks.
Computer games with real-world consequences
Daniel Pargman...Location based games -- using the city as a game board. Not many exist, but the genre is breaking new territory. 400 cell phones in China, 2B worldwide. Botfighters. Scan environment, if close to another player, you can fire at them. 24/7. Once every 24 hours, a player can fire a long range weapon.
Shooting Silver (a player):
- Closing in
- Getting out
- Basking in fame
(this so reminds me of a game we played in high school with nerfish guns, where school and home were the only free spaces from the hunt) Launched april 2001 in sweden - 7k registered users, 90% maile, avera age 26. SMS with GPS. Legal, social and ethical issues.
In IRC, discussion of creating Assassin for the mobile phone, like, tonight. Also: zephoria: tangent.. assassin is the #1 reason why college students remove their class schedule from facebook. https://mobileassassins.com
Mobile computing in the classroom
Cathy Beaton... In my teaching I try to involve people in the use of technology, but it comes to haut " 5 use a chat room, another uses 2/3 of the classroom disengaged. The delimma is there is so much power and nobody has a cluse how to use it. Her main point: using this technology in the classroom levels the playing field for those with disabilities. They seized upon ICQ because it was character by character. Cultivating the backchannel Howard Rheingold... Why is the backchannel in this room so focused on the topic? Use of these tools happens despites us. There is a role for educators to use the media that they are using. Leaving it wild may be fun and be interesting, but in the long run, an opportunity to cultivate it. Looking for people to work with him on this opportunity.
MMOG as gateway drug
Constance Steinkuehler : MMOG as a gateway drug, how can games transfer to learning. Three tough issues:
- Access: what are the gateways/barriers. From play to Mod to?
- Christian rock problem.
Loosing the element of transgression.
Tim Burke : Governance is how to make decisions, sovereignty is the source of authority. From I am the king to we are the people. The MMOG developer is a sovergn. What is the public interest of the sovereign? What determines the legitimacy of the sovereign? Leave it to community management and you get flames on forums. Define the basis, define the public interest. Stop managing, start ruling: constraints on the ruler, explain and justify decisions, improve the flow of info, imagine the citizenry and cut out the middleman. When achieved, the sovereign can be a participant in the world. Example of in-game crucifixtion in a Roman sim, or one where a Pharoah can be petitioned for change. Star Wars Galaxy doesn't do this, having to pay maintainence, but where does it go and under what purpose/right? I see the benefits for authority in game, but unsure about the cost the need for team play.
Nic Ducheneaut : 250k chars observed for 10 months. Players dont spend that much time in groups the largetr the group required the less players are interested, guild social networks are sparsely knit. Players come to worlds simply to be surrounded by others. This is not Bowling Alone. Organic forms of sociability: letting things emerge vs. structuring interactions. How to support indirect sociability better?
- design for a spectator experience
- support non-instrumental communication
- media for imagining the community
- emphasize indirect interdependencies (e.g. economy)
(Part of what works in WoW is the Permission to Participate pattern, you don't have to engage socially to play)
Migrating a group from game to game.
Andy Phelps : Doesn't matter if we all start at level 1, but if our 100 users can come into the game with data about relationships. Didn't clay have a thing about how groups vote to migrate some time ago? mining instead of having sex Dan Hunter : Because of persistence, resource scarcity and game design, economies and properrty emerge.
- The property is real, in all meaninful senses of the word, and legally.
- The economy is real. $20B Because of exchange and wage arbitrage, worlds are a current apogee of the globalization of service jobs. Typical chinese worker is either
- full time worker, 16-25, no college, 9thgrade equiv no english
- part time (missed stats)
- goal of 200-300 gold per hour
Wikipedia as a bureacratic third place
Fernanda Viegas...usually as a nice place with free form collaboration, but claiming there is a lot of beaurucracy and process that a lot of people are not familiar with. Today's featured article, how do they get there? You have to nominate featured article candidates. Where you explain why it is worthwhile. Good articles, medicine collaboration of the week and peer review. Wikipedia: what is a good article? WikiProject Good articles. WikiProject Medicine/Collaboration of the Week, ensuring breadth and quality. Peer review of AIDS article had 56 postings, votes + comments. Citations to wikipedia guidelines: WP:WIAFA, NPOV, bloated ToC, article sixe, WP: Lead, WP: Not. Banners at the top of the talk page show the workflow. Pending tasks on the Antartica:Talk page. Guidelines: 76 toop , 58 naming conventions, 91 how to, 12 delete. Stucture: namespaces, only two are about content, the rest is meta. Does this documentation lead you to bureaucracy?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514497.14/warc/CC-MAIN-20181022025852-20181022051352-00404.warc.gz
|
CC-MAIN-2018-43
| 7,653 | 44 |
https://windowsforum.com/threads/program-data.42323/
|
code
|
The ProgramData folder, which first appeared in Vista, is the old "AllUsers" profile, which you were accustomed to in XP.
Many programs save settings and backups in that folder. Several third party applications are being installed (improperly) there instead of to the Program Files folder to bypass the permissions issues. Updates to antvirus programs and others usually go there, also.
I would suggest it is the updates to some of the previously installed programs, that you are seeing. None could give you safe advise on this, but, if you want to clear out programs that you are positive no longer exists, I would suggest you backup or copy them somewhere where you can easily reference them to replace, should you create a pending OS failure.
Sure it would. But perhaps I do not follow you? If you are going to reinstall, why trouble yourself with removing them in the first place? If they are not in use, they are not using any rsourcs - merely using disk space, which we mostly have far in excess of requirements.
Program Data is a hidden file Windows 7 uses for application files an important information. Unless you have specifically requested to hide a file, please consider all hidden files to be applicable and necessary to optimum system performance.
Should you require additional assistance and guidance, Microsoft does have an official Windows 7 Support Forum located here http://tinyurl.com/9fhdl5 . It is supported by product specialists as well as engineers and support teams.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945942.19/warc/CC-MAIN-20180423110009-20180423130009-00224.warc.gz
|
CC-MAIN-2018-17
| 1,492 | 6 |
https://salesforce.stackexchange.com/questions/301013/how-to-make-custom-tab-visible-to-only-one-user-in-lightning
|
code
|
I have created a custom tab "Pricing Approval" beside "Details" tab on the record page of opportunity. I want to visible this tab to only User. Please suggest any salesforce out of box functionality for this.
Hey This can be easily achieved using salesforce out of the box "Set Component Visibility Feature"
- Navigate to the record where the tab should be made available conditionally (In this case "Pricing Approval")
- On the top Right "Click on the Gear Icon and choose "Edit Page"
- Click on the tab that has to be conditionally rendered (In this case "Pricing Approval" tab)
- Click on the tab content and set the component visibility on the bottom right (Advanced -- Field User> Username EQUALS
Image for Reference
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474360.86/warc/CC-MAIN-20240223021632-20240223051632-00476.warc.gz
|
CC-MAIN-2024-10
| 721 | 7 |
https://documentation.aimms.com/language-reference/data-communication-components/reading-and-writing-xml-data/index.html
|
code
|
Reading and Writing XML Data
The Extensible Markup Language (XML) is a universal format for exchanging structured documents and data on the web. For those unfamiliar with XML, XML in 10 Points provides a short introduction. It is taken literally from http://www.w3.org/XML/1999/XML-in-10-points, and is copyrighted © 1999-2000 by the W3C organization. Introduction to XML Support in AIMMS onwards explain in detail how AIMMS lets you employ the XML data format from within your AIMMS applications.
Further information about XML
If you are unfamiliar with XML, the explanation given here will probably not be sufficient. The best starting point to obtain further information about XML, as well as references to specific XML specifications, formats and tools is the W3C XML site http://www.w3.org/XML/.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100525.55/warc/CC-MAIN-20231204052342-20231204082342-00239.warc.gz
|
CC-MAIN-2023-50
| 801 | 4 |
https://www.producthunt.com/alternatives/cubic-fm-2
|
code
|
Alternative products to cubic.fm
5 alternative and related products to cubic.fm
Spotify powered, data-driven music discovery
I wanted a tool to help me find music based on elements of music that I personally liked, and figured I could make something that would do it for me.
Synthetic connects to Spotify and calculates scores for songs from curated playlists (or it's entire library) based off user input. Then you preview the top picks and can add them to your library.
Product Hunt surfaces the best new products, every day. It's a place for product-loving enthusiasts to share and geek out about the latest mobile apps, websites, hardware projects, and tech creations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211146.17/warc/CC-MAIN-20180816171947-20180816191947-00615.warc.gz
|
CC-MAIN-2018-34
| 672 | 6 |
http://turretinfan.blogspot.com/2010/03/comments-policy-silliness.html
|
code
|
I noticed that there seems to be some well-intentioned silliness in R. Scott Clark's new blog commenting policy (link to his discussion of his policy). The new policy requires those commenting to provide their real names, so as to take responsibility for their comments.
Before I get to the silliness, let me acknowledge that there are small number of vocal folks who abuse what they perceive to be the web's anonymity. That is to say, there are a number of folks who post anonymously to harass, annoy, inflame, or otherwise act as trolls. This is irritating and it leads to blog-owners requiring some additional barriers to commenting to deter these trolls.
Nevertheless, imposing a policy that says those commenting must provide their real names fails to make people responsible for their comments. First, the current policy only requires that a part of the person's name be provided. There's no requirement that the whole name be provided. Unless someone has a rather unusual (for the blogosphere) first name (yes, Thabiti, I'm thinking of you) then even using a real name wouldn't help. Same, though perhaps a little less so, for family names. Even when we combine first and last names, there are still many common combinations. Adding a middle initial or perhaps a full middle name would be helpful in further reducing the number of possible people a particular might refer to.
Such measures, however, fail to provide full responsibility for two reasons. First, as the tax folks know, there are plenty of cases of people with identical names. Second, even if your social security number of passport number were provided (we have to keep the blogosphere international, after all), simply identifying a person's name doesn't tell you much that permits you to hold that person responsible. We would also need an address, some sort of physical description (several people can live at the same address), and for church discipline purposes, membership information.
Furthermore, in the U.S. and South Africa, as well as some other places, gun ownership is rather common. Thus, if we really want to keep folks who comment on blogs responsible, we need some ability to get to them. Thus, they would need to be required to post some sort of bond with a neutral third party (such as a bank), that the blog owner could seize if the blog commenter violated the bounds of proper behaviour - at least as an initial form of responsibility. Hostage giving by blog commenters would be another way: who is going to write mindnumbing screeds in your comment boxes if you have their firstborn child?
And, of course, not only is the mechanism proposed by my dear brother in Christ, R. Scott Clark, not enough to ensure responsibility, it is a way that's easily foiled. I would not be shocked if Clark started to see a lot of the John Smiths and Jane Does of the Internet start commenting (in surprising volume) on his blog.
In fact, the only people who Clark's policy will adversely affect are those morally upright folks who don't want to reveal their real names. They are the only ones who will not intentionally violate Clark's policy (some may unintentionally violate it, based on not carefully reading the policy, or not noticing that the policy exists), while the unscrupulous will easily beat his safeguard.
When pseudonymous comments are outlawed, only outlaws will comment pseudonymously.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118713.1/warc/CC-MAIN-20170423031158-00171-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 3,380 | 8 |
http://thepenofawanderingstranger.blogspot.com/2011/02/
|
code
|
There are many evil forces out there, I today will write about just one of them. They are called 'banks' and they and I regularly cross swords in my constant battles to save the world. Or something like that.
It is said that the word 'banker' is just one 'w' away from a more accurate term. This is correct. Bankers make their money out of money which is, in my opinion, wrong. Money should be made by at least making something or providing some sort of tangible service. It doesn't have to be something that you can physically hold, just something that adds 'worth' to the world. Making money out of money, does not fit this.
One of the main methods of doing this is 'interest'. 'Interest' is an interesting thing (ha ha ha ha.... no), basically it goes like this:
Normal Person: Hello, I need to borrow some money from you to buy a house. I promise to pay you back since I get paid every month. Thing is, to buy a house straight away would mean that I have to live on the street while I saved up for 10 years. Can you help?
Banker: Why yes foolish drone, of course. We can give you the money becuase we have lots of it that people give to us to look after or something.
Normal Person: That's great! Where do I sign?
Banker: Butttttt there is a condition. If you take this money, you have to pay us more than you too.
Normal Person: Why? That's not fair! It's not even your money to begin with, why should you charge me to borrow it?
Banker: Because we give the money you pay for the money that we give you that is not really ours to the people who had the money to begin with.
Normal Person: Well... that seems fair. I mean, I am after all using a service and so on. How much do you charge.
Banker: 10% of what you borrow...
Normal Person: And may I ask... how much do the people that the money originally belonged to get?
Banker: 5%, minus tax, minus fees, minus...
Normal Person: I'll stop you there, you are saying that, by sitting there, taking money of someone and then giving it to me, you can skim 5% plus some more of the top?
Normal Person: :-|
Banker: What? Think this suit and office pays for itself?
Normal Person: :-|
Banker: So, you sign here...
Banker: So, you sign here...
Normal Person: Wait....
Normal Person: Why don't I just ask the people who gave you the money originally to lend me the money and pay them the 5% directly? You can't stop me can you?
Banker: Errrr..... becuase you'd never find one person with all the money you need?
Normal Person: So I find a few people then and take it.
Banker: I see no problem there...
Normal Person: :-D
OK OK OK.... vastly simplified I know, (so sue me) but you get the gist, banks exist by giving money to people who don't have it from people that do have it and skimming a
bit lot of the top. Yes, without this 'service' we would never really be able to do anything because, by taking money from people who have it and distributing it to those that need it means that money flows around and doesn't get stagnated (in theory...). But do they really need to charge for this? Or charge so much? No, but they can and do.
This, amongst other things, lead to the financial crisis we are going through. Let me explain... not only do banks make money out of skimming money off the top but they also make money of giving money to people to buy stupid stuff via things like credit cards because many economies are built on the idea that you get people to buy stuff so you can pay other people to make the stuff they buy. Stupid stuff that you don't really need. And the money that is lent to these people so they can buy stuff to keep other people in a job? They can't pay it back which causes the bank to go 'oh crap' and borrow money from another bank to fill the hole left in it's account so it can safely keep giving people credit cards so they can buy more stuff. Which it can't pay back becuase the people with the credit cards don't have the money to pay back still, they just have credit cards. Which leads to the bank that lent it the money to also go 'oh crap' and then borrow money from another bank to, once again, fill the hole. And thus the cycle goes on and on until everyone is going 'oh crap'.
Again, vastly simplified and maybe I'll talk about it another time in more depth but it leads to this. Effectively, you have banks borrowing from each other to cover up what they can't pay back from each other so they can keep giving out money that people can't pay back. It doesn't take a genius to think 'erm... so where does this money come from and what happens when it runs out?'. Simple answer? Everything goes boom....
When the money runs out people panic. The world runs on money. Without money, people start not getting paid and fired. If people don't get paid, they can't buy stuff. If they can't buy stuff then the people making the stuff they buy also get fired becuase they aren't buying stuff. Then these people also can't buy stuff so even more people get fired. Meanwhile, the banks are still out of money, and, here is an important thing, they have also spent the money that some people gave them to look after. Which means there is even less money out there. Then, some people who gave their money to the banks realize, 'hey! The banks is giving our money to stupid people, let's take it back and keep it under our mattresses' to which the banks say 'oh crap' and banks as everyone takes their money away. Except lots of people won't get their money becuase the money simply isn't there.
The upshot is lots of people running around panicking trying to work out where to get more money from so they can fill up the hole. But the thing is, the hole can never be filled. Give the banks more money and they just give it to people to spend on stupid stuff or people take it away to put under the mattress at home. Also, to get more money means you need to make more of the damn stuff and to do that, you can either print it or try and get people back in work so they can get paid and start buying stuff again. Printing is easy but means the value of the money goes down and that not good (you now have more money out there, but nothing else has changed, it's just more bits of paper). Getting people jobs just puts off the problem for later, once they are back buying stuff then sooner or later, someone will be giving out credit cards and we start the merry circus again...
The solution is simple. I'll do my little bit on 'Islamic' banking to make me feel better. It's not really 'Islamic', it's just common sense and I don't like the term 'Islamic' being added to it but that's life. Anyway in a nutshell, with 'Islamic' banking does not have the whole 'interest' thing (in theory...). Instead, you take the money that you need and at the end you can, with no obligation, give a lump sum back to the persons you borrowed it from, which pretty much everyone does if they can afford it. Also, (in theory...) an 'Islamic' bank wouldn't let you take money for stupid stuff. And no credit cards (in theory...) Unfortunately, 'Islamic' banking these days has taken on the face of what I wrote about above and, as a result, is a bit crap. Still, this has lead to lots of Muslims making their own groups of people to lend and look after money which works pretty well since they are built on trust and community and not credit cards. We can live in hope that this grows but I won't hold my breath.
It's quite simple, stop giving money to people who can't pay it back, stop giving it for stupid stuff and stop charging people so much to borrow it when they need it. But to do that would mean changing the economy completely. First of all, we'd have to stop have economies based on buying loads of stuff we don't need with money we don't have. That will mean changing people's mindset as well, we live in a world where buying 'stuff' is what keeps so many going. It's stupid but so is life. Again, you can hold your breath but I'm not holding mine.
Oh, also, banks and bankers also refuse to acnowlage my paypal account, bounce my cheques, take forever to process my payslips, charge me for a debit card, have long queues, open at bizarre times then close for 'lunch' that lasts for hours, use forms that seem to have been printed on postage stamps, lose all your papers anyway when you've filled them and refuse to let me have an account without some obscure unobtainable document (the latest being 'proof of address from the UK even though you don't live there anymore and haven't for nearly three years, good luck finding one sucker'). But that is for another day.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118519.29/warc/CC-MAIN-20170423031158-00397-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 8,539 | 34 |
https://learn.adafruit.com/pyportal-iot-plant-monitor-with-google-cloud-iot-core-and-circuitpython/pyportal-wiring
|
code
|
We recommend using a Female-to-Female STEMMA Connector and plugging it in between the PyPortal and the STEMMA Soil Sensor. No soldering is involved - just connect the cable between the Stemma Soil Sensor and the PyPortal I2C port.
The cable makes the following connections between the PyPortal's I2C port and the STEMMA Soil Sensor:
- PyPortal 3.3V to Sensor VIN
- PyPortal GND to Sensor GND
- PyPortal SCL to Sensor SCL
- PyPortal SDA to Sensor SDA
Add a ground and power wire to the end of the DC motor using alligator clips or by soldering wires directly to the terminals.
Make the following connections:
- Connect the JST PH 3-Pin to Male Header Cable to the D3 STEMMA connector on the PyPortal.
- Connect the header cable's power (red) and ground (black) to the breadboard's red and blue power rails.
- Ensuring the flat side of the transistor is facing towards the PyPortal; Connect the emitter to the GND rail.
- Connect the transistor's base to one lead of the 220ohm resistor. Connect the other lead of the resistor to the white (yellow in this wiring diagram) male header cable.
- Connect the female DC power adapter to the power and ground rails on the opposite side of the breadboard.
- Connect the left and right ground rails together.
- Connect the DC motor's power (green in this diagram) to the red power rail.
- Connect one lead of a 1N4148 diode to the transistor's collector lead.
- Connect one end of the motor to the striped diode lead. Connect the motor's other terminal to the un-striped diode lead.
- Re-read the notes above the diagram to ensure you did not make any errors while connecting components. It does not matter which way you connect the motor's leads for now.
When you're ready, stick the STEMMA Soil sensor into your plant's soil. Be sure to leave the white portion of the sensor not covered by soil. You may also want to position the sensor at the edge of your planter.
Affix one end of the silicone tubing from the end of the pump to the planter (tape, putty or glue work great), positioning it away from the soil sensor.
Insert the other end of the silicone tubing into a water bottle. The pump will be fed from the water bottle. Select the largest/widest bottle you have.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00208.warc.gz
|
CC-MAIN-2023-14
| 2,212 | 21 |
https://feedback.photoshop.com/photoshop_family/topics/keyboard_cycle_subtools
|
code
|
It's a pain how I can't cycle through subtool selection with the keyboard. Or is there a way? I thought it would work nicely if, for example, you could hold m to cycle from square to elliptical. Maybe with the single row/column ones at the end of the cycle... because I don't know who uses them! I'm sure they're there for a reason though.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578643556.86/warc/CC-MAIN-20190424134457-20190424160457-00552.warc.gz
|
CC-MAIN-2019-18
| 339 | 1 |
https://www.makeuseof.com/tag/funnytranslator-funny-translator/
|
code
|
BadTranslator: Make Any Text Funny via Multiple Translations
There are several tools that translate your text from one language to another. Many times, when a translator can get the essence of the statement, the translation goes out of text and gets funny. BadTranslator is a tool that does exactly by that by taking your text and translating it back and forth between English and other languages.
You can choose to translate 10, 20, 30, 40, 50 or 56 times. Each time the text is translated from English to a random foreign language and then back again, usually resulting in a pretty funny final translation.
You can also browse through the collection of funniest translations, post comments on a translation, rate them or share them on Facebook. The original text can belong to any of the 58 different languages that the tool supports.
- Make any text humorous by translating over and over.
- Browse through all time funniest, newest or random translations.
- Post comments and rate translations.
- Supports 58 different languages.
- No registration required.
- Similar tools: blahblahfish and bad-translator .
Visit BadTranslator @ ackuna.com/badtranslator
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347407667.28/warc/CC-MAIN-20200530071741-20200530101741-00473.warc.gz
|
CC-MAIN-2020-24
| 1,158 | 11 |
https://vignette.md/interviews/2021-03-29-kaustav-sen/
|
code
|
Who are you, and what do you do?
Hello! My name is Kaustav Sen (Twitter: @kustav_sen, GitHub: kaustavSen). I am currently working as an actuarial analyst in a consulting firm based out of Gurugram, India. I am specializing in the life insurance sector and alongside studying towards qualifying as a fellow actuary (hopefully by the end of this year!). Working in the actuarial field involves using mathematics, statistics and domain expertise to solve business problems facing an insurance company. This also means balancing the needs and expectations of both policyholders as well as shareholders amongst others.
How do you use R? What are your favorite packages?
I was first introduced to R as an undergraduate in college. However, it was more of a passing interest and I did not pick it up again properly until 2019.
This time our company had launched an internal course on predictive analytics using R. This was also the first time that I got introduced to the
tidyverse ecosystem and immediately fell in love with it. I still remember finding the assignment operator (
<-) and the pipe (
%>%) somewhat awkward coming from a more traditional programming background in C and Python. Although overtime this has now become second nature and there is no turing back!
The predictive analytics course had piqued enough interest in me to continue to explore and learn more about R on my own. This led me to the R for Data Science book by Hadley Wickham and Garrett Grolemund. I also dicovered David Robinson’s screencasts which in turn introduced me to the #TidyTuesday challenge on Twitter. I started participating in this weekly challenge since mid-2020 which has helped me immensely in improving my R skills and also learn a bunch of new stuff!
My favorite packages apart from core
tidyverse packages are: (particularly for visualizations)
- ggforce for the amazing geoms it provides.
- patchwork to effortlessly combine plots
- ggfx a is relatively new package which allows you to apply filters and effects to normal
- gt which provides a grammar for tables akin to what
ggplotdoes for plots
What hardware do you run R on? Do you use any other software tools?
I have a couple of Dell laptops (one for work and one personal) both running Windows. Unfortunately, I haven’t had a chance to explore other operating systems although I have heard / read that Windows is the least friendly os when it comes to running R!
Our goto tool at work is still Excel (gasps) and a couple of other in-house developed software solutions. Other than that I occasionally also use Python.
Do you have any projects that you’re working on right now?
My main side-project at the moment are the weekly
#TidyTuesday challenges. I am also planning to setup my own blog hopefully by the end of this year.
Other than this, I am keen to dabble into D3.js and creating some interactive visualizations. So, possibly something in this front most likely using insurance industry data over 2021!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363689.56/warc/CC-MAIN-20211209061259-20211209091259-00206.warc.gz
|
CC-MAIN-2021-49
| 2,967 | 23 |
http://stackoverflow.com/questions/11360347/asp-net-strange-behaviour
|
code
|
Register Page is only available to authenticated users, so anyone typing
http://localhost:52874/register.aspx will not be able to get to it.
But I have a link to it from the login page, and when clicked it
DOES go to the register page without auth using
Now that is something that I like, it means it can only be gotten to from the Login.aspx page, which is good.
But, when I press the
Submit button on the register page (after the transfer from login.aspx), it puts me back instantly to
login.aspx without any processing.
Then I have to add :
<location path="Register.aspx"> <system.web> <authorization> <allow users="?" /> </authorization> </system.web> </location>
To the web config to allow it to work, which means now its accessible by url. So why this behaviour, why allow me to go to it using
Server.Tranfer yet not let me process the button click?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447548050.127/warc/CC-MAIN-20141224185908-00044-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 855 | 12 |
https://zoom.us/meeting/register/tJUvce6sqzIvHdAyKfLNkCCgLbtH1StLOXan
|
code
|
Speaker: Vladimir Piterbarg (NatWest Markets)
LIBOR reform and the arc-sine law
The fallback spread that will be used to calculate Libor rates of a given tenor in the future is defined as the median (50%-th percentile) of five years of historical observations of the spread between this Libor and compounded OIS rates, calculated on the future date of Libor cessation announcement. Some of the observations that will enter this calculation have already occurred and some are still in the future. In this note we assert that the future realized median is a non-linear function of future, and hence yet unknown, spread observations and therefore its fair value calculation must account for spread dynamics and not just forward values. We propose a model of the future evolution of spreads and derive a very numerically-efficient algorithm for calculating the fair value of the median that incorporates both the historical observations and the future dynamics of the spread. We establish that, given our model, the market expectations of the fallback spreads are at, or somewhat beyond, the upper range of theoretically-justifiable values. The approximation method we develop is based in part on the Arc-Sine Law and should be of independent interest to math finance professionals.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400212039.16/warc/CC-MAIN-20200923175652-20200923205652-00485.warc.gz
|
CC-MAIN-2020-40
| 1,278 | 3 |
http://schoolvoshod.ru/profile?id=setvalidating-java1132
|
code
|
This makes it easy to read in different types of documents without knowing their type in advance. JAXBContext jaxb Context = Instance(package Name); Unmarshaller unmarshaller = jaxb Context.create Unmarshaller(); Validating(true); Item item = (Item) unmarshaller.unmarshal(new File("item.xml")); ...
JAXBContext jc = Instance( "foo" ); Unmarshaller u = jc.create Unmarshaller(); Document Builder Factory dbf = Document Builder Instance(); Namespace Aware(true); Document Builder db = Document Builder(); Document doc = db.parse(new File( "xml File.xml")); Object o = u.unmarshal( doc ); can validate a document with the schema while unmarshalling.
JAXB defines an architecture for binding XML schemata to Java objects.
This allows client apps to check if a graph is okay and ready to process; if not, validation will identify objects that contain errors so that, for example, client apps can ask users to fix those. JAXBContext jaxb Context = Instance(package Name); Object Factory item Maker = new Object Factory(); Item item = item Maker.create Item(); Validator validator = jaxb Context.create Validator(); if(! But doing so makes it much harder to associate errors with their sources, which makes debugging harder for humans.These three aspects of JAXB are covered by three separate interfaces.Instances of those interfaces can be created from a object so that it is capable of managing the schema derived interfaces.As with XSLT transformation explained in the previous volume, we can easily perform this check if we use the standard API "JAXP (Java API for XML Processing)" included in J2SE 5.0.List1 shows an example of a program created in JAXP that performs a validity check.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209980.13/warc/CC-MAIN-20180815063517-20180815083517-00543.warc.gz
|
CC-MAIN-2018-34
| 1,684 | 4 |
https://docs.architect.io/components/component-registration
|
code
|
In most scenarios, an Architect component will be registered and deployed with
deploy command. In cases where a component should be registered but
not immediately deployed, Architect provides the
Registering a component
Registering a component will push a component’s configuration and Docker image
to the Architect Cloud. The component will then be ready to be deployed at any
time. To register a component, just run a command similar to the one below which
specifies the path of the Architect component configuration file. If no tag is
specified with the
--tag flag, the tag
latest will be used.
architect register ./architect.yml
Tagging a component
Components can be registered with different tags such as 0.0.1, preview-10, or latest in order to differentiate between versions. Tagging components is especially useful in cases where different versions of the component should be deployed to different environments such as a preview environment, staging, or production. An example of registering with a tag is below.
architect register ./architect.yml -t 0.0.1
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100523.4/warc/CC-MAIN-20231204020432-20231204050432-00301.warc.gz
|
CC-MAIN-2023-50
| 1,066 | 15 |
https://www.mail-archive.com/[email protected]/msg05541.html
|
code
|
Bruno Marchal wrote:
All right. But modal logic are (traditionaly) extension of classical logic, so that causal implication, or >natural language entailment, when study mathematically are generally defined through modalities + >"material implication".
So in a sense, you confuse yourself by premature anticipation.
Well, I guess "in every possible world where X is true, Y is true also" can only be false if there's a possible world where the classical logical statement "X -> Y" is false (because in that possible world, X is true but Y is false). So perhaps the possible-world statement would be equivalent to the modal-logic statement "it is necessarily true that X->Y"--would this be an example of modal logics "extending" classical logic? In any case, in classical logic X -> Y can only be false if X is true in *our* world, whereas the possible-world version of "if X then Y" does not require that X is true in our world, although it must be true in some possible world. And like I said, I think the possible-world statement more accurately captures the meaning of the natural-language statement.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827137.61/warc/CC-MAIN-20181215222234-20181216004234-00495.warc.gz
|
CC-MAIN-2018-51
| 1,102 | 4 |
http://www.linuxquestions.org/questions/linux-wireless-networking-41/belkin-usb-adapter-in-fedora-can-connect-to-the-router-but-not-the-internet-153517/
|
code
|
Belkin USB Adapter in Fedora. Can connect to the router but not the internet
Have Fedora Core1. With a Belkin F5D6050 USB Adapter.
I finally have the INTERNET!!!!!
How can I activate the device everytime the computer boots up instead of using iwconfig everytime
Last edited by n0where; 03-04-2004 at 03:16 PM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118552.28/warc/CC-MAIN-20170423031158-00276-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 309 | 5 |
http://www.ifxgroup.net/linux_cifs_shares.htm
|
code
|
Linux SMB/CIFS Shares
It is important to note the methods described in this document do not follow best practices for security and may allow access to sensitive information. The goal of this document is local convenience over security.
A little background
In the beginning sharing some files between the computers on your local area network (LAN) was relatively simple. Microsoft Windows 95, 98 and NT3 users could right click on almost any drive letter or folder and select
Share to let others access their files. File sharing was simple, equally compatible with all Windows versions and easy for novice users to control.
Then came Windows NT 4, Windows 2000, Windows XP, Windows 2003, Windows Vista, Windows 7, Windows 8 and others each with a different twist on file sharing that breaks 100% compatibility with other versions of Windows and devices that are compatible with the published Common Internet File System (CIFS) file sharing standards originally created and published by Microsoft.
To make the problem worse it is not possible to simply upgrade the operating system for all of the existing machines on every network because each new version of Windows does not properly run on "old" hardware and are widely known to not work with older peripherals. I put the word old in quotes because some of the new machines on my network are less than 6 months old. They run older versions of Windows and Linux perfectly well and fast enough for my production use. That same hardware either does not boot newer Windows versions or runs so painfully slow that it is totally unusable.
Could the choice of operating system have that much more to do with perception of performance and a fast user experience than the choice of hardware? It looks that way to me.
What is a savvy end user to do?
The answer is to keep your existing fast operating systems running and use some free software to match the different parts together.
This document describes using Xubuntu Linux, a well funded, actively developed and commercially supported version of Linux that you can download from www.xubuntu.com and burn to your own bootable CD-ROM. While you are at it, please make some extra copies of their Live CD and share them with your friends.
The latest Xubuntu works on almost any computer with a VGA card, a Pentium or better CPU, about 512 megabytes of RAM and the ability to boot from a CD or USB thumbdrive. Since this is about the same requirement as a low end Windows XP machine there should be no problem finding a
free computer like this in your junk closet or a very inexpensive machine at your local used computer store. Keep in mind that extra memory is a very good thing for better performance even over a faster CPU.
Boot your machine with the Xubuntu Live CD, click on the Install icon on the desktop and follow the setup wizard through the install process. In this process you will be required to create a user name and password. Make sure this name and password exists in the SMB/CIFS Permits on your IPAD-OS server for a share that points to the IPAD's root directory.
At this point you should be looking at the Xubuntu desktop that boots from the hard drive, not the live CD.
The first step is to make sure you have a working Internet connection. If you can open the Firefox web browser (the orange and blue circle icon) and reach a web site on the public Internet, like this web site, then you are connected. Having a working Internet connection is required for downloading packages to add features to the default install and later to help keep your operating system up to date and running bug free.
Start by opening a terminal window which is found under the Applications/Accessories menu. If you do not see this option, click on the
Ubuntu Software Center choice at the bottom of the Applications menu to add it. While most or all of the following can be done with graphical tools, trying to describe how to do this is much more complex than just typing a few commands.
When you see the terminal command prompt, type
sudo su (must be lowercase) to gain temporary root access. You will be prompted for the password you selected when your account was created. This method is used so the authentication remains until you close the terminal window or type the
When you have the terminal window open and have provided your password, we need to do three things.
- Make sure all parts of the SMB stack are installed
- Make a directory for your IPAD (more on this later)
- Edit two configuration files
Let's take each of these one step at a time.
Step 1: Make sure all three parts of the SMB stack are installed.
Type or copy the following line exactly as it appears.
Note: this command line is case sensitive and must be entered in all lowercase letters. It is best to cut and paste it from this web page.
This downloads everything you need and makes sure SMB is installed on your system.
Step 2: Make a directory for the IPAD-OS.
This part is hard to understand at first for those accustomed to the Microsoft (DOS and Windows) way of connecting remote file servers to local drive letters like
F: on your computer. Instead of drive letters, UNIX/Linux systems use directory trees where you connect remote file servers to a subdirectory on your file system. This is why we need to make an empty directory as a connection point.
To keep things very simple, we'll put the new directory under the
media path with the following commands.
Note: this is case sensitive and should be entered in all lowercase letters.
Step 3: Edit the configuration files.
Now we need to do some file editing to quickly make sure we have all of the correct settings. While most of this can be done through the graphical programs included with Xubuntu, it is more direct to edit the two files once and then only tweak the settings through the graphical user interface if needed later.
3A) Edit /etc/fstab
Type the following command followed by the Enter key.
Add the following line to the end of this file. Pay very close attention to not add any extra spaces where they are not represented here. Note: there are two numbers (both zero) separated by at least one space at the end of this line.
It is best to move the cursor to the end of the last line of the file and then press the Enter key to add a blank line for this new entry. When you are done simply close gedit and save your changes when prompted.
3B) Edit /etc/samba/smb.conf
Type the following command followed by the Enter key.
Three lines need to be changed to look like the following. You may need to scroll to locate all three lines.
workgroup = WORKGROUP
encrypt passwords = false
In our example above the wins server points to the IPAD-OS at 172.25.1.1 - use your IPAD's local IP address behind the firewall here. Do not use your IPAD's public IP address.
Make sure the old IP address is replaced with your new one. Do the same for the other lines to make sure the WORKGROUP is identical to the name set on your IPAD-OS and that the password encryption is set to false. Note: the SMB/ CIFS password encryption used in Windows file/printer sharing is weak protection and does not appear to gain much if anything in security which is why it is disabled here for maximum performance and compatibility.
If any of the above lines already exist in your file but start with a number (#) sign or semicolon (;) character, now is the time to remove those number sign comment characters too.
3C) Create a new share.
Now we need to create a new share. Move to the end of the smb.conf file and insert a blank line. Copy and paste the following block of text making sure each line is left justified with no leading spaces.
path = /media/shares/ipad
comment = Shared connections
available = yes
browsable = yes
public = yes
writable = yes
create mode = 0775
When you are done editing, close gedit and save your changes when prompted.
Step 4: Restart the SMB service and mount the remote share.
Now we just need to make sure the new control files are loaded and active by restarting the servers. At the command prompt type these commands followed by the Enter key.
Your IPAD-OS can now be accessed through SMB/CIFS from any machine on your network with the correct username and password. This same process can be used to combine virtually all of the file shares on your network into subdirectories below the
/media/shares directory. Just follow steps 2, 3a and 4 to create the placeholder directory and add a line in fstab connecting a share to that directory.
Or if you trust everyone on your network, as would be the case on a home network, you can share just the
/media/shares directory to grant access to all of the remapped shares under one drive letter.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362919.65/warc/CC-MAIN-20211203212721-20211204002721-00276.warc.gz
|
CC-MAIN-2021-49
| 8,686 | 65 |
https://www.reptiletalk.net/woma-python/
|
code
|
Image Credit : La Ferme Tropicale
Considered to be more active than many pythons, as well as being a very docile and “easy to handle” snake, the woma python is highly sought after in the reptile and exotic pet trade.
The head is narrow and the eyes small. The body is broad and flattish in profile while the tail tapers to a thin point.The color may be pale brown to nearly black. The pattern consists of a ground colour that varies from medium brown and olive to lighter shades of orange, pink, and red, overlaid with darker striped or brindled markings. The belly is cream or light yellow with brown and pink blotches. The scales around the eyes are usually a darker color than the rest of the head.
- Scientific name : Aspidites ramsayi
- Distribution : Australia
- Average Size : 1.5 m (5 ft)
- Life Span : 20 years or more
- Difficulty : Intermediate
Hatchling can be housed for around 6 to 12 months in a 0.45 x 0.25 x 0.3 meters (1.5 x 0.75 x 0.9 feet) enclosure and then upgrade accordingly as they grow. Juveniles through to adults can either be maintained in a 0.6 x 0.25 x 0.35 meters (2 x 0.75 x 1 feet) enclosure until Sub-adult size then can be upgraded a 1.20 x 0.6 x 0.45 meters (4 x 2 x 1 feet) enclosure. It is recommended that Woma’s are housed individually as it has been reported cannibalism in captivity which have in most cases resulted in the death of both Pythons.
They are predominantly terrestrial reptiles so height of the environment you are providing is of little importance; however, they have been known to utilize any trees, branches or hides or the like when provided in search for warmth if there is insufficient heating.
A hide on both ends of the enclosure should be provided which allows them to retreat when sometimes startled & somewhere to tightly coil to reserve some body heat for those colder night times.
Aspen based fine chip is of benefit for these critters, we have found that being a burrowing animal they love to bury themselves in 0.15 meters (0.5 feet) deep substrate. It is also easy cleaning for hatchlings through to Juveniles as the fast growing animals that love their food tend to excrete more when fed more often.
Lighting – Heating
It is recommended to keep your Aspidites ramsayi in a natural light pattern that mimics normal daytime according to the season.
Regarding heating you should accommodate a warmer hot spot such as an approximate temperature of 34 °C (93 °F). Ambient temperature should be 25-27 °C (78-80 °F). Heat Mats or Heat Cords are a preferred method among keepers, as they are predominantly terrestrial so the ground or floor heating is of more benefit to them to absorb their required amounts of heating. Pulse proportional or Dimmer controlled Thermostats are a must for heating applications used for the safety of your reptile no matter which species.
Fresh water should be supplied on a regular basis, they seem to thrive on fresh water rather than water that has been left for a few days.
Humidity should be kept at a minimum as higher humidity can in some cases give a higher risk of Respiratory Infections. Occasionally during the warmer months they will get a spray of fresh water but no relative humidity is recorded.
Hatchlings through to Sub adults need a good supply of food to give them a substantial start in life. Hatchlings are started off on Velvet Mice or Pinky rats. Woma pythons are generally ferocious feeders & in most cases start feeding voluntarily. Once they have started feeding they generally don’t look back & turn into very ravenous feeding machines.
5-7 day feeds for hatchlings up to Sub adults is a great way to get the young off to a good start with 10-14 day feeding for adults. Young are fed on an appropriate sized food item, adults are generally fed on approximately 150 to 180 g rats rather than the larger sizes, feed smaller sized food items more regularly will be your better option for Adult Woma. Most types of food will be accepted when offered & can range from Quail, Rodents, Rabbits, Chickens, Chicken peaces & reptiles etc.
When trying to get hatchlings feeding it is best that handling is kept to a bare minimum due to the skittish nature of them & the likely hood of them refusing to feed due to being simply scared. Once they are established handling every other day is of benefit but again keep it to a necessity on or around feeding days.
Cleaning should occur at least weekly with fresh water & any fecal matter discarded. Sloughed skins etc should be removed as required during your daily walk through inspections or as required.
Frequency of shedding is like all reptiles, the more you feed the more often they shed but a rule of thumb would be approximately to aim for 5 to 8 weeks up to juvenile then the cycle for sub adults through to adults will stretch out a little with the reduction of food frequency offered to around an approximate 8 to 12 weeks slough cycle.
Potential Health Problems
Woma Pythons are a tolerant and hardy Python for most reptile keepers which in my opinion makes them a great starter snake but like all pythons though they can also occasionally suffer from respiratory infections which are generally caused by excessive lack of husbandry, prolonged exposures to cool breezes mostly from Air Conditioners, cold drafts & of course long extended periods with no heating. If a respiratory infection is left undiscovered or untreated they will in most cases contract Pneumonia and death can usually follow. Consult your vet immediately.
The information contained in this care sheet reflect the opinions and methods of the mentioned breeder, based on their expertise and long-established experience.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00390.warc.gz
|
CC-MAIN-2023-40
| 5,672 | 25 |
https://www.elance.com/d/p/javascript/312
|
code
|
A self learner web developer,12 years experience
OBJECTIVE: To be asset for the organization by working with honesty and determination and have challenges as my duty and opportunity to achieve professional and personal growth along with the organization. Specialties: software developer, programmer, computer technologies, technical languages, architecture, computer, computer networking, data analysis, database management system, desktop pc, digital, eclipse, english, hindi, java, javabeans, languages, microsoft, microsoft outlook, microsoft windows 8, microsoft windows xp, networking, operating systems, php, programming, security, service, software, software engineering, technical, telephone skills, visual basic 6.0, visual studio, web technology, www, social, professional networking, soft skills, interpersonal skills, communication skills...
i have a 4 year experience in programming and designing
I am web developer.
We are having 3+years of IT experience. we are flexible to the clients requirements.we are the growing company for earn perfect clients like you...
hi, i am a java developer with 2 years of works experience in java web development, and have a good hands on technologies integrated with java like Spring MVC, hibernate, Spring security, tomcat, glassfish. also have aesthetic sense for better layout for websites.
*I am a B.Tech Passout in computer-science........... *Verry Hardworking,truthful and passionate in area of my work........... *Here to Learn and Earn and grow very faslty by utilizing the opportunity that i grab both the hands............
I worked on different types of portfolios.My ability is to complete the work before the time line.My charges are very low when compare to others.My main motto is to satisfy the client and make him happy without investing a lot of money on unusual things and my client can make profits based on the designed portfolios
Hey there! My name is Christopher Lang, although I often go by Chris, and my passion is Computer Science. To give a little bit of background, I grew up in San Jose, California around a lot of emerging technologies and have found my passion in my surroundings. I went to Bellarmine College Prep for highschool which offered me a great education to jumpstart my programming career track. I am currently studying Computer Science in Santa Barbara, a beautiful place to intermediate my work and studies. While I can not take on a full time job, I aim to use elance to get paid for programming I enjoy doing in my spare time anyway. I have interned at Warp9, Inc. where i did mostly webdesign but I have taken classes in Java, Pascal, Python, and C which I would love to work in as well. I am a hard worker and enjoy investing my time into projects that can challenge me and further my programming career. Thank you for your interest in my work and for taking the time to get to know me by reading this.
Iam a vtiger developer, I have worked on several modules like customer portal, reports, rss, workflows etc and fixed several bugs in vtiger.
I am doing Masters in Computer Science and my area of expertise is Web programming and software developer in Java, PHP, HTML, CSS and provide quality outcome to the clients.
More than ten years of experience in software architecture, design, development, implementation, and integration.
Joomla! extensions developer over 5 years experience
i get my hands dirty with the latest on technologies to give my jobs the perfect of look and experience
Mobile software engineer (iOS + Android) developed 2 apps in App Store  1+ years programming experience with Java, SQL, Android and IOS
i am a programmer i worked on linux and dot net my other skills are customer service and i am well awared of english language.
Possess expertise in Objected-Oriented Analysis/Design and Java Development, skilled at progressing from problem statement to well-documented designs.
 A competent professional with over 5 years of experience in: Oracle / MS SQL Database Administration & Deployment Configuration & Installation, Migration Performance Tuning Back Up & Recovery Management Data Migration & Replication Disk Space Management Disaster Recovery Issues Management/ Production Support & Troubleshooting Windows Clustering & Log Shipping Mirroring Replication  Expertise in Database Administration on Production Servers with server configuration, performance tuning and maintenance with outstanding troubleshooting capabilities.  Track record of conducting installation, configuration, troubleshooting, migration for servers  Instrumental in cleaning up of Servers by creating back up and removing the unwanted database
Proficient in creating websites which are SEO friendly using table-less layout. Committed to complete the work within mentioned deadline.
Has a excellent skill to present your raw data in the form of website , expertise in Java, J2EE, passion to develop excellent professional stuff in the way you want it to be
I am a systems architect with 10 years of professional and freelance experience with expertise in building reusable and highly scalable web applications with Node.js, Express.js, MongoDB, and AngularJS. I also have experience developing reactive user interfaces to work with both new and existing REST APIs, using Bootstrap, Backbone.js, ExtJS and jQuery. With significant experience with Java, I also have the knowledge needed to engineer server side code to perform the data intensive processing needed for some applications. I look forward to working together to determine how my skill set can be helpful in solving your project's unique challenges.
I'm a young software developer living in Minneapolis. I graduated from the University of Nebraska-Lincoln a few years back with a bachelor's in CS and mathematics, and have worked as a developer mostly with Microsoft technologies like C#, ASP.NET, and SQL Server. Programming-wise, in my free time I like to use Unix, Ruby, and learn with functional programming languages. Outside of programming, I enjoy learning foreign languages and cycling!
hi Dear Sir/ Madam I am a web developer with HTML, CSS, CSS3, JS, JQuery, PHP with extensive knowledge of Adobe Photoshop. basic knowledge of wordpress and Magento. My portfolio is nomansaeed.base.pk. Computer is my hobby, so I love to learn and do new things in Web developing and Designing.
I'm a young french webdesign & musician. I love Art, so creating website or doing music is the same thing for me... I like to see my clients happy so i take all my time to work on perfect things.
I currently work for a web company where we create websites for real estate agents and brokers. I have been with the company for a year and a half. I graduate in November with my degree in web design from Phoenix University.
Hardworker, Motivated, Good Skills
Graduated from Colorado Technical University with a Bachelor's Degree in Information System Management. Graduated with Cum Laude Honors. Currently I blog for fun and as a hobby. To check out my blogs feel free to check out my blog site at talk2theaudience.blogspot.com Look forward to the opportunity to put all of my skills to work.
Knowledge in HTML, CSS, Phonegap Build, Github, Mobile application building for iOS and Android, Data Entry to populate web sites, web site build outs.
I have over 10 years of programming experience including 4 years of web development experience, and 1 year of Drupal experience. Am a flexible, motivated team player and would be excited to do freelance work.
We are a development & design team of three brothers that are going help you knock your customers socks right off! Matt Brody: Design & UX Chris Brody: handles Front end development Sam Brody: takes care of Back-end and Server programming. Like the three musketeers what we do is in our blood, our father owned a business and his father before him. We wake up every morning ready to help business owners and organizations punch above their weight by building the most functional web applications, the best looking sites and tools that will literally blow your customers awaaaaaaay. We love what we do and want to give you the cutting edge!
Passionate about making the web the best it can be. I strive for perfection in everthing I do.
Siempre he trabajado, en pequeños proyectos para mi uso, y he sido autodidacta, ahora solo necesito la oportunidad de demostrárselo a los demás.
Having vast knowledge and more than 7+ years of experience in Training and Software Development. I am quick learner and working in team spirit. I have guts to work in under pressure.
Result oriented IT Professional with 6+ years of working experience Experience in working with Global customers & J2EE applications
I am working as freelance since last one year, and successfully completed a good projects
I have worked on various php core as well as opensource projects. Have 4 years of work experience in different firms. I also have my own cms and e-commerce modules with easy interfaces.
Self-taught & self-initiated California programmer I've coded a fair amount of websites and currently working on iPhone Apps.
I graduated from the most prestigious university in Vietnam (Bach Khoa University) in 2011 with a degree of computer science. I have special interests in web development since I worked for one of the largest music site in the country (nhaccuatui.com) in 2011 and 2013. In that period, I designed API for internal usages. I was also a member of R&D to test performance of new technologies: music database in MongoDB (migrated from MySQL) with Nodejs written in Coffee script, distributed comment systems using GoLang, instant music search engine (artists,songs,videos and related media info) using ElasticSearch. I am also good at unix-like environments (shell script, command utilities,awk...). Based on my strong background in CS. I have great confidence in delivering software services.
I offer affordable rates with quality service. Services provided within shorter period. your way to quick work.
Let's get it done.
Current student and The University of Texas at Dallas for Software Engineering.
ali altay web programer
Software engineer with over 6 years of experience in various IT technologies and systems. Most of my current work is based on Microsoft technologies (ASP.NET, ASP.NET MVC, WCF, WEB API, WPF, SQL Server) mixed with HTML5, CSS3, and different JS libraries (JQuery, JQuery UI, JQuery mobile, Backbonejs, Underscorejs, Marionettejs and others) for Single Page Applications. Previous work was in developing PHP/MySQL, or Android applications. I worked for companies in Romania, and Belgium where I was part of a R&D team. Best practices, good design and the use of test driven development (TDD) are a must in the work I do. Good software architecture, and code optimisation, make my solutions fast, easy to use even on slow mobile devices, and in every browser.
I am a computer engineer
In my last 7 years of professional life, I gained lots of experience in developing complex web apps and solutions for the clients as per their requirements both as a team member and team lead.I am very confident of delivering projects on time and meeting the quality criteria. Areas of expertise are: PHP, MYSQL, CAKE PHP - Framework, Wordpress, jQuery, Opencart, Ajax, HTML, CSS, XML, JSON API :Google Map, Yahoo, Twitter, LinkedIn and FaceBook. Payment Gateways:PayPal,Secure Pay and Authorize.net. Database :Mysql,Msaccess,Oracle. Open Source :Wordpress,Open cart,Cubecart, Joomla, Magento, Cake PHP.
have extensive experience with CMS OpenCart, InstantCMS, Wordpress, Drupal, CMS DLE, framework CodeIgniter.
I'm 22 years old and coding is my hobby. I speak both english and french fluently. I've been coding ever since I'm 12 years old and in several different languages. I have been in the freelancing business for 2 years now. Not only do I love learning but I also learn really fast. I know how to respect deadlines and I always push myself to finish before them.
I have been making independent projects for android,J2ME and web based projects for about 4 years now. Few of my projects are Swipe-in(https://play.google.com/store/apps/details?id=com.sureshot.swipe) , Zip utility(J2ME)(http://www.getjar.mobi/mobile/37756/Zip-Utility-for-nokia-x2-05/). I've developed several other apps for corporate use as well.
I'm software engineer with 4 years in mobile software development
An application and web developer for 15 years. Familiar with server-side and front-end environments as well as system administration on Windows, OSX, and Linux. Fluent in Photoshop and Illustrator for slicing, extracting, and compression of web images.
I'm Good in Microsoft Office and Web Designing
Development team. Lot of their own research projects, startups.
I am reliable, faster and better equipped in my skills than the other people of my profession
I'm Web designer and PHP web developer with 5 years + experience. I'm capable in HTML, CSS, PHP and MYSQL with 100% quality, accuracy. I'm also doing jquery, Wordpress, codeigniter framework and etc... Please clear everything about your work before place the order.
I'm a computer science student who wishes to acquire working experience in my field of study.
 8 years of strong IT experience with ASP.NET, VB.NET, and C #.NET in implementing the complete application development life cycle (SDLC).  Hands-on experience in design and development of enterprise architecture applications and Service oriented architecture (SOA).  Hands-on experience in designing and developing Microsoft Azure (.Net) web applications and SQL Azure database.  Proven experience in Web Services, Windows services, WCF, Ajax and Java script.  Hands-on experience with SQL Server 2000/2005 and SQL Server 2008 r2 includes, 1. DTS, SSIS (SQL Server Integration Services) packages. 2. Hands-on experience in SSRS (SQL Server Reporting Services) 2005/ 2008 r2 reports. 3. Good experience with Microsoft Project, Visio, MS-Excel and Access.  Well versed with Change management and Release management using HP CMDB.  Hands-On experience with version control systems like TFS, CVS
I am working as a ASP.Net application developer since 4 years.Already i have worked on some business modules (HRM, Payroll, Inventory, Accounting, Sales).
I have experience To develop dynamic websites in codeigniter frame work. also doing integration of paypal ,fax ,voice call ,message etc. also have experience to export database into pdf and excel sheet.
Seasoned Oracle programming expert with extensive experience in web applications, payment systems interfaces, mobile phone sms gateway interfaces, and web scraping. In depth knowledge of Oracle Apex, Oracle Forms, Oracle Reports, PL/SQL, database design and database administration. Over 15 years experience in software engineering using Oracle database systems.
I'm good at connecting languages and API's, and finding my way around (poorly/un)documented systems. Since early highschool I've been building programs (3D graphics mainly) and making electronics (Eagle CAD). Studied bioinformatics and worked for several years programming research equipment in a biophysics lab (CUDA, C++, Labview). I've been doing various freelance jobs on the side (C#, Postgresql, iPhone apps).
I have been involved in development for the past 4 years. Mostly small scale projects but have a lot of experience doing things. I am currently involved in large scale web and app development ( android ).
I like to code stuff.
Good communication skills, fast and good work.
Having 6 years of experience in java web application development. Requirement gathering, analysis development and unit testing experience. And willing to learn new technologies.
A Self-taught Web designer, Software troubleshooter, web technologies expert, Mobile DJ, Citizen journalist, Social Media Entrepreneur, S.E.O. Expert, Blogger, Broadcaster, Risk taker and Talker. I love Playing Hockey, Movie watching, Music listening and mixing. Had my formative Education from Faith Baptist School, and then proceeded to Ghana Senior High School, koforidua for my secondary education and currently in the University of Ghana, Legon studying English and Political Science. Joined Curious Minds Ghana, a child and youth advocacy group at the age of 10 to shape my advocacy skills and build my confidence, which has shaped my life.
I am a Web Developer. Currently working here in Cagayan de Oro City. Almost 3 years experience in Web Development. A very hardworking person and very professional in handling tasks and deadlines. Eager to share my expertise and acquire new knowledge and techniques in Web Development.
Team of web developers with experience in developing web applications using technologies like Ruby on Rails, Sinatra, AngularJS. We always take responsibility for our work and strive to deliver high quality results using up to date technologies and tools.
I am a programming student, my base is strong and also I am improving my skills through practical workshops, daily updating with current technologies for example; sticky header and flat design in webdesigning.And I have also completed two academic projects in asp.net-sql server named online banking system and social networking system respectively.
all for work.
I have developed highly dynamic software. Developed web-to-print solutions.
One person company of developer from Ukraine, specialized on web applications. Has two years of experience developing web applications related to e-commerce. Always in touch, high quality work.
Based in Melbourne Australia. Expertise in Websites, Mobile Applications, Automation.
I have 6 years of expirience building websites
I can offer reliability, quality and creativity for quite a low price. I can offer also contact at any time of the day.
Website is a company face. Trust me and you'll get the best website ever.
Over 15 years of experience as PHP and .NET Software Developer Strong communication and project management skills
I am Asp.Net MVC Developer i have 2 year up development experience
I have IT industry exposure of more than 4 years and have worked with multiple clients in different technologies and domain
We are highly qualified professional company which will provide you with best service which you ever can expect.
429 Design is a full services design firm and interactive marketing agency located in historic Richmond, Virginia. Since 1997, we specialize in web design and development, marketing, intranets, client portals and Apps for the financial industry. We are experts in marketing websites, businesses, and brands using innovative techniques and emerging technology, website design and development, interactive, and more.
Expanding my knowledge in Software and Web development (back end).
Graduate of Cal Poly Pomona Class of 2014 with a bachelor degree in Computer Science. I am a Web Developer for a multinational Pet Food Company and part time web developer for local media company.
B.Tech in Computer Science & Engineering from very renowned technical college in India.3 years experience in Website Development and Designing and Web Application development. SEO ... like to be hired for any challenging project of my filed.
If you are looking for a talented, intelligent and energetic young professional with excellent work experience, I may be just the candidate. A 2014 Post Graduate of Humber College with Bachelor of Technology in Computer Science and Engineering, I am actively engaged in a job search to find just the right opportunity. Let me share with you what I think makes me a unique and well-qualified candidate: One year of professional working experience during which IÂve demonstrated strong planning, organizational, leadership, communication, technical skills, customer relations and project management skills. A high-energy spirit, strong intellectual capacity and drive to succeed that I know will serve me well as I further build my professional career.
I have good technical skills to develop web application in Drupal, Wordpress, Codeigniter, PHP, I have also knowledge of drupal, word press designing and Design web sites on amazon web store, ebay, bigcommerce, volusion. HTML, CSS etc.
We are Creative Web-Agency located in Toronto, Canada. We build competitive advantages through design. We do more than design websites Âwe help businesses transform the way they do business. Sites built with WordPress allow clients the flexibility to add, update, and edit content within their site as they see fitÂwithout any coding or knowledge of HTML markup. We employ a dedicated team to handle your large and small site updates.
We have skilled people to develop the products right on time.
I have been studying IT now for 7 years. I studied Microsoft Office for 4 years in a business point of view so how to create leaflets, powerpoints, excel documents, databases etc... I did foundation degree called Foundation of Technology where I learnt the basics of HTML and CSS. I am now studying Computing where I am going in to my third year. I enjoy IT very much as I like being creative and I think design and programming help you have a challenging creative mind. I have also been working on my own Wordpress website. It still needs a lot of work and I am currently in the progress of trying to make my own theme (which is loaded yet). Please take a look frankienright.co.uk.
I have been a self taught programmer ever since I got my first Computer. I started with Flash Action scripts, moved on to Jquery, HTML5 when it came out and CSS 3 followed the trend. Matt Mullenweg says "Code is poetry", I feel the same way. I started writing Visual basic programs when I was 16, and to PHP now with full vigor. When you hire me, the work you get would have a lot of my personalities that goes back as far as 14 yrs of programming. I program to make myself happy. So I only work with the projects that will make me happy. Because I want the best damn output. Be it a desktop program or website. It's like a love affair with the programming that is eternal. Use me, get the result you want. Also be surprised to be over delivered.
I have more than 3 years of IT experience in .net
Over 8 years I have an excellent experience and high skill about windows desktop application, server/client application, software reversing, software analyse, mobile application. As i'm software engineer, My interesting is information security like network security, firewall, malware, reversing, fuzzing, social network security. Especially in reversing application and analysing malware, i have high degree of skills and experience.
hi! My name is JinNanHu. I`m a computer expert. My major is Virtual Reality.My specialties are image processing, graphics and computer vision. We would be grateful for your cooperation as quickly as possible. Thank you!
I have 15 years of development experience
Offering a wide range of skills to help you kick start your company/business website page and/or logo, or, if it just needs some touching up or updating we are capable for the job! Our team includes: Rachel, expert in creating logos and designing layouts for webpages as requested. Ryan, exceptional skills in making a functional website page to your liking. We can work within a tight time frame, providing you have necessary details ready, and we will keep in constant contact with you about our process and ideas.
Hi, i'm 18 yo student from Poland. I'm good at making websites - just give me a chance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246639191.8/warc/CC-MAIN-20150417045719-00064-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 23,477 | 95 |
https://forum.fairphone.com/t/no-back-and-home-buttons-on-lineage-16-0-20191017-gsi/57441/7
|
code
|
I followed the instructions at [HOW TO] Flash a custom ROM on FP3 with GSI and installed LOS 16.0 from https://sourceforge.net/projects/andyyan-gsi/files/lineage-16.x/lineage-16.0-20191017-UNOFFICIAL-treble_arm64_bvN.img.xz/download
But now I don’t have a back or home button. If I open one app, I can’t got back to the launcher or switch to another app.
Does anyone else have this? And ideally knows what to do?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107909746.93/warc/CC-MAIN-20201030063319-20201030093319-00024.warc.gz
|
CC-MAIN-2020-45
| 416 | 3 |
https://primez.online/is-natural-language-processing-machine-learning/
|
code
|
In the vast landscape of artificial intelligence, Natural Language Processing (NLP) emerges as a captivating and transformative field that sits at the intersection of language and machine learning. It encompasses a diverse array of technologies and methodologies designed to empower machines to understand, interpret, and generate human language. This exploration delves deep into the realms of Natural Language Processing, unraveling its fundamental principles, its integration with machine learning, the challenges it surmounts, and the groundbreaking applications that mark its profound impact on the way we interact with technology and each other.
Understanding Natural Language Processing: Decoding Human Expression
At its essence, Natural Language Processing involves the interaction between computers and human language. It encompasses the ability of machines to comprehend, interpret, and generate human language in a manner that mirrors the nuanced understanding achieved by humans. This extends beyond mere word recognition to capturing the complexities of syntax, semantics, and context, allowing machines to derive meaning from the rich tapestry of human communication.
In the early stages of NLP, rule-based systems were prevalent, where linguistic rules were explicitly programmed to interpret language. However, the advent of machine learning has ushered in a paradigm shift, enabling systems to learn language patterns from vast datasets, adapting and evolving their understanding over time.
The Marriage of NLP and Machine Learning: A Symbiotic Relationship
NLP and machine learning are symbiotic partners, each enhancing the capabilities of the other. Machine learning algorithms serve as the backbone of many NLP applications, enabling systems to learn patterns, make predictions, and improve performance through experience. Conversely, NLP provides machine learning models with a unique set of challenges and opportunities, pushing the boundaries of what machines can achieve in language-related tasks.
Supervised Learning in NLP: Supervised learning, a cornerstone of machine learning, finds extensive application in NLP. In supervised NLP tasks, models are trained on labeled datasets, where each input is associated with a corresponding output. This training allows the model to learn the mapping between inputs and desired linguistic outputs, paving the way for applications such as sentiment analysis, named entity recognition, and part-of-speech tagging.
Unsupervised Learning in NLP: Unsupervised learning, where models learn from unlabeled data, is particularly valuable in NLP. Clustering algorithms, topic modeling, and word embeddings are examples of unsupervised learning techniques applied to language data. These methods uncover hidden structures and relationships within vast corpora of text, offering insights into semantic similarities and contextual meanings.
Reinforcement Learning in NLP: Reinforcement learning, a paradigm where models learn by receiving feedback in the form of rewards or penalties, finds applications in dialogue systems and language generation. NLP models can be trained to optimize responses based on user interactions, creating more dynamic and contextually aware conversational agents.
Deep Learning and Neural Networks in NLP: The advent of deep learning, and specifically neural networks, has revolutionized NLP. Deep learning models, such as Recurrent Neural Networks (RNNs) and Transformer architectures, excel in capturing sequential dependencies and contextual information in language. These models have propelled advancements in machine translation, language generation, and contextualized language understanding.
Challenges in NLP: Navigating the Complexities of Language
While NLP has achieved remarkable strides, it grapples with inherent challenges arising from the intricate nature of language. Some of these challenges include:
Ambiguity and Polysemy: Language is inherently ambiguous, with words often having multiple meanings depending on context. Polysemy, the coexistence of multiple meanings for a word, poses a challenge in accurately interpreting and generating language.
Context Understanding: Understanding context is pivotal in language comprehension. Resolving references, recognizing sarcasm, and capturing the subtleties of tone require a deep understanding of context, presenting a complex challenge for Natural Language Processing systems.
Variability and Creativity: Human language is diverse, dynamic, and inherently creative. It evolves over time, incorporates slang, and exhibits regional variations. NLP systems must navigate this variability to ensure robust performance across different linguistic contexts.
Ethical Considerations and Bias: NLP models trained on large datasets may inadvertently inherit biases present in the data. Ensuring fairness, mitigating biases, and addressing ethical considerations in language processing are critical aspects of responsible Natural Language Processing development.
Applications of NLP: Transforming Communication and Interaction
The pervasive influence of NLP extends across various domains, revolutionizing how we communicate, access information, and interact with technology.
Machine Translation: NLP has played a pivotal role in breaking down language barriers through machine translation. Systems like Google Translate leverage NLP algorithms to translate text from one language to another, enabling seamless cross-cultural communication.
Speech Recognition: Speech-to-text applications, voice assistants, and automated transcription services rely on Natural Language Processing algorithms to convert spoken language into written text. This technology has widespread applications, from virtual assistants in smartphones to transcription services for various industries.
Sentiment Analysis: NLP enables systems to analyze and understand the sentiment expressed in text. This is particularly valuable in social media monitoring, customer feedback analysis, and market research, providing insights into public opinion and emotional tone.
Chatbots and Virtual Assistants: Natural Language Processing is at the core of chatbots and virtual assistants, allowing them to understand user queries, provide relevant information, and engage in natural language conversations. These applications find use in customer service, information retrieval, and task automation.
Text Summarization: NLP techniques are employed in text summarization to distill large volumes of information into concise and coherent summaries. This is valuable in scenarios where users need quick access to key information without delving into extensive texts.
Named Entity Recognition (NER): NER is an Natural Language Processing task that involves identifying and classifying entities, such as names of people, organizations, locations, and dates, within text. This is crucial for information extraction and structuring unstructured text data.
Emerging Trends in NLP: Pushing the Frontiers of Language Understanding
As NLP continues to evolve, several emerging trends and innovations shape the future of language processing.
Pre-trained Language Models: The advent of pre-trained language models, such as BERT (Bidirectional Encoder Representations from Transformers) and GPT (Generative Pre-trained Transformer), has transformed Natural Language Processing. These models are trained on massive datasets and can be fine-tuned for specific tasks, achieving state-of-the-art performance across a range of applications.
Multimodal NLP: Multimodal NLP combines language processing with other modalities such as images and videos. This integration enables more comprehensive understanding and interaction, giving rise to applications like image captioning and video summarization.
Explainable AI (XAI) in NLP: The interpretability of NLP models is a growing concern. XAI techniques aim to make language models more transparent and understandable, allowing users to comprehend the decision-making processes of complex Natural Language Processing algorithms.
Low-Resource Language Processing: Efforts are underway to extend the benefits of Natural Language Processing to languages with limited linguistic resources. Researchers are exploring techniques to develop robust NLP models for languages that lack extensive labeled datasets, opening up opportunities for broader linguistic inclusivity.
Conversational AI Advancements: Advancements in conversational AI are driving more natural and context-aware interactions. This involves understanding user intent, maintaining context over extended dialogues, and incorporating emotional intelligence into virtual interactions.
Challenges and Considerations in Future NLP Developments
As NLP ventures into uncharted territories, it encounters challenges that necessitate careful consideration and innovation.
Ethical Considerations and Bias Mitigation: The ethical implications of Natural Language Processing, including issues of bias, fairness, and privacy, require ongoing attention. Researchers and developers must actively work towards mitigating biases in language models and ensuring responsible and ethical use.
Cross-Cultural and Multilingual Challenges: NLP systems must grapple with the complexities of cross-cultural communication and multilingual contexts. Achieving robust performance across diverse languages and linguistic variations remains a significant challenge.
Handling Sarcasm and Contextual Nuances: Capturing the nuances of language, including sarcasm, humor, and contextual subtleties, presents a formidable challenge. Developing models that can comprehend and respond appropriately to these linguistic intricacies is an area of active research.
Interdisciplinary Collaboration: NLP’s future developments require collaboration across diverse disciplines, including linguistics, cognitive science, and computer science. Bridging the gap between linguistic theories and computational models is crucial for advancing the field.
Challenges and Ethical Considerations: Navigating the Complexity of Language
As NLP pushes the boundaries of language understanding, it grapples with intricate challenges and ethical considerations.
Bias Mitigation in Advanced Models: Advanced language models, particularly those trained on large datasets, may inadvertently perpetuate biases present in the data. Addressing bias mitigation becomes crucial to ensure that NLP systems do not inadvertently amplify societal prejudices.
Privacy Concerns in Emotion Recognition: The integration of emotion recognition in Natural Language Processing raises privacy concerns. Recognizing and responding to users’ emotions may involve processing sensitive information. Striking a balance between personalized interactions and respecting user privacy becomes a delicate challenge.
Cross-Cultural Nuances: Understanding and accommodating cross-cultural nuances in language presents an ongoing challenge. NLP models must be sensitive to variations in linguistic expressions, idioms, and cultural norms to ensure inclusive and contextually aware language processing.
Security and Adversarial Attacks: NLP systems are susceptible to adversarial attacks, where subtle modifications to input data can lead to incorrect outputs. Ensuring the robustness of NLP models against malicious attempts to manipulate their behavior is a critical consideration for security.
Applications Across Industries: NLP’s Ubiquitous Impact
The evolving capabilities of NLP are redefining industries and reshaping the way organizations leverage language data.
Healthcare: NLP applications in healthcare involve extracting valuable insights from clinical notes, automating medical coding, and facilitating information retrieval. Emotion-aware NLP systems can contribute to mental health support by analyzing textual data to discern emotional states.
Finance: In the financial sector, NLP powers sentiment analysis of news articles and social media to inform trading decisions. It facilitates the extraction of valuable insights from financial reports, news updates, and customer interactions, aiding in risk assessment and decision-making.
E-commerce: NLP enhances the e-commerce experience through personalized product recommendations, chat-based customer support, and sentiment analysis of customer reviews. Multimodal NLP can be applied to image recognition for visual search capabilities, improving the efficiency of product searches.
Legal and Compliance: NLP streamlines legal document analysis, contract review, and compliance monitoring. It enables organizations to process vast amounts of textual legal data efficiently, extracting relevant information and ensuring adherence to regulatory requirements.
Education: NLP contributes to personalized learning experiences, automated grading of assignments, and intelligent tutoring systems. The ability to understand and respond to students’ language enables more effective interaction in online learning environments.
Human Resources: NLP aids in resume parsing, candidate screening, and sentiment analysis during employee feedback processes. It streamlines the recruitment process by automating repetitive tasks and providing valuable insights into employee sentiments.
Future Directions: Charting the Course Ahead
As we gaze into the future of NLP, several exciting directions and possibilities come into focus.
Neurolinguistic Modeling: Inspired by insights from neuroscience, neurolinguistic modeling aims to build language models that mirror the neural processes underlying human language comprehension. These models hold the potential to achieve a deeper understanding of language nuances and context.
Continual Learning in NLP: In dynamic environments, NLP systems must adapt to evolving linguistic patterns and emerging trends. The concept of continual learning in NLP involves enabling models to learn continuously from new data, ensuring that they remain relevant and up-to-date.
Conversational AI Advancements: Improving the naturalness and contextual awareness of conversational AI is a priority. Advancements in dialogue systems involve creating more sophisticated models that understand user intent, maintain context over extended interactions, and exhibit emotional intelligence.
Responsible AI Practices: Ethical considerations in NLP development will continue to be paramount. Responsible AI practices involve incorporating fairness, transparency, and inclusivity into the entire lifecycle of NLP systems, ensuring that they align with societal values and respect individual privacy.
Edge NLP for Real-time Processing: The demand for real-time language processing is driving the development of edge NLP, where language models are deployed directly on devices for immediate processing. This has implications for applications such as voice assistants and augmented reality.
Conclusion: NLP’s Uncharted Horizons
The evolution and future trajectory of Natural Language Processing unfold as an exhilarating journey into uncharted horizons. From decoding the semantics and pragmatics of language to recognizing and responding to human emotions, NLP is transcending traditional boundaries, redefining how machines understand and interact with language.
As we navigate the future of NLP, a harmonious integration of technological prowess with ethical considerations becomes imperative. NLP systems are not merely tools for processing text; they are dynamic interfaces that mediate human-machine interactions, influencing how we communicate, access information, and perceive the world.
The unfolding chapters of NLP’s evolution promise a future where language models not only decipher the meaning of words but also resonate with the intricacies of human expression. The synergy between linguistic understanding and machine learning capabilities propels NLP into a realm where machines become adept language companions, comprehending not just the syntax but the essence of human communication. In this dynamic landscape, NLP stands as a testament to the boundless possibilities that emerge when language meets the ever-advancing frontiers of artificial intelligence.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474744.31/warc/CC-MAIN-20240228175828-20240228205828-00528.warc.gz
|
CC-MAIN-2024-10
| 16,151 | 62 |
https://answers.sap.com/questions/3882535/credit-memo-print-out-error.html
|
code
|
I have made the following settings for credit memo printout.
Maintain condition record for output type REKL (T.Code: MRM1) for both the accesses
a. Co. Code/ Invoicing Party.
b. Co. Code.
Now when I Execute MR90 for that document Number The system fetches that particular record. But when I try to see Preview the systems throws the following error.
Table RSEG: Item 5105600024 2008 2 does not exist.
But Table RSEG is having entry for 5105600024 2008. I dont understand from where does the system pick that item No 2.
I have even tried posting a document with 2 line items where the RSEG for that document will have 2 items. Still the system gives the same error.
How to solve this issue?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362605.52/warc/CC-MAIN-20211203060849-20211203090849-00459.warc.gz
|
CC-MAIN-2021-49
| 689 | 9 |
https://www.wowebook.org/practical-network-automation-second-edition/
|
code
|
Practical Network Automation – Second Edition
- Paperback: 226 pages
- Publisher: WOW! eBook (December 26, 2018)
- Language: English
- ISBN-10: 1789955653
- ISBN-13: 978-1789955651
Practical Network Automation, 2nd Edition: Leverage the power of Python, Ansible and other network automation tools to make your network robust and more secure
Network automation is the use of IT controls to supervise and carry out everyday network management functions. It plays a key role in network virtualization technologies and network functions.
The book starts by providing an introduction to network automation, and its applications, which include integrating DevOps tools to automate the network efficiently. It then guides you through different network automation tasks and covers various data digging and performing tasks such as ensuring golden state configurations using templates, interface parsing. This book also focuses on Intelligent Operations using Artificial Intelligence and troubleshooting using chatbots and voice commands. The book then moves on to the use of Python and the management of SSH keys for machine-to-machine (M2M) communication, all followed by practical use cases. The book also covers the importance of Ansible for network automation, including best practices in automation; ways to test automated networks using tools such as Puppet, SaltStack, and Chef; and other important techniques.
- Get started with the fundamental concepts of network automation
- Perform intelligent data mining and remediation based on triggers
- Understand how AIOps works in operations
- Trigger automation through data factors
- Improve your data center’s robustness and security through data digging
- Get access infrastructure through API Framework for chatbot and voice interactive troubleshootings
- Set up communication with SSH-based devices using Netmiko
Through practical use-cases and examples, this Practical Network Automation, Second Edition book will acquaint you with the various aspects of network automation. It will give you the solid foundation you need to automate your own network without any hassle.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.31/warc/CC-MAIN-20220927225413-20220928015413-00142.warc.gz
|
CC-MAIN-2022-40
| 2,126 | 17 |
https://www.beautylish.com/v/ymjvgm/plus-size-ootd-rocker-chic?ref=related
|
code
|
Plus Size OOTD: Rocker Chic!
Show More Plus Size OOTD: Rocker Chic!
A re-uploaded a former favorite to bring my channel back from the dead!
Expect to see more videos soon.
ॐ Namaste ॐ
♡♡♡If you are a COMPANY/BUSINESS and wish to contact me to review a product, etc, please do not hesitate to contact me at:[email protected]♡♡♡
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141169606.2/warc/CC-MAIN-20201124000351-20201124030351-00417.warc.gz
|
CC-MAIN-2020-50
| 342 | 6 |
http://www.protagonize.com/poem/if-ever-there-was-a-moment
|
code
|
If ever there was a time
to snip away the threads
keep them short and move to the next
then this is now.
I'm over you
I'm blinking in the next horizon
I'm gazing inward.
So over the pain, the trial.
A heart closed to existing customers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607245.69/warc/CC-MAIN-20170523005639-20170523025639-00596.warc.gz
|
CC-MAIN-2017-22
| 236 | 9 |
https://www.kpi.com/brochures/leave-requests/
|
code
|
Kpi.com Human Resource Management System encompasses all organizational HR needs with innovative ways of handling performance management, attendance tracking, goal management and employee record-keeping.
Leave Requests and Consolidated Attendance Report
Any user can add a new Leave Request from the HRMS or My Workspace module of the system. Adding a leave request is easy: select the employee, select the manager who will approve your request, select a reason, enter a short description, choose period, attach files if needed and save. Once the request is added, the manager will receive a notification about it. If the manager approves or rejects the request, the employee will also be notified via email abut it.
All the attendace status for employees can be viewed from the Attendance Report section which summarizes the available hours per day, holidays, absence, and the total time per month.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474715.58/warc/CC-MAIN-20240228112121-20240228142121-00894.warc.gz
|
CC-MAIN-2024-10
| 899 | 4 |
http://templot.com/downloads/download_previous.htm
|
code
|
There is a download button at the bottom of this, but please read these notes first.
Templot2 program update. Version 215a
. 6th September 2017.
· If you are already using Templot2, please ignore this green section.
If you are still using a pre-Templot2 version (TemplotZero, withdrawn in 2011) there is no need to uninstall it. You can continue to use it if you wish at any time. Templot2 is an entirely separate program (with many new features). Your old data files can be used in Templot2 -- see below for how to find them. But don't use files saved from Templot2 in your old program, you may get unexpected results.
If this is your first time using Templot2, please read through:
to see all the changes from the previous versions of Templot.
For Templot2 the default installation program folder has changed to C:\TEMPLOT_DEV\ .
Previous versions were installed in the C:\TEMPLOT\ program folder, with your files in the C:\TEMPLOT\BOX-FILES\ and C:\TEMPLOT\SHAPE-FILES\ sub-folders.
You can use this menu item to access your old .box data files:
This is what you need to do now:
1. Close down your existing Templot2 program if it is running.
2. Close the Templot Video Player if it is open.
3. Download the setup file by clicking the green button below. Templot program updates do not install automatically, so you must:
4. Run (open) the downloaded file to install it. I recommend that you leave the default C:\TEMPLOT_DEV\
installation folder unchanged, or create a similar folder elsewhere on your computer.
(What you should not
do is create a folder in or under the Windows C:\Program Files\
folders, otherwise Templot may not be able to run properly. )
5. Run the newly installed Templot2 program by clicking the desktop icon.
6. Templot2 will then go online to contact the Templot web site and check that it is the latest version
. So you need to be online at the time
. If you have a firewall you may need to give the program permission to connect.
Templot2 will do this every time you start the program. Once under way the internet connection is no longer needed. This means you can use the Hibernate function on your laptop computer if you need to use Templot where no internet connection is available.
Enjoy using Templot2.
But do please remember that it is still unfinished (and probably always will be) -- many of the links to the help notes do not yet go anywhere, and the old help notes and tutorials in the Templot Companion are now very out of date. A new Templot Companion site has been started at:
but as yet it is barely begun.
After downloading Templot2 you may see a security warning likes this:
You can safely ignore this. Click the Run
button. Templot2 is safe to run and will not harm your computer.
In Windows 8, Windows 8.1 and Windows 10 you may see something like this:
Click the More info
link. You should then see something like this:
Click the Run anyway
· If you use Norton anti-virus on your computer, before downloading please see
Templot2 version 215a
Build: # 11585 6th September 2017
· If you have the Templot Video Player open, please remember to close it before running the downloaded file to install this update. Likewise your Templot program.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687582.7/warc/CC-MAIN-20170920232245-20170921012245-00349.warc.gz
|
CC-MAIN-2017-39
| 3,189 | 38 |
https://stackoverflow.com/questions/4676785/hex-values-in-protocol-headers/4676830
|
code
|
Why are the protocol headers like TCP or UDP normally using Hex representation while filling the particular fields in the protocol header ? Is there any specific advantage ?
Depending upon the fields in question (flags, such as SYN FIN ACK RST URG PSH ..) it is easiest to set the fields using bitshifting arithmetic (
0x1 < TCP_OFFSET_SYN) and OR
| or AND
& the results with the existing field. Bitshifts just go easier with hexadecimal than decimal, and is often more convenient to read than octal.
It boils down to, whoever wrote the code you're reading probably thought hex was more understandable than decimal in that instance, but this is obviously subjective. Your opinion may vary. :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496669.0/warc/CC-MAIN-20200330054217-20200330084217-00229.warc.gz
|
CC-MAIN-2020-16
| 692 | 6 |
https://www.trendhunter.com/slideshow/15-slithery-snake-serpent-inspiredtrends
|
code
|
Ophidiophobia -- a fear of snakes, is one of the most common phobias. Whether or not the sight of a slithering serpent sends you screaming in terror, snakes are a popular theme on Trend Hunter.
We've seen snakes as security guards and snake inspired jewelry, handbags and footwear. There have been slick 'snakevertisments', and high-tech robot snakes. There have even been snakes at the spa with snake massages and snake venom being used to stay young. In the home there is a slinky desk lamp that looks like a cobra and a trendy heated snake rug that wraps you up Python style.
Take a peek at all these cool snake inspired innovations from Trend Hunter.
15 Slithery Snake & Serpent Inspired Designs
More Stats +/-
Snakes on a Bracelet
Cobra Guards $120,000 Sandals
Snake Pit Orgies Used For Children's Education
The Snake Robot
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744381.73/warc/CC-MAIN-20181118135147-20181118161147-00402.warc.gz
|
CC-MAIN-2018-47
| 828 | 9 |
https://github.com/anamaljkovic
|
code
|
Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 31 million developers.
A genre-based song recommendation tool built in React using the Spotify API. Incorporates OAuth and Node.
A chatbot built in React/Node.
An API providing data on independent Toronto cafes. Created with React, Node (Express) and MongoDB.
Forked from annananne/project-six
Forked from anvisandco/project4_real
in the last year
in private repositories
Feb 11 – Feb 20
Press h to open a hovercard with more details.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247506094.64/warc/CC-MAIN-20190221172909-20190221194909-00559.warc.gz
|
CC-MAIN-2019-09
| 582 | 11 |
https://irixguy.com/tag/gopro-hero9-black/
|
code
|
This is the monopod that I use for the GoPro HERO9 Black. Unlike smaller and more collapsible monopods, this monopod does not seem to exhibit visual flex that can make videos look wonky. I've also swam with this monopod many times in saltwater and it hasn't rusted through yet. The grip and wrist strap
This is how I export my GoPro HERO9 Black 5K30 video for YouTube upload. It's actually exported in 4K but it was filmed natively by the GoPro at 5K30 to capture extra detail. Enjoy and share! #GoPro #HERO9Black
This is how to edit 5K30 GoPro HERO9 Black video. The secret is to record the video as 5K30 to the GoPro and then edit as 4K30. This enables the GoPro HERO9 Black to capture the best video quality possible and then editing in 4K30 enables the video to be usable for a variety
This is how to download GoPro HERO9 Black videos to a computer using a USB-C cable. I use this procedure to import videos from my GoPro HERO9 Black into Final Cut Pro X. #GoPro #HERO9Black
The GoPro HERO9 Black is an exceptional action camera! Without a gimbal, I was able to achieve this incredible 4K footage while hiking! #GoPro #HERO9Black
This is how to open the GoPro HERO9 Black and how to close the GoPro HERO9 Black. The GoPro HERO9 Black must be opened to insert the microSD card, battery and to charge the GoPro HERO9 Black camera. If you've never used a GoPro camera before or have only used older model GoPro camera,
My GoPro HERO9 Black initial impressions are highly positive. I've been using GoPro HERO cameras since GoPro HERO2 and it's incredible how GoPro camera technology has continued to evolve! The forward-facing screen on the GoPro HERO9 Black is a major improvement! Being able to fold up the GoPro HERO9 Black mounting bracket while not in
If you've stumbled upon this page, then you'll likely been referred by IrixGuy or one of his followers. Below are the latest GoPro cameras, mounts and accessories. If there is something that you are looking for but don't see listed below, please ask! The best way to contact me directly is via my Facebook page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107874026.22/warc/CC-MAIN-20201020162922-20201020192922-00116.warc.gz
|
CC-MAIN-2020-45
| 2,068 | 8 |
http://www.tomshardware.com/forum/2153-63-7zip-stopped-working
|
code
|
I downloaded 7zip to open an rar file from Asus and it worked well . Today I ran a system health report and checked the event veiwer and found a critical error that said 7zip had stopped runnig but the program still opened . I removed 7zip. Does anyone know of free rar file opener in-case I need one agian.
When I looked for a program to open rar and other uncommon files 7zip looked like the best one, so I reinstalled making sure I had the 32 bit version and no problems so far. Thankyou for suggesting an alternitive, there is a lot of free software and it takes time to wade through all of it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413558067609.27/warc/CC-MAIN-20141017150107-00083-ip-10-16-133-185.ec2.internal.warc.gz
|
CC-MAIN-2014-42
| 598 | 2 |
https://partner.booking.com/en-gb/community/property-management/problem-advertising
|
code
|
Problem with advertising
Hello everyone ,
yesterday I tried, for a first time, to advertise my accommodation and accidentally advertised the same accommodation twice. Trying to correct mistake, I filed a request to terminate the concrat, and after the both ads disappeared from the Booking platform for guests. Please help me to correct this or start all over again.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474697.2/warc/CC-MAIN-20240228044414-20240228074414-00843.warc.gz
|
CC-MAIN-2024-10
| 366 | 3 |
https://jhatax.blogspot.com/2007/02/my-favourite-laptop.html
|
code
|
I don't work for CNET, I am not a hardware reviewer and I am not someone who works for a Hardware company. What am I then? I am a Software Engineer who works for Microsoft and loves computers. Why should you pay heed to my opinion on a good laptop? I'll quote my colleague John, who said in response to my farewell email, "By the way, we both know it would border on abuse to use your impressive hardware-stockpiling skills on a hardware team". To summarize, I am a Hardware Ho; I am friends with people who buy this stuff so laptops just come my way for testing, usability, etc, etc. Here is a list of the top 5 laptops I have had, ranked in order of most favourite to least favourite:
1. Lenovo Thinkpad T60p - My current laptop and the first to be at par with a desktop. Lenovo has a winner in this machine - sturdy, rugged and extremely stable.
2. IBM Thinkpad T21 - My first personally bought computer, maybe the last.
3. Apple Powerbook G4 - 256MB of RAM never felt so powerful.
4. Acer Ferrari 4000 - The first AMD64 laptop released by a real laptop company and with 2GB of RAM, it is a really fantastic laptop. The keyboard has to be the most responsive I have used.
5. Apple Mac Book Pro - Better than the others I have used but not pimp enough to be #1. A Wonky battery driver and a trackpad too large for my liking. :(
6. Toshiba Tecra M4 - The Tablet idea is bogus but the laptop was performant so it makes the list.
I have used 10 laptops in this life and the way I am going, I will use maybe 25 more before I die. That is unless I no longer have my sway with people (girls in particular) ;) You trust my hardware opinions now?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864957.2/warc/CC-MAIN-20180623093631-20180623113631-00255.warc.gz
|
CC-MAIN-2018-26
| 1,640 | 8 |
https://www.tr.freelancer.com/job-search/expert-admin/
|
code
|
i need expert linux admin to: -confgure wembail emails (3 eails) -configure spf dkim dmarc fowith postfix (for 2 ips) -setup ftp connection -install a wprdpress template -configure phplist (with auto bounce option)
We want to set up our own end-to-end IVR system. Need an expert who can consult, guide and get the set up completed from Hardware installation to software development. We are based in Mumbai.*Removed by Admin* get in touch directly. We have built a python program that we want to integrate over an IVR service. We will begin by you letting us know system
hi all, i need a expert freelancer who can do a video embedding script for me , where user can submit videos from youtube,dailymotion,facebook, script must have a powerful user registration system, secure and admin panel.. a example of the script can be : [login to view URL] please do mention your previous work
...need an expert developer who can prepare for me a list with questions and answers that I can use to test future developers knowledge. We want to do pre employment assessment test. Everyone who is going to bid on this project must be with excellent knowledge on Laravel and Wordpress and PHP of course. We are trying to target advanced to expert developers
I need some work to be done on my wp listing directory and want to hire some expert. The following plugins need to be updated or installed: - The old Envato Toolkit plugin to be deleted and the new Envato Market plugin installed - Listing Labels for WP Job Manager - Zip file attached - WP All Import Pro Ad listing [login to view URL]
Need someone expert with WordPress, php and divi theme Site: [login to view URL] We have two pages for exact same design: [login to view URL] and [login to view URL] If you in any page, we have this contact form (screenshot: [login to view URL] ) What we
Looking for expert to fix and add the features to my social website which was developed using PHP(codeigniter) and mysql. You will fix bugs quickly, change around on my admin panel, and add features to it and make it look good.
I need to develop a new website including admin site for my business. I want to complete it this month. I need an expert for this job. The website should be developed in Ruby on Rails or CodeIgniter. Ruby on Rails Developer will be our first choice. Reference Site: [login to view URL], [login to view URL] Please check the references first
I need an advanced white hat link building expert. Tasks will include: 1. Prospecting - I need you to go out and find niche relevant opportunities. This will include: Link roundup opportunities Guest posting opportunities Sponsored post opportunities Resource page links Broken link building 2. Outreach - I need someone who can use the email templates
I am looking for some one with good at both Android and IOS expert to develop my billing software. I am looking for especially Chinese with good English knowledge. Restful services should be written in Spring Boot, JSON, JPA, MYSQL and Angular.js as front end for web portal at admin side.
...but he wants to see us as a ATM machine. The web pages are showing but we are unable to edit and update on Admin Panel. You need to search and delete that code/script so we can easily work and update our website at our office. Only expert core PHP, Cake PHP, Codeigniter who already did such job successfully. More information will provide to the
I need an expert in php to create additional feature in the admin area You can replicate actual page an customize the page as per our requirements We have a quiz website and want a page where we can see all questions based on search querie with the possibility to copy to anther quiz, delete question from the actual quiz one by one or bulk my budget
WriteIT is glad to announce the vacancy of Copywriter: Job Responsibilities Communicating with subject matter expert and different stakeholders to understand products and services in different industries with the aim of producing their marketing collateral including Web sites content, brochures, case studies, white papers, companies’ profiles, blog
Required the Experienced Professional SEO Expert ,With Good Hands-on On Portfolios. Contact With Complete Updated Profile on (Removed by Freelancer.com admin)
I am locked out of wordpress admin panel and need the password to admin panel reset urgently. I have all server details. Need wordpress expert to quote to fix this immediately
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590362.13/warc/CC-MAIN-20180718232717-20180719012717-00028.warc.gz
|
CC-MAIN-2018-30
| 4,433 | 15 |
http://astratech.org/connecting-a-netbook-to-a-wireless-network/
|
code
|
One of the great advantages of a netbook or mini laptop is that it's portable because it's small and light. To do this, you should take full advantage of this by creating a wireless network that eliminates the need for wires and allows you to connect to the broadband Internet when your netbook is turned on and share the connection between multiple computers if you want.
There are two types of broadband service: ADSL that uses telephone lines, and Cable that uses a cable network. Both of them need a device named "router" in order to operate and differ for all services. Make sure broadband service has the right type of router or it will not work.
Why is wireless connection?
If you are using a wired router connection using an ADSL or cable modem, you can only connect one computer as it has only one network (Ethernet) port from the router to your computer. However, with a wireless router, you can connect the Ethernet cable to the router, which transmits the wireless signal to as many computers as you want.
When you first sign up as a Broadband ISP, you will send a router that you must install to be able to connect to a computer. Calmly, if you have a cable service (for example, Virgin Media or NTL in the UK), an engineer visits your home and is wearing a "cable modem" first. You still have to connect the router.
There are only a few easy steps to set up a wired connection; connects a cable from the phone socket (or cable modem) to the router and another cable from the router to the computer, turns it on, sets up the router, sets security, and is ready. Each ISP provides detailed guidance on how to assign it specifically to the service, so please follow the instructions and follow them.
Each computer needs a wireless card (or adapter) to read this signal and connect to the Internet, but the latest laptops and netbooks have built it up. If you can set up a home or office wireless network to connect to the Internet, you can share printers and even files between computers connected to the network – so any computer can send work to the printer.
To configure the wireless network, you need the following components:
- Broadband Internet Connection (ADSL or Cable)
- Depending on the ISP's modem
- filter and / or signal splitter, an ADSL telephone line
- wireless router and two network cables
- with a built-in wireless network card or
- If not installed, all wireless network adapters on each computer
Setting Up Wireless Broadband
you need to configure the wireless network as follows:
Connect the filter to the phone socket and then the cable from the filter to the ADSL modem
Connect Cable 1 to the ADSL Modem
Turn on the modem
Connect the other end of the cable to the router
Important : If you do not have a modem, plug the filter (micro filter) into the phone socket and connect the phone line from the filter directly at the back of the router.
Turn on power on the router
Connect the cable to the router
Connect Cable 2 to the Ethernet Port of Your Computer
Turn on the computer and open the browser
Enter the default IP address (192.168.1.1) to open the configuration panel
10. Configure the router as follows:
default username usually "admin"
default password usually "admin"
enter the network key (SSID)
Specify security settings
select WEP or WPA -PSK
select the encryption type
When you have finished configuring the router, unplug the Ethernet cable from the computer. You should now look up the available networks from the icon in the bottom right corner of the screen. Find the network you just set and select Connect.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141706569.64/warc/CC-MAIN-20201202083021-20201202113021-00583.warc.gz
|
CC-MAIN-2020-50
| 3,564 | 34 |
http://mattecapu.github.io/me.html
|
code
|
My name is Matteo Capucci, I'm 18 years old, and I'm currently attending the faculty of mathematics at University of Modena and Reggio Emilia, in
I'm fond of science, beauty and tasty food.
Since my childhood I explored the realms of informatics, mathematics and physics, and I still enjoy learning, discussion and intellectual challenges.
In the last six years, after I got in touch with desktop programming, I taught myself web design and web development, ending up playing with the most recent technologies (HTML5, Node.js, ...) but starting from a more classic background such as PHP and Apache.
My skills are mainly self-taught, through the study of manuals, online tutorials and articles, talks and lectures. As of today, I'm capable of both front-end and back-end design and development, with a wide range of tools, yet I'm still widening my knowledge and exploring new ways of coding and design: in every project, I learn something new.
Anyway, the pure disciplines remain my greatest intellectual passion: I'm fascinated by mathematics, informatics and many other areas of science.
In 2014 I followed the famous Andrew Ng's course on Machine Learning on Coursera and I fell in love with the subject. As of now, I want to pursue a career in the field, hopefully combining it with my fondness of web design and development.
During high school years, I regularly partecipated to school competitions, often reaching the final stages at a national or regional level, which testifies my eagerness to problem solving.
In both 2013 and 2014 I was a national finalist at the Italian Olympics of Informatics, eventually being awarded with a bronze medal. From 2013 to 2015 I competed with my school team to the Olympics of Mathematics, reaching the national final and ranking above every other team from Emilia-Romagna.
The same year (2014) I also attended the ESA's CAN SAT European competition, in Andøya, Norway.
In 2015 I graduated at ISS F. Corni with the highest honours (100/100).
I'm currently attending the faculty of mathematics at University of Modena and Reggio Emilia.To learn more about my projects and skills, check out my projects.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806939.98/warc/CC-MAIN-20171123195711-20171123215711-00472.warc.gz
|
CC-MAIN-2017-47
| 2,147 | 12 |
http://www.gsp.com/cgi-bin/man.cgi?section=1&topic=xdino
|
code
|
|This option sets the initial position of the dino window (resource name "geometry").|
|This option specifies the X server to contact.|
|-[no]mono||This option allows you to display on a color screen as if monochrome (resource name "mono").|
|This option allows you to see the dino window in reverse video (resource name "reverse").|
|This option specifies the foreground of the dino window (resource name "foreground").|
|This option specifies the background of the dino window (resource name "background").|
|This option specifies the border color of the cubelets in the dino window (resource name "borderColor").|
|This option allows you to change the color of a face (resource name "faceColorN"). In mono-mode, color is represented as the first letter of the color name. On the 2-D version, the faces are ordered top to bottom and left to right on the "t" configuration. The "+-" configuration is physically consistent with the former, so it is ordered "0, 1, 2, 3, 5, 4". If you has two colors that begin with the same letter you should have one in uppercase and one in lowercase to distinguish them in mono-mode. You can change the colors of the faces to make a stupid cube (i.e. all White or in mono-mode all "W"). Unfortunately, it will not normally say its solved when its randomized. This would be cheating.|
|This option allows you to set the turning mode (resource name "mode").|
|-both||This option allows you to set the turning mode to both period 2 and period 3 (resource name "mode" set at 4).|
|This option allows you to access the orient mode (resource name "orient").|
|This option allows you to access the practice mode (resource name "practice").|
|This option specifies the user name for any records made or else it will get your login name (resource name "userName").|
The format is not standard. The reason for this is that this is simple and I do not know what the standard is.
mode: 2-4 <period 2 turning, period 3 turning, or both (4)>
orient: 0-1 <O false, 1 true; if 1 then lines on pieces are to be oriented>
practice: 0-1 <0 false, 1 true>
moves: 0-MAXINT <total number of moves>
startingPosition: <2 dimensional array of face and edge position, each face 4 edge pieces, if orient mode then orientation number follows face number: 0 up, 1 right, 2 down, and 3 left>
This is then followed by the moves, starting from 1.move #: <face> <edge> <direction> <style> <control>Each turn is with respect to a corner on a face.
The edges start at the top and work clockwise.
Direction is represented as 0 upper right, 1 lower right, 2 lower left, 3 upper left, 5 clockwise, 7 counterclockwise, 8 up, 9 right, 10 down, and 11 left.
Style is represented as 0, 1, or 2, 0 if just a corner is rotated, 1 if the center of the cube is moved, and 2 if a period 2 twist.
Control is represented as 0 or 1, 1 if the whole cube is moved at once (here the edge does not matter), 0 if not. The xdino record keeper does not count a control move as a move, but here we do.
Caution: the program may crash on corrupted input.
International Puzzles & Games Catalog
® Copyright 1995-99, David Albert Bagley
Send bugs (or their reports, or fixes) to the authorDavid Albert Bagley, <[email protected]>
The latest version is currently at:
|V5.5||XDINO (6)||20 June 1999|
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267862248.4/warc/CC-MAIN-20180619095641-20180619115641-00197.warc.gz
|
CC-MAIN-2018-26
| 3,270 | 30 |
https://magento.stackexchange.com/questions/208472/adding-customer-account-layout-to-custom-page
|
code
|
I add new link to customer account sidebar like in the image below.
Customer account sidebar :
And i create new page for
Reset Employee Password link, and it's done like in the image below.
Then, my question is, how can i made my custom page like in the customer account page? (There's sidebar, and other things). Or for example, like in image below.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100593.71/warc/CC-MAIN-20231206095331-20231206125331-00777.warc.gz
|
CC-MAIN-2023-50
| 350 | 5 |
http://www.ccasoftware.com/index.php/tsi-products/n2o-n2o-3gl
|
code
|
The ADABAS/NATURAL product offerings from CCA's partner Treehouse Software, Inc. (TSI), include N2O, a NATURAL application change management system and 3GL support for PANVALET, LIBRARIAN, ENDEVOR, and PDSs.
Applications may consist of hundreds of objects, which may be changed by many programmers. Managing the development and maintenance of applications involves tasks such as:
- Controlling migrations into production environments Avoiding program overwrites Tracking the current location of a program Verifying that program changes are made Changing all related objects Archiving and recovery
- Maintaining complete audit trails
Manual change management can be time-consuming and prone to error. CCA's partner Treehouse Software developed N2O to provide cost-effective automated change management for NATURAL objects, SYSERR messages, and PREDICT objects.
Applications often contain non-NATURAL components, such as COBOL or JCL. N2O/3GL, a separately-priced N2O feature, allows the batch migration of 3GL/Other objects stored in partitioned datasets, PANVALET libraries, LIBRARIAN master files, or ENDEVOR stages.
Additionally, N2O/3GL provides Checkout/Checkin and audit trails for 3GL migrations, which allow the N2O Administrator to effectively manage the changes in 3GL environments.
N2O/3GL uses a site's 3GL repositories for migrating 3GL objects and follows a site's 3GL naming conventions. N2O with N2O/3GL migrates ASSEMBLER, COBOL, FORTRAN, PL/I, and RPG source code, as well as JCL and other data types.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866938.68/warc/CC-MAIN-20180525024404-20180525044404-00283.warc.gz
|
CC-MAIN-2018-22
| 1,518 | 8 |
https://research.birmingham.ac.uk/en/publications/mitochondrial-heterogeneity-metabolic-scaling-and-cell-death
|
code
|
Heterogeneity in mitochondrial content has been previously suggested as a major contributor to cellular noise, with multiple studies indicating its direct involvement in biomedically important cellular phenomena. A recently published dataset explored the connection between mitochondrial functionality and cell physiology, where a non-linearity between mitochondrial functionality and cell size was found. Using mathematical models, we suggest that a combination of metabolic scaling and a simple model of cell death may account for these observations. However, our findings also suggest the existence of alternative competing hypotheses, such as a non-linearity between cell death and cell size. While we find that the proposed non-linear coupling between mitochondrial functionality and cell size provides a compelling alternative to previous attempts to link mitochondrial heterogeneity and cell physiology, we emphasise the need to account for alternative causal variables, including cell cycle, size, mitochondrial density and death, in future studies of mitochondrial physiology.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510334.9/warc/CC-MAIN-20230927235044-20230928025044-00489.warc.gz
|
CC-MAIN-2023-40
| 1,085 | 1 |
https://k5wiki.kerberos.org/wiki/Release_Meeting_Minutes/2008-10-07
|
code
|
Release Meeting Minutes/2008-10-07
Meeting notes for 2008-10-07:
Master key rollover project:
- Will will respond to Ken's comments and make some additions to the test plan on the project page.
- The project has been approved.
- Tom has added a "Lore" category with some notes.
- Target audience: development contributor
- Visibility in order of expanding levels of engagement:
- I want to report a bug
- I want to submit a patch
- I want to write better patches
- Coding standards
- Building from source
- Running the test suite
- I'm interested in the active projects
- I'd like to know about inactive project ideas and designs
- I'd like to know how one becomes a committer
- I am a committer or staff member
- How to use the repository
- How to use the Coverity infrastructure
- How to use the test lab infastructure
- Greg will take responsibility for improving the wiki, but not immediately
- The wiki should not be used for discussion (that's what the list is for), but should be used to summarize the results of discussions so they don't get lost in the list archives. This will require human effort; there is no automated process for converting good discussions into good summaries.
- One of our test cases references an MIT DNS record; we can use "host" to determine whether to run that test case
- Test suite should ideally be self-contained with regard to the net
- In the long run, we could produce better unit tests if the test suite could divert the network layer and return pre-coded results (including errors). Greg may implement this eventually.
- Unit tests of that nature are inherently limited and are not a substitute for full integration tests
- One of the Berkeley DB hash tests is failing for Will; we can't reproduce it currently. He will look into it.
Road map for KDB:
- Separate DB lookup functionality into functional components, such as "the information needed to grant a ticket"
- Current model is tailored to BDB and a particular data model
- With functional APIs, the data model coudl be made more friendly to a relational database or LDAP database
- Start by creating APIs implemented on current data model
- Later, migrate to more natural data models
- Old APIs might need to be preserved, but would become less efficient when used with new data models.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103344783.24/warc/CC-MAIN-20220627225823-20220628015823-00127.warc.gz
|
CC-MAIN-2022-27
| 2,289 | 35 |
https://www.mail-archive.com/[email protected]/msg04483.html
|
code
|
(Yet again probably will probably not be treated as a response.)Not sure of
your current status, but here's my understanding:-- Zim keeps the important
parts of a notebook as ordinary text files.-- But there are a few things it
keeps in a cache directory. If need be those can be re-created, but, for
efficiency, they're kept around.-- One such thing is its index, which is kept
as a sqlite3 database. If that's missing, it will be created when zim starts.
In particular, if the database gets corrupted, you can probably workaround that
by deleting the db file and having zim re-create it from scratch.-- The 'cache'
directory and the 'index' directory are the same (I think), but the terminology
may not be consistent.
-- Usually the cache directory is a hidden directory inside the notebook
directory (the directory that contains all the notes for a notebook), but by
setting a command-line flag it could be elsewhere.-- Not sure how good zim is
at coping with the cache directory not existing.-- Also, not sure how good zim
is at dealing with other index-creation failures.
My guess is that your problem(s) have to do with the one or both of the last
two. So try-- re-creating the default .zim directory in the notebook (prob.
~/Notebooks/Notes/.zim), then normal start for zim.-- create a separate
directory, then start zim with the --index flag. Don't use the directory for
other things, not even other zim notebooks.In both cases make sure you can read
and write to the directory.If neither works, most likely it's due to an
index-creation failure, and might require further testing or setting a debugger
breakpoint or running a version of zim with better diagnostics.
Mailing list: https://launchpad.net/~zim-wiki
Post to : [email protected]
Unsubscribe : https://launchpad.net/~zim-wiki
More help : https://help.launchpad.net/ListHelp
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866917.70/warc/CC-MAIN-20180525004413-20180525024413-00446.warc.gz
|
CC-MAIN-2018-22
| 1,855 | 27 |
http://stackoverflow.com/questions/3226816/iphone-and-ipad-rich-text-editor
|
code
|
I need to create a rich text editor (for text alignment, fonts, text and background colours, bold, italics, underlining etc) for an iPhone and iPad app. How should I accomplish. I have heard of storing the data as HTML and rendering it in a UIWebView, but how can I allow the user to edit the data without having to interact with the HTML source?
Go into the style part of Three20 UI. It may be what you need for. I don't know if it is a overkill for a starter, but you may try
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701165378.58/warc/CC-MAIN-20160205193925-00004-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 477 | 2 |
https://dev.to/yashverma1/comment/4nic
|
code
|
My name is Yash, and I am a software engineer from India. I've studied a lot of theory on Data Science subjects such as predictive modelling, inferential statistics and touched base on machine learning and NLP. I am here to hopefully learn about how to practically implement what I've learnt. Oh and my favorite non-coding hobby is playing DotA 2
We're a place where coders share, stay up-to-date and grow their careers.
We strive for transparency and don't collect excess data.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572289.5/warc/CC-MAIN-20190915195146-20190915221146-00513.warc.gz
|
CC-MAIN-2019-39
| 478 | 3 |
https://explore.glasp.co/?url=docs.oracle.com%2Fen%2Fdatabase%2Foracle%2Foracle-database%2F19%2Fshard%2Fsharding-overview.html
|
code
|
Middle-tier routing. In addition to sharding the data tier, you can shard the web tier and application tier, distributing the shards of those middle tiers to service a particular set of database shards, creating a pattern known as a swim lane. A smart router can route client requests based on specific sharding keys to the appropriate swim lane, which in turn establishes connections on its subset of shards.
database sharding, in which they distribute segments of a data set—a shard—across lots of databases on lots of different computers.
Sharding uses a shared-nothing architecture in which shards share no hardware or software. All of the shards together make up a single logical database, called a sharded database
From the perspective of the application, a sharded database looks like a single database
Oracle Sharding is a feature of Oracle Database that lets you automatically distribute and replicate data across a pool of Oracle databases that share no hardware or software
strict data consistency, complex joins, ACID transaction properties, distributed transactions, relational data store, security, encryption, robust performance optimizer, backup and recovery, and patching with Oracle Database
Oracle innovations and enterprise-level features, including Advanced Security, Automatic Storage Management (ASM), Advanced Compression, partitioning, high-performance storage engine, SMP scalability, Oracle RAC, Exadata, in-memory columnar, online redefinition, JSON document store, and so on
Programmatic interfaces, such as Java Database Connectivity (JDBC), Oracle Call Interface (OCI), Universal Connection Pool (UCP)
Oracle Sharding provides the best features and capabilities of mature RDBMS and NoSQL databases
horizontal partitioning of data
horizontal partitioning of data across multiple independent physical databases
A sharded table is partitioned across all shards of the sharded database. Table partitions on each shard are not different from partitions that could be used in an Oracle database that is not sharded.
Oracle Sharding automatically distributes the partitions across shards when you execute the CREATE SHARDED TABLE statement, and the distribution of partitions is transparent to applications
Oracle Sharding provides linear scalability, complete fault isolation, and global data distribution
Oracle Sharding supports scaling up to 1000 shards
Single points of failure are eliminated because shards do not share resources such as software
Shards are protected by Oracle MAA best practice solutions, such as Oracle Data Guard and Oracle RAC.
Geographical Distribution of Data
Glasp is a social web highlighter that people can highlight and organize quotes and thoughts from the web, and access other like-minded people’s learning.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100523.4/warc/CC-MAIN-20231204020432-20231204050432-00158.warc.gz
|
CC-MAIN-2023-50
| 2,773 | 19 |
https://forum.mautic.org/t/403-error-after-uploading-the-mautic-and-404-error-if-remove-htaccess/28913
|
code
|
Your software 45_mautic-449
My PHP version is : 7.4
My MySQL/MariaDB version is (delete as applicable): MySQL/MariaDB version
I am (delete as applicable): Installing
Upgrading/installing via (delete as applicable) : Web
These errors are showing in the installer : Forbidden
Access to this resource on the server is denied!
These errors are showing in the Mautic log :
My problem is : I install Mautic on my Hostinger subdomain hosting and connect Amazon SES with Mautic.
I am getting errors at the last step and I am unable to resolve this, I have attached the screenshot of the error.
I have already tried these:
- increase the memory
- increase the PHP memory
- test with different PHP version
- delete and reinstall
- delete the subdomain and reinstall
- create a database and user and integrate with Mautic
- added .htaccess from GitHub
- my current php version is 7.4 but i have checked with php 8 as well
when I remove the .htaccess the 403 error finish but when I put all the detail like database name, user name password, the next step admin user name and password, and when I click next then it goes to 404.
here is my subdomain mautic.softcrust.net
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00689.warc.gz
|
CC-MAIN-2023-50
| 1,158 | 21 |
https://forum.gl-inet.com/t/help-with-freeradius2-install-guide/1651
|
code
|
I tried to install and test freeradius2 on my GL-AR150 without success…
I followed several guides but when I reach the step to run radiusd -XX what i get is the is the following message at the end
radiusd: can’t resolve symbol ‘EC_KEY_new_by_curve_name’
this are the guides that i had followed:
Thanks for any help
I didn’t try. But this seems something in your radiusd.conf file.
Is it possible to find out “EC_KEY_new_by_curve_name” and remove from this file?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710690.85/warc/CC-MAIN-20221129064123-20221129094123-00722.warc.gz
|
CC-MAIN-2022-49
| 475 | 7 |
https://kylechowning.com/a-model-leader/
|
code
|
For those of you business types, I was turned onto Michael Hyatt’s blog recently. Who is he? He recently was promoted to the CEO and President of Thomas Nelson after Sam Moore had the reigns for 47 years…BIG shoes to fill.
So if you’re looking for productivity and efficiency inspiration, look no further. In one night, his suggestions for email efficiency inspired me to go through over 7200 emails to only have 2 left in my inbox. What did I do? Read this.
Oh…and he even responds to emails from strangers….I tried and got a response in less than 4 hours.
I want to be like Mike.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473518.6/warc/CC-MAIN-20240221134259-20240221164259-00350.warc.gz
|
CC-MAIN-2024-10
| 591 | 4 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.