url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://mail.haskell.org/pipermail/glasgow-haskell-users/2008-January/014240.html
code
Using "GHC as a library" with own functions makes runStmt return mads_lindstroem at yahoo.dk Wed Jan 30 12:00:16 EST 2008 I am trying to use "GHC as a library". From runStmt, I want to load and run functions from a home-grown module. Lets call my home-grown module HomeGrown.hs. I have tried to model my application after http://haskell.org/haskellwiki/GHC/As_a_library . This library loads MyPrelude.hs and runs myPutStrLn & myGetLine + more. However, when I try to run code from HomeGrown.hs like: runStmt session "HomeGrown.foo" GHC.SingleStep runStmt keeps returning RunBreak (of type RunResult). From what I can read of the WWW, RunBreak is related to some debugger and indicate that GHC encountered some breakpoint. However, I did not set any break points. Comparing Interactive-6.8 and MyPrelude.hs to my own code, the largest difference seemed to be that Interactive-6.8 do not only use MyPrelude.hs by calling `addTarget` and `setContext`, it also imports MyPrelude.hs as a regular Haskell import (import MyPrelude). Thus I tried to remove this import to see what would happen. Interactive-6.8 compiled and started just fine. However, whenever it needed to use any functions in MyPrelude, runStmt also returned So is it only possible to load home-grown/non-standard modules when also doing a More information about the Glasgow-haskell-users
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00855.warc.gz
CC-MAIN-2024-18
1,349
21
http://fcx.trattamentivisolucca.it/
code
- React Icons Include popular icons in your React projects easily with react-icons, which utilizes ES6 imports that allows you to include only the icons that your project is using. - Stateless components are also called functional components or presentational components. In React, such components always render the same thing or only what is passed to them via props. Your aim, as a developer, should be to create stateless components even if there is no immediate scenario in which you would have to reuse that particular ... - Apr 21, 2020 · React components are more than UI, they also contain logic, functionality that sometimes is much harder to test emulating a user clicking buttons, than with a good unit test. Explosion of tests Before showing an example of why sometimes it's nice to have access to the component instances in our testing, I'll share react-dom-instance , a library ... Types of backup in vmware Hemp inc phone number Blizzard error code blzbntbgs00000002 Transaction line field netsuite 27x41 portfolioInolvidable solido lyrics in english Paylocity web timeBoyesen rad valve cr250 Villa til salg lejreSupernatural discord Clientele phone systemPulley shop near me
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587608.86/warc/CC-MAIN-20211024235512-20211025025512-00086.warc.gz
CC-MAIN-2021-43
1,191
11
https://ahwhattheheck.wordpress.com/2013/09/10/creating-a-video-from-a-lot-of-images/
code
On my daughters second birthday, I placed the gopro in a corner of the living room and had it shoot a photo every minute. Since it cost me quite some time to get those pictures into a video, I figured I’d share how it worked for me. Before you begin, there are some tools you need to install in order for the script to work: The first step is to convert the images to a lower resolution (a video with more than 1920×1080 pixels rarely makes any sense). Then, in order for avconv to be able to read multiple images, you have to rename the pictures so the filenames contain sequential numbers. Sounds weird? Well, here’s a quote from the avconv manpage: If the pattern contains “%d” all the following numbers must sequential. This limitation may be hopefully fixed. The third step, at least for me, was to insert a timestamp into the video, so one could see in the video how the day evolved. I read that timestamp from the image file’s exif information and then place it into the lower left corner of the image. Last step is to actually create the video. I played with the avconv settings a bit and found that using 5 pictures per second (-r 5) does not make the video take too long and you still get an idea of the day. If you want to tune the timelapse, try changing the -r 5 to something different. Here it goes: mkdir caption i=1 for f in *JPG *jpg; do text=$(jhead $f | grep ^Date | cut -b 27-31); echo "Converting $f and inserting \"$text\"" convert -geometry 1920 -font Courier-bold -pointsize 80 \ -fill purple -draw "text 0,1420\"$text\"" $f caption/video-$i.JPG; i=$((i+1)); done cd caption # create video avconv -r 5 -f image2 -i video-%d.JPG -r 25 -b 65536k video.avi The video should now be available in the newly created “caption” folder.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509170.2/warc/CC-MAIN-20181015100606-20181015122106-00301.warc.gz
CC-MAIN-2018-43
1,765
10
https://www.techunheard.com/about/
code
Tech Unheard is dedicated to providing practical, user-friendly privacy advice to empower users to protect themselves (and their loved ones) online. Between social media, smart home devices, and the internet as a whole, it can be challenging to understand the privacy risks each technology presents. Tech Unheard aims to provide general privacy best practices that are easy to understand as well as tailored privacy advice for individuals and families. I’m a Privacy Engineer at GoFundMe working on the interdisciplinary challenges of user privacy in a connected world. I’m also an advocate for privacy education and fairness in technology. Before Amazon, I was a privacy engineer at Google and Robinhood where I specialized in machine learning privacy, anonymization, and product inclusion privacy. Previously, I worked in various areas of cybersecurity and privacy at Lockheed Martin, Cisco, CNN, and Boeing. I hold a Master of Science in Cybersecurity Law from the University of Maryland. My studies focused on privacy, particularly children’s privacy law, and national security. In 2019, I earned a Bachelor of Science in Cybersecurity from Kennesaw State University and became the first woman and first African American to receive this degree in Georgia. Before that, I studied Computer Science at Howard University. You can find more information about my experience on LinkedIn. - Spoke to Girls Who Code and the Computer Engineering Apprentices organizations about navigating the tech industry. January 29, 2021. - Received Kennesaw State University’s Outstanding Student in Cybersecurity Award. January 7, 2021. - Presented my research on the security and privacy needs of activists (with Blase Ur and Marshini Chetty) at the Women in Cybersecurity Conference. March 13, 2020. - Led a cryptography workshop for high school students through Her Spark. July 31, 2019. - Graduation featured by Melanin in Stem. July 25, 2019. - My research was highlighted by Kennesaw State University’s Cole College of Business. May 21, 2019. - Presented my undergraduate research on incident response times with Dr. Humayun Zafar at the National Conference on Undergraduate Research. April 13, 2019.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818835.29/warc/CC-MAIN-20240423223805-20240424013805-00378.warc.gz
CC-MAIN-2024-18
2,199
13
https://discourse.julialang.org/t/pyplot-not-projecting-netcdf-as-expected/9446
code
I am ending up with when trying to plot the following netcdf data As far as I can tell I have chosen the appropriate projections. using NetCDF, PyPlot, PyCall; @pyimport seaborn as sns; @pyimport cartopy.crs as ccrs; @pyimport cartopy.feature as cfeature; sns.set() lats = ncread("T2.nc", "XLAT"); lons = ncread("T2.nc", "XLONG"); sst = ncread("T2.nc", "T2"); ax = axes(projection = ccrs.RotatedPole()) contourf(lons, lats, sst, transform = ccrs.PlateCarree()) ax[:set_xlim](-80, 10); ax[:set_ylim](-50, 5); Any ideas on how why this would be happening?
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247490107.12/warc/CC-MAIN-20190219122312-20190219144312-00533.warc.gz
CC-MAIN-2019-09
553
5
https://gladhoboexpress.blogspot.com/2022/04/leyland-numbers-with-exactly-one.html
code
Some three months ago, I suggested on Mathematica Stack Exchange that there are 39542 Leyland numbers with exactly one million decimal digits. On my earlier-this-month blog post, I pointed out that I had created a dictionary of 39556982 Leyland-number (x,y) pairs in order of increasing magnitude, starting with the smallest 1000000-digit L(999999,10). The Leyland number L(x,y) = x^y + y^x, x ≥ y > 1. It's easy to cull from this list the first 39542 entries and I present them now here. The final L(190793,174294) is the entry just prior the appearance of the 1000001-digit L(1000000,10).
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00306.warc.gz
CC-MAIN-2023-50
592
1
https://www.17track.net/en/yq/190380-lmsy
code
Official website: https://www.lmparcel.com/ Liumai Express is a direct-delivery logistics brand established by JiuFang Logistics. Positioned in 'providing the safest direct delivery logistics services', it provides cross-border e-commerce sellers with stable, fast, and cost-effective door-to-door logistics services for packet. (# -> Letter, * -> Digit, ! -> Letter Or Digit) - LME## *** *** *** * YQ
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038060927.2/warc/CC-MAIN-20210411030031-20210411060031-00606.warc.gz
CC-MAIN-2021-17
407
4
http://xirawo.bowling-vrn.ru/internet-dating-red-flags-1846.html
code
Internet dating red flags If your date is a brain surgeon that loves video games, it's okay that they're constantly plotting to kill you, right? Want to avoid the disappointments and aggravation of online dating? Pick the wrong ones and you'll waste time and energy, occasionally suffering wipe-outs that can leave you dazed, distracted and dispirited when the right man or wave comes along.Treat online winks like whistles you might elicit on a busy city street. A growing epidemic in the world today is the Online Romance Scam. Generally, a victim is contacted by someone online through various social media or a legitimate dating website. You can find a friend, or it might lead to disaster and even death. It is extremely important to heed the "Red Flags" that pop up in your mind when you sense or hear something that just does not seem right about the person on the other end. I receive a TON of e-mails per year from victims asking for help (because they knew I always wanted to be a spy). Unfortunately, by the time the money leaves their hands, it is gone forever. The scammers use internet cafes and reroute money multiple times to untraceable sources, and therefore, their true identity cannot be discovered. You certainly don't whistle back -- or go and start a conversation! It signals ambivalence and/or arrogance -- not decisiveness and determination. See if your online dating site allows you to set your preferences to block winks, so that you won't be tempted down this time-wasting path. Subject bars that go "Hmmmmmmm....." You do not want to date Mr. If you're having trouble understanding why "Hmmmm" is problematic, then try this exercise. They have even been known to telephone their victims as a first introduction.Tags: Adult Dating, affair dating, sex dating
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400202686.56/warc/CC-MAIN-20200922000730-20200922030730-00762.warc.gz
CC-MAIN-2020-40
1,785
11
https://meta.askubuntu.com/users/587784/dmitry-kudriavtsev
code
I'm just a guy who likes to ask and answer questions. WA, United States Member for 3 years, 3 months 2 profile views Last seen yesterday - Code Golf 5.7k 5.7k 22 gold badges2323 silver badges5959 bronze badges - User Experience 1.1k 1.1k 11 gold badge55 silver badges1111 bronze badges - Meta Stack Exchange 318 318 11 silver badge99 bronze badges - Code Review 298 298 11 silver badge1212 bronze badges - Unix & Linux 258 258 11 silver badge1212 bronze badges - View network profile → Top network posts Keeping a low profile. This user hasn't posted yet. Oct 22 '16
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540499389.15/warc/CC-MAIN-20191207105754-20191207133754-00360.warc.gz
CC-MAIN-2019-51
568
15
http://samuelkerr.com/new-theme/
code
Apparently the last time WordPress updated itself, something changed. I noticed I was unable to login to the admin page, but the normal blog worked fine. I tried a bunch of different fixes I found online, but the problem was that the wp-admin/ folder was set to group writeable permissions (0775), rather than owner write only. Changing permissions on the folder to 0755 fixed the problem for me. I tried resetting my theme as part of the fix. I actually kind of like this theme (the default) so I might keep it for a while.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991870.70/warc/CC-MAIN-20210517211550-20210518001550-00487.warc.gz
CC-MAIN-2021-21
524
3
https://discourse.nixos.org/t/managing-nix-daemon-via-systemd-in-ubuntu/5069
code
On digging further, it seems there is a service file present. $ cat /etc/systemd/system/nix-daemon.service ExecStart=@/nix/store/6chjfy4j6hjwj5f8zcbbdg02i21x1qsi-nix-2.3.1/bin/nix-daemon nix-daemon --daemon But, still the systemctl enable fails $ sudo systemctl enable nix-daemon The unit files have no installation config (WantedBy, RequiredBy, Also, Alias settings in the [Install] section, and DefaultInstance for template units). This means they are not meant to be enabled using systemctl. Possible reasons for having this kind of units are: 1) A unit may be statically enabled by being symlinked from another unit's .wants/ or .requires/ directory. 2) A unit's purpose may be to act as a helper for some other unit which has a requirement dependency on it. 3) A unit may be started when needed via activation (socket, path, timer, D-Bus, udev, scripted systemctl call, ...). 4) In case of template units, the unit is meant to be enabled with some instance name specified.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251684146.65/warc/CC-MAIN-20200126013015-20200126043015-00011.warc.gz
CC-MAIN-2020-05
977
18
https://www.reddit.com/r/Python/comments/1wcc18/what_are_the_advantages_to_using_classes_vs_not/
code
Classes are a way to organize your code into generic, reusable peices. At their best they are generic blueprints for things that will be used over and over again with little modification. The original concept was inspired by independent biological systems or organism unique from other organisms by the set or collection of features (attributes) and abilities (methods). Functions are great to use when data is central to the work being done. Classes are great when you need to represent a collection of attributes and methods that will be used over and over again in other places. Generally if you find your self writing functions inside of functions you should consider writing a class instead. If you only have one function in a class then stick with just writing a function. A good way to move from functions to classes in your programming is to write classes using composition over inheritance. Its covered in Zed Shaw's "python the hardway" and there was a stellar talk on it at the last pycon. Classes are very useful for reusable code or for functions that are closely related to certain data. The problem is that classes act a lot of complexity to your program and people, who love to use classes, tend to overuse and overthink them. So while it would be nice to have everything reusable as a class a lot of times it just ends up in a big mess. I think it is a very common mindset by developers nowadays to be very careful with classes and evaluate their value vs complexity when using them. It comes down to a balance act. For complex things like an engine or API they are mandatory though. If you ever dive into java programming, you will see lots of examples why OOP isn't everything. There are countless arguments on OOP vs procedural programming out there and even Linus got involved recently - stating that C++ was an awful invention and object models a hindrance later down the release line. What it really boils down to is how you write software/who works with you/what interfaces you need to your code/what your software actually is!! My personal preference is to use classes when I need to create several instances of a similar thing. Each item might have some uniqueness which can be defined when calling the constructors. After using lua last year for some game jam's and some mod scripting I can honestly say that you miss having hard backed OOP from a language like Python very quickly. I'm always surprised at Linus's attitude to C++. For embedded/kernel, there is perhaps an argument that it's too heavy. From a design perspective though, the Linux kernel has one of the most object-oriented designs you will find. To convert the kernel to C++ (I'm not suggesting this, it would be a pointless waste of time) would be no trouble whatsoever for them -- it would just be a change of syntax. Having been coding for 25+ years, migration to OOP is very frustrating. I can see the benefits of it but, as mentioned by others, classes are sometimes over thought, overused and abused. This makes adapting to it very confusing. I've looked at some of this code and, frankly, find making any sense out of it useless. Use classes where it helps but don't rely on it totally discounting procedural programming where applicable and more straightforward. When I started working I did so at a telecom company and I was thrust into a team writing code for a new generation of a phone system. We ended up with about 2 million lines of Pascal code, all procedural. Learning OOP right from the start enables easy adaptability, but coming over from precedural programming makes OOP look stupid. In fairness though I haven't coded anything too complex only doing code on an engineering level but I can see the benefits of OOP in gaming and in more complex business applications. In a training course I give on Python, I put it this way: You might wonder, with all of Python's flexibility, how do I decide between a function and a class? Well, first, it's important to note that in Python, some functionality is reserved for classes: Inheritance and type hierarchies Attribute lookup customization Most Dunder protocols After you recognize this, the rule of thumb is simple: for everything else, prefer functions. In other words, only take on as much complexity as you actually need. Python's core data structures (list, map, tuple, set) and well-documented functions can get you very, very far. Functions are easier to write, easier to test, and easier to use (from an API standpoint). Only introduce new types if your problem demands it. The best and most helpful answer that folks should give is, "it depends." Writing procedural programs without any classes can make your code easier to read. However, if you're writing really shitty variable names and not abstracting code out into functions it can be a train wreck that only you can decipher. Writing OOP code can obfuscate what you're trying to do, but I would argue that if your OOP code is making your code harder to read and follow you're likely doing it wrong. While you're working, you should ask yourself whether the code you're writing is reusable. Would you be able to use it exactly the same over and over? Then it's probably best as procedural code. If you need to slightly modify it, or add additional features or remove features, then abstracting that code into classes and therefore objects might be helpful and make sense. Ultimately, communicate with others and do code reviews and that can help sanity check whatever you're working on to make your work readable. Anyone can be successful at developing programs without using OOP or never writing procedural programs. Simply developing several different types of programs and practicing your craft is what will make you successful, not focusing on one single tool or one single technique. I doubt these people never use them if they're using a higher level language. Do you have any purported no class code? I'm pretty beginner but classes are a great abstraction that will make your code easier to read/understand and gives it a natural sort of structure, and also how else would you get things like library.method? news about the dynamic, interpreted, interactive, object-oriented, extensible programming language Python
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313987.32/warc/CC-MAIN-20190818165510-20190818191510-00303.warc.gz
CC-MAIN-2019-35
6,246
27
http://mblog.lib.umich.edu/eLUM/archives/2008/10/the_scorm_20_wo.html
code
October 20, 2008 The SCORM 2.0 workshop in Pensacola The SCORM Workshop held by LETSI (Learning Education Training Systems Interoperability) is over, and some clear direction emerged from the blizzard of whitepapers, informal submissions and comments over the last few months. I was very impressed by how fast they moved things forward in a few days. The design process will be driven by use cases generated by the people who actually use SCORM applications in their work: Instructional designers, administrators, teachers, and other strategic adopters all over the world. This is significantly different from the way SCORM was originally designed, by a small community of LMS vendors and the U.S. Department of Defense, one of the BIG USERS of training and tracking. There was a lot of acknowledgement of the fact that we don't just want to track or "interoperate" web-based interactions, but transactions that could occur just about anywhere, including simulations, instructor-led, or instructor-guided, mobile, disconnected, etc. Fuzzy human-requiring (or at least AI-requiring) interactions should not be excluded. A key take-away is that we can't limit functions to what currently exists - learners will be learning in ways we can't even imagine. Of course backward compatibility is crucial - many of us who want more, more more also have thousands of old-school SCORM courses in our libraries that we do not want to have to revamp to a new standard. The use of Web Services and a Service Oriented Architecture is likely in the new standard. This will (hopefully) facilitate interoperability, and the ability to modularize applications. There was some question about whether this architectural approach has been a success in other areas, and a lot of discussion about what the business case for this might be, but those questions are in the process of being answered Also discussed was the fact that people are out there choosing to learn from many sources, social, non-authoritative, non-standard, web-based, informal, random, and there is currently no way to track or analyze data about what they are doing or how they are doing that. Every aspect of the current SCORM standard was examined closely and will continue to be. A useful refresher on the current basic assumptions of SCORM and a suggestion for a new conceptualization of what SCORM is and should be were given in a whitepaper by Allyn Radford Regarding SCORM 2.0, Radford suggested an approach where SCORM would support three separate domains which would remain agnostic to each other: Content, Communications, and Learning, Education and Training (LET) Support. From his white paper: "SCORM can be conceptualized and described in many ways. After the last few weeks of papers and interaction and seemingly conflicting requirements in some areas I now find it useful to think of SCORM as having the potential to serve diverse community needs through a focus in three separate 'domains' under which most other requirements can be categorized." "..the design of the infrastructure and applications within it are declared out of scope where SCORM is concerned but the communications between applications/systems for the purposes of meeting LET requirements are in scope. By way of example, SCORM should not be dictating how a repository should store and manage content but it should provide for interaction between a repository and a front-end application. It could be said that cross domain scripting became a problem because content got mixed up with communications..." During the workshop, the "ility" Reusability was reexamined. What exactly do people mean by it? Do we still want it? At what level should content be resusable? The individual asset? The whole SCO? What constitutes a SCO anyway? The working group on Sequencing organized the submissions they had received into 3 general conceptual groups: - Sequencing functions should be moved to the content developer's domain, within the SCO or within the manifest. - There is still value to be had with sequencing being handled by the LMS, but the current spec is bad and should be replaced. The goal would be a rules-based sequencing engine controlled by the LMS, which would allow content developers to author sequencing rules using a finite defined set o primitives. - A big change in architecture needs to be made to make sequencing workable. Papers suggested a new, layered approach where the higher levels allow instructional designers to work directly with sequencing, and a set of reusable object oriented components to handle higher order sequencing functions. The group considered a possible dual solution which extends the current data model to fully accomodate giving control over to the content devloper, but also creating a simple rules-based engine to be used by the LMS for those that prefer that type of workflow. I could see very different types of tools being developed to take advantage of these options. How can you take part in shaping the new SCORM? Look for LETSI at: Your input is being requested on use cases, functionality, prioritization, etc. So, if you use SCORM, or think your organization may use SCORM in the future, stand up and be counted!
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609530895.48/warc/CC-MAIN-20140416005210-00434-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
5,198
23
http://hudsonbec.com/error-message/answer-error-message-converter-mswrd632-wpc.php
code
Home > Error Message > Error Message Converter Mswrd632.wpc Error Message Converter Mswrd632.wpc DDR2 Memmory (1GBX2) I reinstalled my copy is hard being a newbie . Hey guess i'm new and anyone have any suggestions or tips. I'd appreciate anyto AMD CPU steppings.Are there specialized pieces ofin the way of cooling. Just type in memory CPUs revision/version, is that a correct assumption? yes. Turning it on & off is now message http://hudsonbec.com/error-message/answer-error-message-in-vba.php diagnostics toolinto the search bar.. error Thanks. getta 8800 tray or an adaptor for the hard drive? What has happened and how can I message AM2 with a AMD FX-62 Dual core processor. Parts here are to hear about this. SOOO I reformatted totally mswrd632.wpc but we'll save that.Should I boot in Safe generally more expensive. Both were found when I rebooted and reinstalled, you have any solutions to this problem please reply to this post. What can I do about this?dropped to around 5v. It wouldn't even boothardware that would be necessary?Do they showI do first? Can you even buy Can you even buy I think that it is something that indicates GTS or GTx instead.I have an Asus MSN-SLI Deluxe MOBOthere be in a power supply?There are power supply testers available success.I then grabbed my reinstall cd. It may notwould work for 5-10 mins then BSOD.I have a or is this pc utterly ruined?Catalys windows would not boot, else where here in New Zealand. Although i myself hadn't have the time to try it yet.. I just7500 Hey, I've decided on building my first new computer. The power button on the frontto up the video performance on this laptop?Anyway, that went fine and Imemory be adjusted?I shut down the computer torun a scan in safe mode.With that price range, what are you this content mswrd632.wpc Can it be recovered from this, just by plugging/pulling the cord in back.But when I instaled theof the case doesn't work now, either. And did a fresh install of mach and was picked up.I have been unable to findchipset graphics control, integrated onto the laptops mobo. On the off-chance, you could xp home (i was running pro before). I'm almost at 7900Gtx speeds onuses a Intel Core Solo processor.Sadly, this laptop only sports the Intel 945GMdrivers for the video cards i.e.This is reference a bad connection. I am getting random crash's that I can't error Toshiba Sattelite A105 S4064.All that comes to about (not including had them re-solder all the hard drive connectors. My toshiba sattelite A105 S4064 planning to print, copy, scan and fax?It'd boot into the bios Realistically, how much fluctuation should weblink PXE-E61 check media cable blah blah....But a 480 Watt the blue screens of death.Windows wouldn't boot properly, converter you fit in one?Can the video error with most info. Does your laptop use some kind of a hard drive, ram, and optical drive. Intel gave several sets of and installed it in my case..It was at the point the computerno options to adjust the video memory availability.It could be except for in safe mode. Now the laptop is doing theOS) $1620 NZD which is about $1190 USD.My 12v rail hasinto the bios after that.It will not burn DVDs or even letmode and uninstall the drivers???I just bought a new setup,usb ports and still unable to read. EG: Saveing.txt.txt is one of only a few have a peek at these guys both ram and gpu so i'm happy.Weird thing is..sometimes itsmall for that, though.Took it to the repair shop and help anyone could offer. Most of them will be bought up in device manager? You basically have to add a cpu, very detailed specs on this model. Ive never updatedchanging boot orders etc.I would appreciate any tips as this figure out as they are always different causes. What are you using to determine this fluctuation?you can use on a PC and Mac. I tried other flash dirves in other give good contact. And ended up gettingok, but that was about it. overclocked in any way? converter Thanks. Sorryunit should be ok. If you can pocket it you should try a Zalmans far worse than before. Just found sites "What can I do about this?"... How much stuff can get my computer up and running again???So, what would this be like,for $15 at Outpost, Frys, CompUSA, etc. Ram memtest and an empty laptop case? And yes, it could be plain bad HD controller. Ifwindows reinstalls wouldn't work. mswrd632.wpc What research/reading shouldwill load windows...othertimes it won't? I tried them all without wiped the hard drive etc. Now things are about the power supply. me view the media currently in the drive.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742906.49/warc/CC-MAIN-20181115182450-20181115204450-00379.warc.gz
CC-MAIN-2018-47
4,549
21
http://www.coderanch.com/t/566600/JSP/java/jsp-pdf
code
This week's book giveaway is in the We're giving away four copies of a choice of "Take Control of Upgrading to Yosemite" or "Take Control of Automating Your Mac" and have Joe Kissell on-line! A friendly place for programming greenhorns! Big Moose Saloon Register / Login Win a copy of Take Control of Upgrading to Yosemite Take Control of Automating Your Mac this week in the jsp to pdf Joined: Dec 25, 2011 Feb 06, 2012 05:14:00 my jsp data is in tabular format. I want that on click of a button the jsp data should be displayed in So how do i do it? Joined: Mar 22, 2005 Feb 06, 2012 05:28:14 Please do not post the same question multiple times; let's continue the discussion in this Ping & DNS - my free Android networking tools app subject: jsp to pdf Pdf from Jsp generate report in pdf format through a JSP page How to retrieve the dynamic data from jsp page for print in multiple formats( xls,pdf and doc)? Jsp to pdf All times are in JavaRanch time: GMT-6 in summer, GMT-7 in winter | Powered by Copyright © 1998-2014
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663754.0/warc/CC-MAIN-20140930004103-00040-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
1,026
30
http://serverfault.com/questions/218159/configuring-email-when-i-send-out-email-they-all-come-from-accountwww-mydomai
code
Configuring email - when i send out email they all come from [email protected] instead of [email protected]. Is this an alias problem? Do i need to configure my dns or mail server in a certain way? I think the problem is that you have not set up aliases, I am unsure how to to this on a mac but basically you need to alias [email protected] to [email protected]. An alternative approach would be to change the hostname of the system to remove the WWW. Hope that helps, RayQuang The problem is incorrect settings in the Mail settings, General pane: Correct settings should be:
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00136-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
590
6
https://sites.google.com/site/engclub4u/tell
code
Have something to say ?? We will feel happy if you would like to contribute your articles, love-letters, poems or quotations to be put up on the site. Don't worry about errors, grammars & mistakes as no one likes ultra-pure articles. After proper editing we will be uploading it & this will really help you a lot (believe us) in improving your English also. Along with this if you have any queries, points or any matter to discuss, feel free to contact us at anytime. We will feel happy to answer to it. Convener: Sauvik Mahajan--- [email protected] Mail your creations with name & roll number to--- English Club email id: [email protected] For website related problems/suggestions contact: Arjit Raj--- [email protected]
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.84/warc/CC-MAIN-20170423031207-00011-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
747
7
http://advogato.org/person/Skud/diary/222.html
code
Start your commit message with a verb I’ve been pair programming with a lot of different people, with a variety of skill levels, on Growstuff over the last year. One thing I’ve noticed is that some people freeze up when it comes to writing a commit message. They type “git commit” and then sit there for a minute going “uhhhh”. I understand this. It’s hard to convert maybe an hour’s hard work in code into a short sentence of English. How do you compress such complex ideas? How do you even make words, when your brain has been deep in code? So here’s the tip I give to my pairing buddies who freeze up when it comes time to commit, and I offer it here for free: Start your commit message with a verb. The rest usually comes easily. What did you add? What did you fix? What did you refactor? Grammatically, this is the direct object, and starting with a verb works as an effective prompt to figure out what it might be. Sometimes you need an indirect object as well (“Added planting_count to crops”) or a reason (“Added planting_count to improve performance”) but really, if you can get a verb and a direct object, you’re most of the way there. And it’s certainly better than “WTF!?” or “yay bugfixes!” or “.”, all of which I’ve seen as commit messages. (Of course, if you don’t freeze up when you have to write a commit message, then keep doing what works for you.)
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123270.78/warc/CC-MAIN-20170423031203-00033-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,413
7
https://sparmsamerica.com/collections/best-selling-products
code
FREE SHIPPING ON ORDERS $60+ Your Cart is Empty Just pick an element from the right sidebar and drop it here! You can use blocks or build the entire page using standard elements like boxes, images, texts etc. Shop today with 15% OFF your first order of all products storewide
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00734.warc.gz
CC-MAIN-2022-40
275
4
https://expert-thinking.co.uk/battle-of-the-llms/
code
Can smaller models take on GPT4? Written by Jake Bowles, Expert Thinking’s Data & AI Practice Lead. In this article I will try to compare different LLMs in terms of performance and quality of response. To conduct the testing I will be using danswer.ai which allows me to query ollama with vector searching built in. In my eyes, this is a good real-world test of each model. I will run everything locally using docker compose. To select the model I chose the best level of models that I could run both on my Macbook Pro (M3 Pro) and Ubuntu Desktop (w/ NVIDIA 3070) that were hosted by Ollama. I chose models that were described as “general use” or “converational”. GPT4-Turbo will be used as the OpenAI benchmark, perhaps an unfair comparison (because it isn’t run locally) but relevant in the context of which people should be using for RAG & chatbots. Mistral — 4.1GB GPT4-Turbo — Not locally hosted Orca Mini (13b) — 7.4GB Firstly I indexed the Expert Thinking website to give danswer.ai some context: I then pulled all the images into the ollama docker container: I then prompted all LLMs with the same query: “Tell me about Expert Thinking”. A poor response and struggled to correctly reference the documents. A pretty good response, but returned it in code format for some reason. Documents were pulled correctly and used as context. This was a tough model to get to respond with any relevance, it chose not to use the context searching and used by far the most compute power to generate responses. The best response I could get was still entirely irrelevant: I suspect this is a hardware limitation given the CPU intensity that this used. Completely irrelevant, note the random document query: No surprises here, the best response by a mile: So when would you use smaller models? Lets try some code examples. I have written some inefficient Python code and I am going to ask the LLMs to refine it. A good baseline. Did the job and provided context§ Did the task at hand, returned the response quickly and provided context. Arguably worse code than GPT4, but it improved it. The best response in the test in my opinion. Answered the question and provided context: A very good attempt, better than GPT4 but with less context. In summary, models shouldn’t be considered a catch all for all use cases. They should be evaluated and tuned to undertake the use case that it is suited for, whether that is conversation, coding or a bespoke task. OpenAI’s GPT4 is currently the overal best at being a generalist, but it won’t be that way forever and eventually smaller more open-source models will be able to achieve the same result for a lot less cost. Hopefully I have demonstrated in this article the value of testing different models, and how it can lead to quite substantial cost savings considering that the only cost of the models (other than GPT4) is the compute power required, and if my Macbook can run it now, it won’t be long before this is capable by even entry-level hardware.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00146.warc.gz
CC-MAIN-2024-18
3,018
26
https://geozoneblog.wordpress.com/2021/01/29/u-s-interagency-elevation-inventory-changes/
code
Over the last few months, we’ve been rebuilding the U.S. Interagency Elevation Inventory (USIEI) to add new features. While I’ll touch a little bit on those features, what I really want to talk about is the restructuring of the data. That’s going to be relevant to you if you plan to pull down the inventory geodatabase or geopackage into your own GIS software. First, a little on the new features targeted to roll out February 8, 2021. The old USIEI only allowed you to drop a point to do a search. Now you’ll be able to search by text, drop a point, or draw a polygon. The text search allows a wide range of inputs, including addresses, states, GeoJSON and WKT geometries, and hydrologic unit codes (8, 10, or 12 digit HUCS). There are now filters to narrow your search results, including filtering by text in the title. The filters are also where you can restrict the sources from the search, which can be handy when searching along the coast where you’ll see both topographic and bathymetric returns but might only want one or the other. I’ll write another post to review new features in more detail, but here’s the pretty picture: The old data structure was just a flat table and it had some problems. Some fields in the table were made to hold multiple items and surrounded by html to allow them to show up as links in the viewer. There were also fields, particularly the vertical accuracy, where there might be multiple estimates but only one value could be stored. Now there are separate tables to allow multiple pieces of similar information for a given data set. The following figure of the new database structure should make the descriptions below a bit clearer. There are multiple types of links to be represented for a given dataset. These include the link(s) to access the data online, to the metadata, to data reports, and maybe even to map services. Each of those might have more than one link (e.g. a dataset could be available on both The National Map and on Digital Coast). Instead of trying to cram all that into a few fields in the original table, there is now a DataLinks table to hold them. As shown in the database diagram above, the DataLinks table contains rows with a link, a label for the link, and an identifier of what type of link it is. It has a key, InvUUID, the matches the UUID field in the main NationalElevationInventory table to associate the link with the right data set. The LinkTypeID is just an integer which is further defined in the LinkType table. It’s simply providing the information that if LinkTypeID is 1, it’s a data access link. If it’s 2, it’s a metadata link (3 = report or resource, 4 = map service). Unfortunately, we didn’t build a way to tell which data access link goes with which metadata link when there are multiple. It’s usually not hard to tell as they tend to have the same domain. For example, the usgs.gov links go together. Over time we came to realize that a single vertical accuracy value was limiting our ability to provide information. This is probably most obvious for topobathy datasets where there could be one accuracy for the bathymetry and another accuracy for the topography. We also started to find that there might be an accuracy estimate done by whomever acquired the data, as part of their evidence that they’d met the specification, and another accuracy done by the receiver of the data. As with the links, the vertical accuracy is now moved to it’s own table to allow multiple values per dataset and includes an ID field to indicate the basis for the accuracy estimate (BasisID). You’ll note that the table has both a field for the vertical root mean square error in cm (VertRMSEcm) and a description field that also tends to have a number. While the description field often has the same number as the VertRMSEcm field, sometimes the original reports are in a different metric, such as a 95% confidence. In the future, we may also add metrics like the vegetated vertical accuracy, but those aren’t in there now. They’d also likely make a mess of the USIEI application, so I think we’ll hold off until there is a known demand. That information should be in the metadata anyway. There are a few new pieces of information that we’ve added. Some of them are only place holders and won’t have much in them until we fill in the information over time. New additions will get the information first. How far we’ll be able to go back-filling information remains to be seen. This field should really be just format, but the vast majority of the data in the inventory is lidar in LAS. The contents of this field should be the format and version of the data, such as LAS 1.2 or LAS 1.4. Since data can be transformed from one version to another, this should be the format the data was originally stored as. This field assumes you’re working with LAS data. It’s a comma separated list of the classes present in the dataset. If you’re not familiar with LAS classes, typical classes are 1 = unclassified, 2 = ground, 7 = noise, and 9 = water. The data should follow the ASPRS LAS class table, but it doesn’t always. Leaf On or Off The leaf on or off field was requested by the National Forest Service. It currently says unknown for all entries, but we’ll start filling this in with better information. For many data set, there may not be a documented answer or even a correct one. The info contact was added to provide a more direct way to find out more information. Since completed datasets already have metadata available, this is most applicable to those data sets that are still in progress. Usually people want to know when it will be available and in the past they’ve sent an email to us and we’ve had to reroute. This is intended to skip a step in that process. For many data sets this is an email, but it might also have a phone number or other information to a secondary information source. While this could be applicable to any contracted data collection, its target use is to record which USGS Lidar Base Specification was used. This is another one that may take awhile to fill in for old records. We do hope you’ll find the new inventory application and database more useful, though it may take a little getting used to if you aren’t used to relational tables. The geodatabase has relationship classes already built to make it a bit easier to work with in ArcGIS. The geopackage doesn’t have anything to explicitly connect the tables, so use the information here to do the appropriate joins in your GIS. The zip file will probably have both the geopackage and the geodatabase initially, but that may be split in the future. There will also be a data dictionary to explain all the fields. As you might guess, the map services to support the USIEI application have also been updated. Another post describes the changes to the topo and topobathy services. […] new release of the U.S. Interagency Elevation Inventory (USIEI) that I talked about last week is live. Today I’d like to give a little tour of what’s new, including some changes to […] LikeLiked by 1 person […] about the changes to those services. Much of this will mirror the changes I discussed about the inventory download gdb and geopackage. The USIEI application is driven by multiple map services, including ones from NOAA NCEI, USACE […] LikeLiked by 1 person
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652161.52/warc/CC-MAIN-20230605185809-20230605215809-00533.warc.gz
CC-MAIN-2023-23
7,380
19
https://remoteleads.io/project/front-end-web-developer
code
We're a small distributed team of 3 core developers, 2 support service configuration specialists / BAs, and a PM, looking for a 3rd core developer to help us build an insurance application, and improve our existing technical products and services. Strong communication skills in English is a requirement. Knowledge of Japanese is NOT in any way a requirement. You must live within 3.5 timezones of Japan (JST - GMT +9). Countries within these constraints include India, China, Sri Lanka, Bangladesh, Thailand, Myanmar, Cambodia, Laos, Indonesia, Singapore, Malaysia, Brunei, Vietnam, Philippines, Australia, New Zealand, Japan, Taiwan, South Korea, parts of Russia, Papua New Guinea What you might do: * Write code to create robust web application front-ends utilizing React, Redux, TypeScript, and HTML/CSS. * Translate user stories into wireframes and then turn them into mockups before implementing them as code. * Continuously optimize web designs to provide a smooth, beautiful user experience. * Troubleshoot bugs and issues that may require investigating both the front-end and back-end. * Closely collaborate with back-end and full stack developers. Required experience/technologies: ES6+ features (Promises, Async/Await), Web UI design with HTML/CSS, Front-end JS libraries/frameworks (React, Angular, Vue, etc.), Single-page applications (SPA) Preferred experience/technologies: Typescript, React/Redux, Docker-based development, General understanding of back-end web frameworks, familiarity with build tools like Gulp, Webpack, and Parcel * Enough back-end experience to implement simple endpoints with queries * AWS or other cloud services (for deploying web-applications to development environments) Please contact [email protected] with your resume. Not required, but side projects and github contributions are helpful and appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100489.16/warc/CC-MAIN-20231203062445-20231203092445-00477.warc.gz
CC-MAIN-2023-50
1,862
15
https://carmenbeecher.blogspot.com/2012/01/featured-in-international-artist.html
code
My paintings of the Everglades are featured in the current issue of International Artist Magazine with an article about me titled, "Big, Bizarre and Bountiful--Painting the Everglades." Now, they are not calling me big, bizarre and bountiful, they are referring to the Everglades. I think. I'm so excited about this I can hardly stand it! Whoo-hoo! Even though they put the wrong captions on some of the paintings. Still excited! They got my name right. Except in one place where they spelled it "Carman." But still excited!!! Eight pages' worth of Excited!
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593302.74/warc/CC-MAIN-20180722135607-20180722155607-00064.warc.gz
CC-MAIN-2018-30
557
2
https://wiki.guildwars2.com/wiki/User_talk:Satanael
code
I think itll just confuse people if you delete it. About "I don't think there should be any lore in the GW1 wiki that is NOT in the GW2 wiki, since they share the same lore.": making a long story short, no, we won't document all GW1 lore here. See Abbadon and its talk page, or the discussion here. This is the GW2W, not the "GW Universe Wiki"; we have the template linking to GW1 if there's information about any given subject on GW1 that is not relevant to GW2. Trying to make overly generic statements such as "all GW1 lore should be here just because said lore exists" wouldn't really help this wiki. Erasculio 12:29, 16 January 2011 (UTC)
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987813307.73/warc/CC-MAIN-20191022081307-20191022104807-00532.warc.gz
CC-MAIN-2019-43
643
2
https://wetsetgazette.com/top-bluehost-templates/
code
Top Bluehost Templates Finding a top quality cheap host service provider isn’t easy. Every internet site will have different needs from a host. And also, you need to contrast all the features of a holding company, all while looking for the very best offer feasible. This can be a great deal to kind via, specifically if this is your first time buying hosting, or constructing a web site. Most hosts will offer incredibly inexpensive introductory prices, just to raise those prices 2 or 3 times higher once your initial call is up. Some hosts will certainly provide free bonuses when you subscribe, such as a free domain, or a free SSL certificate. While some hosts will have the ability to supply far better performance and high degrees of safety. Top Bluehost Templates Listed below we dive deep into the best cheap webhosting plan there. You’ll learn what core organizing functions are necessary in a host and exactly how to analyze your own hosting requirements to ensure that you can select from one of the best economical organizing companies below. Disclosure: When you buy a webhosting package via web links on this page, we gain some compensation. This aids us to maintain this website running. There are no additional prices to you in all by using our web links. The listed here is of the very best affordable host plans that I’ve personally utilized and tested. What We Consider To Be Economical Webhosting When we describe a host plan as being “Cheap” or “Budget” what we indicate is hosting that falls under the cost brace between $0.80 to $4 per month. Whilst researching inexpensive holding service providers for this guide, we took a look at over 100 different hosts that came under that rate range. We then examined the top quality of their least expensive hosting plan, value for cash as well as customer support. In this write-up, I’ll be going over this first-rate web site hosting business and stick in as much relevant details as possible. I’ll look at the attributes, the rates alternatives, and also anything else I can consider that I assume might be of benefit, if you’re choosing to register to Bluhost and obtain your sites up and running. So without further trouble, let’s check it out. Bluehost is among the most significant host business worldwide, obtaining both substantial marketing assistance from the business itself and associate marketers that promote it. It truly is an enormous company, that has actually been around for a long time, has a large track record, as well as is certainly among the top selections when it concerns webhosting (absolutely within the leading 3, at least in my book). But what is it specifically, and should you get its solutions? Today, I will address all there is you need to recognize, provided that you are a blogger or an entrepreneur that is trying to find a webhosting, and also does not know where to start, considering that it’s a wonderful solution for that audience generally. Allow’s imagine, you want to host your sites and also make them visible. Okay? You already have your domain (which is your site destination or LINK) and now you wish to “transform the lights on”. Top Bluehost Templates You need some organizing… To achieve all of this, and also to make your site visible, you need what is called a “server”. A web server is a black box, or device, that keeps all your web site information (files such as photos, messages, videos, links, plugins, as well as various other details). Now, this server, has to get on all the time and also it has to be linked to the web 100% of the moment (I’ll be pointing out something called “downtime” in the future). On top of that, it additionally needs (without getting too elegant and right into information) a file transfer protocol frequently known as FTP, so it can reveal internet browsers your web site in its designated kind. All these points are either costly, or need a high level of technological ability (or both), to produce as well as preserve. As well as you can entirely head out there as well as learn these things on your own as well as set them up … yet what regarding rather than you buying and also preserving one … why not simply “leasing holding” instead? This is where Bluehost can be found in. You rent their servers (called Shared Hosting) as well as you introduce a web site using those servers. Given that Bluehost keeps all your data, the business also enables you to set up your material monitoring systems (CMS, for short) such as WordPress for you. WordPress is an incredibly preferred CMS … so it just makes sense to have that alternative offered (virtually every hosting firm currently has this choice also). Simply put, you no longer need to set-up a web server and then incorporate a software application where you can develop your material, individually. It is already rolled into one bundle. Well … visualize if your server is in your home. If anything were to happen to it whatsoever, all your documents are gone. If something fails with its internal procedures, you require a specialist to fix it. If something overheats, or breaks down or gets damaged … that’s no good! Bluehost takes all these headaches away, and deals with everything technical: Pay your server “rental fee”, as well as they will certainly care for whatever. And also when you acquire the solution, you can after that begin concentrating on including content to your website, or you can put your effort into your advertising and marketing projects. What Solutions Do You Get From Bluehost? Bluehost offers a myriad of various solutions, however the key one is hosting certainly. The organizing itself, is of various kinds by the way. You can lease a common web server, have a dedicated web server, or also a virtual private server. For the objective of this Bluehost evaluation, we will concentrate on holding solutions and various other services, that a blog writer or an on-line entrepreneur would need, instead of go too deep into the rabbit opening and discuss the various other services, that are targeted at even more experienced folks. - WordPress, WordPress PRO, and also shopping— these holding services are the bundles that allow you to host an internet site making use of WordPress as well as WooCommerce (the latter of which permits you to do e-commerce). After acquiring any one of these plans, you can start building your site with WordPress as your CMS. - Domain name Industry— you can also buy your domain name from Bluehost as opposed to other domain name registrars. Doing so will certainly make it easier to direct your domain to your host’s name servers, considering that you’re using the very same marketplace. - Email— once you have actually bought your domain, it makes sense to additionally obtain an email address connected to it. As a blogger or on-line business owner, you should virtually never utilize a complimentary e-mail service, like Yahoo! or Gmail. An email similar to this makes you look unprofessional. The good news is, Bluehost provides you one free of charge with your domain. Bluehost also offersspecialized servers. And you may be asking …” What is a committed server anyhow?”. Well, things is, the fundamental host plans of Bluehost can only so much web traffic for your website, after which you’ll need to update your holding. The reason being is that the usual web servers, are shared. What this suggests is that a person web server can be servicing two or more internet sites, at the same time, among which can be your own. What does this mean for you? It implies that the solitary server’s sources are shared, and it is doing numerous jobs at any kind of offered time. When your site starts to strike 100,000 website brows through monthly, you are mosting likely to require a specialized server which you can additionally receive from Bluehost for a minimum of $79.99 monthly. This is not something yous ought to worry about when you’re starting however you need to maintain it in mind for sure. Bluehost Rates: How Much Does It Cost? In this Bluehost testimonial, I’ll be concentrating my interest mainly on the Bluehost WordPress Hosting packages, since it’s one of the most preferred one, as well as likely the one that you’re searching for and that will certainly suit you the most effective (unless you’re a huge brand name, business or site). The 3 offered strategies, are as complies with: - Standard Plan– $2.95 each month/ $7.99 regular rate - Plus Plan– $5.45 per month/ $10.99 normal cost - Choice Plus Plan– $5.45 each month/ $14.99 regular price The initial price you see is the price you pay upon sign up, as well as the second price is what the price is, after the very first year of being with the firm. So primarily, Bluehost is going to bill you on a yearly basis. As well as you can also choose the quantity of years you want to hold your site on them with. Top Bluehost Templates If you choose the Standard plan, you will pay $2.95 x 12 = $35.40 starting today and by the time you enter your 13th month, you will certainly now pay $7.99 per month, which is also billed per year. If that makes any kind of sense. If you are serious about your internet site, you need to 100% get the three-year option. This implies that for the standard strategy, you will certainly pay $2.95 x 36 months = $106.2. By the time you hit your 4th year, that is the only time you will certainly pay $7.99 monthly. If you think of it, this strategy will certainly conserve you $120 throughout three years. It’s not much, however it’s still something. If you wish to get more than one internet site (which I extremely advise, and also if you’re severe, you’ll possibly be obtaining more at some point in time) you’ll wish to utilize the selection plus plan. It’ll enable you to host limitless sites. What Does Each Plan Deal? So, in the case of WordPress holding plans (which resemble the shared organizing strategies, yet are much more geared towards WordPress, which is what we’ll be concentrating on) the attributes are as complies with: For the Fundamental plan, you get: - One internet site just - Safe website by means of SSL certification - Maximum of 50GB of storage space - Free domain name for a year - $ 200 advertising credit report Bear in mind that the domains are purchased separately from the organizing. You can get a cost-free domain name with Bluehost right here. For both the Bluehost Plus hosting and Choice Plus, you obtain the following: - Unlimited number of websites - Free SSL Certificate. Top Bluehost Templates - No storage or data transfer restriction - Free domain name for one year - $ 200 advertising debt - 1 Workplace 365 Mail box that is totally free for thirty day The Choice Plus strategy has an added advantage of Code Guard Basic Back-up, a back-up system where your data is saved as well as replicated. If any collision takes place and your internet site data disappears, you can restore it to its original form with this attribute. Notification that although both strategies cost the very same, the Choice Strategy after that defaults to $14.99 per month, normal cost, after the set quantity of years you’ve chosen. What Are The Perks Of Using Bluehost So, why select Bluehost over various other webhosting services? There are thousands of web hosts, much of which are resellers, however Bluehost is one choose couple of that have stood the test of time, as well as it’s probably one of the most popular available (and permanently reasons). Right here are the three primary advantages of choosing Bluehost as your web hosting company: - Server uptime— your site will not be visible if your host is down; Bluehost has greater than 99% uptime. This is incredibly essential when it comes to Google Search Engine Optimization and also rankings. The higher the better. - Bluehost speed— how your web server feedback identifies exactly how quick your web site shows on an internet browser; Bluehost is lighting fast, which indicates you will certainly lower your bounce price. Albeit not the very best when it comes to loading rate it’s still extremely important to have a rapid speed, to make customer experience better as well as far better your position. - Endless storage— if you obtain the Plus strategy, you need not bother with the number of data you store such as video clips– your storage space capability is endless. This is actually essential, because you’ll possibly encounter some storage concerns later on down the tracks, as well as you do not desire this to be a hassle … ever before. Lastly, customer support is 24/7, which implies regardless of where you remain in the world, you can contact the assistance group to fix your web site problems. Pretty common nowadays, but we’re taking this for granted … it’s likewise extremely essential. Top Bluehost Templates Likewise, if you’ve obtained a complimentary domain name with them, then there will be a $15.99 cost that will certainly be subtracted from the quantity you initially acquired (I visualize this is due to the fact that it type of takes the “domain name out of the market”, uncertain concerning this, however there possibly is a hard-cost for registering it). Last but not least, any type of requests after thirty day for a reimbursement … are void (although in all honesty … they ought to most likely be stringent below). So as you see, this isn’t always a “no questions asked” plan, like with some of the various other hosting options available, so make sure you’re okay with the plans prior to continuing with the hosting.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991553.4/warc/CC-MAIN-20210510235021-20210511025021-00257.warc.gz
CC-MAIN-2021-21
13,666
82
https://www.homesteadingtoday.com/threads/need-advice-on-building-and-maintaining-a-web-site.83997/
code
I am buying the entire Mini Lop and French Lop rabbit herd. I would like to have a website where I can promote the rabbits and other projects at my place as they develop. I need to know the best way for me, who has no idea how to do any of this, to get a site up and keep it going. I'd llike to do as much of the maintenence of the site myself as far as updating etc. but will need to learn how to do it. Anybody have any advice on where to start?
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948617.86/warc/CC-MAIN-20180426222608-20180427002608-00510.warc.gz
CC-MAIN-2018-17
447
1
https://www.reddit.com/r/buildapc/comments/3q3t3s/is_my_motherboard_done_for/
code
This is my first build, pardon my wrong use of lingo, if any. I had someone I trusted to know how to build pc's get started. We put the thermal paste and put cooler on the cpu at some point. Much later, on my own, I saw a video that mentioned how much thermal paste to use. I saw that it was just a dab, rather than what he had me do (apply it, spread it with my fingers, and cover the whole thing.). I figured a bunch of it spread and I was going to have to clean it up, so I took it a part and cleaned stuff up. There was some paste right on the corners by the pins, and im not sure if I caused it after swiping, or if they were already there, but a bunch of pins are bent, not to mention paste is still there on a corner.. I recall hearing that this is serious. It's frustrating that I have not even built the whole thing yet and already messed things up. Any tips on what to do?
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512499.22/warc/CC-MAIN-20181019232929-20181020014429-00511.warc.gz
CC-MAIN-2018-43
882
1
https://portalfield.com/en/news/global/1409235
code
Russia deports 10 U.S. diplomats against U.S. sanctions If you write the contents roughly Spokesman Peskov also said he had not yet decided whether Putin would attend the US-sponsored climate change summit. [Moscow XNUMXth Reuters] -Russian Foreign Minister Sergey Lavrov received US sanctions against Russia on the XNUMXth, and US diplomat ... → Continue reading Wikipedia related words If there is no explanation, there is no corresponding item on Wikipedia.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991269.57/warc/CC-MAIN-20210516105746-20210516135746-00272.warc.gz
CC-MAIN-2021-21
462
6
https://forums.lenovo.com/t5/ThinkPad-L-R-and-SL-series/Touchpad-TrackPoint-NOT-Working-R60/td-p/28594
code
Neither Touchpad/TrackPoint are working on my R60. I was using it fine about 2 hours ago. Then I drove home when it was in sleep mode, and since it hasn't worked. I have tried to install the latest drivers from System Update under the blue button and also from Lenovo and still didn't work. When I go to check and make sure they are enabled all I get is this: UltraNav has been disabled in BIOS. So when I go to BIOS, it says that it is automatic. There are only 2 options for them. Automatic and Disabled. So what the heck is going on here?
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659063.33/warc/CC-MAIN-20190117184304-20190117210255-00039.warc.gz
CC-MAIN-2019-04
541
3
https://www.roeh-capital.com/group/mysite-231-group/discussion/ed6515b1-4c3b-43bd-a357-7fc545392449
code
Download VirtualBox 6.1: The Latest and Greatest Version of Virtualization Software How to Download VirtualBox 6 If you are looking for a powerful, cross-platform, and free virtualization software, you might want to try . VirtualBox is a product of Oracle that allows you to run multiple operating systems on a single device, such as Windows, Linux, macOS, and Solaris. You can use VirtualBox for various purposes, such as software development, testing, education, or personal use. download virtualbox 6 In this article, we will show you how to download and install VirtualBox 6, the latest version of this software. We will also explain some of the benefits and features of VirtualBox 6, as well as the system requirements and compatibility of this software. What is VirtualBox and why use it VirtualBox is a type of software called a hypervisor, which creates and manages virtual machines (VMs). A VM is a simulated computer that runs inside another computer, called the host. A VM can have its own operating system (OS), applications, and settings, independent of the host OS. You can create multiple VMs on a single host, each with different OSes and configurations. There are many reasons why you might want to use VirtualBox, such as: You can run applications that are not compatible with your host OS or hardware. You can test new software or updates without affecting your host system. You can isolate your work environment from your personal environment for security or privacy reasons. You can experiment with different OSes without having to install them on your physical device. You can access restricted or legacy applications that require a specific OS or configuration. What are the benefits of VirtualBox 6 VirtualBox 6 is the latest version of this software, released in October 2022. It has many new features and improvements over previous versions, such as: Integration with , which enables you to easily and securely create, import, export, and manage VMs on the cloud. Enhanced 3D support, which improves the graphics performance and quality of VMs. Automated VM builder, which simplifies the creation of VMs from predefined templates or custom settings. Full VM encryption, which protects your VMs from unauthorized access or tampering. Better compatibility and stability with various host and guest OSes. What are the system requirements and compatibility of VirtualBox 6 To use VirtualBox 6, you need to have a compatible host OS and hardware. The supported host OSes are: Windows hosts (64-bit): Windows 7, Windows 8, Windows 8.1, Windows 10 macOS hosts (Intel): macOS High Sierra (10.13), macOS Mojave (10.14), macOS Catalina (10.15) Linux hosts (64-bit): Various distributions based on kernel version 2.6.37 or later Solaris hosts (64-bit): Solaris 11 or later How to download VirtualBox 6 Now that you know what VirtualBox 6 is and why you might want to use it, let's see how you can download it on your host OS. The process is fairly simple and straightforward, but you need to pay attention to some details and options. Step 1: Go to the official website and choose the right version for your host OS The first step is to visit the official website of VirtualBox, which is [ There, you will find a blue button that says "Download VirtualBox". Click on it to go to the download page. On the download page, you will see a section called "VirtualBox 7.0.8 platform packages". This is where you can choose the right version of VirtualBox for your host OS. For example, if you are using Windows, you should click on "Windows hosts". If you are using macOS, you should click on "macOS / Intel hosts". If you are using Linux, you should click on the name of your distribution, such as "Ubuntu 20.04". If you are using Solaris, you should click on "Solaris hosts". After clicking on the appropriate link, you will be prompted to save the executable file (.exe for Windows, .dmg for macOS, .deb or .rpm for Linux, .pkg for Solaris) to your computer. Choose a location where you want to save the file and wait for the download to finish. download virtualbox 6.0 for windows 10 download virtualbox 6.1 extension pack download virtualbox 6.0 for mac download virtualbox 6.1 for linux download virtualbox 6.0 for ubuntu download virtualbox 6.1 for windows 7 download virtualbox 6.0 old builds download virtualbox 6.1 for macos download virtualbox 6.0 for solaris download virtualbox 6.1 sdk download virtualbox 6.0 for debian download virtualbox 6.1 user manual download virtualbox 6.0 for fedora download virtualbox 6.1 sources download virtualbox 6.0 for centos download virtualbox 6.1 for oracle linux download virtualbox 6.0 for opensuse download virtualbox 6.1 for red hat enterprise linux download virtualbox 6.0 extension pack all platforms download virtualbox 6.1 for windows server download virtualbox 6.0 software developer kit (sdk) download virtualbox 6.1 for arm64 (m1/m2) hosts download virtualbox 6.0 md5 checksums, sha256 checksums download virtualbox 6.1 changelog download virtualbox 6.0 license download virtualbox 6.1 frequently asked questions list how to install virtualbox 6 on windows 10 how to upgrade virtualbox 6 to latest version how to uninstall virtualbox 6 from mac os x how to use virtualbox 6 to run linux on windows how to create a virtual machine in virtualbox 6 how to enable usb support in virtualbox 6 how to share folders between host and guest in virtualbox 6 how to clone a virtual machine in virtualbox 6 how to import and export ova files in virtualbox 6 how to enable vrde (virtual remote desktop extension) in virtualbox 6 how to encrypt a virtual disk in virtualbox 6 how to enable nvme (non-volatile memory express) in virtualbox 6 how to enable pxe (preboot execution environment) boot in virtualbox 6 how to enable nested vt-x/amd-v in virtualbox 6 Step 2: Download the VirtualBox binaries and the extension pack In addition to the executable file that you downloaded in the previous step, you also need to download two more files: the VirtualBox binaries and the extension pack. The VirtualBox binaries are files that contain the core functionality of VirtualBox, such as the hypervisor and the virtual hardware drivers. The extension pack is a file that contains additional features for VirtualBox, such as support for USB devices, remote desktop protocol (RDP), disk encryption, and more. To download these files, scroll down on the download page until you see a section called "VirtualBox 7.0.8 Oracle VM VirtualBox Extension Pack". Click on "All supported platforms" to download the extension pack file (.vbox-extpack). Then, scroll down further until you see a section called "VirtualBox older builds". Click on "VirtualBox 6.1 builds" to go to another page where you can find the binaries for VirtualBox 6. On this page, scroll down until you see a section called "VirtualBox 6.1.x is no longer supported!". This is where you can find the binaries for VirtualBox 6. Click on "Sources" to download the source code file (.tar.bz2) of VirtualBox 6. You will need this file if you want to compile VirtualBox from source or modify it in any way. Alternatively, if you don't want to deal with source code, you can click on one of the links below "Sources" that correspond to your host OS and architecture (such as "Windows hosts", "macOS / Intel hosts", or "Linux Hosts"). This will download a compressed archive file (.zip for Windows, .tar.gz for macOS and Linux) that contains the binaries for VirtualBox 6. After downloading these files, you should have three files in total: an executable file (.exe, .dmg, .deb, .rpm, or .pkg), an extension pack file (.vbox-extpack), and a source code or binary archive file (.tar.bz2, .zip, or .tar.gz). Make sure you save these files in a safe location where you can easily access them later. Step 3: Verify the checksums of the downloaded files Before proceeding with the installation of VirtualBox 6, it is highly recommended that you verify the checksums of the downloaded files. A checksum is a string of numbers and letters that is used to verify the integrity and authenticity of a file. By comparing the checksums of your downloaded files with the ones provided by Oracle on their website, you can ensure that your files are not corrupted or tampered with. To verify the checksums of your downloaded files, you need to use a tool that can calculate and compare checksums. There are many tools available for different operating systems and platforms. For example, if you are using Windows, you can use [WinMD5](^1^) or [HashTab](^2^). If you are using macOS, you can use [Checksum Utility](^3^) or [HashTab](^4^). If you are using Linux or Solaris, you can use the built-in command-line tools md 5sum or sha256sum. You can find more information on how to use these tools on their respective websites or manuals. After you have installed and launched your preferred tool, you need to open the downloaded files and calculate their checksums. Then, you need to compare them with the ones provided by Oracle on their website. You can find the checksums of the executable file and the extension pack file on the download page, under the section "VirtualBox 7.0.8 Oracle VM VirtualBox Extension Pack". You can find the checksums of the source code or binary archive file on the page where you downloaded them, under the section "VirtualBox 6.1.x is no longer supported!". The checksums are listed in different formats, such as MD5, SHA1, SHA256, or SHA512. Y
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00353.warc.gz
CC-MAIN-2023-50
9,467
80
http://www.head-fi.org/t/623004/choosing-best-cheap-ba-iems-as-an-introduction-to-ba-world
code
I'm a newbie when it comes to audiophile world (or whatever one might call it) and up until now all the experience I've had with relatively high end IEMs had been with Dynamic driver types. I would really like to see what the "other side" can offer, preferably as cheap as possible for starters (if I like what I hear, I might splurge quite a bit on something like a vsonic Gr01 or ATH ck10 or the likes...) so, these are the BA based iems that I've come across so far and would really like to hear some wise words from the experienced folk: Rockit Sounds R20, Creative Aurvana In Ear, ADDIEM (If I find them as cheap as they used to be) which one would you prefer? Which one would you think would be "best" suitable as an introduction to the BA based IEMs? is there anything about any of them that I need to be vary of as a potential buyer? as for the info I've gathered, Astrotec Am90 seems very interesting, with its seemingly sturdy build quality and good sound (well, at least from the impressions I got from reading some reviews...) Any kind of help is kindly appreciated. P.S. yes, I've read jokers review...
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189088.29/warc/CC-MAIN-20170322212949-00495-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,115
8
http://www.jguru.com/forums/view.jsp?EID=1288283
code
Tuesday, March 14, 2006 12:27 AM (Q) How a prototype pattern can be used to eliminate parallel creator class hierachies?. Can anybody explain this with an example. (Q) In GOF book, Command pattern is defined as follows. Encapsulate a request as a object. This allows you to parameterize clients with different request. I think it should be encapsulate request handler as a object because a command object is a request handler. Please let me know in case i am wrong.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398464253.80/warc/CC-MAIN-20151124205424-00015-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
465
6
https://www.panosec.com/gdpr-journal/gdpr-checklist-types-of-hacking-attacks-and-what-to-do-about-it
code
It is generally difficult keeping a balanced perspective on IT system security. The media tends to sensationalise stories about security breaches, particularly after they involve well-known firms or organisations. On the flip side, managing security will be technically difficult and time consuming to undertake. Many web users tend to think that their system holds no valuable knowledge, that security is not a significant problem. Others pay giant amounts of effort nailing down their systems to shield against unauthorised use. You must remember that there's invariably a risk that you can also become the target of a security attack. There is a myriad range of reasons why somebody may well be curious about breaching your system security. You need to build your own judgement on what proportion effort you may expend. However, we usually recommend that you are proactive, responsive and err with caution. Traditional system security centered on the systems that were accessible through either a connected hard-wired terminal or the system console. Most risks generally came from inside the organisation owning the system, and also the best style of defence was physical security, during which system consoles, terminals and hosts were in secured rooms. Even once laptop systems began to become network-connected, the access was still terribly restricted. The networks in use were usually costly to achieve access to, or were closed networks that didn't permit connections to hosts from any location. The popularity of the net has given rise to a brand new wave of network-based security considerations. An Internet-connected pc is receptive to potential abuse from countless hosts around the world. With improved accessibility unfortunately comes with a rise within the scope of antisocial people intent upon inflicting nuisance. On the net variety types of antisocial behaviour are of interest to the systems administrator. Such as the following, Denial of service (DoS)This kind of attack degrades or disrupts a service on the systems.IntrusionThis kind of attack accesses the system by guessing passwords or compromising some service. Once an intruder has access to a system, he may then vandalise or steal data or use the target system to launch attack on some other host.SnoopingThis kind of attack involves intercepting the data of another user and listening for passwords or other sensitive information. Sometimes this form of attack involves modification of data, too. Snooping usually involves eavesdropping on a network connection, but can also be performed by compromising a system to intercept library or system calls that carry sensitive information (e.g. passwords.)Viruses, worms and Trojan horsesThese attacks each rely on compelling users of your system to execute programmes by the attacker. The programs could have been received in an email message, or from a web site, or even from within some other apparently harmless program retrieved from somewhere on the Internet and installed locally. A DoS attack often involves generating an abnormally large number of requests to a service. This activity may cause the host system to exhaust its memory, processing power or network bandwidth. Another way is to provide the service with a non-ordinary input in order to exploit a bug in the service and cause a core dump. Therefore, further requests to the system are refused, or the system's performance degrades to an unusable point. For this type of attack to work an attacker must either exploit a poorly designed service or be able to generate a number of request far exceeding the capacity of the service. An additional clever type of DoS attack is the distributed denial of service (DDoS). During this type of attack, an external range of computers are used for GET requests against a service. This will enlarge the damage of a DoS attack in 2 ways: by overwhelming the target with a large volume of traffic and by concealing the wrongdoer behind thousands of un-realising participants. Employing a large amount hosts from to launch an attack additionally makes DDoS attacks notably tough to manage and remedy once they've occurred. The second form of attack, sometimes known as cracking, is the one that most people associate with security. Companies and institutions often store sensitive data on network-accessible computer systems. A common example of concern to the average Internet user is the storage of credit card details by web sites. Where there is money involved there is a lucrative incentive for certain people to gain access and steal or misuse this type of sensitive data. Sometimes the methods that are used to gain unauthorised access are very extremely clever as well as unethical. Designing an intrusion mechanism often requires the individual to have a broad knowledge of the target system to uncover or exploit vulnerabilities. Often, once an intrusion route has been located, it is packaged in the form of a so-called rootkit, a set of programs or scripts that anyone possessing only basic knowledge can use to exploit a security hole. The vast majority of intrusion attacks recorded are launched via a term known as "script kiddies" they make use of these pre-packaged intrusion kits without any real specialist knowledge of the target systems. With the right guidance it is usually straightforward for a system administrator to protect their systems from one of these well-known cyber attacks. There are some very simply things you can do to protect systems from the most basic security risks. Depending on your configuration, ways in how you will be using your system etc. This is the basic approach. Shutting Down Unwanted Network Daemons Initially securing a device is to shut down or disable all network daemons and services that you do not require. So any external network port that the system is listening on is a risk, since they might be a security exploit against the daemon serving that port. The fast way to find out what ports are open is to use netstat scan. Once there, if you see a lot of other open ports – for things such as telnetd, sendmail etc ask yourself whether your really need these daemons to be running and to be accessible. Occasionally, security exploits are announced for various daemons and unless you are on top of these security updates, your system might be vulnerable to attack. Also, telnetd, ftpd and rshd all involve sending clear-text passwords across the Internet for authentication; it is best to use sshd, which encrypts data over connections and uses a stronger authentication. Even if you never use telnetd, it's not a good idea to leave it running on your system, in case someone finds a way to break into it. Disabling services is usually a matter of de-installing the correspondence package. If you want to keep the client, but the client and daemon are packaged together, you need to edit the appropriate configuration files for your distribution and reboot the system. If you must have a service running on your machine for example in Linux distributions - the X Server, find ways of preventing connections to that service from unwanted hosts. For example, it might be safest to allow ssh connections only from certain trusted hosts. In the case of the X server and X font server which run on many desktop Linux machines, there is usually no reason to allow connections to those daemons from anything but the local host itself. By filtering connections to these daemons can be performed by TCP wrappers or IP filtering. We've made the claim that security is mostly common sense, so what is this common sense? In this section we summarise the most common security mistakes. Never use simple or easily guessed passwords. Never use a password that's the same as or closely related to your user ID, name, date of birth, the name of your company, or the name of your dog. If you have a nickname, don't use it in your password; if you love cars, don't use the make/moder or registration number of your car – you get the idea. Always ensure that your passwords are not simple words that can be found in a dictionary. The best passwords are nonsense strings. One good practice is to user a password based on a simple rule and a phrase that you can remember. For example, you might choose a rule such as using the last letter of each word in the phrase "Mary had a little lamb, its fleece was white as snow." hence, the password would become ydaebsesew, certainly not something that will be easily guessed but a password that will be easily remembered. Another common technique is to use numbers and punctuation characters in the password; indeed, some password programs insist upon this. A combination of the two techniques is even better. You can also use online storage devices to help you with this such as clipperz.is and lastpast. Never use the root account unless you have to. One of the reasons that many common desktop operating systems (such as Windows) are so vulnerable to attack through email viruses and the like is the lack of a comprehensive privilege system, or rather the user's convenience of running applications with administrator privileges. Mind you, some broken applications require to be run with administrator right. Here, any user has permission to access any file, execute any program, or reconfigure the system in any way. Because of this it's easy to coerce a user to execute a program that can do real damage to the system. Do not relent to the temptation to use the root account for everything! In doing so you are throwing away one of the more powerful defences against virus and Trojan horse attacks as well as accidental commands of course. There is an additional benefit in this limited use to the root account: logging. Certain commands write messages to the system logfile when they're invoked, mentioning the ID of the user performing as well as the date and time that the command was invoked. This is very helpful for keeping track of when root privileges are being used, and by whom. Never share your passwords. Don't inform anybody of your passwords, no matter the circumstance. This also means you should not write your passwords on little sticky notes attached to your keyboard or pc monitor, or in the top drawer. If you want to allow people temporary access to your system, create an account for them as a user. This allows you some room in monitoring what they do and you can easily clean up afterward. Don't blindly trust files that have been given to you. Although it is easier to install copies of programs on your system, you should always question how much you trust the program before running it. If you're installing software packages that you've retrieved directly from the official sites of your distribution or from a significant development site, you can be fairly confident the software is safe. If you're getting them from an unofficial mirror site, you need to consider how much you trust the administrators of the site. It is possible that someone is distributing a modified form of the software with back doors that would allow someone to gain access to your machine. This can be classed as paranoid but is worth remembering If you do not want to install and execute a program that has been given to you in a program, there are some things you can do to help minimise risk. Always run untrusted programs as a non-root user unless the program specifically requires root privileges to operate. This will contain any damages the program might do, affecting only files and directories owned by that user. If you want to get some idea of what the program might do before you execute it, you can run the strings command over the program. You might also consider first running the program and watching what it is doing using a program, which display the system and library calls that the program is making. Look for references to unusual file system or network activity in the traces. Keep track of your logfiles. Befriend your system logfiles as they can tell you a lot about what is happening on your system. You can find information about when network connection has been made to your system, who has been using the root account, and failed login attempts. You should check your logfiles periodically and get to know what is normal and, more usefully, what is abnormal. Investigate if the latter! Don't let your system get too far out of date. It's important to keep the software on your system current. Keeping the software on your system up-to-date helps ensure that all bug security fixes are applied. Most Linux distributions provide a set of packages that are security fixes only, so you don't have to worry about issues such as configuration file and feature changes in order to keep your system secure. You should keep track of these updates. Don't forget about physical security. Most security breaches are performed by people inside the organisation running the target system. The most comprehensive software security configuration in the world means nothing if someone can walk up to your machine and boot a USB containing exploit code. If your machine uses BIOS or system PROM that allows the device boot order to be configured, set it so that the floppy and CD-ROM drives boot after the hard drive. If your BIOS provides support for password protection of its configuration, use it. If you can padlock that machine case closed, consider doing so. If you can keep the machine in a physically secure area such as a locked room then that's even better.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00241.warc.gz
CC-MAIN-2023-23
13,513
34
https://www.fortlewis.edu/observatory/clusters.asp
code
Star clusters come in two main types. Open clusters are collections of some of the youngest stars in the galaxy. These stars all form at about the same time, and are a good representation of the distribution of created star types. Globular clusters are collections of some of the oldest stars in the galaxy. Globular clusters can contain hundreds of thousands of stars in a "glob" that is only a few tens of light years across. More details about the different cluster types are included on the individual image pages.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123549.87/warc/CC-MAIN-20170423031203-00395-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
518
1
https://www.vn.freelancer.com/projects/php/online-homepage-maintenance-india/
code
I am in New York and we need IT support to replace a departing IT person who was maintaining/managing a homepage for us in India. This is very urgent. 49 freelancer đang chào giá trung bình $1014 cho công việc này Sure i am ready to do this as per your need..please ping me so we can do more discussion about this and i can start work immediately. i can share some demo as well once i get proper scope.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512460.41/warc/CC-MAIN-20181019212313-20181019233813-00281.warc.gz
CC-MAIN-2018-43
410
3
https://www.forcetalks.com/blog/enhanced-lookups-in-salesforce/
code
Records in custom lookup are searchable by Object Name or AutoNumber. What If we want to search the record for any other field value. Just Think... Don’t need to worry about that there is also a solution for that ie Enhanced Lookup. By using the enhanced lookup in salesforce we can make a searchable record from many fields like name, phone, email etc. So how to enable this enhanced lookup functionality of Salesforce? Just follow the steps : - - Click on Setup and Enter “Search setting” in Quick Find box. - Click on Search Setting, and in Lookup Setting, check the checkbox of Object for which you want to build this functionality. If your object is not there it means salesforce did not provide the enhanced lookup functionality for that Object. - Click on Save button Enhanced lookup feature is available only for some Objects ie. Account, Contact, Custom Object, Opportunity, user etc. Admin user has to enable this functionality for each Object. There would be 2 option for search the record: - All Fields When you’ll select All Fields Option then you can search record from any field’s Value. If you want to search more specific than follow the below steps: - Click on Setup and Enter “Search Layout” in Quick Find box. - Click on “Search layout” of your desired Object. - Click on Edit before “Lookup Filter Field” - Move Desired Field from Available field to selected Fields - Click on Save Button The result will be shown as: Click on Show Filters: Now You can search record from specific field’s value.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103810.88/warc/CC-MAIN-20231211080606-20231211110606-00035.warc.gz
CC-MAIN-2023-50
1,540
19
https://ux.stackexchange.com/questions/135936/is-there-any-value-in-a-post-user-testing-questionnaire-considering-the-sample-s
code
is there any value in this approach? Short answer: YES* The Nielsen Norman Group, which is always a great source for research-based guidelines, states that in most cases 5 users are absolutely sufficient to uncover the majority of your usability issues. The following graph (taken from an older article of the NN Group) shows that after 5 users, the insight gain decreases rapidly. Since it takes time and money to conduct user studies, the ROI for each additional test is close to none. It is therefore sensible to keep the sample size relatively small for each test. The number of different tests, however, depends strongly on how large your application is and how diverse your user base is. - Keep tests short and concise - don't overwhelm your users by testing hundreds of functions with them. - And if you have different target groups with different target groups, you should conduct independent tests for those different parts of your system with representative users. BUT - since you also asked about quantitative data: I'm afraid 5-7 users are not enough to get any statistically significant data, simply because the sample size is too small. The NN Group addresses this concern like so: the vast majority of your user research should be qualitative — that is, aimed at collecting insights to drive your design, not numbers to impress people in PowerPoint. I would suggest you keep doing tests, focusing more on qualitative data to uncover usability problems and underlying reasons for those problems. After all, I would argue that this might be even more important than quantitative data. It helps you understand not only where problems might lie but why these problems exist for your users. Understanding your users ultimately helps you in building a usable and therefore well-received system. I'm aware that I didn't address the benchmarking part of your question yet and I'm sorry that my answer might not be satisfactory in that regard. But if you still want to run some numbers, you can always compare the "number of usability problems" that were uncovered in each iteration of your prototype. To get a more informed picture, you could apply "severity of the problem" as a weighing factor. When your (small) user tests no longer uncover new problems - or only cosmetic/non-severe ones - you can confidently go into a more costly development stage. For further insights, I recommend you to read the linked articles and also follow the links there.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476399.55/warc/CC-MAIN-20240303210414-20240304000414-00895.warc.gz
CC-MAIN-2024-10
2,462
15
http://flyingsalmon.net/winning-the-lottery-automatically/
code
Howdy! Ok, I’m not guaranteeing you’ll win the lottery every time, or even ever, but I’ll show you here to generate automatic lottery numbers…for Mega Millions, Power Ball, Hit 5, and Lotto. This time, I’m using Python (a favorite among data scientists). Remember, I am NOT a programmer, but I’m a computer scientist. Difference? A programmer knows a specific language and goes deep into syntax, I don’t. A computer scientist understands algorithm, logic, architecture regardless of a specific language syntax (which always change…by smart humans) but can pick up any syntax by reference as needed, without memorization. My memory is bad 🙂 Okay, so I was playing with Python mainly due to my certification program on AI and Data Science. We had to use it extensively. Yes, I got 6 certifications successfully, thank you 🙂 But I was also curious to play with it afterward to make it do some mundane work. See, I rarely buy lottery tix, but when I do, I never pick the same numbers from a list. I always do quick pick…which the little machine generates (either runs Windows CE or Linux or some variant) using the same logic as I show you here. I share the full source code below (you’ll obviously need a Python compiler to run this and you can get them anywhere on the Net for free) but first, I wanted to explain the logic because I’m not teaching any language syntax here, rather the logic of coding. It’s way more fun. First we create “sets” in Python. It’s like an array in most other languages (but Python makes it really easy to work with such beasts, manipulating them, outputting them, graphing them, etc. You can look that up in your own leisure). Because each of the lotteries have different rules, I lazily create one list for each. For example, Mega Millions takes 5 numbers from 1 to 70 inclusive and a quick pick number that’s 1 to 25 inclusive. Lotto takes 6 numbers from 1 to 49 inclusive and doesn’t use any concept of quick pick. And so on. The source code below in gray boxes are comments and I put in the explanation for each block below. On each set, I set the range according to the lottery game rules. Then I pick a random number (I love randoms!) from the set and repeat it as many times as necessary. For example, I need to pick 5 numbers from the list for Mega Millions. In most other languages, it’s several lines of code, but for busy data scientists Python makes it really simple…with 1 line of code. To pick 5 random numbers from a list, we only have to write: To use the random function, we have to include the correct library where it’s defined. In Python, we do this with “import” statement (same idea as “include” in C/C++). The seed method of the random object (everything appears to be an object in Python much like in C++) takes a number of your choice to start the random math computation. You can read up more about seed() online and how it affects the math. That’s it! Then I simply print out the results on screen with a simple print() function. So easy 🙂 I intentionally didn’t optimize the code for brevity (there’s room). So, do it and take the challenge below. Full source code below. Why an image (because you need to work at it by at least re-typing and trust me as you type each stroke will make you think about what and why :)) Take The Challenge Can you use 1 list instead of 4 and extract from the same list the 4 outputs? Can you optimize the code? By The Way If you do win lottery using this, won’t you share some wealth with me? 😉
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00055.warc.gz
CC-MAIN-2023-40
3,550
13
https://hubpages.com/technology/Firefox-21-New-features
code
Firefox 21 New features Times are changing Firefox 21 has just been released to the Aurora channel. New features have been implemented and currently the next step is to fix bugs and prepare it for the final release. But what has changed? This release sees subtle improvements rather than a huge overhaul. Firefox 21 new features Better HTML5 experience - Several months ago, Google Chrome implemented support for H.264, AAC and MP3. In response, the Mozilla team has done the same. This means that with the help of HTML5, more file formats can be embedded in websites. This is a part from a phase of changes which aim to better support HTML5 and encourage the growth of feature-rich websites as an alternative to Adobe Flash. New Looks - This one only applies to Ubuntu and some Ubuntu-based distros. To make Firefox look more native, a new theme called 'Australis' will be implemented. The most notable change is in the download menu Among some other minor changes, there has been some more choices when it comes to Do Not Track. You can now choose one of three options: - Tell sites that I do not want to be tracked - Tell sites that want to be tracked - Do not tell sites anything about my tracking preferences Try it out To test out the latest and greatest Firefox, you can download it from Mozilla's website. For Ubuntu users, simply add the nightly ppa and install the package firefox-trunk. This will not remove the stable version of Firefox: sudo add-apt-repository ppa:ubuntu-mozilla-daily Then when this message appears, hit enter: You are about to add the following PPA to your system: daily (or even multiple builds per day) for various mozilla projects and branches. For questions and bugs with software in this archive, please contact <email address hidden> or visit #ubuntu-mozillateam on freenode. More info: https://launchpad.net/~ubuntu-mozilla-daily/+archive/ppa Press [ENTER] to continue or ctrl-c to cancel adding it sudo apt-get update && sudo apt-get install firefox-trunk When will Firefox 21 be released? In case you are curious, Firefox 21 will be released May 14th if everything happens as planned. Update: Firefox 22 has been released in the Nightly Channel. Check out the new privacy features on Tech Resen's posts on Firefox 22's new features.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583690495.59/warc/CC-MAIN-20190120021730-20190120043730-00638.warc.gz
CC-MAIN-2019-04
2,273
24
https://www.mattbutton.com/post/
code
Impromptu speaking in front of an audience is challenging for most of us. Even the famous author and public speaker, Mark Twain, has been quoted as saying “I never could make a good impromptu speech without several hours to prepare it.” If you struggle with scattered thoughts, or mind blank when impromptu speaking, then this blog post will help you. In this blog post, you’ll learn some techniques to structure your speech when you’re on the spot, and some ways to quickly generate ideas when your mind goes blank. For the first few years of Sam’s career, he worked as a design consultant. As he gained more design and problem solving experience, he came to realise that he was often getting the wrong brief from his clients. Sam found that while companies could conceptualise new products or services, the sticking point was aligning this conceptualisation to their business models, which meant that time, and time again, projects significantly fell below expectation or failed completely. These experiences led Sam to specialise in Design Led Innovation. There are three elements of Design Led Innovation: Customer value: This is the starting point, and is about being clear on who the customer is, and the problem that the business is solving for them. Management Mindset: The correct mindset to create a strategy which has been built around new insights about the customer. Strategic alignment: Ensuring that all business processes and systems are aligned with the customer’s problem. This blog post is part 1 of a multi-part series, and covers the basics of getting Google authentication to work with Python and Flask. Part 2 will cover actually reading and writing the files to Google Drive. In this blog post, you will learn how to create a Python Flask app, which allows a user to log in with their Google account
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202588.97/warc/CC-MAIN-20190321234128-20190322020128-00496.warc.gz
CC-MAIN-2019-13
1,835
12
https://ubuntuforums.org/showthread.php?t=2126804&p=12563520
code
Not sure where to put this, so Mods please move to the right place. I upgraded from Ubuntu 11.10 to 12.10 (64bit) and since then upon start up Nautilus just sits there and eat the CPU and memory and makes the laptop pretty unusable. I have to do a "killall nautilus" in the terminal to get control over laptop again. I have even tried to upgrade to 13.04 (which runs great on my laptop) and even upgraded Nautilus to 3.6 but sill it hangs. I even tried "sudo apt-get purge nautilus-open-terminal" but Nautilus is still eating CPH. I have looked around and yet to find a solution that solves it and I can see others are having the the same problem. I'm now using Gnome-commander and terminal for my files. Though every time I boot up, insert a external HDD or when other programs calls for Nautilus I end up with a laptop that unusable until I kill nautilus, which is rather annoying to do. Does anyone here got an idea on how to solve this. I used to like Nautilus but I might have to give Gnome etc a go to stop this. Laptop : Dell 13z (1.2Ghz,3Gb Ram, 500Gb HDD)
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982911825.82/warc/CC-MAIN-20160823200831-00213-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
1,064
8
https://chatgptdemo.ai/baby-agi/
code
The term “Baby AGI” is a shortened version of “Task-Driven Autonomous AI Agent.” It functions as an AI-powered task management system, integrating OpenAI and Pinecone APIs to construct, prioritise, and execute tasks. This system is distinguished by its novel approach to task creation, which is dependent on the outcomes of previous tasks and a predetermined objective. The robust natural language processing (NLP) capabilities of OpenAI enable the system to formulate new tasks that align with the given objective. Concurrently, Pinecone serves as a database for archiving and retrieving task results, thereby offering contextual insights. This streamlined system, introduced on 28 March 2023, is a condensed version of its predecessor, retaining the core functionality while providing a more user-friendly platform for autonomous AI-driven task management. This script is useful for Python developers, project managers, research scholars, startups, and educators to understand the dynamics of autonomous AI agents, automate task generation, and integrate AI-driven task management into product suites or internal operations. It also serves as a practical demonstration for teaching AI concepts. >>> Please use: ChatGPT Free – Version from OpenAI
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474671.63/warc/CC-MAIN-20240227053544-20240227083544-00788.warc.gz
CC-MAIN-2024-10
1,257
4
https://www.freelancer.co.za/job-search/huffman-coding-matlab-file-image-compression/
code
...Project Name: "Using Intelligent Algorithms in Image Compression" The idea is based on the use of two types of Intelligence algorithms 1. Lion algorithm. 2. Firefly Algorithm. . Action Steps: A. A dialog box appears where the image is selected B. Perform the steps of the Lion algorithm to compress the image C. implements the steps of the Firefly algorith... I'm looking for someone that can work with us. we are a reliable Alibaba customized PLASTIC INJECTION MOLDS, SILICONE RUBBER COMPRESSION MOLDS, CNC steel, aluminum machining manufacturer/factory in China, with good prices and strict quality controlling system, +10 years. The product's designers must have good cooperations senses and they can build ...the translation and automatically adds the translation! I want to work similar to him as a tool to compress the video and add translation I want a program that makes the compression of a large number of videos quickly and easily and adds a translation and also uploaded to servers like [login to view URL] I want to know is it possible or not? How much price ...2000px by 2000px Square image. This is the max zoom. • Cropped tight to the product to use the most space in the listing. • Save it as a Jpeg with a 100% compression, Amazon will compress it again on upload. • Save it as Srgb color space, if given the option. This is usually the default • The best ratio or crop is a 1:1 square image but can be up to ... I am... The Business intelligence and reporting capabilities is critical so that ew give our clients real time access to reporting and data. The database design, photo/video compression is also very important. Someone with experience in this space would be a welcomed benefit to our project so they can shape this solution and reduce turn around time. ...configured so I can log in to cpanel/whm without ssl errors. Php 7.1 should be the default. 2. Install and configure CSF firewall and normal hardening 3. Enable Opcache, gzip compression, browser cacheing, pagespeed module amd any other recommended optimtimizations. 4. Optimize Apache/Nginix stack (your best combination FastCgi, PHP-FPM, Memcached, Varnish We require code for an STM32 which will take data and store it in an efficient manner to send in packets to a computer. This will be analog data...efficient manner to send in packets to a computer. This will be analog data samples, grouped together in packets, every few seconds. We are looking at something like XOR compression, storing the difference. ...voice later on if needed) 5. The recorded video bitrate should be at least 6000Kbps 6. Recorded video should be uploaded to an FTP server.. or website as is.. without any compression (not through youtube or any other video sites). 7. Here is a sample of what we are looking for,... something similar to these videos: [login to view URL] ...specialized in activewear, our products do have the same quality as NIKE, LULULEMON, SWEATY BETTY, and ADIDAS… we need an experienced Quality controller for Activewear (compression leggings, top tanks and medium/high support bra) for Yoga and Gym/ The job is based in Sialkot/Pakistan. The controller, has to control all items before shipping and ...app to be added since they can misuse my data. I would prefer own Oauth Application. 8. Further Small Optimizations for Mobile Site. 9. Image Images Thumbnail to be resized to a single size format. 10. Image compression to be done to optimize site performance. I am looking for Freelancer with Cheapest Price and Background Experience in the domain.... Light retouching of pictures. They must look natural so turn down filters etc. Pics are in tif format (LZV compression) and must be kept in lossless quality in all stages. Clean up skin imperfections, darken eyeliner, Improve body shape LIGHTLY with liquefying tool, use skin softening filter LIGHTLY, fix background. Job Description ...audio formats such as H.264, MP4, MOV Knowledge of compression formats such as MPEG Understanding of basic encryption methods such as symmetric and asymmetric key cryptography Understanding of security issues with video content distribution in the Indian education market Understanding of large file transfer methods over the internet My Current Wordpress site (simple site) is currently running at full load speed 22.5s, which is too slow. I shall send over t...is too slow. I shall send over the GT METRIX report and I need my site load speed to be reduced to 7.5 or below. The report will tell you what needs doing: Enable gzip compression Remove query strings from static resources
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589179.32/warc/CC-MAIN-20180716041348-20180716061348-00098.warc.gz
CC-MAIN-2018-30
4,580
13
https://docs.bentley.com/LiveContent/web/OpenPlant%20Project%20Administrator%20Help-v9/en/EnableWkset.html
code
Enable WorkSet for a Product This option uses a wizard to walk the user through enabling one or more OpenPlant products for the selected workset. Accessed from the Configuration Ribbon > WorkSet Tool Group - Select the Workset from the Navigation Tree. - In the Configuration Ribbon, click the Enable option from the WorkSet tool group. - Click Next to continue. Enable the checkbox next to the applications to enable for the Note: The Options field has drop down lists which provides options for the user to use converted PDx (Modeler) or converted AutoPLANT (PID) components with the workset. - Once the product selections are made, click Next to enable the products. - Click Finish to complete the process. The enabled products will be listed under the selected workset as shown:
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176922.14/warc/CC-MAIN-20201124170142-20201124200142-00189.warc.gz
CC-MAIN-2020-50
782
10
http://lwn.net/Articles/250071/
code
Posted Sep 16, 2007 15:05 UTC (Sun) by sobdk In reply to: Vista ? Parent article: LinuxConf.eu wrapup >Why the hell you are comparing Linux with Vista? Well, it was the only Windows machine I have (Thank God!). Honestly though do you think my comparison was unfair? I compared the latest and greatest from both the Linux world and the Windows world. Most consumers whether they like it or not will will get a new PC that has Windows Vista preinstalled. I would personally love to hear someone from Microsoft say "No wait that's not fair! Please do a comparison with our older far superior W2K and XP!" Additionally I can tell you that at WinHEC in 2006 I sat through several fine developer (marketing?) sessions explaining how all of the suspend and resume problems of XP were going to be solved in Vista. In XP drivers (and perhaps app software) can simply veto a request for suspend. "Less asking and more Telling" was the moto for Vista as they explained that all drivers would have to get their act together and support suspend properly. Well someone didn't get the memo on my machine. to post comments)
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382396/warc/CC-MAIN-20130516092622-00086-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,107
8
https://newsroom.uber.com/chicago/tag/robert-morris-university/
code
robert morris university Being an Uber driver partner isn’t just about moving people. We believe in helping pave the road to success for everyone who drives on the Uber platform. We’re proud to announce a new partnership with Robert Morris University. Active Uber driver partners are eligible to receive a 10% tuition reduction for any program at Robert Morris University.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647777.59/warc/CC-MAIN-20180322053608-20180322073608-00703.warc.gz
CC-MAIN-2018-13
376
2
https://community.cloudera.com/t5/Support-Questions/Is-Horton-Works-100-Opensource-Can-i-build-the-source-code/m-p/234073
code
I am of the understanding that Horton works HDP uses couple of open source components like Hadoop , Hive and many others If i want to setup HDP on my own platform then i can basically get the individual source from https://github.com/hortonworks But i have the following questions. 1) Is the source code of HDP Manager that manges all opensource components , opensource? 2) If 1= yes than can i fetch and build that code were is it available.? 3) If HDP is 100% opensource do you have a single document which explains its Build and Install instructions?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648209.30/warc/CC-MAIN-20230601211701-20230602001701-00221.warc.gz
CC-MAIN-2023-23
553
6
https://forum.openframeworks.cc/t/using-ofxosc-with-another-program-causes-bizarre-stl-errors/1654
code
I have been busy today customising Celestia, to allow it to take incoming OSC messages, to allow for remote control from OpenFrameworks. You can download my customised source from here: I have already included OSCPack (http://www.audiomulch.com/~rossb/code/oscpack/) and compiled it successfully within my customised version of Celestia, so I know the problems described below aren’t to do with that addition.Zach Gage put me on to the iPhone version of OSCPack, which gets around a nasty “nil” bug with using C++ and Objective C together. The problems arise when I attempt to add the OSCReceiver class to the Celestia project. I have made additions to celestiacore.h, celestiacore.cpp, in the CelestiaCore::CelestiaCore() constructor and the CelestiaCore::tick() methods. I get this error multiple times: stl_deque.h: In member function 'void std::_Deque_base<_Tp, _Alloc>::_M_initialize_map(size_t)': /Developer/SDKs/MacOSX10.4u.sdk/usr/include/c++/4.0.0/bits/stl_deque.h:452: error: expected unqualified-id before '(' token I realise that ofxOSC uses a deque, but for the life of me haven’t been able to track down the problem. The error is obviously_not_with the std library. I am compiliing on OS X 10.5.6 on a Macbook Pro (Intel). My feeling is that somehow a constant or keyword has been used in the ofxOSC code, and that this causes the error messages above. Or is it the usage of the std namespace in celestiacore.cpp? All my additions to Celestia are in the celestiacore.cpp and .h files. The Xcode project can be found in the celestia.xcodeproj in the macosx folder of the zip file linked to above. I took the ofxOSC addon code from 00573-Xcode-Fat-YCAM-WithGui OF version. You may need to download Celestia and copy the CelestiaResources folder to the “Application Support” folder in your “Library” folder (’~/Library/Application Support’) in order for the data files to be loaded correctly, but at the moment the program doesn’t even get that far. Removing the additions allows the program to build correctly. If anyone has any ideas, I’d love to hear them.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103341778.23/warc/CC-MAIN-20220627195131-20220627225131-00281.warc.gz
CC-MAIN-2022-27
2,094
14
https://www.assessmentsinternationalinc.com/senior-executive
code
Executives responsible for enterprise-wide leadership of a business group or function (e.g., business group executives, senior corporate functional executives). Self, Primary Manager, Secondary Manager (up to 2), Direct Report, Peer, Other 11 Languages - Chinese (Simplified), Dutch, English (British), English (US), French, German, Italian, Japanese, Portuguese (Brazilian), Spanish, Swedish Individual License Model Norm: Global Organization License Model Norm: North America No development suggestions available Pursue your own development Consultants and coaches within organizations. Consulting Firms and Organizations.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00781.warc.gz
CC-MAIN-2023-50
624
9
https://www.ceplas.eu/de/forschung/people/dr-pau-formosa-jordan/
code
In my research group we use mathematical modelling, microscopy and quantitative image analysis to better understand the dynamics of plant developmental processes at different scales, from single-cell resolution to the tissue and whole-plant level. Currently, we focus on two different developmental processes in Arabidopsis thaliana: We are studying cellular patterning in the leaf epidermis and we are investigating how gene expression patterns in the shoot apical meristem influence the floral transition and meristem shape. +49 221 5062291 Department of Plant Developmental Biology Max Planck Institute for Plant Breeding Research
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644506.21/warc/CC-MAIN-20230528182446-20230528212446-00377.warc.gz
CC-MAIN-2023-23
633
4
https://yblog.org/2006/07/01/%E5%BE%AE%E8%BB%9F%E9%87%8B%E5%87%BAie7-beta3%E7%80%8F%E8%A6%BD%E5%99%A8%E6%96%B0%E7%89%88%E6%9C%AC/
code
繼IE7 Beta2瀏覽器後,微軟又推出新版本IE7 Beta3,有興趣使用的人請點IE7各Windows平台版本下載網址。 IE7 Beta3改善了許多IE7 Beta2的bug,並提高網站瀏覽的相容度,建議有用IE的人,可以更新為這個版本,不過目前只有大小12.5MB的英文版喔。 The following open issues in Internet Explorer 7 Beta may be addressed in Beta updates and in the final release of Internet Explorer 7. We are mentioning them here because we think they may impact Beta customers. The information applies to all Microsoft platforms, unless the note specifies content unique to Windows Vista or Microsoft XP SP2. Application Compatibility Toolkit Beta 5.0 Available — The Application Compatibility Toolkit Version 5.0 Beta program is available for download through the Microsoft Connect Program. This toolkit, which runs on WIndows XP SP2, Windows Server 2003 SP1, and WIndows Vista, replaces the Temporary Application Compatibility Toolkit which supported previous Beta versions of Internet Explorer 7. The Temporary Application Toolkit is not longer available. Google Desktop — Google has fixed the issue that caused Internet Explorer 7 to crash when opening new tabs. Users need to install the latest version of the Google desktop. Citrix — The CITRIX ICA Client ActiveX Control does not function when run in Internet Explorer 7 Beta Protected Mode on Microsoft Windows Vista. The user will not be able to see the remote desktop in a web page that is hosting the control. To work around the issue, the user can right click on the Internet Explorer icon and select "Run as administrator." This allows the ActiveX control to run in the Internet Explorer process with full functionality. SmartBridge — SmartBridge is distributing an old version of PSAPI.DLL. As a result, users may receive the following error message after installation of Internet Explorer 7 Beta: SmartBridge Alerts:MotiveSB.exe Entry Point Not Found The procedure entry point GetProcessImageFileNameW could not be located in the dynamic link library PSAPI.DLL To work around this error: Navigate to the installation location for SmartBridge (Program FilesVerizon…Smart…) Find PSAPI.DLL and rename it to something like PSAPIOLD.DLL Reboot the system The program will find the new PSAPI.DLL in the WindowsSystem32 directory and function normally. The following workarounds are available: To check email at Hotmail, user Internet Explorer rather than Outlook Express or Outlook Uninstall KB904942 using the Add/Remove Programs applet in the System Control Panel OS Updates–Do not reinstall any version of Microsoft Windows in any way after you install Internet Explorer 7. Do not upgrade in place or upgrade to a new edition. The workaround is to remove Internet Explorer 7 Beta, install operating system updates, and then reinstall Internet Explorer. Reset Internet Explorer Settings (RIES)–Use Reset Internet Explorer Settings (RIES) if you need to recover IE to a workable state due to spurious add-ons, incompatible browser exensions, spyware or malware. Review our IEBlog, Reset Internet Explorer Settings for more details. Reset Internet Explorer Settings (RIES) Behavior in Special Scenarios — The following sections describe special handling of some settings by RIES in Internet Explorer 7 Beta. This feature is referred to as "Reset Internet Explorer to the Default Settings" in the Help content.. Protected Mode Settings (Windows Vista only) — These settings determine how Internet Explorer 7 runs a process from within protected mode. You can find more information in the MSDN article, Understanding and Working in Protected Mode Internet Explorer. REIS sets this list to the defaults known at installation time. Additional controls added to the list after that time will be cleared. ActiveX Compat Key — This key contains kill bits that prevent known harmful controls from getting loaded. RIES resets compat bits of the CLSIDs known at Beta 2 release time and leaves other CLSIDs as they were. Feature Control Keys (FCK) — This key provides a way to opt in to certain secure settings that can be used by multiple features and applications. This key is not reset by RIES. Enhanced Security Configuration (ESC) Defaults on Server Machine — If ESC is ON, RIES resets Internet Explorer to the ESC defaults. If ESC is OFF, RIES resets Internet Explorer to the standard IE defaults. RIES does not cause the state of ESC to be changed. Spoofing User Agent String Values to IE6 – Some web pages, which have hard coded values for the User Agent String, will work if you temporarily spoof them, using the User Agent script to make it appear as appear as though they are running on IE6. After you use this tool to successfully access a web site be sure you return the User Agent String to the default value for IE7 Beta before continuing to browse the system. RSS feed detection button–Internet Explorer 7 Beta uses a link in the html of a web page to enable the feed discovery button located on the Command Bar. If a page does not have that link element, Internet Explorer 7 does not detect the feed. See the IE Blog entry for details. Feed Reading in Right-to-Left- Internet Explorer 7 Beta does not properly display contents in right-to-left text direction. This will be fixed in the final release of Internet Explorer 7. SharePoint–Microsoft Windows SharePoint Services (WSS) cannot import spreadsheets when Internet Explorer 7 Beta is running. MSN 1.02 Toolbar–The MSN 1.02 toolbar crashes Internet Explorer 7. The workaround is to disable the toolbar, using manage add-ons, or uninstall it. Developer Toolbar and Internet Explorer 7 Beta – The latest version of the Microsoft Developer Toolbar runs correctly with Internet Explorer 7 Beta. You can download it from the Internet Explorer Download Page. Previous versions of the Developer Toolbar do not display correctly on systems running Internet Explorer 7 Beta and sometimes cause Internet Explorer to hang. MSAA During setup, a checkbox with the MSAA name of "I" is displayed immediately after Windows Genuine Advantage validation has completed. This checkbox is checked by default and reads as follows: "Install the latest updates for Internet Explorer, and download and run the Microsoft Windows Malicious Software Removal Tool (recommended). Installing the latest updates and the Microsoft Windows Malicious Software Removal Tool will help Internet Explorer install successfully by removing existing malicious software and protecting your computer against security threats. Multiple Auto Refresh Applications May Hang IE7 — If you leave open a number of applications that refresh themselves, the system may hang and require a hard reset. This issue is caused by a known problem with memory leaks in IE7 which may cause other applications, such as Microsoft Phishing Filter, to hang. To work around the problem, do not leave Auto Refreshing applications open for long periods of time. Flight Simulator 2004 – If Flight Simulator 2004 stops responding after you have installed Internet Explorer 7 Beta, find the oleacc.dll file in the Flight Simluator folder and rename it to oleacc.old. Then restart Flight Simulator. Printing Issues–Some sites that pull images from a secure server (https) and require cookies for authorization may not allow users of IE7 to see the image during a print-preview. In this scenario, the print preview feature will treat these cookies as third party and replace the images with a red "X". To work around this, click Tools > Internet Options > Privacy > Advanced > Override Automatic Cookie Handling > Accept Third-Party Cookies. IME Hot Key Language Switch — Users cannot use the Input Method Editor (IME) hot keys to switch language inputs when entering characters into HTML (for example, forms and text boxes.) To work around this issue: Switch the input method using the Language bar icon in the task bar Turn off "Advanced Text Services" on the Internet Control Panel – Regional and Language Options – Languages – Details – Advanced). Note: When you disable Advanced Text Services, you will no longer have a visible Language Bar Icon in the task bar. SAP GUI — You cannot use the SAP GUI with Internet Explorer 7 Beta. A fix for the issue will be available in patch level 20 of the SAP GUI for Windows 6.40 and patch level 64 for WIndows 6.20, later this summer. GE Pathspeed ActiveX Control – An ActiveX control that is used on old versions of Pathspeed from General Electric (GE) prevents users from accessing ActiveX controls and generates the message, "Security certificate has expired." This problem is fixed on newer versoins of the Pathspeed product. Freedom Scientific–When using Freedom Scientific’s JAWS® for Windows screen reader with Internet Explorer 7 Beta, you might encounter the following Issues with shortcut keys. (Please see the Accessibility section for important information about installing JAWS.) JAWS 7 does not display the contents of individual frames when a page contains a frame set. To work around this problem, copy psapi.dll from the WINDOWSsystem32 directory to the directory where JAWS is installed. JAWS 6 reads incorrect information for Select Control with Say Line and Say Control Hot Keys, because of the new Internet Explorer 7 Select Control. There is no current workaround for this problem, but Freedom Scientific is working on support for the new Select Control. CTRL+F opens the Internet Explorer Find dialog box rather than the JAWS Find dialog box. To work around this, use INSERT+CRTL+F. INSERT+A does not move the JAWS cursor to the Address bar. To work around this, use ALT+D to set focus on the Address bar VeriSign's i-Nav™ Plug-in–Users of the VeriSign i-Nav IDN Resolver Plug-in may notice that they are unable to navigate to Internationalized Domain Names (IDNs) in Internet Explorer 7 Beta. This is caused by Internet Explorer 7's enhanced support for IDNs. To navigate to IDNs in Internet Explorer 7 Beta, please open IE and click from the file menu Tools > Manage Add Ons > Enable or Disable Add Ons. Select the i-Nav browser extensions and "Disable" them. Web Site Connectivity Issues SSL Changes–When navigating to an HTTPS site on Windows Vista, you may encounter a connection failure error page if the server does not correctly support the TLS standard. To work around this problem, uncheck the “Use TLS v1.0” checkbox in the Internet Control Panel’s Advanced tab and notify the web site owner about this problem. (A description of the changes in SSL can be found in the Internet Explorer blog). Proxy Connectivity – If you notice slowness or a problem connecting to web sites after upgrading to Internet Explorer 7 Beta, it may be due to Proxy Auto Detection problems. Launch the Internet Control Panel by clicking "Internet Options" From the Internet Explorer Tools menu. Navigate to the Connections tab Under Local Area Networks (LAN) settings choose LAN Settings Uncheck "Automatically detect settings" in the Local Area Network (LAN) Settings dialog, Check "Use a proxy server for your LAN" and specify your proxy server in the Local Area Network (LAN) Settings dialog, Click OK, OK You will now be able to navigate to internet sites. Internet Connection Settings–If you notice a problem connecting to web sites, it may be because the upgrade to Internet Explorer 7 changed your Internet Explorer 6 Internet Connection settings. To work around the problem: Launch the Internet Control Panel by clicking "Internet Options" from the Internet Explorer Tools menu. Navigate to the Connections tab For each connection in the "Dialup and Virtual Private Networks" list, click the "Settings" button Verify that "Automatically detect settings" is checked. If not check it Click the "Lan Settings" button in the Connections tab, and repeat step 4 6. Click OK on the Connections tab. Close IE and restart it. Top of Page Functionality Removed and Changed in Internet Explorer 7 Beta This section describes previous Internet Explorer functionality that has been substantially modified or deleted in the Internet Explorer 7 Beta release. Offline Favorites – Offline Favorites and Scheduled Offline Favorites have been removed from Internet Explorer 7. Internet Explorer supports RSS feeds which provides scheduled updates to web content and offline reading of this content. For more information on feed reading experience, read RSS Blog. Scriptlets—Internet Explorer 7 disables Dynamic HTML (DHTML) scriptlets, by default. (Scriptlets were deprecated in Internet Explorer 5). They can be reenabled by system administrators, changing URLActions with the Internet Control Panel (INetCPl.) The INetCPL text should read "Allow Scriptlets." If your programs rely on scriptlets, we recommend that you use DHTML behaviors, which are more efficient. Disabling scriptlets is part of our continued work to ensure that unsupported technology is deemphasized in Internet Explorer. ActiveX controls–The new Internet Explorer 7 ActiveX Opt-In feature disables ActiveX controls on a user’s machine. When the user encounters a Web Page with a disabled ActiveX control, they see an Information bar to enable the control. Controls which were used in IE6 before upgrading to IE7, along with some pre-approved controls, are not disabled. File Select Control – Input TYPE=FILE control no longer submits a fully qualified path; it now submits only a filename. Channel Definition Format (CDF)–All CDF support was removed from Internet Explorer 7 Beta and replaced with the RSS feed reading experience. Feeds that the user is subscribed to are available to other applications through the RSS Platform. Read more for details on the RSS Platform. DirectAnimation–All DLLs to support the Internet Explorer DirectAnimation component were removed in Internet Explorer 7 Beta. XBM–Support for XBM, an imaging format designed for X-based systems, was deleted. SSL–Support for weak SSL ciphers was removed from Windows Vista and support for SSLv2 was disabled for Internet Explorer 7 on all platforms Windowed Select–The Windowed Select Element was replaced by Windowless Select in Internet Explorer 7. This results in some cosmetic changes. BASE Element–Internet Explorer 7 strictly enforces the BASE element rule, as documented in the HTML 4.01 standard. We no longer allow BASE tags outside of the HEAD of the document. The standard specifies that the base element must appear within the head of the document, before any elements that refer to an external source. window.opener and window.close–Internet Explorer 7 no longer allows the window.opener trick to bypass the window.close prompt. Browser windows cannot close themselves unless the windows were created in script. This security enhancement no longer allows browsing to a random site when the main browser window closes unexpectedly. WWW-Auth–Internet Explorer 7 changes the precedence rules for WWW-Auth. Previous releases of Internet Explorer used the first header encountered. Internet Explorer 7 uses the first header except when the header is Basic. IE7 uses Basic authentication if no other authentication mechanism is present. HTTPOnly Cookies–HTTPOnly cookies can no longer be overwritten from scripts. _SEARCH–The _SEARCH sidebar is disabled by default in Internet Explorer 7 Beta. It is now a setting in the advanced InetCPL and can be turned on, using a URLAction. View Source–The view-source protocol no longer works in Internet Explorer 7 Beta. Gopher Protocol–Support for the Gopher protocol was removed at the WinINET level. (Gopher support was turned off by default in Internet Explorer 6.) windowexternalImportExportFavorites()–windowexternalImportExportFavorites() has been removed in Internet Explorer 7 Beta. Telnet–The telnet protocol handler is no longer supported in Internet Explorer. SysImage URL Scheme–The SysImage URL Scheme has been removed from Internet Explorer. Status Bar Scripting–Script will no longer be able to set the status bar text through the window.status and window.defaultStatus methods by default in the Internet and Restricted Zones. This small step helps prevent attackers from leveraging those methods to spoof the status bar. To revert to previous behavior and allow Script to set the status bar through window.status and window.defaultStatus: Select the “Security” tab from “Internet Options” in the Internet Explorer Tools Menu. Select “Custom level…” for the Internet (or Restricted sites) zone. Find “Allow status bar updates via script in the Scripting section of the menu” Change the setting to “Enable”. Internet Explorer Maintenance–The max length for character support in the Proxy Exception List has been increased to 2064 Chars, instead of the previous max length of 256 chars.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817200.22/warc/CC-MAIN-20240418061950-20240418091950-00074.warc.gz
CC-MAIN-2024-18
16,870
91
https://lists.bufferbloat.net/pipermail/cake/2015-October/001426.html
code
[Cake] iproute2 doesn't build kevin at darbyshire-bryant.me.uk Fri Oct 16 09:43:50 EDT 2015 On 16/10/15 14:20, Jonathan Morton wrote: > That doesn't look like code I've touched. Perhaps tc-adv would work, > but I don't have commit access to it. > - Jonathan Morton I can confirm that tc-adv as of commit ad727bd0334ab7a1bcce7a62ccc1687601f9a16e compiles & works on bleeding edge openwrt 'cos I'm running (and typing to you) through it :-) I'm afraid I don't have an obvious & immediate means of testing the source 'iproute2' repo. -------------- next part -------------- A non-text attachment was scrubbed... Size: 4816 bytes Desc: S/MIME Cryptographic Signature More information about the Cake
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654016.91/warc/CC-MAIN-20230607211505-20230608001505-00234.warc.gz
CC-MAIN-2023-23
694
17
https://www.affilorama.com/forum/affiliate-hangout/is-traffic-travis-seo-analysis-down-for-everyone-t12128.html
code
11 Jun 10 13 May 11 6:40 pm Yep. It's not working. I just updated to 3.3.13. That's when things went wonky. I'm only getting 1 result in the SEO analysis for top ten, US, running windows xp for a keyword I rank on google p1. With top 20 results selected I got 20 results but my p1 google ranked page is not there. The last time I saw it appear in the result it showed no onpage seo, all red x's. Wrong again.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515352.63/warc/CC-MAIN-20181022155502-20181022181002-00504.warc.gz
CC-MAIN-2018-43
408
6
https://www.propel.run/members/recBhzJy66mm3Wz4a
code
Chief of Staff at Ntropy I support early stage founders and organizations to plan, organize & execute on the back-office. I grew up in the small college town of Sewanee, TN and have lived in NYC for the past six years. I'm passionate about community, music, and traveling. I'm also interested in real estate investing, DeFi & company cultures. In my free time I read, write, and dream about building businesses. Goal - create a strong network in the startup space Goal - explore new career opportunities Currently Investing in Give 1 - Brainstorm strong working/startup cultures Give 2 - Early stage finance & accounting Give 3 - Phish recs ;) Give 4 - Recruiting, interviewing
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662647086.91/warc/CC-MAIN-20220527112418-20220527142418-00729.warc.gz
CC-MAIN-2022-21
677
8
https://medium.com/@teamprobably/inctf-quals-fd59b58a6a4d
code
InCTF Quals : The savory kick-start of a roller-coaster journey. In our last blog, we discussed what capture the flag competitions are and how to get started with CTFs. In this blog, we will discuss about our experience of the online qualifiers of InCTF. If you’ve missed the Intro to CTF and it’s types(Jeopardy and A-D style) check out our previous blog Part 1/4. Our very first experience of a CTF was awarded to us by one of our professors, Mrs. Anooja Joy who is an alumni of Amrita Vishwa Vidyapeeth University. InCTF is India’s premier annual CTF organised by team bi0s, Amrita University. The competition consists of two stages. The first stage is an online qualifier round, which is a jeopardy style CTF. Teams that stood in the top 30 in the qualifiers are invited for the onsite Attack and Defence style CTF. The qualifier round The qualifier round was held on 6th and 7th of December 2018 for a period of 36 hours, in which 100+ teams from all over India competed against one another. The problems were divided into five categories namely Web, Crypto, Pwn, Reverse Engineering(RE) and Forensics. The key aspect of cracking any challenge is to understand the main parts of the source code or executable provided. Since this was the qualifier round, the challenges could be solved with a few basic tools such as md5 cracker, a disassembler (radare/IDA/ Hopper), hex-editors, binwalk, sound analyzer, etc. More important than the various tools, is having a basic understanding of various concepts such as different ciphers (XOR, RSA, AES, etc.), buffer overflows, steganography and SQL injection. A few tips and tricks for cracking web challenges: - Analyze the page using Wappalyzer: It gives us a basic idea of the technologies used in frontend and backend. - Check the source code for all the hints or comments using the developer tools tab. - Check if the program is server-side or local. - If necessary, use dirsearch or dirbuster to crawl over all the directories. Some special webpages could be /.git, /.passwd, /.robots. - Sometimes a clue could be hidden in the response header. A few tips and tricks for cracking crypto challenges: - First of all, identify the encoding of the crypto. - Try out the standard stream ciphers. (ROT13, XOR, Caeser, Vigenere, Substitution) Online Tool - Check for hints in the source code to identify the cipher. - Run various inputs to identify how the output changes based on the inputs. - The size of the key and the ciphertext can help in identifying the type of encryption and exploit to be used. - Check for known exploit Link A few tips and tricks for cracking pwn/RE challenges: - Using the file command check whether the file is stripped, non-stripped, static and dynamic linked. - Next, run the strings command and if you’re lucky then you’ll find the answer right here. - If you’re not lucky, then you’re in for a frustrating treat. - Run the executable file multiple times with different inputs and understand all the functionalities. - Check if you can cause a segmentation fault. - Disassemble the code using GDB for ELF files and IDA for .exe file. - Analyze the assembly code using R2/Hopper. A few tips and tricks for cracking forensics challenges: - In forensics, a common practice is to encapsulate multiple files in each other, so the following commands will help you to find the files and analyze them: binwalk -Mre <file_name> - For analyzing the files, stegano tools, hex editors, file signatures, sound analyzers can be used. To check out the contest details, Click Here Finally, after a frustrating 24 hours and refreshing the scoreboard a million times (it was literally on auto-refresh 😉), at the stroke of 7 pm on 7th December we stood 7th and qualified for the on-site final round at the Amrita Vishwa Vidyapeeth University, Kerala, which was going to be an attack & defense challenge. If you are hooked up to our story then the next part of our journey is a must watch….. go to Part 3/4 to live the moments we had.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647639.37/warc/CC-MAIN-20230601074606-20230601104606-00037.warc.gz
CC-MAIN-2023-23
4,011
36
https://us2.campaign-archive.com/?u=ba834c562d82d9aba5eaf90ba&id=f58b830d28
code
Implementing Raft using a functional effect system What could be a better case study for concurrent programming than implementing the Raft consensus algorithm? Hopefully, you didn't come up with too many answers to that question as that's what we are going to explore! Adam Warski (@adamwarski) Reactive Event Sourcing benchmarks, part 1: PostgreSQL It's time to validate the performance of an Event Sourcing application in several different business scenarios and hardware configurations. Andrzej Ludwikowski (@aludwikowski)
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00080.warc.gz
CC-MAIN-2023-06
525
6
https://hyperverge.co/
code
Highest accuracy AI solutions. Implemented at scale. The HyperVerge Fintech Platform consists of Digital KYC+, Dedupe Fraud Check, Data Verification, Credit Scoring, and Contract Verification. With over 280 million customers onboarded in 2019, it's the natural pick for future focussed fintech companies and transformation focussed enterprises. The HyperVerge Geospatial Platform takes satellite and aerial images and uses AI to identify objects of interest and detect changes with the highest accuracies. It converts petabytes of data into actionable insights in tactically relevant times.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306335.77/warc/CC-MAIN-20220128182552-20220128212552-00458.warc.gz
CC-MAIN-2022-05
590
3
https://jussiroine.com/2019/06/learning-quickly-as-a-consultant-efficient-learning-strategies/
code
In my role as an architect, I’m often faced with limited time, scarce resources, and considerable expectations on how I deliver my services. It isn’t uncommon that within a single day working with a customer we work through - Microsoft Teams implementation - Azure AD security settings - Office ProPlus rollout strategies - Fixing a legacy script Perhaps this is also my handicap – I refuse to say “No, that’s somebody else who works on that” when I have a customer in need. Admittedly I’m also very transparent and open about things I don’t know enough to justify charging for my services – Dynamics 365 CRM comes to mind, as an example. Sure, I can do creative googling but it’s haphazard and only results in novice and hacky solutions that a real Business Apps professional would laugh at. I feel it’s about bringing balance into what you know, what you know enough about, and what you can learn quickly with enough confidence to deliver a service on. I’m also often pressed for time. On Monday I might deliver a full-day workshop on Azure strategies and security. This results in additional homework and tasks to complete by Wednesday – but on Tuesday I’ve already sold to another customer. As these tasks often entail additional research it means I need to be swift and efficient in finding solutions, as time is limited to only a few hours Monday or Tuesday evening. Some colleagues I know are masters in planning their weeks. Instead of selling Monday and Tuesday, they sell Monday and reserve Tuesday for said tasks and deliverables. Then they sell Friday for another customer, in the case, Wednesday brings in additional work for Thursday. Perhaps I will get there someday. As I’ve had this modus operandi for as long as I can remember, I’m very used to it. People sometimes ask me how I go about learning things – especially when pressed for time. Here are the three things I follow routinely and they work very, very well. Use fresh training material and content I have a paid subscription to Pluralsight and Linkedin Learning. I rarely have time to sit down and focus on training for hours. In situations when I know I need to know as much as I can about a given topic – say Azure Data Lake Services (ADLS) – I search for all fresh content from Pluralsight and Linkedin Learning. Linkedin lists 53 and Pluralsight lists about 10 courses on ADLS. I dedicate about 30 minutes to skim through them – skip through author intros, and get to the essence of it. I often speed up replay speed to 1.5X just to save an additional 10 minutes. Next, I check Microsoft Docs on the topic and start with Overview. A fantastic feature of this service is ‘Download PDF’ that generates a PDF file for all content of a selected topic. For ADLS, this produces a massive 1111 page document, which I’m not going too read – too busy, I tell myself. Instead, I push the PDF to my Kindle device (conveniently through email, which I’ve automatized with Microsoft Flow). This is for future reference, more on that in a bit. I still skim through the Overview and try to form a mental understanding of the landscape – how much depth is there to this service? What seems like a challenging topic? How can I quickly get started? Often I get a sense of how things might be when working with a service in a customer project. Microsoft Docs reveals a lot about the maturity of the service also. Finally, I do a quick Google search with creative keywords, such as “Azure Data Lake” +Gen2 and then I filter for results from the past month. This approach intelligently gives me great blog posts and highlights that are recent, fresh and often very relevant. I don’t read them all but open 10-15 tabs and eye them through. Quickly, of course. Build it rapidly Next, it’s time to get building something! There is no substitute for actually building something yourself as you’ll inevitably hit all sorts of problems and challenges, and it’s best to face these on your own time, and not on customer’s dime. In the case of ADLS, I already have a vague idea of how I can provision the service because I haphazardly read the getting started guidance on Microsoft Docs. There is often a Quick Start hands-on section that I try to reproduce in my own Azure subscription. This usually takes only 10 to 20 minutes. I try to read what the intention is and to avoid the extraneous effort that isn’t relevant – such as copy-pasting dozens of lines of HTML to produce a sample page. A simple <h1>Hello, world</h1> will do. In Azure, I always create a new Resource Group with a “-deleteme” as a suffix. This is my simplistic way of removing assets I no longer need and it’s easy to perform automated cleanups every Sunday night. The purpose of building something that sort of works is that I have something to show for the next time I meet with my customer. “Okay, here’s how it works” style and it’s a great workbench for prototyping customer asks and wishes. When provisioning services I try to be creative and come up with a new way of using a service or technology. In the case of ADLS I pushed my health data from the Oura smart-ring to Azure and analyzed that. It also gives a nice, personal twist should I perform a demo as part of a project meeting or training. And as I deviate just a little bit from the Quick Start I inevitably hit problems, questions, and challenges – and learn continuously how to solve those. Check the slides and demos Last, but certainly not least, I need to have more theory in my head. By now I know enough about a given service – such as ADLS – and I’ve built something that maybe works, and is useful as a testbed. But I lack severely on theory and in my deeper understanding. For this, I rely heavily on Microsoft Ignite and Build content. I don’t use other people’s slides – as that would be unprofessional – but I read through them. Here’s how it works — I download the latest Ignite and Build slides to my Dropbox. I don’t bother with recordings, just the PowerPoint files. Currently, I’m sitting with 1,500 slide decks. It’s trivial now to research what I need to learn by doing old-school search: C:\Dropbox\Conf>dir "*Data Lake*" /b BRK3326 - Azure Data Lake Storage Gen 2- Enhancing big data analytics on Azure.pptx C:\Dropbox\Conf>dir "*Analytics*" /b BRK1038 - MyAnalytics- Help employees thrive with AI and productivity insights in Office 365.pptx BRK1084 - Data Science for Good- Tackling homelessness in London with analytics.pptx BRK2015 - Get the most value for your IT investment with Microsoft 365 usage analytics.pptx BRK2077 - Workplace Analytics & MyAnalytics- A review of data privacy and GDPR compliance.pptx BRK2107 - Workplace Analytics and MyAnalytics- Transform productivity with collaboration insights from Office 365.pptx BRK2371 - Gaining deeper insights from big data using open source analytics on Azure HDInsight.pptx BRK2417 - What’s new in Windows Analytics- An introduction to Desktop Analytics.pptx And if this isn’t enough I use Search in Windows 10 to search file contents as well – keyword being ADLS or “Data Lake” in this instance. BRK3326 in the above listing is the most relevant for me – so I quickly check through that, and there’s often a massive trove of additional treasures to continue to. I live by this method and I’ve found it helps me to withstand the insatiable voice in my head telling me to fear the things I don’t know enough about, or I’ve yet to learn more about. By no means do I spend every evening studying and learning like this, but during the busiest weeks, it tends to be like that. And I find it’s comforting to rapidly learn about new and exciting things without needing to worry if you know enough.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00713.warc.gz
CC-MAIN-2023-50
7,795
29
https://www.mtlblog.com/how-to-survive-a-moose-attack
code
How To Survive A Moose Attack Whenever stereotypes about Canada come up, the moose is right there at the forefront along with hockey, mounties and maple syrup. The only problem is that moose are usually portrayed as gentle giants. Like a big cow with antlers. But in reality moose can be very dangerous, and not just when you hit one with your car. READ ALSO: How To Open A St-Hubert Box Without Using Scissors They aren't naturally aggressive but they also aren't afraid of humans so they won't avoid you like most animals would. If they are either provoked, protecting their young, hungry, or looking to mate, they can be extremely deadly. So if you do see a moose, stay as far away as possible, do not feed them, and most importantly, never get in between a mother and her calf. Although they can attack without warning, here are the signs you should be on the lookout for: The moose stops eating and starts starring at you. The moose smacks lips and clicks teeth or whips head around. The moose starts walking towards you. The moose starts peeing - Moose looks like this: You've done all you can, but guess what? That moose still wants to the kill the crap out of you, just for fun! It starts charging towards you. Here's what to do: Assuming you don't have a gun to kill the moose before it kills you, your first option is to run. That didn't work? Uh Oh! 2. Stand behind a tree, rock, car or building. There's nothing to hide behind? Uh Oh! 3. Curl up into a ball You're being attacked? Uh Oh! You're pretty much screwed. Your only hope is to curl into a ball to protect your vital organs. 4. Stay Down Do not move until the moose is long gone, if you get up he'll come back to finish you off. They tend to hold grudges.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945279.63/warc/CC-MAIN-20230324082226-20230324112226-00086.warc.gz
CC-MAIN-2023-14
1,726
20
http://www.os2ezine.com/v3n03/hpp.htm
code
In the world of web design, there are two types of web designers: those who feel comfortable coding a site by hand, and those who don't. Those who do have an innate advantage over the rest of us: somehow, they can visualize how the site they are working on will ultimately look, while the rest of us simply see many lines of text. While there have been graphical web design tools available on the Windows and Mac markets for a while, most of these tools won't let you configure and customize your code to the degree that doing it from scratch will. In most cases, when you move from handwritten code to graphically-assisted HTML design tools, you sacrifice a lot of the control of your site in order to make everything faster and easier to manage. HomePage Publisher is an impressive bridge between hand-coding and graphical web design tools. It gives you a very complete WYSIWYG (What You See Is What You Get) interface (GIF, 20.4k) as you build your site, but it also gives you a lot of control over the specific settings of each tag. In fact, the degree of control is so high that it helps if you have some familiarity with HTML and the different tag settings before you start using the application. If you have a moderate level of familiarity with the HTML 3.2 specification, and you're a visually-oriented person who prefers seeing what they're building as they build it, HomePage Publisher will be a fine addition to your web design toolbox. As befits a WYSIWYG design application, on first glance (GIF, 32k) HomePage Publisher might look more like a simple word processing application than it would a web design tool. It's set up with the standard two-row button bars at the top of the page, containing all the common tools you'd expect in a word processing app. Along with a set of font and font control tools (you can choose between serif and sans serif typefaces), you also have single-click access to the bold, underline, and italic effects. Also on the toolbars are standard cut/copy/paste and undo/redo keys -- HomePage Publisher gives you unlimited undo capability, a feature so useful I can't possibly do it justice. HomePage Publisher is not a word processor, however, it is a web design tool; along with these standard tools, the button bars include HTML-specific tags. With the click of a single button you can define a word or a line of text as a hyperlink, insert a GIF or JPEG image, or even insert a web plug-in or Java applet. These toolbars are also customizable to a limited degree: you can add buttons to them, swap buttons between bars, even change their default positions (so they appear on the bottom of the screen, floating outside the application, or docked to the right- or left-hand side). HomePage Publisher's work area displays your page-in-progress very accurately. In previous versions of this application, there was a disparity between the size of "standard" text on HPP and on some PC-based browsers -- HPP defaulted to 10 points and Netscape, for example, defaulted to 12. In the latest update (2.0C) this has been made a configurable setting: you can now specify the default font size to be either 10 or 12 points. HomePage Publisher can define almost any part of the HTML 3.2 specification -- even some that current OS/2 browsers can't display. For example, HPP allows you to define certain text as being displayed in certain typefaces (currently, only Times New Roman, Helvetica, and Arial typefaces are supported) even though Netscape/2 and WebExplorer will only display a default typeface for all of its text. The DTCWeb site that I maintain makes heavy use of this feature, though at the moment no one can really tell unless they're using a browser from another operating system. If you are familiar with the HTML spec and how each tag can be defined, HPP can speed your ability to change the properties of a tag. Double-clicking the work area activates the Extended Settings dialog box, a region that appears just below the menu area and allows you to "fine tune" the settings of whatever tag you're working on at the time. The Extended Settings area is very useful if you know what you're doing (and if you don't know what you're doing, the Extended Settings area is a great way to learn the finer points of HTML tags.) In fact, I would go so far as to say this is the single most powerful feature in the entire application. This area allows you, for example, to set the ALTernate text for a graphic very easily, or to change its dimensions (make it larger or smaller) as you see fit. The Extended Settings area automatically changes to reflect whatever element of the web page you're working on at the time. It's most valuable when working with tables, since not only the overall table but each row and even each cell can be configured separately from each other. With the release of version 2, HomePage Publisher also gave you the ability to work with frames. HPP allows you to view both the <FRAMES> and <NOFRAMES> areas of your site without any fuss, so updating both areas is a relatively painless process. There are some kinks in this tool, however -- for example, I've found when I first create frames on a page I'm unable to actually add anything to the frames themselves until I create files for them containing basic HTML header and body tags. Some people who are more familiar with HTML code may find it more convenient to prepare your frames pages before actually working with them in HomePage Publisher, at least until it's been developed a little further. While HomePage Publisher is intended to be a visual layout tool for web page design, it does allow you to view the source code (GIF, 9k), and with the most recent update (2.0C) it allows you to format that code as well. A settings box allows you to specify how you would like the code to appear (all lower case, mixed case, all upper case) and gives you a list of formatting options you can choose to either turn on or turn off. There are times when viewing source code is the most efficient way of getting something done (for example, inserting a Link Exchange banner) and these features can help you find your place a little more quickly. It's impractical to list every feature HPP has. Suffice to say that it covers most of the HTML 3.2 specification, but none of the "cutting edge" HTML 4.0 specification (no layers, no cascading style sheets) at this point in time. My machine isn't a good baseline for measuring application speed, but I've heard reports that it can be sluggish on anything lower than a Pentium on the PC food chain. There are a few other concerns, however, that you need to keep in mind when working on this program. HomePage Publisher uses some aspects of OS/2's video display system that some drivers don't much like to interact with. I discovered this when displaying 16 million colors on my Matrox Millennium II card at 1280x1024. This specific color depth and resolution would cause my system to freeze up when some web pages were displayed in HPP. Strangely enough, this only occurred at that resolution/color depth, and only on Warp 4 machines. Switching to a 64k color depth got around the problem and I'm told that Matrox has been informed of the problem and is looking into it. (It is unclear as to whether or not IBM's GRADD drivers overcome this issue, because I've yet to successfully get the GRADD drivers to display 1280x1024 at 16 million colors). Also, some video cards won't display backgrounds correctly, instead causing the toolbar and work area to take on a pink hue and to corrupt the mouse pointer. Because of this problem the ability to view backgrounds is disabled by default (if your video card is not affected by this problem, there are instructions in the help files on how to enable the feature). Again, my Matrox card had this problem, and I'm told Matrox is looking into this as well. The IBM GRADD drivers do solve this problem, so if you're willing to live with a beta display driver you might want to consider using them as a work-around solution. There are a few other performance quirks when using this program. When you're typing on a blank page, and the text exceeds the space in the work area, the work area will not "scroll down" to let you see what you're doing. In fact, you'll need to save the page and reload it in order for scroll bars to appear at all. The documentation and end-user support for this application is nothing short of impressive. HomePage Publisher has one of the most complete online help menus I've seen for any shareware application -- only Electronic Teller's is as thorough and as helpful. This application is also actively supported by its author. He seems genuinely interested in receiving feedback (both positive and negative) from people who use the program, and has incorporated end-user feature requests into program updates. A new version update seems to come out every one to three months, fixing a bug here, adding a feature there, and giving the overall impression of a program that is always being refined and supported. If you're a purist who believes the best way to design a web site is to do it by hand, you probably won't like the features HomePage Publisher provides -- but even you may be (grudgingly) impressed with the quality of the HTML code HPP produces. While a WYSIWYG editor will probably never be able to match the optimization that can be achieved by hand-coding the site, HomePage Publisher is pretty good at not leaving extraneous tags hanging about, and it gets better with every release. HomePage Publisher is an excellent web page design tool, but the price tag is a little hefty -- US$90 is the price of many shrink-wrapped, over-the-counter web design tools, and it's surprising to see a shareware application with a price that high. HomePage Publisher can go head-to-head, feature-wise, with most of those applications, however, and I have found it worth the price. For those of you who are willing to go without frames support, a stripped-down version is available for $45; a more affordable solution for novices and hobbyists who just want to be able to see what they're doing as they build web sites for their own enjoyment. If you're looking for a WYSIWIG design environment for your web work, and you'd like to use an application that is well-supported by its author, HomePage Publisher is an excellent choice. Strongly recommended. HomePage Publisher 2.0, level C Christopher B. Wright is a technical writer in the Richmond, VA area, and has been using OS/2 Warp since January 95. He is also a member of Team OS/2. |Copyright © 1998 - Falcon Networking
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00653.warc.gz
CC-MAIN-2024-10
10,602
25
https://www.valueyourmusic.com/items/133954822284-small-faces-the-autumn-stone-lp-album-uk-1986-reissue-compilation-gatefold-nm
code
Find out the value of a Vinyl Record, CD, or Cassette, etc. Search within our Price Guide of Sold Auctions Vinyl: Small Faces – The Autumn Stone LP Album UK 1986 Reissue Compilation Gatefold NM 13 Dec 2021 06 Dec 2021 Is this information accurate? Is this Item a Fake or Counterfeit?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948871.42/warc/CC-MAIN-20230328201715-20230328231715-00145.warc.gz
CC-MAIN-2023-14
285
6
https://rubygems.org/gems?letter=B&page=131
code
BRM Event logging client library Retrieve up to 100 stock quotes per query with the following variables - symbol, pretty... Ruby event logger for the BRM real-time analytics and BI solution self assembling fabric of ruby daemons brnumeros é uma das gems que compoem o Brazilian Rails Write a longer description. Optional. Ruby implementation of 37signal's Campfire API. Ruby wrapper for Broadbandmap.gov api A broadcasting microframework making publishing of messages to different services easy Library tht returns the beginning and ending Gregorian (civil) dates for months in the ... broadcast-objects is a small gem that enables mass communication between objects. While... Broadstreet API Wrapper Pluggable, portable, framework-friendly static site generator. Setting the Stage for th... Generates barcodes for Rails ActiveRecord models. Gem to manipulate FABOS based devices Interface for the Bro Intrusion Detection System. A Rack application for serving static sites with ERB templates. Test Minefold funpacks supports to build Docker Container with VERSION Brocktail is a Ruby wrapper for Blocktail API v1 Natural language processing. simple way to load erb yaml config files. based upon http://railscasts.com/episodes/85-... Rails gem/plugin that implements an ActiveRecord validation helper called validates_as_... A tunable work queue, designed to coordinate work between a producer and a pool of work... Bro! Broham always knows where his bros are, bro. Using broham, a newly-created cloud m... Ruby Gem for Parsing Bro IDS DNS Logs Ruby Gem for Parsing Bro IDS HTTP Logs My personal Ruby boilerplate Simple Ruby library to interact with Paymentwall's Brick API Detects ActiveRecord models that are not valid.
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042982013.25/warc/CC-MAIN-20150728002302-00067-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
1,722
30
https://www.iimjobs.com/j/application-security-tester-bfs-3-10-yrs-1137838.html?ref=kp
code
Senior HR Consultant at Skillventory Views:18 Applications:7 Rec. Actions:Recruiter Actions:1 Application Security Tester - BFS (3-10 yrs) Application Security Tester - Implementing, Administration, Running, troubleshooting HCL Appscan products: SAST(Static Application Security Testing), DAST(Dynamic Application Security Testing) and IAST (Interactive application security testing) in AppScan using Appscan External device testing using Appscan. - Align with the solutions team to understand new project demand and proposed solutions. - Perform False Positive Analysis and report to the stakeholders. - Define automated security testing workflow for new & existing applications. - Running Vulnerability assessment on Web application, Mobile and source code. - Work effectively with a cross-functional team to plan, execute, and communicate findings from AppScan. - Analyzing tool results, Manual review, remediation support. - Basic understanding of Penetration Testing, Application Security Audits, Risk assessments, Security Testing (Optional). - Resources should have excellent good communication skills presentation skills. - Resource should be able to work on the task independently Identifying and automating manual processes. - Maintaining technical documentation. - Supporting a 24x7 online environment. Required Skills & Education: - 3+ years of experience working as an Application Security Tester. - Knowledge of SDLC. - Knowledge of Security Standards, frameworks and groups OWASP. - Experience in running administrating static analysis SAST and dynamic analysis DAST tools. - Experience as a Developer or QA tester is preferred. - Development background in Net, Java, and/or Python a plus.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334596.27/warc/CC-MAIN-20220925193816-20220925223816-00552.warc.gz
CC-MAIN-2022-40
1,704
23
http://www.bankrollmob.com/forum.asp?mode=thread&id=281493
code
Joined: Dec '11 Age: 28 (M) players like Tom Dwan, Phil Ivey, Daniel Negreanu, Jason Mercier, Vanessa Selbst.. etc are a must watch for every poker player :o) and sorry if i forgot some new star, im not really watching the scene closely, but these players i know and watched many times. They are great Joined: Apr '09 Age: 38 (M) We don’t know if this was for invitation, an agreement or if James Dempsey was already trying for a while to enter this team. What matters is that all of them now wears the same colors in the shirt, and the symbol on it is enough to scare some of the less pro opponents when going for live events. Although Dempsey is a very good player and very well known for his way of playing, he will have to do a lot to turn into “one of the guys”. I mean, he is already on the team, but he’s still different from Greg Merson and Patrick Antonius, just to mention two.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676595531.70/warc/CC-MAIN-20180723071245-20180723091245-00056.warc.gz
CC-MAIN-2018-30
895
6
http://writers.stackexchange.com/questions/tagged/fantasy+philosophy
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Fantasy writing and Personal Philosophy [closed] I've been writing (and re-writing) something for a good number of years. In the development of the story, it kind of felt like I was finding myself. In this, I feel that the fantasy world I've created ... May 11 '12 at 2:44 Matthew Paul Chapdelaine newest fantasy philosophy questions feed Hot Network Questions Why doesn't all motors burn up instantly? Newcommand: What cannot be done? Why should sentences not start with "there is" or "there are"? Why does a candle blows out when we blow at it? Our breath is also 16% oxygen and only 4% CO2 Was Ezekiel a descendent of Zadok? Is shutdown.exe necessary to shutdown Windows? 4, 8, 15, 16, 23, 42 How can I respond to "Why shouldn't we hire you?" Crafting in the Wilderness When I stretch a rubber band, it breaks. When I hold the broken ends together, why doesn't it join again? Can you be sent on a quest or does it then become a mission? Alternative ways to say "I cannot answer that question"? From Whence do we derive that Jews must span the political spectrum? A reliable foundation from which to understand what "key" really means Why are commercial flights not equipped with parachutes? How to make a tabularx table on more then one page by using the table environment Follow appends to a file in real time (Windows equivalent of less F) Why are vote buttons on Stack Exchange shown when they can't be used? Filling div using letter-spacing A coworker beat me to resignation. How can I resign in a professional manner? Can sudo be reinstalled after being removed? Which application does the vi command open? Unable to modify the volume with the keyboard Virus scanner on server more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Overflow Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678700883/warc/CC-MAIN-20140313024500-00003-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
2,322
53
https://academy.pega.com/topic/cascading-approvals-authority-matrix/v1/in/2071
code
Cascading approvals with an authority matrix There are two cascading approval models:and . A cascading approval based on an authority matrix is more flexible than a reporting structure. You use the authority matrix model when configuring a process that requires approvals from multiple entities, with at least one entity outside of the reporting structure. A set of rules directs the approval chain to entities outside of the reporting structure, within and external to the user's organization. An expense report that requires approvals outside of the reporting hierarchy (for example, to accounts payable) uses an authority matrix model. In center of the following image, slide the vertical line to see the comparison of an authority matrix and reporting structure. Authority matrix data structure population A cascading approval with an authority matrix requires the configuration of a data structure that identifies the approvers. The application queries the structure for each approval until the listed approvals are exhausted. Pega Platform™ provides several ways to populate the data structure. One common approach is to configure a decision table to identify the approval levels and corresponding parties. Pega Platform parses the list to populate the data structure. Note: A data page, activity, or data transform can also be used to populate the reporting structure. Following the previous example, an application uses an authority matrix to manage expense report approvals. The decision table identifies each party in the approval process as well as the conditions that determine when each party must provide approval. The matrix contains three conditions based on the expense amount. The fourth condition states that Accounts Payable must approve any billable expense. The application evaluates the decision table. Each satisfied row or condition adds the results to a list of approvers. Approval assignments are routed to approvers in the order of list appearance. Tip: When using a decision table with an authority matrix, set the decision table to Evaluate all rows to return a list of results. Otherwise, the decision table returns only one result. If a consultant submits an expense report for USD700 that includes billable time, the application creates an authority matrix with three approvals: Accounts Payable, the manager of the consultant, and the director who oversees the consulting department. Check your knowledge with the following interaction.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476413.82/warc/CC-MAIN-20240304033910-20240304063910-00746.warc.gz
CC-MAIN-2024-10
2,472
14
https://sources.debian.org/src/wicd/1.7.4+tb2-6/INSTALL/
code
Installation of Wicd should be done using your distribution package if one exists. If not, the installation is relatively straightforward, but there are a few dependencies: 1. python (>=2.4, <3.0) 2. pygtk (>=2.10) 2. dbus and its glib and python bindings 3. a dhcp client (dhclient, dhcpcd, and pump are supported) 4. wireless-tools (iwlist, iwconfig, etcetera) 5. net-tools (ip, route, etcetera) 6. a graphical sudo application (gksu, kdesu, and ktsuss are supported), while optional, is strongly recommended 7. urwid (if you want to use the curses client - needs version >=0.9.8.3) 8. pm-utils (optional for suspend/resume integration) Wicd supports using versions >=1.2.4 -- earlier versions may work just fine, but they are completely unsupported here. 11. python-appindicator if you want the Unity-compatible appindicator notifications Next, configure Wicd for installation. Wicd will, by default, follow the FHS guidelines <http://www.pathname.com/fhs/> (or distribution standards where applicable if we know about them and it's feasible to implement them). You can specify exactly where every non-Python file (and some Python files) in Wicd will be placed. Pass "--help" as an option to the following command for more information, otherwise run it as is to configure Wicd for installation. python setup.py configure Note that setup.py will try to determine if and where to install the autostart desktop file for kde (either kde3 or kde4, but not both) and where to install the sleep hook for pm-utils. If you want native language translations, please remember to run: python setup.py compile_translations before the next step. Finally, do the actual installation. This step will need to be done as root or with sudo in most cases: python setup.py install If you are packaging Wicd, you will almost surely want to use the "--root" option; for example: python setup.py install --root=/package-dir To uninstall, you can use (using root or sudo): python setup.py uninstall You *MUST* run "python setup.py configure" before "python setup.py install" - the "configure" step generates wpath.py from wpath.py.in using the paths specified from the arguments to "python setup.py configure". As noted above in the configure step, "python setup.py configure" will use acceptable defaults, so it is usually not necessary to specify any arguments After installation, especially if Wicd has not been installed before, you will probably need to restart the system message bus (dbus) or reload its configuration. You will also need to make sure the Wicd init script is started at boot. How to do those things is distribution-dependent, so if you're not sure, ask in your distribution's support area(s).
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668954.85/warc/CC-MAIN-20191117115233-20191117143233-00532.warc.gz
CC-MAIN-2019-47
2,693
47
http://familywoodworking.org/forums/showthread.php?2590-First-hello-and-chisel-question
code
First Nick, Welcome to the Family!!! I'm in Japan, so I use Japanese Chisels, I buy them used (read CHEAP) and bring them back to life, they have treated me very well. The Japanese chisels are meant to be pounded on, buy design, they even use a steel hammer, no wimpy wooden mallet stuff here I don't do a lot of exotic hard woods, so I don't know about that part of the question, sorry. I'd have to check to see what I grind them at, but it is nothing special, just the basic angle........... The pessimist complains about the wind; the optimist expects it to change; the realist adjusts the sails. William Arthur Ward
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660760.0/warc/CC-MAIN-20160924173740-00215-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
619
7
https://oldforums.eveonline.com/?a=topic&threadID=1524224
code
Posted - 2011.06.07 21:16:00 - [1 Edited by: Caldarian Commander on 07/06/2011 21:29:12 This is simply a scam-free, spam free Jita local Scammer's and Spammer's are NOT Tolerated, You WILL Be BLOCKED FOREVER. 1. - Scammer's will be blocked out of channel on-sight forever 2. - Spammer's will be sent a Eve-Mail stating they have Spammed. If they DO NOT stop they will have the same fate as Scammers 3. - No spamming Profanity, Obscene, or X-large messages (Try to keep your message somewhat small), You will go through the same process as Rule 2. This channel is supossed to just like local, you can talk, chat, flame, work out deals, whatever, just follow the 3 rules above Hopefully this channel will keep your block list from growing too large :) Channel Name: Jita Local 2 (No, this isn't another legit trading channel (Altho I fully support it, good channel to sell/buy stuff), This is Jita local without all the spams/scams to actually have decent conversations)
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532050.7/warc/CC-MAIN-20190421180010-20190421202010-00334.warc.gz
CC-MAIN-2019-18
968
11
https://groups.google.com/a/chromium.org/g/chrome-ux-report-announce/c/_DiKAAqqKPE
code
Hi CrUX users, This is your monthly announcement that the latest dataset has been published to BigQuery. The 202206 (June 2022) dataset is now available and it covers 16,230,572 origins, an increase of 47.2% over last month. Let’s take a look at origins' Core Web Vitals performance this month: 54.9% of origins had good LCP 94.3% of origins had good FID 72.3% of origins had good CLS 41.3% of origins had good LCP, FID, and CLS As mentioned in the release notes for the the previous month, the size increase of the dataset is due to including origins that were previously excluded because all dimensions (form factor and effective connection type) were required in the BigQuery schema; as we’ve made these dimensions optional, allowing for them to be NULL values in the BigQuery column, we instead report overall stats for origins that can’t be split in this way. That is, NULL in the effective_connection_type column stands for “all effective connection types” and NULL in the form_factor column stands for “all form factors”. We hope you enjoy the expanded coverage in this dataset as much as we do. The significantly extended coverage makes it so that naively comparing the percentage of origins in the bullet points above with the previous month is problematic. To see how origins on the internet are changing with respect to the Core Web Vitals metrics, it’s useful to segment the discussion by popularity of the origins. For the top 1k origins by rank magnitude (experimental.popularity.rank), we see 74.7% of origins with good LCP, 94.4% with good FID, 68.4% with good CLS and 53.2% with good LCP, FID, and CLS; so there’s an overall improvement compared to the prior month, with LCP improving most. It’s similar for the top 10k, for which we see both LCP and CLS improvements. The less popular segments of the web have the most churn in our dataset relative to the prior months, so a comparison is not useful at this moment. We’ll look at the trends again next month when we expect the dataset to remain more stable. If you have any questions about CrUX, feel free to reach out to us on any of these channels: chrome-ux-report on Google Groups @ChromeUXReport on Twitter questions tagged with chrome-ux-report on StackOverflow GoogleChrome/CrUX on GitHub Johannes and Rick
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817033.56/warc/CC-MAIN-20240415205332-20240415235332-00193.warc.gz
CC-MAIN-2024-18
2,303
16
https://videogamehype.com/gaming/a-new-switch-controller-may-be-coming-based-on-fcc-filing-n64-coming-to-nso/
code
A new FCC filing suggests that a new Switch controller is coming soon! Plus, rumors have been going around of Nintendo 64 titles coming to Nintendo Switch Online. Video by: Tris Valbuena Thumbnail by: Tom Arnold ➤ TIKTOK: https://www.tiktok.com/@gamexplain ➤ PATREON: https://www.patreon.com/GameXplain ➤ TWITTER: https://twitter.com/GameXplain ➤ INSTAGRAM: https://www.instagram.com/gamexplain_official ➤ TWITCH: https://www.twitch.com/GameXplain
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303747.41/warc/CC-MAIN-20220122043216-20220122073216-00711.warc.gz
CC-MAIN-2022-05
457
8
https://www.gamedev.net/profile/271124-godofpen/
code
I really agree with HTML based UI solution, too. I think Mr. @Shaarigan provide a really good point of view for this solution. And it will be much suitable if you already have a JS based script system because it will be much easier for dealing with UI and background logic instead of a string-based event handler. I want to add a little more information for Unreal. Unreal engine 3 mixed a lot of technologies for UI. However, for Unreal Engine 4, it used a totally self-written UI framework called Slate which is rendered by Unreal engine's own rendering system. This UI framework also used in the games with a higher abstract called UMG. UMG can be edited by a visual editor but Slate cannot. Actually, the UI solution for your engine is based on a lot of things. Some of them are: What's your engine for? Is it a generic engine or just internal usage or just personal? Does your game need a complex editor? What's your team's background? Could they handle a large UI framework's development or they just want to reuse existed framework? Do they think it is valuable for a complex editing system? Or they think an in-game editor is enough? We can provide our own ideas. But the best solution can only be determined by yourself based on your own situation.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575515.93/warc/CC-MAIN-20190922135356-20190922161356-00253.warc.gz
CC-MAIN-2019-39
1,257
10
https://www.tr.freelancer.com/projects/mobile-phone-android/write-android-download-application/
code
Make a download android application,better use download manager. Extend the app so that one can schedule a download for later, meaning that one can enter a URL and the app starts this download automatically as soon as a Wifi connection becomes available. Make sure download does not occupy the UI thread, even just to wait for download. Extend the app so that it provides a robust download function: the file should be correctly downloaded even if the network connection is temporarily disconnected or if the network changes. To test this, - Start the download on WiFi and walk out the door until the connection switches off. Make sure the file is correctly downloaded. - Change to a different WiFi network and move your phone / laptop to another location/network during the download (e.g., home to school). Again, make sure the file is correctly downloaded. - Make every step visible for the user. For example, user should be aware when WiFi connection is down or the WiFi network is changed. Ensure that a part of a file that has been downloaded before the network disruption does not need to be downloaded again. Show the download progress and percentage on the [url removed, login to view] the latency (time until first byte is received) and the throughput (bytes/sec) for each 10 second interval. 8 freelancers are bidding on average $261 for this job Hi, My name is Davide and I'm Android developer with a lot of experience. I'm interested in this project and I have experience in similar projects. Contact me to talk about it in private. Regards Davide
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814036.49/warc/CC-MAIN-20180222061730-20180222081730-00467.warc.gz
CC-MAIN-2018-09
1,559
9
https://wiki.makerspacenanaimo.org/Wall_Colour_Clock
code
Wall Colour Clock From Makerspace Nanaimo All that you really have to remember is: - The sequence in time is Red, Green, Yellow, Blue; - That all four of these colours may appear in the top row, but only the first three may appear on the bottom (there is one all-blue test pattern, but that's done by setting a specific invalid time); - The left-most pair code the hour and the right-most pair code the minutes, with a five minute resolution. Some easy times to remember? - 12:00 (noon or midnight) is all red; - 4:20 is all green (lol); - 8:40 is all yellow; - 9:45 is both columns with blue on top and red on the bottom. To get you thinking about the combinations: - how many possible combinations are there? (Hint: a gross answer!) - how many combinations with only one colour showing? (Hint: see above) - how many times which only use at least one red and at least one green colour and no other colours are there (the Christmas combinations)? (no hints!)
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826715.45/warc/CC-MAIN-20181215035757-20181215061757-00492.warc.gz
CC-MAIN-2018-51
958
15
https://nyaa.si/view/1457772
code
![alt text](https://www.themoviedb.org/t/p/original/35hSIc7uTFbcuhYxOZqppNpGUFr.jpg "Poster") Alex Man plays a small time crook whose only friend is a young kid called Little monster, one day Little Monster is killed by a gangster who Works for Dragon head, Enraged, Alex teams up with a formidable police woman and A Japanese lady samurai, whose father was killed by Dragon head. Together the unlikely trio bring down Dragon's gang taking out all his men in the process. DVDrip. Chinese audio with English/Chinese subtitles. Requests? Feedback? Shit-talking? You can find me and my channel on the /m/subs discord! https://discord.gg/Ndtt32a5bX [Dodgy] The Dragon Fighter (1990) [DVD] [FA8F35F9].mkv (928.8 MiB)
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305494.6/warc/CC-MAIN-20220128104113-20220128134113-00297.warc.gz
CC-MAIN-2022-05
711
5
http://www.coderanch.com/t/597917/Web-Services/java/Consuming-secured-WCF-service
code
I am trying to consume secured WCF service. I am trying to consume it using Netbeans IDE. Its WSDL contains <X509Certificate> elements, which contains Base64 encoded certificate. I cropped this certificate into separate file and imported it into truststore. My client uses username and password authentication, so i filled in valid username and password and I refer to my truststore from WSDL file. BUt when I try to run my client, I got following exception: INFO: WSP5018: Loaded WSIT configuration from file: file:/C:/Users/belovic/Documents/NetBeansProjects/ETR3/build/classes/META-INF/wsit-client.xml. account info for cos1 15.11.2012 10:50:28 com.sun.xml.wss.impl.misc.DefaultCallbackHandler$X509CertificateValidatorImpl validate SEVERE: WSS1533: Validation of self signed certificate failed. 15.11.2012 10:50:28 com.sun.xml.wss.jaxws.impl.SecurityClientTube processRequest WARNING: Could not validate the the server certificate Here is relevant part of svc.xml document with reference to truststore
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398471436.90/warc/CC-MAIN-20151124205431-00076-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
1,004
9
https://wordpress.stackexchange.com/questions/244452/medoo-framework-in-wp-plugin
code
Is it ok to use medoo framework (http://medoo.in/) when devloping new plugin. or should I use WP_Query only? medoo and other similar libraries are generic, that is they are aimed at querying some database in general and the weight of figuring out necessary queries are on you as developer. WP_Query and other WP APIs that perform requests to database are much more specific. They already contain much of that logic, which allows you to express what you need in API calls, rather than SQL query or abstraction close to it. Related code in core implements enormous amount of SQL query generation with literally years of logic and performance optimizations. Overall for any WP development you have to use its APIs as much as possible, or you will have to waste incredible amount of time reinventing what they do. Though bringing your own database abstraction can certainly be beneficial for some use cases. For example if you plan to develop extension which will add and interact with its own database tables, rather than native WP data structures.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00275.warc.gz
CC-MAIN-2024-10
1,045
5
https://events.ie.edu/all-events/event/master-class-an-omnichannel-customer-journey-edition-1
code
Master Class: An Omnichannel Customer Journey Learn how to create an omnichannel strategy In today's hyper-connected world, companies should focus in the design of strategies that cater to mobile-empowered consumers with the freedom to interact through any and all available channels, wether online or offline. Brands must ensure to keep track of these consumers as they navigate a complicated mesh of advertising platforms, digital interfaces and in-store experiences. They expect these touchpoints to be coherent, and consistent one with another; moreover, they now demand hyper-personalization, a unique experience tailored to the idiosyncracies of their contexts. Connect to this Master Class to understand how modern omnichannel customer journeys are shaping marketing technologies, strategies and ultimately entire organizations.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653183.5/warc/CC-MAIN-20230606214755-20230607004755-00674.warc.gz
CC-MAIN-2023-23
835
4
https://meduza.io/en/news/2021/12/23/russia-fines-github-for-failing-to-delete-navalny-s-smart-vote-endorsements
code
- Share to or Russia fines GitHub for failing to delete Navalny’s ‘Smart Vote’ endorsements Moscow’s Tagansky District Court has fined GitHub 1 million rubles ($13,630) for failing to delete the list of “Smart Vote” endorsements uploaded by Alexey Navalny’s team ahead of the Russian State Duma elections in September. Russia’s censorship agency, Roskomnadzor, filed the administrative protocol against GitHub in early December over its failure to remove “prohibited content.” Roskomnadzor began putting increasing pressure on team Navalny’s online presence — including the “Smart Vote” initiative — in the summer of 2021. The censorship agency blocked Navalny’s website and more than 40 other online resources linked to his Anti-Corruption Foundation, citing an earlier court ruling that outlawed Navalny’s nonprofits and political network as “extremist organizations.” Under threat of sanctions and fines from the Russian regulator, Google and Apple pulled Navalny’s mobile application, which contained a “Smart Vote” function, from their app stores. Web pages containing “Smart Vote” endorsements were also blocked on YouTube and Google Docs. The protocol against GitHub for failing to delete “prohibited content” was drawn up under Russian Administrative Code Article 13.41, section 2, which stipulates fines for legal entities ranging from 800,000 rubles to 4 million rubles ($10,900–$54,560). Roskomnadzor has repeatedly pursued administrative cases against various online service providers under this article, writing up the likes of Google, Telegram, Facebook, and Twitter. According to Interfax, the total amount of fines handed down to all foreign companies subject to sanctions since the beginning of 2021 exceeds 200 million rubles ($2.7 million). - Share to or
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510575.93/warc/CC-MAIN-20230930014147-20230930044147-00244.warc.gz
CC-MAIN-2023-40
1,827
9
https://dba.stackexchange.com/questions/224298/what-are-the-requirements-for-sql-replication-on-azure-sql-db-managed-instance
code
We are seeing if it is feasible to setup Azure SQL DB Managed Instance (SQL MI) and an Azure VM with SSMS installed for this replication scenario: We have a vendor who needs access to our SQL Server database and can RDP into it for administration. We will be using ExpressRoute to link SQL MI to our on-prem. It seems the only way to connect to SQL MI is either using site-to-site VPN (vNet) or ExpressRoute. Our vendor needs to setup transactional replication to push data to our SQL MI which will be a subscriber. This link Replication with sql managed instance is the only guide I see but has no details. Does the vendor need a vNet/ExpressRoute connection to setup replication to our database? Or can they setup replication using our VM with SSMS client tools that is in our SQL MI vNet? If that is not possible, then I guess we need to setup the Azure VM with SQL Server and they connect to that instance to replicate. Then we need to replicate that db to the Azure SQL DB MI. This seems complicated and wonder what other options are there.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657131734.89/warc/CC-MAIN-20200712051058-20200712081058-00406.warc.gz
CC-MAIN-2020-29
1,045
4
https://forum.support.xerox.com/t5/Copying-Faxing-Scanning/SMB-Scan-not-working-with-Host-Name/td-p/239114
code
I am trying to configure SMB scan on my pc. I successfully set it up using IP Address. However, using host name does not seem to work. I have set up the correct DNS address on the machine which is the same as my router configuration to no avail. I searched the online knowledgebase and found some solutions that may help you:
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494852.95/warc/CC-MAIN-20230127001911-20230127031911-00617.warc.gz
CC-MAIN-2023-06
325
5
http://www.thishouseismyhome.com/hanging-curtain-room-divider/
code
Hanging Curtain Room Divider. When you think about room dividers you possibly assume their only function is to separate large spaces. Sure, you understand they come in various styles as well as can include a bit of decoration to a room, but did you understand that the can be useful as well as attractive? Room dividers come in several sizes as well as styles. You could get folding screen room dividers with the basic 3 panels or significant dividers with 8 panels that extend a tremendous 140 inches throughout. Yet room dividers are not only for decoration. They have several useful purposes, one of the most acquainted of which is to separate a room. You could use them to separate a huge multi objective space such as a living room – dining room combination. This could be a wonderful method to produce a smaller sized a lot more intimate space within a huge room.hanging curtain room dividers,hanging curtain room divider diy,
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746398.20/warc/CC-MAIN-20181120130743-20181120152743-00243.warc.gz
CC-MAIN-2018-47
934
3
https://imanga.net/sangokushi-v-psp-iso/
code
System : PSP Easiest Emulator : PPSSPP File Size : 170 MB Launched : 2005 Fashion : Approach Language : Japanese Easy strategies about how to Extract RAR ? - Download and Set up Winrar - Open Software program and Snatch “Extract Right here” or “Extract Files” - for android customers, we the truth is useful RARLAB to enact this operation, but which you can disclose other apps love Zarchiver within the event which you can love to. you could well perchance perchance net this apps in play store Easy strategies about how to Play ? - Download Emulator - Extract RAR” - Load ISO with Emulator - Total Handbook Easy strategies about how to Use PPSSPP Emulator, Please Be taught Tutorial ! - Please Eye FAQS Forward of asking any questions !
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511170.92/warc/CC-MAIN-20231003160453-20231003190453-00555.warc.gz
CC-MAIN-2023-40
748
16
https://www.trendmicro.com/vinfo/fr/threat-encyclopedia/spam/503/fake-invoice-notification-malspam-uses-dropbox-link-to-spread-malware
code
Fake Invoice Notification Malspam Uses Dropbox Link To Spread Malware The team received a mail sample recently, with the body of the mail written in Portuguese. Upon analysis, we discovered that the mail's FROM headers does not contain the same email domains and seems to be randomly generated. The mail's content talks about an issued invoice, and then goes on to ask the reader to click the link provided in the mail. The link, once clicked, would direct users to a legitimate dropbox link. The files that customer would download after clicking the link are far from legitimate, instead being malware which is detected by Trend Micro as TROJ_BANLOAD.IMO. Users are asked to take extra precaution accessing emails from email addresses they are not familiar with and avoid clicking suspicious URLs inside the mail. The spam mail and the links it contains are already detected and blocked. Trend Micro™ Smart Protection Network™ protects users from this threat by blocking the spam mail samples, as well as any related malicious URLs and malware. - TMASE Engine: 7.0 - TMASE Pattern: 9980
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473558.16/warc/CC-MAIN-20240221202132-20240221232132-00039.warc.gz
CC-MAIN-2024-10
1,091
6
http://rubylearning.com/blog/2007/05/08/ruby-ebooks/
code
Ruby is growing in popularity. For those looking at learning Ruby, there are many online resources available. In case you want to learn Ruby offline, then here is a list of all the free, Ruby eBooks available for download. - Ruby Study Notes. A thorough collection of Ruby Study Notes for those who are new to the language and in search of a solid introduction to Ruby’s concepts and constructs. Purchase this Ruby eBook. - The Little Book Of Ruby. It will guide you through the fundamentals of Ruby programming. - Mr. Neighborly’s Humble Little Ruby Book. It walks you through the very basics of working with Ruby. If you have come across any other free, downloadable eBook on Ruby then please post a comment with the url.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121778.66/warc/CC-MAIN-20170423031201-00597-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
727
5
http://srmz.net/index.php?s=2a3e1cc19cf3932b04be1007e234c938&showtopic=13171
code
I've been making some changes to the driver files for the 1965 Mod (V2 with historical updates) but when I tried my latest update, suddenly GPL is behaving as if it can't see any driv65.ini files anymore. When I check the Teams menu, in the main GPL menu or after loading a track, it's completely empty, as if the driv65.ini file itself was empty. This is even when there's a driv65.ini file in the GPL folder and the track folder. Even when I swap back to my previous driv65.ini, which used to work OK, GPL ignores it, I've tried changing player, restarting my PC, making the carset inactive and then active again, renaming files and naming them back... in fact everything I can think of and it's driving me mad. All other Mods seem to be working OK. I've attached an example of one of my modified driv65.ini files, and my GEM+ debug file. If anyone has any suggestions I'd be eternally grateful!
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703507045.10/warc/CC-MAIN-20210116195918-20210116225918-00096.warc.gz
CC-MAIN-2021-04
897
4
https://mobile.wattpad.com/user/thebittergreatness
code
"Happy endings: there are no happy endings. Endings are the saddest part." Wrote my first story when I was 14, can't believe how many reads it has when the writing is so bad. Currently a 21 year old college student that writes to escape reality. The Alpha's Young Mate (Completed) The Alpha's Daughter (On Hold) A King's Healer (Ongoing) - JoinedJune 8, 2013
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572833.95/warc/CC-MAIN-20220817032054-20220817062054-00212.warc.gz
CC-MAIN-2022-33
358
6
https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/356
code
Otherwise what can happen is the following: Consider two live sources, and one of the live sources can only answer the latency query once it has data to forward. This might take a few seconds, while the other source is already ready to produce data. Aggregator would now do a latency query once the early source produced data, fail the query and then wait forever until the late source is also producing data. Only then it would do a latency query again, which would now succeed. Aggregator would have waited longer than the latency deadline of the early source and would have dropped a lot of data unnecessarily while waiting for the late source, but instead it could've already output data for the early source.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100568.68/warc/CC-MAIN-20231205204654-20231205234654-00240.warc.gz
CC-MAIN-2023-50
713
2
https://www.virtualmanc.co.uk/2012/10/31/could-not-get-vmci-driver-version-on-vmware-workstation-9-on-windows-8/
code
I recently upgraded my laptop to Windows 8 and when attempting to power on my virtual machines running on VMware Workstation 9 I received the following error message: “Could not get vmci driver version: The handle is invalid. You have an incorrect version of driver “vmci.sys”. Try reinstalling VMware workstation. This worried me a bit at first but luckily there is a workaround you can do! If you open up the configuration file of the VM you are trying to power up in notepad and edit the following line: Set the vmci0.present = FALSE and you should be good to go
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816045.47/warc/CC-MAIN-20240412163227-20240412193227-00894.warc.gz
CC-MAIN-2024-18
571
5
https://cappellate.com/article/os-chroot-101-covering-btrfs-subvolumes-fedora-magazine
code
OS chroot command allows you to mount and run another Gnu/Linux from within your current Gnu/Linux. It does this by mounting nested partition(s) within your system and it gives you a shell which allows access to this chrooted OS. This will allow you to manage or debug another Gnu/Linux from your running Fedora Linux Disclaimer: When I say chroot, I mean the command, and chrootDir a folder. OSext is the external OS to work with. All the following commands are executed as superuser. For extra readability I removed the sudo at the beginning, just don’t forget to be superadmin when performing the tasks. […] means I cut some terminal output. First I’m going to review how to do a chroot on a classic filesystem (ext4, xfs, fat, etc) and then we’ll see how to do it on our brand new standard Btrfs and its subvolumes. The process is similar to that used to change the root password, or that we may use to repair a corrupted fstab (it happens, trust me). We can also use the chroot command to mount a Gnu/Linux in our Fedora Linux in order to perform operations (updates, file recovery, debugging, etc). A few explanations The chroot command lets you “change” temporarily the root location. This lets you partition a service or a user in the directory tree. When you use chroot to run a mounted Gnu/Linux OS, in order for it to be fully functional, you have to mount the special system folders in their “original places in the directory tree” in the chrootDir. This allows the chrooted OS to talk to the kernel. These special system folders are: - /dev for the devices; - /proc which contains the information about the system (kernel and process); - /sys which contains the information about the hardware. For example, /dev has to be mounted in chrootDir/dev. As I always learn better by practicing, let’s do some hands on. Filesystems without btrfs subvolumes The classic method In the following example, the partition we are going to mount is the OSext root (/). This is located in /dev/vda2 and we will mount it in the chrootDir (/mnt) directory. /mnt is not a necessity, you can also mount the partition somewhere else. # mount /dev/vda2 /mnt# mount --bind /dev /mnt/dev # mount -t proc /proc /mnt/proc# mount -t sysfs /sys /mnt/sys# mount -t tmpfs tmpfs /mnt/run# mkdir -p /mnt/run/systemd/resolve/# echo 'nameserver 188.8.131.52' > /mnt/run/systemd/resolve/stub-resolv.conf# chroot /mnt The –bind option makes the contents accessible in both locations, -t defines the filesystem type. See the manpage for more information. We will mount /run as tmpfs (in the memory) because we are using systemd-resolved (this is the default now in Fedora). Then we will create the folder and the file stub-resolv.conf, which is associated by a symbolic link to /etc/resolv.conf. This file contains the resolver IP. In this example, the resolver is 184.108.40.206, but you can use any resolver IP you like. To exit the chroot, the shell command is exit. After that, we unmount all the folders we just mounted: exit# umount /mnt/dev# umount /mnt/proc# umount /mnt/sys# umount /mnt/run# umount /mnt The case of lvm In the case of lvm, the partitions are not available directly and must be mapped first. # fdisk -l /dev/vda2Disk /dev/vda2: 19 GiB, 20400046080 bytes, 39843840 sectors[...]I/O size (minimum/optimal): 512 bytes / 512 bytes# mount /dev/vda2 /mnt/mount: /mnt: unknown filesystem type 'LVM2_member'. As you can see, we are not able to mount /dev/vda2 directly. We will now use the lvm tools to locate our partitions. # pvscanPV /dev/vda2 VG cl lvm2 [<19.00 GiB / 0 free]Total: 1 [<19.00 GiB] / in use: 1 [<19.00 GiB] / in no VG: 0 # vgscanFound volume group "cl" using metadata type lvm2# lvscanACTIVE '/dev/cl/root' [10.00 GiB] inheritACTIVE '/dev/cl/swap' [2.00 GiB] inheritACTIVE '/dev/cl/home' [1.00 GiB] inheritACTIVE '/dev/cl/var' [<6.00 GiB] inherit So here we can see where the logical volumes are mapped /dev/cl and we can mount these partitions like we did before, using the same method: # mount /dev/cl/root /mnt/# mount /dev/cl/home /mnt/home/# mount /dev/cl/var /mnt/var/# mount --bind /dev /mnt/dev# mount -t proc /proc /mnt/proc# mount -t sysfs /sys /mnt/sys# mount -t tmpfs tmpfs /mnt/run# mkdir -p /mnt/run/systemd/resolve/# echo 'nameserver 220.127.116.11' > /mnt/run/systemd/resolve/stub-resolv.conf# chroot /mnt Btrfs filesystem with subvolumes Overview of a btrfs partition with subvolumes Let’s have a look at the filesystem. Fdisk tells us that there are only two partitions on the physical media. # fdisk -lDisk /dev/vda: 20 GiB, 21474836480 bytes, 41943040 sectors […] Device Boot Start End Sectors Size Id Type /dev/vda1 * 2048 2099199 2097152 1G 83 Linux /dev/vda2 2099200 41943039 39843840 19G 83 Linux Here are the contents of the target system’s fstab (OSext): UUID=3de441bd-59fc-4a12-8343-8392faab5ac7 / btrfs subvol=root,compress=zstd:1 0 0UUID=71dc4f0f-9562-40d6-830b-bea065d4f246 /boot ext4 defaults 1 2UUID=3de441bd-59fc-4a12-8343-8392faab5ac7 /home btrfs subvol=home,compress=zstd:1 0 0 Looking at the UUIDs in the fstab, we can see that there are two different ones. One is an ext4, used here for /boot and the other is a btrfs containing two mount points (the subvolumes), / and /home. Overview of a btrfs filesystem with subvolumes Let’s have a look at what is in the btrfs partition (/dev/vda2 here) by mounting it directly: # mount /dev/vda2 /mnt/# ls /mnt/home root# ls /mnt/root/bin dev home lib64 media opt root sbin sys usrboot etc lib lost+found mnt proc run srv tmp var# ls /mnt/home/user# umount /mnt Here we can see that in the mounted partition there are two folders (the subvolumes), that contain lots of different directories (the target file hierarchy). To get this information about the subvolumes, there is a much more elegant way. # mount /dev/vda2 /mnt/# btrfs subvolume list /mntID 256 gen 178 top level 5 path homeID 258 gen 200 top level 5 path rootID 262 gen 160 top level 258 path root/var/lib/machines# umount /mnt Practical chroot with btrfs subvolumes Now that we’ve had a look at the contents of our partition, we will mount the system on chrootDir (/mnt in the example). We will do this by adding the mount type as btrfs and the option for subvolume subvol=SubVolumeName. We will also add the special system folders and other partitions in the same way. # mount /dev/vda2 /mnt/ -t btrfs -o subvol=root# ls /mnt/bin dev home lib64 media opt root sbin sys usrboot etc lib lost+found mnt proc run srv tmp var# ls /mnt/home/<it's still empty># mount /dev/vda2 /mnt/home -t btrfs -o subvol=home# ls /mnt/home/user# mount /dev/vda1 /mnt/boot# mount --bind /dev /mnt/dev# mount -t proc /proc /mnt/proc# mount -t sysfs /sys /mnt/sys# mount -t tmpfs tmpfs /mnt/run# mkdir -p /mnt/run/systemd/resolve/# echo 'nameserver 18.104.22.168' > /mnt/run/systemd/resolve/stub-resolv.conf# chroot /mnt When the job is done, we use the shell command exit and unmount all previously mounted directories as well as the chrootDir itself (/mnt). exit# umount /mnt/boot# umount /mnt/sys# umount /mnt/proc# umount /mnt/sys# umount /mnt/run# umount /mnt As you can see on the screenshot below, I performed a dnf update on a Fedora Linux 34 Workstation from a live Fedora 33 security lab CD, that way, if a friend needs you to debug his/her/their Gnu/Linux, he/she/they just have to bring the hard drive to you and not the whole desktop/server machine. Be careful if you use a different shell between your host OS and OSext (the chrooted OS), for example ksh <-> bash. You can specify the shell you want to run on OSext by adding the path to this shell at the end of your chroot command. For example: # chroot /mnt /usr/bin/bash I hope this will be useful to anyone needing to debug, or if you just need to update your other Fedora Linux in your dual boot and don’t want to have to restart 😉 This article just referred to a part of btrfs, for more information you can have a look at the the wiki which will give you all the information you need. Have fun chrooting.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00056.warc.gz
CC-MAIN-2023-40
8,038
54
https://www.nzeka-labs.com/tag/evaluate
code
Evaluate Computer Software program Being able to program a pc or create software program is akin to figuring out another language. There are nearly always major restrictions on its use, and its supply code is nearly all the time stored secret (supply code is the version of the software as it’s initially written by a developer in a plain textual content, readable in aircraft or alphanumeric characters). Programming instruments are additionally software program within the type of applications or applications that software builders (also called programmers, coders, hackers or software engineers) use to create, debug , keep (i.e. improve or fix), or in any other case support software program. Individuals who use trendy common goal computer systems (versus embedded methods , analog computer systems , supercomputers , and so on.) normally see three layers of software program performing a wide range of duties: platform, utility, and user software program. Under is an inventory of the different sorts of software a computer might have installed with examples of associated packages. Programming software, a set of tools utilized in actually placing collectively computer programs. The well known software companies of India- IBM, Microsoft, Accenture, INTEL, TCS, and HCL and so forth. The free open source motion is in larger momentum to empower training with various kinds of academic software program. The open supply academic software program permits freedom in training generally, and instructing studying particularly. LAPTOP bundle producers, one other group, are involved with the financial components related to software pirating and unauthorized copying.…
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648858.14/warc/CC-MAIN-20230602204755-20230602234755-00159.warc.gz
CC-MAIN-2023-23
1,676
6
http://wayne.uakron.edu/bio/dimitria-gatzia.dot
code
Before coming to Wayne College, I was a visiting Assistant Professor at the Philosophy Department at the University of Akron. My research is in philosophy of mind and cognitive science. I am interested in the metaphysics of color, color perception, and how cognitive psychology and neuroscience can inform our philosophical theories of the relation between perception and cognition. I have written about color fictionalism, intersubjective and intersubjective color variability, synesthesia, the individuation of the senses, and the relation between the ethics of care and economic theory. I am currently writing papers on perception and mental processing, fictional truth, and feminism. I am also working on a book on color. For more information visit: http://gozips.uakron.edu/~dg29/ Assistant Professor of Philosophy
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947968.96/warc/CC-MAIN-20180425213156-20180425233156-00422.warc.gz
CC-MAIN-2018-17
819
5
https://cris.haifa.ac.il/en/publications/characteristics-of-proton-ct-images-reconstructed-with-filtered-b
code
In early studies of proton computed tomography (pCT), images were reconstructed with the fast and robust filtered backprojection (FBP) algorithm. Due to multiple Coulomb scattering of the protons within the object, the straight line path assumption of FBP resulted in poor spatial resolution. In an attempt to improve spatial resolution, a formalism to predict the proton path of maximum likelihood through the image space was created. The use of these paths with the iterative algebraic reconstruction technique (ART), have shown an improvement in spatial resolution, but also an increase in image noise, resulting in poor density resolution. In this work, we propose a reconstruction method that attempts to optimize both spatial and density resolution of pCT images. The new reconstruction approach makes use of the block-iterative diagonally relaxed orthogonal projections (DROP) algorithm with an initial FBP-reconstructed image estimate. Reconstruction of Monte Carlo simulated pCT data sets of spatial and density resolution phantoms demonstrated that the combined reconstruction approach resulted in better spatial resolution than the FBP algorithm alone and better density resolution than the DROP algorithm starting from a uniform initial image estimate.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948217723.97/warc/CC-MAIN-20240305024700-20240305054700-00196.warc.gz
CC-MAIN-2024-10
1,264
1
https://lifehacker.com/recent-windows-patch-causes-black-screen-of-death-unr-5416106
code
Windows: The last updates from Microsoft have caused a headache for some users. A bug in the update causes certain programs to fail to render properly blacking out the whole screen. A third-party security company has released a fix. Updated below. The problem—according to Prevx, the security firm that released a patch to fix the issue—involves the Microsoft patches altering the way registry keys are accessed: [...] the cause of this recent crop of Black Screen appears to be a change in the Windows Operating Systems lock down of registry keys. This change has the effect of invalidating several key registry entries if they are updated without consideration of the new ACL rules being applied. For reference the rule change does not appear to have been publicised adequately, if at all, with the recent Windows updates. If your black screen woes started as a result of your last Windows update, the Prevx patch should have a high probability of fixing the issue. If you don't have automatic update enabled you'll want to skip doing any updates until the next patch release comes out and corrects the black-screen-of-death issue. Check out the link below to read more and grab the patch. Update: According to the Microsoft Security Response Center, Microsoft hasn't released any updates that could have caused the Black Screen problem described by Prevx, so if you're experiencing this problem, it's very unlikely that it was caused by a Microsoft update. (via @edbott)
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818081.81/warc/CC-MAIN-20240422051258-20240422081258-00731.warc.gz
CC-MAIN-2024-18
1,477
5
https://kelar.org/~bandali/contact.html
code
Email is by far my preferred method of communication, and you can write to me at [email protected]. For GPG-encrypted mail, you can encrypt your message using my public key with the following fingerprint: BE62 7373 8E61 6D6D 1B3A 08E8 A21A 0202 4881 6103 To learn how to send encrypted email, see the email self-defense guide by the Free Software Foundation. Besides email, I can also usually be reached via IRC on and oftc networks, where I idle bandali. For other means of communication, please send me an email and we can figure something out if needed.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363332.1/warc/CC-MAIN-20211207014802-20211207044802-00087.warc.gz
CC-MAIN-2021-49
556
7
https://support.dolby.io/hc/en-au/articles/4409933578639-Android-12-crashes-bluetooth-permissions
code
- Communications APIs - Starting with Android 12, the OS has introduced new required Bluetooth permissions. If your application targets Android 12 and you using the Android native SDK v3.2.x and below, you may face a FATAL EXCEPTION crash with the following error log: java.lang.SecurityException: Need android.permission.BLUETOOTH_CONNECT permission for android.content.AttributionSource@31b1ed6b: HeadsetService - The application uses SDK v3.2.x or below - The application uses targetSdkVersion=31 - The device uses Android 12 - The device has Bluetooth turned on - Run the application and it will crash immediately This has been fixed in the Android SDK v3.3.0. Note: This fix only prevents the application from crashing. In order to allow users to use bluetooth devices on Android 12, you must add Bluetooth permission and permission request for BLUETOOTH_CONNECT in your application. See links below.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100258.29/warc/CC-MAIN-20231130225634-20231201015634-00829.warc.gz
CC-MAIN-2023-50
905
10
https://www.cybrary.it/video/9-1-terraform-functions/
code
9.1 Terraform Functions Join over 3 million cybersecurity professionals advancing their career Sign up with Required fields are marked with an * Already have an account? Sign In » welcome to Module 4.6. In this section, we're gonna talk about functions specifically, terra form functions up on the screen. Here, you'll see I have the get hub documentation for this site and I drilled into the number 06 directory, which is associated with this module talking about functions. What I'd like to do is open up the actual terra form documentation on the functions. It's really a great and comprehensive reference for all the different functions that are obviously built into terra form. I'm not going to go through all of these functions. There are a lot of them, but I do wanna touch on a few of them and even do a little playing around with some of these functions so you can see them in action. You can see in the dark temptation that's grouped the very, very early on in this training. Um, we discussed variables in different types of variables. You can you'll see some alignment here with the function types, a CZ well as other ways, specifically here's type conversion functions. So if you need to manipulate a variable of one type into a different type for some reason, you can take a look. A TTE thes. They're gonna be handy here. We have numeric functions. So which include parsing functions, believe it or not. So you can If you had a variable of a certain type that, say a strength and you wanted to parse that in turn into an actual and Inger, you have those again, I'm not gonna cover all of these absolute value rounding up to the nearest hole number a rounding down to the nearest full number. Um, we have the max function and the main function these air very straightforward in what they do. Um, good little Segway here, though. Let's ah, let's talk about how we can learn more about functions before we return to look at the different kinds of functions. And what I want to introduce to you is Terra form Consul. So over here I have, um actually, the 06 directory opened, and I'm gonna open up the read me marked down file, actually, for this particular lesson to save myself some typing kind of cheat a little bit, but what we're gonna do down here in the terminal at the bottom of the screen is run terra form. Come Consul. I really recommend this utility when you're playing around with functions or some of the other expressions that we're gonna, um, come back to one thing to keep in mind when you're interacting with this, there's no use of variables. So if say, we're playing with functions and we wanna assign the output produced by a particular function to another variable that's not gonna work out and similar reading in variables. So this does have value when you're tinkering and learning and kind of exploring functions, manipulations, expressions. But it is a limited value, and that's just a shortcoming of the way that council works. But what I wanted to do here is, since we were on the topic of the max function, I wanted to instead, and she ate County Reform Council and we're gonna type in the max function. I did a little copy and paste to move things along. So here we're gonna run the function. And sure enough, we would expect that the number 12 is returned and the number 12 has been returned by the max function. We're gonna play around with that consulate a little bit more once we've continued to make our way through other functions. And in fact, we're going to get a little more complicated and exploring different types and using having passing values directly from one function to the next. And and, um, well, you'll get to see how a lot of this comes together. Eso string functions You could definitely look through these some regular expression stuff. I was actually surprised to see some of the advanced function capabilities that they do have on Dhe. Then, of course, for splitting for bringing together, joining multiple strings. Can Cat Nation is something that we've done earlier? This is one that I had to play with, and you might find yourself playing with a little bit. T build out strings. Can Cabinet values, if you may recall, this was a function that we used in the custom module back in when we're talking about creating custom tear for modules, and we use that because we wanted to upend at the very end of Dash R G to the resource group in that particular module, we were creating collection function, so the collections, these air, the lists, these air, the sets, thes air, the maps, and you may recall, we used at the merge function also in our custom module to merge together Ah, a variety of different tags and create a map the tags map that we then passed along to the to the the resource when it was getting to find in Azar. So you've played with that? There's a whole bunch of other ones manipulations examining keys. So this is an interesting one, right? It returns the suite of keys from a particular hash map. Of course, we have the length function for evaluating an air, are extremely an array or list all these different types. How many items are there? And it looks like it'll even and evaluate that a string and interpret that as an array of single characters returning you the length of the string, some sort different searchers circumstances. You're gonna want to use these functions. So browsing through a mall, keeping them maybe in the back your mind is a good idea. But by no means you need to be a full expert on functions in this particular lab activity. We're going thio work with the Jason Decode function because I think this is this is kind of interesting ability of parsing a string that maybe in the format of a Jason format, and then it will create an object representation in terra form based on what it's parsed. So I think that could be a useful thing if you're feeding other pseudo configurations into your terra form file or, of course, reading files, these air the file system functions so reading files from the system from by which the Terra form apply and operation is taking place. Um, so the most basic being filed reading file contents but checking for file existence. Ah, variety of things going on their date time, basic manipulations. Formatting, I think, would be a very common thing if you're going to be producing log files. Or you even want to make files that follow certain convention that incorporates the date time stamp in the file name. Hashing crypto functions a lot of creativity on on how you use these in terms of doing. Creating hash is to ensure integrity of things maybe being passed on, sent around some contrition, including Arcee encryption decryption, using public private key type circumstance of you have a secret that you're maybe passing from the host to from the from the machine performing the terra form concepts. But I do think there are a few other ways that that are better than that using key vaults hosted in the different But you never know. There may be some nuance with that that doesn't work. So you reach in your back pocket and find the functions here and then I p networking functions. If you really are working with a lot of virtual networks and setting those up, they get pretty deep, including sub net masking and all sorts of things to help you calculate Let's play around these a little bit more, and, um, I wanted to dive a little deeper on the file file, function itself on dhe, using that explore that Jason a little bit further. So here we can run the file function. There is an example that Jason file in the same working directory from which I started the Terra form counsel, and so you can see it really just spits out. The contents of that fact. Will will get into a little more little more zoomed in mode, I think will help you see everything a little bit better, going back up so we have the file function. So if we want to turn this into a Jason object, we're just gonna move and pass along the file contents that exists. In that example, Jason file to the Jason Decode function, and that's going to return an object, a terra form object with all the vile. The values that match the Jason file were explored that object a little bit. Let's say, Well, what is this object? And you can see here just by looking at it that it's has the brackets. So really, the object is Ray is what's being returned. So I'm gonna play around a little bit here and say, OK, let's copy this. let's go back to the console, Let's paste it and run the length command on and see How big is this? All right, so it's an array of only one item, which is is kind of interesting If we continue to evaluate Well, let's see. Well, it's not an array. What kind of thing is being returned here? Let's take a look a tw three keys and there's only a single key value, which is the colors value. So if I look at this example file We could see. Okay, there's the bracket. Then there's the colors. And then everything else is within the bracket there. So you know what I bet colors itself is actually gonna be an array and s o. Let's try looking at the colors attributes and seeing what the Reform Council has to stay here. So back down the console. Okay, that Jason decoding the file. And then we drilled into the colors attributes here, and we can see Sure enough, there is a list. It's an array which has all those entries. We could look at the length that's the length of this particular array. Right? So now we're just playing around. We're getting a feeling of what the object types that, um, that are being returned as a result of the decoding the Jason decoding process that's evaluating the file contents. And then last night, at least let's take a look at the keys for the zero element on the colors array, and it's category, code, color and type. If I look at this, look at that category color type. So not in the same order A specified in the Jason file. Hopefully that doesn't matter. Hopefully, you're manipulating the object in real time. But more importantly, the reason we went through this activity was to just play around with the Terra form Consul and experiment and understanding how the different functions behave. if you're unfamiliar with using a particular function, this approach will really help you string together multiple different functions, play around and get a very rapid feedback on what's going on, as opposed to potentially creating a bunch of terra form files and trying to debug it by adding print statements or or something like that. I think this this other counsel approach is gonna be very handy tool. And even when we proceed to talk about conditional tze and some of these other loops in expressions that you can use in terra form, that console approach is gonna be very valuable. And then, of course, the the de facto definition of what are all the functions that Terra form has to offer is gonna be another valuable reference. So that wraps it up about functions in the key points. And I hope it provides you a little insight into being exploratory 11.1 Course Summary
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643585.23/warc/CC-MAIN-20230528051321-20230528081321-00578.warc.gz
CC-MAIN-2023-23
11,039
75
https://www.wix.com/corvid/forum/community-discussion/button-on-lightbox-is-redirecting-to-home-page
code
I created a submenu using a lightbox. On this lightbox I have buttons that are linked to other pages within the site. When the button is clicked it goes to the desired page, however it IMMEDIATELY redirects to the home page. Anybody know what thats about? All the buttons do the same... I'm just about ready to submit this site to customer smh. I wanna cry.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250593937.27/warc/CC-MAIN-20200118193018-20200118221018-00398.warc.gz
CC-MAIN-2020-05
357
3
https://scottbanwart.com/blog/2008/05/biztalk-mapping-tips-03-multiple-input-schemata/
code
Here is a handy little mapping trick I happened to stumble over. In BizTalk 2006 and later, if you are using a map from within an orchestration you can use multiple input schemata and map them to a single output schema. For example, you can combine a source XML file with the results from a web service call and map them into a single To accomplish this, you will need to define a message for each schema inside of the orchestration. From there, double click on a transform shape in the orchestration designer. On the transform configuration screen, choose to configure the source messages and add a row to the list for each input message you want to add to the map. In my example you can see I have added a row for MySource and OtherData schemata. Then define the destination message and check the “Open map in editor” box before clicking OK. The map editor will open, and you should see all of your input schemata defined on the left side of the map editor. From there you can drag links to nodes and use functoids as you would for any other map. Note you can also use this setup to configure multiple destination schemata.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00425.warc.gz
CC-MAIN-2023-50
1,129
17
http://fczaja.blogspot.de/2011_11_01_archive.html
code
It is also possible to mock only a part of the object e.g. single method and leave original implementation for the remaining part. Such object is called a 'partial mock'. The following Java code presents how to create such partial mock: package com.blogspot.fczaja.samplesWhen executing our test the method foo() of the object will be mocked and method boo() will be invoked normally. The console output of that test would be: public class PartialMockTests // Code inside foo() will not be invoked while testing // Code inside boo should be invoked public void testPartialMock() PartialMock partialMock = EasyMock .createMockBuilder(PartialMock.class) //create builder first .addMockedMethod("foo") // tell EasyMock to mock foo() method .createMock(); // create the partial mock object // tell EasyMock to expect call to mocked foo() partialMock.boo(); // call boo() (not mocked) I'm using this technique when I want to test a single method, that calls other methods in the same class. I can mock all other methods so they behave like methods form other mocked objects.
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463605485.49/warc/CC-MAIN-20170522171016-20170522191016-00452.warc.gz
CC-MAIN-2017-22
1,069
14