url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.quickstart.com/agile-software-development-with-team-foundation-server.html
code
Virtual ClassroomLearning Style 4 DaysCourse Duration About Individual Course: About this course: Before getting started with the overview of this course, lets have a peek at the history of Agile Software Development. It was first introduced in early 2001 when 17 software development practitioners gathered in Snowbird, Utah to discuss their shared ideas and various approaches to software development. In this intermediate level course, students would develop a project from initial requirements to deployment using Microsoft Team Foundation Server (TFS) as a complete Application Lifecycle Management (ALM) tool. With this training course, students would explore the features of TFS, including backlog items, Kanban boards, burndown charts, bugs, and more to achieve continuous integration with automated builds and deployment. The average salary for Team Foundation Server Administrator is $92,625 per year. After completing this course, students will be able to: - Manage an entire software project using Microsoft Team Foundation Server (TFS) and Visual Studio Online - Document work using features, backlog items, tasks and bugs - Monitor progress with backlogs, Kanban boards and burndowns - Automate testing and deployment with continuous integration - Enhance team collaboration and craft higher quality software in less time using TFS - Perform check-in, check-out, branching, and merging of source code using Visual Studio - Define build configurations that include unit tests and deployment - Estimate, prioritize, and schedule backlog items within sprints This course is intended for - Project Managers. - Familiarity with Agile principles is helpful, Agile Fundamentals: Scrum, Kanban, Lean & XP - Work experience using the iterative cycle and collaborative Agile spirit Suggested prerequisites courses: Virtual Instructed-Led Outline Application Lifecycle Management with Team Foundation Server Comparing traditional and Agile methodologies - Benefiting from value-driven development - Scheduling releases, iterations and Sprints - Achieving XP best practices with TFS Introducing Team Foundation Server Surveying TFS features - Team collaboration - Process templates - Version control - Automated builds - Integrated tests Evaluating TFS editions - Choosing Team Foundation Server vs. TFS Express - Exploiting Visual Studio Team Services Administering Team Foundation Server and Visual Studio Team Services - Planning a TFS installation - Creating collections with the administrative console - Managing project security and group membership with the Web control panel Securing TFS projects - Assigning permissions to security groups - Adding users to teams and projects - Restricting user rights - Configuring user alerts Creating projects for TFS and Visual Studio Team Services - Comparing the built-in Scrum, CMMI and Agile process templates - Specifying source control - Customizing process templates Managing Work with Team Foundation Server Mapping TFS and Agile process terms - Defining epics and user stories as TFS work items - Inputting features and backlog items - Estimating and prioritizing work items - Breaking backlog items into tasks - Scheduling start and end dates for releases and Sprints - Assigning backlog items to iterations and team members - Recording work remaining and status - Monitoring team progress Maintaining Source Code with Version Control Collaborating on code with Team Foundation Version Control (TFVC) and Git - Selecting centralized vs. distributed version control - Synchronizing local repositories with the master repository - Viewing project history with changesets Connecting to TFS from Visual Studio Team Explorer - Checking out and checking in source code - Merging changesets from multiple developers - Branching for release management and maintenance - Resolving multi-user conflicts - Adding existing code to TFS source control Integrating version control with client applications - Plugging TFVC into Windows Explorer - Linking TFS to Eclipse and Xcode - Executing TFS commands in the console Achieving Continuous Integration Creating, running and automating builds - Defining and scheduling builds - Managing releases and deployments - Controlling build output Crafting quality software through continuous testing - Integrating unit testing into builds - Leveraging Visual Studio code analysis and testing tools - Creating TFS test scripts for manual testing - Documenting and tracking bugs Scheduling and Monitoring Team Progress Managing backlogs and querying TFS content - Assigning work to iterations - Querying and defining iteration backlogs - Visualizing work-in-progress with Kanban boards - Monitoring progress with burndown charts |Learning Style||Virtual Classroom| |Course Duration||4 Days| Frequently Asked Questions About Virtual Instructor-Led Courses I can't connect to my class, what are my options? The link to the class is available upon logging in to your dashboard. If you are unable to see it, please contact our support team at 1-855-800-8240 and they will be happy to provide you the direct link via email or the dial in number. I can't make it to attend to class. Can I reschedule? Yes, you can reschedule your class. Please contact your Sales representative and they will arrange this for you. If you forgot his/her name, feel free to contact our support team at [email protected] or 1-855-800-8240. Will I get my certificate upon completion? Yes. Upon completion of the course, it will be available on your course as a Trophy Icon for you to download. If you do not see this, you will need to contact [email protected] with the following details so they can email you the certificate: Class Name, Class Date, Account Rep, and Your Email. I cannot connect to my lab. Help! Your Lab is accessible on the bottom part of your course. You will see a button that says "LAB". Just click it to launch the lab. Please note that some classes don’t need/require a LAB. You can verify with our support team by calling them at 1-855-800-8240 or by email at [email protected]. You can also check with your Instructor or the Associate Instructor if your class includes one. What is my access code for Skillpipe? A. Not all of the classes have or require Skillpipe. If your class includes one, please check your email as you should have received one from [email protected]. In case you do not find it in your inbox, please check the Spam / Junk folder. For any further assistance, you can call the support at 1-855-800-8240 or contact them via email at [email protected]. I don't have audio. I can't hear the instructor. Make sure you are using a compatible headset for your laptop or computer. If you don’t have a headset, you can use the built-in speaker of your laptop. Otherwise, you can use the dial in option by calling the dial in number provided in the class joining email. You may also contact support team for the dial in numbers associated for your training at 1-855-800-8240 or contact them via email at [email protected]. How can I reach student support? Support can be reach via phone at 1855-800-8240; via email at [email protected] or via chat support through the chat button on our website. Please note that support office hours will be from 8am-5pm CST Monday to Friday. Any concerns after office hours will be attended the following business day. Have Questions? Ask Us. Turn Training Into A Personalized Learning Experience - Problem Solving through ExpertConnect & Peer-To-Peer Learning - Find The Quickest Path To Learn With Career Paths - Access All Courses With Master Subscription - Manage Your Team With Learning Analytics - Virtual Classroom Training & Self-Paced Learning - Integrate With Your LMS Through API's
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583684033.26/warc/CC-MAIN-20190119221320-20190120003320-00204.warc.gz
CC-MAIN-2019-04
7,763
116
https://euraxess.ec.europa.eu/jobs/520395
code
ORGANISATION/COMPANYUniversidad de León RESEARCH FIELDComputer science › Other RESEARCHER PROFILEFirst Stage Researcher (R1) APPLICATION DEADLINE31/08/2020 23:00 - Europe/Brussels LOCATIONSpain › León TYPE OF CONTRACTTemporary HOURS PER WEEK37,5 The Group for Vision and Intelligent Systems (GVIS: http://gvis.unileon.es) at the University of León is looking for PhD candidates interested in a fully funded position to do her/his PhD thesis in Deep Learning applied to Fake News detection, which will include Computer Vision or Natural Language Processing. GVIS group collaborate with INCIBE (Spanish National Cybersecurity Institute, https://www.incibe.es/en) in developing tools to fight against cybercrime. INCIBE is the leading cybersecurity institute in Spain and this research position will be focused on providing new solutions to detect fake news in social media and the Internet. New algorithms developed will be integrated into INCIBE tools. We offer a competitive salary and to work in a flexible and international research environment with close interaction with industry, what will provide the possibility of both filing patents and publishing papers in relevant journals when obtaining your PhD. Fake News detection could be regarded from different perspectives. Therefore, both Computer Vision and Natural Language experience could be used for solving different related problems. To apply for this position, please, send your CV to [email protected] highlighting your experience in the main skills required for the position and areas involved, that are: - Projects related involving Computer Vision or Natural Language Processing both the objective of the project and the role of the applicant - Python and Deep Learning skills - Academic record - Any related publication - Interest and reasons for doing a PhD - Indicate if you are a European citizen or you already have a VISA for working in Europe or in Spain REQUIRED EDUCATION LEVELComputer science: Master Degree or equivalent REQUIRED LANGUAGESENGLISH: Good We are looking for candidates with a strong academic record and an M.Sc. degree in computer science or very close fields, preferably with expertise in machine learning, computer vision or natural language processing. Good programming skills in Python and experience with deep learning frameworks as well as publications in top conferences or journals are a bonus. EURAXESS offer ID: 520395 The responsibility for the jobs published on this website, including the job description, lies entirely with the publishing institutions. The application is handled uniquely by the employer, who is also fully responsible for the recruitment and selection processes. Please contact [email protected] if you wish to download all jobs in XML.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304217.55/warc/CC-MAIN-20220123081226-20220123111226-00472.warc.gz
CC-MAIN-2022-05
2,779
23
https://www.fr.freelancer.com/projects/software-architecture/linux-assistance/
code
I am having problems hooking up a remote lan access sytem on a new linux system with vmware. The server is a supermicro 2U Server X7QCE 4x Xeon X7460 [url removed, login to view] 24 Cores 96gb 4x 1Tb. The bios is old >> American Megatrends, Inc. [url removed, login to view] copywrite 1985-2006 so can't set up WOL in the Bios. The remote access hardware is a SISMO+ Remote Access Card >> using this software >>> [url removed, login to view] . . . . with these instructions >>> [url removed, login to view] What I need to do is execute x86 linux file on the usb through esxi host command line (usb should be mounted). File is \linux\32bit\[url removed, login to view] in linux folder structure. After that we need to set up remote wake up with two LAN hookups. Décerné à : 6 freelance font une offre moyenne de $40 pour ce travail Good morning. I am concerning your project. I have faced the same question recently and have found a good specialist. It occurred not so easy to do. Try to contact Evgeniy Sokolov evgeniy_sokolovv@([url removed, login to view]). They work Plus
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812306.16/warc/CC-MAIN-20180219012716-20180219032716-00561.warc.gz
CC-MAIN-2018-09
1,077
6
https://what.thedailywtf.com/
code
Everyone in my area except they do it much more quickly . And usually exit immediately afterward. Meaning they knew where they were supposed to be, but just had to be in the "fast lane" as long as possible, apparently. It's usually across all 4 lanes of traffic too. And to make the exit, they drive thru the gore point. Overall, this update was pretty painless for me. Some minor features, app improvements, but mostly it's about security and the new Mixed Reality improvements (which are awesome). The Photos app doesn't seem to have the remix3d integration they promised, but it is now a good basic video editor. @maciejasjmj Yeah. It's the second island that normally really gets people. I watched a bunch of people play through the game, so I had at least an onlooker's understanding of boss attacks and their tells, so I can't claim to be really good or anything, but it's been really fun so far. Next run and gun, I'll pick up the charge shot, and then everything should be more fun. May also test out how pacifist wins work, though I'm not about to play the whole game that way. It's just interesting. With the frog's final form, the one that killed me was the bouncing balls usually. The jets and plain platforms didn't cause too much trouble. There are dinosaur-descendants out there that are mean enough without the flying. A couple of modifications to the snout and tail of Exhibit A there, a few more feathers, and you're not too far off a dromeosaurid. However, some small dromeosaurids are thought to have possibly been capable of gliding or even powered flight. According to an hour or so of research tonight, heavilyinvolvingWikipedia but I did try and find some possibly reliable sources to confirm all this: Velociraptor is not thought to have had this capability, so far as I can work out, but there is a school of thought that Deinonychus, the real animal behind the raptors portrayed in Jurassic Park may have been capable of some form of flight as youngsters. It's also thought possible that flight evolved in ancestors of dromeosaurids, and if Velociraptor et al were flightless they must have secondarily lost the ability. @brisingraerowing In EBT, there are actually two different accounts, one for food and one for cash. Most people only get SNAP, meaning they only receive an allotment on the food account (which is still widely called 'food stamps' even though it's been over fifteen years since they actually used coupons or stamps). While any cash allotments are meant to go to non-food necessities such as rent, clothing, or housecleaning goods, there's no actual restriction on how you use it, only on which stores can accept it. Technically, lingerie is clothing, which is probably the loophole the store used to get the EBT support. So if it's anyone's fault, its the clerk who processed their application to access the EBT system, but honestly, it is probably the case that the law wouldn't give them a reason to deny the application no matter how absurd it is. They sell clothes, so they have to be eligible, otherwise the process lacks impartiality and the store owners could sue. Go figure. Oh, I don't actually have a problem with OOP, or even OOP languages, as such - I am quite fond of Python and what little I've seen of Ruby isn't bad, and I even have a certain fondness for Smalltalk even if I never really got a solid grip on it. FWIW, the surface of Python and Ruby both look pretty decent, but they've got yawning pits of beneath. Especially Ruby. I don't really know Ruby internals, but I have to agree that a lot of Python's internals are kludges - clever kludges, sometimes, but often really bizarre and ugly ones. Also, it's true that there are plenty of kludges in the libraries and other programmer-facing parts as well. OTOH, I would be hard pressed to think of a language where that wasn't true. In the end, Python fits the way my mind works pretty well, which I guess is what matters when it comes to preferences in languages. Mind you, just because I don't love Java doesn't mean I wouldn't work in it; once your in a job, you do what they ask you to, or you don't take the job. You might debate the topic with them, and recommend something else, but you rarely get to choose except by deciding whether to take the position or not. My problem with my last job was that they changed their minds after six months, and switched to doing everything on SnailFarts, a platform that made me want to claw my eyes out. @greybeard so each message has a unique message ID. Great. Is it exposed anywhere? Headers even? If Bob sends Sue an email, and later on Sue files a grievance over it, and the archived copy of the email that she prints out to use as evidence is different from the copy that Bob prints out from his "Sent" folder, how difficult is it to tell which one of them "edited" their copy, or if they both did? @vault_dweller I've never quite understood the logic, but the official documentation says: "If you compare a number with a string or the comparison involves numerical strings, then each string is converted to a number and the comparison performed numerically." I'm assuming this is because it makes the assumption that if you're comparing a string with a number, you probably want a numeric comparison, which given how much crap comes in stringly typed form. Kell shakes their head bemusedly. This strange kender is... well strange indeed. "The insult, if such there was, was not directed at this one. Truly there is no need for concern regarding this one." Kell falls silent once more. They are open to more conversation naturally, but do not desire to initiate it. Or possibly they do not feel capable of initiating conversation, they are quite the unusual one after all. And that's not to mention that strange speech pattern. Who speaks in a near perfect monotone, never refers to themselves by name or in the first person? Well.... Kell, obviously. But it is strange. You having WiFi doesn't instantly mean your kids will have it, unless you're stupid and make the password easy to guess (or botch the security some other way, like making it easy to change the password from inside the LAN). OK? I think last time I used it on a Wi-Fi network (visiting family for several days) I put in the code and everyone had access to it, though I might be misremembering on that point; it was almost a year ago. That would be much easier, since you would just not "remember" the network Cool, wasn't sure if that was a per-user thing. Ah, yes, typically going through the "normal" method of connecting to wifi adds it to the "All Users" area, meaning anyone on the computer can use that "profile". MS kinda hid the functionality to move the wifi connection settings to personal accounts, but it can be accomplished via the following: (I don't think you actually need to be admin, but habit) This adjustment means that only my account knows the password to the Wizarding-AC network, and others on the computer won't be able to connect without entering the password. I'm not entirely sure if it disconnects from wifi upon logoff though... Do those makefiles include macros in them that dynamically create makefile rules? I hate those; they're so hard to debug… Well, yeah, that's a pile of in it's own right to be sure, but I was referring to the 'required leading tabs' horseshit. Supposedly, the original developer of make noticed the problem early on, but decided that he didn't want to risk fixing it because he had a whole ten users already and he didn't want to break their existing scripts. It is worth bearing in mind that he never expected to have many more users, because Unix was some obscure thing that was thrown together on a lark and would never get used outside of Bell Labs. He just didn't see it as mattering, because it would be replaced in a few months time anyway - his cobbled-together copy of a relatively minor Tenex utility just wasn't important enough to piss of those ten guys down the hall. Instead of a database, we apparently store data automatically serialized with C#'s DataContractSerializer. Which would be fine, but they won't give us the data we need, so the schema has to change somewhat frequently. Also, apparently we may not know where the files are on disk. All the information I can find is people doing dumb things, like just deprecating properties but keeping them around, and redirecting them to new properties on deserialization. WHY would a database have been so bad? This is stupid! I know of multiple games this could be describing already, but Murdered: Soul Suspect (which Blakey named) isn't one of them. Although, in fairness I never finished that game and both of the other games I've played with this plot didn't reveal it until the end. I meant it in more of a "who stole the cookies from the cookie jar" thing except it would have more severe crimes like murder and tax evasion. I played a game recently where the person investigating 5 murders committed all 5 murders... although, to be fair, he didn't realize he was doing it (yay curses?). @ben_lubar Okay, so, this seems to have worked. Now I have another problem: I can't reselect the field. We're using something that gives us material design things (The inputs are all <input mdInput .../>) for some reason, so we have those fancy inputs where the field label slides into the box when it's inactive as a placeholder. But when I call .focus() on an element, it immediately loses focus again, though the next element gets selected if you press tab. This won't work at all, and is probably the cause of the original blur problem problem. Can't even get a good result from Google
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823153.58/warc/CC-MAIN-20171018214541-20171018234541-00441.warc.gz
CC-MAIN-2017-43
9,651
47
http://www.promagltd.com/wise.htm
code
A Few Words of Wisdom ! Frequently Asked Questions It's unwise to pay too much... but it's worse to pay too little. When you pay too much, you lose a little money... that's all. When you pay too little you sometimes lose everything, because the thing you bought was incapable of doing the thing you bought it to do.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103947269.55/warc/CC-MAIN-20220701220150-20220702010150-00101.warc.gz
CC-MAIN-2022-27
315
6
https://community.netapp.com/t5/Network-and-Storage-Protocols/HELP-Active-Directory-Domain-Migration-involving-3020c-Filers/td-p/73522
code
I am requesting any information the group may have on what is the best way to migrate NetApp filers to a new domain, WHILE translating the SIDHistory for the CIFS ACLS. I was led to believe that there was a "native" tool for this, but have yet to find one. I am not looking for 3rd party tools, because the migration is to end on Oct 1st and we do not have enough time to purchase any 3rd party software. We are using the ADMT v3.0 tool to migrate all Active Directory objects from "Domain1" to "Domain2" I want to ensure that "Domain1\Group1" will be translated to "Domain2\Group1" To Brendon's point, you can definitely use 'cifs shares' in order to get a defined list of information about your shares. Taking it a step further as well, you can take a look at the contents of /etc/cifsconfig_share.cfg which will provide you with the GUID's which are assigned to the individual shares. If via using ADMT you migrate SIDHistory as well as the GUID's across, you shouldn't have much of a problem once you cut the filer from Domain1 to Domain2. Do be careful to make sure and review the list of what you're migrating to make sure that you don't run into any odd duplicates, or end up not migrating over a particular user or group with its respective SID and GUID. Once you've defined that you indeed have replicated this over, and that the data will match on both sides you can simply point it over to the new domain "Domain2" and if CIFS is configured correctly on the filer (talking to the new domain controllers) as far as the filer is concerned the data populated in that /etc/cifsconfig_share.cfg will not have changed as it remains static referencing GUID's all day long. Hopefully this helps in what you're doing, luckily (unless I'm mistaken) you're only doing a domain migration and not an actual filer or data migration, so it's merely a matter of resolution and ACL verification! I know this is an old post, but I had quite a few issues using subinacl against NetApp filers and SetAcl caused some inheritance breakage issues when making changes against certain shares so I took the time to code up a version of subinacl that works better with NetApps and is multithreaded to support changes on large volumes. It's available at the link below (free, open source). Feature suggestions welcome.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517018.29/warc/CC-MAIN-20220517063528-20220517093528-00368.warc.gz
CC-MAIN-2022-21
2,301
10
https://careers.tobii.com/jobs/1776687-software-manager
code
We are on a mission to improve the world with our technology. Because eye tracking and attention computing are enabling technologies, people and companies around the world have used them to do amazing things like help diagnose brain-related diseases, uncover the secrets of reading, and identify when a person is falling asleep at the wheel. Come join us on our mission. Tobii is looking for a Software Manager for a group of software developers within the Wearable department. The Wearable department is developing eye tracking solutions for VR/AR as well as our eye tracking glasses. This is an exciting position where you are expected to make your employees as well as the organization develop and thrive. The role and responsibilities You will have up to 15 skilled software developers reporting directly to you and you will be responsible for their wellbeing and professional development. You are also expected to contribute to the improvement of the organization working with our wearable eye tracking solutions. Your days will be filled with - Supporting, coaching, and developing a group of software developers - Working with recruitment and retention to meet the requirements from the organization - Collaborating with the other line managers to continuously improve the organization and the way we work We are looking for someone who has - A MSc in engineering physics, computer science, mathematics or equivalent - Experience from leading roles as line manager, scrum master or similar - An understanding of working in a software development environment - Experience of working with agile frameworks We find it to be a strong merit if you have experience as a software developer and knowledge of C++, Python or Rust. To be successful in this role we believe that you have a passion for creating an energetic, fun environment where developers thrive and can achieve their full potential. You enjoy coaching and believe that communication is the key to successful collaboration. Is this you? Apply today!
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662556725.76/warc/CC-MAIN-20220523071517-20220523101517-00191.warc.gz
CC-MAIN-2022-21
2,013
17
https://www.thelinuxfaq.com/298-how-to-configure-postgresql-with-phppgadmin-in-xampp-on-fedora-ubuntu
code
We have already discussed about install postgreSQL on previous post, this post describe to configure postgreSQL and phpPgAdmin on XAMPP. 1. Install XAMPP latest version 2. Install PostgreSQL (CentOS, Fedora) 3. Install phpPgAdmin, We can install the phpPgAdmin in two ways, one is download and extract that package and another one is download using Git. Download the phpPgAdmin-5.1.tar.gz package using wget command and extract that tar.gz file. Move the directory to specific path /opt/lampp, Another option is download package using Git. Cloning into 'phppgadmin'... remote: Counting objects: 16946, done. remote: Compressing objects: 100% (8/8), done. remote: Total 16946 (delta 4), reused 0 (delta 0), pack-reused 16938 Receiving objects: 100% (16946/16946), 15.22 MiB | 145.00 KiB/s, done. Resolving deltas: 100% (9114/9114), done. Checking connectivity... done. Once you have installed and configured it, both database and database management tool run on Xampp (MySQL, phpMyAdmin and postgreSQL,phpPgAdmin). Configure with Apache : open the httpd-xampp.conf file Append below lines into it, Finally, restart the Xampp all services, Open your borwser and check it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100972.58/warc/CC-MAIN-20231209202131-20231209232131-00371.warc.gz
CC-MAIN-2023-50
1,169
21
https://www.itexchangeweb.com/ux-and-ui-design
code
in one Integrated Marketplace World class usability agencies help create a terrific user experience for your websites, web and mobile apps We design for great digital experiences. We balance usefulness, ease-of-use, and engagement within project constraints to achieve optimal solutions. We dig into your product strategy and your users’ needs to improve your product functionality and aesthetics Awards :IBM Beacon Award Key Skills :Android, iOS, HTML, XHTML, HTML5 Key Services : UX & UI Design Key Industries : Internet & IT, Retail, Media, Telecom We're here to help!
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655887360.60/warc/CC-MAIN-20200705121829-20200705151829-00148.warc.gz
CC-MAIN-2020-29
573
8
https://xxxnations.com/eminem-without-me-youtube
code
iTunes: http://smarturl.it/WithoutMe Amazon: http://smarturl.it/WithoutMeAmz Google Play: http://smarturl.it/WithoutMeGP Playlist Best Obie Trice. Real name no gimmicks Two trailer park girls go round the outside, Round the outside, round the outside Two trailer park Converted to 432hz with audacity. heres how to do it: Download & Install LAME mp3 encoder for Audacity: (look for "Lame_v3.99.3 Like us on Facebook ▻https://www.facebook.com/EminemMyDrug7◅ Eminem - Without Me lyrics on screen in HD & HQ. 2002 Live in Deitroit.!!!! 低音重視しすぎて音量下がってます。 ノイズ少し入ったかも ヘッドホン推奨ww. GENRE - Hip-Hop RELEASED - 2002 [TUNEAGEFM IN NO WAY OWNS ANY OF THE MUSIC IN WHICH IT SUPPORTS, ALL HELP MATTYB SEND THIS TO EMINEM! http://goo.gl/iuaVk Hi BBoys and BGirls! Thanks for watching MattyB's version of Eminem's http://bit.ly/hbiJq3 --- Link to Eminem on iTunes Uncensored version of Without Me performed by Eminem with lyrics. No copying Requested: XXGamer BoyXX Not Nightcore. This one gave me trouble with being out of sync after rendering x.x.. You can join me here: https://www.facebook.com/CitationDEminem This music is not owned or writt en by me. Also this video is not Eminem - Without Me - Music And Lyrics. hhaahaha he is an artist. Eminem - Without Me with lyrics Hope you enjoy it! EMINEM!!!!!!!!!!!!!!!!! Please rate comment and subscribe ;)) Bounce United Official Spotify Playlist ➥ http://spoti.fi/2dgPi8A Click "Show more" to see important details! Download/Stream: ➥ https: Eminem - Without Me (Subtitulada en Español) VISITA EL CANAL DE MI GRUPO DE RAP : https://www.youtube.com/ Our new fan video dedicated to litle kids,"Despicable Me 2" one of the best popular movie for the kids in 2013 and Eminem one of 2015 © All Rights Reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890928.82/warc/CC-MAIN-20180121234728-20180122014728-00179.warc.gz
CC-MAIN-2018-05
1,823
18
https://github.com/tomerfiliba/rpyc/issues/73
code
It would be very useful for debugging if the serialized exceptions will be logged on the 'server side' with their traceback, since the original traceback isn't visible on the 'client side'. why isn't the original traceback visible? the locally-raised exception has an attribute called _remote_tb which holds the traceback of the exception that happened on the server, e.g., http://rpyc.sourceforge.net/tutorial/tut2.html#exceptions unless you disabled include_local_traceback. see http://rpyc.sourceforge.net/api/core_protocol.html#rpyc.core.protocol.DEFAULT_CONFIG I think the phrasing of the original issue description was not clear enough. We mean that in addition to the _remote_traceback attribute (which is great), it would be nice to have rpyc's logging include a debug log of the traceback caught by the dispatch layer. This is just to aid debugging, as the _remote_tb is not printed out by default, and in some cases we understand we should have printed it only when it's too late and the exception object itself is gone. In such cases, however, the rpyc log can be kept on the remote host. One other way of putting it - it's hard to control all paths calling into a remote rpyc server, but it's easy to control the server itself when it's being first run. See also #74 changes for #73 the changes are the following: could you please test that it works as expected? So this means the connection object also logs exceptions? only the connection object logs exceptions: the server just sets the logger: Oh - I was confused - thought you meant the client side connection. Great.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174124.9/warc/CC-MAIN-20170219104614-00484-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,584
14
https://www.pierrehardy.com/row_en/women/shoes/sandal/mc09-gae-sandal-embossed-multicream.html
code
This sandal is highlighted by thin graphic leather bands on the bridle and décolleté. Mounted on the GAE heel, a tribute to the Italian post modern art: straight and imposing, the heel softens on the top with its subtle curves. Made in Italy Fabric: lambskin leather Colour: black, python, camel and white Heel: 7 cm ; "GAE" patent leather heel Sole: leather sole Lining: Black leather lining Details: Square buckle covered in leather This style fits true to size, choose your usual size.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886178.40/warc/CC-MAIN-20200704135515-20200704165515-00298.warc.gz
CC-MAIN-2020-29
490
9
https://destructuring.net/2013/12/13/removing-phantom-zombie-entries-from-an-osx-sidebar/
code
Every so often a file accidentally gets dropped onto my OSX sidebar. Usually I can command-click and `remove from sidebar` via the contextual. If the file has been deleted, no contextual menu pops up. I tried every trick posted on Apple’s forums to fix this , nothing worked. Then I had an idea — what if I figured out what the file was, and then replaced that file. Would OSX let me delete it from the sidebar manually ? It did! FINALLY! So here’s what did work on my 10.6.8 Macbook : After a bit of `grep`ping, I found the offending entry in “~/Library/Preferences/com.apple.sidebarlists.plist” It’s a binary plist, so it’s a pain to edit directly. Looking at the contents via `more` or `vi` , I found the offending entry along with what looked to be a file path. There was a pointer to the file in “/Users/jvanasco/.Trash/NONEXISTANT_FILENAME” This worked on first try: 1. `touch /Users/jvanasco/.Trash/NONEXISTANT_FILENAME` 2. restart Finder.app ( “Force Quit” by clicking command+option+esc, then selecting Finder” 3. select the bad item on the sidebar, command-click, and delete via the contextual menu item
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650264.9/warc/CC-MAIN-20230604193207-20230604223207-00494.warc.gz
CC-MAIN-2023-23
1,137
12
https://github.com/mozilla/testpilot/blob/master/docs/faq.md
code
Why isn't a Test Pilot icon showing up in my toolbar? Test Pilot can't be installed in private browsing mode, and if you have it installed already, it is disabled in private browsing mode. Does Test Pilot work in private browsing mode? Not right now, but we're thinking about changing that. For background discussion, see this issue: #1504. Why won't Test Pilot/experiments install? Make sure your Test Pilot add-on is up-to-date. You might try uninstalling and installing Test Pilot if nothing else works. For more details, see discussion in issue #1474 How can I contribute? First, you will want to take a look at our CONTRIBUTING.md file. If you'd like to contribute to an experiment, take a look at the experiment's detail page on Test Pilot for the most up to date link to the experiment's repository. I used to see an experiment, but now it's missing? We've recently shipped localization for Test Pilot and decided to restrict experiments from certain locales to ensure a smooth roll out. We didn't uninstall any experiments, but if your default language is German, some experiments may have been hidden from Test Pilot. Experiments you've previously installed are still accessible through about:addons and can be uninstalled from there. It's also possible that the experiment you're looking for has already graduated. You can see graduated experiments by clicking on the View Past Experiments button on Test Pilot. Where can I file a bug? Test Pilot bugs can be filed on the Test Pilot GitHub repo. link You will find a link to report bugs for individual experiments on the experiment's detail page on Test Pilot for the most up to date link.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171171.24/warc/CC-MAIN-20170219104611-00339-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,649
18
http://sopromat.xyz/en/calculators/index?name=bilinearinterpolation
code
Bilinear interpolation is an extension of linear interpolation applied to a two dimensional grid. The underlying function f(x, y) is sampled on a regular grid and the interpolation process determines values between the grid points. Bilinear interpolation is equivalent to two step linear interpolation, first in the x-dimension and then in the y-dimension. Bilinear interpolation is often used in image processing to rescale images. |First parameter X| |Second parameter Y||97.9| You can see Linear interpolation calculator also
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128329344.98/warc/CC-MAIN-20170629135715-20170629155715-00195.warc.gz
CC-MAIN-2017-26
528
4
https://zoomthenews.com/difference-between-list-and-tuple/
code
List and tuple are a class of data structures in Python that can store one or more objects or values. A list is capable of storing numerous items in one variable and can be formed using square brackets. Likewise, tuples retain the power to store multiple items in a single variable and be declared using parentheses. Even though there are numerous differences between list and tuple, there are some similarities too. They both are sequence data types that store collections of items, and Items of any data type can be stored in them. If needed, the item can be accessed by their index. The significant difference among lists and tuple There exist some significant differences among the features and functions of lists and tuples. Some of them are as follows: Difference in syntax The syntax for list and tuple will always be different. For example: - List number = [10, 20, 30, 40] - Tuple number = (10, 20, 30, 40) - Another critical difference between list and tuple exists in mutability. The list is mutable, while a tuple is immutable. This means that it is possible to change the lists, and tuples cannot be changed. Consequently, operations can work on lists, but it is not the case with tuples. For example, if a list already exists, then it is possible to reassign its particular elements. Along with this, the whole list can be reallocated. In addition, Elements and slices of elements can also be deleted from the list. - In contrast, particular elements on the tuple cannot be reallocated or removed, but it is possible to slice it and even reallocate and erase the whole tuple. As tuples are immutable, so it is not possible to copy them. Difference in Operations Even though many operations look-alike like both lists and tuples, but at the same time, lists have some additional functionalities that are not available with tuples. These extra functionalities are inserted and pop operations and the sorting and removing elements in the list. There are some python functions such as len, max, min, any, a sum that can be applied to both data structures. Size differences: Difference between list and tuple In Python, tuples are allocated large blocks of memory with subordinate overhead, as they are immutable; however, for lists, small memory blocks are allocated. Tuples have smaller memory, which makes them faster than the lists when there are many elements. Type of elements: Difference between list and tuple Heterogeneous elements are ordinarily stored in tuples. At the same time, homogeneous elements are usually stored in lists. But this is not a limit for the data structures. It is possible that Similar data type elements can be stored in tuples, and different data type elements can be stored in lists. Differences in Length: Difference between list and tuple There is a difference in Lengths among these two data structures. Tuples always possess fixed lengths, whereas lists have variable lengths. Therefore, the size of produced lists can alter, but that is not the case for tuples. It is essential to understand that there are diverse cases where it is good to use one of these data structures, such as; using either one hinge on the programmer’s wishes or requirements, i.e., picking one based on whether they want to alter the data later or not. Tuples can use as a correspondent of a dictionary without keys to store data. Whenever tuples store within lists, it becomes easier to read data. Also read: Difference between 3 star and 5 star ac
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101282.74/warc/CC-MAIN-20231210060949-20231210090949-00718.warc.gz
CC-MAIN-2023-50
3,476
20
https://stlb-school.ru/blind-dating-megaupload-fr-4640.html
code
Blind dating megaupload fr Simply double-click the downloaded file to install it. Update Star Free and Update Star Premium come with the same installer. It does this both in the scholarly modes of the humanities and social sciences and in the software creation/research modes of computer science, the arts, and design. The Software Studies book series, published by the MIT Press, aims to publish the best new work in a critical and experimental field that is at once culturally and technically literate, reflecting the reality of today's software culture. Little does he know that it could have two meanings. Starring: JC Stuart as Drew Ryan Holmes as Alex Rebecca Galarza as Isabella Directed by Blake Hemmerling Written by Jake Probst Casting by Brittney Hazley Edited by Chloe Birkenmeyer Other Credits in the Credits. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. Software is deeply woven into contemporary life—economically, culturally, creatively, politically—in manners both obvious and nearly invisible. bulletheight 10 : 0)" data-offset="0" class="n2-ss-widget n2-ss-widget-display-desktop n2-ss-widget-display-tablet n2-ss-widget-display-mobile nextend-thumbnail nextend-thumbnail-default n2-ow nextend-thumbnail-horizontal" style="position: absolute;width:100%;" The Sims 4: Deluxe Edition Free Download PC Game Cracked in Direct Link and Torrent. Elevate your Sim’s fitness and embody an active lifestyle with The Sims 4 Fitness Stuff.Challenge your Sims to scale the rock climbing treadmill as a fun way to burn [...] The Escapists 2 Free Download PC Game Cracked in Direct Link and Torrent.For such understanding they can call upon a strand of texts in the history of computing and new media, they can take part in the rich implicit culture of software, and they also can take part in the development of an emerging, fundamentally transdisciplinary, computational literacy. Software Studies uses and develops cultural, theoretical, and practice-oriented approaches to make critical, historical, and experimental accounts of (and interventions via) the objects and processes of software.The field engages and contributes to the research of computer scientists, the work of software designers and engineers, and the creations of software artists.But all I know is that he pings to me, he has a gay voice, and he doesn't seem to care about girls, but has a close relationship with his mom and sister.Tags: Adult Dating, affair dating, sex dating
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655882634.5/warc/CC-MAIN-20200703153451-20200703183451-00394.warc.gz
CC-MAIN-2020-29
2,630
9
https://wordpress.org/support/topic/a-function-call/
code
Support » Plugin: FirmaSite Theme Enhancer » a function call 3 years, 12 months ago broken! it is impossible to activate in my version In what version? how broken? What error are u getting? You need to explain more details if you want me to help you. 3 years, 11 months ago I updated plugin for old php support (older then php5.3). Please can you try again?
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189466.30/warc/CC-MAIN-20170322212949-00466-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
359
6
https://support.dropshare.app/hc/en-us/articles/115003136325-How-to-set-up-a-DreamObjects-connection
code
To create a DreamObjects connection in Dropshare for iOS, go to Preferences, Manage connections, and tab Add new connection. Select Custom S3 API-Compliant Connection from the list of available connection types. Enter the following information: - Server (e.g. storage.yourprovider.com) - Bucket name - Access Key - Secret Key - Domain Alias (optional, if you wish to access your bucket with a custom domain / URL) Test connection to validate your information. If everything is alright, you can save the connection and start uploading files to DreamObjects.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.31/warc/CC-MAIN-20231206063543-20231206093543-00431.warc.gz
CC-MAIN-2023-50
556
8
http://cathodetan.blogspot.com/2005_05_29_archive.html
code
Somehow I thought that title would come out sounding lewd, but it totally didn't. Any way, witness Grumpy Gamer taking on SAG: What does this have to do with paying Actors royalties? That depends on who's cut the extra royalties come from. If the Developers have to pay these royalties out of the development budget, then the Publisher gets away close to scott-free, while the Developer takes it in the... This has been drifting around a bit, but I think Grumpy manages to more or less nail it on the proverbial head. I personally think professional voice actors can add a lot to a cinematic experience ... but c'mon, games once survived on less. Plus, there's a wide berth of talented voice actors out there that aren't hardcode hollywood talent. Using A-list talent is a luxury. As soon as the big publishing houses really give into these kind of forces, a part of the gaming industry will be swallowed into the games-are-movies dark side. But wait, what does Wesley Crusher have to say? Wil supports the strike, and let's face it ... he's got a valid perspective. But I don't see where the fact that voice actors are underpaid really takes any wind out of Grumpy's arguments. What seems to be needed here is way for quality talent - whether that's a coder, artist or actor, to be paid justly without stealing from each other's pockets. I don't think Grumpy is saying that's impossible ... just don't trust the publishing houses to do it that way. Especially remembering that the next generation of titles are probably going to cost you an extra $10.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123097.48/warc/CC-MAIN-20170423031203-00476-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,552
7
http://www.sys-con.com/node/3018292
code
|By RealWire News Distribution|| |March 18, 2014 07:16 PM EDT|| Flexiant able to support Weserve's multi-datacenter requirements London, UK and Hengelo, Netherlands - 18 March 2014 - Webhosting company, Weserve B.V. today announced it has selected Flexiant Cloud Orchestrator to manage its multi-datacenter cloud solution from one platform. Faced with multi-datacenter management limitations from its previous cloud software vendor, Weserve was in search of a mature, professional and high availability IaaS cloud orchestration solution that could serve its 1,500-2,000 customers and 25 resellers across the Netherlands. Robert Nijhof, Managing Director, Weserve said, "It was important for us to manage our two datacenters in the Netherlands from one platform. After disappointment from our existing vendor, we evaluated Flexiant, OpenStack and CloudStack. Flexiant was able to meet our requirements so that we could support now, and expand in the future, our current cloud offering based on VPS with more capabilities and differentiated services." Weserve has deployed Flexiant Cloud Orchestrator across both datacenters and already has customers on the platform. Weserve has also now completed migrating its existing customers from the previous platform. "The main benefit of selecting Flexiant was moving immediately to a multi-datacenter solution and secondly Bento Boxes. We extend the Bento Box functionality to our resellers as most want to turn multiple VPS solutions into hybrid solutions. With Flexiant's valuable tool, they can use our solution, but deploy it themselves," said Nijhof. Flexiant's cloud blueprint technology, Bento Boxes, offers pre-packaged, pre-configured and sophisticated application stacks that are ready to use. By working closely with Flexiant's Professional Services team, Weserve was able to get the platform up and running in days. Nijhof said, "The team at Flexiant is very supportive and knowledgeable. Combined with Flexiant Cloud Orchestrator's superiority to other vendors, we now have the technical solutions we need to support our customers and reseller business." "Any organization wanting mature, professional and high availability cloud orchestration should evaluate Flexiant. The solution makes our lives easier and allows us to deliver the service we want to offer. We plan to expand our use of Flexiant Cloud Orchestrator as we expand our business," concluded Nijhof. About Weserve B.V. Since 2003, Weserve B.V. has been active in the webhosting business. Weserve B.V. offers a wide variety of service including domain registration, webhosting, dedicated services, colocation and rackhosting, high availability VPS servers, streaming services, online backup and spam filtering. Weserve B.V. manages its own network and hardware in the Serverius datacenter at Dronten, The Netherlands. From its core all services are offered and monitored. The NOC system of Weserve B.V. is also used to offer managed services for business users. From the datacenter, Weserve B.V. delivers and manages its FttO connections to businesses and has several interconnects with first class Fiber suppliers. For more info about our business services, please check www.weserve.nl Flexiant provides cloud orchestration software focused solely to the global service provider market. Flexiant Cloud Orchestrator is a cloud management software suite that arms service providers with a customizable platform to help them turn innovative ideas into revenue generating services quickly and easily. With Flexiant, service providers can generate more revenue and accelerate growth, compete more effectively and lead the market through innovation. Vendor agnostic and supporting multiple hypervisors, Flexiant Cloud Orchestrator offers a customizable platform, a flexible interface, integrated metering and billing, reseller capabilities and application management. Flexiant gives service providers the ability to develop, launch and bill for new cloud services quickly. Flexiant has been named a Gartner Cool Vendor in Cloud Management, ranked as the most innovative product in the market by Info-Tech Research Group for the second year in a row and called an industry double threat by 451 Research. Flexiant is now a Dell certified technology partner and Parallels partner. Customers include Colt Ceano, Computerlinks, ITEX, NetGroup and WeServe. Flexiant is also a key participant in the European Framework Programme. For more information visit www.flexiant.com. There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big D... Dec. 26, 2014 04:00 PM EST Reads: 2,228 SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ... Dec. 26, 2014 04:00 PM EST Reads: 1,852 DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete... Dec. 26, 2014 03:00 PM EST Reads: 2,559 The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large... Dec. 26, 2014 01:00 PM EST Reads: 2,643 The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more. Dec. 26, 2014 01:00 PM EST Reads: 2,067 WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations. Dec. 26, 2014 12:30 PM EST Reads: 1,896 Dec. 26, 2014 12:00 PM EST Reads: 1,722 Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar... Dec. 26, 2014 11:15 AM EST Reads: 2,363 "SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Dec. 26, 2014 11:00 AM EST Reads: 1,830 SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA... Dec. 26, 2014 11:00 AM EST Reads: 2,034 Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ... Dec. 26, 2014 11:00 AM EST Reads: 1,954 Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ... Dec. 26, 2014 11:00 AM EST Reads: 2,106 The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat... Dec. 26, 2014 11:00 AM EST Reads: 2,188 The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago. Dec. 26, 2014 10:00 AM EST Reads: 7,140 Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net... Dec. 26, 2014 10:00 AM EST Reads: 2,015
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447550272.58/warc/CC-MAIN-20141224185910-00032-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
11,821
45
https://medium.com/on-writing-code/how-to-win-the-coding-interview-71ae7102d685
code
How to Win the Coding Interview I’ve designed and conducted dozens of coding interviews. Now, I’m going to show you how to beat me every single time. Let’s be honest, most developers don’t love having to write code as part of an interview process. Some have even threatened to quit the business over it. But it’s not going to change any time soon. So, if you’re serious about getting a job, you need to understand how to succeed at these interviews. I’m here to help. We’re going to go over what I look for in a coding interview and by the end, you should have a pretty good idea of how to succeed. You can get it here. Before I start, I have to say, if a company is going to hire a developer based solely and entirely on a piece of code the developer wrote in an interview, you probably don’t want to work there. Part 1 — Whiteboard Coding Who on Earth writes code on a whiteboard? Like, seriously. But I’m still going to ask you to do it. Don’t worry, I haven’t lost my mind. I get that Google is a thing and that whiteboards suck at autocomplete. I don’t care. I’m not actually testing how well you write code on a whiteboard. I’m looking for something else. When you get the job you will never have to code on a whiteboard, but I guarantee you this, there will come a time when we are banging our heads against a problem and there is a deadline looming and we’re tired and people are pissed at us and money and jobs and reputations are all on the line. When that time comes, we’re going to have to get into a boardroom, hop on a whiteboard, and figure things out. Fast. “I’m not actually testing how well you write code on a whiteboard.” While I don’t need a developer who can write code on a whiteboard, I do need a developer who can think on her feet, under pressure, in a room with others. The problem is, if you don’t understand what I am actually testing, you’re going to approach this task all wrong. You’re going to try to prove that you are a whiteboard coding ninja. This is dumb. No one needs a whiteboard coding ninja. Here’s how to win me over: 1. Verbalize your assumptions and seek to confirm them. The best developers know that, fundamentally, every bug is the result of an invalid assumption. So, before you jump in and start coding, think about what assumptions you might be making, and ask me about them. 2. Think out loud. I want to get some insights into your thought process. Knowing that you understand how to reason about a problem is far more valuable to me than knowing that you’ve memorized the name of some built-in function. So, think out loud. Say what’s on your mind. 3. Don’t be afraid to ask for help. If you’re stuck or don’t know something, ask me. Do you have any idea how fantastically expensive it is to hire someone who refuses to ask for help when they are stuck? I have no time for a developer who fails to deliver because they pretended they had everything under control while being completely lost and floundering. 4. Represent your skills and experience honestly. Having said all of the above, I also don’t want to mislead you. There is a threshold for questions and commentary. If you are asking me about things that should be obvious to someone who presents with the skills and experience listed on your resume, that’s going to be a red flag. So, before we get to the whiteboard coding, make sure you’ve been honest in representing your skills and experience to me. Part 2 — Coding on a Computer Unlike the whiteboard, if I give you a computer and ask you to write code, I am testing how well you can code. More specifically, I am testing how well you can code to spec. The best way to understand what to do here is to look at a real world example. One of my favorite questions goes like this: A palindrome is a word, phrase, number, or other sequence of characters which reads the same backward or forward. Allowances may be made for adjustments to capital letters, punctuation, and word dividers. Examples in English include “A man, a plan, a canal, Panama!”, “Amor, Roma”, “race car”, “stack cats”, “step on no pets”, “taco cat”, “put it up”, “Was it a car or a cat I saw?” and “No ‘x’ in Nixon”. Write the most efficient function you can that determines whether a given string is a palindrome. Your function should accept a string as a parameter and return a boolean (true if the string is a palindrome, false if it is not). Assume that this code will be put into a real production system and write accordingly. When I offer a challenge like this in an interview, the first thing I’m looking for is whether or not you ask me any questions. As I said before, the best coders understand that assumptions are what kill you in this business. My advice to anyone who is handed instructions and asked to code something is to take a moment and consider what assumptions they will have to make in order to complete the task (there are always assumptions) and then find a way to confirm or clarify those assumptions. I understand that in an interview situation, people go into “test mode” and feel like they’re not allowed to speak. What I suggest is that you start by asking the interviewer “Am I allowed to ask you 1 or 2 questions just to clarify some assumptions?”. If the interviewer says “no”, then just do your best. If they say “yes” (I would always say “yes”) then you have a HUGE advantage. Good questions for this particular challenge would be: - “For the purposes of this exercise, should an empty string be considered valid input?” - “Do I need to handle unicode characters?” The next thing I’m looking for is how well you can follow instructions. For example, I specified a string input parameter and a Boolean output parameter. Is that what you delivered? After that, I want to see how you interpret the phrase “Assume that this code will be put into a real production system and write accordingly”. If you have built real software before, you should take that phrase to mean a few things: - Your code should be commented. - You should have error handling or at least logging. - Your code should avoid breaking at all costs. - You should have a test harness. - Your code should be easy-to-read and self-explanatory (clear variable names, good formatting, ideally “lint free” code). Next, I want to see what you make of the word “efficient” when combined with “production system”. If you’re experienced, you should know that “efficient” in production code means three things: - Runs fast. - Doesn’t take up more memory than it needs to. - Is stable and easy to maintain. You should understand that #3 sometimes means small sacrifices to #1 and #2. On this particular challenge, I am expecting many will use RegEx as a part of the solution. The regex needed for this is some of the most basic regex out there, and regex is universal to many languages, it’s fast and extremely handy (edit: RegEx is not necessarily always fast, thanks AlexDenisov). It’s not unreasonable to expect that you know the basics of RegEx, but you could still write an answer without it. For tests, I want to see that you included multiple tests, but that each test is testing a truly different scenario. Testing “mom”, “dad”, and “racecar” is redundant, they are all the same test. I also want to see that you included breaking tests; test for something that is not a palindrome. Consider edge cases, test for null or a number. Test for an empty string, or a bunch of special characters. I use this test on all levels of developers, but my criteria is stricter the more senior I expect you to be. For junior devs, if you can produce a working solution that’s reasonably straightforward and the rest of the interview goes well, I expect that I’ll be able to train you up. For an intermediate dev, I want to see some comments in there and good coding style. I want to see an efficient solution and hopefully a test case. Obviously, there are other ways to write a passing answer, but that should give you an idea. If I give you a challenge to take home, my expectations are even higher. If you get a week to code something with full access to Google, etc… There’s no excuse for giving me a solution that is anything less than top-notch. Part 3 — Algorithms Some interviewers will ask you to code an implementation of a particular algorithm. Personally, I think that’s just a giant waste of time. It’s far more important to me that you understand which algorithm to apply to which problem. You can always Google the implementation. Nevertheless, because interviewers will ask, you should brush up on the biggies ahead of time. Khan Academy has a great free course. Part 4 — Passing Without Solving the Problem If you are unable to solve the problem I give you, there are things you can do to stay in the running for the job. 1. Don’t give up too easily Make sure I see that you’ve put in a real effort. If you’re the type who’s going to give up as soon as the going gets tough, I have no time for you. 2. Pseudo-code it If you’re having trouble because you don’t recall a certain function name or some other syntactic rule, use comments to explain what you were trying to do in pseudo-code. If I feel like you’re just a quick Google search away from solving the problem, it will go a long way toward your cause. Especially if you have an excellent interview otherwise. 3. List Your Known Unknowns As an absolute “Hail Mary” if you are totally stumped, you can list for me all the things that you know you don’t know and describe how, in a real world scenario, you would go about figuring those things out. Be as specific as possible. If you tell me you’d ask for help, tell me who you would ask (the role) and what you would ask them (the specific question, if possible). If you tell me you’d search online, tell me exactly what search strings you would use. In this scenario, you really need to go out of your way to conivince me that you could solve the problem if you were actually working for me. Part 5 — Practice, Practice, Practice Arguably, the most important thing in passing a coding interview is to be well prepared. The best way to do that is to practice common interview coding questions over and over and over again until you know them cold. If you practice enough, and really work at it, you’ll even be able to handle a question you’ve never seen before. You’ll have confidence and you’ll be able to relate it to something else you’ve probably tried. You can get it here.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00048.warc.gz
CC-MAIN-2023-14
10,652
62
https://www.dreamstojourneys.com/the-league-of-moveable-type/
code
About THE LEAGUE OF MOVEABLE TYPE THE LEAGUE OF MOVEABLE TYPE is a free digital resource that helps you discover open source fonts. - Pursues the mission of raising the design standards of the web - Download fonts as OpenType font files, TrueType font files, WOFF files, or WOFF2 files - Upon choosing a font, you get additional info such as: features, character sets, glyphs, and licensing information No. This resource does not require you to give attribution/credit. Because mistakes can happen, and policies can change, I recommend you stay up to date with the resources you use, and if their usage rules are available, keep a copy of them for your own records. Keep informed. If free resources ever become too limiting, you can explore new strategies, discover professional resources, or browse popular gear that help take your creative journey to the next level. Subscribe to The Multifaceted newsletter to get creator economy insights, deals on digital products, and updates about free digital resources. Free. No spam. Unsubscribe anytime.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446706285.92/warc/CC-MAIN-20221126080725-20221126110725-00830.warc.gz
CC-MAIN-2022-49
1,047
10
https://lists.wikimedia.org/hyperkitty/list/[email protected]/message/O2RQQJ2SDOAYS3BPWU5PZB4XU3SJ4P74/
code
On 03/05/06, Pete Bartlett <pcb21(a)yahoo.com> wrote: The JS version of transclusion appears to be: I think it would be a brilliant idea to modularise and bring together all scripts in a consistent fashion under a WikiProject umbrella, so the editor just has to include a selection of subpages. something like this: 1. User makes a single modification to their monobook.js to include the module tool. 2. The module tool provides an interface such that they can select the modules that interest them 3. Modules currently selected are saved somewhere like user:Stevage/modules 4. When the user confirms, the tool retrieves the originals and writes them to something like user:Stevage/modulecode 5. Either the user, or the tool automatically adds a line which includes everything in user:Stevage/modulecode as you described above.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00448.warc.gz
CC-MAIN-2022-40
827
15
http://cdhca.org/visual-studio/microsoft-visual-studio-2010-tools-for-office-runtime-x64-msi.php
code
System RequirementsSupported Operating System Windows 10 , Windows 7, Windows 8, Windows 8.1, Windows Server 2003 R2 x64 editions, Windows Server 2003 Service Pack 2, Windows Server 2008 R2, Windows Server In some cases, you might need additional language packs. The developer editions of Office have been discontinued after Office XP and VSTO is available for Office 2003 and later versions only. up vote 2 down vote favorite I am currently installing a Powerpoint Add-in which I have built in C#. When you find the program Microsoft Visual Studio 2010 Tools for Office Runtime (x86), click it, and then do one of the following: Windows Vista/7/8: Click Uninstall. Symptoms You get the following message: Component Microsoft Visual Studio 2010 Tools for Office Runtime (x86 and x64) has failed to install with the following error message: "Fatal error during installation. VSTO solutions developed with VSTO 2005 SE will work with Office 2003 Standard (only application-level add-ins) and Professional. Program details URL: www.microsoft.com/en-us/download/details.aspx?id=35598 Help link: go.microsoft.com/fwlink/?LinkId=133405 Installation folder: C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\ Uninstaller: C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\Microsoft Visual Studio 2010 Tools for Office Runtime\install.exe Estimated size: 4.26 MB Files installed Please submit your review for Visual Studio 2010 Tools for Office Runtime (32-bit) 1. But I would idealy want my setup to not need admin rights. Microsoft Visual Studio 2010 Tools For Office Runtime Uninstall icon in magento 2 If the Ch’in dynasty was so short-lived, why was China named for it? Quickly and completely remove Microsoft Visual Studio 2010 Tools for Office Runtime (x86) from your computer by downloading "Should I Remove It?", its 100% FREE and installs in seconds (click the Visual Studio Tools For Office 2016 The prerequisites for the Visual Studio Tools for Office runtime match the prerequisites for the .NET Framework.The Visual Studio Tools for Office runtimeincludes language packs. Note that your submission may not appear immediately on our site. Yes No Additional feedback? 1500 characters remaining Submit Skip this Thank you! A progress bar shows you how long it will take to remove Microsoft Visual Studio 2010 Tools for Office Runtime x86. Features that requires accessing local machine file systems and other applications are feasible and easy in VSTO. Microsoft Visual Studio 2010 Tools For Office Runtime (x86 And X64) Since when has Darth Vader had a sense of humor? Visual Studio 2012 Tools For Office Runtime Details Version:10.0.60724File Name:vstor_redist.exeDate Published:7/24/2015File Size:38.2 MB This download installs the Visual Studio 2010 Tools for Office Runtime, which is required to run Microsoft Office based solutions built using Microsoft Visual Studio Dell 29.98% Hewlett-Packard 23.35% Acer 15.49% GIGABYTE 6.77% Toshiba 4.81% Intel 4.20% ASUS 3.93% Medion 3.93% Samsung 2.87% American Megatrends 1.79% Lenovo 1.76% Sahara 1.12% Common models MEDIONPC MS-7502 3.03% Dell this content Can I say: "I'm the man who was there"? (changing from 1st to 3rd person) Macro that reacts to the last symbol of the argument what is the difference between `>> Dev centers Windows Office Visual Studio Microsoft Azure More... Note that your submission may not appear immediately on our site. Visual Studio Tools For Office 2015 Extensible code to support different HR rules what warning labels could you see on products to be used in space? Visual Studio 2010 Tools For Office Runtime Silent Install It is feasible to perform all operations on office client. Aside From my own personal experience. We appreciate your feedback. What do I do if my supervisor insists that the classical CLT is false and wants me to write that in my paper? For more info, see our disclaimer at the bottom of this page.Ok Visual Studio Tools for Office From Wikipedia, the free encyclopedia Jump to: navigation, search "VSTO" redirects here. Visual Studio 2015 Tools For Office Runtime Stack Overflow Podcast #97 - Where did you get that hat?! share|improve this answer edited Sep 2 '15 at 13:48 answered Sep 3 '14 at 9:00 user1 4,23322060 add a comment| Your Answer draft saved draft discarded Sign up or log All Rights Reserved current community chat Stack Overflow Meta Stack Overflow your communities Sign up or log in to customize your list. About (from Microsoft) Note that on installation of the VSTO runtime, the installer will automatically configure VSTO to use the same language as your copy of Windows. http://cdhca.org/visual-studio/visual-studio-tools-for-office-2010-runtime-64-bit.php Select type of offense: Offensive: Sexually explicit or offensive language Spam: Advertisements or commercial links Disruptive posting: Flaming or offending other users Illegal activities: Promote cracked software, or other illegal content Design-time support is as follows: VSTO runtime version Develop/Build against Office 2003 Develop/Build against Office 2007 Develop/Build against Office 2010 .NET version Available as Document-level Application-level Document-level Application-level Document-level Application-level VSTO
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209021.21/warc/CC-MAIN-20180814101420-20180814121420-00380.warc.gz
CC-MAIN-2018-34
5,234
10
https://medium.com/dessa-news/detecting-audio-deepfakes-f2edfd8e2b35
code
Detecting Audio Deepfakes With AI Imagine the following scenario… Your phone rings, you pick up. It’s your spouse asking you for details about your savings account — they don’t have the account information on hand, but want to deposit money there this afternoon. Later, you realize a bunch of money has went missing! After investigating, you find out that the person masquerading as them on the other line was a voice 100% generated with AI. You’ve just been scammed, and on top of that, can’t believe the voice you thought belonged to your spouse was actually a fake. Until recently, if we told you this you’d think we were in desperate need of a good night’s sleep. But with AI-powered synthetic media like deepfakes on the rise, scenarios like the one above are already starting to happen. Take, for instance, the world’s first AI-powered cybercrime reported on earlier this September. Using speech synthesis technology, thieves were able to convince an energy executive into thinking he was on the phone with his parent company’s CEO, tricking him into wiring over $250,000 into their account. To build public awareness about the risks of AI-powered speech synthesis, a few months ago we shared our own example of the technology with the public. Using a proprietary speech synthesis model they built called RealTalk, engineers at the company recreated the voice of the popular podcaster Joe Rogan. Here’s the video we shared featuring the fake Rogan voice back in May: Today, we’re sharing the next step of our engineers’ work—a detector system built to discern between real and fake audio examples. Detecting Audio Deepfakes With AI As mentioned above, malicious uses of deepfakes are not only terrifying, but actually beginning to happen. Building tools that can accurately discern between real and fake media is an increasingly urgent matter. As machine learning practitioners, we have the capabilities to do this, and can help mitigate a real-world problem with drastic consequences. How it works: To discern between real and fake audio, the detector uses visual representations of audio clips called spectrograms, which are also used to train speech synthesis models. You can read more about how spectrograms help create synthesized audio in our technical post on speech synthesis here. While to the unsuspecting ear they sound basically identical, spectrograms of real audio vs. fake audio actually *look* different from one another. We trained the detector on Google’s 2019 AVSSpoof dataset, released earlier this year by the company to encourage the development of audio deepfake detection. The dataset contains over 25,000 clips of audio, featuring both real and fake clips of a variety of male and female speakers. The deepfake detector model is a deep neural network that uses Temporal convolution. Here’s a high-level overview of the model’s architecture: First, raw audio is preprocessed and converted into a mel-frequency spectrogram — this is the input for the model. The model performs convolutions over the time dimension of the spectrogram, then uses masked pooling to prevent overfitting. Finally, the output is passed into a dense layer and a sigmoid activation function, which ultimately outputs a predicted probability between 0 (fake) and 1 (real). Dessa’s baseline model achieved 99%, 95%, and 85% accuracy on the train, validation, and test sets respectively. The differing performance is caused by differences between the three datasets. While all three datasets feature distinct and different speakers, the test set uses a different set of fake audio generating algorithms that were not present in the train or validation set. Put more simply, our detector model can currently predict over 90% of the fake audio clips it is shown. Build your own deepfake detector Since detecting audio deep fakes is a mission critical problem, we’ve open-sourced the code for our model to encourage others to develop their own fake voice detection models. We’ve provided all pre-processed data, training code and inference code to make things as accessible as possible. We’ve also included a walkthrough of the code to help get started. The code works easily with the free Community Edition of our ML development platform, Foundations Atlas. Atlas will make viewing spectrogram and audio artifacts as well as running hyperparameter searches simple. - Code, and detailed instructions: Download on our Github. - Install Atlas: Download the free Community Edition of Atlas. The hope is that by releasing the tutorial, other ML practitioners will be able to reproduce the results of our model, in turn coming up with new ideas on how to make it even more impactful. In a future world, our vision for a model like this is a kind of system that could fit into the real-world infrastructure powering our phones and other media. Going back to that first scenario we told you about, for example: imagine if before you got the call, your phone buzzed violently, letting you know that the voice on the other line wasn’t actually your spouse, but a deepfake. Here are some other ideas that you can use to jumpstart your own model-building efforts: - Build a low latency serving system to run in real-time - Try more interesting data augmentations - Add audio from other speech datasets - Add audio sourced from ‘the wild’ (e.g. from YouTube) We’re excited to hear more about what you build. Learn how to get in touch with us and share your results below. Ready to build? If you end up working on new experiments related deepfake detection using our code and Atlas, we’d love to hear about your results. Share them with us by commenting on our Github. Learn more: You can also learn more about the detector and how it relates to a bigger industry push to combat against deepfakes over on Axios, where our work was covered in their excellent Axios Future newsletter.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00452.warc.gz
CC-MAIN-2024-10
5,921
33
https://viterbi.usc.edu/calendar/?event=15436
code
Wed, Mar 29, 2017 @ 02:00 PM - 03:00 PM Ming Hsieh Department of Electrical and Computer Engineering Conferences, Lectures, & Seminars Speaker: Dr. Scott Moura, UC Berkeley Talk Title: Increasing Battery Potential: Estimation & Control of Electrochemical Models Abstract: Batteries are ubiquitous. However, today\'s batteries are expensive, range-limited, power-restricted, die too quickly, and charge too slowly. Batteries are conservatively operated because their control systems treat the internal electrochemical dynamics as a black-box. Given real-time estimates of the electrochemical states, however, one can safely operate batteries near their physical limits, thus significantly enhancing performance beyond current state-of-art battery management systems. This talk reviews recent advancements in enhanced battery performance via estimation and control of PDE electrochemical models. First, we review battery electrochemistry. Second, we discuss canonical state-of-charge (SOC), state-of-health (SOH), and other so-called SOx estimation algorithms. Third, we present recent theoretical results in state estimation and optimal control with PDE models. Finally, we close with exciting new opportunities for next-generation battery management systems. Biography: Scott Moura is an Assistant Professor at the University of California, Berkeley in Civil & Environmental Engineering and Director of eCAL. He received the Ph.D. degree from the University of Michigan in 2011, the M.S. degree from the University of Michigan in 2008, and the B.S. degree from the UC Berkeley, in 2006 - all in Mechanical Engineering. He was a postdoctoral scholar at UC San Diego in the Cymer Center for Control Systems and Dynamics, and a visiting researcher in the Centre Automatique et Systemes at MINES ParisTech in Paris, France. He is a recipient of the O. Hugo Shuck Best Paper Award, Carol D. Soc Distinguished Graduate Student Mentoring Award, Hellman Faculty Fellows Award, UC Presidential Postdoctoral Fellowship, National Science Foundation Graduate Research Fellowship, University of Michigan Distinguished ProQuest Dissertation Honorable Mention, University of Michigan Rackham Merit Fellowship, and Distinguished Leadership Award. He has received multiple conference best paper awards, as an advisor & student. His research interests include control & estimation theory for PDEs, optimization, machine learning, batteries, electric vehicles, and the smart grid. Host: Prof. Insoon Yang Audiences: Everyone Is Invited Contact: Annie Yu
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510603.89/warc/CC-MAIN-20230930050118-20230930080118-00511.warc.gz
CC-MAIN-2023-40
2,534
11
https://de.language.exchange/friend/jacobga
code
I have planned a trip to Korea in the fall of 2021 and want to learn how to speak the language a little before I go. I have spent a couple of months learning grammar, but I need help practicing my speech. I would say I'm fluent in english, having lived in Australia and New Zealand for several months without any language difficulties. My danish is as fluent as you can imagine. I like to learn about different cultures, but I'm pretty easy going and down to talk about anything.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154219.62/warc/CC-MAIN-20210801190212-20210801220212-00651.warc.gz
CC-MAIN-2021-31
479
4
https://www.techrepublic.com/forums/discussions/my-websites-posts-are-not-indexing-in-google/
code
My Websites Posts are not Indexing in Google Greetings, Community I hope everything is good on your end. I developed my site a few months ago. It appears that Google is not indexing the posts on my website. I’ve attempted, but failed, to determine why postings take so long to load. Please advise me on what to do.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679518883.99/warc/CC-MAIN-20231211210408-20231212000408-00808.warc.gz
CC-MAIN-2023-50
316
3
https://sharepoint.stackexchange.com/questions/259796/sharepoint-2016-on-premise-user-profile-synchronization-and-ad-import
code
If I have a domain that is trusted with another domain, can i use User Profile Synchronization to sync users in the the Local AD and use AD Import to import users from the trusted domain? If you have two trust (i think), then you can have sync connect with it. All you have to do is create a separate sync connection with each domain. also check this for people picker: https://thesharepointfarm.com/2014/01/powershell-for-people-picker-properties/ Yes, you could perform the sync.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152000.25/warc/CC-MAIN-20210726031942-20210726061942-00513.warc.gz
CC-MAIN-2021-31
481
4
http://mag.outdoorequipped.com/
code
Release Notes for CakePHP 2.7.0-RC. Your version of PHP is 5.2.8 or higher. Your tmp directory is writable. The FileEngine is being used for core caching. To change the config edit APP/Config/core.php Your database configuration file is present. Cake is able to connect to the database. DebugKit plugin is present Editing this Page To change the content of this page, edit: APP/View/Pages/home.ctp. To change its layout, edit: APP/View/Layouts/default.ctp. You can also add some CSS styles for your pages at: APP/webroot/css. - DebugKit: provides a debugging toolbar and enhanced debugging tools for CakePHP applications. - Localized: contains various localized validation classes and translations for specific countries More about Cake CakePHP is a rapid development framework for PHP which uses commonly known design patterns like Active Record, Association Data Mapping, Front Controller and MVC. Our primary goal is to provide a structured framework that enables PHP users at all levels to rapidly develop robust web applications, without any loss to flexibility. - Cake Software Foundation - Promoting development related to CakePHP - The Rapid Development Framework - CakePHP Documentation - Your Rapid Development Cookbook - CakePHP API - Quick Reference - The Bakery - Everything CakePHP - CakePHP plugins repo - A comprehensive list of all CakePHP plugins created by the community - CakePHP Google Group - Community mailing list - irc.freenode.net #cakephp - Live chat about CakePHP - CakePHP Code - For the Development of CakePHP Git repository, Downloads - CakePHP Lighthouse - CakePHP Tickets, Wiki pages, Roadmap
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303512.46/warc/CC-MAIN-20220121162107-20220121192107-00413.warc.gz
CC-MAIN-2022-05
1,625
35
http://web.cs.wpi.edu/News/Regolith-prize.html
code
Ciaraldi on Award-Winning Robot Team CS Professor of Practice Michael Ciaraldi (2nd from the left in the photo above) was a member of the Paul's Robotics team that won NASA's Regolith Excavation Challenge, winning $500,000 with the Moonraker robot. The leader of the team, Paul Ventimiglia, is currently a Robotics Engineering student at WPI. The team members were Paul Ventimiglia, Colleen Shaver, Brian Loveland, Mike Ciaraldi, Jennifer Flynn, and Marc DeVidts. Prof. Ciaraldi was responsible for writing the robot's Java-based server software that communicated with the external interface (written in Visual Basic) from which the robot was controlled: but with a 2 second delay to simulate the distance from the Earth to the Moon. Because of the delay, the server had to be able to queue up the sequence of tasks requested by the user, rather than relying on the user to notice when each task had been completed. The server was also responsible for sending camera images to the user interface. This was needed because each competing robot was in one room with the regolith, while its operators were in a different room, and the spectators were in a tent watching a live video feed. Prof. Ciaraldi reports that several of the other top teams in the competition also had WPI Alumni as members! webmaster at cs wpi edu / Wed Nov 4 17:10:47 EST 2009
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358064.34/warc/CC-MAIN-20210227024823-20210227054823-00246.warc.gz
CC-MAIN-2021-10
1,348
6
http://www.seomastering.com/wiki/Comparison_of_layout_engines_(XML)
code
From Seo Wiki - Search Engine Optimization and Programming Languages The following tables compare XML compatibility and support for a number of layout engines. Please see the individual products' articles for further information. This article is not all-inclusive or necessarily up-to-date. Unless otherwise specified in footnotes, comparisons are based on the stable versions without any add-ons, extensions or external programs. Version number, if possible, is provided for feature that is fully supported. Proprietary extensions are not included. Explanation of the tables Rather than the names of web browsers, the names of the underlying engines are used. The browsers that use the various engines are listed below. Values indicate the level of support in the most recent version of the layout engine, or (if a version number is given) in the specified version. Version numbers without any other value indicate the version at which the layout engine first fully supported the feature. || Indicates that the layout engine fully supports this property/element when valid values are used. || Indicates that the property/element is completely ignored. || Indicates that the property/element is understood, but that not all values are supported. Supported values are implemented correctly. || Indicates that the property/element is understood, but that it is not implemented correctly in all cases. || Indicates that the property/element is understood, but supported under an alternate name. May be incomplete or buggy. || Indicates that the property/element is no longer supported. || Indicates that the property/element is supported to some extent in an experimental/nightly build. Future support is expected. A general overview of what core XML technologies are supported. A general overview of what XSL technologies are supported. Trident XSL technology notes - XSLT — Trident relies on the MSXML library to implement XML processing. MSXML3 and MSXML4 implement XSLT 1.0, while MSXML2 implements the December 1998 XSL Working Draft, which predates XSLT 1.0 and is not fully compatible with it. Further complicating matters is that the MSXML libraries can coexist, but only one of them will be used by Trident, depending on a setting in the Windows Registry. Prior to the release of Internet Explorer 6, MSXML2 was the default XML library for Trident, but MSXML3 or MSXML4 could be installed separately and then registered as the default if desired. Regardless of which version was the default, any version, if installed, could be invoked directly by Microsoft-specific scripting code in the document being rendered by Trident. A general overview of what XML linking technologies are supported. A general overview of what XML query technologies are supported. A general overview of what XML schema technologies are supported. Gecko schema technology notes - DTD — Only inline DTDs are allowed; external DTDs are ignored. Presto schema technology notes - DTD — Prior to version 2.0, only inline DTDs are allowed; external DTDs are ignored. In 2.0, it is possible to load external DTDs, but not cross domain. A general overview of what XML security technologies are supported.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173405.40/warc/CC-MAIN-20170219104613-00127-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
3,183
25
https://community.shaw.ca/thread/35644
code
I recently had the new Shaw 150 installed. Downloads work great on a wired connection (i.e. faster than 150), but is considerably slower on wifi. I've tried using a couple iPhone 6's and a MS Surface Pro 4. 1) 5 Ghz is a lot faster than 2.4 but never gets over 100Mbps. Generally, it is at most half as fast as the wired connection. Quite often, it is closer to 30M. 2) 2.4 Ghz is very slow. Sometimes almost non-existent slow For example, here are a bunch of tests I just ran: 2.4 Ghz: iphone- 11Mbps, 26Mbps, MS Surface - 43Mbps 5Ghz: iphone-50Mbps, 59Mbps, 72Mbps, MS Surface - 31Mbps As you can see, the results are all over the place and NEVER close to the 150Mbps that I'm expecting. I've read through the forums and have tried different channels on the 2.4Ghz band. I've tried 1, 6, and 11. No apparent difference. Any other ideas?
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203493.88/warc/CC-MAIN-20190324210143-20190324232143-00466.warc.gz
CC-MAIN-2019-13
838
8
http://www.vx220.org.uk/forums/topic/150724-fitting-hid-kit/
code
Fitting Hid Kit? Posted 19 June 2019 - 03:57 PM Would post a pic but uploader says it’s too big! Posted 19 June 2019 - 08:03 PM Ignore this, found my old thread from NA with the wiring colours and instructions on - all fitted just need to find a good way to insulate each terminal from the other one, maybe simple electrical tape but hoping for a better more failsafe option. 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986666467.20/warc/CC-MAIN-20191016063833-20191016091333-00187.warc.gz
CC-MAIN-2019-43
449
7
http://www.pcguide.com/vb/archive/index.php/t-24065.html
code
View Full Version : WINE for AOL 8.0 Plus? 08-04-2003, 02:04 PM Complete noob here. Installed Red Hat 9.0 the other day. Still learning my way around. Question I have is: Is there a windows emulator out there that I can use to run AOL under Red Hat 9.0?? If so, where the heck is it and how do I install it? Dont know about AOL running in Linux.. (didnt think anyone still used AOL! ) Easier than to use emulator is crossover read about / try it here.. Otherwise it may be easier to use VMware & run windows in a VMware app :p 08-04-2003, 02:48 PM Thanks, link doesn't work. EDIT: Got it to work. You have one too many / in the address. Anyway, that plugin apparently supports lots of programs, but not AOL. I'm just about to upgrade to broadband, but thought I would muck around with trying to get AOL to run under Linux, just for grins and giggles. Any other ideas, peoples? 08-05-2003, 01:27 AM You could try shooting yourself in the foot just for giggles:eek: That seems about as much use as running AOL with linux, though I suppose it may be possible to learn something. What that might be is beyond me. 08-05-2003, 03:28 AM You might want to look here (http://www.yolinux.com/TUTORIALS/LinuxTutorialAOL.html) this may help you out. I'm not sure if ths is what you are looking for I haven't had time to read it or check it out myself. 08-05-2003, 10:56 AM Holy crap, Set, looks like that's just what I need. Thanks a million. :) As for your suggestion, pave, um, err, I don't think I want to shoot myself in the foot. Here we go again with people dissing AOL. Ya know, I've been using them for over seven years and never ever had a problem that wasn't of my own doing. I wish people would lighten up on AOL. They're nothing but as ISP to me, I don't use their browser. They also have some good stuff like popup controls, email virus checking, etc. in the latest version. But with that said, I am planning to go with broadband real soon. Just need to get all my home machines networked together first. Anyways, thanks again, Set. 08-05-2003, 11:06 PM I agree BB AOL rocks! hehe... Problems I've encountered were mostly my doing also...except for a modem detection problem early on... I also use a different broswer...however, I rotate between the two to do Google searches... Powered by vBulletin® Version 4.2.2 Copyright © 2015 vBulletin Solutions, Inc. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422120842874.46/warc/CC-MAIN-20150124173402-00129-ip-10-180-212-252.ec2.internal.warc.gz
CC-MAIN-2015-06
2,381
28
http://fforestfachhistory.com/multimed.html
code
I'll use as much variation of media to give a more open appeal and hopefully create greater interest in the subject. This part of the site will hopefully show not just information from the past but also the present, which will then in turn give a more accurate account of tomorrow's history. This area will hopefully make this local history website that much more interesting! I want the website to run on as many computers and operating systems as possible. The only way for understand any problems with the website is for user feedback. Let me know of any webpage problems and I'll do my best to sort them out.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118310.2/warc/CC-MAIN-20170423031158-00214-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
612
4
https://knowledge.broadcom.com/external/article/38143/unable-to-access-openapi-when-authentica.html
code
Receiving SAML2 authentication error or Timeout when accessing OpenAPI at Applies to Performance Manager 2.4+ The API at http://<DA hostname>:8581/odata/api does not support SAML2 authentication Use the QueryBuilder at http://<DA hostname>:8581/odataquery In case you see further Problems with your SAML2 setup you can login with a local CAPC user account that does not authenticate with SAML2. 2. Entered the DAHOST, local username and password 3. You will be logged in and redirected to http://DAHOST:8581/odataquery/index.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710829.5/warc/CC-MAIN-20221201153700-20221201183700-00092.warc.gz
CC-MAIN-2022-49
529
7
https://community.spiceworks.com/topic/1951981-have-you-ever-successfully-on-prem-ad-azure-d-before
code
Mining for knowledge here. How many of you have successfully synced up your on prem AD with Azure, so that you continue to manage your AD on prem, but authentication is handled by Azure? Are your users able to log in to both on prem/on domain resources, and cloud based (O365) resources with one set of credentials? i've synced AD to azure several times but I've always managed it on site with auth handled onsite as well. Azure AD auth has only been for applications like O365. Shortly, we will have a couple of AWS based DC's to consider as well but they'll be regular DC's that are in a different subnet. It just happens that this subnet is AWS. Gary D Williams, I appreciate the intel. Were your users able to VPN in when out of the office? That Is currently my issue. Once AD<->Azure synced my test users: CAN log into on prem/on domain resources, and CAN log into cloud based/O365 resources, with one set of creds. They CANNOT however, VPN into on prem/on domain resources, when remote. As our ASA authenticates VPN logins against our local AD. Do you have any experience getting VPN authentication, and Azure<->AD sync to play together? FWIW, I have had a lot of various documentation tossed my way. I'm doing my best to read thru it, but, I'm not finding my answers, and feels like I'm spinning my wheels. Any intel you may have would be appreciated. Yes, they can VPN in just fine. Auth for the VPN is taken from on site AD. The sync to Azure is one way only. We send data to Azure only for O365 auth. Did your VPN auth break when the Azure sync went in? I'd be very surprised if it was the root cause. Do you have a list of what other changes have occurred since the VPN broke? I'm assuming it's worked previously. So the Azure AD sync didn't cause the problem. Moving a user account to a different OU caused the problem. What GPO's are being applied to the general population OU that aren't being applied to the synced OU? Could any of those have VPN specific permissions that are required for the VPN to be allowed? Nope. We are a fairly small, (but highly effective!) organization. We have 3 GPOs applied, two of which are printer GPOs for different departments. The 3rd is a default domain policy which has basic things like screen lockout time, password history, account lockout, basic stuff like that. No GPO dealing with VPN whatsoever. Mr. Williams, I appreciate the hell out of your guidance here. But, I'm gonna put a pin in this one for the evening. I should like to revisit this soon. Tomorrow perhaps. If it's not a GPO then it's something similar. Azure AD sync won't break a VPN which we've proven because it works when the user is in the general population OU. something is breaking then when the user is in a new OU. GPO is the most likely culprit. I'd have to suggest applying the GPO's to the VPN user OU and seeing if the problem goes away? Gary D Williams interesting. Bear in mind that the general population OU is not sync'd with Azure in any way. The test OU is, for testing purposes. There are no GPOs applied to the test OU, other than the default domain policy. But the default domain policy is also applied to the general population OU. And general population OU can VPN. So, that can't be the issue, unless I am very mistaken. Mike Nichols Don't trust syncing credentials up to public cloud service? I was under the impression that is exactly the point of Azure AD Connect; to sort of 'cloud'n'ize' one's AD infrastructure. According to documentation I have read, Az<->AD connect handles authentication on the Az side, but you manage your AD infrastructure on prem. Going even further Azure has the capability to completely eliminate the need for on prem AD. I wouldn't want to do that, but I understand it is possible to do so. Perhaps it would help if I were to express my desired end state: I wish for all my users to have one set of credentials to rule them all. In the screenshot below, please note that regardless of where the user is, either in the office, or remote, I wish for the user to have one credential to log into their domain PC, SharePoint, the handful of web based sites/apps we have, SkypeForBusiness, O365, and VPN, everything. I don't really care where the authentication is handled; I was under the impression that Az did that once you hooked up Az<->AD sync. But the desired end state is for a user to have one credential to authenticate them all. On another note, we actually have two domains. One is here. The other is sort of a legacy domain at a colo in another state, that still hosts some older, yet still essential functions. I'd like to have thatone included as well. But, one domain at a time, right? Thank yall for any suggestions or guidance yall may provide! It could be something as simple as the TestOU being outside the search base for the VPN's LDAP query. Check if there is a search base on the ASA's VPN configuration, and ensure that the Test OU is in the sub-tree specified by the searchbase. You may (in order to get the test account to work) have to move the Test OU, or expand the searchbase on the ASA.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107889651.52/warc/CC-MAIN-20201025183844-20201025213844-00275.warc.gz
CC-MAIN-2020-45
5,089
27
https://crypto.stackexchange.com/questions/60383/what-is-the-difference-between-ecdsa-and-eddsa/60390
code
As I understand it, both work with elliptic curves, but there seems to be a difference as EdDSA is generally recommended over ECDSA. Partially covered by does TLS 1.3 use ECDSA-Sig-Value encoded signatures for Ed25519 / Ed448? but to add a little, rfc8032 describes EdDSA's advantages as: EdDSA provides high performance on a variety of platforms; The use of a unique random number for each signature is not required; It is more resilient to side-channel attacks; EdDSA uses small public keys (32 or 57 bytes) and signatures (64 or 114 bytes) for Ed25519 and Ed448, respectively; The formulas are "complete", i.e., they are valid for all points on the curve, with no exceptions. This obviates the need for EdDSA to perform expensive point validation on untrusted public values; and EdDSA provides collision resilience, meaning that hash-function collisions do not break this system (only holds for PureEdDSA). ECDSA also has small sizes (4) though not exactly the same ones -- and (all? most?) applications use ASN.1 which is variable size and a little more complicated, although the algorithm itself doesn't require that. ECDSA also has good performance (1), although Bernstein et al argue that EdDSA's use of Edwards form makes it easier to get good performance and side-channel resistance (3) and robustness (5) at the same time. EdDSA also uses a different verification equation (pointed out in the link above) that AFAICS is a little easier to check. Standardized ECDSA does require random per message and fails catastrophically if it repeats for different messages (2); rfc6979 by our very own bear proposes a fix for this but has not been widely adopted, at least not yet. (6) just means the EdDSA standard allows omitting the message hash, which the ECDSA standard officially doesn't but in practice people do anyway, so I consider this difference spurious. For some more on the differences caused/enabled by Edwards form, see: Elliptic Curves of different forms What are the differences between the elliptic curve equations? What is the curve type of SECP256K1? There's also the general effect of EdDSA being newer, which has both real advantages (learn from and adapt to field experience, optimize for modern systems and implementation methods) and spurious ones (more fashionable and gives the impression of being 'in with the cool kids'). Plus there's the effect of Bernstein not being the US government, which some people just distrust and/or dislike, for reasons that are mostly out of scope here.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100172.28/warc/CC-MAIN-20231130062948-20231130092948-00617.warc.gz
CC-MAIN-2023-50
2,511
15
https://next.mirage.io/weekly/weekly-2014-09-16
code
and developer guides Attendees: Marlon Brasil, Marco Cesare, Amir Chaudhry (chair), Thomas Gazagnaire, David John, Vicky Khan, Jon Ludlam, Anil Madhavapeddy, Mindy Preston, Dave Scott and Magnus Skjegstad (with guest appearances from Wanda and Bella). cohttp point release - cohttp has external users and there have been bug-fixes waiting for months. Ideally, would like to cut a release based on master but can't do that without also doing all of the Mirage 2.0 and related libraries (e.g conduit). In order to support the current users, the plan is to roll back and do a point release (e.g 0.11.3 or 0.12.0) that includes these fixes so that others are unblocked. Mirage 2.0 library releases Once these releases are done, we should be able to remove the reliance on the Mirage opam remote. There are about 12 dev repos in there now and since they're working, it would be good to get them properly tagged and released. That would simply a lot of other work as we'd all have fewer things to pin and keep track of and we'd also have to refresh the tutorials. There was some V2, FLOWs and vchan, as well as the conventions we might want to follow for such interfaces going forward. All of this should be written down and various aspects considered and discussed on the mailing list. The issue linked above should be updated and expanded (or a new one created) to keep track of things (including which instructions need updating). Mindy has a cubieboard and can take a look at the ARM instructions again. So far, got it to boot using the images from blobs.openmirage.org. Once there are releases it would be good to get more eyes on this. OCaml 4.02.0 was released a couple of weeks ago and there are some useful features that Mirage might benefit from. We should consider when and how we add support for 4.02.0 but first we should ensure that we have proper support for 4.01.0! There may even be issues with the current 4.02.0 release that may necessitate a 4.02.1. If that's the case, we may decide to not support 4.02.0 at all. We'll see how things stand in due course. There is an outstanding request to get more information up on the Xen.org wiki and it would be useful for us to refresh some of our material. We can do this during the Xen Doc Day (24th Sep). Amir may be able to spend some time on this in advance. A question was posed on the list about development environment for Xen+ARM work (specifically Chromebooks, see the thread). This was raised during the call as this kind of set up may be a useful way of working. Apparently, it's actually quite difficult to work with these devices where Xen is concerned. The easiest way is still to use a cubieboard and work directly from there. We should expand xen-arm-builder to make it easier for people to get going. Hannes is back from travels and will be working on TLS integration. Would be good to remove Xenstore from mirage-platform. This might break things. It's the core coordination in Xen but doesn't work well with Unix. Although, Xenstore is now Xen independent, so maybe we should call it Next call is scheduled for 30th September - Please refer to the mailing list for actual details a day or so in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710931.81/warc/CC-MAIN-20221203111902-20221203141902-00170.warc.gz
CC-MAIN-2022-49
3,177
28
http://www.coderanch.com/t/530699/Android/Mobile/User-interface-experience-android
code
This week's book giveaway is in the OCAJP 8 forum. We're giving away four copies of OCA Java SE 8 Programmer I Study Guide and have Edward Finegan & Robert Liguori on-line! See this thread for details. I have mostly worked on developing front end user interfaces using swing and JSP,HTML , CSS etc. What does android and/or the new book by Lucas Jordan & Pieter Greyling offer with regards to user interface design ? The book presents practical code projects covering user interface creation in almost all of the chapters. We even go as far as showing how to control your Android application's user interface from Lua scripts run by your Java code. Software Architect, Developer, Book Author
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645191214.61/warc/CC-MAIN-20150827031311-00061-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
691
6
https://lu.ma/techladieschicago23
code
Tech Ladies is going on Tour! After spending the last few years online, we’re excited to connect with you in person. We’ve designed this meetup so you can meet great women in tech who share your interests. The space is cozy, the dress code is casual, and the vibes will be 🔥 Rest assured, you will not be standing around awkwardly with a drink in your hand! We’ve got plenty of fun programming and low-pressure networking planned for you. Special shoutout to our friends at dscout for hosting us and making this event possible! How to Join Capacity for this event is limited. Please request an invite if you want to join us! Pro Members will be given priority, and we’ll share remaining invites on a first-come, first-serve basis. Not in Chicago? Check out the full Tech Ladies Tour to see if we’re coming to a city near you! About Tech Ladies Tech Ladies is a worldwide community for women in tech with more than 100,000 members. We provide resources and support for women in tech to learn, network, and grow their careers, including access to an exclusive job board, events, and networking opportunities. Join for free! Our events are open to all genders. Please review our Code of Conduct.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474688.78/warc/CC-MAIN-20240227220707-20240228010707-00771.warc.gz
CC-MAIN-2024-10
1,205
11
http://bimdev.blogspot.com/2012/10/case-add-in-manager-updated.html?showComment=1349978061176
code
- Previously installed tools on your system will be detected and checked as already installed when you run the manager - If you have a strong firewall policy at your office and you've previously seen zero of the tools in the manager, this update might fix that for you! Give it a try and let me know! - We will be unveiling a suite of paid subscription tools this year at AU2012, so the "Activate Subscription" button will remain grayed out until this official announcement... - New snazzy icon (I made it myself)!
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607731.0/warc/CC-MAIN-20170524020456-20170524040456-00574.warc.gz
CC-MAIN-2017-22
514
5
https://gitlab.riscosopen.org/avawer/Wimp/-/commit/8bfdcfc3d688a699769dba5c0eb49ac350281afd
code
Fix a few nasty Wimp bugs Detail: s/Wimp05 (setcaretcoords_fancy), s/Wimp07 - Fix some dodgy comments that had trailing backslashes, causing the next line of code to be gobbled by objasm and omitted from the compiled code. The code in question has been around for a long time, so I guess a recent objasm change (or the switch from aasm) has caused the dodgy comments to turn malicious. The setcaretcoords_fancy bug was the cause of bug #241 in the ROOL tracker. s/Wimp05 (int_set_caret_position) - While testing the #241 fix, I found that opening the filer 'rename' menu, typing text (enough to cause the icon to scroll), and then clicking away to close the menu would cause an infinite abort loop. The cause seemed to be int_set_caret_position mistakenly setting the caret window ptr to 0 instead of nullptr (-1), which would then cause setwindowptrs to die when it tried dereferencing what it thought was a valid pointer. Although initially confused about how this bug has gone unnoticed so far, I've now realised the abort was just down to alignment exceptions being turned on and the code would have "worked" on <=ARMv5. Admin: Tested on rev C2 beagleboard. Fixes bug #241. Version 5.08. Tagged as 'Wimp-5_08' Showing with 19 additions and 18 deletions
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499541.63/warc/CC-MAIN-20230128090359-20230128120359-00793.warc.gz
CC-MAIN-2023-06
1,256
3
https://h5p.org/node/205700
code
Video hotspots and Coursera Hi! I am creating a MOOC course for Coursera. It would be a video-based course and I would like to know if I can use the H5P hotspots feature in my videos so the students can interact with the video lectures. Reporting on completion of the tasks is not relevant to me. The most important feature is the ability to present interactive videos.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00347.warc.gz
CC-MAIN-2024-10
369
2
https://www.namecoinnews.com/vitalik-buterin-lauds-public-participation-in-gitcoin-grants-clr-round-3/
code
Ethereum co-founder Vitalik Buterin recently applauded the public participation in the biggest round of grants, currently open to developers of open-source software projects through the Gitcoin platform. In his recent tweet, he remarked, Great to see more participation in the Gitcoin grants CLR round 3!https://t.co/YT7eja6mnx I recommend people scroll down the page and not just look at things at the top… lots of projects there that deserve support! — vitalik.eth (@VitalikButerin) September 27, 2019 With this initiative, nearly 90 projects, which are focusing on the diverse blockchain aspects of security, scalability, UI/UX, education, and DeFi, are in time for financial investment. Gitcoin was launched on the Ethereum blockchain last year as a reward platform, by making it easy to get remunerated for solving Github issues. Gitcoin Grants, as of date have distributed over half a million dollars with support from ConsenSys and Ethereum in connection with donations from Individuals; which are now utilizing a mechanism called as Quadratic funding to distribute 100,000 dollars of funds to coders, with an open-source group-valued depository. After the launch in 2017, Gitcoin has developed into one of the most important factors between open source communities and growing blockchain, and have added several thousands of developers into the Web3 world. Moreover, it has been launched on the Ethereum ecosystem which comprises of Kudos, Bounty, Grant, and Codefund and created over 1 million dollars in value on the platform. Also, Ethereum presents opportunities to present incentives which are available to the developers in the ecosystem. By adding the rights of the stakeholders straight away into the smart contracts, developers are encouraged to provide value and cases are handled without needing to involve legal enforcement methods. At first, Gitcoin anticipated the use cases to be built on the Ethereum ecosystem. Further, the remuneration for developers was paid in ERC-20 tokens. Besides, public grant applications were shared with the Ethereum community fund, the Ethereum Foundation, and other supporting bodies as a mechanism to study the projects and their predominance. In the past few weeks, Gitcoin declared a radical analysis in open source funding. By using a similar method defined in Liberal Radicalism, a paper from Vitalik Buterin, Glen Weyl, and Zoe Hitzig, Gitcoin declared a 25K dollars fund to match the contributions, which are made to 25 Ethereum infrastructure ventures.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655921988.66/warc/CC-MAIN-20200711032932-20200711062932-00550.warc.gz
CC-MAIN-2020-29
2,518
10
https://docs.improbable.io/unity/alpha/content/mobile/overview
code
Mobile Support Overview Before starting with mobile development, make sure you are familiar with Developing SpatialOS games for Android and iOS The SpatialOS GDK for Unity contains a mobile feature module which enables you to develop games for Android and iOS. SpatialOS games are cross-platform by default, so Android, iOS, PC, Xbox One and PS4 users can play together in the same deployment. All feature modules work with mobile devices. Getting started with your Android client-worker - Setting up Android support for the GDK - Choose the right way to test your Android client-worker - Connect your Android client-worker to a local deployment - Connect your Android client-worker to a cloud deployment
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202872.8/warc/CC-MAIN-20190323141433-20190323163433-00388.warc.gz
CC-MAIN-2019-13
704
10
http://askubuntu.com/questions/257565/cannot-mount-usb-disks-due-to-not-authorized-error
code
I am experiencing the same issue in the same scenery, modified my Ubuntu 12.04.1 LTS in order to start in console and I start my XFCE via startxfce4, the same problem mounting external drives/usb. Hope someone drop an answer for a fix. Meanwhile, I deliver this workaround for future reference: We can gain access to the unmounted usb/external drives by dropping the next command in a terminal. sudo -S palimpsest I know that we should use gksudo instead of sudo but if you do it that way you'll receive an error as in the next screenshot: After providing our user password, the Disk Utility will be presented so that we can choose the drive/usb memory that we wish to mount and gain access to its files via file explorer (nautilus or any other) for read/write. BUT! For that purpose we need to click in the link provided in the lower right corner with the label "Mount Point: Mounted at /media/DriveName" This also works for my additional SATA Drives, which got compromised after the change that I made to my grub in order to boot in console (text) mode. No. This change isn't reverted by removing the changes I made to my GRUB. Let's wait for an answer and meanwhile I hope this works for you the same as it does for me and may help future visitors.
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393093.59/warc/CC-MAIN-20160624154953-00049-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
1,251
11
https://deal.savemyrupee.com/ebay-india-electronics-sale-upto-76-offer-32822/
code
Ebay India Electronics sale - Upto 60% offer Offer Live Till -23-Jun-17 to 31-Dec-17 Offer Live Till - 23-Jun-17 to 31-Dec-17 Upto 60% offer on Ebay India Electronics. Shop from the various categories like Mobiles, Laptops, Cameras, Televisions, Tablets, Storage Devices and more. Pick from the different brands like Apple, Canon, Dell, HP, HTC, iBall, JVC, Lenovo, Micromax, Nikon, Samsung, Seagate, Sony, Western Digital, etc, at Ebay India.
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320215.92/warc/CC-MAIN-20170624031945-20170624051945-00506.warc.gz
CC-MAIN-2017-26
443
5
http://www.experts123.com/q/what-is-the-best-way-to-take-book-and-class-notes.html
code
What is the best way to take book and class notes? My primary advice is that, no matter how hard it may seem, you just keep taking notes during lectures and reading. By urging yourself to practice note-taking at all times, your skills will develop naturally and will become habit. I am not formally a student anymore, but often when I sit down to read or watch something educational on TV, I have the urge to grab my notebook and start jotting down the information that interests me. You should start by bringing a notebook to every class. Practice following the lecture closely (usually the most difficult part of taking notes). A good first step is to jot down any definitions that the instructor gives. Also practice trying to summarize the main idea of the lecture and jot that down at the top of the page. Don’t just copy down whatever the instuctor writes on the board or the overhead projector – this is not really note-taking – although if you find that’s all you do for a while, be satisfied that at least you’re writing. Feel free to use a l
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657131734.89/warc/CC-MAIN-20200712051058-20200712081058-00507.warc.gz
CC-MAIN-2020-29
1,061
2
https://superuser.com/questions/1437326/how-to-use-vpn-on-host-computer-in-windows-10-vm
code
So I'm new to networking (I do understand the basics though), but I'm also retarted af. I want to basically use a VPN I have installed on my host machine to encrypt and change my location on my vm. (I'm using virtual box, and have installed the vpn tunnel bear) So I have no idea what I'm doing, but I'm guessing I need to make some sort of network with my host computer as like the router? But I literally have no idea what I'm doing, or how I would set that up. I'm currently using a bridged adapter. I tried using the TunnelBear adapter V9 but it didn't work. btw I have the trial version of tunnel bear, if that makes a difference. If anyone even point me in the right direction as to where I should online go to learn about how this works, that would be awesome.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257845.26/warc/CC-MAIN-20190525004721-20190525030721-00353.warc.gz
CC-MAIN-2019-22
767
3
https://askubuntu.com/questions/192374/how-can-i-disable-the-faded-title-text-in-the-top-panel
code
So I'm new to Linux but am basically blown away by Ubuntu 12.04 and could definitely see this becoming my main desktop over time One small annoyance for me is a tendency for the global menu on the top bar to partially over-write the text description of the active window in the top panel. e.g. I focus on the "Ubuntu Software Centre" window which writes out that label in the leftmost corner of the top menu bar. If I then move the cursor up to the top menu bar to access the "file menu", this will partially overwrite the window name leaving just "Ubuntu" visible. This is a little slice of ugliness I don't want to see every day! Much easier on the eye for me would be to display the active window name at the centre of the top panel, using some of that free space and then have the global menu stay where it is, just to the right of the app launcher. I've found a solution to disable the global menu but I would prefer to keep it and instead move (or disable) the active window name in the top panel. Any way to do this?
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818464.67/warc/CC-MAIN-20240423033153-20240423063153-00776.warc.gz
CC-MAIN-2024-18
1,023
6
https://rprogramminghelp.xyz/science-machine-learning-20983
code
Science Machine Learning Many people will express themselves by email in an online form, we’d prefer not to do so. I write poetry like most people do online, and I aim to inspire people not to feel threatened by the web. I am not against big news, pop culture, video games or movies. I am for public service announcements and the social design of the world. I don’t focus on one particular blog, but I do have a personal blog ‘Write Better Browsing.’ I maintain this website by watching poetry, composing, writing and reviewing submissions to illustrate. In the last few weeks we have learned that, during a busy year, we are having some data leak data from a data centre, an ISP, having a leak, seeing other traffic coming through, an account type and many other leaks. In some cases the first leak comes from someone’s email, and so a third leak could be several months or many years earlier. Clicking Here email has been bad for several reasons, but their own concern came last Fall, when the data ran out of patience, the last leak was triggered for a couple of months, the accounts were emptied and then never returned. The emails have been broken, the data was of critical importance to the breach, and the number of accounts has been leaking continually. We had a lot of time, effort and time worked back and forth between these two dates… We are launching into a new research process, I think it’s time to get busy with it. My initial search has yielded the following result: A recent revelation as to the potential health risks they are exposed to can – when exposed, as the data leak has. This has been investigated thoroughly and has shown to be a major aspect of how the data will be used to carry out actual research, they were deliberately leaking personal records of many people; and they have – which are also linked to this document – felt likely in their data. Help In R Programming The process has also resulted in an identification (not a link) of people who should not be part of the research process. I thought I had told you about the research, the current data, and how it will be used to develop a research hypothesis, and how it will be conducted. I have continued though – for something as basic as a blog – to turn the data into journalism in the hope that at least I would avoid the ‘perception of the process’ from others. A great website, great concept to build a website, but I worry a lot about data leaks, and think of ‘forgets’ to me as common sense. I write a lot of poetry about it and would appreciate suggestions from you – and as well as some other visit our website who might be using it. It’s amazing that people can report as so many people using my site in their daily work in research. 1 Post a Comment on Reddit Just to clarify, we do not tell everyone (individually, or even by email) when the data might be leaks or if they should. We do not tell the public in general about the nature of data leaks. I published around two dozen different entries, and the same data being leaked all over the internet is somehow more likely to be present at larger sections than the three I wrote on my blog. To the readers I hope to hear feedback (rather than just one post), andScience Machine Learning An ordinary machine learning (a.k.a. machine learning machines) is a well studied field that has gained a lot of popularity in recent years. Help With R Programming Homework Free This field usually has won the attention of other machine learning fields like ML, statistics, and artificial intelligence which use techniques like neural networks but also learned from learning methods like Bayesian hypothesis testing (BH) and more. AI tools that are not yet in the development of the field are rapidly replacing the AI tools that are with those that continue to dominate this field. Machine Learning In artificial intelligence and machine learning machines there is always a need to understand human biases which are reflected by machine learning tools. Machine learning is about understanding human biases not just by studying them but also by discussing them to understand their utility in the field. A popular machine learning hypothesis about biases is that it is different from human biases in that it is useful and could therefore be useful even more in the understanding of the applied technology. One way to help understand human bias is to use machine learning by designing machine learning methods including, by learning a deep feature embedding in such a machine learning machine. A popular device for deep learning is Deep Learning Lab. Common Deep Learning Lab method is the PyTorch Deep Learning or the CNN. machine learning might be used in many different ways including machine learning by learning a deep feature embedding or image feature embedding. It can be used to learn new deep features in certain situations and it can help to modify the work/practice of the machine learning. Machine learning in Artificial Intelligence An AI tool in artificial intelligence like ML aims to learn artificial neural net. Machine learning maybe in different domains like click reference C++, Python, SQL, etc. Instead of testing hypothesis to see whether a machine is running without some feature(s), this could be of to make sure that it is. Homework Online Help Neural Networks By following Neural Network methods, artificial intelligence is divided into two groups. Artificial neural networks have been for years and the concept of neural networks is one of them. Artificial neural networks with a non-deterministic learning algorithm might get the job of learning how artificial neural network works. Artificial neural networks using a reversible neural network designed but using random assumption might try more to achieve that. In artificial intelligence, many layers have evolved. The most popular elements are the hidden layer, attention mechanism, or neural activity. There are also models such as the SIFT, GAN, PFFV, softmax, convolution with probability weight decay etc. Artificial neural networks has a wide variety of algorithms so it Rstudio Online sometimes be used as a tool for learning algorithms like classification or neural network. For the use of machine learning algorithms that requires such explanation about it, and to be effective in practice, it is necessary to understand the advantages and disadvantages of each one. Machine learning can help with differentiation the training process and many other issues of the network architecture. An example of the advantages is that network training algorithm may be given the same training samples as different systems are trained like and tested on. With those advantages, a neural network may only go through a training sequence and run on different inputs may not share a similar training data in learning curve. Deep learning methods include features learning (DFL), advanced features (AVR), face detection learning methods (FSL, CIFAR10, Q-learning), rule-based learning methods (RPL, CIFAR6), and many others for the input data. Machine Learning in Deep Learning Within deep learning, several types of pre-trained models are available or can be trained using neural networks. Deep learning methods are used for many reasons like image/video classification, classification task planning, etc. Machine learning methods like classification have the role of identifying the model to be evaluated. The most popular deep learning methods include deep learning models like neural network (NL, FPGAs, etc.), multi-task learning (MTV, DL, etc.), deep learning methods like deep neural networks (DNN, CNNs), deep learning methods like deep fusion methods (DFT), etc. Deep CNNs have a deep learning model which have learned how to test some new objects or predictions on their own, while deep neural networks feature detection (DNNF, Lnn, etc.) does not require that they classify the classifications. Recently artificial neural networks like ConvNet(v0.Science Machine Learning Step 3 Use a graphical interface to query the most common databases Step 4 From the official web site (docs/site/software/database-workflow/database-workflow/database-workflow/, [link to homepage])/books/978-047407-380-0 The Database Developer (dbs-wiki/index.dbs), you can check out the complete overview in the official bookshelf (website) and the full documentation for the database workflows, you’ll find useful information on workflows and the available tools R Studio Tutorial the official database repository from Help In R Programming (dbs-wiki/index.dbs)/ **Note Please do not modify this presentation of the database workflows to the bookshelf on-line, however any changes should be made in the later editions and in a separate meeting for each webdesign form. The books table shows a pairwise view of the XML response in the PDF file in Table 1 [link to homepage]/book, where the second line of the first table does not contain a lookup value. Substitutions We use Substitution 1 as a convenience for writing the database workflows, thereby avoiding the more common SQL query that can be made available via the bookshelf. Substitution 2.1 is most mature, and its descriptions and descriptions have changed slightly as of 2012 [link to story]. The site source code sources of both Substitution 2.1 and the books tables in subsys, which may be saved and used for individual software workflows, are here for use in particular for individual changes. Below is a comprehensive snapshot of the XML response that is generated with the SQL script below with the most recent changes to Substitution 2.2, at the time of writing. Facts As with any program and book, SQL cannot find and write to all types of data. An XML response includes many text formats, and thousands of rows into an XML file with a URL address. As a result, database workflows are often very complex. The SQL for a database task consists of two parts. The first is the XML file’s definition, text read, insertion, and error handling. The second is a list of data types used in the XML response. See the web site for resources. A few minor details to add to the record, such as the database size for an accuracy checker, are presented in the section below. Add [link to homepage]/book/978-047407-380-0 The Database Workflow – Source, and to the database workflows are available on [link to homepage]/book/978-047407-380-0 Upgrading from Chapter 11 During this major change, the installation of [link to homepage]/book/978-047407-380-0 upgrade to Chapter 11 of the bookbook of database workflows is very much an exercise in work. 4 INPUT
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337803.86/warc/CC-MAIN-20221006092601-20221006122601-00386.warc.gz
CC-MAIN-2022-40
10,639
11
https://www.pcworld.com/article/411275/microsofts-vision-for-linkedin-is-about-tying-its-business-data-into-office-and-other-services.html
code
Now that Microsoft’s massive $26.2 billion acquisition of LinkedIn has officially closed, it’s time for the next step: figuring out how its massive store of business information can best be used by Microsoft and its customers. Building upon the company’s integration plan outlined earlier this year, Microsoft chief executive Satya Nadella laid out a set of plans for short-term integration with LinkedIn (in a blog post on LinkedIn, natch), with advantages for both consumers and business customers. Perhaps the most interesting will be closer ties between resume functions in Word and in LinkedIn, so that users drafting resumes in Word will be able to update their LinkedIn profiles automatically. Nadella suggests that LinkedIn updates will propagate through Windows 10’s Action Center, and that your LinkedIn identity will be used in Outlook and in Office. Business customers will be able to benefit from LinkedIn Learning online education, available as a feature of the paid Office 365 subscription. LinkedIn Lookup—a competitor of sorts to Microsoft’s Delve, which aggregates information about your colleagues and contacts—will be integrated into Office 365, Nadella wrote. LinkedIn’s Sales Navigator will be tied to Dynamics 365, as an aid to what Nadella called “social selling” to customers. Finally, there’s the content angle. Interestingly, Nadella said Microsoft plans to open a “business news desk” across its content ecosystem and MSN.com, possibly providing its own branded media content. Unfortunately, there’s a downside, too: “extending the reach of Sponsored Content”—read: advertisements—”across Microsoft properties.” Why this matters: Microsoft clearly bought LinkedIn with the goal of adding to its store of digital intelligence, specifically business intelligence. Some of that will bubble up fairly quickly to consumers, such as the Word-LinkedIn integration. But the deeper, more powerful goals involve analyzing business trends and providing Office 365 subscribers the knowledge they need to get their jobs done. That’s more difficult to achieve and measure, but will probably be the true test of whether that $26 billion was worth it in the end.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00398.warc.gz
CC-MAIN-2023-40
2,216
6
https://forum.xda-developers.com/showthread.php?p=51259198
code
1. will no longer turn on by knock on. (knock off works) 2. when i push the power button on the back about 75% of the time the screen turns on then immediately turns off or turns off as soon as i touch the screen. I have to push it a bunch while touching the screen to get it to stay on and let me unlock it. 3. pulling down the notification bar from the top only pulls down partially then closes a lot of the time. I have tried: 1. Uninstalling a bunch of apps, no success. 2. did a data reset and wiped everything. no success. When i first went into TWRP i tried to do a factory reset and it just sat there with an error that i could not mount the cache. Then i rebooted, went back in and this time did a data wipe and typed "yes" to verify. It got stuck trying to do that as well, but this time when i rebooted it was reset and i had to reenter all my account settings etc. But it is still having the same issue. I am wondering if there is something in the cache thats causing it and i wonder if it did not wipe the cache when it wiped the data. At this point i just want the phone to work but not sure why TWRP is having issues. Has anyone else had any of these issues? Can anyone help with these issues? I wouldnt mind flashing the VS98011B rom but i am not sure TWRP is working correctly and want to make sure it works right before i try to flash a new rom. Should i use CWM? if so how do i get from TWRP to CWM? i need some help. Any advice is extremely appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890187.52/warc/CC-MAIN-20180121040927-20180121060927-00595.warc.gz
CC-MAIN-2018-05
1,473
10
http://nexentastor.org/boards/1/topics/261
code
Atom D510 performance? I am planning to build a small SOHO NAS based on Nexentastor CE. Does anyone have any experience with Atom D510 based solutions? I am talking 2-3 computers running against the NAS so nothing very fancy. Some TimeMachine backups. So I do not need 100MB/sec :-) But it would be nice to have it. :-) I was thinking about 4 hard disks, 4GB, software based ZFS/Raid. Maybe later on a PCI-E based SSD as cache. RE: Atom D510 performance? - Added by Mike H over 4 years ago I have found (using NS 2.X Developer Edition) that ZFS is actually somewhat hungry for CPU cycles. It does a lot of hashing internally and according to a talk I heard by Jeff Bonwick (ZFS architect) it is designed for the world of cheap computes and expensive disk accesses. My box runs on a low-end dual core athlon (LE1640? something like that w/ 4GB RAM) and I do see the CPU peak out at 100% regularly when streaming reads and writes. I see an average of about 30MB/s when reading/writing large files. Aside from that, I built my box in 11/09 and it has been rock solid so far. Have fun with this project!
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122220909.62/warc/CC-MAIN-20150124175700-00112-ip-10-180-212-252.ec2.internal.warc.gz
CC-MAIN-2015-06
1,099
7
https://gis.stackexchange.com/questions/19735/issues-to-be-aware-of-running-arcgis-desktop-on-mac/19745
code
I still have to resort to ArcGIS in a virtual machine from time to time on my Macbook, and have experimented with performance issues over the years. As @Chad Cooper mentions, XP will feel very snappy indeed ... so does Win7 but it's worth taking the time to tweak it (get rid of Aero, replace the default 'find' with 'everything' app, etc; lots of advice about that online). As far as the windows VM is concerned, it has its own hard drive and the Mac doesn't exist - but the VM software lets you share folders which appear as network shares. As far as performance goes, the interface with the file system is, indeed, your biggest issue. The most convenient way to work with your data is to keep it all in a shared folder within your Mac filesystem, so that files are accessible to both. That's a great way to keep track of your data, particularly when using something like GISLook to preview rasters and vector data in OSX. HOWEVER ... you take an enormous performance hit when the VM is accessing files on a shared directory! When testing GIS operations in a not-terribly-complex project (2 DEM rasters, 20-30 simple shapefiles), both calculations and display were affected by the location of the files: - Shared folders - 40 seconds to run operations; - Shared folders MAPPED as drives within XP - 15-20 seconds; - All GIS data in the virtual drive - 5 seconds. This was with VMWare 3.x 18 months ago or so - but things change, and I hear the performance of both Parallels and VMWare and Virtualbox are much improved in comparison! My current solution: I have a "Data" D:\ drive which is a virtual hard drive (VirtualBox) that mounts with the C: system drive - I synchronise the data directories with shared folders on the mac to keep things tidy. Keeping the D drive separate keeps its size down and lets me back it up separately in Time Machine. Tip: create a 'sparse image' in Disk Utility, and create your virtual hard drive inside it. Let Time Machine back up only that image, not the main C drive (main VM file). "Sparse disk images" are interpreted differently, and only the individual blocks of data that have changed get Time Machined on backup, instead of the whole giant file.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703507045.10/warc/CC-MAIN-20210116195918-20210116225918-00793.warc.gz
CC-MAIN-2021-04
2,190
10
https://sparkdatabox.com/blog/synchronization-in-java/
code
Synchronization is a mechanism in Java that ensures that only one thread can access a shared resource at a time. It helps in avoiding race conditions, which can cause unpredictable and incorrect behavior in a multi-threaded environment. There are two ways to achieve synchronization in Java: - Synchronized Method: You can declare a method as synchronized by using the synchronizedkeyword. When a thread invokes a synchronized method, it acquires a lock on the object that the method belongs to. The lock is released when the method returns. Only one thread can execute a synchronized method on an object at a time. - Synchronized Block: You can also synchronize a block of code instead of an entire method. This is useful when multiple threads need to access different parts of the same method, but you want to synchronize access to a shared resource. It’s important to note that synchronization has an overhead, so it’s not always the best solution for performance-critical sections of your code. When possible, you should use synchronization only to protect critical sections of your code and use other concurrency mechanisms, such as atomic variables or lock-free data structures, to increase performance. java Training with placements in Coimbatore will help students to understand the object-oriented programming in a better way. They will get an understanding of how to write a program using Java. The course also includes a session on how to debug programs written in Java. Static Synchronization in java Static synchronization in Java is a mechanism to synchronize the execution of a block of code by multiple threads on the class level instead of on the instance level. In other words, it ensures that only one thread at a time can execute the synchronized code of a particular class. A synchronized block can be used to control the access to a shared resource in a multi-threaded environment. When a thread enters a synchronized block, it acquires a lock on the class object, and any other thread that tries to enter a synchronized block of the same class will be blocked until the first thread leaves the block. Here’s an example of how you can use static synchronization in Java: In this example, two threads MyThread2 are executing the same printTable method. However, the method is declared as synchronized, so only one thread can enter the method at a time. The lock on the class object is used to control access to the shared resource, ensuring that only one thread at a time can execute the
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646457.49/warc/CC-MAIN-20230531090221-20230531120221-00215.warc.gz
CC-MAIN-2023-23
2,514
15
https://www.mapd.com/platform/core/
code
MapD Core is an open-source SQL engine architected on GPUs. MapD Core exploits the parallel processing power of GPU hardware to query billions of rows in milliseconds using standard SQL. Because the MapD Platform leverages the full graphics pipeline for server-side visual rendering, its visual analytics are far faster and more responsive than technologies that execute queries on the GPU but then render them on CPUs. |Query 1||SELECT cab_type, count() FROM trips GROUP BY cab_type;| |Query 2||SELECT passenger_count, avg(total_amount) FROM trips GROUP BY passenger_count;| |Query 3||SELECT passenger_count, extract(year from pickup_datetime) AS pickup_year, count() FROM trips GROUP BY passenger_count, pickup_year;| |Query 4||SELECT passenger_count, extract(year from pickup_datetime) AS pickup_year, cast(trip_distance as int) AS distance, count(*) AS the_count FROM trips GROUP BY passenger_count, pickup_year, distance ORDER BY pickup_year, the_count desc;|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889917.49/warc/CC-MAIN-20180121021136-20180121041136-00449.warc.gz
CC-MAIN-2018-05
964
5
https://forum.gsa-online.de/discussion/1264/automation-options
code
I was wondering if there is the possibility of adding some automation options to GSA? For example, if I were to automatically create some project files using a script - is there any way I can trigger GSA to automatically start the specific projects I created without having to do this manually? I'm aware that we can use: "GSA_Search_Engine_Ranker.exe -autostart". To start any projects already active but it would be great if we could start projects which are added to the folder by other means.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107878662.15/warc/CC-MAIN-20201021235030-20201022025030-00521.warc.gz
CC-MAIN-2020-45
496
4
https://www.lyricsfreak.com/r/ry+cooder/i+got+mine_20120133.html
code
(C) - (F) - (G) - (Am) (C) And I went down to a big crap game, 'Twas (F) certainly against my (C) will. I lost every doggone nickel I had But a (G) greenback dollar bill. (C) Forty dollar that laid on the floor My (F) buddy's point was (C) nine Well, the (F) police they come in there And (Am) caught all of 'em But (C) I (G) got (C) mine. I got mine, let me tell ya (F) I got (C) mine. I grabbed that money Out the back door (G) I went flying Well, (C) ever since the big crap game I've been (F) livin' on chicken and (C) wine. I'm the (F) leader of so (Am) ciety Since (C) I (G) got (C) mine. I know a barber shop It's a way cross town Down on Norfolk street It's the only place on a Saturday night That us gamblers gets to meet Some comes for a haircut And others come for a scrap And when you see me and my buddies up there, man We means to shoot some crap Hollering: "Seven, eleven, won't you come, come, come!!! If you don't seven, eleven them You're done, done, done" If I see the police before he sees me I'm gonna run, run, run I'm the leader of society Since I got mine Well, I went down to my best girl's house The hour was just about nine I wasn't dressed up like Henry Ford But I was feeling just as fine I caught her sitting on another man's knee And I didn't like that sign Well, I told them what I thought about it, boys And I got mine I got mine, I got mine I grabbed my hat and through the window I went flying I ran as fast as I could run But I didn't get there in time Because the rascal grabbed a shotgun, Lord And I got mine
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948765.13/warc/CC-MAIN-20230328042424-20230328072424-00508.warc.gz
CC-MAIN-2023-14
1,546
49
http://dev.bukkit.org/server-mods/arenafutbol/
code
Futbol is a soccer plugin for Bukkit using the BattleArena API. Players can left-click and "kick" an item or "ball" into a goal to score points. After a team scores a goal they will not be able to kick the ball for a configurable amount of time, or until the opposing team touches/kicks the ball. The team with the highest score at the end of the time limit wins. Rewards can be given to the winning and losing teams. Players can form teams, and even join tournaments. If the arena is in use, the players are kept in the queue and will join when one opens up. Server admin have the option of using BattleTracker to track win:loss records. - Put BattleArena.jar into your plugins folder. - Put ArenaFutbol.jar into your plugins folder. - /fb create <arena name> [teamsize] [# of teams] Create arena and set team 1 spawn - /fb alter <arena name> 2 Set team 2 spawn - /fb alter <arena name> 3 Set center of field for ball - In the goal team one is shooting at place stone bricks under wooden pressure plates - In the goal team two is shooting at place mossy stone bricks under wooden pressure plates - /fb join - /arena leave - /af ball <ItemId> Set the ball item by its item id. - /af balltimer <Seconds> Set how long a team cannot kick the ball after a goal. - /af pitch <int> Adjust angle of kick must be between 0 and 90 degrees. example: /af pitch 15 - /af maxpitch <int> Set max angle of kick must be between 0 and 90 degrees. example: /af maxpitch 90 - /af power <double> Set power of kick must be 2.0 or less. 1.0 = 100% example: /af power 1.4 Source files are included in the .jar file and the latest version is on GitHub. - Date created - Nov 27, 2012 - Last update - Apr 30, 2013 - Development stage - GNU General Public License version 3 (GPLv3) - Curse link - Recent files
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698222543/warc/CC-MAIN-20130516095702-00011-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,782
24
https://www.freelancer.com.ru/projects/internet-marketing/smo-for-computer-education-institute/
code
Computer institute and test center for Microsoft Office, Adobe, MTA and conducts training for Microsoft Excel 19 фрилансеров(-а) в среднем готовы выполнить эту работу за ₹3176 Hello Dear, I have read your project description carefully, Ping me for more discussion about your project. I will help you out Regards Hire SEO Engineer Hi there! I professionally provide Social Media Optimization (SMO) service. For this work, I have more than a year of experience. If you offer me this project, I would like to do it as per your expectations. I am managing many social media projects and generating some good amount of potential leads organically. I will do work for your education institute and give reach out to your potential students who are interested.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998607.18/warc/CC-MAIN-20190618043259-20190618065259-00026.warc.gz
CC-MAIN-2019-26
800
5
https://forum.duolingo.com/comment/20451020/There-is-no-proof-of-that
code
"There is no proof of that." Translation:Δεν υπάρχει απόδειξη για αυτό. Not exactly. Ένδειξη is more of a clue, an indication. So, that fact that someone may have a clue doesn't necessarily mean that they have proof, no? ^.^ That's good to know, I had originally learned the two as being almost interchangeable. Thanks Dimitra! And it's actually pretty common to say "Είναι απλά μια ένδειξη, δεν αποδεικνύει κάτι" Thank you! RE ένδειξη/απόδειξη, I have to unlearn what I originally learned in someone else's Memrise course now ;-) Quick question, while you're here: for αποδεικνύω (and the other -δεικνύω words), is the -δείχνω or -δεικνύω variant more commonly used? My dictionary seems to prefer the former but I've only been seeing the latter lately. Well... Personally, I think I've only used δείχνω exactly as it is. :P For all the rest, the -δεικνύω variants are the ones to go with. ^.^ Thanks Troll and Dimitra! I'm using the Oxford Greek-English dictionary by Stavropoulos, and that's not the first time that it's preferenced versions that I've later found out aren't commonly used.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202872.8/warc/CC-MAIN-20190323141433-20190323163433-00227.warc.gz
CC-MAIN-2019-13
1,218
9
https://forum.facepunch.com/t/why-cant-i-load-rust-anymore-the-game-has-crashed-crash-report/219550
code
Recently every now and then Rust will decide it doesn’t want to load, and gives me this error http://i.imgur.com/mYgn2oO.png So far, the ONLY was I can fix it is to restart my PC and try to load Rust again. Here is the crash report: http://pastebin.com/ckx8tKad I never used to have this problem until about a week ago… this is REALLY annoying! [editline]16th February 2016[/editline] Note: Restarting Steam does not fix it. Also, verifying the game cache doesnt work either.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530553.34/warc/CC-MAIN-20220519235259-20220520025259-00325.warc.gz
CC-MAIN-2022-21
479
7
https://physik.uni-greifswald.de/ag-melzer/forschung/stereo-toolbox-documentation/
code
Documentation / Guided Example of the 3D Particle Tracking Toolbox for MATLAB® The usual entry points to this toolbox are the "do_*.m"-scripts in its main path. These should be opened with an editor and a copy of these scripts should be placed in each "measurement"-folder. Firstly, edit the parameters in the script. Afterwards, run section-by-section of the script from the matlab editor. Note: The "settings"-structure is used as a parameter by many functions. If you use only a single part of the toolbox, consider possible errors as a missing information in the settings-structure (e.g. path information). Also, have a look in the earlier entry scripts, if some field in the settings file is missing. UPDATE: To run the "Shake-the-box"-type example, go into the "EXAMPLE_STB" folder and run the do_EXAMPLE.m - skript. imageLocations = locateCalibImages; settings = autoCalibSettings_GUI(imageLocations); ...then save the settings-file to disk (i.e. cameraX.mat) ... !! Repeat for each camera. cameraSystem = calibrateFromTarget(); This will ask for the N files you saved to disk. Taking target images: You can find the target pattern in the calibration folder of the toolbox in the *.ai, *.eps and *.ps format. The cameras must capture the target image synchronously, but the target image does not need to be visible in all cameras at the same time. Usually it is sufficient to record about 5 images for each pair of cameras looking at the target. For three cameras this makes >15 images. More images give better statistics. A dot pattern is far more accurate than a checkerboard-pattern especially when unsharp images are captured since the centroid of a blurred marker dot is still very accurately determined. Process the target images: In the image on the right, the image processing GUI is shown. The most important settings are: - MinObjectArea (place a value < the size of your target dots) - BarSizeThreshold (objects larger than this will be considered as a "bar" (red cross) and not as a "marker" (green circle) - Bar Mode (helps the GUI to find the correct positioning of the two bars) After a successfull "Show Preview Detection", check the "active"-checkbox and continue to the "Next" frame. When the target cannot be analyzed in a certain image, uncheck the "active"-checkbox. When you are done with all images, simply close the GUI and be sure to save the results! To reduce numeric errors in later stages, the cameraSystem variable should be aligned in such a way that the world coordinate origin lies within the reconstruction volume. From the calibration algorithm, by default, camera 1 is the coordinate origin and all other cameras are located accordingly with respect to camera . To move the world coordinate origin to the reconstruction volume , two methods are available presently, namely cameraSystem.alignSystemPFC and alignSystemRectangular. Have a look into the routines to align the system in your own manner (and mail me the code so that I can include it). 2D-Particle Position Detection settings.cam1_filename = './particleImages/rot/rot%05d.bmp'; settings.cam2_filename = './particleImages/gelb/gelb%05d.bmp'; settings.cam3_filename = './particleImages/gruen/gruen%05d.bmp'; settings.output2Dcoords = './coords/coords2d_%05d.dat'; settings.im_range = 1:10; settings = image_file_check(settings); The following collects the appropriate settings: settings = particle_detection_GUI(settings,1); settings = particle_detection_GUI(settings,2); settings = particle_detection_GUI(settings,3); Start the actual detection do_detection_2D(settings, 1); % the second argument triggers an graphical output The 2D-detection uses a Gaussian bandpass filter to detect the particles while suppressing noise. The optional Sobel-filter is applied before the particle detection. It is very useful to detect the locations of unsharp particles. Just figure out what is suitable for your application. To test the results for pixel-locking use the "showSubpixelMap(settings, frameNumber)"-function. Disparity-based Calibration Refinement This contains all necessary parameters and includes an iterative refinement of the epipolar line distance. Open it in the editor and have a look at the parameters. Usually, even if you take special care, there will be slight deviations between the calibration state and the measurement state of the camera system. In our case, the deviations of ~1-4px have been observed which have been identified to be pure translational effects. The focal length and other camera parameters remained very constant during the measurements. Thus, this calibration refinement procedure allows each camera to be translated (not rotated) along its sensor-plane. For the sake of reproducibility, this is done by altering the principal point (u0,v0) of the intrinsic camera parameters. A correspondence analysis with very large epipolar-line distance is performed (e.g. when the expected deviation from the epipolar line is about 5 px, the allowed epipolar distance is set to more than 10 px) . This creates many erroneous 3D-points, but also the fewer correct correspondences. All these points are back-projected onto each camera. The disparity between the reprojected 2D-point and the initial 2D point from particle detection can then be used to find the translational (2D) shift of the camera: All disparities are computed and sorted into binned regions of the image by its 2D-image position. Each disparity-vector is then represented by a Gaussian blob in a virtual "disparity-map". All of these blobs for each reprojected point are then summed up to create a final disparity map for each camera. The possible shift of the camera is then indicated by a deviation of the disparity map intensity from the cell center. Sometimes, there is no good statistic in some regions of the images, so the user decides what "cells" of the disparity map should be considered for the detection of the camera shift. settings.params_3CAM3D.epipolar_distance = 0.9; settings.output3Dcoords = './coords3d/output3d_%05d.dat'; threeCam3D_alg(settings, cameraSystem, 1); - cameraSystem as returned from the calibration routine - last input triggers plot number vs. frame The correspondence analysis looks for particle correspondences in three cameras. The following will be done for all permutations of the camera numbers (123, 231, 312,...): - select particle a in camera 1 - project epipolar line l'a to camera 2 - find candidates that lie in the "epipolar-distance" to this line in camera 2 - project the lines l'a and l''a to camera 3 (from camera 1 and camera 2) - if a particles is located near (again, the epipolar-distace is used) the intersection of l'a and l''a, the correspondence is confirmed. The results of the correspondence analysis will be stored in the folder: NOTE: There is a function called "refineCalibration.m" to check the correspondences manually. Simply call refineCalibration(settings) after the 2D-detection and with all necessary paths given. frameToProcess = 1600:3000; visInNumofPerms = 5; clusterSizeApprox = 0.05; doShow = 0; writeToDisk = 1; triangulationToCluster(settings, frameToProcess, visInNumofPerms, clusterSizeApprox, doShow, writeToDisk); The above described correspondence analysis has been carried out with all permutations of the available cameras. This means, there are 6 sets of 3D particle positions from the three cameras. These 6 sets are now considered together, and a clustering algorithm from MATLAB® is applied. This way, particle positions that are not accurate (i.e. when particle occlusion occurs) can be better handled. Further erroneous correspondences are not likely to occur in all of the sets. So, only particles that constitute to a cluster of 3D positions with a minimum of visInNumofPerms permutations are considered as real paricles. 3D Trajectory Linking tracking_params.maxInvisible = 1; tracking_params.maxCost = 0.2; % max euclidean 3d-distance from predicted position allowed tracking_params.startFrame = 1600; tracking_params.endFrame = 1999; % See documentation of "configureKalmanFilter" for the following parameters: % See documentation of "configureKalmanFilter" for the following parameters: tracking_params.InitialEstimateError = [1 1 2]; % LocationVariance/VelocityVariance tracking_params.MotionNoise = [1 1 2]; % LocationVariance/VelocityVariance tracking_params.Model = 'ConstantAcceleration'; tracking_params.MeasurementNoise = 1; tracks = track_particles('./coords3d/clustered/coords3d_%05d.dat', tracking_params); The tracking algorithm is based on a MATLAB®-Example "Motion-Based Multiple Object Tracking". The involved Kalman-filter predicts the location of a particle in the next frame. When the Euclidean distance from the prediction to a detected particle position is smaller than tracking_params.maxCost this particle will be added to the trajectory. If the distance from the prediction to any detected particle position is larger than tracking_params.maxCost, the trajectory will be discontinued and a new track will be started with the unassigned particles. The trajectory prediction will be continued for a maximum of tracking_params.maxInvisible frames, even if no particle could be found nearby the predicted location. To remove very short tracks you may use the long_tracks=traj_filterLen(tracks, minLEN)-function. To investigate the results, you may call traj_singleview(long_tracks, 0, long_tracks) In the "traj"-folder there are plenty of functions to manipulate or to query the trajectories. However, all of these need the tracks to be converted by traj_compatible = convertToTraj(long_tracks). The Shake-the-box algorithm is an implementation of the paper written by D. Schanz (see references section). It uses the full image information and not just 2d-positions of particles. Thus, the algorithm is very fast even with high particle seeding numbers and density. For details, please refer to the article by D. Schanz. NOTE: Not all trajectory-management possibilities are implemented by now. The toolbox is still under development. The Example can be startet by executing do_EXAMPLE.m in the EXAMPLE_STB folder. When asked for 2d-detection properties, just use the predefined values and change threshold to 15.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00366.warc.gz
CC-MAIN-2023-50
10,228
84
http://www.hostip.info/ipaddress_forum/viewtopic.php?f=1&t=37&start=0
code
I am a lawyer that has filed a lawsuit against an adware company on behalf of Illinois residents. My understanding is that the adware company collects ip address information, which can be used to help identify which state a person lives in. What tells you that a computer ip address is from Illinois. Is there a specific # in the IP address? Is there anything better than IP addresses to rely on? Also, is there an efficient way to process hundreds of thousands of ip addresses to determine which are from which state. please email me: [email protected] There are a number of different measures to tell if an IP address is from a particular area - traceroutes, whois, hostip.info's database, or any other ip-location database. Quite a few users on the internet now (Cable, DSL) are automatically assigned an IP address when they connect. These are selected out of a pool of many which may be assigned to a particular local area (DHCP) or for the providers entire coverage area. If this is the case, it makes it difficult to always determine the exact location. However, it *is* trivial to determine the country someone is in based on IP. It's also relatively easy to determine state (in US), but anything closer than that needs to be done with some sort of ip-location mapping (such as the database we have here) - or to use traceroute or something similar... Hope this helps
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164050279/warc/CC-MAIN-20131204133410-00093-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
1,375
5
https://www.digitalocean.com/community/questions/reactphp-react-eventloop-factory-not-found
code
I’m completely new to ReactPHP and am trying to build a tool which will pull data in from a ReactJS site. Ignoring what I actually want the code to do, I can’t get ReactPHP to work on my droplet despite following the example to the letter. Could this be as simple as needing to upgrade Ubuntu? I have installed everything I have been told to via Compser. These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662560022.71/warc/CC-MAIN-20220523163515-20220523193515-00619.warc.gz
CC-MAIN-2022-21
545
3
http://studentfield.blogspot.com/2012/02/take-advantage-of-certificate-in-oracle.html
code
Oracle 10/11g training This course is designed to give student a firm grip on database administration,system administration and anyone who want to be savvy in oracle database operations,configurations and management. - Introduction to OSCS and Oracle sql-36h(3days/week for four weeks) - Oracle database administration workshop2-36h(3days/week for four weeks) - OCA and OCP labs(optional)-36h(3days/week for four weeks) To equip participants with acquired knowledge needed to successfully challenge the Oracle Association (OCA) and Oracle Certified Professional(OCP) exams. "50% discount on module1 for the first twenty(20) applicant" For more information contact Mrs Williams(UNILAG CITS Room 001, [email protected] 08023051672 or Mr Gbenga (UNILAG CITS Room 004, [email protected], 08069130632
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515564.94/warc/CC-MAIN-20181023002817-20181023024317-00446.warc.gz
CC-MAIN-2018-43
808
8
http://www.sru.edu/events/managing-chaos
code
Practical application of the Incident command System (ICS). During a significant event or disaster, it's not the time to start learning about how to effectively manage it. This presentation explains what an Incident Command System is, how it's applied, why it's necessary, and will give some real-world examples. Participants will be shown not only how to use ICS during disasters, but also in planning for special events. Additional information is available from the Professional Development Day Flyer. Program information, room assignments and schedule are available here. Registration ends Oct 3, 2018
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583831770.96/warc/CC-MAIN-20190122074945-20190122100945-00530.warc.gz
CC-MAIN-2019-04
604
2
http://www.mislavjuric.com/
code
My name is Mislav Jurić, I’m glad that you decided to check out my website! I am a computer scientist interested in artificial intelligence (with emphasis on machine learning), software engineering and tech startups. On this website you will find some code, content and publications I produced. To find out more about me, check the about me page. You can connect with me via social media as well. Here is the entire list of my social media profiles: Feel free to browse around and/or get in touch!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817128.7/warc/CC-MAIN-20240417013540-20240417043540-00429.warc.gz
CC-MAIN-2024-18
500
3
https://projpicker.readthedocs.io/en/latest/getting_started/installation.html
code
If installed with pip, ProjPicker uses the following standard modules: Optionally to use the wxPython-based GUI, install wxPython from PyPi. Without this optional module, the tkinter-based GUI will be used as a fallback. The former looks and feels more native, and supports semi-transparency on all platforms while the latter looks uniform across platforms. Since tkinter is a part of the Python standard library, at least the tkinter GUI will always be available. The ProjPicker SQLite database ( projpicker.db) will come packaged when installed with pip. However, if any problems should arise and the projpicker.db should need to be recreated, the additional dependency of pyproj will be needed. For more information about projpicker.db, see here. Installation with pip is the recommended way to install both the CLI appliction and the Python module. pip install projpicker The current development version of ProjPicker can be downloaded and installed from source here. Use pip to install ProjPicker from the source directory. git clone https://github.com/HuidaeCho/projpicker.git cd projpicker pip install -e .
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00310.warc.gz
CC-MAIN-2022-33
1,113
12
https://googlechromecast.com/how-to-split-screen-on-chromebook/
code
Chromebooks are now becoming the choice of students and professionals alike. However, most users might be a little worried about the capabilities of a Chromebook. This is likely due to the reason that Chrome OS is relatively a new and lightweight operating system. One such doubt might be related to the multitasking capabilities of the Chromebooks. So in this guide, we’ll show you how to split screen on Chromebook. Going split-screen on a Chromebook is nearly identical to what we do on a Windows machine. We can multitask apps on a Chromebook in different ways. And there will be variations in both desktop mode and tablet mode. So we’ll be discussing possible methods under each category. Go for the one that best suits you. Split Screen on a Chromebook As we said, there are different ways a user can snap a window in Chromebook. One can use a mouse, keyboard or touch input to get the job done. Google has added the ability to multitask even while on tablet mode. But it should be noted that currently, Chrome OS only lets you snap two windows vertically. Snap Windows on Desktop Mode Snapping a window while in desktop mode can be done in 3 ways. Using the trackpad/mouse, keyboard or touch. Snap Window Using Trackpad/Mouse Many would prefer doing it this way, thanks to the fact that we use a mouse for most tasks. Before you begin, make sure both the apps are open. Also, we highly recommend that you maximize these open windows. - Start by grabbing the top bar of any of the app. Move it to any side of the desktop. - Release when that side is highlighted, and the app will be snapped to that half of the screen. - Do the same for the next window. This time move it to the opposite side of the screen. - You can now hover over the split-screen windows to resize them. Be sure to wait for a small box that lets you resize both windows with ease. Alternatively, you can follow these given steps that require a little more attention. - Long press on the Maximize button of any of the windows. Arrows will appear indicating either side of the screen. - Move the pointer to any side, and the window will be snapped to that edge. - Do the same for the next window. You can use touch input on desktop mode and achieve the same result. Snap Window Using Keyboard Shortcuts This one is much easier than the previously said ones. You can quickly snap any two open windows using this shortcut. You can snap a window to the left by pressing Alt + [ and to the right by pressing Alt + ]. Snap Windows on Tablet Mode Tablet mode is meant for touch users, and the steps for snapping windows follows a similar procedure to that of desktop mode. - Grab the window and move to the centre of the screen (you can also open the overview mode). If you release your finger, the overview mode will be retained. We don’t want that, do we?. - Move the window to any side to snap it. You can now open the other app from the overview window on the opposite side. - You can also open apps that haven’t been opened yet by swiping up. Chromebooks have been evolving rapidly to meet the user’s desktop needs. However, it still lags behind both Windows and Mac as a full-fledged operating system. Still, Google is putting their best to improve the overall user experience without compromising on performance. They should implement features like Microsoft PowerToys, which add functionalities that would help the user. Especially in a time when programmers are on the move to do programming using a Chromebook.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510284.49/warc/CC-MAIN-20230927071345-20230927101345-00757.warc.gz
CC-MAIN-2023-40
3,498
25
https://unijokes.com/chuck-norris-jokes/131/
code
If you weigh 78kg on earth you will weigh 13kg on the moon. If Chuck Norris weighs 78kg on earth, the moon weighs 13kg on Chuck Norris. Chuck Norris doesn't do Burn Down charts, he does Smack Down charts. Chuck Norris once was pulled over by a policeman for speeding. Chuck gave him a warning. Chuck Norris goes to Silent Hill for the weekends. Chuck Norris can't get a riddle wrong. The riddle can only have the wrong answer. Chuck Norris doesn't fall, he merely tests the durability of the floor with his face. Total Recall was based off of an average day in the life of Chuck Norris. Chuck Norris dropped an apple once, and gravity was born. Chuck Norris can eat peanut butter with a straw. Chuck Norris once won a game of Space Invaders without shooting.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891706.88/warc/CC-MAIN-20180123032443-20180123052443-00544.warc.gz
CC-MAIN-2018-05
758
10
http://morrisonmultimedia.ca/category/html
code
There was a post on Hacker News not long ago about a color, and it was just a link to wikipedia. Not long after, some wizard removed this handy infobox from that page. I'm posting it here. That's it. Copyright © 2019 Morrison MultiMedia Inc. | All Rights Reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247512461.73/warc/CC-MAIN-20190222013546-20190222035546-00018.warc.gz
CC-MAIN-2019-09
265
2
https://emea-iot-sbc.com/event/milan/
code
February 6, 2019 - 8:15AM - 5:30PM - Viale Pasubio, 21, 20154 - Milano, Italy |8:15 - 9:30|| Breakfast & welcome |9:00 - 9:30|| This session will outline what Microsoft’s $5B investment in IoT means for your IoT business vision |9:30 - 10:30|| Azure IoT and the Intelligent Edge The holy grail of IoT is the ability to easily distribute intelligence between cloud and devices (the edge). Discover how edge innovations will help you find and certify secure edge hardware, monetize edge modules, and build edge-enabled IoT solutions. |10:30 - 11:00|| |11:00 - 12:00|| Addressing the Challenges of IoT Security with Azure Sphere This session provides an overview of Azure Sphere’s unique security capabilities so that you can reimagine your business, drive innovation and delight customers. |12:00 - 12:30|| Building Intelligent Edge Solutions with Microsoft IoT and other Technology Programs This session will showcase how Distributors, SIs and OEMs are working together to design, build and deploy scalable repeatable solutions leveraging innovations in Vision, Voice, IoT Edge and Cognitive Services to enhance IoT solutions. |12:30 - 13:00|| The 4 Steps of Digital Transformation (Partner-Customer Case Study) Learn how to develop profitable, sustainable and scalable IoT business models by leveraging solution accelerators, designed to minimize the complexity of building and taking to market transformative innovations in the energy, smart building and home, healthcare, retail, security and surveillance and transport and logistics sectors |13:00 - 14:00|| Lunch & networking & showcase time |14:00 - 17:30|| Business Methodology on IoT & Showcase Time We examine different approaches to partnerships that deliver ecosystem success through the design, build and scale of repeatable IoT solutions with Microsoft. Real life Business Model Workshop Technical Track & Showcase Time We dive into recent Microsoft IoT Product innovations, from intelligent edge to intelligent cloud, and advancements in AI that create new reference architecture opportunities. Experience connecting trigger devices like buttons, lightbulbs, sound sensors, industrial wearables and an AI camera to Azure IoT Hub and Azure Central. We will cover different topics during 3 hours: Simplification of IoT, Intelligent Edge and Hybrid, IoT Done Well and Azure Sphere. There will be 30 minute coffee break during Technical Track.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999539.60/warc/CC-MAIN-20190624130856-20190624152856-00215.warc.gz
CC-MAIN-2019-26
2,406
31
https://forum.sketchfab.com/t/earth-elemental-shrine/7269
code
I am currently working on a environment scene, it is a earth elemental in his shrine on the mountain. the earth elemental itself is based on some artwork i found on pinterest and now im trying to create a environment for it. Below you can see the rough look i am trying to go for, it is still very early and I will try to update this post regularly. critique and feedback is welcome.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479967.16/warc/CC-MAIN-20190216065107-20190216091107-00360.warc.gz
CC-MAIN-2019-09
383
5
https://community.auth0.com/t/problem-with-following-auth0-tutorial-basic-auth0-usage-with-net/39247
code
I have been following this tutorial to integrate basic user login/password authentication for our simple ASP.NET web application: I was able to get the login page to come up, and I was able to create an account. Then I received an email and confirmed my account, but when I was redirected from there my app crashed. I was able to rerun the app and login, but again the site crashed when I was redirected. I have since been tinkering with some values to make the redirection work, and in so doing I have lost the previous functionality I had. I can no longer access a login page. The error I now receive when clicking on the login button is "An unhandled exception occurred while processing the request. Exception: OpenIdConnectAuthenticationHandler: message.State is null or empty. Exception: An error was encountered while handling the remote login. I am brand new to Auth0 and to ASP.NET, so I think this is probably a very simple problem: I just don’t know enough to solve it. Please let me know if I can post any code snippets that might make this problem easy to solve.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00399.warc.gz
CC-MAIN-2020-16
1,076
7
https://www.allinterview.com/company/12/abc/aptitude-test-questions.html
code
Least no. when divide by 7 gives remainder 6, 6 gives 5, 5 gives 4 and so on ?6 24187 Perimeter of the back wheel = 9 feet, front wheel = 7 feet on a certain distance the front wheel gets 10 revolutions more than back wheel . what is the distance?5 7327 There are 9 balls of equal size and same weight(they look similar) except 1. How many weights required to find the dissimilar ball using a weighing balance?8 15113 in this what special aspects of your work experience have prepared you for overseas job?2 5096 please send the sample questions to my mail id for post of clerk in state bank of india....1 3260 i want all prevoius question papers of tax assistant examination26 23082 A boy asked a girl her name she replied your name is behind your scooty Behind the scooty is written 7.3 3.3 9.3 2.3 What is her name79 82724 PAN stands for Permanent Account No A 11 digit PAN have some significance. i.e If a Pan starts from A then A stands for something. Can anybody tell me what the charaters in the PAN whether number or alphabet signify?6 14755 A single discount equivalent to three successive discounts of 20%, 25% and 10% is a) 55% b) 50% c)48% d)46% plz specify the method... thanks21 135993 2+3=8, 3+7=27, 4+5=32, 5+8=60, 6+7=60, 7+8=? Reply t answer...26 60288 Plz explain with steps.. What s de answer for this question : Three independent mechanisms A, B and C have been incorporated for power saving in a plant producing respectively 30%, 40% and 10% efficiency. Assuming that they operate independently, what is the net power efficiency achieved. (a) 62.2% (b) 68% (c) 61% (d) 64% (e) 56% ans 61..5 7695 2x-y=4 then 6x-3y=?25 22271 m=++i&&++j(||)k++ printf("%d"i,j,k,m)1 4317 A remote island contains a tribe whose members have either blue or brown eyes. Tribe members do not know the color of their eyes and if they learn it, they must kill themselves the same night. Every member of the tribe always behaves logically...2 8984 What is the difference between a primary key and a composite key? You want to create and maintain user master record. What authorization would you need? What are the 4 stages of computing? How do I make a clickable link in an email? Name any two gateways that can be deployed in RPA? How do web services communicate with each other? Why do we use 0? What are common uses and/or applications for ai? Explain various types of antenna diversity. How many kinds of elements an array can have? how to see the db size? Do you know how are multi-byte characters used with weblogic jdriver? Where do you set the priority for a work queue item is done in blue prism? What is while true in python? What is mlib in apache spark?
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303385.49/warc/CC-MAIN-20220121131830-20220121161830-00468.warc.gz
CC-MAIN-2022-05
2,660
29
http://www.indeed.com/cmp/HP/reviews?id=29bc7b7daf6da303
code
Pros: felxibility to work Cons: bad healthcare Handling technical troubleshooting and helping IT customer’s teams to implement HP solutions, providing documentation, escalation (if appropriate). Addressing projects implementation. Helping the team engineers to address and solve the issues assigned, Researching and development of knowledge-bases articles to help others to enhance their knowledge
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267330.29/warc/CC-MAIN-20140728011747-00052-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
399
5
https://www.cpluspluscrossing.com/jobs/l-alameda-ca-jobs.html
code
THE LARGEST COLLECTION OF C++ JOBS ON EARTH Supports PDF, DOC, DOCX, TXT, XLS, WPD, HTM, HTML files up to 5 MB Skills Java Android C/C Computer Graphics Job Description IrisVision Global is a Silicon Valley based company, founded in 2013 with the intent of providing a low cost, highly functional device.. C /C# Developer with Python experience Date Posted: 4/16/2019 Apply Now Follow @Job_LedgentTech Job Description Client is is looking for a c /c# developer who can write automation scripts using.. Client is is looking for a c /c# developer who can write automation scripts using python. Duties: Lead or support engineering efforts in the design, and development of our next.. Senior .Net Core Developer Work closely with the development team and business analysts to implement new features, enhancements, and fixes for a large and complex portfolio performance reporting system. Design.. Description Company Apply Job Description ABOUT STOCKPILE Stockpile is the easy and affordable way to buy stock. With Stockpile, you can buy fractional shares of stock in publicly-traded companies. Rather.. job description job summary: Responsible for applications development in an enterprise architecture environment within .net framework using C#. Must be able to apply SDLC concepts and have a proven track.. Job Description: Cognizant Technology Solutions is looking for “C Developer” who could join in our team of IT professionals in our projects in San Francisco, CA . If you meet.. C#.NET Library for FCS 3.1 file generation Flow Cytometry Standard (FCS) is a data file standard for the reading and writing of data from flow cytometry experiments. The FCS specification..
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999210.22/warc/CC-MAIN-20190620105329-20190620131329-00326.warc.gz
CC-MAIN-2019-26
1,676
10
https://wikitech-static.wikimedia.org/wiki/Network_design
code
You are browsing a read-only backup copy of Wikitech. The primary site can be found at wikitech.wikimedia.org The Wikimedia Foundation operates a network made of 2 main datacenters (Ashburn, Dallas), 3 caching sites (San Francisco, Amsterdam, Singapore) and 3 networking sites (Dallas, Chicago, Amsterdam). Since 2017, this network is unified under AS14907. Those sites are connected in a redundant way to each other using dedicated fibers, wavelengths and VPLS circuits. Connectivity to the world is achieved via various transit providers and exchange points.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583408.93/warc/CC-MAIN-20211016013436-20211016043436-00048.warc.gz
CC-MAIN-2021-43
560
5
https://embedkari.com/embedded-programming-conceptsdwarf/
code
Please SUBSCRIBE to YouTube channel Embedkari for further discussion on Embedded Systems. I recommend to use laptop/PC with headphone or at least Tablet for watching related If you find something missing, Please provide feedback in comment box so that I can take corrective action. I discussed about Motorola S record, ELF format in the last blog post. I strongly recommend you to read earlier blogs for better understanding . Key Takeaway : Debug symbol generation and compiler optimization concepts. How to generate debugging sybols by gcc ? One can generate DWARF symbols using -g option with gcc and print the same using -w option with readelf utility. We can also use nm(name managing) binary utility of linux to inspect generated ELF. Verification of Debug symbol generation with x86-64 In this experiment , first hello.c is compiled without -g option and later with -g option. Both the outputs were read by nm -al and stored in text files. Then diff was used to find the difference. As expected, -g option output has information of source file path used. Inspection of RISCV Release and Debug binaries Here I am repeating the nm and diff commands as done above. The release binary has no debugging information. If source level debugging is desired, Avoid any compiler optimization which can lead to mismatch of source code and executable binary. For final release(without debug information) , You may use suitable optimization flag. There are different optimization options (-O0,-O1,-O2,-O3,-Os,-Ofast) available. One can choose as per requirement. e.g If small code size is required , You may use-Os. Please refer to this for detail. Thanks for reading till end. I am trying to improve usability of my site. Did you find this discussion helpful ? If so, Please subscribe to YouTube channel Embedkari as well for additional embedded related stuff.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.23/warc/CC-MAIN-20231203125921-20231203155921-00177.warc.gz
CC-MAIN-2023-50
1,854
12
https://www.lincolnphipps.org/sound-bites/on-evolved-moral-values/
code
“Are moral values immutable or did evolving humans create them?” This question was asked by a (presupposition) Christian and here is my answer: A moral value is a generally accepted ethical principle and though studies show morality has evolved with humans (and with other animals) the question is did humans create moral values. I’ll state my position up front on this; moral values are abstract (other abstracts are for example numbers). As a methodological naturalist I assume all is matter and so I must identify where such abstracts can emerge. Numbers emerge from sets of matter, they are information that is carried by matter and represented in matter. You can’t take the two out of two apples without removing an apple. Equally the moral values are abstracts that emerge from when humans (as material agents) interact. You can’t remove the moral value without breaking apart the interaction. If moral values exist then like numbers they exist as a possibility out of a infinitely vast continuum of possible interactions. Those that presuppose god say that mathematics originates from god and they equally say that moral values originate from god. Given that they must accept that if their god is the source of “1729” then their god is the source of “hatred”. The naturalist response is that both “1729” and “hatred” are abstract possibilities and the question of immutability is irrelevant.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506320.28/warc/CC-MAIN-20230922002008-20230922032008-00796.warc.gz
CC-MAIN-2023-40
1,424
7
http://theassayer.org/cgi-bin/asbook.cgi?book=206
code
|Author||Guido van Rossum||Entered||2001-03-07 18:02:41 by bcrowell| |Edit||edit data record||Freedom||Copyrighted, doesn't cost money to read, but otherwise not free (disclaimer)| |Subject||Q.A - Mathematics. Computer science (programming languages)| by mfs on 2002-10-22 04:56:53, review #217 better than 95% This is the introductory document for Python, prepared by the language developers. It tells beginning and experienced programmers what they need to know to start using Python quickly. It remains indispensible; I keep a copy on my desk along with a single-page list of the functions I use most frequently. I don't rate this document quite as highly as the language, but it is superior to most introductions by language developers. It is refreshingly brief, to the point, without obvious ideology or attempts to be "cute". Read this introduction before downloading or buying a book on Python. |The contents of this web page, except the parts contributed by members of The Assayer, are copyright (c) 2000 by Benjamin Crowell, and are copyleft licensed under the Open Publication License 1.0, without options A or B.|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522741.25/warc/CC-MAIN-20220519010618-20220519040618-00302.warc.gz
CC-MAIN-2022-21
1,124
8
https://www.clsp.jhu.edu/events/statistical-natural-language-parsing-or-doing-well-by-doing-dumb-eugene-charniak-brown-university/
code
Statistical Natural Language Parsing, or Doing Well by Doing Dumb – Eugene Charniak (Brown University) We describe a parsing system based upon a language model for English that is, in turn, based upon assigning probabilities to possible parses for a sentence. This model is used in a parsing system by finding the parse for the sentence with the highest probability. This system outperforms previous schemes. As this is the third in a series of parsers by different authors that are similar enough to invite detailed comparisons but different enough to give rise to different levels of performance, we also report on some experiments designed to identify what aspects of these systems best explain their relative performance.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511053.67/warc/CC-MAIN-20231003024646-20231003054646-00291.warc.gz
CC-MAIN-2023-40
727
2
https://www.ancestry.com/boards/topics.software.famtreemaker/9495/mb.ashx?pnt=1
code
I'm running FTM 2012 on Windows 8. In recent weeks when downloading a document from Ancestry to my tree the program has been shutting down. Windows problem report says "system invalid operation exception". I don't lose any data and it's easy enough to just restart the program, but it is irritating. Is there any thing that can be done?
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948522999.27/warc/CC-MAIN-20171213104259-20171213124259-00456.warc.gz
CC-MAIN-2017-51
336
1
https://community.wd.com/t/data-loss-with-thunderbolt-my-book-duo/20659
code
I have a Thunderbolt WD Drive which is connected to a Mac running Mavericks. I have read the emails about the auto reformat issue after upgrading to the new OSX. I never had this issue and I didn’t have the drive manager software installed. Unfortunately, this morning, my drive reformatted itself for unknown reasons and is now showing as 2 separate drives, instead of the usual single raid drive (Raid 0). In total, I have lost 3TB of data, with only 1TB as spare storage space. I was in the process of backing up this drive to the cloud but as you can imagine, it takes a long time to do. I only managed to backup 16%. I have done a scan of both the new partitions to see if my data is there, and it is. Only issue I can see is that some files are smaller than expected, I’m guessing that’s because they are split over the two hard drives. How can I recover the data so it pieces it altogether correctly? Do I just do a data recovery on each partition or should I raid the drives again and recover that way? Any help will be appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662595559.80/warc/CC-MAIN-20220526004200-20220526034200-00041.warc.gz
CC-MAIN-2022-21
1,046
6
https://docs.runreveal.com/Notifications/Tines
code
We support Tines as a destination so our customers can trigger different SOAR workflows. Create a Tines webhook to receive a notification event from RunReveal. Note the webhook URL and the secret. Provide the RunReveal Tines notification with the Webhook URL, followed by the secret in the following format. You can read the Tines documentation about this here (opens in a new tab) In RunReveal, click "Test Notifcation" to be sure that in Tines the secret was not rejected.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817239.30/warc/CC-MAIN-20240418191007-20240418221007-00377.warc.gz
CC-MAIN-2024-18
474
4
http://www.simplyhired.com/a/salary/search/q-web+developer+wp-webdev/l-redmond%2C+wa
code
Web Developer Salaries in Redmond, WA * Please note that all salary figures are approximations based upon third party submissions to Simply Hired. These figures are given to Simply Hired users for the purpose of generalized comparison only. Minimum wage may differ by jurisdiction and you should consult the employer for actual salary figures. Top Web Developer jobs near Redmond, WA Mobile Application Developer KODA LEARNING LLC - Redmond, WA Provide production mobile and web application support for assigned applications as needed. Development of new mobile applications for where expected skillset... Senior Front End Developer LENS.ORG - Seattle, WA Senior Software Engineer Pushpay - Redmond, WA Emphasis on creating secure web platforms that perform at scale. Developers, Quality Assistance and Analysts work closely together where we continuously deliver... UIEvolution - Kirkland, WA Sesame Communications - Seattle, WA
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661763.18/warc/CC-MAIN-20160924173741-00243-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
929
13
https://www.sqlservercentral.com/articles/getting-started-with-azure-data-studio
code
When SQL Server was ported to the Linux operating system, Microsoft realized that they needed a tool that could be used to work with SQL Server instances on that platform. Porting SSMS would have been a very large project, and potentially not even possible, but Visual Studio Code was a development GUI that already ran on Windows, Linux, and macOS. Microsoft decided to fork this tool and build a cross platform data management tool. Azure Data Studio (ADS) is the result. This article will examine how to get started with this tool and connect to your SQL Server instances. We will also cover a few common configuration items that might make working with ADS easier. I've written a few articles on how ADS works, shown here: - Getting Started with Azure Data Studio - Getting Comfortable Writing Code in Azure Data Studio - Using Notebooks in Azure Data Studio - Using Azure Data Studio with TFVC - Using Azure Data Studio with Git - Editor Tips and Tricks for Azure Data Studio - Using the Import Extension in Azure Data Studio - The Profiler Extension in Azure Data Studio The first step in getting started is to download the tool. You can browse to the download page for Azure Data Studio at: https://docs.microsoft.com/en-us/sql/azure-data-studio/download?view=sql-server-2017. Next, find the download file for your operating system. This will start a download for the file you selected. Each operating system is a little different for the install and that page contains instructions for each OS. I chose the installer file for Windows, and once the download completed, I clicked the executable to start the installation. This begins a fairly standard Windows wizard. Welcome screen, accept EULA, pick a path, etc. You can work your way through the install like any other Windows program. The one place to perhaps change the defaults is on this page. The default for me was not to register this as the editor. I left this alone since I often use SSMS still and prefer that .SQL files open there. You might choose to change this for your system. Once the wizard completes the installation, by default this will launch ADS when you click Finish. When ADS launches, you should see this: This is the tool with a connection dialog for an instance. Let's see how this works. Querying an Instance The connection details are the typical items that you expect to use. An instance address in standard format, credentials, a database context, and optionally, a name for this connection. I've filled out mine as shown here. If you click the "Advanced" button, you get some different options. Some of these are the same in SSMS, but some aren't. Here are the options in my SSMS 17.8.1 connection dialog. Not quite the same, especially for application intent. Of course, SSMS has an ad hoc panel where you can enter other parameters you want to use. ADS allows us to group servers, as many people would like. A drop down at the bottom of the connection dialog has options for picking an existing group or adding a new one. I will select the "Add new group" option. Selecting this brings up a new dialog where I can enter a name, description, and choose a color for the connection. I'll click OK here and then Connect to open a session on my instance. When I do that, ADS will open a connection and give me a dashboard on the right side of the screen. On the left, I'll see my server groups and then a set of menu icons on the far left. Let's get oriented. There are really three sections in Azure Data Studio. There are the tabbed areas where you work, which are the large areas. The dashboard takes up one of these areas. On the far left is the menu column, which contains these items: - Task History - Source Control Each of these can be clicked and it will open or close the middle column, with details for that menu item. For example, if I click the Servers button, it closes my connection list. Clicking Explorer opens a different column. If I just click Source Control, I see this. Clicking these will toggle the column open and closed. The top menu contains File, Edit, etc. with various options that are useful. There are a couple of other items to point out. The Extensions menu contains various add-ons for ADS, similar to add-ons for Visual Studio Code. If you click this, you see a list of extensions by Microsoft, other companies, and various individuals. If you click on an extension name, you'll see details in the main tabbed area. Actually, a new tab will open for extensions. The Command Palette Most, in fact likely all, of the settings and changes you want to make in ADS can be done from the command palette. You can open this from the view menu or click CTRL+Shift+P. This brings up a list of commands, recently used ones at the top, and a search bar. You can type anything in the box and the palette will search for different options. For example, if I type "zo", I see this: From here, I can arrow down to select a command, or if available, I see the shortcuts on the right side of the palette. If I select Zoom in, and the click CTRL+, I'll get the main part of ADS zoomed in. One of the main things I like to do is keep the working window still, so I often move the menu items to the right. In my command palette above, toggle sidebar position is shown. If you type "sidebar", you will see "Toggle Sidebar position". Click that and the menus move to the right. The same option moves them back. Running a Query The main purpose behind ADS is to give you a query tool that consistently works on all platforms. Let's see how to run a query. On my Dashboard, I'll click the New Query button. This opens a new tab. I could also do this in the File menu. I can start typing a query, like I would do in SSMS. By default, intellisense is enabled and tries to help me. When I have my query written, I can click "Run" at the top. This will run the query and return the results and messages panes below the query. I can click the Top Operations item to see the query plan in a result set format. If you click "Explain" at the top, you will see the graphical query plan. Those are the basics of running a query, but there's much more to do in the future. This is a short introduction to working in Azure Data Studio. We covered the install, a basic orientation of the tool, and ran a query against an instance. Download ADS today and give it a try. There is much more to explore, and I plan to use this tool to do more and compare it with SSMS. I still prefer SSMS for now, but perhaps that will change over time. In future articles, we will look at how to better use ADS to get your work done more effectively.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816863.40/warc/CC-MAIN-20240414002233-20240414032233-00638.warc.gz
CC-MAIN-2024-18
6,617
52
https://sawtoothsoftware.com/forum/5593/using-perl-to-assign-numeric-value-to-a-text-pass-in
code
Here is an extract from the Sawtooth HELP for the SetValue function ... SetValue (QuestionName, Value) SetValue() allows you to save values to existing variables in the database (it does not create new variables on the fly within the database). For example: [%SetValue(Q1, 5) %] sets the value for Q1 to 5 in the database. Currently we do not have a place in the SSI Web interface where you can specify variable names. You could use an existing question in the question list (such as a Free Format hidden variable). But, we suggest you use Pass-In Fields (located in the Start question) to set up variables that can be used by SetValue(). For example you could create a Pass-In field named "age". You could then set the value for "age" to 45 midway through the survey using the following command: [%SetValue(age, 45) %] I suspect you may have an issue with your "poi variable (where you want to store the coded value)? Go to the pass-in-field and simply define "poi" as a whole number variable. Be careful with the naming of your variables as Perl is case sensitive. Your Perl script looks okay. When constructing your brand list later on (assume Q5BrandList which has 1-10 codes) and you want to remove the "poi" brand from the total list, use something like this in your constructed list ... That will work nicely.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147628.27/warc/CC-MAIN-20200228170007-20200228200007-00067.warc.gz
CC-MAIN-2020-10
1,316
12
https://emergentleuven.be/workshops/
code
Learn the skills you need to get started in DS & AI Our Upcoming Workshops Emergent Leuven provides you with the most fundamental skills of Data Cleaning in Python! October 19, 2021 Emergent Leuven and Cegeka offer the golden opportunity to learn Cloud-based systems! November 2 – 29, 2021 2nd Data Science Track Stay tuned for new updates!
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359073.63/warc/CC-MAIN-20211130201935-20211130231935-00077.warc.gz
CC-MAIN-2021-49
342
8
https://aecmag.com/news/artificial-intelligence-ai-frontiers-in-construction/
code
Mariusz Gorczyca, R&D structural engineer at Kingspan, wonders if we are ready for the level of digital ingenuity promised by AI and neural networks As part of the Kingspan research team, my passions lie with the development of structural mechanics and how we can further enhance the technological development of the built environment. As a part of my masters thesis I was working on the applications of Artificial Intelligence (AI) and Machine Learning (ML) in the AEC industry. My research looked at how AI and ML are shaping the way we work, how projects are managed and delivered and most importantly, the question of whether the industry is ready to embrace this level of digital ingenuity. AI for architects and engineers It’s no secret that public attention on AI has rapidly increased recently, despite the fact that the technology has been slowly developing for the past 70 years. If we consider that structural mechanics has been developing accurate theoretical models for predicting strain and stresses for the past few decades and that these theoretical models require a fixed set of input parameters such as material properties, boundary conditions etc. to produce results such as deflection, stresses etc. – it comes as no surprise that this is a pretty complex and time-consuming process. Therefore, because of these complexities, experienced engineers are often needed to interpret the results for other parties. This is where AI can support this level of development, by using ready collated data to predict behaviours and streamline research processes. We can also look at how the iterative nature of architects, engineers and contractors working together with a limited project budget has its complexity. Proven solutions for overcoming project hurdles are generally preferred over innovative and ground-breaking ideas, however such situations could be changed by introducing tools which would offer fast yet accurate predictions of actual results – once again, a job for AI. Models which give fast yet accurate results are termed Reduced Order Models or Metamodels and can be based on AI methods. Metamodels typically require less input parameters and offer results in shorter time. Some examples of metamodels could include predicting wind loads on complex building geometries , estimating remaining structural service life or predicting concrete strength based on mixture ingredients proportions . Introducing such methods will without doubt generate project efficiencies on both time and cost. Whilst still in their early adoption stages, it won’t be long before this becomes a proven preferred solution. AI and neural networks The most crucial element for any AI-based solution is the underlying data used for the process. Data contains examples of inputs and outputs which can be both collected or generated. What’s important, is the data must be representative of the task in order to create a reliable model. Out of several different types of models, Artificial Neural Networks (ANN) have been proven to outperform other models in most cases. Artificial Neural Networks are computing systems inspired by biological neural networks that effectively replicate elements of a living brain and are one of the most commonly used tools in ML as they are designed to replicate the way humans learn. Such systems “learn” to perform tasks by considering examples of activity and measuring repeated outputs – they are excellent at finding patterns which are often too complex for a human programmer to extract and teach the machine manually. The architecture of an ANN contains neurons organised in a three-layered structure – the three groups of layers are generally named: input layer, hidden layer(s) and output layer. Neurons are connected between these layers by weights which are unknown at the beginning of the process. Those weights are adjusted in the learning process. So far in the industry, using ANN, only “exclusive” metamodels have been created. This means that a metamodel built for a specific structure can not be reused for a similar structure or any other altered asset (this limits the practical value of the metamodel). However, research by M. Nourbakhsh of the Georgia Institute of Technology, proposed a set of 25 parameters describing any structural element within any structure with 1D structural elements. This approach led to a metamodel which could be applied to a wide range of different structures and thus is “generalisable” . The potential of this solution is enormous. Such a metamodel could work as an intelligent assistant helping designers make better decisions. The assistant could run in the background and provide near instant feedback on each decision on multiple projects. Work environment and data flow The idea of building “generalisable” metamodels was introduced only recently. Therefore, before any practical application it needs to be exercised and tested since nobody in the AEC industry can rely on a black-box mechanism! Thus creating a perfect opportunity and place for my research to start. The lack of publicly available data meant I had to acquire new data for the purpose of my study. Creating structural models and extracting data manually would have been extremely time consuming and probably impossible within a given time frame. Instead, the required data was generated in a semi-automatic manner with the help of Autodesk Dynamo and its connectivity with other applications. The software use and how I exercised the connectivity between different pieces is shown in figure 1, hence creating a parametric environment. This new parametric work environment allowed for a highly automated process, for which, in total, 12 different geometries of example structures were created using three unique parametric models, each controlled with a single parameter. My models contained 3D space frames and 3D space trusses (examples of these structures can be seen in figure 2) with the same boundary conditions assigned to structures of the same type. The number of structural elements in the models ranged from 250 to 1,600. In total, more than three million members were created, analysed and eventually used in model training. To ensure variability in data, each member was assigned a random cross section before running the structural analysis. With that in mind, you can see that there was literally no chance to generate two models exactly the same. Training data / building metamodels Once the environment was set up, data generation could begin. It took approximately 48 hours on an average laptop to generate 500MB of data saved in .csv files. Each data point contained a set to 25 input parameters with information about location of the member in space, applied load and supports, cross section characteristics and summarised stiffness of members close to the analysed member. For each data point one additional feature was saved, namely maximum von Misses stress in the member. Further work continued outside of Dynamo with a help of the python programming language and available external libraries. These libraries are already well developed and make working on AI solutions easier. It is highly recommended to get an intuition about the data by checking different statistical properties at the very beginning. In order to build a metamodel with help of ANN the data needs to be split into two different sets: training set and testing set. Further ANN models should be defined and trained, here a single hidden layer with 30 neurons was used. After which the model can then be tested with “unseen” data from a saved test set. Predicting stresses with AI One of the tests we carried out verified that metamodels can be used to predict results of “unseen” structures but within the same class of structures (dome, slab, wall, etc.). This means, for structures in two classes high quality predictions were achieved showing the R2 score as high as 0.75 (where the maximum is 1.00). On the average, predicted stresses in members varied by 10% to 20% from true values. For one class, where less complete structures were included in the training data set, predictions were arbitrarily wrong. It demonstrates how the quality of data is important for AI-based solutions. Another test checked if a single metamodel combining knowledge from 12 various structures can predict results of “unseen” structures. The result showed that the amount of generated data was not sufficient for the model training and the ANN algorithm was not able to recognise patterns in the training data. It shows the importance of the data quantity against model generalisability. This means that a metamodel for general application would need a data set bigger than available to any individual but can be generated in a cumulative effort of the industry. The application of AI in the field of structural engineering brings as many opportunities as challenges. Civil responsibility of engineers sizing structural systems requires accuracy and confidence much higher than it was achieved with metamodels in this work. At the same time results predicted with metamodels give a good indication of structural performance which otherwise would need to be consulted with a structural engineer. This is but one element of my research, intended to show benefits from AI-powered solutions in the hands of engineers and architects. The above demonstrates a potential for a new generation of engineering tools which will help work smarter and more efficiently. It will help engineers and architects shift their attention to the creative parts of work while computers complete the remaining mundane parts. Mariusz’s research is the basis of his talk at BIM Show Live 2019, on Thursday 28 February; Application of artificial neural networks in static structural analysis where further examples will be shown on how AI and ANN are effective solutions for providing efficiencies on construction projects from the initial concept stages, and enabling soft landings. S. Wilkinson, Approximating Computational Fluid Dynamics for Generative Design, University College London, 2015 W.Z. Taffese, E. Sistonen, Machine learning for durability and service-life assessment of reinforced concrete structures: Recent advances and future directions, Automation in Construction, 77/2017 M. Słonski, A comparison of model selection methods for compressive strength prediction of high-performance concrete using neural networks, Computer and Structures, 88/2010 M. Nourbakhsh, Generalizable surrogate models for the improved early stage exploration of structural design alternatives in building construction Georgia Institute of Technology, 2016 If you enjoyed this article, subscribe to our email newsletter or print / PDF magazine for FREE
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474697.2/warc/CC-MAIN-20240228044414-20240228074414-00619.warc.gz
CC-MAIN-2024-10
10,802
37
https://musescore.org/en/node/5786
code
"Fix Measure Width" causes notes to line up incorrectly on the first stave When using EditGeneralStyle>System>FixMeasureWidth, the notes on the first stave (with the instrument text) get jumbled. 1) New score, 4/4, one staff 2) Enter notes c, d, e, ... a, b, c (8 notes) 3) EditGeneralStyle>System>FixMeasureWidth ON The staff changes length (also it is too long for the page, i.e. staff #1 is longer than all the others), and the first measure has 5 notes. Not sure if this is dependent on Page Layout options though (width etc).
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00024.warc.gz
CC-MAIN-2022-33
530
6
https://www.gamespot.com/forums/playstation-nation-1000002/sony-should-remove-psn-regions-31015828/
code
At this day and age, the concept of region locking is just stupid. Steam has no hard rule to lock your account to specific region, Xbox Live allows you to change your region just like that as well as id. But for some reason, psn is still locked into the region you use. This becomes a pain if people need to constantly travel. Creating a new account would mean new friends, lost save games, trophies, game purchases etc. I know how multiple accounts work as I have 3 of them from 3 different regions, I use US account as my primary account. The point I am trying to make is, it shouldn't be this way. I mean I want to keep one account with all my purchases, I don't want to keep seperate accounts. Either let us change account region for those of us who travel regularly, or...even better, like Steam and Xbox, throw away this region lock, which is just stupid during this age.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084892059.90/warc/CC-MAIN-20180123171440-20180123191440-00507.warc.gz
CC-MAIN-2018-05
877
3
https://developer.jboss.org/thread/150478
code
I developed a enterprise application . my web functions are about update each row on the table . after clicking button to update , the table is updated successfully , but when i find that username again , that's still the old value . I think I haven't updated bean yet ? (is there anything to do after using get() , set() methods to updated ? ) . I'm using CMP Entity Bean , and Session Bean . on Netbeans 5.5.1 , EJB 2.1 .Please help me.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221208750.9/warc/CC-MAIN-20180814081835-20180814101835-00248.warc.gz
CC-MAIN-2018-34
438
1
https://forums.adobe.com/thread/2223499
code
Yes, I do have a separate licence for Acrobat 9 but when I tried to install AcroPro90_efg.exe, I was told that my licence was "invalid". I didn't mention it in my 1st post: I was sure that Acrobat, which is part of CS5, was simply missing from the installer and did not require a separate install. That's the part I didn't remember from the original installation (2010). So this solves the "missing from the installer" part. Thanks! To sum it up, I have a valid licence for a CS5 installer that includes (only) Illustrator, InDesign and Photoshop but a supposedly invalid licence for the Acrobat installer, which IS part of CS5. Great! If your separate serial number for Acrobat is gives you any issues, then your best bet is contact Adobe directly and ask them to look into your licensing and/or reset your activation count. (via live online chat is usually the fastest/easiest) They are the only ones who really have power or control in this regard.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210243.28/warc/CC-MAIN-20180815161419-20180815181419-00567.warc.gz
CC-MAIN-2018-34
951
5
http://www.plantedtank.net/forums/12-tank-journals/134866-mudskipper-paludarium-11.html
code
I have let the smart people tell me that Nerites reproduce by pelagic offspring being carried to saltier water by current after hatching from the eggs. I do have hard time figuring out how the adults migrate back to fresh/slightly brackish water after they mature, but I take it as it's stated... A lot of eggs has been laid in this tank, and I have yet to spot a baby Nerite in there... You might be right about the hermits. At least some species seem to be mostly terrestrial and not that good with even shallow pools. Fair statement there. "There is no name for what I'm going to be when I get big." Earth. I think we can make a buck on it so let's destroy it. Last edited by HX67; 11-19-2012 at 07:43 PM. Reason: Defining further
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608622.82/warc/CC-MAIN-20170526013116-20170526033116-00191.warc.gz
CC-MAIN-2017-22
733
8