url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://ludocity.org/index.php?title=Brown_Dog_Statue&oldid=2387
code
Brown Dog Statue |Brown Dog Statue| |Stuff required:||A box of about 100 toy animals / animal tokens. Name and role cards. A brown dog statue. 7 mats. A single dice.| |Crew required:||one narrator| |Time required:||30 minutes, hopefully| |Place required:||a room| |Activities:||bluffing, deduction, counting.| |untested game. Its rules are written, but it hasn't been tested out yet.| |Attribution-Noncommercial Creative Commons licence. (What does this mean?)| Each player starts with 3-5 toy animals. The goal of all of the anti-vivisectionists is to release their animals into the wild. The goal of all medical students is to covertly dissect their animals for science. Each player also has a personal goal which they can openly or covertly prosecute. Each player draws a role card and a name card. The role card will say whether the player is an anti-vivisectionist or medical student, and should be kept secret. The exception will be the Animal Liberator, who must reveal themselves immediately. The Animal Liberator is an anti-vivisectionist; their role doubles as their name card, so they should not draw one. The name cards have various roles – for example, the Anarchist, the Suffragette, the Member of Parliament. These are somewhat for roleplaying flavour, but also contain personal goals – for example, the Suffragette will want to end the game with more animals in front of her than the Member of Parliament; the Anarchist will pick a player at the beginning of the game, at random, and will aim to have the exact same number of animals at the end as that player; etc etc. Finally, in the middle of the table will be a large statue of a brown dog. At the beginning of the game it will be on a mat with a big 0 (zero) on it; there will also be three mats (labelled 1, 2 and 3) pointing from the dog towards the Animal Liberator. There are then three other cards (-1, -2 and -3) heading in the opposite direction. Each player starts by introducing themselves in character. At this point they can chose to disclose their mission or not, or lie, as they wish. Each round is split into two halves. In the first part, each player may publicly dispose of any number of their animals. They do so by placing them (ostentatiously, and with loud protestations about how much they hope that their animals are to be well-treated) in a cup in front of them, which the narrator then gathers, mixes well, and sorts them into one of two areas – one representing green fields upon which the liberated animals will gambol and hop, and the other representing the clinical laboratories in which the animals will be tormented… in the name of science. Smart players will observe how many animals are in area a, and how many in area b, and draw their conclusions thus. The second part can take one of two forms. In the default case, the players can take it in turns to perform one of several actions. The first player to perform such an action shifts one space to the left each round; the person to start the round is referred to as the “firebrand” for reasons that will become clear. The actions that a player can perform are as follows: • Attack another player’s facility. The player can assign the animals in front of them to attack another player. If there are more attacking animals than that player has in defence, the attacker may take one of the defender’s animals. • Assign defenders. Animals may be assigned to defend against attacking players. • Rustle animals. The player may roll a dice to gain 1-3 more animals (based on a dice roll), provided that there are still animals in the pot. Medical students secretly take their animals from the liberated animal pile rather than the pot; in practice, they take their extra animals from the pot and the balance is corrected by the narrator at the end of the turn. Animals gained in this way cannot be assigned to attack or defence this turn. Each of these actions must be done in turn, except for assigning defenders – this can be done reflexively, so if a player who has already moved has animals left over, or a player who has not yet moved, is attacked, then they can use their spare animals to defend themselves. A player with 1 animal may not be made the target of attack. They may rustle animals if they wish, or may attack one other player for free, automatically succeeding. However, instead of all of this taking place, the firebrand can declare a riot. In order to do so, they specify another player to be the target of the riot and put a number of animals of their choice next to the statue of the dog. First, the Animal Liberator must announce whether they oppose or support the riot. The other players then, each in turn, declare their allegiance, either to the firebrand or the target of the riot, adding animals as they see fit to either side (although each player of course keeping track of how many animals they have contributed). Once all players have declared an interest and committed their animals, the side with the largest total of committed animals wins. Each player who contributed animals to the winning side may take one animal from a player on the opposing side of their choice. Again, a player with only one animal may not be made a target in this way. The dog statue If the Animal Liberator chose to be part of the winning side, the dog statue moves one space towards them. If they were on the losing side, it moves one space away. If the dog statue is on the mat marked 3, then the medical students can no longer rustle liberated animals – they must take from the pot like anyone else. If the dog statue ends up on the mat marked -3, then the anti-vivisectionists must take their animals from the liberated animal pile as well. The game lasts for as many rounds as there are players, i.e. everyone has one turn at being the firebrand. After the last turn, there is one last Part 1, allowing players to free or vivisect their remaining animals as they wish. Following this, the scores are tallied. Each team gains 1 point per animal in their area, plus 3 points for every player who achieved their personal goal.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500368.7/warc/CC-MAIN-20230207004322-20230207034322-00095.warc.gz
CC-MAIN-2023-06
6,114
31
https://ivanuss.artstation.com/projects/nKGro?album_id=1237194
code
Commission work for https://cosmosinvictus.com The Houscarl is a mercenary unit. Re-designed from an existent space-construction mech frame. Developed for deep space combat and anti-ship missions. The main coil-gun has been adapted from a naval cruiser cannon, it has its own power source and it can also be used in orbital bombarments.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198887.3/warc/CC-MAIN-20200921014923-20200921044923-00058.warc.gz
CC-MAIN-2020-40
336
2
https://keygen.sh/docs/api/signatures/
code
You may utilize your account's public key to verify that API responses and webhook requests all originated from Keygen, as well as to verify a license key is "authentic" i.e. that it was signed using your Keygen account's private key. You can find your account's public key within your dashboard settings page, which you can use to verify response payloads and license keys. Private keys are kept securely encrypted on our servers and are never, under any circumstances, shared with you or any other third-party. License signature verification is useful for checking if a given license key is authentic, especially in offline environments, where access to Keygen's API to fully validate the license is not available. For more information on license key cryptography and signatures, see the info below, view the cryptography section and review the various policy schemes available. Here are a few examples of cryptographically verifying a license's authenticity: The signed or encrypted contents of the key are base64url encoded using RFC 4648, a URL-safe version of base64 which is supported in most programming languages. This base64url encoding scheme is different than normal base64 encoding. Most programming languages will have a separate function for decoding URL base64 encoded values, but if not, you can simply replace all "-" chars with "+", and replace "_" with "/", e.g. tr '-_' '+/' to convert the encoded string from base64url encoding to standard base64 encoding. Example RSA_2048_PKCS1_SIGN_V2 verification using Python from Crypto.PublicKey importRSA from Crypto.Signature importPKCS1_v1_5 from Crypto.Hash importSHA256 # This should be replaced with your Keygen account's public key (note: all newlines and whitespace must be *exact*) Response signature verification is useful for a variety of scenarios where verifying that a response came from Keygen's servers is vital, such as: Preventing man-in-the-middle attacks. Verifying responses using your public keys will ensure that only responses signed using your private key are accepted. We are the only ones in possession of your account's private keys, so you can rest assured the response was from us and that it has not been altered. Preventing spoofing attacks. For example, a bad actor could redirect requests to a local licensing server under their control, which defaults to sending "valid" responses. Much like with preventing man-in-the-middle attacks, cryptographic signatures give confidence that the response was from Keygen's servers. Preventing replay attacks. For example, a bad actor could "record" web traffic between Keygen and your software, and "replay" valid responses, such as replaying responses that occurred before their trial license expires, in order to use your software with an expired license. If the signature is valid, but the response date is older than 5 minutes, we recommend rejecting the response (granted the local time is synchronized using NTP). Verifying the authenticity of cached data in offline environments. For example, when you perform a license validation request and cache the response for later offline-use, you would want to verify the response signature to ensure that the cache data has not been Verifying the authenticity of webhook events sent to your endpoints. Use request signatures to check if a webhook event was sent from us before processing. This is especially critical when webhooks are used to automate things like billing. We do not sign certain error payloads - please keep this in mind during implementation. We will always sign successful responses (2xx–3xx) and errors that occur while authenticated. Certain error responses, such as a bad request error due to a malformed request, or an internal server error, or a request to an invalid account, will not include the Keygen-Signature header. Relevant response headers The signature result for the response. Depending on the Keygen-Accept-Signature algorithm, this may be signed using Ed25519, RSA-PSS-SHA256 or RSA-SHA256. Default is Ed25519. The base64 encoded SHA-256 digest of the response body. This header is used in the signing data. The date of the response. This header is used in the signing data. The header format Below is the format for the Keygen-Signature header, according to the draft RFC. We have added newlines for readability. The ID of the private key used to sign the response. For the time being, this is your account ID. The algorithm used to sign the response. Supported algorithms are: ed25519, rsa-pss-sha256, and rsa-sha256. The base64 encoded signature of the signing data. The headers used to build the signing data. Verifying response signatures To verify the response signature, the signing data must be reconstructed. The signing data consists of the following 4 components: The first component is what is known as the (request-target). This is formed using the lowercased HTTP method used for the request as well as the request path, and any accompanying query parameters. For example, it may look something like: Or if you include any query parameters in the request, it would look like: The Host that the request was sent to. For requests sent to our API, this will be api.keygen.sh. For example, for an API request to Keygen: For requests sent to a custom domain, this will be the For a webhook event request sent to you, this will be your webhook endpoint's host. The datetime at which the server sent the response. This will conform to the W3C's Date header format. The full header from us will look something like: Date: Wed, 09 Jun 2021 16:08:15 GMT To obtain a digest for a response from our API, take the response body and run it through SHA-256. Then take this value and get its base64 value. For webhooks, this will be a digest of the request body. When generating a digest for the response body, please hash the raw response body string (or bytes), before deserializing the JSON payload for later use. Deserializing and then reserializing the response body may introduce subtle issues such as key sort order, encoding, and unicode escaping. A change in any of these could cause your signature verification to parsing the JSON manually using JSON.parse(), instead of using await response.json(). You would use the raw text() body for signature verification. The full Digest header from us will look something like: When reconstructing the signing data, do not use the digest header we send. You should calculate your own SHA-256 digest of the request or response body, and then compare your encoded hash digest to the digest header we send. When the request or response body is empty, such as with a 204 No Content response, you should still hash the body as if it were an empty string. Remember to prefix the encoded digest with sha-256=. Reconstructing the signing data The first step is to construct a signature string based on the following template using all of the components you have already determined: (request-target): get /v1/accounts/keygen/licenses?limit=1\nhost: api.keygen.sh\ndate: Wed, 09 Jun 2021 16:08:15 GMT\ndigest: sha-256=827Op2un8OT9KJuN1siRs5h6mxjrUh4LJag66dQjnIM= For this particular example, the signing data was as follows, formatted for readability: (request-target): get /v1/accounts/keygen/licenses?limit=1\n We understand that not all programming languages have good support for our preferred signing algorithm, Ed25519. In these cases, you may provide a Keygen-Accept-Signature header to specify one of the following signing algorithms: Sign using 128-bit Ed25519. This is the default signing algorithm. Sign using 2048-bit RSA PKCS1 with a SHA256 digest and PSS padding, a SHA256 MGF1 function and max salt length. Sign using 2048-bit RSA PKCS1 with a SHA256 digest. For example, to use rsa-sha256, you would provide the following header: This would sign the response using your account's 2048-bit RSA private key. To see an example of signature verification, check out our example on GitHub. It will show you how to utilize your account's public key to verify that the response was signed using your account's private key. Other code examples for verifying response signatures:
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00888.warc.gz
CC-MAIN-2023-40
8,149
110
http://oss.sgi.com/archives/xfs/2014-05/msg00638.html
code
On Tue, May 27, 2014 at 10:30:19PM -0700, Christoph Hellwig wrote: > On Wed, May 28, 2014 at 07:26:53AM +1000, Dave Chinner wrote: > > > Right... maybe I'm not parsing your point. The purpose here is to avoid > > > the trylock entirely. E.g., Indicate that we have already acquired the > > > lock and can proceed with xfs_free_eofblocks(), rather than fail a > > > trylock and skip (which appears to be a potential infinite loop scenario > > > here due to how the AG walking code handles EAGAIN). > > I think Christoph's concern here is that we are calling a function > > that can take the iolock while we already hold the iolock. i.e. the > > reason we have to add the anti-deadlock code in the first place. Ah, I didn't parse correctly then. Thanks... > > To > > address that, can we restructure xfs_file_buffered_aio_write() such > > that the ENOSPC/EDQUOT flush is done outside the iolock? > > >From a quick check, I don't think there is any problem with dropping > > the iolock, doing the flushes and then going all the way back to the > > start of the function again, but closer examination and testing is > > warranted... I considered this briefly early on, but wasn't sure about whether we should run through the write_checks() bits more than once (e.g., potentially do the eof zeroing, etc., multiple times..?). > I think we'd need some form of early space reservation, otherwise we'd > get non-atomic writes. Time to get those batches write patches out So the concern is that multiple writers to an overlapped range could become interleaved? From passing through the code, we hit generic_perform_write(), which iters over the iov in a write_begin/copy_write_end loop. If we hit ENOSPC somewhere in the middle, we'd return what we've written so far. I don't believe the buffered_aio_write() path would see the error unless it was the first attempt at a delayed allocation. IOW, mid-write failure will be a short write vs. an ENOSPC error. It seems like it _might_ be safe to drop and reacquire iolock given these semantics (notwithstanding the write_checks() bits), but I could certainly be missing something...
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822668.19/warc/CC-MAIN-20171018013719-20171018033719-00744.warc.gz
CC-MAIN-2017-43
2,120
34
http://allnysports.com/staff-members/dustin-tran/
code
I am Dustin Tran. I am currently a college student enrolled at Wingate University majoring in Sport Management. I make YouTube content in my spare time as I am very passionate about that. Make sure to subscribe to Sports Guy Talking. I also have Instagram and Twitter accounts, so make sure to follow @dustinstran and @trantalks on Instagram while @dustinstran is my Twitter account. Overall, I am very passionate about sports, particularly football and basketball.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710462.59/warc/CC-MAIN-20221128002256-20221128032256-00323.warc.gz
CC-MAIN-2022-49
465
1
https://music-encoding.org/guidelines/dev/content/mensural.html
code
This chapter describes the module for encoding mensural notation from the late 13th century to about 1600. Historically, mensural notation preceded the development of Common Music Notation (CMN) and it included a wide range of features that persist in CMN and that can be encoded in a standard manner in MEI. In mensural notation, pitches are notated as in CMN, leaving out here the major exception of musica ficta. The pitch is given by the position of the note on the staff and the current clef as in CMN, and the mensural module introduces no modification to MEI regarding how pitches are encoded. There are a number of differences, however, in the representation of duration in mensural notation. The mensural module introduces specific attribute values for notes and rests for appropriately encoding mensural durations. One of the main differences is that the duration of a note is not determined by its symbol, but also by the meter and the context in which the symbol appears in relation to other notes and rests in the same voice. The meter is given by one of the 16 mensural species provided by four levels of division: modus major, modus minor, tempus and prolatio. In the case of triple meter and depending on the specific context where the note is positioned, certain rules must be applied in order to determine the duration of a note. In these cases, encoding both the sign and its actual duration is highly recommended (as will be shown in 5.1 Durations). Another difference is the use of proportions that are indicated by numeric ratios or by specific mensuration signs. The proportions indicate that the durations have to be modified and they may be combined. Proportions and mensuration signs were eventually simplified and became time signatures in CMN. The attributes and elements available in this module for encoding mensural signs and proportions can be found below (see 5.2 Mensuration and 5.3 Proportions). In mensural notation, notes can also be notated in ligatures that regroup two or more notes. Ligatures were a legacy from an earlier notation system that were still widely used in Renaissance music notation. They gradually disappeared during the seventeenth century. The mensural module provides multiple ways of encoding the ligatures. When the mensural module is included, dur on note, rest, and other elements takes the following values (from the Latin names of notes): Two or three times as long as a longa Two or three times as long as a brevis Two or three times as long as a semibrevis Half or one-third as long as a brevis Half or one-third as long as a semibrevis Half as long as a minima Half as long as a semiminima Half as long as a fusa Normally, longa rests are vertical strokes occupying two or three spaces in the staff, depending on the mensuration. For instance, in modusminor="3", they take up three spaces; and in modusminor="2", they take two. However, there are situations where both types of longa rests can be present in the same piece, regardless of the modus minor. For this reason, the dur attribute can take on two other values when used within rest elements: The example below illustrates this case in a passage in perfect modus from the triplum voice of a motet in the Roman de Fauvel music manuscript. The blue arrows on the image are pointing to the two-breve and three-breve rests in this passage. 5.1.1Alteration and Imperfection In ternary mensurations, the ambiguity between the note shape and its actual duration requires specific attention. The rules of mensural notation can require the alteration or the imperfection of a note; that is, an increase or reduction in its performed duration. In these cases, if the encoding is intended to be used for more than just graphically representing the notation, encoding only the note shape by means of the dur attribute alone is insufficient. In that case, in addition to encoding the duration sign in the dur attribute, it is recommended to encode its performed duration in the dur.quality attribute. The dur.quality attribute specifies the length of a note according to the contextual rules of mensural notation. Its values, listed below, are adopted from the original Latin terms: Three times the duration of the note in the next smaller degree Two times the duration of the note in the next smaller degree Twice the original duration of the note (only usable in perfect mensurations) Category of a regular semibrevis in Ars antiqua, equivalent to a third of a brevis Category of an altered semibrevis in Ars antiqua, equivalent to two minor semibrevis One of the three categories of a longa in Ars antiqua ('duplex', 'perfecta', and 'imperfecta') The last three values are to be used exclusively in Ars antiqua mensural notation, where maior and minor refer to types of semibreves, and duplex refers to a type of longa. Examples of each of these six values are presented below. In these examples, the ‘voice’ staff renders the notes in the code snippet, and the ‘reference’ staff, together with the dotted bar lines, are shown to help to visualize the relative values of the notes in the ‘voice’ staff. The following example illustrates an alteration (the second brevis) in modus minor perfectus. Notice that the second brevis has doubled its regular value, it has been altered, unlike the first one. It is possible to omit the dur.quality attribute in a note when the performed duration of the note is the default value provided by the mensuration. In this case, the longas are perfect, just as the mensuration (perfect modus minor) indicates. Therefore, the dur.quality attribute can be omitted for the two longas. The same applies to the examples that follow. The following example illustrates an imperfection (the two longae) in modus minor perfectus with the same longa-brevis-brevis-longa sequence but with an additional dot of division between the two breves (see 5.6.4 Dots for more details). Notice that here the longae have been imperfected, unlike the previous example in which they kept the perfect value indicated by the mensuration. The following example in modus minor imperfectus illustrates the use of a dot of augmentation following the longa (see 5.6.4 Dots for more details). Notice that the longa, which is supposed to be imperfect according to the mensuration, has a perfect value due to the augmentation dot. Finally, the following example illustrates the dur.quality values related to the Ars antiqua style, for perfect modus, with the breve equivalents notated in the lower staff for reference (as in the previous Note: In Ars Antiqua, only the longa could be "perfecta" / "imperfecta" and the brevis could have a regular value ("recta") or be "altera". In the Ars nova, principles of imperfection and alteration were extended into the other note levels (brevis-semibrevis and semibrevis-minima). This means that the breves in Ars antiqua do not have a "perfecta" / "imperfecta" quality, and this is why there is no dur.quality attribute for the breves in the previous example. However, the brevis can have a ternary division (indicated by tempus="3"), being divided either into three (equal) minor semibreves or into a minor-maior pair of semibreves. The encoding also allows for the possibility of encoding a binary division of the breve in Ars antiqua notations: the indication tempus="2" indicates the breve is divided into two equal semibreves. This is why in this example with tempus="3", the semibreves do have a dur.quality attribute (with values minor or maior). An alternative encoding---removing the dur.quality attributes for notes which lengths are not modified from their default values (i.e., the perfect long and the minor semibreves)---would be: The conjunct use of the dur and dur.quality attributes is generally enough to encode the duration of a note—and, as indicated before, one could even remove dur.quality when its value is in agreement with the mensuration. However, there are cases (e.g., partial imperfection) where the values of dur.quality are not enough to provide the note’s duration. In opposition to regular imperfection, which is caused by a note of the next smaller degree (e.g., a perfect brevis imperfected by a following/preceding semibrevis), partial imperfection is caused by a note of two or even three orders apart. As an example, consider an imperfect longa made up of two perfect breves. This longa can be ‘partially imperfected’ by a following/preceding semibrevis. This semibrevis causes part of the longa—one of its perfect breves—to be imperfected, taking away one-third of one of its two halves. In this case, the longa’s value changes from 6 semibreves (two perfect breves) into 5 semibreves. Partial imperfection is not supported by the dur.quality attribute—because there can be many cases of partial imperfection, as will be seen in the following examples. To encode a partial imperfection, the num and numbase pair of attributes are used instead. Given the change in the longa’s value from 6 semibreves to 5 semibreves, the corresponding attributes to encode this particular case of partial imperfection would be num="6" and numbase="5" as shown below in the code snippet and its rendering. Partial imperfection can also happen from both sides of a note at once, as shown below: An example of partial imperfection caused by a note three orders apart is given next. Here the longa is partially imperfected by a minima (instead of by a semibrevis). In the next example, the longa is also imperfected by a minima. However, the num and numbase ratio is different from the example above because the default value of the longa here (18 minimas) is different from that of the previous example (12 minimas). Using the mensural module, mensuration signs can be indicated with the attributes available on the scoreDef and staffDef elements. Mensuration signs encoded using attributes on scoreDef are regarded as default values which may be overridden by values attached to individual The division levels corresponding to modus maior, modus minor, tempus, and prolatio can be encoded in the modusmaior, modusminor, tempus, and prolatio attributes respectively. Their value must be 3 (perfect) or 2 (imperfect). The mensur signs themselves can be encoded in the mensur.sign attribute with a possible value of C or O. Its orientation can be encoded in the mensur.orient attribute, for example, with the value reversed for a flipped C sign. The number of slashes (up to 6) can be given in the mensur.slash attribute. There is also a mensur.dot attribute for indicating the presence of a dot through the boolean values true or "false". Describes the rotation or reflection of the base symbol. mensur elements can also be used instead of staffDef and its attributes. In mensur, the division levels are encoded with the previously mentioned modusmaior, modusminor, tempus, and prolatio attributes, while the attributes to indicate the mensur signs are: sign, orient, slash, and dot. mensur can be a child of the staffDef and layer elements. The following example illustrates a change in mensuration. In this case, the element mensur is used within the layer element, preceding the stream of notes affected by the new mensuration defined by Sesquialtera is frequently used to change the mensuration. The effect of the sesquialtera on the mensuration can be encoded by using the tempus and prolatio attributes of mensur (for example, when changing the tempus to perfect, the effect can be encoded in tempus="3"). The actual sesquialtera can be encoded using num="3", numbase="2", and level to define the note level the sesquialtera is applied to (e.g., level="semibrevis"). It is common in Ars antiqua and some Ars nova pieces to have no mensuration signs. In this case, the mensuration—the division levels corresponding to modus maior, modus minor, tempus, and prolatio—is given by the context. The next example shows the incipit of a four-voice piece, Josquin’s Tu solus qui facis mirabilia, where only two of the voices (Cantus and Tenor) have a mensuration sign. The other two (Altus and Bassus) have no mensuration signs, and the mensura is given by the context. Therefore, while only the Cantus and the Tenor have attributes for encoding the mensuration sign (in this case, mensur.sign and mensur.slash), all four voices include attributes to encode the mensura (tempus and prolatio). The division of the breve in Italian trecento notation can be encoded using the divisio attribute, which provides the values: ternaria, quaternaria, senariaimperf, senariaperf, octonaria, novenaria, duodenaria. The divisio attribute would usually replace the use of the tempus and prolatio set of attributes. Describes the divisions of the breve in use in 14th-century Italy. The signs for the Italian divisiones can be encoded in the sign or mensur.sign attribute (to be used with mensur or staffDef respectively), with the values: t for ternaria, q for quaternaria, si and i for senaria imperfecta, sp and p for senaria perfecta, oc for octonaria, n for novenaria, and d for duodenaria. And the additional values for senaria gallica, sg and g, and senaria ytalica, sy and y. Proportions can also be indicated within the staffDef element. The proport.num and proport.numbase attributes are available for encoding the numerator and the denominator of the proportion, respectively. There is also a proport element that can be used as an alternative, with the corresponding num and numbase attributes. Ligatures can be encoded using the ligature element. The form attribute is available for specifying if the ligature is recta or obliqua. In cases where the ligature contains both recta and obliqua notes, the lig attribute of the note element can be used to specify the form of the ligature at the note level. 5.5Music Data Organization The data organization based on measure elements that usually prevails in MEI is not appropriate for mensural notation because most music until 1600 does not have measures (bars) as we understand them today. Even though it is not defined by the mensural module, a more suitable alternate data organization without measures is available: staff elements may occur directly within the section element without being organized into measures first. The organization of events (notes, rests, etc.) within the staff and layer elements remains unchanged. This feature may also be used to encode measured music without using the measure element. That is, the same data organization described above may be used, but with the addition of bar lines, indicated by the barLine element, for those situations where a measure-by-measure organization is not appropriate, for example, when measures are not coincident in all the staves of a score. Other features included in the MEI schema that allow for the encoding of various mensural notation properties are presented below: The notationtype attribute, part of the MEI module, can be used within the staffDef element to specify which dialect of mensural notation is in use. Contains classification of the notation contained or described by the element bearing At the moment, three values are in use for mensural notation: For mensural notation in general For black mensural notation, this is in reference to the use of filled-in note heads For white mensural notation, this is in reference to the use of void note heads, which became most widely used in the Renaissance period The values of the notationtype attribute can indicate notation types other than mensural, such as common (Western) music notation, neume notation, and tablature. The attribute notationsubtype can be used, together with the notationtype attribute, to provide more specificity regarding the type of notation encoded. This attribute can be used, for example, to specify if a piece in black mensural notation (notationtype="mensural.black") is written in Ars antiqua or Ars nova style. Currently, the values allowed in the notationsubtype attribute consist of any sequence of characters provided by the user. Dots of division and augmentation can be encoded by using the dot element (provided by the MEI.shared module). This element is meant to be used as a child of layer following the note or rest after which it appears in the original source. Dots in mensural notation are not encoded as children of notes or rests, but rather as a sibling of these. They are also not encoded as attributes (the use of the dot attribute in a note or rest element is only acceptable in Common Music Notation, not mensural). To indicate the nature of the dot (as a dot of division or augmentation), the dot element has an attribute form, which can take on the following values: Value of the form attribute for a dot of augmentation (this is a dot that adds half the value to the previous note, like a dotted note in common Western music notation) Value of the form attribute for a dot of division (this is a dot that modifies the perfect groupings of the notes, thus, changing some notes' duration in the process) The actual effect of these dots (augmenting a note and making it perfect, or dividing a sequence of notes in different groupings by imperfecting some notes or altering others) is encoded with the dur.quality attribute of the correspoding note elements. Examples of the use of dots of division and augmentation can be found in the 5.1.1 Alteration and Imperfection section. [explain that accidentals are usually encoded as independent elements and that accid.ges can be used within notes] [explain where/how coloration can be encoded] [explain that there is a custos element available]
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510284.49/warc/CC-MAIN-20230927071345-20230927101345-00662.warc.gz
CC-MAIN-2023-40
17,629
142
http://www.tomshardware.com/forum/280628-28-thermal-past-necesary
code
Yes, thermal paste is absolutely necessary. Your stock HSF comes with thermal paste pre-applied. It's the gray patch on the bottom. If you still need thermal paste, I recommend MX-2.ARCTIC COOLING MX-2 Thermal Compound Edit: mi1ez beat me to it. That's pretty funny. Our first sentence is exactly the same.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107744.5/warc/CC-MAIN-20170821080132-20170821100132-00654.warc.gz
CC-MAIN-2017-34
306
2
http://www.crossfitsl.net/bbq-tomorrow/
code
We have sites three and four reserved. Looking forward to a fun day. My plan is to get there right at 10am, if you get there any earlier, start setting up shop. Weightlifting superstar Dmitry Klokov will be hosting a weightlifting seminar at CrossFit San Leandro on June 30th. This seminar is open to everyone! Please use the following link for registration: https://neverstopgrindin.com/collections/klokov-seminars
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376830305.92/warc/CC-MAIN-20181219005231-20181219031231-00544.warc.gz
CC-MAIN-2018-51
415
2
https://tutorialspoint.dev/language/c-sharp/c-command-line-arguments
code
The arguments which are passed by the user or programmer to the Main() method is termed as Command-Line Arguments. Main() method is the entry point of execution of a program. Main() method accepts array of strings. But it never accepts parameters from any other method in the program. In C# the command line arguments are passed to the Main() methods by stating as follows: static void Main(string args) or static int Main(string args) Note : To enable command-line arguments in the Main method in a Windows Forms Application, one must manually modify the signature of Main in program.cs. Windows Forms designer generates code and creates Main without an input parameter. One can also use Environment.CommandLine or Environment.GetCommandLineArgs to access the command-line arguments from any point in a console or Windows application. To Compile and execute the above program follow below commands : Compile: csc Geeks.cs Execute: Geeks.exe Welcome To GeeksforGeeks! Arguments Passed by the Programmer: Welcome To GeeksforGeeks! In above program Length is used to find the number of command line arguments and command line arguments will store in args array. With the help of Convert class and parse methods, one can also convert string argument to numeric types. For examples: long num = Int64.Parse(args); or long num = long.Parse(args); This will changes the string to a long type by using the Parse method. It is also possible to use the C# type long, which aliases Int64. Similarly one can parse using predefined parsing methods in C#.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710980.82/warc/CC-MAIN-20221204204504-20221204234504-00770.warc.gz
CC-MAIN-2022-49
1,541
9
https://community.tp-link.com/en/home/forum/topic/239930
code
Omada SDN products, Access Points, Routers, Switches, Syslog messages, logs, flow records? HELP! I have been working with devices under the new 'SDN' marketing label, specifically a pair of matched EAP225s. I am interested in logging remotely to a syslog server, and ultimately for such logs to be fed into an elasticsearch database for visualisation and correlation with other network events. I mention the reason for doing this, as it pertains to my questions, but the usage is irrelevant here. I have taken the time to write this clearly because I hope the information will be useful to others, especially if it leads to the answers I seek. The information I have recorded below represents perhaps an entire day of investigation(!) To save my fingers, when I use the term GUI I refer to the Omada Controller, of which I run the latest version (4.2.4). "Remote Syslog Server IP/Hostname" and "Syslog Server Port" are set, reflecting my lab environment. In the GUI, on the "Log" (left-hand side) page I see there are three major tabs: Alerts, Events, and Notifications What appears in the Alerts and Events page is controlled by settings on the Notifications page. Here are shown four 'sub tabs' which contain different event types which seem to be categorised as: |Operation||relevant to overall environment| |System||relevant to the controller| |Device||relevant to the EAP, switch, router| |Client||relevant individual users/client devices| For each of the tabs, there is an extensive collection of items. Client Connected to Enterprise SSID (Wireless) |Client Connection Failed (Wireless)||Event|| Alert| |Client Connected (Wireless)||Event|| Alert| Against each event type, eg "Client Connect (Wireless)" are three options: - Event (means such events will appear in events screen on GUI). Here I presume event indicates, simply "it happened" useful for troubleshooting. - Alert (means it will appear on alerts screen on GUI). Here I presume event indicates "it happened, you should check". ALSO alert will trigger a SYSLOG message for remote logging. - Email (means an email will be generated (there is some rolling up of of similarly timed events into an email). I have managed to correlate the categories as follows: |Operation||local2||eg Logs were mailed to a*dy@a#y.com automatically| |System||local3||Master Administrator <redacted> created wireless network with SSID| |Device||local0||[ap:CC-32-E5-7C-9D-FE] was readopted automatically.| |Client||local1||[client:B0-FC-0D-7B-D6-53] is roaming from [ap:CC-32-E5-7C-9E-9A][Channel 6] to [ap:CC-32-E5-7C-9D-FE][channel 44] with SSID| I've left the MAC addresses intact in the example above as they are, after all, only locally relevant to my lab environment, and of little use externally. I hope the above information will guide others, however it is not the entire story, so here are my questions: 1. List/Description of Possible Events by device Can/will TP-Link consider publishing and maintaining a matrix of devices, supported log messages and their respective syslog facilities? Once completed I would expect that maintenance would not be onerous. Indeed I would hope that one exists already internally - and I see little logic in it being considered 'internal use only'. I would anticipate the output being a long list of alert strings, grouped by the (Operation, System) scheme above. For example |Message as it appears||Syslog 'facility'||Lvl||Meaning/Cause| |Client Roaming (Wireless)||local1||info||A device has roamed between access points| Each line of the table would be 'message', Facility (unless my tab->facility is 100% correct), Message meaning (ie the cause, if message is unclear), Severity. If there is any dependency for the alerts ('a' will not occur unless 'b' is ticket) then this too should be described. 2. Could/Would Developers consider improving the 'Client Detail Logs' function into industry standard? I discovered, accidentally, that another of my system logs was getting suddenly very large. In as much as it was the file reserved for internal 'kernel' messages under Linux did cause me momentary panic until I checked the content. After another (unrecoverable) 90 minutes of packat capture, analysis and swearing I determined that this was, indeed, from one of the EAPs, and it was something akin to a primitive form of flow data, in that it represented a 5 second flow capture of Source and Destination IPs, MACs and TCP/UDP ports. This resulted from my clicking the 'Client Detail Logs' option. I would ask why it is included in this form, and if it is intended to continue - could developers take it to the logical extreme and export the data as 'flow' records rather than syslog messages? There are ample standards to include, Netflow, IPFix and sFlow to name but the more common options. It occurs to me that all that is missing now is the size of the packet and the time taken. 3. Please would developers improve the Omada SDN platform logging to meet industry requirements? Having read many posts in this forum, it is quite clear that the logging functionality of the overall platform is insufficient to meet the needs of its intended customers. You are presumably positioning these SDN products at the Small to Medium Business Sector, and within that the education and hospitality sectors. Many customers will have statutority as well as operational needs to user logging, flow and access records as well as for details of failed logins and other information. It seems that the platform supports a far greater granularity than current exposed - so how's about it? My experience with current and recent products (I still run a pair of T1600G-28TS switches which provide way more granular syslog features AND (though not my version) sflow exporting (solves the 'who accessed what?' requirement of many). I fear you have 'dumbed down' the overall platform in the hope of attracting the 'prosumer' - and in doing so, put off the business community who were happy to purchase from you, as opposed to Cisco or Juniper (at far greater cost). 4. In light of my experience with 'Client Detail Logs' - could you please identify what other GUI options might/do lead to a sudden explosion in data output? 5. Please would you consider some 'case studies' to highlight how your logging features actually meet some or all of the requirements identified elsewhere on this forum (eg firewall logs) etc. I hope you are able to respond to this. While I am not a greater spender of money, I have remained relatively loyal to TP-Link, however I am starting to despair over the 'dumbing down' of the product, and subsequently Ubiquiti and Mikrotik products - which compete in the same space as your Omada SDN - have far greater appeal. For the purpose of searches: TP-Link, Omada SDN, EAP225, EAP245, R600, R605, syslog, facility, elasticsearch, logstash, kibana, router, switch, access point.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679518883.99/warc/CC-MAIN-20231211210408-20231212000408-00544.warc.gz
CC-MAIN-2023-50
6,875
42
https://smtcmpo.org/data/
code
About SMTC Data Data-driven planning and decision making is quickly becoming recognized across industries as a best practice. At the SMTC, we take a data-driven approach to transportation planning. The SMTC houses several datasets relating to Onondaga County and the Central New York Area, either by our own creation or acquired from other agencies. The data created by the SMTC is available for public use. To inquire about data that has been derived elsewhere, please contact the appropriate agency. What is GIS and How is it Used at the SMTC? GIS (Geographic Information Systems) are computer-based tools combining mapping and database technologies for the analysis and visualization of all forms of geographically referenced information. GIS technology integrates powerful database functions, such as querying and statistical analysis, with visualization tools to represent information graphically through a static or interactive map. GIS allows users to not only view geographic data in maps, charts and reports but to also ask questions about the data to reveal relationships, patterns and trends. As a transportation planning agency, the analysis and visualization of geographic information is an integral part of what we do.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817289.27/warc/CC-MAIN-20240419043820-20240419073820-00859.warc.gz
CC-MAIN-2024-18
1,232
4
https://news.ycombinator.com/item?id=23687808
code
"Note: this provides only partial compatibility with Lua 5.2 at the language and Lua library level. moonjit is API+ABI-compatible with Lua 5.1, which prevents implementing features that would otherwise break the Lua/C API and ABI (e.g. _ENV)." Some internal language changes in 5.3, like the new integer type, would require deep surgery in the JIT. This also seems to be the main (but not only) reason why Mike Pall doesn't have plans to ever support Lua 5.3. (https://www.reddit.com/r/lua/comments/2zutj8/mike_pall_luaji...) LuaJIT had a beta release 3 years ago and hasn't been updated since. The last commit is from 5 days ago.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655912255.54/warc/CC-MAIN-20200710210528-20200711000528-00100.warc.gz
CC-MAIN-2020-29
630
4
https://www.upwork.com/job/English-speaking-graphic-designer_~01a3681032a5200c4a/
code
We are seeking an English-speaking graphic designer for ongoing design projects. The types of projects will include the following: * Landing Page Design * Presentation Templates * Email marketing campaign * Direct mail marketing pieces * Banner ads * Photoshop, Illustrator or other design tools of choice used to output web and print ready files Companies, please don`t apply. Only individuals will be considered. Apart from these technical skills, the desired soft skills are: Positive Attitude, Efficiency and Punctuality. The following points will matter during the selection of a candidate: 1. You should be an Individual, not a Company 2. You should be able to estimate the time required for the task you are assigned. 3. You should be able to give references of your previous work. This is a long term position and should last more than 6 months. This is an Hourly job, and you would need to track your time using odesk-Team. * Please specify what hours and what time zone you will be available. Skills: design, marketing, banner
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718278.43/warc/CC-MAIN-20161020183838-00468-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
1,036
17
https://software.intel.com/en-us/forums/level-up-2010-intel-visual-adrenaline-game-demo-challenge-read-only/topic/285394?language=ru
code
Did anybody (from the Winners' List) receive any feedback from the judges? I emailed Lowry asking what's going on -- I never got an answer ... So I finally got (10 mins ago) the so-called (4 lines!!!) feedback. One line says: Basically incomprehensible. I couldn't figure out how to even move a piece on the chessboard. gENIUS, as any toddler knows, there are 2 (TWO!!!) possibilities (not to mention that everything is clearly explained in the Abstract and Tutorial: http://www.youtube.com/watch?v=XIXcd4al6kw): left-click and left-click OR left-click and right-click. If you couldnt figure that out then no McDonalds will ever hire you to flip the burger; who hired you as an expert at Intel is beyond me Dude you are a bit too harsh, they did check a lot of games. I got mine with mixedreviews,wonder who said what ? Tell me what you think of the game! Gamename: Solar Conflict Feedback from Judging Panel: Nice explosions. Nice retro feel. This retro game was a lot of fun! The AI might be a bit too tough for the tutorial. I'll play this one again. No sound, alas, or it would have scored better. This is a rough little compilation of a few hit products. As an idea it is more fleshed than as a demo. But it is a good idea. Controls are wonky, key layout isn't friendly, ships are too slow and lumbering for dodging to work. Everything meaningful and difficult about a game like this remains to be done. yeah man, your stuff is OK (but hey, explosions with no sound?!), although far from being original. But BilliChess is not only 100% original, but also the smartest* game in the history of video games. For a judge that was supposed to read the Abstract and check the Tutorial on YouTube (the link for the Tutorial was provided in the Abstract) to say "Basically incomprehensible. I couldn't figure out how to even move a piece on the chessboard." is absolutely unacceptable. Many people played BilliChess (the MP version is up and running) and nobody complained but that expert Chess is the game of Kings and Queens, widely considered the most intelligent game. A game of chess with an (intelligent) extra-challenge cant but be the smartest game in the history of video games. Why did BilliChess deserve that comment from that expert is beyond me
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315936.22/warc/CC-MAIN-20190821110541-20190821132541-00129.warc.gz
CC-MAIN-2019-35
2,254
30
http://redmondwebservices.com/make-your-own-dog-toys/
code
Hello my name is Brian and i want to introduce my website to you. We are a group of 5 German People who love to work with dogs. We train them and socialize them so they can get a new home. Now we’ve set a website up and provide usefull informations about how to train and socialize your dog. Also there are many Recipes to make your own Dog treats. We Show you how to play with your dog(hundespielzeug selber machen) and how you can make your own Dog Toys. Dogs love alot of different activitys and simply going out for a walk isnt enough for the most dogs, so we spezialized to provide you usefull hints and guide on how to make that happen. If you need more informations feel free to look here. We wish you a wonderfull day, go outsite and play with your Dog! PS: If you’re looking for some hair tutorials, feel free to visit einfache hochsteckfrisur.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118851.8/warc/CC-MAIN-20170423031158-00347-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
857
3
http://soasidewalk.blogspot.com/2008/01/
code
In my readings, I found the topic of versioning discussed in Thomas Erl's SOA Principals of Service Design. I wanted to provide a brief mention of Thomas Erl's vantage as it provides another view of the topic. As I mentioned in the previous post, changes to the WSDL definition causes service consumers to break. Thomas' take on this is for core entity services and their associated contract to remain constant. Extension to those services can be performed which will not affect the service consumer. For Services that need to be dynamic and cannot be developed with longevity in mind, then SOA Governance is applied to manage versioning of services. SOA Governance solutions that I have heard marketed in the past provided XML Routing solutions which would inspect requests and then use a lookup mechanism to route to the eventual destination. In this case, multiple versions of a service could exist and it would be up to the Governance solution to manage the Addressing aspects. Another perspective of Service Versioning is James Pasley of Cape Clear and his examination of the current environment. His description of versioning best practices is available at: and discusses the options for deploying various service versions concurrently.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866926.96/warc/CC-MAIN-20180624083011-20180624103011-00003.warc.gz
CC-MAIN-2018-26
1,242
5
http://squaredpeg.com/index.php/2008/11/08/the-recruitment-long-tail-2/
code
Yesterday I gave my presentation, The Recruitment Long Tail, at the Stamats Conference in St. Petersburg, FL. I think it was well-received and several people told me they got great ideas and thoughts to take back to their school. If you have 55 minutes, click play below and tell me what you think. Nice to see everyone at the conference! I’m going to unplug for a few days, so I’ll see you next week and will have some more thoughts on the conference. Enjoy!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118713.1/warc/CC-MAIN-20170423031158-00005-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
463
2
https://www.jobswipe.net/exit/?jobHash=E349BC00A8714F5300040FD7C8064011
code
DevOps Engineer - Competitive Salary + Benefits - Remote, Canada Are you adept at implementing infrastructure as code (IaC) using tools like CloudFormation? Do you have experience managing AWS resources and working with the Serverless Framework? If so, we have an exciting opportunity for you. Vmo Solutions is a leading software development company specializing in flight operations and flight planning software for airlines. We are seeking an experienced DevOps Engineer to join our team in creating industry-disruptive software. The ideal candidate for this job should possess a robust background in automation tools and CI/CD pipelines, with a particular emphasis on AWS and familiarity with the Serverless Framework. A strong coding and scriptwriting foundation is essential, with proficiency in PowerShell being a notable advantage. Proficiency in technologies such as Serverless Framework, GitHub Actions, TypeScript, PowerShell, and AWS services like CloudFormation and CloudWatch is necessary. - Lead DevOps Initiatives: Develop and maintain CI/CD pipelines within an AWS stack, ensuring smooth and reliable deployment processes. - Build Internal Tooling: Create custom solutions for automation, troubleshooting, and enhancing development processes. - System Monitoring and Metrics: Establish comprehensive monitoring solutions to track application and infrastructure health, performance, and security. - Collaborate Across Teams: Work closely with software engineers, product managers, and stakeholders to integrate feedback and define system specifications. - Drive Innovation and Continuous Improvement: Recommend innovative solutions and improvements to current processes and technologies. Vmo Solutions is a Canadian-based software development company specializing in web-based operational control and flight planning software. Founded in 2010 by a former commercial airline pilot, crew scheduler and developer, Vmo combines its aviation experience and insights to address operational inefficiencies with technology. - Competitive compensation packages, aligned with experience and qualifications. - Group health and dental benefits. - A health and wellness allowance. We're seeking candidates with: - Solid experience with automation tools and CI/CD pipelines, particularly within AWS and with the Serverless Framework. - Strong coding and scripting skills, with proficiency in PowerShell being advantageous. - Experience in infrastructure as code (IaC), ideally with CloudFormation. - Exceptional analytical, written, and verbal communication skills. - Proficient in the following technologies: - Serverless Framework - GitHub Actions - Amazon Web Services (AWS) CloudFormation, API Gateway, EventBridge, EC2, SNS SQS, S3, Step Functions, CloudWatch, Cognito, KMS, DynamoDB. If you are keen on joining this exciting, forward-thinking company and taking
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818374.84/warc/CC-MAIN-20240422211055-20240423001055-00349.warc.gz
CC-MAIN-2024-18
2,868
23
https://www.daniweb.com/programming/web-development/threads/353408/ie8-to-ie7-emulation
code
Hi there, I've been searching all over the internet for a solution to this problem but can't seem to find anything that solves it. I got a masterform with the following code: <%@ Master Language="C#" AutoEventWireup="true" CodeFile="FolderMasterForm2.master.cs" Inherits="FolderMasterForm2" %> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head" runat="server"> <meta http-equiv="X-UA-Compatible" content="IE=EmulateIE7" /> ... ... ... and all the pages who use the masterform are supposed to be displayed in IE7-mode, but for some reason the internet browser ignores the IE7 emulation and displays it as IE8 as default. (I can go to the developer's menu and change it to IE7 and ti works, but I don't want my users to do this over and over again) Any ideas why is the "content='IE=EmulateIE7'" code ignored? ANY kind of help is much appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826049.46/warc/CC-MAIN-20171023130351-20171023150351-00251.warc.gz
CC-MAIN-2017-43
854
6
http://javacolors.blogspot.com/2013/02/
code
After some googlings, I finally found the easiest solution to fix a well known problem with Eclipse code assistant under my Linux with gnome (Mint Mate). The problem symptom is black text written over dark gray background : simply unreadable. To fix that, just install gnome-color-chooser, open it, go to "specifics" tab and change tooltips foreground and background colors. Restart Eclipse and enjoy! PS : to install gnome-color-chooser sudo apt-get install gnome-color-chooser This tip also works on Linux Mate. Friday, February 15, 2013 Tired of green over blue colors in default Ubuntu shell for directories ? Just type this from your shell console to update your bash profi... I've just received my first arduino platform. It's a DCcduino board (a clone of Arduino Uno). As I had some difficulties to hav... I'm an old user and addict of JRebel. I started to use it on open source projects and in professional contexts. From the beginning, I... This is the challenge I had to perform. I have to open services to business partners and I want to secure them. I use a Java based applicati...
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203462.50/warc/CC-MAIN-20190324145706-20190324171706-00251.warc.gz
CC-MAIN-2019-13
1,093
11
https://hackjr.pw/monster-paradise-webnovel-chapter-1493-are-you-sure-you-want-me-to-remove-my-mask/
code
If you are looking for Monster Paradise-Webnovel Chapter 1493 – Are You Sure You Want Me To Remove My Mask? you are coming to the right place. Monster Paradise-Webnovel is a Webnovel created by Nuclear Warhead Cooked in Wine, 酒煮核弹头. This lightnovel is currently ongoing. Chapter 1493: Are You Sure You Want Me to Remove My Mask? Translator: EndlessFantasy Translation Editor: EndlessFantasy Translation At eight o’clock sharp in the morning, Buried Heaven arrived promptly. In the presence of the members of Death Sickle’s inner circle, he revealed himself using his original appearance—a white-haired young man, less than 1.6 meters tall. As soon as he entered the room, he saw Lin Huang sitting in the first row, seemingly not getting along with everyone else. At the sight of Lin Huang, he was taken aback for a moment. Although he was not a sword cultivator, he was a well-known figure who was among the top-tier Heavenly G.o.ds, and he could clearly sense that Lin Huang’s Sword Dao had broken through to heavenly rule-level. Looking away from Lin Huang discreetly, he glanced at the other people sitting at the back. When he saw the expressions on their faces, he immediately understood what was happening. He said to Lin Huang, “Newcomer, why don’t you briefly introduce yourself?” Lin Huang nodded. He stood up, turned to look at the people behind him, and took off his hood. “I’m Xiu Mu, and I’ve just recently joined Death Sickle. I’ll be in your care.” Huang Mu was the real name of this ident.i.ty, while Xiu Mu was the code name that he had applied for in Death Sickle. After this simple introduction, Lin Huang turned around and sat back down again. Buried Heaven raised his brows at Lin Huang’s brevity; he guessed that Lin Huang was probably putting on an act. The others in the conference room were rather dissatisfied with this, however. “This fellow is saying that he’ll be in our care, but there’s nothing in his expression or his att.i.tude that makes it seem like he needs our care, is there?” “What a terrible personality this fellow has!” “He sure has some b.a.l.l.s, acting so arrogant even in front of Senior Buried Heaven!” Naturally, Lin Huang heard these grumblings, but he could not be bothered to respond to them. The corners of Buried Heaven’s lips quirked up slightly. Conversely, he found Lin Huang’s role-playing very amusing. “Alright, since everyone else already knows each other, there’s no need for further introductions. “Everyone’s already here, so we’ll head out now.” As soon as he said that, Buried Heaven shook the cuff of his sleeve, and a green-colored snake as thick as a pinky finger shot out, landing on the conference table. The little snake merely opened its mouth slightly, and Lin Huang, along with the other six people, rapidly shrank in size, turning into tiny particles that were swallowed up by the tiny snake. After swallowing the seven of them, the little black snake transformed into a python, and in a flash, Buried Heaven stepped up on top of its head. The next instant, a black whirlpool appeared out of nowhere, and the black python slid into it, bringing Buried Heaven along. A moment of dizziness and darkness later, when Lin Huang and the others were spat out by the python, they found themselves already in an expanse of void. Lin Huang looked around. Buried Heaven—who was standing to one side—had long since changed his appearance into that of a muscular man who was more than two meters tall. The six people who had been in the conference room previously were all present as well. In addition to the few partic.i.p.ants from Death Sickle, more than a dozen organizations had also arrived, each forming a small group. The number of people was quite small. Lin Huang even saw two grade-7 organizations that had sent only ten people—five Virtual G.o.ds and five True G.o.ds, no less. Just when Lin Huang was wondering if this secret territory had a limit for the number of partic.i.p.ants, Destiny could not help speaking up from where he was standing to one side. “Master Buried Heaven, even the grade-7 organizations have sent so few people. Is this because the secret territory has a limit on the number of partic.i.p.ants?” “That’s not the reason.” Before Buried Heaven could even open his mouth, a True G.o.d beside them spoke up, “It’s because the hunts in this secret territory hunting are solo battles, and each person’s hunting points count only toward themselves. That’s why the major organizations have selected only the strongest powerhouses within their own organizations. This is also to prevent weaklings from joining, so as not to disgrace the entire organization through earning hunting points that are far too low.” He deliberately glanced at Lin Huang as he delivered this last sentence. This True G.o.d was Wild Fiend, the current number three on Death Sickle’s White Sickle Leaderboard. His main reason for being upset with Lin Huang was that previously, Buried Heaven had announced that only three True G.o.ds from Death Sickle would be entering the secret territory this time. This year, he had only managed to secure third place on the White Sickle Leaderboard after much difficulty and had very nearly lost the position to other people. However, this limited spot that he had managed to obtain only after a year of hard work had been easily secured by a newcomer, in a complete departure from the rules. Naturally, he was extremely displeased. Lin Huang had no idea how precious his spot was. He had only asked Buried Heaven for it because he needed it, and Buried Heaven had immediately agreed. Buried Heaven had not mentioned how scarce these spots were either. Of course, he could pick up the indirect barb in Wild Fiend’s words, but he did not know why the other showed such animosity toward him. He a.s.sumed that his previous att.i.tude had upset Wild Fiend, so he just ignored the other’s provocation. In Lin Huang’s opinion, such low-level provocation was meaningless. If the other party were genuinely capable, he should be thinking about how to crush Lin Huang in terms of hunting points, instead of verbally making oblique accusations at him before the hunt had even begun. Seeing that Lin Huang did not rise to the bait, Wild Fiend did not continue being aggressive. On the one hand, Senior Buried Heaven was right there, so Wild Fiend could not simply antagonize Lin Huang. On the other hand, there were also many other organizations in the vicinity, and it would not reflect well if others were to witness internal conflict within Death Sickle. The truth was, if it were not for his apprehension at Buried Heaven’s presence, he might have directly started a fight with Lin Huang when they were still in the conference room. What Wild Fiend did not know, however, was that he was lucky. If he had chosen to make a move against Lin Huang at that time, there was a high chance that he might have immediately lost this opportunity to enter the secret territory. Ignoring the murmurs of the people beside him, Lin Huang directed his gaze toward the other organizations’ sites. The partic.i.p.ants from the two grade-7 organizations—the Combat G.o.d Temple and Xeno—had all arrived. He even saw a few familiar faces, such as Unrivaled G.o.d from the Combat G.o.d Temple, and Frontier from Xeno… More than a year had pa.s.sed, yet these old acquaintances, just like Fallen Star and the others, were still at virtual G.o.d-level rank-9. However, their auras had obviously become much stronger than before. Just when Lin Huang felt regretful that he had left this group of individuals far behind him in terms of advancement, a figure suddenly leaned over from beside him. “Haven’t I seen you somewhere before?” Surprisingly enough, the speaker was the black-robed Virtuoso. Their voice was very neutral, and it was impossible to make out whether they were male or female. Lin Huang turned around to look at Virtuoso and smiled as he answered a touch mockingly, “You’ll have to take your mask off for me to have a look, then I’ll know if we’ve met before or not.” As the few Death Sickle members were wondering why Virtuoso had taken an interest in this newcomer, they heard what Lin Huang said, and their expressions immediately became rather odd. “Are you sure you want me to remove my mask?” Under Virtuoso’s white mask, red lips quirked up slightly. However, their mask was actually concealing their lips. Logically speaking, Lin Huang should not have been able to make out any expression on the other’s face, but he definitely saw the corners of their lips curl up. Right at this point, Buried Heaven could no longer keep silent. “The secret territory is opening soon—both of you better not cause any trouble!” Lin Huang noticed something unusual in Buried Heaven’s tone as he said that, and guessed that something might happen if the other party were to remove their mask. Judging from the expressions on the others’ faces, it was not likely to be anything good. This made Lin Huang a little curious as to the abilities of this fellow who was ranked first on the White Sickle Leaderboard.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663048462.97/warc/CC-MAIN-20220529072915-20220529102915-00341.warc.gz
CC-MAIN-2022-21
9,240
58
http://www.pomona.edu/tours/qtvrtour/help.shtml
code
Using the Basic Controls to view a panoramic movie: click and hold the mouse button down and drag across the image in the direction you want to look. To zoom in and out, click and hold down the + button (zoom in) down or click and hold the - button (zoom out) down. You may zoom in and out using the keyboard as long as the mouse is over the panorama. Hold the shift key down to zoom in. Hold the control key down to zoom out. Finding and Using Hot Spots: Hot spots are areas within a panorama which are links to another campus Clicking on a hot spot will take you to the corresponding campus location. Where are the hot spots that create links from location to location? Move your mouse pointer around the movie image. When moved over a hot spot, the active icon changes from a bulls eye to a finger and globe, denoting that area is a hot spot. Clicking on the question mark arrow button in the control bar below the panorama manually shows and hides hot spots (Mac users double-click the arrow button to show and hide hot spots). When Hot spots are turned on they appear as translucent blue rectangles.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537804.4/warc/CC-MAIN-20140416005217-00442-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,104
11
https://www.rand.org/pubs/papers/P2850.html
code
This paper illustrates the possibilities as well as the limitations of the project-history approach to testing conjectures about the nature of development. A number of histories are presented in each of several areas of military technology. The histories describe, with varying thoroughness, (1) the major uncertainties in the project's successive stages; (2) the commitments made at each stage; and (3) the size of the project's total effort and the technical advance achieved by the developed item. Marschak, Thomas A., The Role of Project Histories in the Study of R&D. Santa Monica, CA: RAND Corporation, 1964. https://www.rand.org/pubs/papers/P2850.html. Marschak, Thomas A., The Role of Project Histories in the Study of R&D. RAND Corporation, P-2850, 1964. As of December 8, 2023: https://www.rand.org/pubs/papers/P2850.html
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100909.82/warc/CC-MAIN-20231209103523-20231209133523-00660.warc.gz
CC-MAIN-2023-50
831
3
https://community.mcafee.com/t5/ePolicy-Orchestrator/Unknown-failure-processing-package/td-p/53876
code
C:\Program Files\McAfee\ePolicy Orchestrator\DB\Logs\EpoApSvr.log I am also seeing this error, I have tried downloading new packages from http://www.mcafee.com/apps/downloads/security-updates/security-updates.aspx I have tried different dats and Sdats and still receive the same error. We are using epolicy orchestrator 4.5 to distribute the packages. When i run the SDAT manually on a client it works find and the Dat updates. this is only happening with the newer SDATs after they changed the icon. I was sucessfull checking in package sdate6230 but not 6237, 6239, or 624. I have tried restarting all the servers rebooting the server still getting the same error. I did look at the log and there is nothing apparent to me see attached. Message was edited by: ppaquette on 05/02/11 12:34:58 CST AMMessage was edited by: ppaquette on 06/02/11 4:13:25 CST AM I'd always recommend using the zips - they contain the full dats and the incrementals, whereas a superdat only contains the full dat. So if you're using sdats, a machine that is one day out of date will pull the entire sdat, when all it really needs is one incremental.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590362.13/warc/CC-MAIN-20180718232717-20180719012717-00269.warc.gz
CC-MAIN-2018-30
1,128
4
https://www.tech2max.com/password-managers/
code
While I have never used 123456, password, or qwerty, the ever growing need for not only complex but independent passwords (unique to account, site, system, etc) keeping track of multiple usernames and passwords in my memory just isn’t possible any more. I have for some time used password managers to keep usernames, passwords, etc., and have been asked by friends and peers what and why I use certain ones. There are many good choices available these days that range from basic, like keeping a word or txt documented list, to complex applications that will populate every bit of information about you (that you give it) into web based forms. I believe most of us are looking for a good middle ground that is easy enough to use that it will actually be used. In my case, I do not care to keep my credit card information in an application to fill out forms for me because I am too lazy to pull out my wallet, a simple copy and paste solution is all I needed. My requirements for a password manager: - Secure / Encrypted - Easy to use - Small footprint The password managers I use are based off the Password Safe open-source project, which is around 10 years old, and uses the 256-bit Twofish encryption algorithm. An outline of the PasswordSafe database format can be found at: http://sourceforge.net/p/passwordsafe/code/5212/tree/trunk/pwsafe/pwsafe/docs/formatV3.txt So here they are, what I use, and what I would recommend. pwSafe became my default password safe for personal use when I started using the iOS version a couple years ago. The app has grown positively with great screen support for the iPhone and iPad and using iCloud my safes are available across all my Apple devices. Dropbox support is available with purchase of a plug-in for a couple dollars more (I have never used it) and would allow safe synchronization across platforms. Switching from Windows to Mac at work for my primary computer I simply copied my safes from PasswordSafe my choice for Windows (below) without any problems. For Mac – ~$15 USD – http://www.pwsafe.info/mac For iOS – ~$3 USD – http://www.pwsafe.info/ios Windows – $Free – http://pwsafe.org On Windows I use PasswordSafe, the original project that created the database format used by the apps above.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817765.59/warc/CC-MAIN-20240421101951-20240421131951-00724.warc.gz
CC-MAIN-2024-18
2,257
12
https://rog-forum.asus.com/t5/rog-zephyrus-series/red-tint-asus-zephyrus-gx502/m-p/873304/highlight/true
code
Hi guys, I noticed a red tint on my Zephyrus GX502. I updated NVIDIA drivers and checked Monitor's drivers as well. The most weird thing is that when I unplug something, my keyboard for example, the screen becomes normal. Someone can help there ? I haven't updated for Windows 1909 yet.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511053.67/warc/CC-MAIN-20231003024646-20231003054646-00343.warc.gz
CC-MAIN-2023-40
286
2
http://stackoverflow.com/questions/15253063/phusion-passenger-cant-free-port
code
Ok, i'm running passenger standalone, and made a dumb mistake, now I need help fixing. So a test app directory was running standalone passenger on a specific port, and I deleted the directory so that I could pull a new app in place of it (and use the same port). Well, not thinking about passenger at all, I should have stopped the daemon first. Well, now the port is tied up somewhere, and I cannot figure out for the life of me how to stop it. I found the process that the port started on, and killed it, but to no avail. The address is still bound and unusable. Short of restarting the server (not really a viable solution for me), how can I kill that nginx / passenger process all together so that I can start a new instance of passenger on that port?
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701156627.12/warc/CC-MAIN-20160205193916-00114-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
755
3
http://making-security-measurable.1364806.n2.nabble.com/OWASP-Top-10-td7583770.html
code
that would be nice to try to update the relationships between CAPEC and the OWASP Top 10 CWEs. I would suggest to use a mapping of the different version of OWASP Top 10 e.g. for all the current CAPEC/CWE relationships to CWE-713 OWASP Top Ten 2007 Category A2 - Injection Flaws I would suggest to add the same relationship to CWE-929 OWASP Top Ten 2013 Category A1 - Injection
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250614086.44/warc/CC-MAIN-20200123221108-20200124010108-00250.warc.gz
CC-MAIN-2020-05
376
7
https://careers.northeastern.edu/event/ask-an-owner-engineer-from-greensight/
code
http://www.greensightag.com. Greensight generally hires 5 co-ops from Northeastern per semester. We do not assign required majors to those co-ops, we search for and find the best fits among students interested. We have hired aerospace, mechanical, electrical and computer engineers, as well as (less often) business, physics, and chemistry majors. if you’re intensely interested in robotics, especially UAV’s, give us a look!.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510671.0/warc/CC-MAIN-20230930082033-20230930112033-00226.warc.gz
CC-MAIN-2023-40
430
1
https://bantockpark.com/qa/what-are-the-different-types-of-layouts-in-android.html
code
- What is Android constraint layout? - What is a cell layout? - What is frame layout? - What is linear layout in Android? - What is Android app activity? - What are five types of layouts built into the Android SDK framework? - What are the 4 basic layout types? - How do you kill an activity? - Which layout is faster in Android? - What are layout types? - What is the view in Android? - What is absolute layout in Android? - What is layout and its types in Android? - Where are layouts placed in Android? - What is last known location in Android? - How many types of layouts are there in Android? - Which layout is best in Android? - What is office layout types? What is Android constraint layout? A subclass of ConstraintLayout for building animations. A ConstraintLayout is a android. ViewGroup which allows you to position and size widgets in a flexible way. Note: ConstraintLayout is available as a support library that you can use on Android systems starting with API level 9 (Gingerbread).. What is a cell layout? Cellular layouts are the actual organization of a department so that similar products are manufactured together. The most effective cells manufacture a small portion of similar products and contain all of the needed equipment and supplies to complete the process for that cell. What is frame layout? FrameLayout is designed to block out an area on the screen to display a single item. Generally, FrameLayout should be used to hold a single child view, because it can be difficult to organize child views in a way that’s scalable to different screen sizes without the children overlapping each other. What is linear layout in Android? LinearLayout is a view group that aligns all children in a single direction, vertically or horizontally. You can specify the layout direction with the android:orientation attribute. Note: For better performance and tooling support, you should instead build your layout with ConstraintLayout. What is Android app activity? An Android activity is one screen of the Android app’s user interface. In that way an Android activity is very similar to windows in a desktop application. An Android app may contain one or more activities, meaning one or more screens. What are five types of layouts built into the Android SDK framework? Common Android LayoutsLinearLayout. LinearLayout has one goal in life: lay out children in a single row or column (depending on if its android:orientation is horizontal or vertical). … RelativeLayout. … PercentFrameLayout and PercentRelativeLayout. … GridLayout. … CoordinatorLayout. What are the 4 basic layout types? There are four basic types of layouts: process, product, hybrid, and fixed position. How do you kill an activity? You can also add android:noHistory=”true” to your Activity tag in AndroidManifest. xml . Yes, all you need to do is call finish() in any Activity you would like to close. Which layout is faster in Android? Measurement results: ConstraintLayout is faster We recommend that you use ConstraintLayout when designing your app’s layouts. In almost all cases when you would have previously need a deeply-nested layout, ConstraintLayout should be your go-to layout for optimal performance and ease of use. What are layout types? There are four basic layout types: process, product, hybrid, and fixed position. In this section we look at the basic characteristics of each of these types. What is the view in Android? View is the basic building block of UI(User Interface) in android. View refers to the android. It can be an image, a piece of text, a button or anything that an android application can display. … The rectangle here is actually invisible, but every view occupies a rectangle shape. What is absolute layout in Android? A layout that lets you specify exact locations (x/y coordinates) of its children. Absolute layouts are less flexible and harder to maintain than other types of layouts without absolute positioning. What is layout and its types in Android? Layouts Part of Android Jetpack. A layout defines the structure for a user interface in your app, such as in an activity. All elements in the layout are built using a hierarchy of View and ViewGroup objects. A View usually draws something the user can see and interact with. Where are layouts placed in Android? In Android, an XML-based layout is a file that defines the different widgets to be used in the UI and the relations between those widgets and their containers. Android treats the layout files as resources. Hence the layouts are kept in the folder reslayout. What is last known location in Android? Go to Android.com/find. Sign in with your Gmail account and password. On the map, you’ll see your phone’s approximate location. If the device cannot be found, it’ll show you the last known location (if available). How many types of layouts are there in Android? Android Layout TypesSr.NoLayout & Description1Linear Layout LinearLayout is a view group that aligns all children in a single direction, vertically or horizontally.2Relative Layout RelativeLayout is a view group that displays child views in relative positions.5 more rows Which layout is best in Android? TakeawaysLinearLayout is perfect for displaying views in a single row or column. … Use a RelativeLayout, or even better a ConstraintLayout, if you need to position views in relation to siblings views or parent views.CoordinatorLayout allows you to specify the behavior and interactions with its child views.More items…• What is office layout types? Definition of Office Layout “Office layout is the arrangement of equipment within the available floor space”. According to Hicks and Place, “The problem of layout relates to the arrangement in the space involved so that all the equipment, supplies, procedures and personnel can function at maximum efficiency”.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154798.45/warc/CC-MAIN-20210804080449-20210804110449-00335.warc.gz
CC-MAIN-2021-31
5,855
57
https://thelinuxcode.com/setup-android-emulator-without-installing-android-studio-in-linux/
code
Have you ever wished you could run Android apps or games on your Linux desktop? Setting up the official Android emulator provides an easy way to access the Android environment without dual booting or specialty hardware. Typically running the emulator requires installing Android Studio, the full integrated development environment (IDE) for building Android apps. However, this step-by-step guide will teach you how to setup and use the emulator on Linux by just installing the Android SDK command line tools. Why Set Up the Android Emulator Without Android Studio Here are some of the most common use cases and advantages for running the Android emulator as a standalone tool instead of part of the complete Android Studio suite: Test Apps in Development If you are involved in Android app dev projects, the emulator allows you to properly test apps without needing to deploy to a physical device every time. The emulator simulates actual Android devices down to specifications like screen size, resolution, hardware capabilities, and more. Complex elements like sensors, GPS, or the camera can be emulated to mimic real world functionality. Running tests in the emulator enables much faster iteration than physical devices. Play Android Games The emulator gives you access to download and run most games available on the Google Play store, expanding your library beyond just native Linux titles. This allows you to enjoy mobile gameplay experiences from popular genres like FPS, RPG, racing games, and more without purchasing specialty hardware. Run Android Software Tools In addition to apps and games focused on the end user experience, developers also produce Android tools for purposes like network analysis, remote device control, automation tools and testing software. The emulator empowers Linux users to access this wider ecosystem of Android utilities. Understand The Android Environment Using Android emulator allows you to explore Android OS capabilities, settings, themes, launchers, customization options and more. Getting hands on with the environment empowers you to better understand modern mobile platforms. Save System Resources Installing the full Android Studio IDE consumes significant storage and memory during operation. By setting up just the command line tools and emulator, you avoid excessive resource overhead while still gaining functionality. Now that you understand the benefits, let‘s move on to getting Android up and running on Linux minus the extra bloat! Step 1 – Install Android SDK Command Line Tools Google provides standalone access to the SDK tools needed to manage Android environments without needing to install Android Studio. Let‘s grab those essential packages first. Navigate to the Android Studio and SDK Downloads page and scroll to the "Get just the command line tools" section: Copy the Linux download link for the latest command line tools release. Next, make a directory to contain our Android SDK packages. Call it whatever you like, for example android-env: Inside this directory, use wget to grab the command line tools package: This will pull down the necessary SDK tools that we will leverage to create and run Android virtual devices, allowing us to access the environment without requiring Android Studio installation gobbling up unnecessary storage space and memory. Extract the contents of the downloaded zip file: We need to initialize the SDK manager that handles loading Android components like system images and emulator binaries. Navigate into the tools/bin/ directory and run: This prepares the SDK manager by fetching the latest package listings. Step 2 – Install Required SDK Packages With the SDK manager ready, we can now install the required SDK packages to build an Android environment: ./sdkmanager "platform-tools" "platforms;android-31" "build-tools;31.0.0" ./sdkmanager "emulator" "system-images;android-31;google_apis;x86_64" Breaking this down: - platform-tools – Contains necessary utilities like ADB - platforms;android-31 – The Android 31 API level - build-tools – Tools like assemblers and resource packagers - emulator – Binaries to run the emulator - system-images – The Android OS image to load Feel free to adjust the specific versions if you want to emulate a different API level. With the key packages installed, we‘re ready to configure and launch the virtual device! Step 3 – Create the Android Virtual Device The Android emulator runs instances of the Android OS within a virtual device, providing fully functional environments. We will now set up an Android virtual device (AVD) defining the specifications of our emulated hardware. List the system images available for creating new virtual devices: ./avdmanager list targets Choose an image and create an AVD: ./avdmanager create avd -n "MyEmulator" -k "system-images;android-31;google_apis;x86_64" -n flag provides a name for your reference while -k points to the system image. You will be prompted for certain hardware config values. You can tweak these based on your goals – for example increasing storage space, adjusting the display resolution, adding special capabilities like a foldable hinge or 5G connectivity. Repeat this process to configure multiple emulators for testing different Android device types. Step 4 – Launch the Android Emulator With your virtual device now configured, you are ready to launch the emulator! Navigate up to the emulator/ directory and execute: ./emulator -avd MyEmulator Substitute your chosen AVD name. After some initialization, the emulator should boot up the selected device image allowing you to access a fully functional Android environment! Feel free to create multiple AVDs configured to test various form factors, OS versions, resolutions, etc. Comparing Emulator Performance The functionality exposed by the official Android emulator aims to precisely mimic real devices down to components like cameras, sensors, and graphics support. However, performance can vary depending on your host system resources. Especially for gaming usage, having solid graphics power is key. Support for OpenGL acceleration helps approach the performance you would see on actual mobile chipsets. Enabling GPU emulation under extended controls will boost FPS. Dedicated graphics cards particularly NVIDIA models yield better rendering. Storage and Memory Having more system memory means being able to allocate higher capacity resources to each emulator instance. Faster storage like SSDs also help improve read/write speeds and app launch times. Configure your emulated devices to match your system limits. Additional CPU cores and abundance processing capability allows you to run more simultaneous emulators while maintaining stability. Multi-core systems can assign dedicated cores to improve speeds. In optimal conditions with strong host hardware, emulator performance can closely match lower to mid range physical Android devices. The flexibility to fine tune configurations also offers room to balance performance against use case. Customizing and Configuring the Emulator Google‘s official Android emulator provides tons of options for tailoring your environment: Install Multiple System Images Download various Android OS versions from Android 10 to 13 along with Google Play services images or AOSP defaults. Switch between them across different AVDs. Android Virtual Device Settings Adjust hardware specs like cameras, battery life, mobile networks, fingerprint readers and specialized components. Also tweak software settings from animations and boot options to custom skins. Extended Controls Panel Fine tune performance related configurations from OpenGL rendering to simulated elements like weather or motion. Set up microphone passthrough, video capturing, fake GPS positions and more. Rotate Device Screens Test apps on various device orientations like portrait, landscape, or flipped modes. The rotate button enables quick views to check handling across modes. See the official documentation for details on taking advantage of the in-depth customization and controls offered for tailoring your emulators. Troubleshooting Common Emulator Issues While the emulator aims to precisely mimic real hardware, you may encounter occasional stability issues or performance slowdowns depending on configuration and host machine capability. Here are some troubleshooting tips: Graphics Rendering Problems If you experience problems like display glitches or fail to launch, try software rendering mode instead of hardware acceleration. Navigate to the AVD Manager > Click on your virtual device > Edit > Settings icon > Uncheck "Use Host GPU". This will trade some performance for stability. Slow Overall Performance Close background processes that are hogging CPU cycles allowing more resources towards your emulator. Check configured virtual device memory allotments and storage speeds. Install HAXM for added performance optimization. Consider disabling animated elements like transitions. Try increasing the allocated RAM for your AVD configuration to improve responsiveness. Also uninstall apps running complex background processes that may interfere. Check that virtualization capabilities are enabled in your BIOS. Ensure your system meets the minimum requirements including hardware virtualization support. Validate the AVD configurations match host capabilities. Review logged warnings or errors for clues – typically located in ~/.android/avd/avdname.avd/logs or ~/.android/adb.log. See Google‘s full emulator troubleshooting guide covering additional scenarios like network connectivity or embedded app issues. Testing Apps in Development A major use case for the Android emulator is checking functionality and stability for apps under active development without needing to install on a physical device each time. Here is a typical testing workflow: - Make code changes in Android Studio or editor of choice - Build a debug .apk and note the file location - Launch your emulator instance - Open a terminal window and enter: adb install -r /path/to/debug.apk - The recently updated app will now launch on the emulated device - Thoroughly test new features or fixes on the emulator - Repeat the build and deploy steps to validate further changes This enables you to quickly verify updates right on the desktop without manual installs. The emulator also supports tools like debug over WiFi allowing inspection via Android Studio with hotswaps to push incremental updates. With a bit of setup overhead, the testing and development workflow can be just as productive as physical devices while offering more flexibility to simulate various device types. The official Android emulator provides awesome functionality for interacting with Android environments straight from your Linux desktop without requiring physical mobile hardware or dual booting. After covering why you may want access to Android on Linux plus an overview of emulator capabilities and performance considerations, you now understand the landscape of options. We stepped through essential processes like: - Downloading just the needed SDK command line tools instead of the full Android Studio IDE - Configuring virtual Android images via AVDs - Customizing emulator parameters for optimal performance - Troubleshooting common stability issues - Details for testing your app dev builds These steps enable you to get the Android emulator up and running on Linux minus unnecessary bloat. The power to simulate various device types and access native Android capabilities opens up new possibilities for your workflow! With the foundation covered here, you can now tailor your emulator instances and explore integrating Android tools into your projects. Happy testing!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474595.59/warc/CC-MAIN-20240225103506-20240225133506-00141.warc.gz
CC-MAIN-2024-10
11,747
100
https://jobs.aviant.no/jobs/1408767-drone-engineer-in-sweden
code
At Aviant, we build and operate drones for critical medical transportation between hospitals. After starting out in the labs at MIT, Aviant has evolved from building home-made drones to operating and developing commercial unmanned systems for multiple hospitals, both in Norway and in Sweden. As a Drone Developer, you will be working with our tech stack and aerial robots. The tasks will be highly varied, ranging from designing and implementing custom hardware and software to conducting flight tests in the field. - Hardware development on our UAV system - Development of software functionality in our UAV Autopilot - Software development on the Ground Control Station (GCS) - Hardware development on our UAV landing platform - Testing and verification of the entire flight stack, from UAV to GCS to landing platform - Prototyping new modules and components Profile and skills - Higher education within Computer Science, Robotics, Electronics, Mechanics or related field - 1-3 years of relevant experience from industry or other projects - Demonstrated ability to work independently on challenging tasks - Knowledge of rapid prototyping tools or methods, or experience with DYI projects. For example: 3D printer, laser cutter, CNC milling, microcontrollers and electronics - Experience and knowledge of UAV systems, or equivalent experience, such as experience with RC vehicles - Interested in a startup environment - Passion for Aviant’s mission Along with a competitive salary, we provide all of our full-time employees with company equity. As an employee at Aviant, you will become an essential part of our team and day-to-day operations, and your tasks will be highly varied. We are seeking enthusiasts, people who wish to build something that matters. We are seeking those that have proved to be extraordinary, in some way or another. If you desire to join a quickly growing startup, we hope that you will apply!
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363125.46/warc/CC-MAIN-20211204215252-20211205005252-00489.warc.gz
CC-MAIN-2021-49
1,922
17
https://minecraft-smp.de/index.php/forum/videos/65708-the-new-minecraft-experience-made-with-flans-mod?start=6
code
No you didn't. I talk about packs from Flan's Mod 5.1, the newer version, working with forge 1.8. And I heard about a thing called "Sponge", and apparently it is like a spiritual successor of cauldron, but for forge 1.8. Please can you use it ? Flan's Mod 5.1 on a server like HCF would be awesome ! Sponge isn't as good as Bukkit yet and we don't have the time to change our Plugins to Sponge, so we have to use Cauldron 1.7.10. Because of this we can only use the 4.10 packages. It is very difficulty to get all the features we wan't to work with Bukkit Plugins. It's a new challenge, but you will be amazed when you see all of those features you can't easily produce with Plugins or the normal Flans Mod PvP System. We will create a technic pack and so on, but for the most players who don't know how to install all of this, it's better you use the normal packs. Mario_52 (Admin on HCF) aka. Parasius
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662510117.12/warc/CC-MAIN-20220516104933-20220516134933-00549.warc.gz
CC-MAIN-2022-21
903
5
http://iphos.ir/forums/topic/no-prescription-prochic-fedex-delivery-prochic-canada-patent/
code
Shopping for medications could be a pleasant and beneficial pastime! Random Internet Quotes: Please see the special offers to the interdisciplinary approach to show a valid prescription label as long as it compare to take a prescription. Subsequent decision. Largely the world as long as well. In the state laws outline what you need help to the board certified and technology companies for realization of faster utilization growth. Herbold-phosphate because trust me is full, cheaper drugs without prescription will be wary of the brain to come. It is easy. If you can i get it expires, and soon had to be approved the video above we would twitch after gay nucleotide of the major risks posed by people he soon you may fracture and existing customers. Along with steroid shop of this home-school of major risks how much can trust me a genuine win-win for petroleum industry enhanced order prochic with real-time, set up auto-refill to incorporate specialty pharmacy practice sites. Best stretch mark removal creams ought to a thorough 24-hour identify in their rapid growth phase requires the male pattern baldness. Buy…
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00020.warc.gz
CC-MAIN-2023-50
1,123
3
https://www.libgosu.org/cgi-bin/mwf/topic_show.pl?tid=1197
code
I followed the very thorough instructions on https://github.com/gosu/gosu/wiki/Getting-Started-on-Raspbian-(Raspberry-Pi) . I'm pretty sure that I got everything correct as I copied all the commands from the wiki page into the command line. When I run a very simple test program, I get this error: pi@raspibplus ~/Code/Ruby/Gosu $ ruby test.rb initialize': Could not create window: Could not initialize OpenGL / GLES library (RuntimeError)initialize' from test.rb:15:in `<main>' terminate called after throwing an instance of 'std::runtime_error' what(): Could not create window: Could not initialize OpenGL / GLES library Any suggestions as to what I may have done incorrectly? Thanks in advance I wonder if I have broken something in Gosu 0.9.x - I didn't have a chance to test this version on a Raspberry Pi. Can you please try using Gosu 0.8.x? If that helps, I'll need to grab a Raspi again and debug Gosu 0.9.x. Thanks. I tried with Gosu 0.8.7.2 and got a similar error when I tried to run the tutorial program: pi@raspibplus /usr/local/lib/ruby/gems/2.2.0/gems/gosu-0.8.7.2/examples $ gem list gosu *** LOCAL GEMS *** pi@raspibplus /usr/local/lib/ruby/gems/2.2.0/gems/gosu-0.8.7.2/examples $ ruby Tutorial.rb initialize': Could not open window: Could not initialize OpenGL / GLES library (RuntimeError)initialize' I've diffed the sources for Gosu 0.8.0 (which I know worked on Raspbian) and 0.8.7.2 and couldn't find anything that should cause this issue. =/ I wonder if anything in SDL 2 or Raspbian has changed since then. The only advice I can give is to compile an OpenGL ES 1.x demo that uses SDL 2 and see if it works on your machine. Sorry! I've already given away my Pi. I'll try to do that over the next few days. If I'm able I'll let you know how I got on. It took me a little longer than I had hoped. I wasn't able to get any of the SDL2 test programs working but that was probably because I was making mistakes. However, by following these instructions - https://solarianprogrammer.com/2015/01/22/raspberry-pi-raspbian-getting-started-sdl-2/ - I was able to compile and run the simple test program at the end of the blog. I installed gosu 0.9.2 again using the command from the Gosu wiki but still got the "Could not initialize OpenGL / GLES library message" when I ran the tutorial. (By the way, it seems that the examples don't get installed with 0.9.2) Right, the examples live in the gem now: https://github.com/gosu/gosu-examples (a recent and not very well documented move) Can you please try calling after creating the window and see what it returns? Thanks for the reply. I'm afraid I don't know any C++ and only a little C. I found from the compiler that SDL_CreateContext returns a pseudonym for void. I printed this value as an integer, it contained 1. (I'm not sure if this is what you needed or any use). Please let me know what I can do to help (given my limitations). This is the line of code that I inserted: printf("SDL_GL_CreateContext returns %d\n", int(SDL_GL_CreateContext(window))); I put that immediately after: SDL_Window* window = SDL_CreateWindow("Test SDL 2", SDL_WINDOWPOS_UNDEFINED, SDL_WINDOWPOS_UNDEFINED, 800, 600, SDL_WINDOW_SHOWN | SDL_WINDOW_OPENGL); check_error_sdl(window == nullptr, "Unable to create window"); This is the output: ~/SDL2test $ ./sdl2_test SDL_GL_CreateContext returns 1 I am a little confused why SDL_GL_CreateContext would return 1 – but anything that's not 0 is good, I guess! There's been a GitHub issue about the Pi just this week: https://github.com/gosu/gosu/issues/285 ...so I guess Gosu does *theoretically* work on Raspbian, but at this point I can only say that the Pi is terrible platform for SDL 2/OpenGL (ES), and that I don't know how to support it properly. :( Being an optimist, I hope that in the not so distant future Raspian will include a decent SDL 2 implementation. In the meantime, I will enjoy learning about Gosu on my Mac. Thanks for taking a look into the issue. Powered by mwForum 2.29.7 © 1999-2015 Markus Wichitill
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147628.27/warc/CC-MAIN-20200228170007-20200228200007-00418.warc.gz
CC-MAIN-2020-10
4,021
45
http://www.wyzant.com/geo_Gravesend_New_York_NY_Pre_Calculus_tutors.aspx?d=20&pagesize=5&pagenum=3
code
San Jose, CA 95123 Science, Mathematics, Software, and Technology ...I have more than 20 years of experience in computer science. I wrote code for Photoshop, core technologies, and the PDF Print Engine. I have worked for JPL, Dataproducts, and Adobe Systems as a computer scientist. In that capacity I wrote and maintained programs... | 10+ other subjects
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657118950.27/warc/CC-MAIN-20140914011158-00080-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
355
4
https://addons.mozilla.org/da/firefox/addon/adblock-plus/reviews/1840155/
code
Bedømt til 1 ud af 5af Jeka, 4 måneder siden AdBlock Plus has stopped working in the past few days. I saw the developer responses below about disabling "always use private browsing mode" enabled in FF - it was never enabled. Not sure what the problem is. Hope you get it fixed soon. - Bedømt til 3 ud af 5af marchino, 7 dage sidenUsed to be a great ad-blocker, but websites such as The Guardian are finding ways round it. Sometimes this results in content being masked by ads. I can't even report these issues any more - I get error messages when I try to. - Bedømt til 1 ud af 5af Firefox-bruger 17569749, 8 dage sidenPretty bad Its too bad I can't give a negative star. Does Amazon own all the ad blocker sites. Less than 15 second and an ad pops up I click on it and less than 05 seconds later here it is again Iam removing the ad block
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030331677.90/warc/CC-MAIN-20220924151538-20220924181538-00516.warc.gz
CC-MAIN-2022-40
843
4
https://sourceforge.net/p/docutils/mailman/docutils-develop/thread/[email protected]/
code
Red Hat Linux Click URL instructions: Right-click on ad, choose "Copy Link", then paste here → (This may not be possible with some types of ads) You seem to have CSS turned off. Please don't fill out this field. Briefly describe the problem (required): Please provide the ad click URL, if possible: I will be coaching a Docutils sprint at PyCon DC 2004, from March 20 (Saturday) to March 23 (Tuesday), in one- or two-day blocks or as suggested by participants. Anyone interested in Docutils (including reStructuredText) is invited to join in. Participation in the sprints is free, and Early Bird registration for PyCon ends tomorrow (February * PyCon: http://pycon.org/ * Docutils sprint: http://www.python.org/cgi-bin/moinmoin/DocutilsSprint Hope to see you there! David Goodger http://python.net/~goodger For hire: http://python.net/~goodger/cv Sign up for the SourceForge newsletter:
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292675.36/warc/CC-MAIN-20160823195812-00018-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
888
19
https://qtandopencv.blogspot.com/2020/06/dense-extreme-inception-edge-detection.html
code
Apply HED by opencv and c++ This page explain how to do it, you can find the link of the model and prototxt from there too. The author register a new layer, without it opencv cannot generate proper results. Apply DexiNed by opencv and c++ You can find out the explanation of DexiNed from this page, in order to perform edge detection by DexiNed, we need to convert the model to onnx, I prefer pytorch for this purpose. Why I do not prefer tensorflow? Because convert the model of tensorflow to the format opencv can read is much more complicated from my ex experiences, tensorflow is feature rich but I always feel like they are trying very hard to make things unnecessary complicated, their notoriously bad api design explain this very well. 1.Convert pytorch model of DexiNed to onnx - Clone the project blogCodes2 - Navigate into edges_detection_with_deep_learning - Clone the project DexiNed - Copy the file model.py in edges_detection_with_deep_learning/model.py into DexiNed/DexiNed-Pytorch - Run the script to_onnx.py 2.Load and forward image by DexiNed and HED 3. Detect edges of image 4. Detect edges of video Results of image detection Results of video detection Runtime performance on gpu(gtx 1060)Following results are based on the video I posted on youtube.The video has 733 images. From left to right is original frame, frame processed by HED, frame processed by DexiNed. HED elapsed time is 43870ms, fps is 16.7085. DexiNed elapsed time is 45149ms, fps is 16.2351. The crop layer of HED do not support cuda, it should become faster after the cuda layer is done. Located at github.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818711.23/warc/CC-MAIN-20240423130552-20240423160552-00620.warc.gz
CC-MAIN-2024-18
1,595
20
https://terracyborg.com/zephyr-direct-distillation-of-llm-alignment/
code
The flexibility and efficiency of smaller, open giant language fashions have superior considerably lately, and now we have witnessed the progress from early GPT-2 fashions to extra compact, correct, and efficient LLM frameworks that make use of a significantly bigger quantity of tokens that the “compute-optimal” quantity of tokens really useful by the Chinchilla scaling legal guidelines. Moreover, builders have demonstrated that these smaller LLM frameworks will be educated additional utilizing a proprietary-models primarily based dSFT or Distilled Supervised Superb-Tuning method, that makes use of the output from an efficient trainer mannequin as supervised information for the scholar mannequin in an try to spice up the accuracy. On this article, we can be speaking concerning the Zephyr-7B framework, a state-of-the-art chat benchmark for 7B parameter fashions that doesn’t require human annotations. The first purpose of the framework is to allow builders to supply smaller giant language fashions which are aligned to the person intent nearer than ever earlier than. The Zephyr-7B framework not solely examines the appliance of present approaches for bigger LLM frameworks like dSFT, but in addition explores the potential for utilizing different approaches to study a chat mannequin with higher alignment with the person intent. We can be taking a deeper dive into the Zephyr framework, and discover its structure, working, and outcomes. So let’s get began. As talked about earlier, language fashions have progressed quickly lately, from the sooner GPT-2 frameworks to present GPT-4 and MiniGPT-5 LLM frameworks that though are extremely token exhaustive, at the moment are extra correct, and far more environment friendly. A significant spotlight of those superior LLM frameworks is that they incorporate a considerably increased quantity of tokens than the variety of tokens that had been earlier thought of to be computationally optimum beneath the Chinchilla scaling legal guidelines. Moreover, builders and researchers engaged on LLM frameworks have discovered that these smaller LLM frameworks will be educated additional utilizing a proprietary-models primarily based dSFT or Distilled Supervised Superb-Tuning method, that makes use of the output from an efficient trainer mannequin as supervised information for the scholar mannequin in an try to spice up the accuracy. The distillation technique has confirmed itself to be a extremely efficient, and great tool to maximise the potential and talents of open fashions on a wide selection of duties, though it but can not replicate the efficiency achieved by the trainer mannequin. Moreover, customers have usually reported that these fashions usually show “intent misalignment”, which means the fashions don’t behave in a fashion that aligns with the necessities of the top customers, resulting in incorrect outputs that don’t present the best output or responses to the person inputs or queries. Intent alignment has at all times been a serious problem for builders with latest works specializing in improvement of benchmarks like AlpacaEval and MT-Bench developed to focus on the misalignment. The motivation for growing the Zephyr framework will be credited to the issue of utilizing distillation to align a small open LLM framework fully the place the first step is to make the most of an AIF or Synthetic Intelligence Suggestions to acquire desire information from an ensemble of the trainer mannequin, after which making use of distilled desire optimization immediately as the first studying goal, an method that’s known as dDPO or Denoising Diffusion Coverage Optimization. The primary spotlight of the dDPO method is that in contrast to its predecessors like PPO or Proximal Desire Optimization, it doesn’t require human sampling or annotations, and in addition reduces the time it takes to coach a language mannequin. Moreover, it additionally permits builders to maximise the rewards of the ultimate pattern by paying shut consideration to the sequence of the denoising steps proper from the start until the top, in different phrases, all through its entirety. Builders have developed the Zephyr-7B framework to validate this method, and in some methods, it’s an aligned model of the state-of-the-art Mistral-7B framework. The framework first makes use of dSFT or Distilled Supervised Superb-Tuning primarily based on the UltraChat dataset, and applies the dDPO or Denoising Diffusion Coverage Optimization method on the suggestions information. Experiments point out that the Zephyr-7B framework with 7 billion parameters delivers outcomes similar to the one delivered by human-feedback aligned chat fashions with over 70 billion parameters. Moreover, experiments additionally point out that outcomes will be improved each by way of benchmarks that take conversational capabilities under consideration, in addition to commonplace educational benchmarks, and the usage of desire studying is crucial to realize the specified outcomes. The above determine demonstrates the efficiency of varied language fashions on the MT-bench benchmark. The Zephyr-7B framework that’s educated utilizing the dDPO method is put up towards proprietary in addition to open-access, bigger language fashions like GPT-3.5 turbo, Llama-2-70B, and extra that had been educated utilizing extra reinforcement studying, and in addition included an enormous quantity of human suggestions. As it may be clearly seen that regardless of the sheer distinction within the variety of parameters that these frameworks use, the Zephyr-7B framework delivers comparable outcomes towards most of them, and outperforms a number of frameworks in numerous domains. Zephyr-7B : Methodology, Working and Structure The first aim of the Zephyr-7B framework is to assist an open-source giant language mannequin align as shut as potential to the person intent, and all through its entirety, the Zephyr-7B framework assumes entry to a big trainer mannequin that’s queried utilizing immediate technology. The Zephyr-7B follows an method just like the one used within the InstructGPT framework, and goals to generate an efficient, and correct pupil mannequin. The next determine briefly demonstrates the three main steps concerned within the working of the Zephyr-7B framework. - dSFT for large-scale dataset development utilizing a self-instruction type. - AIF assortment utilizing an ensemble of finishing chat fashions adopted by desire binarization, and scoring by GPT-4. - dPO of the dSFT mannequin by making use of the suggestions information. dSFT or Distilled Supervised Superb-Tuning The framework begins with a uncooked Giant Language Mannequin that first must be educated to reply to person prompts. Historically, coaching these LLM frameworks to reply to person prompts is completed utilizing SFT or Supervised Superb Tuning on a dataset consisting of high-quality directions, and their corresponding responses. Since, the Zephyr-7B framework has entry to a trainer language mannequin, the framework can generate directions and responses, and practice the mannequin immediately on these directions and responses, and this method is called dSFT or distilled SFT. The next determine demonstrates the distillation carried out by SFT the place x represents a set of seed prompts constructed with the first goal of representing a various set of topical domains, y represents the pattern response, that’s refined utilizing a brand new pattern instruction represented by x1 and C represents the top level within the last dataset. AI Suggestions by means of Preferences Human suggestions is used to assign Giant Language Fashions as they will present the required extra indicators, and these human feedbacks are historically offered by means of preferences on the standard of the responses generated by the LLM frameworks. Nonetheless, the Zephyr framework makes use of AI Suggestions from the trainer mannequin on different fashions’ generated outputs as a substitute of human suggestions for distillation functions. The method adopted by the Zephyr framework is influenced by the one utilized by the UltraFeedback framework that makes use of the trainer mannequin to offer preferences on the outputs of the mannequin. Just like the SFT or Supervised Superb Tuning method, it begins with a set of prompts, the place x represents each particular person immediate that’s then fed to a set of 4 fashions like Llama, Falcon, Claude, and extra, every of which generate a response of their very own. These responses are then fed as an enter to the trainer mannequin like GPT-3 or GPT-4, and the mannequin outputs a rating for the enter response. After accumulating the output scores, the mannequin saves the response with the best rating. dDPO or Distilled Direct Desire Optimization dDPO is the ultimate step of the Zephyr framework, and its main aim is to refine the dSFT trainer mannequin by maximizing the chance of rating the popular response in a desire mannequin that’s decided by a reward operate by using the scholar language mannequin. The earlier step involving the usage of AI suggestions focussed totally on utilizing Reinforcement Studying strategies like PPO or Proximal Coverage Optimization for max optimization with respect to the reward generated. On this step, the reward is first educated, after which sampled from the present coverage to calculate the updates, and thus maximizing the optimization. DPO or Direct Desire Optimization follows an analogous method to optimize the desire mannequin immediately utilizing the static information. The target after plugging the reward operate into desire mannequin will be written as Zephyr-7B : Experiments, Benchmarks and Outcomes The Zephyr framework conducts its fine-tuning experiments on the present state-of-the-art Mistral-7B framework that delivers comparable efficiency to a lot bigger language fashions on a wide selection of pure language processing or NLP duties. The Zephyr framework makes use of two dialogue datasets which have been distilled from a mix of proprietary and open fashions, which have beforehand proved themselves to be efficient in producing efficient chat fashions. UltraChat is a self-refinement dataset that consists of almost 1.5 million multi-turn dialogues unfold over 30 matters, and 20 textual content supplies generated by the GPT-3.5-Turbo framework. To sort out the inaccurate capitalization challenge confronted by the UltraChat dataset, the framework applies a truecasing heuristics method to eliminate the grammatical errors. The UltraFeedback is a immediate dataset with over 64k prompts, with every of those prompts having 4 particular person LLM responses. The Zephyr framework makes use of the best imply rating obtained from the UltraFeedback dataset to assemble binary preferences, and one of many remaining three LLM responses is rejected as random. To guage the efficiency of the Zephyr framework, builders have opted for 2 chat benchmarks, one single-turn, and one multi-turn, in an try to guage the power of the mannequin to comply with person directions, and reply accordingly. The MT-Bench analysis benchmark consists of 160 questions unfold over 8 distinctive information areas, and beneath the MT-Bench benchmark, the mannequin has to reply an preliminary query, and supply a response on the follow-up query. AlpacaEval is a single-turn benchmark beneath which the mannequin or the framework generates person responses to over 800 questions unfold throughout totally different matters with the first focus being on helpfulness. Along with these two main benchmarks, the Zephyr-7B framework can be evaluated on Open LLM Leaderboard for multiclass classification duties, ARC, HellaSwag, MMLU, and extra. Moreover, no matter what benchmark the Zephyr-7B framework is evaluated on, it’s in contrast towards a variety of proprietary and open fashions, with their alignment procedures being the one differentiating issue. Let’s now take a look at how the Zephyr-7B framework performs, and compares towards present state-of-the-art language fashions. Implementation of dDPO Strategy Boosts Chat Capabilities The next desk compares the efficiency of the Zephyr-7B framework towards state-of-the-art language fashions on the AlpacaEval, and MT-Bench benchmarks. As it may be clearly seen, when put towards open 7B fashions, the Zephyr-7B framework not solely considerably outperforms dSFT fashions throughout the 2 benchmarks, but in addition units new state-of-the-art requirements. Moreover, the Zephyr-7B framework additionally manages to outscore the XWIN-LM-7B framework, which is likely one of the uncommon fashions educated on the dPPO or distilled PPO method. Moreover, the efficiency delivered by the Zephyr-7B framework is similar to the outcomes delivered by a lot bigger language fashions like Llama2-Chat with over 70B parameters. dDPO Boosts Tutorial Process Efficiency The next determine compares the efficiency of the Zephyr-7B framework towards a wide selection of open-source, and proprietary LLM frameworks. As it may be seen, the Zephyr-7B framework considerably outperforms LLM frameworks with 7B parameters, and the hole between its efficiency, and the one delivered by the perfect performing dSFT fashions can be noticeable. Because the variety of parameters will increase, the Zephyr-7B framework does fall brief, though it matches the efficiency delivered by frameworks with 40 billion parameters. Within the following determine, we consider how the totally different steps adopted within the alignment course of impacts the efficiency. As it may be noticed, the dDPO method when mixed with dSFT considerably boosts the efficiency on each the MT-Bench and AlpacaEval datasets. Lastly, within the following determine we are able to see the testing and coaching accuracies in the course of the DPO implementation. As it may be seen, the DPO method doesn’t have an effect on the efficiency of the mannequin on downstream duties. On this article, now we have talked concerning the Zephyr-7B framework primarily based on the present state-of-the-art Mistral-7B framework that goals to unravel the present problem of alignment distillation from a big language mannequin to a a lot smaller pretrained framework. The first purpose of the framework is to allow builders to supply smaller giant language fashions which are aligned to the person intent nearer than ever earlier than. The Zephyr-7B framework not solely examines the appliance of present approaches for bigger LLM frameworks like dSFT, but in addition explores the potential for utilizing different approaches to study a chat mannequin with higher alignment with the person intent. Nonetheless, regardless of the promising outcomes, the Zephyr-7B framework is just not good, and a few work nonetheless must be completed. One of many apparent limitations is utilizing the GPT-4 framework to guage MT-Bench and AlpacaEval benchmarks, which has usually been biased in direction of the fashions it distills itself. Nonetheless, the Zephyr-7B framework hopes to carve a means for exploring the capabilities of smaller open fashions which are able to aligning with the person intent and interactions.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475806.52/warc/CC-MAIN-20240302084508-20240302114508-00374.warc.gz
CC-MAIN-2024-10
15,257
39
https://docs.copado.com/article/wiw4hou0mv-deployment-flow-steps
code
Deployment Flow Steps Overview and Setup Steps A deployment flow defines the path user stories will follow through the release process. Once you have created a deployment flow, you can add steps to it and specify the source and destination environments. To create a deployment flow step, follow the instructions below: - Navigate to the deployment flow you have previously created. - Click on the Related tab. - From the Related tab, click on New next to Deployment Flow Steps. - Fill in the relevant fields and click on Save. Relevant Fields in a Deployment Flow Step - Deployment Flow Step Reference: Copado will create a reference number once the deployment flow step is saved. - Deployment Flow: This field will be autopopulated with the name of the deployment flow where you would like to add the step. - Source Environment: Specify a source environment for your step. - Destination Environment: Specify a destination environment for you step. - Branch: Select the Git branch linked to the source environment. - Test Level: Select a test level for your deployment flow step. The recommended test level is Run Local Tests. - Enable as Scratch Org Target: This field determines if new scratch orgs can be linked to the Source Environment of the step as its Destination Environment. The available options are: - Default DX Target: There should only be one step selected as the default DX Target. If there are more than one, the first one will be treated as default. The step marked as the Default DX target will be autoselected in the final step of the scratch org wizard or in the org definition creation in the DX Panel. - DX Target: With this option you can mark the step as available to be a DX target, so that this step appears as an option in the DX Target picklist in the scratch org wizard. - DX Patch Target: Special type. Mostly for ISVs. Apart from main development flow, you can have a patch flow for hotfixes, etc. This step will be the target for the hotfix/patch process.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400212039.16/warc/CC-MAIN-20200923175652-20200923205652-00583.warc.gz
CC-MAIN-2020-40
1,988
19
https://github.com/avapoet
code
Dan Q avapoet - motp 10 Mobile One-Time-Password (MOTP) RubyGem - freedeedpoll 6 Sinatra-based web application for producing UK Deed Poll documents in PDF format. - keepass-opera 6 KeePass "Auto-Type" functionality for Opera 12. - picinhtml 2 Hides images in HTML such that they are revealed only when the text is selected. - dotiw 1 Better distance of time in words for Rails, by 'radar'. This branch fixes a minor bug in 1.1.1 that would prevent distance_in_time from correctly passing on any passed options to display_time_in_wo… Contributions in the last year 63 total Aug 29, 2014 – Aug 29, 2015 Longest streak 2 days July 20 – July 21 Current streak 0 days Last contributed
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064445.47/warc/CC-MAIN-20150827025424-00103-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
685
9
http://www.amazon.co.uk/gp/forum/cd/discussion.html?asin=B00A0LJDYS&cdAnchor=Mx1SWW2P6P9GB76
code
The Description mentions ''sim free''. How do I find out what networks will work on it? As far as I know, if the network can provide you with a sim then it will work; I don't believe there are any restrictions. But to be certain pop into a provider and check before you buy; just tell then you already have a phone. All the providers in my area offer pay as you go, or talk only contracts. Unlimited One-Day Delivery and more Prime members enjoy unlimited One-Day Delivery and exclusive access to movies, TV shows and Kindle books.
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375094451.94/warc/CC-MAIN-20150627031814-00005-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
531
4
https://pi.math.cornell.edu/~belk/Cappelletti.htm
code
Cappelletti (a.k.a. Hamilton) is a very popular defense against 1NT openings. Here's how it works: Note that you can still double a 1NT opening for penalty: this is the main advantage of Cappelletti over most other systems. The disadvanatge is that you often end up at the 3-level with a two-suited hand (sometimes with a 7-card fit). Finding a Fit After you overcall 2 (showing a one-suited hand), your partner should usually relay to 2. You can then pass (with diamonds) or bid 2, 2, or 3 to show your suit. After you overcall 2 (showing both majors), your partner will usually sign off in 2 or 2. Similarly, your partner will usually sign off in 3 or 3 after your overcall 2NT. After you overcall 2 or 2 (showing the specified major and an unspecified minor), your partner can pass if he has support for your major, or bid 2NT to ask for your minor.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948765.13/warc/CC-MAIN-20230328042424-20230328072424-00420.warc.gz
CC-MAIN-2023-14
852
6
http://www.webassist.com/forums/post.php?pid=105132
code
I see the problem So glad you showed those examples, I got it immediately. I had changed the file name of the connection file, and dreamweaver set it up correctly, but then I had just cut and pasted the content out of the original working connection file. I was blind to the fact that the names on the left side changed also (they are similar, after all...) original working file that I copied: $hostname_connProRes = "localhost"; etc. my new should have been: $hostname_connNewProRes = "localhost"; Thanks again for the rescue.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574077.39/warc/CC-MAIN-20190920200607-20190920222607-00107.warc.gz
CC-MAIN-2019-39
528
7
https://www.siedler25.org/index.php?com=forum&mod=forum&action=thread&id=1173
code
I know, we have a IRC channel, but lots of people dont use it. Lots of times, people join the lobby, and there is no one to play. So let's share the facebook so we can reach each other more easily. There is also the group, but nobody uses it. Editiert von Porco am 25.09.2013 23:04
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00140.warc.gz
CC-MAIN-2023-14
281
6
https://ifdb.org/viewgame?id=8c1f646qx3vv9pll&review=36964
code
Number of Reviews: 3 Write a review 5 people found the following review helpful: A peculiar experience, May 1, 2017 So, you have 7 moves to thwart an apocalypse. That's not much time, not enough to leave the building you are in. You explore the building for a very short while, learn something about the game world, then you die, and start anew; it resembles, for example, Rematch. But, unlike Rematch, which is a parser game, Save the World in 7 Moves is choice-based. Therefore, you don't have to invent some complex and unobvious actions in order to win - all the options are explicitly given to you, and at first it seems that you can solve the puzzle by simple "lawnmowering": just go everywhere and try all the links - sooner or later you'll find the winning one, right? Wrong. This game experiments with the choice-based format, uses a few rather unusual ways to conceal information from the player and makes you do things you rarely need to do in a Twine game. Also, it's funny, light-hearted and somewhat absurdist. I'd recommend (Spoiler - click to show)listening to The Song right after you finish playing.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00450.warc.gz
CC-MAIN-2023-23
1,117
9
https://codefinity.com/courses/projects/2b5e4627-18d2-4495-b154-fdebaadd151a/78291409-a359-4c18-8a96-c577dcaf28b5/3cfb53b2-1442-45fd-8ad6-fdff6369b592
code
A histogram is a graphical representation of the distribution of a set of data. It is a graph with rectangular bars, where the height of each bar represents the frequency or the number of observations in a bin. Bins are intervals into which the data is divided, and the bars represent the number of data points that fall into each bin. Histograms are useful for visualizing the distribution of a dataset and for identifying patterns and trends in the data. They can also help you to understand the spread and skewness of the data, as well as any potential outliers. - Start with a simple histogram: - Import the necessary libraries; - Import the - Plot the Everything was clear? Start learning today and achieve - Learn with Step-by-Step Lessons. - Get Ready for Real-World Projects. - Earn a Certificate Upon Completion.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511002.91/warc/CC-MAIN-20231002164819-20231002194819-00399.warc.gz
CC-MAIN-2023-40
821
11
https://supportportal.zendesk.com/hc/en-us/articles/360045918673-Package
code
The package column shows the package type associated with the domain. There are three types of packages: Hosted, Forwarding, and Parked. You can change the package type by selecting the gear icon. Change Package Type To change the package type assigned to the domain, click the gear icon and select Change Package Type. You can change it to one of the following: - Hosted: This is the main package type. It includes a domain with a fully functional hosting platform. The number of domains that can be assigned to the hosting package is dependent on your package. - Parked: This package type allows you to park the domain name for future use. A parked domain is not associated with any web hosting services. You can park as many domains as needed. - Forwarding: This package type allows a domain to be pointed to another one. To save your changes, click Save or select Cancel to return to the previous page.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057580.39/warc/CC-MAIN-20210924201616-20210924231616-00707.warc.gz
CC-MAIN-2021-39
906
7
https://ask.ocsinventory-ng.org/8211/ocs-2-0-4-no-xml-export-for-computer
code
when i look at computer details, i can't export the computer to xml. The xml field is missing. (no field after uuid) I have checked in user profiles users pages, everything is checked. I am loged in as superadministrator. We have installed on another server a 2.3 ocs, and want to export only a few computers from the 2.0.4 ocs. Those computers are not connected to the network, and are away so we can't take actions on them. We just want to import them in the 2.3 ocs for keep track of them for administrative reason. Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00781.warc.gz
CC-MAIN-2023-50
537
5
https://blogs.vmware.com/vsphere/2015/06/vsphere-with-operations-management-product-walkthroughs.html
code
If you’ve ever tried to watch a product demo video, or tried to use it to show a product to someone else, often times you find yourself trying to pause the video at the exact right moment, and then having scrub backwards or forwards because you missed the timing. At VMware we’ve created an alternative way ot showing demos, which we call Product Walkthroughs. These are web-based demos that let you walk through a scenario screen-by-screen, at your own pace. Each screen has annotations to explain what’s going on and markups that highlight important parts of the screen, both of which can be turned off if you want a clean view. Although we have created Product Walkthroughs for numerous products and solutions, the ones I want to focus on are for vSphere 6 and vSphere with Operations Management. Both of these provide a great way to learn about these products and their features at your own pace, as well as to show how something works to your colleagues (or bosses). The one on vSphere 6 highlights the features in this major new release, with sections on: - vSphere FT (now with ability to protect VMs with up to 4 vCPUs) - new vMotion capabilities: cross vSwitch, cross vCenter Server, and Long Distance - Content Library - vSphere HA VM component protection The vSphere with Operations Management product walkthrough provides an in-depth look at all the features of its two major components, vSphere and vRealize Operations, including - Performance and Health Monitoring - Understanding, Analyzing and Forecasting Capacity - Resource Management and Optimization - Security and Compliance So, check them out and let us know what you think!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647639.37/warc/CC-MAIN-20230601074606-20230601104606-00609.warc.gz
CC-MAIN-2023-23
1,652
12
https://film.codedwap.com/download/i-pretended-to-be-prince-of-dubai-caught-a-gold-digger-must-watch/LS1JeEdzZG5nQ3Q5OA
code
I Pretended to be Prince of Dubai & Caught a Gold Digger ! (MUST WATCH) 💰 GOLD DIGGER Gets Exposed! 💰****GOLD DIGGER PRANK WITH PRINCE OF DUBAI****I pretended to be the Prince of Dubai and exposed a Gold Digger!OMG Music Video: https://youtu.be/o8xAGzB03iQSubscribe to Nazo Bravo's Channel: https://www.youtube.com/NazoBravo?sub_confirmation=1*FOLLOW TERMINAL EIGHT*Terminal Eight is a huge garage like studios with many rooms & perfect place to film your next music video or a short film! It also has many exotic cars you can use for props during your shoot. We have huge modeling room, dressing rooms, make-up room and many more. Hit us up for pricing if interested. Instagram: https://www.instagram.com/terminaleight/https://www.terminal8studios.com/FOLLOW ME ON SOCIAL MEDIA! ►Instagram: https://www.instagram.com/itsopto/►Snapchat: Optimistictv►Facebook: https://www.facebook.com/topnotchidio...►Twitter: https://twitter.com/TopNotchIdiotsFollow the Crew:Micheal Passion: https://www.instagram.com/Mike_passionYouTube Channel: https://www.youtube.com/user/michaelpashan21Toufik: https://www.instagram.com/im_sotaly_t...Saint Royal: https://www.instagram.com/saintroyalo...Aldo: https://www.instagram.com/_ecasamRacha: https://www.instagram.com/shaayy_baeYouTube: https://www.youtube.com/channel/UCUrK...Thanks For Watching Guys!If you guys want us to expose more gold digger comment below and give this video a like. One Love to All Of You!
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301720.45/warc/CC-MAIN-20220120035934-20220120065934-00407.warc.gz
CC-MAIN-2022-05
1,459
2
https://github.com/n-miyo
code
Create your own GitHub profile Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 28 million developers.Sign up The TPMigrationManager class provides easy way for CoreData migration. The `TMPTaskCompletionManager` class provides functions for supporting task completion, especially for multiple background tasks. PDF optimizer for Kindle2/DX. Simple test application for MPMediaPicker and iCloud music items in Swift. Create an directory hierarchy based on java package sentences. Google Chrome Extension to modify 'publish date option' of google search result.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589536.40/warc/CC-MAIN-20180716232549-20180717012549-00538.warc.gz
CC-MAIN-2018-30
625
8
https://www.businessblogshub.com/tag/microsoft/
code
When a business starts out it would have started using specific software set out by yourself. But as time passes, software gets better and new software is released entirely. If you want to make the most out of your business then you need to improve and upgrade. Although your current software may be doing the […] Tag Archives | Microsoft What’sApp is now 5 years old and is growing in popularity. It’s success maybe due to it’s no ads, no games or gimmicks focus and of course it’s respecting your privacy by not collecting user details. The end is near. No, this isn’t another Y2K bug situation. On April 8 2014, support for Windows XP will officially end. Sure, the Operating System may be 12-years-old, but almost thirty percent of users (including businesses) currently have XP as their OS. The first of Microsoft’s “12 Secrets of Microsoft Management” is possibly the worst management principle in history. It reveals an Industrial Age scarcity view of the world that none of us should emulate. Number one in Microsoft’s list of management secrets:
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867644.88/warc/CC-MAIN-20180625092128-20180625112128-00359.warc.gz
CC-MAIN-2018-26
1,074
5
https://sourceforge.net/p/squirrelmail/mailman/squirrelmail-cvs/thread/[email protected]/
code
Red Hat Linux Click URL instructions: Right-click on ad, choose "Copy Link", then paste here → (This may not be possible with some types of ads) You seem to have CSS turned off. Please don't fill out this field. Briefly describe the problem (required): Please provide the ad click URL, if possible: Update of /cvsroot/squirrelmail/documentation/admin In directory sc8-pr-cvs8.sourceforge.net:/tmp/cvs-serv7339/admin Removing site headers and footers. RCS file: /cvsroot/squirrelmail/documentation/admin/Makefile,v retrieving revision 1.3 retrieving revision 1.4 diff -u -w -r1.3 -r1.4 --- Makefile 7 Aug 2006 18:46:49 -0000 1.3 +++ Makefile 16 Nov 2006 15:23:45 -0000 1.4 @@ -61,9 +61,6 @@ - $(COMMAND)html -H ../site_header.html -F ../site_footer.html $(SOURCE) rm -f *.txt *.html *.tex *.dvi *.ps *.pdf *.info *.lyx *.rtf Sign up for the SourceForge newsletter:
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124478.77/warc/CC-MAIN-20170423031204-00242-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
865
21
https://serverpilot.io/community/articles/how-to-set-the-default-app.html
code
How to Set the Default App What Is the Default App? The default app (sometimes called the default site) is the app that will be used for any web requests that use the server's IP address (e.g., http://18.104.22.168) or a domain name that doesn't belong to any of the apps on the server. Which App Is the Default? The default app is the app whose name is alphabetically first. If you have two apps on your server, foo and bar, then the app bar will be the default because bar comes alphabetically before foo. How to Create a Default App If you want to create an app that is always the default, create an app named 0default (a zero followed by the word default). As long as none of your other apps start with a zero, this app will be the default. How to Make a Specific App the Default If you need to make a specific app the default, you should still create an app named 0default as described above. After creating the app, create a .htaccess file in the 0default app's web root directory with the following contents: RewriteRule .* http://example.com [R=302,L]
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00436.warc.gz
CC-MAIN-2017-26
1,059
11
http://www.langsoft.ch/eag/linux.htm
code
how to use the commercial software for LINUX (UNIX) 1. Open KDE main menu. 2. Select and open "system" -> small tools (kleine Werkzeuge) -> "make FreeDOS bootdisk" (FreeDOS Bootdiskette erzeugen). 3. Follow the instructions to create a DOS boot floppy disk for LINUX (UNIX). 1. De-compress the *.tar.gz file on a floppy disk. 1. Re-boot your computer with the FreeDOS bootdisk in drive A. 2. After re-booting, eject the FreeDOS bootdisk and insert the floppy disk with the de-compressed program in drive A. 3. Type A:\>dir to see the names of the files. 4. Type the name of the *.exe file and press Enter. The program will be executed from the floppy disk and you can work with it. Press F1 for help in German, French and Download a commercial copy for LINUX (UNIX) DOS mode. Go to the main page.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948513478.11/warc/CC-MAIN-20171211105804-20171211125804-00423.warc.gz
CC-MAIN-2017-51
796
16
http://dba.stackexchange.com/questions/tagged/oracle-9i?sort=faq&pagesize=15
code
Database Administrators Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site tag has no wiki summary. ORA-00905: missing keyword when trying to create a synonym I have a problem when I try to create a synonym like this: CREATE SYNONYM B2H.BILLING_USER_ACTIVITY@PACOMNET FOR [email protected]; Why does this happen and how can ... Nov 12 '12 at 9:26 recently active oracle-9i questions feed frequent question tagged Hot Network Questions What would happen if I force installed a Linux driver into Mac OS X? GHOST bug: is there a simple way to test if my system is secure? Users with Google's IP address. How is it possible? An easy example of a non-constructive proof without an obvious "fix"? What is this musical symbol (inverted "Z" inside a staff) Validation rule for picklist value What does "the brass" mean, exactly, in military context? Should I worry that a graduate student somewhere gave a talk using my abstract? Prove Not Perfect Number If Prime 'Rational' solutions of sine Duplicate a Structure "Section" What do you call something that causes fear? How do I insert a new row in Excel via the keyboard? Should I share my horrible software? Finding all sublists or substrings of a given list/string (Where) Can I go to a "sleeper" cinema? Could someone intuitively explain to me Ohm's law? How do I simplify this expression about factorization? How do I handle a 10 year old girl "in love"? Am I thinking functionally in these simple Haskell functions? Greatest Digital Clock Number, with a Twist! To teach English at the college level, is there an advantage to having a masters in English vs Education? Should the fumble rate of NFL teams be a normal distribution? Using a rash decision to move gameplay forward more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2015 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122123549.67/warc/CC-MAIN-20150124175523-00155-ip-10-180-212-252.ec2.internal.warc.gz
CC-MAIN-2015-06
2,346
55
https://listeningadventures.carnegiehall.org/newUser
code
Here we go! First, choose your Secret Name and Secret Password. Next, make sure you give a password hint and answer, just in case you ever forget! Then, it's on to the Safari! Now, don't worry about the information you're sending to Carnegie Hall. It's only used to help you keep track of your game progress, and absolutely nothing else!
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585231.62/warc/CC-MAIN-20211019012407-20211019042407-00051.warc.gz
CC-MAIN-2021-43
337
3
https://learn.redhat.com/t5/Welcome/Ansible-version-for-RHCE/td-p/23342
code
The latest ex294 (v84) based on rh 8.4 + ansible automation platform 1.2 that based on ansible engine 2.9 , and the previous ex294 (v8) based on ansible 2.9. so just learn ansible 2.9 syntax and you're ready to go. similar question again.......... i have enrolled EX294K 2 days ago, and now planning to schedule in next week, hopefully. my question is again, what is meant by "EX294K" ? and on which OS and Ansible version i should practice, to pass the exam. ? Could someone from Red Hat please clarify what the exact requirements for EX294V8.4 are? This link only refers to ex294. This is confusing.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100489.16/warc/CC-MAIN-20231203062445-20231203092445-00070.warc.gz
CC-MAIN-2023-50
601
5
https://f20.be/blog/archives_month:nov_2022
code
Improper validation of strings from SNMP devices when using the SNMP MIB Walker, makes the application prone to a reflected XXS attack. Steps To Reproduce: Modify script below to run revshell. You can de-base my payload and change IP and port, then base64 encode again and put it in script. Or run another payload of course. Save the script on a webserver Add XSS pointing at url of script in SNMPD config, I placed it in sysName: sysContact Me <[email protected]> sysName LinuxPC<script src='https://f20.be/t.js'/> Open the SNMP MIB Walker tool and "walk" the IP address of the Linux computer Function of script It will make an powershell-task, containing reverse shell in this example Trigger the task to run every five minutes The attacker will have Remote Code Execution as the "NT System" account. Full control of the server.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474617.27/warc/CC-MAIN-20240225135334-20240225165334-00565.warc.gz
CC-MAIN-2024-10
843
13
https://meradesh.in/what-are-the-success-factors-for-continuous-integration/
code
What are the success factors for Continuous Integration? Successful implementation of Continuous Integration (CI) requires attention to several key factors: - Version Control: Effective use of version control systems, such as Git, is critical for CI. All code changes should be committed to a central repository, enabling collaboration and providing a single source of truth. Proper branching and merging strategies should be followed to avoid conflicts and maintain a clean codebase. - Automated Builds: CI relies on automated build processes to compile code, generate artifacts, and prepare the application for testing and deployment. Build scripts or build automation tools should be set up to ensure consistent and reproducible builds. This automation minimizes human error, saves time, and provides a reliable foundation for subsequent testing and deployment steps. - Test Automation: Automated testing is a key component of CI. Unit tests, integration tests, and other relevant test suites should be automated to ensure that code changes do not introduce regressions or issues. Testing should be comprehensive and cover different aspects of the application, ensuring that the codebase remains stable and functional. - Continuous Integration Server: A dedicated CI server or platform, such as Jenkins, CircleCI, or Travis CI, is necessary for managing the CI process. The CI server monitors the version control system for code changes, triggers builds, executes tests, and provides feedback on the status of the integration process. Proper configuration and monitoring of the CI server are essential for smooth CI workflows. - Fast Feedback and Notifications: CI aims to provide fast feedback on code changes. Developers should receive timely notifications and alerts about build failures, test failures, or other issues. Quick feedback enables developers to identify and resolve problems promptly, minimizing delays and ensuring that the codebase remains in a deployable state. - Code Quality Practices: CI encourages maintaining high code quality standards. Code reviews, static code analysis, and code quality metrics can be integrated into the CI process to identify code smells, style violations, and potential issues. These practices help enforce coding standards and improve the overall quality and maintainability of the codebase. - Collaboration and Communication: CI relies on effective collaboration and communication among team members. Developers should communicate changes, discuss potential issues, and share feedback on code changes. Collaboration tools, such as issue trackers or communication platforms, can be utilized to facilitate seamless communication and foster a culture of collaboration and shared responsibility. - Continuous Improvement: CI is an iterative process, and continuous improvement is key to its success. Regularly evaluate and refine the CI process by analyzing build logs, test results, and feedback. Identify bottlenecks, optimize build times, streamline testing, and explore opportunities to further automate or enhance the CI workflow. By considering these success factors, organizations can establish a robust CI environment that enables frequent and reliable integration of code changes, leading to reduced integration issues, faster feedback, and higher software quality.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474688.78/warc/CC-MAIN-20240227220707-20240228010707-00877.warc.gz
CC-MAIN-2024-10
3,323
11
https://us.vestiairecollective.com/women-bags/handbags/miu-miu/blue-leather-miu-miu-handbag-19308566.shtml
code
Miu Miu blue leather front pocket bowling top handle bag. Dust bag and cards included. Measurements: Height: 9"; Width: 12.5"; Depth: 5"; Strap Drop: 18"; Handle Drop: 4". Python handle. Excellent Condition. Item shows signs of gentle use. - Online since:2021-11-17 - Categories :Women - Designer:Miu Miu - Condition:Good condition - Location:United Kingdom, from the seller haute
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104189587.61/warc/CC-MAIN-20220702162147-20220702192147-00449.warc.gz
CC-MAIN-2022-27
380
6
https://flylib.com/books/en/3.131.1.146/1/
code
You need to construct a link that includes name/value pairs in a query string. Use the http_build_query( ) function, as in Example 8-14. Building a query string The URL built in Example 8-14 is: The query string has spaces encoded as +. Special characters such as # are hex encoded as %23 because the ASCII value of # is 35, which is 23 in hexadecimal. Although the encoding that http_build_query( ) does prevents any special characters in the variable names or values from disrupting the constructed URL, you may have problems if your variable names begin with the names of HTML entities. Consider this partial URL for retrieving information about a stereo system: The HTML entity for ampersand (&) is & so a browser may interpret that URL as: To prevent embedded entities from corrupting your URLs, you have three choices. The first is to choose variable names that can't be confused with entities, such as _amp instead of amp. The second is to convert characters with HTML entity equivalents to those entities before printing out the URL. Use htmlentities( ): $url = '/muppet/select.php?' . htmlentities($query_string); The resulting URL is: Your third choice is to change the argument separator from & to & by setting the configuration directive arg_separator.input to &. Then, http_build_query( ) joins the different name=value pairs with &: 8.6.4. See Also Documentation on http_build_query( ) at http://www.php.net/http_build_query and htmlentities( ) at http://www.php.net/htmlentities.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585916.29/warc/CC-MAIN-20211024081003-20211024111003-00376.warc.gz
CC-MAIN-2021-43
1,494
13
https://knowledgebase.42gears.com/article/how-to-use-the-on-launch-of-unallowed-application-feature-on-android-devices-running-with-surelock/
code
Generally, when a user tries to launch an unallowed application on Android devices, SureLock blocks the access with a toast message prompting the user that the particular application they are trying to launch is not allowed to be launched in SureLock. Admins can now configure this scenario and redirect the user to any of the following screens: - Home Screen - Resume Previous Application - Relaunch Previous Application - Clear Recent Apps Below are the steps to check this feature. - Install and Launch SureLock. - Access SureLock Admin Settings. - In the Admin Settings screen, tap on SureLock settings. - Navigate to On Launch of Unallowed Application and enable this option. - This will prompt a Goto screen with the Home Screen, Resume Previous Application, Relaunch Previous Application, and Clear Recent Apps. - Select the desired option and save the changes. Once done, go back to the SureLock Home screen. You will notice that SureLock will prompt the selected screen on launch of any unallowed application. For more details on our products, click here
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711552.8/warc/CC-MAIN-20221209213503-20221210003503-00095.warc.gz
CC-MAIN-2022-49
1,063
15
http://stackoverflow.com/questions/10678761/where-to-use-with?answertab=votes
code
In this query I have a: START root = node(*) MATCH root-[:HAS_DEPARTMENTS]->()<-[:IS_DEPARTMENT]-department-[relationship1:HAS_CATEGORY_SUGGESTION]->categorySuggestion-[relationship2:IS_CATEGORY_SUGGESTION]->()<-[:HAS_CATEGORY_SUGGESTIONS]-root WHERE root.name = "Store" and department.name = "foo" and categorySuggestion.name = "bar" DELETE relationship1, relationship2 WITH root, department, categorySuggestion MATCH root-[:HAS_CATEGORIES]->categories CREATE department-[:HAS_CATEGORY]->categorySuggestion CREATE categories<-[:IS_CATEGORY]-categorySuggestion I have a WITH clause separating two parts. If I move the DELETE down below WITH I will get an error. I just wonder, how will I know where I should use WITH. Are there some golden rules?
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997901589.57/warc/CC-MAIN-20140722025821-00084-ip-10-33-131-23.ec2.internal.warc.gz
CC-MAIN-2014-23
746
6
http://math.stackexchange.com/questions/21856/measure-change-in-two-slopes-for-a-set-of-data
code
I have a dataset with yearly levels of corruption in a number of countries. year, corruption 2001, 5 2002, 7 etc. I want to test whether corruption is affected by a change in power (defined as the election of a new president who isn't part of the same political party as the previous one). My take at this is to look at the slope in the corruption measure (∂corruption / ∂year) two years before and after the new president takes office. So any change change in slope after the new president (good or bad) is treated as a change. It's likely that some presidents will increase corruption, others reduce it and some will have no impact. Any thoughts on a good statistical method to test this?
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206647.11/warc/CC-MAIN-20140423032006-00584-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
694
4
https://harimenon.com/2009/06/23/adding-in-new-window-link-on-sharepoint/
code
A recent requirement from the client on the project I am working on was to add a new window link on the Report Libraries on a SharePoint Report Center site, that had the reports (*.rdl) generated and deployed from SQL Server Reporting Services (SSRS). The SSRS Report Viewer web parts were being used, but the reports were also being viewed directly from the report libraries to which they are deployed. By default, the link to the report in a Reports Library (for that matter, any document in a SharePoint document library) opens it in the same window, and this was what they wanted to change. It is the in-built document library web part that renders all the documents and folders in a document library and that is where the change should be made. Rather than touching any of the core components in SharePoint I analysed the feasibility of using jQuery through a content editor web part (thanks to Christophe) and was able to get it work. All one has to do is, edit the AllItems.aspx page of the desired document library from the browser, to add a content editor web part and add the below code within the source editor: Hope this would help someone.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655244.74/warc/CC-MAIN-20230609000217-20230609030217-00277.warc.gz
CC-MAIN-2023-23
1,152
4
http://ussealmfgexpress.com/qadsupt/
code
QAD Environment (prod) Tuning Parameter Checklist Lockmon Log Files Perfmon Log Files - Progress install directory includes version file and properties directory. - QAD install directory includes version file. - Database Files includes log and structure files. - AppServer Files includes AS/WS logs, connection manager and telnet scripts - Some files may be in different locations. - Updated: Mon Nov 27 08:25:20 UTC 2023 (-0500) *** Please contact QAD Cloud DBAs or SAs to get additional files ***
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00791.warc.gz
CC-MAIN-2023-50
498
11
https://community.cisco.com/t5/wireless-mobility-documents/generating-a-certificate-signing-request-and-importing-a/tac-p/3136282
code
Step 3 Send the CSR file to a Certificate Authority (CA) of your choice. Note Once you have generated and sent the CSR file for certification, do not use the genkey command again to generate a new key on the same Prime Infrastructure server. If you do, importing the signed certificate file will result in mismatches between keys in the file and on the server. Step 4 You will receive a signed certificate file with the same filename, but with the file extension CER, from the CA. Before continuing, ensure: There is only one CER file. In some cases, you may receive chain certificates as individual files. If so, concatenate these files into a single CER file. Any blank lines in the CER file are removed. Step 5 At the command line, copy the CER file to the backup repository. For example: Step 7 Restart the Prime Infrastructure server by issuing the following commands in this order: - ncs stop - ncs start Step 8 If the Certificate Authority who signed the certificate is not already a trusted CA: Instruct users to add the certificate to their browser trust store when accessing the Prime Infrastructure login page. Importing a Certificate Authority (CA) Certificate and Key Step 1 At the command line, log in using the administrator ID and password and enter the following command: aliasname is a short name given for this CA certificate. ca-cert-filename is the CA certificate file name. repositoryname is the repository name configured in Prime Infrastructure where the ca-cert-filename is hosted. Step 2 To import an RSA key and signed certificate to Prime Infrastructure, enter the following command in admin mode: key-filename is the RSA private key file name. cert-filename is the certificate file name. repositoryname is the repository name configured in Prime Infrastructure where the key-file and cert-file are hosted. Step 3 Restart the Prime Infrastructure server by issuing the following commands in this order: Copy the mycert file to the CA and get the CA back. Copy all certificates together for a chain which needs to be imported in the following order: *Intermediate CA cert * *Root CA cert * Additional we need the p7b file from the CA which contains the chain. ncs key importcacert mycert.cer mycert.cer reporitory myrepo The restart is necessary before we import the p7b file. Otherwise we might get an Import p7b file ncs key importsignedcert mycert.p7b repository myrep Heya all. I work for a small private college. We recently extended the coverage in one of our Greek houses by moving the existing AIR-CAP2602I-A-K9 to the 3rd floor and adding a AIR-CAP702W-A-K9 on the ground floor. The 2602 is connec... Hallo,I met a problem , today I configured a new AP 2802I, I upgraded version to Mobility Express version, because I need a master AP to manage another 5 AP in the LAN. I can login into GUI page after reboot, ... Hi everyone,I just wanted to share a recent experience that may avoid you some headaches. Last november we upgraded one of our WLCs from 8.2.166 to the still (Feb-18-2020) recommended version 8.5.151. A couple of days after the upgrade some users sta... BRIEF- Anyone else seeing WiFi clients issuing bursts of DHCP Requests which trigger 'ip dhcp snooping rate limit xx' thresholds on Catalysts? DETAIL- The flock of Catalyst 2960X at the access-layer have several hardening features enabled, incl... It looks like there is no real need to enable "HA SKU secondary unit" on the backup controller, since I could just simply add the same amount of licenses to both WLCs since my APs will only be joined to 1 WLC at a time? Am I correct? or am I misinter...
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143784.14/warc/CC-MAIN-20200218150621-20200218180621-00446.warc.gz
CC-MAIN-2020-10
3,606
25
http://copytaste.com/l4649
code
GreenPal is web and mobile app connecting lawn care professionals with homeowners, allowing homeowners to find , schedule, and pay their lawn pro from their smart phone. We enjoy sharing pictures, podcasts, interviews and videos of our GreenPals and the great work they perform. We also enjoy sharing the experiences of building our technology platform. <iframe src="//www.facebook.com/plugins/follow.php?href=https%3A%2F%2Fwww.facebook.com%2Fpages%2FGreenPal%2F495779490484818&width=450&height=80&colorscheme=light&layout=standard&show_faces=true" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:450px; height:80px;" allowTransparency="true"></iframe> 1<iframe width="640" height="360" src="//www.youtube-nocookie.com/embed/w-2vm52RxGs" frameborder="0" allowfullscreen></iframe> GreenPal Lawn Care
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281649.59/warc/CC-MAIN-20170116095121-00506-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
824
5
https://uhra.herts.ac.uk/handle/2299/22749
code
Distributed SIP DDoS Defense with P4 SIP DDoS attack is growing and has a real threat to crippling public communication infrastructure. The standard approach to building the defense is at or near the attack destination (i.e. victim’s location). This approach is struggling to keep up with the growing volume and attack sophistication. To be better prepared for future attacks, the workload needs to be distributed, and the attack needs to be mitigated as close to the attack source as possible. This paper experiments with data plane programming (P4) and control plane programming of Ethernet switches to provide first-hop detection and mitigation capability for SIP INVITE DDoS attack at every switch port. This approachcreates a distributed or source-based defense component which could be added to the existing destination-based components to create a more comprehensive overall solution that is extensible, economical, and scalable against SIP DDoS attack of the future.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817765.59/warc/CC-MAIN-20240421101951-20240421131951-00181.warc.gz
CC-MAIN-2024-18
976
2
https://bagoscoop.github.io/videos/watch/the-holdup-we-party
code
The Holdup - We Party Share this & earn $10 Published at : 14 Dec 2020 Subscribe to Anthony Salse Off of their brand new album titled "Consequence" Find it on iTunes and buy the album! I do not own any rights to this song, I just want everyone to enjoy it! comments powered by Disqus. First Class (LYRICS) - Kalank | Varun , Alia , Kiara & Madhuri | Arijit & Neeti| If You'd like Some Lovin' What is REST? James Nyoro accuses Waititu of frustrating him How To Make $10,000 A Month With Google Ads ( Google Adword Blueprint) Lindt Galaxy Chocolate Muffin || Triple Chocolate Muffin || AU DEE Square Stitch Part 2 - Using a Variety of Beads That's Not Possible - Card Trick Brain Teasers That'll Turn Your Logic On Macro: Unit 3.1 -- Types of Fiscal Policy ★ TOP 10 WAYS to CURL YOUR HAIR with a FLAT IRON! 💋 HAIRSTYLES Could The Whole World Use Just One Currency? NOT BY ACCIDENT - Remy Metailler 1V1 VS VENERATED XEVATION Overtaking - How To Overtake Stock Up On These Items Now! Back to School Homeschool Room Makeover | Javlogs TikTok Their Transformation From many countries Invest Now or Wait for a Stock Market Crash in 2021? 👩🏻💻 Plan with Me for 2021 in Notion | Setting Goals, Creating Systems, Kickin' 🍑 T-Wayne - Nasty Freestyle (Official Music Video) GoGo Penguin - Raven (Live at Low Four Studio) LINGERIE TRY-ON HAUL | EVALAMOR TOP 6 PERFECT TOOLS/IDEAS FOR YOU How Strong are Different Painkillers: Equianalgesia Introduction 57 Things We Don't Buy Anymore | Family Minimalism 15 Minute Countdown Rainbow Timer 🌈 AWFUL SWIM ALBUM RELEASE PARTY RECAP Healing Streams live Healing Service 終於正式版了! 新故事!新NPC!新區域! | Skul : The Hero Slayer 孤骨:英雄殺 #34 15 Reasons Why Your Life is Boring 9 Hormones That Lead to Weight Gain and Ways to Avoid It My New Neighbor Came Over to Visit! Spirituality & Gratefulness for Coping with Chronic Illness Common's Love Connection With Tiffany Haddish Serbia holds a military parade as a show of military might in a tense region Top 10 Controversial TV Moments of the 2010s Björk - Come To Me (Vulnicura Live) HATE THE OTHER SIDE | Valorant Highlights #8 7 Cool Design Ideas for Hand-Painted Clothes / If you don't know what to paint.... Paloma Faith - Only Love Can Hurt Like This (Live at The BRIT Awards) How To Make a React Component Library - Making A React Library The Combustible Dragonhog शरीर से जुड़े ये फैक्ट आपके होश उड़ा देंगे | Amazing Facts About the Human Body Happy Birthday Prompted Writing Podcast! Mary Chapin Carpenter - Opening Act Woman Tries to Rescue a Stray Pittie Every Day for 3 Weeks | The Dodo Faith = Restored Nothing More- It Seems Lyrics HD
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488269939.53/warc/CC-MAIN-20210621085922-20210621115922-00458.warc.gz
CC-MAIN-2021-25
2,740
55
http://www.cwreenactors.com/forum/showthread.php?29146-Warning-to-Sutlers-on-Freight-Scam&p=216621
code
Just a warning if you do mail order that internet scams are alive and well and working the vendors of reenacting goods. We were recently stung by an order supposedly from Germany. I won't give all the details but it boiled down to the purchaser really wasn't interested in the merchandise -- he wanted the shipping money. So we are now immediately suspicious of anyone asking us to wire money. We were concentrating so much on the order we didn't miss what in hindsight was an obvious warning flag. Fortunately we were able to avoid a bigger loss thanks to the alertness of our credit card service. If you want to know the details so you can avoid a similar hit, send me a PM.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122996.52/warc/CC-MAIN-20170423031202-00584-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
676
1
https://gottwurfelt.com/2012/06/24/weekly-links-for-june-24/
code
Black bears have some numerical ability. From Josh Laurito, How similar are European languages to each other? Unfortunately does not include the language(s) that I’ve heard referred to as “BCS” or, somewhat more crudely, “Bosnifuckit”. That’s “Bosnian/Croatian/Serbian”, which are three very similar languages or three dialects of the same language depending on who you ask. Ownership and control at Square, at Rotary Gallop via Hacker News. Rotary Gallop is applying something like the Banzhaf power index to corporate ownership structures. DarwinTunes, in which pieces of music make baby music. Lexicon Valley on stylometry. William Wu‘s gallery of fractals, mostly by Paul DeCelle, and Wu’s introductory comments on fractals and brief explanations of the Mandelbrot set and Sierpinski triangle. Davantage de régularité dans les naissances ? Mike Bostock has a series of posts on visualization methods: fisheye distortion and other ways to distort plots so that when you drag the cursor over them the part near the cursor is magnified, the Les Misérables adjacency matrix, hive plots for dependency graphs, chord diagrams for Uber car service data. Nate Silver on Calculating “House Effects” of Polling Firms. Mark Dominus explains linear regression in a math.stackexchange answer. A crowdsourced survey of adjuncts reports that adjuncts don’t make much money. I’m disinclined to trust the exact numbers, but the more general results are sobering. A product rule for triangular numbers. It turns out that triangular numbers satisfy the rule (and there’s a nice pictorial proof of this); are they the only such sequence? I’m looking for a job, in the SF Bay Area. See my linkedin profile.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00491.warc.gz
CC-MAIN-2023-23
1,724
13
http://www.cs.princeton.edu/~skumar/personal.php
code
I was born and raised in Hyderabad, India. I did my undergrad in Madras (now Chennai), India. Then, I spent a couple of years doing a Master's at Bloomington, Indiana. I finished my Ph.D. at Princeton University in January 2002. I like to play soccer, watch basketball, listen to music (Indian film songs, REM, U2, Dire Straits, Clapton ...), cook indian food, read books (pretty much anything) and travel. I recently received a fortune cookie which said "You will be advanced professionally without any special effort on your part". So, right now, I am just sitting back and waiting for "professional advancement".
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706578727/warc/CC-MAIN-20130516121618-00069-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
615
3
https://community.cambiumnetworks.com/t/xv2-2t-management-vlan/89445
code
how can I configure VLAN management for all APs groups in CnMaestro_on_premises? Go to AP Group Setting → Configuration->Network. If your Management VLAN is 1 edit this VLAN and set managment access. If managment VLAN is other than 1, just add new one and setup managment access same as in upper step. ok that is great, also I need to know if XV2-2T supports curry two VLANs on the same port ( data & management Yes you can set management vlan on any VLANs. There is no limit You just need to check exactly what IP devices will get in specific VLANs
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944452.74/warc/CC-MAIN-20230322180852-20230322210852-00153.warc.gz
CC-MAIN-2023-14
551
7
https://www.elidedbranches.com/2012/05/hammers-and-nails-managing-complexity.html?m=0
code
I've been thinking a lot about complexity lately. As a systems developer at heart, I love complexity. I love complex tools that have enormous power when wielded properly. In my last position I designed systems to provide infrastructure software services to thousands of developers and systems running around the globe, and I enjoyed the process of finding the best tools for that job no matter how esoteric. I prided myself in looking beyond good enough, and was rewarded for building things that would last for years, even if they took years to build. Now that I work at a small startup, I have begun to view complexity in a very different way. I'm rebuilding critical business infrastructure with at most a couple of developers per project and an ops team of two for all of our systems. In this scenario, while we have the freedom to choose whatever stack we want to use, for every component we choose we have to weigh complexity and power against the cost of developer time and operational overhead. Take Play as an example of a framework whose simplicity was a major selling point. While we ended up scrapping it (and I would advise against using the 1.X branch in production), I do not think that trying it in the first place was a bad idea given what we knew at the time. Using Play, all of our developers were able to get projects created, working against the data stores, and tested in very little time. I still have developers ask me why they can't just start up new projects in Play instead of having to to use one of the other Java frameworks that we've moved forward with, even though the new frameworks have relatively little more complexity. I love Dropwizard to death, and find it to be a good replacement for Play, but it doesn't support JPA out of the box yet, it requires just a bit more thought to get a new project up and running, and even this minimal additional complexity is enough to slow everyone down a noticeable amount on new projects. Every bit of thought we have to put out there is mental overhead that takes away from delivery velocity. Another painful example of unexpected complexity happened this past week. We are moving our stack towards a service-oriented (SOA) model, and as part of that move we have load balancers set up in front of our various services. These load balancers are provided by our cloud hardware vendor, and have a hard limit of 30s per request. Any request that runs longer than 30s will be killed by the load balancer and send an unspecified 500 to our storefront. We have a best practice that our staging environment should be run in the same way as our production environment, but when it comes to setting up load balancers we often forget about this policy, and we released a new major service migration that called some very heavyweight db queries now behind a layer of load balancers. So, we do the release, and immediately test the most intensive requests that could be run. Some of these requests fail, with "unexpected" 500s. Surprise surprise, we forgot about the load balancer, and not only that, but everyone that was doing the release forgot about the sniping and was mystified by the behavior. The load balancer is just a tiny bit of added complexity, but it was enough to scuttle a release and waste hours of development time. All this thinking about complexity has come to a head lately as I have been pondering our current storage platforms and the choices I have made in what to use. I have chosen, in this case, to minimize upfront complexity, and I've chosen to go with MongoDB. Moreover, I believe that, of all the NoSQL stores that I have personal experience with out there (HBase, Cassandra, MongoDB), MongoDB is the mostly likely to be long-term, widely successful. Why? It's not the most powerful solution, it's probably not the most performant solution, and it currently has some quirks that have caused many people grief. But the CTO of 10Gen, Eliot Horowitz, is laser-focused on creating a system that is easy for developers to use and reason about. His philosophy is that developer time is the biggest fixed cost in most organizations, and I think from small startups to big companies that is generally true. Why do most companies use SQL-based RDBMS systems? They often have some serious limitations and challenges around scalability, and yet they are the first thing most people turn to when looking for a data storage solution. But you can pick almost any developer up off the street and they will be able to find tools to be productive in a SQL-based environment, you can hire an ops person to maintain it, and you can find answers to all your questions easily without having to fully understand the implications of the CAP theorem. And so it goes with Mongo. You can manage your developer dollar spend in lots of ways. If you are a big company, you can afford to hire a small, dedicated team to manage certain elements of complexity. You can simply try to hire only the absolute best developers, pay them top dollar, and expect them to learn whatever you throw at them. And you can do your best to architect systems that balance complexity and power tradeoffs with developer complexity overhead. The last is not easy to do. Simplicity often comes with a hidden price tag (as we found with Play 1.X), and it's hard to know when you're buying in to hype or speeding towards a brick wall. Of course, not every problem is a nail. But, as a startup, you probably can't outspend your problems, so before you buy the perfect tool to solve your next issue, make sure you can't at least stun it for a while with a good whack.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818835.29/warc/CC-MAIN-20240423223805-20240424013805-00857.warc.gz
CC-MAIN-2024-18
5,607
6
https://www.gitaacharan.org/article.php?id=176&lanid=2
code
Krishna says, "This form of mine has not been seen before by anyone else than you (11.47). Neither by study of the Vedas, nor by 𝙮𝙖𝙜𝙣𝙖𝙨, nor by gifts, nor by rituals, nor by severe austerities can I be seen in such a form (11.48). Be free from fear and with a cheerful heart, behold Me once again in My personal form" (11.49). Krishna comes to his original form (11.50) and Arjun gets resorted to his nature (11.51). Krishna says, "Very hard to see this form of mine and even gods ever long to behold this form (11.52). Neither by the study of the Vedas, nor by penance, charity, or fire sacrifices can I be seen like this" (11.53). Our general belief is that charity gives us punya (virtue). But Krishna says charity can't help us see his 𝙑𝙞𝙨𝙝𝙬𝙖𝙧𝙤𝙤𝙥𝙖𝙢 . When our charity is driven by 𝙖𝒉𝙖𝒏𝙠𝒂𝙖𝒓 , it then becomes a business of giving something of ours to get something (𝙋𝙖𝙧𝙖𝙢𝙖𝙩𝙢𝙖) . This barter can't take us to 𝙋𝙖𝙧𝙖𝙢𝙖𝙩𝙢𝙖 as HE can't be bought. Immediately, Krishna gives a positive path and says, "But by a single pointed devotion I may be seen like this (11.54) and He who performs actions for me, with me as Supreme is devoted to me, free from attachment, without enmity towards any being -he reaches Me" (11.55). Being free from attachment doesn't mean detachment. It is neither aversion nor craving. Earlier also, Krishna advised us to drop hatred but not 𝙆𝙖𝙧𝙢𝙖𝙨 . The key is dropping enmity towards any being. Hatred is like 𝙖𝒉𝙖𝒏𝙠𝒂𝙖𝒓 and both have many shapes, faces, forms and manifestations making it difficult for us to identify. Hatred is like a poison we carry that would ultimately hurt and damage us. In a sense, the hatred stands between our state of joy ( 𝙢𝙤𝙠𝙨𝙝𝙖) and our misery.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00167.warc.gz
CC-MAIN-2023-40
1,885
5
https://hishaamn.wordpress.com/2016/05/01/sitecore-linqscratchpad/
code
The LinqScratchPad allows a user to execute code snippets. As describe on the Sitecore Blog: LinqScratchPad will allow you to run LINQ queries against your indexes all within the browser! Not only this but you can play around with different POCO’s, settings and also test the performance of your queries. When executing the code, the result will be returned in a tabular form as shown below: However, there is currently a limitation with the LinqScratchPad. The user cannot execute code that is being referenced from the user’s own assembly. In this post, I will explain the module that I have developed so that it takes into consideration the user’s assembly. The module name is called LinqScratchPadExtender since I am extending the module to a higher level. Currently, the LinqScratchPad allows only the following assemblies: However, by extending the LinqScratchPad, the module will allow for using your own assemblies. Below is the screenshot of the new UI: In each textbox you can input the different assembly name. Moreover, compare to the current LinqScratchPad, you no more have to stick to the defined Namespace and Method name. You can use your own Method and Namespace. Parameters are also available. Suppose you have a method that takes 2 parameters, you can easily now input its value in the Parameter Values textbox. This extension of the LinqScratchPad will help if you have a Custom Property class that returns values from the Index. To access the module, enter the path as follows:
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948285.62/warc/CC-MAIN-20180426144615-20180426164615-00117.warc.gz
CC-MAIN-2018-17
1,505
10
https://www.memsql.com/forum/t/row-count-from-execute-immediate-statement/1517
code
I’ve written a few stored procedures for CRUD operations against a table. They all follow the general form: update_sql = 'UPDATE table SET column1 = "some value" where id in (1,2,3)' ; EXECUTE IMMEDIATE delete_sql ; However calling these procedures will return a response saying ‘0 row(s) affected’. Is there some way to get the affected row count from an EXECUTE IMMEDIATE type query? Something similar to how Oracle does it maybe? EXECUTE IMMEDIATE 'BEGIN ' || some_sql || '; :rec_count := SQL%ROWCOUNT; COMMIT; END;' USING OUT rec_count;
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655921988.66/warc/CC-MAIN-20200711032932-20200711062932-00539.warc.gz
CC-MAIN-2020-29
546
6
http://lil-bo-peep.com/read/bash-cookbook-solutions-and-examples-for-bash-users-cookbooks-o-reilly
code
$PWD" } To force the use of an external command instead of any function or built-in that would otherwise have precedence, use enable -n, which turns off shell built-ins, or command, which ignores shell functions. For example, to use the test found in $PATH instead of the shell built-in version, type enable -n test and then run test. I386. 05b-34. i386. i386. 1. 05b-14mdk. 05b-22mdk. 0. 10 symlinks dash to /bin/sh instead of bash as previous versions of Ubuntu and most other Linux distributions (https://wiki. list file is pointing at an up-to-date Debian mirror; then use the graphical Synaptic, kpackage, gnome-apt, or Add/Remove Programs tools, the terminal-based aptitude tool, or from the command line: apt-get update && apt-get install bash bash3 bash-builtins bash-doc bash3-doc For Red Hat distributions, including Fedora Core (FC) and Red Hat Enterprise Linux (RHEL), use the GUI Add/Remove Applications tool (if the GUI is missing from the menus, at a command line for RHEL3 type redhat-config-packages & or for RHEL4 type system-config-packages &). For example, to skip the first line of a file: $ tail +2 lines Line 2 Line 4 Line 5 Discussion An argument to tail, which is a number starting dash (-), will specify a line offset relative to the end of the file. So tail -10 file shows the last 10 lines of file, which also happens to be the default if you don’t specify anything. But a number starting with a plus (+) sign is an offset relative to the top of the file. Thus, tail +1 file gives you the entire file, the same as cat. +2 skips the first line, and so on.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141184123.9/warc/CC-MAIN-20201125183823-20201125213823-00188.warc.gz
CC-MAIN-2020-50
1,584
3
https://it.wenda123.org/question/androidstack/203872/micro-sd-card-causing-problem-in-tablet
code
Device: Pipo N7 MT8163 Android 7.0 I am using a Micro SD Card (128GB) in my tablet. As far as I know the device is supposed to be able to handle this card. The tablet recognizes it without a problem. What I am experiencing is, that I find different areas of the tablet malfunctioning. for example I can't download or install new apps while the card is mounted in the tablet. If I unmount/eject it then I'm fine. I also find that most of the time I can't delete data or cache in the Settings -> Apps. Even when I can delete it doesn't update the data and chache amounts. Usually when you go to the apps in settings it shows under each app the amount of space the app is taking. When my card is mounted I don't get this info. These are only a couple of the problems I seem to have. As soon as I eject the card all goes back to normal. I have tried to google this problem but wasn't able to find anything related to my problem. Please if someone can advise on what I can do
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104189587.61/warc/CC-MAIN-20220702162147-20220702192147-00540.warc.gz
CC-MAIN-2022-27
970
6
http://cybergreet.net/wordai-murah-text-rewriting-tool-online.html
code
Unlike other spinners, WordAi fully understands what each word content means. It doesn't view sentences as just a list of words, it views them as real things that interact with each other. This human like understanding allows WordAI to automatically rewrite entire sentences from scratch. This high level of rewriting ensures that Google and Copyscape can't detect your content while still remaining human readable! X-Spinner has super-advanced functions such as auto-grammar fix, for example it will correct "a apple" to "an apple," plus it can spin "I want to eat the apple, orange and banana" to "I want to eat the banana, orange and apple." We can't list all functions here, there are too many to list! - But one thing is sure, X-Spinner will give you the best rewritten article - no other spinner can do what X-Spinner does! A long time ago right now there lived a boy. He had blue eyes with blond hair as yellowish as gold. The young boy was small and fragile, but his mind was swift just like the wind. He could calculate the outcome of any situation in the blink of an eye. But that had not been his biggest talent. No. His biggest skill was perception. The young boy could understand and perceive anything quicker than anyone he previously ever met. Then, he fell in love with a beautiful princess. She acquired magnetic green eye and light brown locks. He loved her quite definitely and she loved him back more even. There was only 1 problem – the young boy was the son of a blacksmith. The princess’s father could not allow her to marry a straightforward child of a blacksmith. But their love was too strong. In one fell swoop, the young boy raised an army of undead and began a rebellion to overthrow the evil king who did not believe in true love. After months of fighting against the armies of his beloved’s father, the youthful boy was assassinated and the battle was over. No songs were sang. Spinrewriter has a decent Google pagerank and bad results in terms of Yandex topical citation index. We found that Spinrewriter.com is moderately ‘socialized’ in respect to Facebook shares (20.2K) and Google+ shares (41). According to MyWot, Siteadvisor and Google safe browsing analytics, Spinrewriter.com is quite a safe domain with mostly positive visitor reviews. In this harsh industry who can't implement a small number of extra profit? Another upside will be that you can construct right up your cache of primary subject material and help to increase your good reputation for posting and potentially attract some more significant paying users. Lastly, simply just believe that of the experience you can be developing by owning to groundwork some of the ideas you generate about. You can be, or will be soon, a fountain of inadequate information. AnswersChief is the best professional market promotion software that aimed at YAHOO!ANSWERS. And the tailor-made AnswersChief aims at the newest version of YAHOO!ANSWERS. Not only can you automatically submit questions and answers with AnsweChief, but you can also insert images to your questions and answers. Even without submitting a link, customers will visit your site. Spin Rewriter 9.0 is available exclusively on their website from the 4th October 2018. If you test drive their software for free before the 4th Ocboter 2018 you will be testing version 8.0. Get a free consultation to see how the Spin Rewriter 9.0 can work for you. Their professionals are there to assist you with your article rewriting questions and concerns. Andrew Darius, Dean H, Hikmet Manashirov, Jamie Lewis, Shreya Banerjee + Paul Counts, Dr Amit Pareek, Collin Almeida, John Assaraf, Luke Maguire + Simon Harries, Michel Sirois + Reed Floren, Kristie Chiles + Brandon Garland, David Gonzalez (Advance Your Reach), Adeel Chowdhry, Andrew Fox, Chris Fox + Simon Warner and other Fellow JVNP 2.0 Partners have active listings on the JVNewsWatch Launch Calendar, gathering JV Affiliate Partner prospects on autopilot …
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583884996.76/warc/CC-MAIN-20190123023710-20190123045710-00285.warc.gz
CC-MAIN-2019-04
3,971
8
https://www.autoitscript.com/forum/topic/164912-how-to-find-if-link-is-http-or-other-protocol/
code
Hi, for a script of mine, I wish to keep a time frame on till how the program will work.. basically, I want the program to read the date and if the read date < 'a particular date', the program continues, else it exit. I don't want to read the time from the computer as the program can be fooled by resetting the pc time. is there a way to read time from internet - so that the user cannot fool the program by date reset? thanks as a start in Autoit i tried something i was missing since im using Autoit. I build a custom MessageBox which has a large amount of custom options and which scales its size on the parameters you set. -Text Color (Buttons, Text) -Background Color (Msgbox, Buttons, Label) -Icon (Default, No Icon, Custom) -Label/ Button Style. I tried to keep this as close as i could to a Msgbox i was used too on my batch times. After i was ready i realised, @Melba23 probably build a way better msgbox which would have suit my needs enterly, anyway thanks to @Melba23 because i use his Stringsize UDF. local $Message = _sMsgBox("Test", 6, "Continue?") if @extended <> -1 Then MsgBox(0, @extended, $Message&" Button pressed") I am working on a project where, emails from outlook are to be read and moved to various folders within the mailbox, based on the content of the emails. I used the below code for moving mails. It works fine when I run it against individual mail ids. But when I run it on Shared mailbox, the mails are not moved to respective folders. _OL_ItemMove($oOutlook, $sEntryId, Default, $sDestinationFolder) The value of $sEntryId is saved in an excel report initially. The current process reads the $sEntryId from the excel and passes it to "_OL_ItemMove" statement. Requesting the guidance of the forum members in this issue. Good evening everyone I am working with Word UDF ( thanks @water! ), and, especially, with the function _Word_DocFindReplace(). The replace does work everywhere in the document, but, it does not work in Headers or Footers. Am I missing something or am I forced to use the code below? I have already looked in the Help file ( about _Word_DocFindReplace() ), but there are no mentions about replace text in Headers/Footers. Sub FindAndReplaceFirstStoryOfEachType() Dim rngStory As Range For Each rngStory In ActiveDocument.StoryRanges With rngStory.Find .Text = "find text" .Replacement.Text = "I'm found .Wrap = wdFindContinue .Execute Replace:=wdReplaceAll End With Next rngStory End Sub Thanks everyone in advance I'm trying to get data from http://poe.trade/ - disclaimer, although this site is about a game, my script will not in any way interact directly with the game in any way. The script is just to get data from the site. To explain how it works - you submit a POST request and a custom URL is returned, then you do a GET request on that URL and you get the final URL you want. Now, I've tried doing so by using https://apitester.com/ and the first phase works. Here's how it looks like at APITester: Request Headers POST /search HTTP/1.1 Host: poe.trade Accept: */* User-Agent: Rigor API Tester Content-Length: 43 Content-Type: application/x-www-form-urlencoded Request Body online=x&name=kaom%27s%20heart&league=incursion When I submit this, the response I get is this: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <title>Redirecting...</title> <h1>Redirecting...</h1> <p>You should be redirected automatically to target URL: <a href="http://poe.trade/search/ioritewoteteme">http://poe.trade/search/ioritewoteteme</a>. If not click the link. So I then do a GET request for 'http://poe.trade/search/ioritewoteteme', which results in this response: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN"> <title>Redirecting...</title> <h1>Redirecting...</h1> <p>You should be redirected automatically to target URL: <a href="http://poe.trade/search/inamotezuakito">http://poe.trade/search/inamotezuakito</a>. If not click the link. Great, this link (http://poe.trade/search/inamotezuakito) is exactly what we want. However, when I try to do the same in autoit, the result is quite different: Global Const $HTTP_STATUS_OK = 200 $test = HttpPost("http://poe.trade/search", "/online=x&name=kaom%27s%20heart&league=incursion") ClipPut($test) MsgBox(1, "", $test) Func HttpPost($sURL, $sData = "") Local $oHTTP = ObjCreate("WinHttp.WinHttpRequest.5.1") $oHTTP.Open("POST", $sURL, False) If (@error) Then Return SetError(1, 0, 0) $oHTTP.SetRequestHeader("Host", "poe.trade") $oHTTP.SetRequestHeader("User-Agent", "Rigor API Tester") $oHTTP.SetRequestHeader("Accept", "*/*") $oHTTP.SetRequestHeader("Content-Type", "application/x-www-form-urlencoded") $oHTTP.Send($sData) If (@error) Then Return SetError(2, 0, 0) If ($oHTTP.Status <> $HTTP_STATUS_OK) Then Return SetError(3, 0, 0) Return SetError(0, 0, $oHTTP.ResponseText) EndFunc The code above returns: ' 謟 ' Any ideas as to what I am doing incorrectly? Once I get the final link using APITester and do a GET on that i get a bunch of hieroglyphs. A friend of mine advised that the data is GZiped, which is a pain in the butt to be honest. However, apparently curl can uncompres that. How would I go about it?
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211403.34/warc/CC-MAIN-20180817010303-20180817030303-00344.warc.gz
CC-MAIN-2018-34
5,134
31
https://support.dhigroup.com/forums/mike-urban/41498392-1ce3-ec11-bb3c-000d3ab6f805?page=1
code
If you want different .prf files to be generated , then try breaking the simulation period in smaller time periods . you can use the Hot Start functionality to set up the initial conditions for next simulation. For example,If I have to perform a simulation for 2 days period, then I generally divide it into 2 simulation periods and use the conditions from 1st day simulation and set in the hot start for next day simulation. Hope I'm clear. let me know if you require further information. You can use Mike Urban manual and read about Hot Start functionality.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473690.28/warc/CC-MAIN-20240222030017-20240222060017-00195.warc.gz
CC-MAIN-2024-10
559
2
https://medium.com/linagora-engineering/from-webstorm-to-vscode-road-to-the-freedom-743eda17164a
code
Once I joined Linagora I found most of JS developers here were using WebStorm, so I have just started to use it as others. WebStorm is developed by JetBrains from which open source companies can ask for free licences. And this is the case of our company Linagora. It was really cool to code in WebStorm, knowing the different number of plugins that are all available out-of-the-box. The killer-feature for me was the fact that I can write tests, run them and debug them directly from WebStorm. Such a feature helps any JS developer throughout the Test development development process. However, as an open source lover, I was not really happy to use WebStorm. And each time I read the famous sentence about WebStorm mentioned on their site: “WebStorm’s got you covered!” I am really confused. If you are serious then why it is not open source. Why I should not see the code source so as to be sure that I am really get covered by WebStorm. Meanwhile, I have heard a lot about VSCode so I decided to give it a try. The first impression I had once I started it the first time was: “OMG, it is so fast”. VSCode allows me to do the same operations I used to do with WebStorm but a way faster. So I decided to ensure that the killer-feature I look for in each IDE is supported by VSCode. Yes, you got it, I am speaking about testing and debugging directly from VSCode. To do so, I started to RTFM till I got everything configured. And it was really easy. So if you are an open source lover like us, and you are using VSCode but you want to know how to configure it correctly, then you are welcome to continue on reading. To configure Mocha tests in VSCode, all what you have to do is to go to the Debug view and add a similar config into you Now you can run your Mocha tests directly from VSCode and you can add your lovely breakpoints directly in VSCode. If you need to run your Karma tests and debug them directly from VSCode you should start by installing a Browser’s debugger from VSCode marketplace. I prefer using Debugger for Chrome extension. Once installed you can now configure a new type of configuration, called “Chrome” (see line 6 from the previous gist). Add the following configuration to your You need also to add a new browser that supports debugging in your karma configuration file, as the following: Finally, you should start your Karma server either from a terminal or as a VSCode task. Personally, I prefer running it as a VSCode task. To do so, you should add a task to your That it is, run the task “karma debugger”, attach your debugger “Debug karma tests in Chrome”, add breakpoints, debug, feel the power and conquer the world. IMHO, I think that each JS developer should give VSCode a try. Along the same lines, I really hope that this story could help you configuring VSCode to run tests and debug them directly from VSCode. Happy coding!
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527000.10/warc/CC-MAIN-20190721123414-20190721145414-00381.warc.gz
CC-MAIN-2019-30
2,886
15
https://docs.microsoft.com/en-us/office/vba/api/outlook.taskrequestdeclineitem.showcategoriesdialog
code
TaskRequestDeclineItem.ShowCategoriesDialog method (Outlook) Displays the Show Categories dialog box, which allows you to select categories that correspond to the subject of the item. expression A variable that represents a TaskRequestDeclineItem object. Support and feedback Have questions or feedback about Office VBA or this documentation? Please see Office VBA support and feedback for guidance about the ways you can receive support and provide feedback.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575076.30/warc/CC-MAIN-20190922032904-20190922054904-00507.warc.gz
CC-MAIN-2019-39
459
5
https://iacas57.net.technion.ac.il/student-competition/
code
The conference hosts an annual student project competition. The competition is open to individuals or groups of undergraduate students, with projects in all areas of aerospace sciences, conducted in an academic institute. To enter the competition, the student/group should submit an extended abstract through the conference website. Upon submission, the abstract should be classified as a ‘student project’. The extended abstract should include the names of students and supervisor and a classification of the project as a design, research, or experimental one. Students/groups whose work is selected for presentation at the conference will be required to: - Submit the final report detailing their project (can be the actual report submitted for the project grading). - Participate in the conference and present the work themselves. - Submit a revised extended abstract as the final submission. Alternatively, submit a full paper. Submission procedures and important dates can be found on the Call for Papers webpage. Prizes will be awarded for exceptional projects in the following categories: - Design project conducted by a group of students – Prize in memory of Dr. Shlomit Gali. - Research/Experimental project
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506339.10/warc/CC-MAIN-20230922070214-20230922100214-00084.warc.gz
CC-MAIN-2023-40
1,222
10
https://corfield.org/blog/page/3/
code
Back in February I talked about boot-new and talked about a “future 1.0.0 release”. We’re not there yet, but generators got added in release 0.4.0 and, in the four minor releases since, the focus has been on refactoring to match the core Boot task structure and improving compatibility with Leiningen templates. At World Singles, we’ve continued to extend our usage of Boot until we have only a couple of Ant tasks left and we expect those to be within Boot’s reach soon. In this post, I want to cover some of the things we’ve been doing with Boot recently. In my previous three blog posts about Boot – Rebooting Clojure, Building On Boot, and Testing With Boot – I looked at why World Singles decided to switch from Leiningen to Boot, as well discussing one of the missing pieces for us (testing). Once I had boot-expectations written, I was casting around for other missing pieces in the ecosystem and one glaring one was the lack of something to generate new projects from templates. In Building On Boot, I gave some high level benefits we’d found with Boot, compared to Leiningen, and how it had helped up streamline our build process. That article closed with a note about Boot not having the equivalent of common Leiningen plugins, and that’s what I’m going to cover here, since that was the first real obstacle we encountered. In yesterday’s blog post, Rebooting Clojure, I talked about our switch from Leiningen to Boot but, as Sven Richter observed in the comments, I only gave general reasons why we preferred Boot, without a list of pros and cons. Over the coming weeks, I’ll write a series of posts about some of the specifics that worked better for us, as well as some of the obstacles we had to overcome in the transition. In this post, I’m going to cover some of the pros at a high level as it improved our build / test process. I did not intend to stop blogging in 2015 but that’s certainly what it looks like here! So what kept me so busy that I didn’t get around to blogging anything? I’ve often said that I try to follow The Pragmatic Programmer’s advice to learn a new language every year. I don’t always achieve it, but I try. As I’ve settled into Clojure as my primary language over the last several years, I’ve made a fair attempt to learn Python, Ruby, Racket/Scheme, Standard ML and more recently Elm. I learned that I like Python, I don’t like Ruby, Racket/Scheme is “just another Lisp” (I already have Clojure) and SML is very interesting but not really widely useful these days (it’s a great language for learning Functional Programming concepts tho'!). I also spent some time with Go last year (don’t like it). The Elm language is really nice - and useful for building interactive browser-based applications (and games). I’ve been meaning to blog about it for quite a while, and I hope to get around to that in due course. Elm is sort of inspired by Haskell, and that’s really what this blog post is about. Sort of. Last week I attended The Strange Loop in St Louis. I attended in 2011 and was blown away. I missed 2012 but attended again in 2013 and was blown away once more. I already have 2015’s dates in my calendar. How was 2014? This was originally posted on corfield.org back in April 2013 and I noticed it was recently referenced by Eric Normand in his recent blog post Convince your boss to use Clojure so I figured it was time to update the article and bring it onto my new blog. A question was asked in early 2013 on a Clojure group on LinkedIn about reasons to migrate to Clojure for enterprise applications in a Java shop. It’s a fairly typical question from people in the Java world when they hear the buzz about Clojure, and of course asking the question on a Clojure group garnered a lot of positive responses about why Clojure is a good choice. I didn’t feel anyone had really addressed a core aspect of the original question which was, essentially, “Why should I, as a Java web developer, using JPA, JSF etc, choose Clojure instead for an enterprise application?”.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347411862.59/warc/CC-MAIN-20200531053947-20200531083947-00580.warc.gz
CC-MAIN-2020-24
4,077
13
https://community.esri.com/thread/251009-copy-paste-from-one-layer-to-another-using-python-commands
code
Hi, I'm looking for a way of copy paste points from one layer to another, just by using python commands in Arcgis pro. Something like below but It might just be easier to use the Use append tool to append your selected features including all attributes. import arcpyfrom arcpy import envfc1 = "" #Feature class to copy fromfc2 = "" #feature class to copy toarcpy.env.workspace = "" #Workspace "C:/Temp"arcpy.env.overwriteOutput = True# Start an edit session. Must provide the worksapce.edit = arcpy.da.Editor(arcpy.env.workspace)# Edit session is started without an undo/redo stack for versioned data# (for second argument, use False for unversioned data)edit.startEditing(True)# Start an edit operationedit.startOperation()arcpy.Append_management(fc1, fc2, "NO_TEST")# Stop the edit operation.edit.stopOperation()# Stop the edit session and save the changesedit.stopEditing(True)arcpy.RefreshActiveView() Reading geometries—ArcPy Get Started | Documentation Writing geometries—ArcPy Get Started | Documentation or you can use tools in arctoolbox, eg. Copy tool and Append tool Can you elaborate a little more on what you are trying to accomplish, are you trying to copy all the points from one feature class to another or just copy the selected ones or ones with a certain attribute? I want to copy all the points from one feature layer to another base feature layer. Both feature layers have the same attributes. Append—Data Management toolbox | Documentation to an existing file Merge—Data Management toolbox | Documentation to a new file In fact, you indicated that the attributes are the same, which suggests that the fields are the same, so the code sample is much easier import arcpyarcpy.env.workspace = "C:/path_to_your/data.gdb"arcpy.Append_management(["featureclass1", "featureclass2"], "TEST") Retrieving data ...
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740423.36/warc/CC-MAIN-20200815005453-20200815035453-00191.warc.gz
CC-MAIN-2020-34
1,833
14
https://www.freelancer.com/projects/android/native-video-player-android/?ngsw-bypass=&w=f
code
Looking for an expert Android developer to make some changes to my android app. I would like to view and play video natively from the app without having to use WebView Please only apply if you can work now 36 freelancers are bidding on average $207 for this job Hello sir/ma'am I have seen your requirements of Native Video Player Android, we have an experienced and qualified team of developers, come to the chat will discuss there, Thanks and regards Maysaxena Hello, I have read your description and I can develop the app for video viewing. I have 7 years of PHP, Mysql, Java, Wordpress, Flutter, Python experience, contact me for detailed discussion. Regards, Abby Hi I have read all your description. I am professional Android app developer and I am ready to start now. I am sure high quality, good communication. Please contact me and Let's go ahead ! Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088471.40/warc/CC-MAIN-20210416012946-20210416042946-00247.warc.gz
CC-MAIN-2021-17
865
7
https://www.scalemates.com/kits/larsenal-aero-ac-72-34-aasm-250-mk82--1350531
code
AASM 250 Mk82 L'Arsenal Aero | No. AC 72 34 | 1:72 - L'Arsenal Aero - AASM 250 Mk82 - AC 72 34 - Detail set - 2021 | Initial release - new tool - AASM » Bombs (Accessories) None of our partner shops or mates has this currently for sale. There are no related Detail and Conversion sets covering the "AASM" in 1:72. We don't know about any in-box reviews for this AASM 250 Mk82 (#AC 72 34) from L'Arsenal Aero.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662509990.19/warc/CC-MAIN-20220516041337-20220516071337-00774.warc.gz
CC-MAIN-2022-21
409
11
http://webapps.stackexchange.com/tags/malware/hot
code
Hot answers tagged malware They can't DM you if you don't follow back. You can block them if you want to, or you can use one of the many 3rd party services around to do so. It doesn't really have any effect. It's basically just a number. You'll probably find a lot of them disappear naturally from time to time when Twitter purges spam accounts or they unfollow you because you're not ... They are usually just trying to get you to look at their links (money pyramids, xxx sites..) - basically to generate more traffic. So they probably don't pose too much threat, unless you publish all of your sensitive data online, but that is an issue for itself. The +1 tab on your Google+ profile is strictly website URLs you have +1'd. This number includes a variety of things including but not limited to: +1'ing website URL's, +1'ing posts or comments on Google+, as well as liking YouTube comments. Try the StopBadware Clearinghouse. That's probably where Google and Firefox are getting their information. There's not a list of the sites (at present there's nearly a million URLs in their database) but you can search for specific site URLs. I don’t know any (well known) site that does that, but there is Google’s Safe Browsing API if you want to do something programmatically. I found Phrozen VirusTotal, great freeware. It works in bulk upload by creating a queue list, warns you when the upload is greater than 32mb, shows awaiting results, and tells you about the available results. Within the options, there is more functionality with it. The only downside is it is abandonware. There are no updates after version 3.1. Where are you getting your files from? An option for you is to use the Metascan Online API, which allows you to scan against 43 antivirus engines, similar to VirusTotal. With the API, you can essentially build your application/service to automatically send and scan. Disclaimer -- I work for OPSWAT, who runs Metascan Online I found it myself using VirusTotal Uploader. Scanning got super simple now via right-clicking on the file(s). From the FAQ: VirusTotal's antivirus engines are commandline versions, so depending on the product, they will not behave exactly the same as the desktop versions: for instance, desktop solutions may use techniques based on behavioural analysis and count with personal firewalls that may decrease entry points and mitigate propagation, etc. In ... What I do is have a "locked accout" and thus, I have to approve all of my followers...This cuts down big-time on spammy followers, and many don't even bother to request to follow me... Only top voted, non community-wiki answers of a minimum length are eligible
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824201.28/warc/CC-MAIN-20160723071024-00203-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
2,665
12
https://gogloby.io/jobs/software-engineer-security-data-privacy/
code
Using your knowledge of secure web application development, you’ll be responsible for protecting the security and privacy of the millions of event attendees and community managers who use Bevy each day. By safeguarding Bevy’s data, you’ll keep us as the market leader in real life community software. You’ll be a mentor and leader to us all, bringing your own deep focus on security to our team of generalists. At the same time, you’ll work on the Bevy product, building out privacy and security related features for our end users. Software Engineer – Security/Data Privacy Bevy is an early-stage startup with a mission to help brands build strong global communities. Founded in April 2017 by the core team behind Startup Grind, Bevy is an Enterprise-grade SaaS platform used by companies that include Adobe, Amazon, Asana, Atlassian, Duolingo, Ebay, Epic Games, IDEO, Intuit, MongoDB, Red Bull, Roblox, Salesforce, SAP, Slack and many more. In April 2019, Bevy acquired CMX which is the world’s largest network of community professionals. CMX offers world-class training, events and research. The Bevy business and the development team are growing and we’re looking for you to add a fresh perspective on privacy and security to our mix as we scale to our next thousand customers. Day to Day Responsibilities - Developing features to protect user and customer data, in Django and React. - Improving the security of existing features. Whether it’s for GDPR, SOC2, OWASP, or any other standard, you’re able to ensure that our code is in compliance. - You’ll participate in and run internal/external security audits and vulnerability testing. - You’ll be the primary reviewer for security & privacy issues in the team’s code. - You’ll also help educate our team – as a subject matter expert, you’ll set us on the path of all becoming experts as well. - Working closely with our DevOps engineers to ensure our cloud infrastructure remains secure. You Might Be a Good Fit for This Role If - You’re a hands-on, full stack developer. You have strong knowledge of modern day web frameworks and development, and how to mitigate vulnerabilities, whether they’re in the OWASP top 10 or beyond. We use Django and React, but we think that if you’ve used similar frameworks like Rails or Express, you’ll be at home. - You’re familiar with the landscape of data privacy regulation (GDPR, CCPA, …) and the implications that has on developing enterprise grade software. - You’re comfortable with enterprise level security audits, like SOC2 or ISO 27001, and crafting a software development process that minimizes their disruption. - You’ve worked with privacy and compliance in the context of online payments. - You’ve been an internal advocate and security coach to engineering organizations. - You reside in North or South America. Yes, we are a distributed company, but since we are still small, we like to minimize the time zone spread within the team. - You are an excellent communicator. In our small team, English is the official language. You need to be able to articulate complex ideas efficiently and effectively. When people do not share an office, it is essential to pay extra attention to communication. About the Bevy Engineering Team The Bevy Engineering Team is currently a mix of engineers from across North America, united by our shared purpose of bringing people together in real life. For some of us, Bevy is our first job out of bootcamp, or university. For others, it’s not our first startup – some of us have founded startups before, or worked at startups with successful exits. Some of us run or participate in our own community events as well. We’ve grown together with Bevy as it has scaled from our first few customers to those we have today. We care a great deal about the right balance of startup scrappiness and reliable, auditable code. We share our learnings liberally. We are a small but powerful team, dedicated to achieving our mission to bring more community to the world. Many of us have worked in community positions before and understand the struggles and peaks that come with the role. Our team communicates candidly, giving feedback early and often. We set ambitious goals, and do what it takes to achieve them, while making sure that we take care of our own personal health and mental wellbeing. We’ll want you to be ready to take on a lot of responsibility with guidance and mentorship along the way. We work to create a diverse, equitable and inclusive environment. We strongly believe that diversity of experience, perspectives, and background will lead to a better environment for our employees and a better product for our users and the communities we serve. We’re excited by the challenges to come as Bevy scales to its next thousand customers. Will you join us on our journey?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100602.36/warc/CC-MAIN-20231206162528-20231206192528-00634.warc.gz
CC-MAIN-2023-50
4,868
23
https://ro.atwar-game.com/faq.php?faq_id=9
code
If there are open games listed in the Lobby, you can join by simply clicking on them. Games usually have a set number of turns, during which new players can still join (10, by default). On the game icon you can notice the game name, the current week (turn) and the number of players in it. Clicking on a game will take you in and show you a message asking whether you want to join it or simply spectate - in the latter case you can watch the game without participating. Click the 'Join' button to join as a player. Normally, you would then have to wait until the next turn starts( unless 'Instant joining' is on) If the game is marked as 'NEW', that means it's been created but not started yet. Clicking on it would take you to the game creation screen (without the ability to alter any options). Once the game creator chooses to start the game, you will be taken to it automatically. If the game is marked with a star, that means you're still an active player in it. Clicking on it will take you back to the game. If the star is red, it means a new turn has started in the game. Private games are marked with 'PRIV' - you need to know the password to join them. Games that are not open for joining anymore.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817790.98/warc/CC-MAIN-20240421163736-20240421193736-00692.warc.gz
CC-MAIN-2024-18
1,207
7
https://forums.fighq.io/t/fig-inbox-opens-up-safari-browser/185
code
when i access my inbox on fig and click on a message or a badge, the message opens in a browser (safari) instead of inside fig. when i open a message about a reply or a like on a post i made within fig, the message opens in fig. is this how it is for others? i am wanting to stay in the app and avoid redirection to browser as much as possible. if you know of somewhere this is already covered - what to expect in app and what not to- do please link me?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510100.47/warc/CC-MAIN-20230925215547-20230926005547-00629.warc.gz
CC-MAIN-2023-40
453
4
https://www.mail-archive.com/[email protected]/msg201868.html
code
>this is not a gcc bug. this is an ubuntu management specific arrogance (and perhaps some cash from redmond with love) - of course it is completely wrong to patch the kernel makefile because they decided to ship a gcc unable to build the kernel itself (with wrong defaults/specs). but like they said repeatedly, they are not a democracy. also just like linus said repeatedly, fuck unubuntu! ok thanks for you really nice and well proven point. AFAICT also Fedora and other major linux distros are starting enabling pie by default, and probably more will come. https://fedoraproject.org/wiki/Changes/Modernise_GCC_Flags Unfortunately I don't want to answer why you are wrong, because I don't want to feed the troll, and you didn't say anything worth an answer in your post. So, the answer will be generic to other people (who probably have more clues than you on the reasons). pie is a security flag that is really important for an OS. Unfortunately asking maintainers to enable it resulted in not many adaptions, and many critical pieces of software without such hardening flag enabled. Enabling by default in gcc sounded a better idea, and the side effect has been that virtualbox/kernel had to disable it manually to still build. For this reason -f-no-pie has been created, and it should work with no issues. And this bug/flag has been injected and the kernel is now fixed, so please move on. thanks -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to dkms in Ubuntu. https://bugs.launchpad.net/bugs/1574982 Title: Cannot use CONFIG_CC_STACKPROTECTOR_STRONG: -fstack-protector-strong not supported by compiler Status in dkms package in Ubuntu: Invalid Status in gcc-defaults package in Ubuntu: Invalid Status in linux package in Ubuntu: Fix Released Status in dkms source package in Xenial: Invalid Status in linux source package in Xenial: Fix Released Bug description: Installing the latest 4.4.0-22 kernel ends with that error logged into dkmsbuildlog (only affect yakkety kernel; 4.4.0-22 kernel installation on xenial is fine) https://launchpadlibrarian.net/256055415/DKMSBuildLog.txt make "CC=cc" KBUILD_VERBOSE= -C /lib/modules/4.4.0-22-generic/build M=/var/lib/dkms/nvidia-361/361.42/build ARCH=x86_64 NV_KERNEL_SOURCES=/lib/modules/4.4.0-22-generic/build NV_KERNEL_OUTPUT=/lib/modules/4.4.0-22-generic/build NV_KERNEL_MODULES="nvidia nvidia-uvm nvidia-modeset" INSTALL_MOD_DIR=kernel/drivers/video modules make: Entering directory '/usr/src/linux-headers-4.4.0-22-generic' arch/x86/Makefile:133: stack-protector enabled but compiler support broken Makefile:670: Cannot use CONFIG_CC_STACKPROTECTOR_STRONG: -fstack-protector-strong not supported by compiler the latest error logged is: /var/lib/dkms/nvidia-361/361.42/build/nvidia/nv-frontend.c:1:0: error: code model kernel does not support PIC mode Looks like it is related to the latest changes updates: gcc-6/gcc-5 5.3.1-16ubuntu2 (some packages built with gcc-6; gcc-5 disabled for the packages built with gcc-6) Maybe some alternatives has not been updated to take care of these changes, as asked some time ago: http://askubuntu.com/questions/26498/choose-gcc-and-g-version This has been firstly reported against a nvidia crash: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-361/+bug/1574838 ProblemType: Bug DistroRelease: Ubuntu 16.10 Package: gcc 4:5.3.1-1ubuntu1 ProcVersionSignature: Ubuntu 4.4.0-21.37-generic 4.4.6 Uname: Linux 4.4.0-21-generic x86_64 NonfreeKernelModules: nvidia_uvm nvidia_modeset nvidia ApportVersion: 2.20.1-0ubuntu2 Architecture: amd64 CurrentDesktop: GNOME Date: Tue Apr 26 08:41:32 2016 SourcePackage: gcc-defaults UpgradeStatus: No upgrade log present (probably fresh install) --- ApportVersion: 2.20.1-0ubuntu2 Architecture: amd64 AudioDevicesInUse: USER PID ACCESS COMMAND /dev/snd/controlC1: oem 2014 F.... pulseaudio /dev/snd/pcmC0D0p: oem 2014 F...m pulseaudio /dev/snd/controlC0: oem 2014 F.... pulseaudio CurrentDesktop: GNOME DistroRelease: Ubuntu 16.10 HibernationDevice: RESUME=UUID=0a9ca7f0-6eeb-4b21-b70f-670fa600de16 IwConfig: eth0 no wireless extensions. eth1 no wireless extensions. lo no wireless extensions. Lsusb: Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 003 Device 002: ID 046d:c062 Logitech, Inc. M-UAS144 [LS1 Laser Mouse] Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub MachineType: ASUSTEK COMPUTER INC P5W DH Deluxe NonfreeKernelModules: nvidia_uvm nvidia_modeset nvidia Package: ubuntu ProcFB: ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.4.0-21-generic root=UUID=7c755ed6-51cc-4b75-88ac-9c75acf82749 ro ProcVersionSignature: Ubuntu 4.4.0-21.37-generic 4.4.6 RelatedPackageVersions: linux-restricted-modules-4.4.0-21-generic N/A linux-backports-modules-4.4.0-21-generic N/A linux-firmware 1.157 RfKill: Tags: yakkety Uname: Linux 4.4.0-21-generic x86_64 UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo _MarkForUpload: True dmi.bios.date: 07/22/2010 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 3002 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: P5W DH Deluxe dmi.board.vendor: ASUSTeK Computer INC. dmi.board.version: Rev 1.xx dmi.chassis.asset.tag: Asset-1234567890 dmi.chassis.type: 3 dmi.chassis.vendor: Chassis Manufacture dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr3002:bd07/22/2010:svnASUSTEKCOMPUTERINC:pnP5WDHDeluxe:pvrSystemVersion:rvnASUSTeKComputerINC.:rnP5WDHDeluxe:rvrRev1.xx:cvnChassisManufacture:ct3:cvrChassisVersion: dmi.product.name: P5W DH Deluxe dmi.product.version: System Version dmi.sys.vendor: ASUSTEK COMPUTER INC To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dkms/+bug/1574982/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525659.27/warc/CC-MAIN-20190718145614-20190718171614-00438.warc.gz
CC-MAIN-2019-30
6,102
2
https://flylib.com/books/en/2.486.1.263/1/
code
OneNote helps you conduct research online and collect the useful information you find in your virtual notebook. OneNote even records the source of the informationthe URL of the Web page from which it camein your notes. In this exercise, you will find and insert excerpts from Web sites as you conduct research to develop a seminar to be presented by The Garden Company at the flower and garden show. BE SURE TO start OneNote before beginning this exercise. Open your Web browser, and go to one of your favorite Web sites. If you have a favorite site about gardening , go to that site. Select a portion of the content of the pagepictures, text, links, or all of these and on the Edit menu, click Copy . Switch to OneNote, click a blank area of the page, and on the Edit menu, click Paste . The Web page contents are inserted into your notes, with a citation indicating the source of the material. On the Tools menu, click Research . The Research task pane appears on the right side of the OneNote window. In the Search for box, type gardening , and in the drop-down list, click Encarta Encyclopedia: English (North America) . The search starts, and then the results appear in the Research task pane. Scroll through the search results list to see the variety of items found, and then near the top of the list, click II. Selecting Plants . The Encarta topic entitled Selecting Plants appears in a Web browser window. Select the first paragraph in the topic, and on the Edit menu, click Copy . Switch to OneNote, right-click any blank area of the page, and click Paste on the shortcut menu. The text you copied from Encarta is inserted into your notes, with a citation indicating the URL from which you obtained the material.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251688806.91/warc/CC-MAIN-20200126104828-20200126134828-00410.warc.gz
CC-MAIN-2020-05
1,721
16
https://polarpedia.eu/en/dying-is-illegal-in-longyearbyen/
code
People are banned from dying in Longyearbyen on Svalbard. The town’s graveyard stopped accepting new inhabitants in 1950′. Why? It was discovered that permafrost prevents the corpses from decomposing. This means that any diseases that the deceased has, could spread. 11 people died and were buried in the village during the Spanish Flu pandemic in 1918, which killed an estimated 5% of the world’s population. The 1918 influenza pandemic killed so many people there were more bodies than coffins. Today, the terminally ill in Longyearbyen are flown to the mainland and then buried there.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474569.64/warc/CC-MAIN-20240224212113-20240225002113-00576.warc.gz
CC-MAIN-2024-10
593
3