url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
http://kirkdev.blogspot.com/2016/11/photocapphp-offline-photo-captioning.html
|
code
|
So, I haven't posted much lately, I was in Malaysia for a bit under two weeks.
One thing about vacations to Malaysia - lots of pictures...
go here and start clicking through up to the 21st)
Anyway, in the current social media world, I tend to double post; I put photo galleries on FB, where friends and family are more likely to see it and comment, but I also like keeping them on my blog as their permanent home.
FB has polished photo gallery editing, but my blog doesn't. Also, where Internet was spotty (like at our resort; downloading was fine but uploading was terribly slow) or non-existent, I wanted a tool to edit captions offline, one that made it easy to later put the photos onto FB and my site. For FB, it's still pretty manual copy and pasting, but it goes fast. (Haven't researched if there are any better ways to automate making albums with captions, but frankly I do it so rarely it might not be worth more dev time.) For my blog I can just generate the appropriate HTML and copy and paste (modulo some search and replace fiddling I do for my blogs way of handling thumbnails and upload folders)
PHP has a convenient built-in webserver, from a shell run
php -S localhost:8000
(or whatever port you like)
Below is a link to the code for my future reference, I just need to copy and paste it into a file named "photocap.php" in the same folder as all the photos. I ran into a few PHP quirks, like I had to encode filenames rather than use them as straight up keys because "." is not allowed in a key.
Also the code is pretty rough, but that's what I get for hacking on a sunny beach while drinking...
I published the code at github.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218203515.32/warc/CC-MAIN-20170322213003-00156-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 1,646 | 11 |
https://viralrang.com/how-to-hire-react-native-developers-skills-salary-interview-questions/
|
code
|
So you want to hire React developers? Great idea, but where should you start?
If you’re not a developer yourself, it might be hard to hire a developer. What interviews should you ask, how should you check his skills, and how do you know whether he asks for a reasonable salary or not?
These are all questions you can’t figure out yourself if you’re not closely familiar with the programming world. So, you need to start researching, and that’s what you’re doing right now if you stumbled upon this article.
Stay right here because you’re exactly where you need to be. We’ll help you find the best React developer and conduct an interview just like a pro.
So let’s understand:
How to Hire React Native Developers?
To first hire react native developers, you need to understand who is a react native developer.
React native is a platform that allows you to build native apps both for your iOS and Android devices. So if you plan to make an app that will be available on all mobile devices, you probably need a react native developer.
Accordingly, the React native developer is the one to build your native app. Now that we have the basics covered, let’s move to the next aspect:
What skills should a good React developer have?
First, let’s start with the hard skills.
- Knowledge of basic React assumptions
Another important hard skill is to efficiently operate with JSX, Virtual DOM, and other similar concepts. Understanding these fundamental React assumptions is critical, so if your potential React developer can not have it, let him go.
- Clean coding skill
Finally, you want your developer to write cleanly and neatly. Writing elegant code is not a matter of style or taste: you simply want your code to be easily readable for all the developers. Also, a neat code usually takes way less storage, which makes the app faster.
Besides being a good professional, you also want your employee to be a nice person with whom it will be pleasurable to work. That’s why you also need to check his soft skills.
Here are a couple of soft skills to look for:
- Communication skills
We know you might think that the developer does not have to communicate much: giving you a decent code is enough, right?
There surely will be cases where communicating with the developer will be inevitable, and you want to make sure that he does not make the process awkward for you.
- Endless curiosity
What is better than a professional who is always striving for knowledge and is constantly engaged in self-development? Although it is not a must, your future developer continually improves his skills.
- Time management skills
Finally, make sure that your developer knows how to manage his time properly. The reason is apparent: you don’t want to hire someone who will always miss the deadlines.
Now, once you know what skills your React developer should have, it is time to understand how much salary you should expect to pay.
Of course, this largely depends on the experience and knowledge of the developer. Here are the approximate ranges for each level:
- Junior: $69K yearly
- Mid-level: $122K yearly
- Senior-level: $155K yearly
Okay, all this is good, but what exactly should you ask during the interview?
Well, we get your worries. It is a different thing to know what skills to look for and another thing to figure out whether your developer has them or not. So what should you ask during the interview?
Here are the most common react-native interview questions:
- What is the difference between ReactJS and React Native?
- What are the advantages of React Native?
- What are the different threads in React Native, and how do you use each?
- How do you use State in React Native, and what is it?
You can find more in-depth interview questions here.
To sum up,
Before hiring a React native developer, make sure you are fully prepared for the interview and know exactly what you’re looking for!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818452.78/warc/CC-MAIN-20240423002028-20240423032028-00744.warc.gz
|
CC-MAIN-2024-18
| 3,903 | 39 |
http://healthybusinesstips.com/bitcoin-mining-what-is-bitcoin-hack.html
|
code
|
To be accepted by the rest of the network, a new block must contain a so-called proof-of-work (PoW). The system used is based on Adam Back's 1997 anti-spam scheme, Hashcash. The PoW requires miners to find a number called a nonce, such that when the block content is hashed along with the nonce, the result is numerically smaller than the network's difficulty target.:ch. 8 This proof is easy for any node in the network to verify, but extremely time-consuming to generate, as for a secure cryptographic hash, miners must try many different nonce values (usually the sequence of tested values is the ascending natural numbers: 0, 1, 2, 3, ...:ch. 8) before meeting the difficulty target.
The Bank for International Settlements summarized several criticisms of bitcoin in Chapter V of their 2018 annual report. The criticisms include the lack of stability in bitcoin's price, the high energy consumption, high and variable transactions costs, the poor security and fraud at cryptocurrency exchanges, vulnerability to debasement (from forking), and the influence of miners.
But not everyone is going along for the ride. Back in East Wenatchee, Miehe is giving me an impromptu tour of the epicenter of the basin’s boom. We drive out to the industrial park by the regional airport, where the Douglas County Port Authority has created a kind of mining zone. We roll past Carlson’s construction site, which is swarming with equipment and men. Not far away, we can see a cluster of maybe two dozen cargo containers that Salcido has converted into mines, with transformers and cooling systems. Across the highway, near the new, already-tapped out substation, Salcido has another crew working a much larger mine. “A year ago, none of this was here,” Miehe says. “This road wasn’t here.”
Computing power is often bundled together or "pooled" to reduce variance in miner income. Individual mining rigs often have to wait for long periods to confirm a block of transactions and receive payment. In a pool, all participating miners get paid every time a participating server solves a block. This payment depends on the amount of work an individual miner contributed to help find that block.
Bitcoin is a peer-to-peer version of electronic cash that allows payments to be sent directly from one party to another without going through a financial institution. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. – Satoshi Nakamoto
Jump up ^ Christin, Nicolas (2013). Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace (PDF). Carnegie Mellon INI/CyLab. p. 8. Retrieved 22 October 2013. we suggest to compare the estimated total volume of Silk Road transactions with the estimated total volume of transactions at all Bitcoin exchanges (including Mt.Gox, but not limited to it). The latter corresponds to the amount of money entering and leaving the Bitcoin network, and statistics for it are readily available... approximately 1,335,580 BTC were exchanged on Silk Road... approximately 29,553,384 BTC were traded in Bitcoin exchanges over the same period... The only conclusion we can draw from this comparison is that Silk Road-related trades could plausibly correspond to 4.5% to 9% of all exchange trades
The Bitcoin mining network difficulty is the measure of how difficult it is to find a new block compared to the easiest it can ever be. It is recalculated every 2016 blocks to a value such that the previous 2016 blocks would have been generated in exactly two weeks had everyone been mining at this difficulty. This will yield, on average, one block every ten minutes.
With no ties to a national economy and lofty goals, Bitcoin's price is famously volatile. Prices have soared and plummeted in the wake of various national policies, financial deals, competing cryptocurrencies, and fluctuating public opinion. On the other hand, as many sovereign nations find themselves with currencies that are also vulnerable, the citizens of countries such as China and Venezuela are turning increasingly to virtual currencies.
The amount of new bitcoin released with each mined block is called the block reward. The block reward is halved every 210,000 blocks, or roughly every 4 years. The block reward started at 50 in 2009, is now 12.5 in 2018, and will continue to decrease. This diminishing block reward will result in a total release of bitcoin that approaches 21 million.
The unit of account of the bitcoin system is a bitcoin. Ticker symbols used to represent bitcoin are BTC[b] and XBT.[c] Its Unicode character is ₿.:2 Small amounts of bitcoin used as alternative units are millibitcoin (mBTC), and satoshi (sat). Named in homage to bitcoin's creator, a satoshi is the smallest amount within bitcoin representing 0.00000001 bitcoins, one hundred millionth of a bitcoin. A millibitcoin equals 0.001 bitcoins, one thousandth of a bitcoin or 100,000 satoshis.
Apart from being an intriguing mystery, this has real-world ramifications. u/Sick_Silk believes that the movement of funds may be at least partially responsible for the recent price decline seen in August, and whether that’s true or not, it’s certainly the case that 0.52% of the entire supply of Bitcoin is more than enough to seriously manipulate or destabilize the market. Indeed, the funds are already worth around $80 million less since the report went public.
It is conceivable that an ASIC device purchased today would still be mining in two years if the device is power efficient enough and the cost of electricity does not exceed it's output. Mining profitability is also dictated by the exchange rate, but under all circumstances the more power efficient the mining device, the more profitable it is. If you want to try your luck at bitcoin mining then this Bitcoin miner is probably the best deal.
To heighten financial privacy, a new bitcoin address can be generated for each transaction. For example, hierarchical deterministic wallets generate pseudorandom "rolling addresses" for every transaction from a single seed, while only requiring a single passphrase to be remembered to recover all corresponding private keys. Researchers at Stanford and Concordia universities have also shown that bitcoin exchanges and other entities can prove assets, liabilities, and solvency without revealing their addresses using zero-knowledge proofs. "Bulletproofs," a version of Confidential Transactions proposed by Greg Maxwell, have been tested by Professor Dan Boneh of Stanford. Other solutions such Merkelized Abstract Syntax Trees (MAST), pay-to-script-hash (P2SH) with MERKLE-BRANCH-VERIFY, and "Tail Call Execution Semantics", have also been proposed to support private smart contracts.
The first wallet program, simply named Bitcoin, and sometimes referred to as the Satoshi client, was released in 2009 by Satoshi Nakamoto as open-source code. In version 0.5 the client moved from the wxWidgets user interface toolkit to Qt, and the whole bundle was referred to as Bitcoin-Qt. After the release of version 0.9, the software bundle was renamed Bitcoin Core to distinguish itself from the underlying network.
Malachi Salcido: The Local Talent Salcido, a Wenatchee native and building contractor, studied other miners before launching his own bitcoin operation in 2014. He’s now one of the biggest miners in the basin, and has worked hard to convince the community that bitcoin and the blockchain could transform the region into a technology hub. “What you can actually do with the technology, we’re only beginning to discover,” says Salcido, pictured above in one of his mines. The basin is “building a platform that the entire world is going to use.” | Patrick Cavan Brown for Politico Magazine
Bitcoin Core is the “official” Bitcoin client and wallet, though isn’t used by many due to slow speeds and a lack of features. Bitcoin Core, however, is a full node, meaning it helps verify and transmit other Bitcoin transactions across the network and stores a copy of the entire blockchain. This offers better privacy since Core doesn’t have to rely on data from external servers or other peers on the network. Bitcoin Core routed through Tor is considered one of the best ways to use Bitcoin privately.
Difficulty increase per year: This is probably the most important and elusive variable of them all. The idea is that since no one can actually predict the rate of miners joining the network, neither can anyone predict how difficult it will be to mine in six weeks, six months, or six years from now. In fact, in all the time Bitcoin has existed, its profitability has dropped only a handful of times—even at times when the price was relatively low.
The whole process is pretty simple and organized: Bitcoin holders are able to transfer bitcoins via a peer-to-peer network. These transfers are tracked on the “blockchain,” commonly referred to as a giant ledger. This ledger records every bitcoin transaction ever made. Each “block” in the blockchain is built up of a data structure based on encrypted Merkle Trees. This is particularly useful for detecting fraud or corrupted files. If a single file in a chain is corrupt or fraudulent, the blockchain prevents it from damaging the rest of the ledger.
Mining a block is difficult because the SHA-256 hash of a block's header must be lower than or equal to the target in order for the block to be accepted by the network. This problem can be simplified for explanation purposes: The hash of a block must start with a certain number of zeros. The probability of calculating a hash that starts with many zeros is very low, therefore many attempts must be made. In order to generate a new hash each round, a nonce is incremented. See Proof of work for more information.
Wu claims that Antbleed, which has since been patched, was only vestigial code left in by mistake when engineers were trying to build a kill switch for a customer’s own use. There was some skepticism about this explanation, but because the S9’s firmware is open source, users are confident in the patched version. Still, the discovery of it was a startling reminder of the need for diversity in the mining hardware industry.
Bitcoin (BTC) is known as the first open-source, peer-to-peer, digital cryptocurrency that was developed and released by a group of unknown independent programmers named Satoshi Nakamoto in 2008. Cryptocoin doesn’t have any centralized server used for its issuing, transactions and storing, as it uses a distributed network public database technology named blockchain, which requires an electronic signature and is supported by a proof-of-work protocol to provide the security and legitimacy of money transactions. The issuing of Bitcoin is done by users with mining capabilities and is limited to 21 million coins. Currently, Bitcoin’s market cap surpasses $138 billion and this is the most popular kind of digital currency. Buying and selling cryptocurrency is available through special Bitcoin exchange platforms or ATMs.
Transactions are defined using a Forth-like scripting language.:ch. 5 Transactions consist of one or more inputs and one or more outputs. When a user sends bitcoins, the user designates each address and the amount of bitcoin being sent to that address in an output. To prevent double spending, each input must refer to a previous unspent output in the blockchain. The use of multiple inputs corresponds to the use of multiple coins in a cash transaction. Since transactions can have multiple outputs, users can send bitcoins to multiple recipients in one transaction. As in a cash transaction, the sum of inputs (coins used to pay) can exceed the intended sum of payments. In such a case, an additional output is used, returning the change back to the payer. Any input satoshis not accounted for in the transaction outputs become the transaction fee.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039749054.66/warc/CC-MAIN-20181121153320-20181121174859-00041.warc.gz
|
CC-MAIN-2018-47
| 11,997 | 22 |
https://www.experts-exchange.com/questions/26610439/Connecting-a-gigabit-network-drive-to-SBS-server.html
|
code
|
I run a number of backups on an SBS 2003 network using a 500GB Freecom NAS/USB drive. I did try setting it up using the Ethernet connection, but the performance was dreadful and I took the USB 2.0 path.
Anyway I now need to replace it with a 2TB external drive, which is both USB 2,0 and ethernet, but this time has a gigabit connection.
My first question would be is the gigabit connection better or worse than a USB 2.0? It's a cheap Seagate drive (£110) but I'm on a budget and USB 2.0 works quite well.
However, if the ethernet solution would be better I would like to make some changes to the network and I need some help here.
The server's old and will be replaced in 12 to 18 months time. It has an internal gigabit (the only NIC on the server) and this connects to a Netgear firewall FVS318 (100Mbps), which in turn connects to a D-Link ethernet ADSL modem.
A 8-port 100Mbps switch connects to the Netgear and another 8-port switch daisy chains from the first one. These serve 10 network devices.
Ideally I would like to take this opportunity to connect the server to the 2TB drive and two PCs using a second gigabit NIC on the server and a 5-port gigabit switch to get the full 1000Mbps. The second NIC on the SBS 2003 server will need a unique IP and this will mess up my SBS settings. I am sure there is a routing method around this, but I'm not sure how.
All the cabling we use is marked "CAT 5e", "Verfied for Gigabit". How much better is CAT 6 and is gigabit noticably faster than 100Mbps?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867841.63/warc/CC-MAIN-20180526170654-20180526190654-00388.warc.gz
|
CC-MAIN-2018-22
| 1,504 | 8 |
http://www.nvnews.net/vbulletin/showpost.php?p=149886&postcount=5
|
code
|
well , i doubt if we ever will see multiple stream at once.
cause Nvidia itself didn't even think make driver to support multiple stream. i'm so dissappointed w/ them!
Nforce 1 & 2 support in linux are really bad!
as for nvaudio it's just a tweaked version of i810_audio module.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207929272.95/warc/CC-MAIN-20150521113209-00097-ip-10-180-206-219.ec2.internal.warc.gz
|
CC-MAIN-2015-22
| 278 | 4 |
https://mono.github.io/mail-archives/mono-list/2004-January/017824.html
|
code
|
[Mono-list] apache dies out
Gonzalo Paniagua Javier
Wed, 21 Jan 2004 13:56:03 +0100
El mié, 21-01-2004 a las 09:05, babar haq escribió:
> I have successfully configured apche to server .net pages. the problem
> is it just stops serving request after a min or two. i have to restart
> xsp and apache to get it working again.
> Can anyone guide me to wat is the problem.
We need more input on the problem. Can you open a bug report in
bugzilla.ximian.com with a more detailed explanation on your
configuration, the version of mono you're using and any other relevant
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.66/warc/CC-MAIN-20230203091020-20230203121020-00173.warc.gz
|
CC-MAIN-2023-06
| 566 | 11 |
https://www.seo-alien.com/how-to-videos/how-backup-bluehost-website/
|
code
|
Need to backup your Bluehost website or clone your website so you can duplicate it easily? Here is a great video I found from localbuswebschool that shows you how.
Here is a great video for How to Backup Your Bluehost Website
Not long ago I was looking for a simple way to back up and clone a WordPress site for a Real Estate Broker that needed the main site theme duplicated for all his real estate agents.
Instead of having to re-install all the blog theme images, theme settings, plugins and so on and so on, I knew there had to be an easier way.
I stumbled across this video and it was so well done I saw no reason in making one myself and wanted to share this one.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475238.84/warc/CC-MAIN-20240301093751-20240301123751-00359.warc.gz
|
CC-MAIN-2024-10
| 669 | 5 |
https://wiki.eprints.org/w/index.php?title=API:EPrints/DataObj/EPrint&oldid=6625
|
code
|
- 1 NAME
- 2 DESCRIPTION
- 3 SYSTEM METADATA
- 4 METHODS
- 4.1 get_system_field_info
- 4.2 get_dataset_id
- 4.3 get_dataset
- 4.4 get_defaults
- 4.5 clone
- 4.6 log_mail_owner
- 4.7 get_editorial_contact
- 4.8 remove
- 4.9 commit
- 4.10 write_revision
- 4.11 validate
- 4.12 get_warnings
- 4.13 skip_validation
- 4.14 prune_documents
- 4.15 get_all_documents
- 4.16 required_formats
- 4.17 move_to_deletion
- 4.18 move_to_inbox
- 4.19 move_to_buffer
- 4.20 move_to_archive
- 4.21 local_path
- 4.22 url_stem
- 4.23 generate_static
- 4.24 generate_static_all_related
- 4.25 remove_static
- 4.26 render
- 4.27 render_history
- 4.28 get_control_url
- 4.29 get_url
- 4.30 get_user
- 4.31 eprintid_to_path
- 4.32 get_all_related
- 4.33 in_thread
- 4.34 first_in_thread
- 4.35 later_in_thread
- 4.36 all_in_thread
- 4.37 last_in_thread
- 4.38 remove_from_threads
- 4.39 render_version_thread
- 4.40 loop_error
- 4.41 get_type
- 4.42 render_export_links
- 4.43 user_roles
- 4.44 datestamp
- 4.45 in_editorial_scope_of
- 4.46 has_owner
- 4.47 obtain_lock
- 4.48 could_obtain_lock
- 4.49 is_locked
- 4.50 render_edit_lock
- 5 CALLBACKS
EPrints::DataObj::EPrint - Class representing an actual EPrint
This class represents a single eprint record and the metadata associated with it. This is associated with one of more EPrint::Document objects. EPrints::DataObj::EPrint is a subclass of EPrints::DataObj with the followingmetadata fields (plus those defined in ArchiveMetadataFieldsConfig):
The unique numerical ID of this eprint.
The number of the current revision of this record.
The id of the user who deposited this eprint (if any). Scripted importingcould cause this not to be set.
The directory, relative to the documents directory for this repository, whichthis eprints data is stored in. Eg. disk0/00/00/03/34 for record 334.
The date this record first appeared live in the repository.
The date this record was last modified.
The date/time this record was moved between inbox, buffer, archive, etc.
The type of this record, one of the types of the "eprint" dataset.
The ID of the eprint (if any) which this succeeds. This field should havebeen an int and may be changed in a later upgrade.
The ID of the eprint (if any) which this eprint is a commentary on. This field should have been an int and may be changed in a later upgrade.
The ID of the eprint (if any) which has replaced this eprint. This is only seton records in the "deletion" dataset. This field should havebeen an int and may be changed in a later upgrade.
$metadata = EPrints::DataObj::EPrint->get_system_field_info
Return an array describing the system metadata of the EPrint dataset.
$dataset = EPrints::DataObj::EPrint->get_dataset_id
Returns the id of the API:EPrints/DataSet object to which this record belongs.
$dataset = $eprint->get_dataset
Return the dataset to which this object belongs. This will returnone of the virtual datasets: inbox, buffer, archive or deletion.
$defaults = EPrints::DataObj::EPrint->get_defaults( $session, $data )
Return default values for this object based on the starting data.
$eprint = $eprint->clone( $dest_dataset, $copy_documents, $link )
Create a copy of this EPrint with a new ID in the given dataset.Return the new eprint, or undef in the case of an error. If $copy_documents is set and true then the documents (and files)will be copied in addition to the metadata. If $nolink is true then the new eprint is not connected to theold one.
$eprint->log_mail_owner( $mail )
Log that the given mail message was send to the owner of this EPrint. $mail is the same XHTML DOM that was sent as the email.
$user = $eprint->get_editorial_contact
Return the user identified as the editorial contact for this item. By default returns undef. nb. This has nothing to do with the editor defined in the metadata
$success = $eprint->remove
Erase this eprint and any associated records from the database andfilesystem. This should only be called on eprints in "inbox" or "buffer".
$success = $eprint->commit( [$force] );
Commit any changes that might have been made to the database. If the item has not be changed then this function does nothing unless$force is true. Calls L!/set_eprint_automatic_fields! just before the $eprint is committed.
Write out a snapshot of the XML describing the current state of theeprint.
$problems = $eprint->validate( [$for_archive], $workflow_id )
Return a reference to an array of XHTML DOM objects describingvalidation problems with the entire eprint based on $workflow_id. If $workflow_id is undefined defaults to "default". A reference to an empty array indicates no problems. Calls L!/validate_eprint! for the $eprint.
$warnings = $eprint->get_warnings
Return a reference to an array of XHTML DOM objects describingwarnings about this eprint - that is things that are not quite validation errors, but it'd be nice if they were fixed. Calls L!/eprint_warnings! for the $eprint.
$boolean = $eprint->skip_validation
Returns true if this eprint should pass validation without beingproperly validated. This is to allow the use of dodgey data importedfrom legacy systems.
Remove any documents associated with this eprint which don't actuallyhave any files.
@documents = $eprint->get_all_documents
Return an array of all EPrint::Document objects associated with thiseprint.
@formats = $eprint->required_formats
Return a list of the required formats for this eprint. Only one of the required formats is required, not all. An empty list means no format is required.
$success = $eprint->move_to_deletion
Transfer the EPrint into the "deletion" dataset. Should only becalled in eprints in the "archive" dataset.
$success = $eprint->move_to_inbox
Transfer the EPrint into the "inbox" dataset. Should only becalled in eprints in the "buffer" dataset.
$success = $eprint->move_to_buffer
Transfer the EPrint into the "buffer" dataset. Should only becalled in eprints in the "inbox" or "archive" dataset.
$success = $eprint->move_to_archive
Move this eprint into the main "archive" dataset. Normally only calledon eprints in "deletion" or "buffer" datasets.
$path = $eprint->local_path
Return the full path of the EPrint directory on the local filesystem.No trailing slash.
$url = $eprint->url_stem
Return the URL to this EPrint's directory. Note, this INCLUDES thetrailing slash, unlike the local_path method.
Generate the static version of the abstract web page. In a multi-languagerepository this will generate one version per language. If called on inbox or buffer, remove the abstract page.
Generate the static pages for this eprint plus any it's related to,by succession or commentary.
Remove the static web page or pages.
( $description, $title, $links ) = $eprint->render
Render the eprint. The 3 returned values are references to XHTML DOMobjects. $description is the public viewable description of this eprintthat appears as the body of the abstract page. $title is the title ofthe abstract page for this eprint. $links is any elements which shouldgo in the <head> of this page. Calls L!/eprint_render! to actually render the $eprint, if it isn't deleted.
( $html ) = $eprint->render_history
Render the history of this eprint as XHTML DOM.
$url = $eprint->get_control_url
Return the URL of the control page for this eprint.
$url = $eprint->get_url
Return the public URL of this eprints abstract page.
$user = $eprint->get_user
Return the EPrints::User to whom this eprint belongs (if any).
$path = EPrints::DataObj::EPrint::eprintid_to_path( $eprintid )
Return this eprints id converted into directories. Thousands of files in one directory cause problems. For example, the eprint with the id 50344 would have the path 00/05/03/44.
@eprints = $eprint->get_all_related
Return the eprints that are related in some way to this in a successionor commentary thread. The returned list does NOT include this EPrint.
$boolean = $eprint->in_thread( $field )
Return true if this eprint is part of a thread of $field. $fieldshould be an EPrint::MetaField representing either "commentary" or"succeeds".
$eprint = $eprint->first_in_thread( $field )
Return the first (earliest) version or first paper in the threadof commentaries of this paper in the repository.
@eprints = $eprint->later_in_thread( $field )
Return a list of the immediately later items in the thread.
@eprints = $eprint->all_in_thread( $field )
Return all of the EPrints in the given thread.
$eprint = $eprint->last_in_thread( $field )
Return the last item in the specified thread.
Extract the eprint from any threads it's in. i.e., if any otherpaper is a later version of or commentary on this paper, the linkfrom that paper to this will be removed. Abstract pages are updated if needed.
$xhtml = $eprint->render_version_thread( $field )
Render XHTML DOM describing the entire thread as nested unordered lists.
$eprint->loop_error( $field, @looped_ids )
This eprint is part of a threading loop which is not allowed. Log awarning.
$type = $eprint->get_type
Return the type of this eprint.
$xhtml_ul_list = $eprint->render_export_links( [$staff] )
Return a <ul> list containing links to all the formats this eprintis available in. If $staff is true then show all formats available to staff, and linkto the staff export URL.
@roles = $eprint->user_roles( $user )
Return the @roles $user has on $eprint.
$boolean = $eprint->in_editorial_scope_of( $possible_editor )
Returns true if $possible_editor can edit this eprint. This isaccording to the user editperms. This does not mean the user has the editor priv., just that if theydo then they may edit the given item.
$boolean = $eprint->has_owner( $possible_owner )
Returns true if $possible_owner can edit this eprint. This isaccording to the user editperms. This does not mean the user has the editor priv., just that if theydo then they may edit the given item. Uses the callback "does_user_own_eprint" if available.
$boolean = $eprint->obtain_lock( $user )
$boolean = $eprint->could_obtain_lock( $user )
$boolean = $eprint->is_locked()
$xhtml = render_edit_lock( $session, $value )
Callbacks may optionally be defined in the ArchiveConfig.
validate_field( $field, $value, $session, [$for_archive] )
validate_eprint( $eprint, $session, [$for_archive] )
set_eprint_defaults( $data, $session )
set_eprint_automatic_fields( $eprint )
eprint_render( $eprint, $session )
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511424.48/warc/CC-MAIN-20231004220037-20231005010037-00258.warc.gz
|
CC-MAIN-2023-40
| 10,287 | 162 |
https://chrisco.wordpress.com/2008/10/16/
|
code
|
UPDATE: Zillow has replied, see the comments section.
Don’t get me wrong, I am (or at least was) a fan of Zillow, but my personal experience, described below, suggests that there may be problems beneath the surface (otherwise how and why would this have occurred).
I’ve asked the company to comment, but have received nothing, unless you count the two customer service emails I received (screenshots below). I ask them again at the end of this blog.
So, the problem started when…
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057973.90/warc/CC-MAIN-20210926205414-20210926235414-00341.warc.gz
|
CC-MAIN-2021-39
| 485 | 4 |
https://blog.geekster.in/web-development-project-ideas/
|
code
|
In this article, we’ll outline the 10 best projects for web development ideas advanced that are perfect for beginners. So what are you waiting for? Start working on one of these projects today!
But before that let’s understand the real benefits of working on project web development.
How Web Development Projects Help You Excel in Your Career?
Many beginner developers claim that working on project web development ideas advanced their skills in many ways. For example, these projects enable you to:
- Learn new technologies.
- Develop a sense of accomplishment as you complete each project.
- Gain more confidence in yourself as you learn new things every day.
- Enhance your ability to work collaboratively with other team members.
- Improve your problem-solving skills.
- Gain a better understanding of good coding practices and software design.
- Enhance your ability to explain complex topics clearly to others.
- Experience the ins and outs of working as a software developer.
- Build an excellent portfolio of work.
- Start applying for jobs with your completed projects.
- Gain a better understanding of the software development process.
- Increase your chances of landing a job as a developer.
List of Best Web Development Projects Ideas For Final Year Students:-
1. Crypto Currency Tracker Web App :
Watch this complete tutorial to build your own crypto tracker web app
2. Create an Online Store:
Another exciting project idea would be to build an online store equipped with shopping cart capabilities using technologies like NodeJS/ExpressJS, Angular JS, Ruby on Rails, etc. This type of website is known as e-commerce since it enables the selling of products or services online. Note that you have to choose any one technology stack for this project. And you should know what a technology stack is if you don’t already.
3. Create a Mobile Version of your Website:
A typical web page won’t look good on a mobile device, so you might want to consider creating a website or web app specifically for mobile devices. This frontend project idea will help you become familiar with responsive design techniques, which aim to create sites that adapt to different screen sizes and resolutions.
4. Create a Personal Portfolio Website:
As a beginner developer, it’s important to have an online portfolio where you showcase the projects you’ve completed. This portfolio website can include details like your skills, technologies you know, work experience (if any), projects you’ve completed (along with the links to view the live sites), etc.
5. Create a Data Visualization from a Public Dataset:
Yet another interesting idea is to create a data visualization using any one of the many open datasets available on the internet. This concept can be applied to all kinds of different industries and projects, such as real estate development, transportation, healthcare, public safety, etc.
6. Create a Web Portal:
Think of any topic you are passionate about and create a web portal that will serve as a meeting point for people who share similar interests. This could be anything from sports, music, books, hobbies, etc., depending on what excites you!
7. Create a Popular Blog:
Many programmers started their careers by blogging. This is because it’s easier to get noticed as a beginner developer if you have an online presence. And what better way to make your mark on the world than by creating (and maintaining) one or more popular blogs?
These 10 ideas of project web development for beginners will help you get your feet wet and become a professional developer by letting you learn how to code with different technologies, create mobile or responsive websites, and more. You can start with the most basic of these projects, like creating a simple resume template or personal portfolio website. But don’t be afraid to take on bigger challenges! Remember: one small step at a time is all it takes to reach new heights in this field.
Ans: For a project, consider creating a website that aligns with your interests or learning goals. Some ideas include:
i. A cryptocurrency tracker web app to follow cryptocurrency trends.
ii. An online store with shopping cart capabilities.
iii. A mobile version of a website, focusing on responsive design.
iv. A personal portfolio website to showcase your skills and projects.
v. A data visualization site using a public dataset.
vi. A web portal centered around a topic you are passionate about.
Ans: The best website for a project depends on your specific goals and interests. If you aim to learn about e-commerce, an online store would be ideal. For a focus on front-end development and design, creating a mobile-friendly website or a personal portfolio would be beneficial. Choose a project that challenges you and aligns with the skills you wish to develop.
Ans: To create a website for a school project:
i. Define the website’s purpose and audience.
ii. Choose a simple project idea, like a personal portfolio or a topic-based web portal.
iii. Plan the layout and design, considering responsive design for mobile compatibility.
v. Test the website for functionality and user experience.
vi. Host the website on a platform like GitHub Pages or a similar service.
Ans: To create a website for your project:
i. Decide on the type of website you want to build (e-commerce, portfolio, blog, etc.).
ii. Sketch a rough layout and design of the website.
iv. Develop the website, starting with the front-end and then the back-end if required.
v. Test the website extensively to ensure it works well on various devices and browsers.
vi. Deploy the website on a web server or hosting platform.
Read Some Latest Blogs
- Data Science vs Data Analytics: Top Key Differences for Success
- How To Become A Data Scientist In India?: Achieve Your Data Scientist Dreams
- Top 9 Interview Questions and Answers for Freshers Success
- What Is Python and Its Dynamic Uses?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817438.43/warc/CC-MAIN-20240419141145-20240419171145-00756.warc.gz
|
CC-MAIN-2024-18
| 5,911 | 57 |
https://eardstapa.wordpress.com/tag/steve-camp/
|
code
|
As I walked through the wilderness of this world …
Challies started it. Camp and Johnson joined in, and they have been slugging it out on this one for a couple of days. The iMonk has now got involved. I am not sure if I care, but it has some interesting points underneath it.
|David B on Dispensability|
|Dispensability | Ref… on Dispensability|
|Jeremy Walker on Dispensability|
|Jonathan Hunt on Dispensability|
|Self-Examination | V… on John Fletcher’s self-exa…|
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738095178.99/warc/CC-MAIN-20151001222135-00073-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 476 | 7 |
https://gitlab.gnome.org/GNOME/nautilus/issues/416
|
code
|
Nautilus does not focus search bar upon typing if search bar already is visible
From the Ubuntu bug
(Nautilus 3.26.3 on Ubuntu 18.04, but bug has been present as long as the new search box has existed to my knowledge)
If you start typing in nautilus, so long as no text field anywhere is focused, the search box will appear and get focus, so you end up typing into it. However, if the search box is already visible but does not have focus (for example, by tapping ctrl-f and then clicking outside the search box), then typing does not re-focus the search box.
This is jarring since you can be looking at a normal view of a folder (not at search results), and out of habit expect that you can start typing to search. Even if you tap ctrl-f, this makes an empty search box vanish, so you have to tap ctrl-f twice to get it focused (or click on it of course)
- Make an empty search box always vanish upon losing focus
- Make an empty search box, if still visible, gain focus again if the user starts typing.
The first solution is probably cleanest since there is no use case I can think of for leaving an empty search box visible if the user is not about to type into it.
This also applies to the 3.28.0 Nightly Flatpak.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999838.27/warc/CC-MAIN-20190625132645-20190625154645-00293.warc.gz
|
CC-MAIN-2019-26
| 1,217 | 9 |
https://help.keyman.com/products/desktop/7.0/langsetup_psrtwindowslanguage
|
code
|
Configure Windows Language
Keyman Desktop will detect when you need to install a Windows language. It will automatically install the language in Control Panel/Regional and Language Options, and link the relevant Keyman Desktop keyboard layout to that language.
After Keyman Desktop has installed the language, you will see the new language listed in theLanguage Bar. You may choose to switch keyboard layouts using the Language Bar or using the Keyman Desktop menu. Keyman Desktop will automatically manage the link between the Windows language and the Keyman Desktop keyboard layout.
Keyman Desktop Configuration includes a Languages tab where you can see the currently installed Windows keyboard layouts and which Keyman keyboard layouts they are associated with.
Linking your keyboard layouts to a Windows language is important for a number of reasons:
- Right-to-left and complex script languages may not display correctly in some applications unless you install the Windows language first.
- Tagging the text you type with a relevant language code ensures that applications will not corrupt your text or "autocorrect" it
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738982.70/warc/CC-MAIN-20200813103121-20200813133121-00126.warc.gz
|
CC-MAIN-2020-34
| 1,125 | 7 |
http://poppycockles.blogspot.com/2010/01/two-experimental-farm-events-that-are.html
|
code
|
Two Experimental Farm events that are totally going on my calendar:
Rare & Unusual Plant Sale - May 9, 9AM to 1PM, at the KW Neatby building on Carling. Best Mother's Day outing conceivable, really. I will be repeating last year's strategy of showing up 10 minutes early with a wagon.
Native Plant Sale - June 5, 9:30AM to 12:30PM. I'm guessing this is probably hosted at the Fletcher Wildlife Garden, since it's their event. The Fletcher garden sounds worth checking out in and of itself, actually; their website is full of interesting tidbits.
Spriiiiiiiinnnnnnggggg how I pine for you!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947957.81/warc/CC-MAIN-20180425193720-20180425213720-00589.warc.gz
|
CC-MAIN-2018-17
| 588 | 4 |
http://blog.robotekindo.net/2019/05/
|
code
|
Yup i came across, when XCode build Archive the error were ld: 362 duplicate symbols for architecture arm64. The solution is the provided link.
Open Podfile and check the bottom part:
supposed to show something like
post_install do |installer|
installer.pods_project.targets.each do |target|
if target.name == "React"
Quotes answer from Alexandre Lage:
If you see none, that add that one and then execute $ pod install
so the Pods project would be rebuild.
thank you ^^
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964364169.99/warc/CC-MAIN-20211209122503-20211209152503-00636.warc.gz
|
CC-MAIN-2021-49
| 469 | 10 |
https://www.sologig.com/jobs/Senior-Java-Developer/J3P8DN6G3B19YSXGLSK/print
|
code
|
Designs and develop Call Processing, Call Recording and Product Provisioning Software applications. Performs requirements gathering, designing solution, coding, debugging, testing and troubleshooting throughout the application development process.
- Analyze business requirements
- Provide Level of Efforts (LOE) for analysis, design and coding
- Develop technical requirements and interface specifications
- Identify skillset gaps and acquire required skillsets to implement solution
- Write Code to implement Call Processing software
- Perform unit, functional, integration and performance software testing
- Prepares software deployment packages for Pre-Production and Production
- Provides technical supports to client support teams
- Resolve Critical production issues with sense of urgency
- Conduct Proof Of Concept (POC) to implement proposed solution
- Focus on new Development efforts starting from inception to successful deployment of 1st release in production.
- Develop Project Strawman (high level work break down structure) to deliver project on time
- Collaborate with other development teams, Architects, Project Management, Q/A, Production Support to deliver cross-functional projects within existing architecture.
- Conduct Showcases to Business Partners
Knowledge, Skills, and Abilities:
- Demonstrable analytical skills, with the ability to translate business requirements into technical design
- Proficient in software design, development, & unit testing with strong work ethic
- Excellent problem-solving and troubleshooting skills
- Ability to work individually with minimal guidance and desire to take ownership of deliverables
- Ability to juggle multiple responsibilities and respond to ad hoc requests
- Ability to accurately estimate the level of effort required for planned designs.
- Ability to work under different development methodologies – Agile, iterative
- Ability to work with diverse teams
- Ability to digest and understand larger systems and how features fit within the larger system
- Proficient communication skills, both verbal and written.
- Problem solving, debugging, and application and code maintenance skills
- Adapts to a rapidly changing priorities
- Bachelor’s Degree is required in one of the following: Telecom, Engineering, Computer Science, MIS, or related field. May be relaxed with equivalent work experience proven certifications.
- 5+ years’ experience using one or more of the following Java, C++, Angular/Typescript, HTML, CSS, Java, Spring, and/or Restful Web Services experience building the server side of enterprise level system
- 3+ years of experience developing and running under Linux
- 3+ years of experience working with relational data bases (Oracle or MYSQL) or NoSQL databases (MongoDB or Couchbase)
- Experience developing real time event processing and messaging: JMS, MQ, Kafka
- Experience implementing and consuming large scale web services
- Experience in designing and developing Multi-threaded high performance, highly scalable applications
- 3+ years of front end (UI) development experience
- Experience with protocols such as VoIP/SIP, RTP, SDP
- Experience developing CTI, Call Processing Applications such as Call Center, Outbound IVR, Voice Mail, etc…
- Experience with Oracle, GitHub/BitBucket
- Experience Developing applications using Public/Private cloud platforms
Standing, sitting, walking, speaking, listening, bending, reaching, pushing, pulling, lifting, grasping and manipulating tools, typing, using peripheral computer tools. May be required to lift up to 25 pounds.
The Company’s policy is to provide equal employment opportunity to all individuals in all of its employment programs and decisions. Securus Technologies, Inc., and its Subsidiaries will not discriminate against any associate or qualified job applicant with respect to any terms, privileges, or conditions of employment because of that person’s race, color, religion, sex, national origin, age, disability, veteran status, genetic information, sexual orientation, gender identity, or any other characteristic or status protected under local, state or federal law, ordinance or regulation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330913.72/warc/CC-MAIN-20190826000512-20190826022512-00215.warc.gz
|
CC-MAIN-2019-35
| 4,169 | 42 |
https://forum.mx5oc.co.uk/t/national-rally-2014-london-and-south-east/77686
|
code
|
Any plans to drive up from London / South East on the day of the Rally?
Happy to make plans to meet at Beasconsfield Services on M40 @ TBC am
Have a look at the link. A couple of us are meeting up at Pease Pottage Services from the South East for the drive up there. Could meet up en-route
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988850.21/warc/CC-MAIN-20210508061546-20210508091546-00256.warc.gz
|
CC-MAIN-2021-21
| 289 | 3 |
https://supportforums.cisco.com/discussion/9234006/can-acl-destination-be-int
|
code
|
can the destination of an extended ip access list be an interface? this is what i have. the routers e0/0 ip is obtained through DHCP so i don't know what the ip will be but i want the acl desitnation to be the ip on that int. so can i just reference the interface?
I have this problem too.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103270.12/warc/CC-MAIN-20170817111816-20170817131816-00478.warc.gz
|
CC-MAIN-2017-34
| 289 | 2 |
http://tech.holidayextras.co.uk/conference/2015/08/04/qcon-new-york-part-2/
|
code
|
QCon New York 2015 key takeaways - Part 2
This is the second part of my notes and key take aways from Qcon New York 2015, a three day conference with main features (for me) on microservices, containers and culture.
Developing cultural intelligence
tl;dr Good talk on something that is very hard to define, sorry not many notes, was listening intently.
Culture happens in real-time, at the boundaries between people and groups. When shit hits the fan, the culture IS the process that happens between people. Leaders set the culture. You don’t have to have control (i.e. be a CEO) but if you set the culture, people look to you as a leader. Example, if you live the culture not just act it and others see that they will follow or immitate. You can’t force culture on to everybody. Essentially he says, if your values conflict with a person, push them out, they are no good for your team or for you. Sharing informtion and openness about what you are doing is key.
Failure as a service
Kolton Andrus (Chaos Engineer on the Netflix platform)
tl;dr Another Netflix guy, spoke well about the chaos monkey system they’ve built and how they’ve implemented it, sounds quite simple in principle…
Failure testing helps makes systems immune to failure which in turn prevents larger outages and increase uptime/response cycles Insists “production verification” is essential, “we want a system that thrives on change” Hormesis -> imbibing the poison helps us become immune Stressed the importance of testing rollback systems in production, if you don’t test them you can’t guarantee they will work when you need them to.
FIT - Failure Injection Testing
in order to get people to do the right things, you have to make it easy for them to do the right things
They can inject latency at ANY point in their system to simulate slow downs and measure affects.
Why They can see how their architecture performs with an issue at any point.
Who (scope) Scope starts on single request, single customer and increase slowly Can be limited to apps, regions etc to reduce risks
Where (injection points) points that fail already or look like they might fail
Failure itself Each service/module implements a snippet to inject deploy where required.
Demo of failure ui, turned it on, personalised stuff dropped off home page defaulting to a “fixed” list There’s a red “Halt all failure” button in the top right of the screen to stop everything, feels really, really risky.
Zuul proxy, check FIT to see if its a request they want to decorate (some kind of expression matching on the params/query/body/headers, this is before it hits the api. Then when it hits each service the service checks it it needs to delay or fail.
You cant build anti-fragile systems but you can build an anti-fragile culture. Getting people to think about this stuff is the most important thing.
Testing in production is sustainable and helps improve performance long term.
tl;dr I’m afraid this was the only take away of any value. A good one though right?
“Programming is not about typing, it’s about thinking” - Rich Hickey
Immutable infrastructure with Docker and containers
tl;dr A really good advert for using containers, something we need to start thinking about for everything in our business.
- never change what’s on a server. Blue/green deploys. This help avoid “drift” through manual operations and long running infrastructure
- always change all servers, not a subset of them
- automation can fail, be prepared to put the old servers back exactly as they were
- Small changes are a lot of effort (one line css, need more automation)
- Debugging becomes harder as logs are shipped out, tools need to be reinstalled, cant fiddle with server setup
- Storing data (not sure why he didnt suggest cloud but use containers for all the things, they are cheap and flexible, can be fired up from scratch)
- Automate all the things. Operations that have to happen can but they don’t take any use time
- Have “golden images” for intemediary build stages where process takes a long time to execute
- Tag logs with the physical server or build so once you’ve binned a dodgy instance you can revisit the problem
- Containers. Enforces immutabilty, can download later and rerun easily and it’s cheap
Architectural history of Google Docs
Micah Lemonik (Principal Software Engineer at Google)
tl;d Second best talk of the conference, explained really well how Google have solved an industry wide issue in a way that any company could implement.
Used to have a project called XL2web which converted Microsoft Excel spreadsheets and models into interactive Web applications, Google basically asked them if they could do it in a browser so they built prototype in IE6 SP1 with an Excel emulator where the logic was all done on the server side. Google then acquired the company. They then added some persistence in the form or a database behind the state server.
2007/08 was when Google started thinking about collaboration, they wanted to connect a second client to the same state. Technically, every mutation to the doc was stored in a log with snapshots generated at regular intervals so you could play back and forward mutations at will and quickly, this is when they put in the autosave functionality and “revisions” came “for free”.
However, when they got to character level collboration (people editing the same word at the same time) they had to stop and think about what would be practical.
Talked for a while about how they “solved” realtime collaboration.
- Mutations are applied at a revision number which dictates order, the order of mutations is critical to consistency across all clients
- Only one server can determine the order of messages
- All peers must apply transformations from their point of view
How would an “undo” function work? If a user changes 6 to 7 and then another user changes it to 8, then the first user hits undo, how “should” it work?
7 = single undo stack for all collaborators 8 = log omission - “like a change never happened” 6 = revert to the state of the clients original mutations (winner)
Scaling… Google Docs does not run on 1 server but all mutations MUST go to the same server. Therefore there is a physical limit to the number of connections and therefore collaborators to any Google Doc (the limit is 15) and the same for Hangouts.
Atlassian Hybrid Cloud/On-Premesis Software Delivery
George Barnett - SAAS Platform Architect
tl;dr Not sure why this exists, I just wanted to put my hand up and ask if Atlassian had heard of the cloud but he seemed pretty stoked with the solution they’d arrived at. We’re good with what we’re doing at HX.
7 years ago Atlassian weren’t SAAS. All products were downloaded. Upgrades were slow in coming and had slow extended release cycles. A monolith however is easy to deploy but customers get used to “their verision” (like IE6) and refuse to update for whatever reason.
So they build a cloud native, continuous deploy product with feature delivery behind a flag. Bugs fixed when ready, very short release cycles. Native users could then download from cloud but this caused problems as it would take ages to ship as a 3rd party was doing the hosting.
- time pressure on product teams as they’re still tied into release cycles and have internal coupling/dependencies
- 3rd party hosting with high vm costs and poor visibility
- extended release cycle so customers are always behind
- individual configs add complexity for support teams
- hide the scale from developers and reuse existing architecture
- create an easy to deploy hardware platform (containers)
- decouple dev from infrastructure
- enable repeatable configuration
Templates for services
hardware - pre built when it comes in to the datacentre, they boot it up, smoke test and read to go (4hrs to get a server, apparently this is good :/) datacenters - “pre-baked” state is outside the machines, when it boots up it assumes a local configuration with time zone based management services containers
- Everything that isn’t on the platform goes into a container, use openVZ, very stable, lightweight, simulate a full VM
- Each service is in its own container
- Then there’s shared services nginx, squid, postfix, auth all in their own containers
Use DNS in the same way we use t-bob to route traffic and give flexibility to what we server the client.
tl;dr best culture talk of the week, covered a lot of his use cases/problems and how you should look at them. Essentially people need to think about themselves and stop worrying about others.
Reference to a book “It’s your ship” by Abrashoff he stressed “make ownership bottom up”. The people at the top caring is not enough. “It’s all about people” you model the culture and hope to see it playing back to you. His key point was “culture is event-driven and organic, not mandated”
So where is culture defined?
- Real time, between people and groups
- Unexpected challenges
- Discovering what the rules/boundaries are
- Rituals that reinforce values
- Moments happen where people “step in”, if there’s an issue or a conversation and people take the lead in getting involved or directing
Leaders set the culture. People with titles. You dont have to be “titled” but be seen to lead when it’s needed. Culture can’t be forced and if people are a detriment to that, you have to move them out or they will affect the culture. “encouraged dissent” - devils advocate, ask people to challenge you “giving credit” culture - Etsy system of web team “oscars” 5 per person Planning is it wish-based or reality-based in your business? Don’t avoid risk but actively engage and understand it to mitigate it.
Making culture choices
Would you choose positive culture over other rewards? how do people handle criticism? Read => Drucker “Managing oneself” -> you have to know yourself, figure out the right culture for you and put yourself in the right places
Learning to influence culture
- Speak up when group culture conflicts with your own
- Take it and make it your own, thats when people will follow you
- When hiring, prioiritise cultural fit over hard skills
- Be clear. Ambiguity sets a cultural value
- Embody the values you want to establish
Ground up introduction to in-memory data
tl;dr I got nothing.
Talked about in-memory data in Java, no idea other than that.Tags conference, qcon, new, york, 2015
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211933.43/warc/CC-MAIN-20180817065045-20180817085045-00387.warc.gz
|
CC-MAIN-2018-34
| 10,478 | 86 |
https://afteryourphd.com/blog/
|
code
|
Welcome to the After Your PhD Blog!
The After Your PhD Blog is a free resource with interviews from PhDs with industry jobs and career advice from an SEO Analyst with a PhD. The text-based interviews are brief interviews that provide insight into the journeys of academics who made the decision to leave academia and pursue careers. Some of the careers already featured on the After Your PhD include:
If you want to read about how the site is made and how it will continue to grow, check out Inside After Your PhD.
Help Keep After Your PhD Ad-Free.
Be Interviewed on the After Your PhD Blog
Share your experience and your story. My perspective is not enough. As more people leave academia, chances are you’ll want a faster way to share your story with folks.
How An Interviews Works on After Your PhD
I’ll briefly interview you (whatever medium works for you, video, audio, or just text) and let you tell your story and help others in the process by sharing your story on the blog. I’ll edit the interview for brevity and clarity and try to reach as many people as possible.
Email [email protected] with inquiries.
After Your PhD
What's Next After Your PhD?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948858.7/warc/CC-MAIN-20230328104523-20230328134523-00382.warc.gz
|
CC-MAIN-2023-14
| 1,163 | 11 |
https://www.coderanch.com/t/238869/certification/Marcus-Green
|
code
|
Question 33) Which of the following statements are true? 1) Java uses a system called UTF for I/O to support international character sets 2) The RandomAccessFile is the most suitable class for supporting international character sets 3) An instance of FileInputStream may not be chained to an instance of FileOutputStream 4) File I/O activities requires use of Exception handling Answer = 1,3,4 Answer 1 should be UTF-8 right? I don't know if there are different UTFs, but I didn't check it since it didn't say UTF-8.
Not necessarily. For internationalization you can use charsetsfor converting between Java characters or strings and the especified charset. The following charsets must be supported:
US-ASCII Seven-bit ASCII, a.k.a. ISO646-US, a.k.a. the Basic Latin block of the Unicode character set ISO-8859-1 ISO Latin Alphabet No. 1, a.k.a. ISO-LATIN-1 UTF-8 Eight-bit UCS Transformation Format UTF-16BE Sixteen-bit UCS Transformation Format, big-endian byte order UTF-16LE Sixteen-bit UCS Transformation Format, little-endian byte order UTF-16 Sixteen-bit UCS Transformation Format, byte order identified by an optional byte-order mark
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00066.warc.gz
|
CC-MAIN-2024-10
| 1,140 | 3 |
https://academia.stackexchange.com/questions/72292/masters-in-math-bland-phd-in-cs-want-to-go-back-to-math
|
code
|
All of the following is in Italy.
I have a master's degree in mathematics and at the moment I'm in the final months of funding in a PhD in Computer Science (not sure if I'll be able to finish my thesis in these months).
I'm in this PhD due to a series of unfortunate circumstances and mistakes on my part, fact is that I am totally unhappy with where I am and I'd like to plan on the best way to go back to doing mathematics.
The reasons that I'm unhappy with my PhD are:
lack of interest in the subject (basically a very out-of-trend subfield of Natural Language Processing, more like a one-man project that my advisor started a few years ago and keep pushing it but never took off, which I instead thinks is a dead-end and the community seems to go in other directions);
the fact that my PhD is totally unstructured, by this I mean that there was never a clear plan of action, no courses to take, no real training at all, and no real topic for the thesis, just relatively uncorrelated publications that now I find difficult to unite in a thesis; for the same reason there was no possibility of changing advisor mid-term, nor there was any help like a career center or similar structures (I actually discovered the existence of such things on this site). also there is no formal recording of my experiences (for example as a teaching assistant) so there is not much I can show for this three years;
last, I plain and simple find out that I like mathematics way more and I miss it a lot.
So I would like to ask opinion about what is my best course of action given that:
I have a rather uninteresting CV: master's grades are not bad but most are in courses not pertinent to what I'd like to do; moreover my master thesis was not strictly mathematics, but was done with the professor that later became my PhD advisor, and I fear that not having done any mathematical research is a serious problem;
As mentioned before there is not much I can show for the three years of my PhD: no transcript of courses, no formal review of my work, just a few publications and the word of my advisor, with whom I don't even have a great relationship;
I never spent time to create a network, I don't know any other professors to which I could ask for letters of recommendation;
by the time I'll have finished my PhD I'll be 30.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00166.warc.gz
|
CC-MAIN-2023-40
| 2,308 | 12 |
https://webflow.com/live-stream/best-practices-for-building-ecommerce-websites
|
code
|
Design, build, launch, and manage client sites all in Webflow.
Run your marketing sites without bothering developers.
The design you want, plus intuitive content editing controls.
Speak the same language as your developers — without writing code.
Before you build your next ecommerce site, there’s a few best practice you’ll want to know and follow. We’ll chat with Josh, web dev at FoxyCart, to get his tips on building high-converting online stores. And if you’re lucky, he might have some feedback on your latest work.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400221382.33/warc/CC-MAIN-20200924230319-20200925020319-00052.warc.gz
|
CC-MAIN-2020-40
| 531 | 5 |
https://events.saip.org.za/event/34/contributions/3710/
|
code
|
Abstract content <br> (Max 300 words)<br><a href="http://events.saip.org.za/getFile.py/access?resId=0&materialId=0&confId=34" target="_blank">Formatting &<br>Special chars</a>
The ATLAS detector is a general purpose detector at the LHC, which consists of several sub-detectors, such as the inner detector, the electromagnetic calorimeter, the hadronic calorimeter and the muon spectrometer. The tile-calorimeter is one of the most important part of the hadronic calorimeter in ATLAS. The signals in the tile calorimeter are collected by the front-end electronics and sent to the readout driver. In 2022, the elect ronics will be upgraded to fit the new technologies and have better performance. Prometeo is a portable test-bench for the full certification of the front-end electronics of the ATLAS Tile Calorimeter upgrade phase-II during that time. It is a high throughput electronics system designed to simultaneously read-out all the samples from 12 channels at the LHC bunch crossing frequency. The core of the system is a Xilinx VC707 evaluation board extended with a dual QSFP FMC module to read-out and control the front-end boards. The rest of the functionalities of the system are provided by a HV mezzanine board that to turn on the gain of the photo-multipliers, an LED board that sends light to illuminate the them, and a 12 channel ADC board that samples the analog output of the front-end. The system is connected by ethernet to a GUI client from which QA tests are performed on the electronics such as noise measurements and linearity response to an injected charge.
Would you like to <br> submit a short paper <br> for the Conference <br> Proceedings (Yes / No)?
Level for award<br> (Hons, MSc, <br> PhD)?
Main supervisor (name and email)<br>and his / her institution
Apply to be<br> considered for a student <br> award (Yes / No)?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494936.89/warc/CC-MAIN-20230127033656-20230127063656-00753.warc.gz
|
CC-MAIN-2023-06
| 1,847 | 6 |
http://stackoverflow.com/questions/4946901/grabbing-image-of-uiscrollview-content-anti-aliasing-problem
|
code
|
I need to grab the scaled image of content currently visible in UIScrollView. I'm able to get the image but there is discrepancy between anti-aliasing algorithm used by scroll view and the grabbing process. Please look at the image to get my point:
(left: as seen in UIScrollView, right: as grabbed with renderInContext)
I already tried to set interpolation quality, edge antialiasing mask and allow/force anti-alias in context using CGContextSetAllowsAntialiasing and CGContextSetShouldAntialias without success. The image is saved to file as an PNG with UIImagePNGRepresentation.
Any ideas how to grab the exact copy of what is visible in scroll view?
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098059.60/warc/CC-MAIN-20150627031818-00230-ip-10-179-60-89.ec2.internal.warc.gz
|
CC-MAIN-2015-27
| 653 | 4 |
https://kmorrispoet.com/2017/09/25/mammon/
|
code
|
In unrequited love.
A kiss uninvited
(With no desire by a girl to return)
May go unspurned
Where advantage To her is concerned.
For a facsimile is easily made
And homage to Mammon paid.
Note: I am aware that the word “unspurned” does not appear in the dictionary. I have, none the less chosen to use it, and by so doing (possibly) coined a new word.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204461.23/warc/CC-MAIN-20190325214331-20190326000331-00258.warc.gz
|
CC-MAIN-2019-13
| 353 | 8 |
https://www.mql5.com/en/code/10635
|
code
|
Rewrites JForex csv data without the weekend candles and the seconds.
If you export OHLC data from JForex platform, you will see it is not ready to import into MetaTrader 4 - the first row is the name of the columns, and the data contains weekend candles (open=high=low=close, and volume=0). This script makes the data ready to import into the History Center of MetaTrader 4.
This EA is supposed to trade news and high market spikes.MMPRO - Dottor Market
Trade with right risk !
The ideas from the article 3 Methods of Indicators Acceleration by the Example of the Linear Regression" is implemented in this indicator.HTTP using WinINet directly in mql4
This is a "conceptual" script that uses the WinINet functions to load a HTTP page directly from mql4, without a C++ dll
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144150.61/warc/CC-MAIN-20200219122958-20200219152958-00117.warc.gz
|
CC-MAIN-2020-10
| 772 | 6 |
https://ell.stackexchange.com/questions/31008/know-of-x-versus-know-about-x/31102
|
code
|
Would you explain the difference between the following?
I know of somebody/something.
I know about somebody/something.
English Language Learners Stack Exchange is a question and answer site for speakers of other languages learning English. It only takes a minute to sign up.Sign up to join this community
Yep. This is the best example:
I know of atomic physics (I have heard the name, but that is about all I know.)
When you say know of someone/something, it means to know that someone or something exists but don't know very well.
I know about atomic physics (I have learned this subject and can do the calculations.)
When you say know about someone/something, it means to know that someone or something exists and you know very well that thing/person.
My interpretation of a few variations:
I know of The Spanish Inquisition.
I know of Richard.
I've heard of it/him. I am aware that it/he exists. But really the only thing I know about it/him is its/his name. When speaking aloud, typically the "of" gets emphasized.
I know about Astronomy.
I would not typically say this, as I think it doesn't carry any meaning. If I did say it, the next question would just be "How much do you know about it?" Better to come right out and say "I know a lot about Astronomy" or "I know a little about Astronomy" or some variation.
I know about Susan.
Implies that there is some specific knowledge about Susan that is known to you. If you have a daughter named Susan, and were hiding that fact, someone could say to you "I know about Susan".
I know Frank.
This means at least: I would recognize him if I saw him; I've interacted with him before; he is an acquaintance. But it does not exclude the possibility that you are relatives or good friends or lovers or anything else.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00529.warc.gz
|
CC-MAIN-2022-33
| 1,761 | 19 |
https://railsforum.com/topic/75-getting-started-with-ruby-stack/
|
code
|
I'm Beltran from BitNami project. I would like to share a quick guide about how to start with BitNami Ruby stack.
BiNami Ruby stack simplifies the development and deployment of Ruby on Rails and its runtime dependencies on Windows, Linux and OS X. It includes ready-to-run versions of Ruby, Rails, MySQL, Git, RVM, Apache, Nginx and other components. In addition to the base Ruby runtime and libraries, the stack includes most popular gems for building Rails applications: Passenger, Nokogiri, Rake, RMagick, Mongrel, Thin and more.
Each installer includes all of the software necessary to run out of the box (the stack). The process is simple; just download, click next-next-next and you are done! BitNami stacks are completely self contained and will not interfere with other software on your system.
There are available 3 versions currently:
- 1.8.7 with latest Ruby 1.8.7 version and Rails 2.3.x
- 1.9.3 with latest Ruby 1.9.3 version and Rails 3.2.x
- 2.0.0 with latest Ruby 2.0.0 version and Rails 4.0.x
Once you have installed Ruby Stack on your computer, it is very easy to create your first project. Open the "Ruby console" and type the following:
$ rails newapp $ cd newapp $ rails server => Booting WEBrick => Rails 3.2.14 application starting in development on http://0.0.0.0:3000 => Call with -d to detach => Ctrl-C to shutdown server [2013-08-15 10:45:07] INFO WEBrick 1.3.1 [2013-08-15 10:45:07] INFO ruby 1.9.3 (2013-06-27) [x86_64-linux] [2013-08-15 10:45:07] INFO WEBrick::HTTPServer#start: pid=18272 port=3000
And you can access to the Rails sample application at http://localhost:3000.
Deploying your Rails application
BitNami Ruby stack ships most popular dependencies and servers to deploy any Rails application. Apache and Nginx servers include Passenger (a.k.a mod_rails) module to deploy your application easily. You can find some examples at this guide. It also ships Thin server that you can also configure to deploy your app or you can install easily any other like Unicorn.
I hope it helps.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189471.55/warc/CC-MAIN-20170322212949-00479-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 2,019 | 13 |
http://www.linuxquestions.org/questions/linux-software-2/my-linux-won%27t-recognize-commands-46213/
|
code
|
I believe updatedb is intended for updating the locate database, allowing the 'locate' command to find files quickly. Aside from that I don't think it has any purpose.
So, you'd run 'updatedb' after installing a bunch of stuff, so the next time you run 'locate' it will be able to find those files.
In order to use the commands anywhere, you would need to add those paths to your profile. To find out what your current path is, type:
To add other stuff to it, it's something like:
(varies depending on what shell you use). Look for some shell HOWTOs, I am sure they will get you going
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188924.7/warc/CC-MAIN-20170322212948-00416-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 584 | 5 |
https://www.nbcc-academy.com/shop/product/configuring-bgp-on-cisco-routers-388?order=name+asc&category=7
|
code
|
This course focuses on the theory of BGP, the configuration and troubleshooting of BGP on Cisco IOS routers. Extensive use of hands-on labs has been incorporated into this curriculum to ensure learners have the skills required to configure and troubleshoot BGP networks in customer environments.
Service Provider and Enterprise network engineers that design, deploy and maintain core IP network infrastructures running BGP.
After completing this course, students will be able to:
Describe how to configure, monitor and troubleshoot basic BGP to enable interdomain routing in a network scenario with multiple domains.
Describe how to use BGP policy controls to influence the route selection process in a network scenario where you must support connections to multiple ISPs.
Describe how to use BGP attributes to influence the route selection process in a network scenario where you must support multiple connections.
Describe how to successfully connect the customer network to the Internet in a network scenario in which multiple connections must be implemented.
Describe how to configure the service provider network to behave as a transit AS in a typical implementation with multiple BGP connections to other autonomous systems.
Enable route reflection and confederations as possible solutions to BGP scaling issues in a typical service provider network with multiple BGP connections to other autonomous systems.
Describe the available BGP tools and features to optimize the scalability of the BGP routing protocol in a typical BGP network.
Attendees should meet the following prerequisites:
Intermediate to advanced Knowledge of Cisco IOS Software configuration – CCNA recommended.
Prior attendance of the ROUTE course is strongly recommended.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474360.86/warc/CC-MAIN-20240223021632-20240223051632-00712.warc.gz
|
CC-MAIN-2024-10
| 1,748 | 13 |
https://forum.ionicframework.com/t/web-version-of-app/16885
|
code
|
Currently, I have a web version of an app (based on twitter bootstrap), and also an Android and iPhone app made using Ionic Framework.
Instead of managing two bodies of code, I would just like to offer up the Ionic Framework version, but as a web app. I have successfully done this by just uploading the www directory of the project to the web server and it’s completely fine except for the fact it’s a full screen app.
Do you mean getting rid of the browser navigation / controls?
I believe that’s one of the major points of making it an actual mobile app, as I don’t think theres a way around it. I think the only other way to do this is by utilizing the “Add to Homescreen” feature, here’s a plugin that would encourage users to do this:
Sorry I’ve not made myself that clear. Some people access the web interface from their desktop PC, not their phone. Currently I am coding a separate web interface made for desktop browsers but it seems somewhat redundant because it functions in exactly the same way, especially as I can use the functioning ionic framework HTML/CSS/JS.
The only real issue is the fact that an ionic app (quite rightly) does not look great at 1920x1080 because there’s a lot of a white space. I want to be able to effectively have something like the Ionic Framework demos in the middle of the screen but instead of a demo, it’s my app.
I suppose I could do something with an iframe? I just wondered if such a thing already existed.
So ionic isn’t really aiming to be a full web framework.
We’re really just targeting mobile cordova apps.
This becomes noticeable as the UI doesn’t reflect what a responsive website should be.
For apps I’ve done in the past, I’ve had once directory for ionic and another for the web, sharing bits of data between each.
So I would advise you to stick with the bootstrap/angular setup for the web.
Think of it like this though. You woulndn’t expect an native iOS or Android app to function as website as well, right?
Even though apps and websites can be built with html/css/js, they are two different worlds.
Just to reiterate, I know this isn’t expected behaviour for Ionic, it’s just I spend most of my time testing Ionic apps using ionic serve with the chrome “emulator” and it really functions very well still.
I’m aware apps/websites are two different worlds but if it works well for both in the instance I am using it, that’s good right? It’ll certainly save me time trying to maintain two bodies of code. You’ve said you’re not aiming for a full web framework, which is absolutely fine, but the fact is, you’ve done such a good job, it functions and looks great on desktop too, so yeah, basically it’s your fault
If at a later date the Ionic Framework changes in such a way where a desktop version just doesn’t work any more, that’s my problem and I am happy to take it on the chin should it happen.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949093.14/warc/CC-MAIN-20230330004340-20230330034340-00536.warc.gz
|
CC-MAIN-2023-14
| 2,917 | 17 |
http://superuser.com/questions/349045/why-does-booting-windows-7-take-longer-after-adding-a-user-account/349047
|
code
|
I am using my laptop for school, aswell as for work. In order to access certain network drives at work, i need to be part of a domain. Therefore, when im at work i login to the domain there. Ever since i've added this domain, booting into my normal user account takes considerably longer. Why is this? I used to be very content with the booting speed improvements switching to a ssd resulted in, but now this gain is completely nullified.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397749.89/warc/CC-MAIN-20160624154957-00057-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 438 | 1 |
http://www.techrepublic.com/downloads/how-do-i-serialize-a-hash-table-in-c-when-the-application-requires-it/319570?scname=net
|
code
|
How do I... Serialize a hash table in C# when the application requires it?
Source: Zach Smith
The .NET Framework is unable to serialize any object that implements the IDictionary interface. This restriction includes, but is not limited to, hash tables. At some point in your application development career, you will be called upon to serialize hash tables. Zach Smith shows you his preferred method for converting a standard hash table so that it can be serialized.
This download is also available as an entry in the TechRepublic How do I... blog.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368710006682/warc/CC-MAIN-20130516131326-00098-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 547 | 4 |
https://darcynorman.net/2002/11/05/dynamic-customizable-components/
|
code
|
So, I've been working on a way for the repository application to have customized "look and feel" - theming or branding - for various users. Turns out that the best way to do this totally destroys the Model/View/Controller design pattern. I'm basically mashing Model and View together, and using a single Controller for the combo.
Works great, though. I take the .html and .wod files and merge them together into a single .html string, which is associated with a component. This merged .html is then stored in a database, and called up when an appropriate request is made (theme matches, and component name matches). This .html string is then deconstructed into freshly minted .html and .wod files and fed into the standard WebObjects component handling mechanism, and a response is fed back to the user.
All are the exact same WO app (same instance, even), but the ?theme= parameter determines which merged .html combo string should be pulled from the database to generate the response.
VERY flexible. Too bad it breaks the WebObjects tools (WOBuilder doesn't understand...)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00460.warc.gz
|
CC-MAIN-2023-40
| 1,074 | 4 |
https://blog.sciety.org/weeknotes/sciety-product-news-15-01-2024/
|
code
|
The latest in preprint innovations from sciety.org, the home of public preprint evaluation.
🚀 What's new?
- We are now able to surface more expressions of the paper including links to Reviewed Preprints on eLife's EPP platform. Here is an example of an article published to Research Square that has then gone on to receive reviews and been curated by eLife and here is an example of a BioRxiv article that has seen multiple group peer review and multiple version publication
- As we've added more of the paper's review history to the feed, we've found that version numbers do not scale or map well across all the places people publish preprints. For example different 'preprint servers' (to include for example BioRxiv and eLife's Reviewed Preprint platform) start publishing at new version numbers, so when we developed the new functionality we had an article page that read 'Version 1 published to BioRxiv... Version 2 published to BioRxiv... Version 1 published to eLife etc' which is confusing for the reader. Our architecture was also fetching the Version number from the URL, which isn't scalable because not everyone adds version numbers to the URL, so you'd get stuff like 'Version 9' because the DOI ended in a 9.
Another issue is that there is no machine readable standard on Crossref to get the version number eg. no property called "version" or a standard for publishers to input this data. So we're trying to be agnostic on Sciety, but also make it understandable to readers.
As such, we've decided to remove version numbers from a paper's activity feed. The paper activity feed concentrates on telling people that something has changed, where to find out more about that change and where possible what that change is; eg. a new review or curation statement.
🔭 What's next?
- We'll continue to deliver the value of showcasing even more of the preprint journey.
- We'll be exploring how groups can have more autonomy over their list curation
- We'll be updating our blog to show how Sciety can be useful to a variety of audiences.
💡 Let us know what you think
We're curious to learn what researchers think about the paper activity feed. Please fill out our one question survey to share your thoughts.
🔗 Stay connected
We’ll be back next week with everything that's happening on Sciety.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474661.10/warc/CC-MAIN-20240226162136-20240226192136-00398.warc.gz
|
CC-MAIN-2024-10
| 2,311 | 14 |
https://leanpub.com/jvm-scala-book
|
code
|
Things you need to know about JVM (that matter in Scala)
Things you need to know about JVM (that matter in Scala)
About the Book
Scala is not Java and Java is not Scala. This may sound obvious, as both languages have different goals and features. They might generate different byte code and even when they do something apparently the same, they might still generate byte code differently. What matters is that at the end of the day you need to understand JVM very well in order to get to the bottom of what is happening, or why something was implemented the way it was. Even in Scala.
This book isn't aiming to be an exhaustive list of what you should know about JVM - that topic is so extensive that you could write a whole book (or books) on that. To meet that requirement you're better of to grab a book on preparing for Java Programmer Certified Professional exam.
The goal of my book is to give you enough knowledge to understand why certain decisions were made by Scala creators and library writers. Why we can do certain things and cannot do other. How it affects functional programming. Give you some general ideas about how things work, so that if you wanted to learn more, you would at least know what to google for.
The book is available as an early access including all the intended content. The author is continuing its editing as he believes that improvements should be driven by the feedback. If you found something that you believe could be done better, feel free to contact the author to help him make the book better for everyone.
The "main" version is PDF while EPUB is experimental, so please consider it a bonus.
- What is JVM
- Primitives and references
- More about memory
- Boxing and unboxing
- JVM types vs Scala type hierarchy
- Classpath and ClassLoaders
- Classpath exception
- What a normal class is made of
- Access control
- What are objects (modules)
- Parametric classes
- Type parameters and type erasure
- Issues with type erasure
- Functions vs methods
- case classes and case objects
- sealed hierarchies
- Parallel vs concurrent
- M:N threads
- JVM’s Threads
- Interruption and canceling
- synchronized and @volatile
- sleep, wait and notify
- Can we avoid concurrency pitfalls?
- Garbage collectors
- GC root
- How JVM cleans up memory
- Mark and sweep
- Memory fragmentation
- Generations, Serial GC and parallel GC
- Concurrent Mark-Sweep
- Garbage First (G1)
- Zero Garbage Collection (ZGC)
- No GC at all?
- GCs beyond HotSpot
- Value specially treated by memory management
- Memory leaks
- How does memory matter for Scala?
- What Class[_] knows?
- How to obtain Class[_]?
- Best thing since sliced bread?
- Reflection in Scala
- Why it matters that you understand reflection?
- C1 and C2
- Architecture Description (.ad files)
- Observing JIT at work
- Printing assembly
- Printing compilation and inlining
- Example benchmark
- Flight Recorder and Java Mission Control
- async -profiler and flame graph
- Some of the optimizations done by HotSpot
- Loop unrooling
- Dead code elimination
- Escape analysis
- Mono-, Bi- and Megamorphism and devirtualization
- On Stack Replacement (OSR)
- Reflection and optimizations
- More about JVM optimizations
- Optimizations beyond JVM
- Memory alignment
- Branch prediction
- Why it matters to have some idea about JIT?
- Tooling and ecosystem
- Official tools
- javap and scalap
- jstat and jstatd
- Other official tools
- Third-party tools
- Dependency management and building
- Printing all JVM flags
- Appendix: JVM flags
- GC and memory flags
- Generation-based memory layout and flags
- GC selection
- Memory debugging flags
- JIT flags
- Compilation mode selection
- Compilation options
- Compilation debugging
The Leanpub 45-day 100% Happiness Guarantee
Within 45 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
See full terms
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers), EPUB (for phones and tablets) and MOBI (for Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
C++ Best PracticesJason Turner
Level up your C++, get the tools working for you, eliminate common problems, and move on to more exciting things!
Functional Design and ArchitectureAlexander Granin
Software Design in Functional Programming, Design Patterns and Practices, Methodologies and Application Architectures. How to build real software in Haskell with less efforts and low risks. The first complete source of knowledge.
OpenIntro StatisticsDavid Diez, Christopher Barr, Mine Cetinkaya-Rundel, and OpenIntro
A complete foundation for Statistics, also serving as a foundation for Data Science.
Leanpub revenue supports OpenIntro (US-based nonprofit) so we can provide free desk copies to teachers interested in using OpenIntro Statistics in the classroom and expand the project to support free textbooks in other subjects.
More resources: openintro.org.
R Programming for Data ScienceRoger D. Peng
This book brings the fundamentals of R programming to you, using the same material developed as part of the industry-leading Johns Hopkins Data Science Specialization. The skills taught in this book will lay the foundation for you to begin your journey learning data science. Printed copies of this book are available through Lulu.
C++20 is the next big C++ standard after C++11. As C++11 did it, C++20 changes the way we program modern C++. This change is, in particular, due to the big four of C++20: ranges, coroutines, concepts, and modules.
I am a Software Engineer and I am in ChargeAlexis Monville and Michael Doyle
I am a Software Engineer and I am in Charge is a real-world, practical book that helps you increase your impact and satisfaction at work no matter who you work with.
In the book, we will follow Sandrine, a fictional character who learns to think in a new way enabling her to take a different course of action.
Invest In Digital Health - The Medical Futurist's GuideDr. Bertalan Mesko
Artificial Intelligence and Digital Health are booming. In this book, we explain why now it's a good time to invest in Digital Health and give recommendations on where to invest by looking at the top 24 technological trends we find the most promising.
Atomic KotlinBruce Eckel and Svetlana Isakova
For both beginning and experienced programmers! From the author of the multi-award-winning Thinking in C++ and Thinking in Java together with a member of the Kotlin language team comes a book that breaks the concepts into small, easy-to-digest "atoms," along with exercises supported by hints and solutions directly inside IntelliJ IDEA!
The Hundred-Page Machine Learning BookAndriy Burkov
Everything you really need to know in Machine Learning in a hundred pages.
Mastering STM32Carmine Noviello
With more than 600 microcontrollers, STM32 is probably the most complete ARM Cortex-M platform on the market. This book aims to be the first guide around that introduces the reader to this exciting MCU portfolio from ST Microelectronics and its official CubeHAL.
Software Architecture for Developers: Volumes 1 & 2 - Technical leadership and communication
2 Books"Software Architecture for Developers" is a practical and pragmatic guide to modern, lightweight software architecture, specifically aimed at developers. You'll learn:The essence of software architecture.Why the software architecture role should include coding, coaching and collaboration.The things that you really need to think about before...
The Future of Digital Health
6 BooksWe put together the most popular books from The Medical Futurist to provide a clear picture about the major trends shaping the future of medicine and healthcare. Digital health technologies, artificial intelligence, the future of 20 medical specialties, big pharma, data privacy and how technology giants such as Amazon or Google want to conquer...
Cisco CCNA 200-301 Complet
4 BooksCe lot comprend les quatre volumes du guide préparation à l'examen de certification Cisco CCNA 200-301.
CCDE Practical Studies (All labs)
3 BooksCCDE lab
"The C++ Standard Library" and "Concurrency with Modern C++"
2 BooksGet my books "The C++ Standard Library" and "Concurrency with Modern C++" in a bundle. The first book gives you the details you should know about the C++ standard library; the second one dives deeper into concurrency with modern C++. In sum, you get more than 600 pages full of modern C++ and about 250 source files presenting the standard library...
Modern Management Made Easy
3 BooksRead all three Modern Management Made Easy books. Learn to manage yourself, lead and serve others, and lead the organization.
Programming with Ease
3 BooksAlle drei Bände der Serie Programming with Ease in einem Paket. Darin findest du alles, was ich dir zu den wichtigsten Phasen der Softwareentwicklung im Hinblick auf Clean Code Development für langfristig hohe Produktivität sagen kann.Im Band Slicing findest du die Anforderungsanalyse im Rahmen eines iterativ-inkrementellen Vorgehensmodells aus...
2 BooksUnveil the power of Ansible and Vagrant with this bundle at a special price. You'll have everything you need to get started with Vagrant - learn the basics and how to create your virtual development environments, using Ansible as provisioner! About Vagrant Cookbook Vagrant Cookbook is a complete guide to get started with Vagrant and create your...
2 BooksDocker and Kubernetes are taking the world by storm! These books will get you up-to-speed fast! Docker Deep Dive is over 400 pages long, and covers all objectives on the Docker Certified Associate exam.The Kubernetes Book includes everything you need to get up and running with Kubernetes!
Growing Agile: The Complete Coach's Guide
7 BooksGrowing Agile: Coach's Guide Series This bundle provides a collection of training and workshop plans for a variety of agile topics. The series is aimed at agile coaches, trainers and ScrumMasters who often find themselves needing to help teams understand agile concepts. Each book in the series provides the plans, slides, handouts and activity...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703499999.6/warc/CC-MAIN-20210116014637-20210116044637-00081.warc.gz
|
CC-MAIN-2021-04
| 10,487 | 134 |
https://intellij-support.jetbrains.com/hc/zh-cn/community/posts/206831845-Code-coverage-shows-100-complete-altho-all-methods-covered
|
code
|
This is with IDEA 94.539.
I have reproduced this across a set of unit tests. After running the tests, all methods are shown as covered, but
- the coverage % is less than 100% ( between 85-95%)
- if I open the class being tested, all methods are marked with green, but on the class declaration itself (public class XXX), the line is marked with pink
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510214.81/warc/CC-MAIN-20230926143354-20230926173354-00352.warc.gz
|
CC-MAIN-2023-40
| 348 | 4 |
http://www.certhon.fr/nouvelles/watch-movie-tkb-project-russia
|
code
|
- À propos Certhon
Watch movie TKB project Russia
29-12-2015The TKB project is 14,7 ha. big. A greenhouse nursery for cucumbers, lettuce and young plants. This huge project is been realized on a turnkey basis by Certhon.
Watch here the movie of the TKB project, which has been recorded by TKB themselves. For that reason, the movie is Russian spoken.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049277091.27/warc/CC-MAIN-20160524002117-00082-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 351 | 4 |
https://dev-psoc.netlify.app/events/hacktoberfest2021/
|
code
|
Git & GitHub
Git & GitHub
- Name of the event : Git & GitHub Session
- Date of the Event : 3rd October, 2021
- Date of the Event : 10:45AM - 12:00PM IST
- Location of the Event : Google Meet and YouTube
- Number of Person Attended : 65+
- Society : PSoc IIIT-Bh
- Recording Link : Git & GitHub - YouTube
On 3rd October, PSoc, IIIT-Bh along with GDSC IIIT-Bh organized a session on Git and GitHub as a warmer to Hackotber Fest 2021, specifically for all the Open Source enthusiasts and other students in general. The Session, was open to public and approximately 65 peoples were in attendance. During the session, attendees asked their doubts, questions along with their opinion, thoughts and suggestions about the session.
The session was hosted by Raj Aryan (B120048), Piyush Mishra (B120041) and Saurav Pati (B120057) where they gave hands-on training with the following topics:
- Introduction to Git
- Hands on training on Git
- Importance of Git and its Visualization
- Introduction to GitHub
- Detailed training on GitHub
- Introduction to Open Source
- Details on “How to contribute to a project?”
As planned, we first started with the Introduction to version control and then later on covered the basic concepts of git such as its benefits, basic git commands also tried to visualize the entire workflow. We also explained the role of GitHub in open source world. We finished our session by showing live demo of how to select and contribute to any open source repository. Also, we explained about Hacktober Fest and how we can proceed with it. At the end of the session, attendees asked their doubts and questions they had and we warmly answered them.
Overall, we had an interactive session with the attendees and everyone enjoyed it a lot.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301737.47/warc/CC-MAIN-20220120100127-20220120130127-00455.warc.gz
|
CC-MAIN-2022-05
| 1,751 | 20 |
https://community.amd.com/t5/archives-discussions/gsa-not-supporting-a-glsl-feature-used-in-shader-it-runs-on-my/m-p/251707
|
code
|
I get this error when using GSA, the code runs on my computer with an ATI 5850, I select the 5870 Cypress Assembly.
Internal compilation failure. Possibly caused by GSA not supporting a GLSL feature used in shader.
ERROR: 0:8: error(#132) Syntax error: ';' parse error
ERROR: error(#273) 1 compilation errors. No code generated
Here is the Fragment Shader code: http://pastebin.com/hpLxTJYs
It would be nice to get this working, because I am trying to solve why that code doesnt run on Nvidia and it takes time to move back and forth between actual hardware.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530066.45/warc/CC-MAIN-20220519204127-20220519234127-00762.warc.gz
|
CC-MAIN-2022-21
| 558 | 6 |
http://www.ems-network.org/ems15/book/node14.html
|
code
|
All the mentioned contributions are aimed at showing the evolution of the concept of
`work' in the different versions made possible by technological evolution.
Taking into account the possibilities offered by the technology that enables the
performer himself to control the various stages of implementation, we have tested the
construction of different versions of Solo in a workshop with different performers.
Here we will show some of the highlights of the workshop and some significant
results of reconstruction of the score for the performance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558030.43/warc/CC-MAIN-20220523132100-20220523162100-00387.warc.gz
|
CC-MAIN-2022-21
| 548 | 7 |
https://www.kcist.kit.edu/deutsch/775_1813.php
|
code
|
Vortrag von Dr. Patrick Schäfer: "Unleashing the Potential of Unsupervised Time Series Analytics: Recent Advances and Breakthroughs"
31. März 2023 - 10:30 Uhr
Dr. Patrick Schäfer, wissenschaftlicher Mitarbeiter und Dozent für Informatik an der Humboldt Universität Berlin.
Zu seinen Hauptforschungsinteressen gehören Scalable TS Analytics, einschließlich Supervised Tasks wie Classification und Unsupervised Tasks wie Motif Discovery und Segmentation. Er ist Mitglied des Editorial Boards des DAMI Journals und Hauptentwickler von sktime.
In recent years, the usage of low-cost, high-resolution sensors has witnessed a surge, with applications in various domains, such as mobile devices, manufacturing monitoring, environmental and medical surveillance, and more. These sensors produce vast amounts of unlabeled, real-valued sequences, also referred to as time series (TS). Despite the abundance of data, the research has primarily focused on supervised techniques for analyzing TS, with a focus on classification and deep learning methods.
However, the field of unsupervised time series analytics (UTSA) offers a broad spectrum of tools to extract valuable information from time series data. This includes primitives like Chains, Discords, Motifs, or Change Points. These enable us to gain insights into the inherent statistical properties and temporal patterns of the underlying processes and enhance our understanding of the generated data. In this talk, I will present our recent advances in UTSA, specifically the detection of approximately repeated frequent patterns (Motiflets) and segmentation (ClaSP, ClaSS).
Gebäude 50.34, Raum 301
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647810.28/warc/CC-MAIN-20230601110845-20230601140845-00136.warc.gz
|
CC-MAIN-2023-23
| 1,649 | 7 |
http://www.lifeafterthefire.com/2008/12/things-i-know.html
|
code
|
I know that I am strong.
I am learning it's ok to be weak.
I know that I have (literally) a community of support.
I am learning it's ok to ask for help.
I know that our house will be beautiful.
I am learning that it often takes patience and time before we can see the beauty.
I know that I will come out at the other end of this a better person. I know. I wish that I didn't have to go through this. I wish that I could hand this burden off to someone else. But I also believe that this is not a mistake. That I was meant to walk this path. I know that I will learn the lessons I was meant to learn. I am learning.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123276.44/warc/CC-MAIN-20170423031203-00410-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 614 | 7 |
https://www.zonealarm.com/forums/showthread.php/79863-Cc%C4%BAeaner-4-03-identified-as-Trojan-by-ZA-11-0-768-000-lt-False-Positive?p=297724&mode=threaded
|
code
|
Installed it just to confirm.Send the file in a password protected zip to newvirus.
Reply : Sorry, it was a false detection. It will be fixed in the next update.
Thank you for your help.
Junior Virus Analyst, Kaspersky Lab.
Note : REMEMBER to remove the exclusions once the false positive has been corrected!
Footnote : Just downloaded Dat file I checked with (0 detections).
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826736.89/warc/CC-MAIN-20160723071026-00054-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 375 | 6 |
https://labs.blogs.com/its_alive_in_the_lab/2008/12/project-newport-in-the-autodesk-labs-au-discovery-space.html
|
code
|
Today we will set up our Discovery Space in the Exhibit Hall for AU. We also have a briefing on Project Newport - a technology that we did not have in our space last year. Project Newport is a 3D story building technology for architectural visualization and presentation. Its goal is to allow architects to convey their design intent.
Project Newport provides story building tools, for engaging an audience in an interactive presentation with high quality real-time 3D Revit models. As a Revit-based solution, Project Newport understands native Revit metadata, and keeps in synch with changes to Revit files. Project Newport uses one set of physically-based materials for viewport display, Mental Ray rendering, and non-photorealistic ‘sketch’ effects.
From our briefing kit:
With breakthrough game-engine technology, Project Newport is easy to use and enables architects to show their designs in context. They can explore design options, visualize changes instantly, and create vivid, immersive 3D presentations. Project Newport brings architectural designs to life and dramatically improves the ability to convey design intent to stakeholders - throughout the entire design process.
Project Newport is just one of the many things we will enjoy showing in our Autodesk Labs booth at AU. Design visualization has always been near and dear to our hearts. Project Newport is alive in the lab.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305141.20/warc/CC-MAIN-20220127042833-20220127072833-00486.warc.gz
|
CC-MAIN-2022-05
| 1,394 | 5 |
https://filamentwindingfea.com/cadfil.com/help/html/cadh3xkp.htm
|
code
|
Payout (.pay) path Creation
Cadfil Help contents Cadfil.com Home
At the CADFIL main menu select the Create Payout Path option.
The system will request the name of the fibre path (. FIB) file to use.
The system reads the fibre path data and then reads the mandrel and envelope file data that is referenced in the fibre path file.
The thickness dialog is then displayed, to enter bandwidth, set filtering and create thickness files if required. This has its own topic.
The first six values above are used to estimate the cross sectional area of the resin impregnated fibre bundle to allow the thickness of the winding to be calculated. When the user later specifies the band-width the band thickness can be estimated. The calculation is set up for default units but can be modified if required. See the appendices for tow area calculations.
See also the section on thickness modifications.
The FILTER ANGLE and FILTER LENGTH can be used to reduce the number of data points in the payout path and are discussed in one of the following sections.
The PAYOUT CLEARANCE is used to create the default envelope around the mandrel. If the mandrel file has an envelope defined and this was selected at step 4 then this value is ignored. The PAYOUT CLEARANCE value entered MUST be in mandrel units.
The software now calculates from the data input the number of cycles required to cover the mandrel. This line is displayed for user information as follows, the user will note that the number of cycles is not a whole number as it is unlikely that the effective bandwidth will divide exactly a whole number of times into the mandrel maximum circumference. By default CADFIL rounds the number of cycles to the nearest whole number .
The other items displayed are the minimum layer thickness and the total length of fibre for one layer (assuming one roving)
If a thickness file was requested The system will now prompt the user as to whether he would like to update the mandrel profile by displaying, MANDREL UPDATE REQUIRED Y/N . If the user answer 'Y' the display will indicate UPDATING MANDREL. PLEASE WAIT. Following this, the system will request the user to input a new mandrel file name for the updated mandrel.
The Band pattern table is then shown (as below). This user can select a band pattern by clicking on the line required. Band pattern is discussed in detail in a later section.
Band Pattern Selection Dialog
The system requests the user to input the name of the payout file he wishes to save the payout path data to. This file has the .PAY extension.
The system then proceeds to the Payout View Section.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948817.15/warc/CC-MAIN-20230328073515-20230328103515-00768.warc.gz
|
CC-MAIN-2023-14
| 2,601 | 17 |
http://stackoverflow.com/questions/10979264/how-to-cross-build-gzip?answertab=oldest
|
code
|
I am trying to build
gzip for an embedded platform on a Linux machine. I downloaded the latest gzip distribution from here. Then,
make requires first to run the
configure program in order to tailor a
Makefile for the specific target.
So I run
configure and get some error messages. The problem seems to be a combination of a few things. Our compiler version is called
e-gcc, so I used the following line, and got this error:
~/Projects/gzip-1.4$ ./configure CC=e-gcc checking for a BSD-compatible install... /usr/bin/install -c checking whether build environment is sane... yes checking for a thread-safe mkdir -p... /bin/mkdir -p checking for gawk... gawk checking whether make sets $(MAKE)... yes checking for style of include used by make... GNU checking for gcc... e-gcc checking whether the C compiler works... yes checking for C compiler default output file name... a.out checking for suffix of executables... checking whether we are cross compiling... configure: error: in `/home/xyz/Projects/gzip-1.4': configure: error: cannot run C compiled programs. If you meant to cross compile, use `--host'. See `config.log' for more details.
Obviously, C compiled programs cannot run, b/c it is cross-compiler. The message say I have to use the
--host option, but the problem is that we don't really have a defined name in gcc. However, I tried:
./configure CC=e-gcc --host=epiphany
and the error received is:
configure: WARNING: If you wanted to set the --build type, don't use --host. If a cross compiler is detected then cross compile mode will be used. checking for a BSD-compatible install... /usr/bin/install -c blah blah blah checking build system type... x86_64-unknown-linux-gnu checking host system type... Invalid configuration `epiphany': machine `epiphany' not recognized configure: error: /bin/bash build-aux/config.sub epiphany failed
Last thing, I tried cheating and setting the host to
arm as it is closest in spirit to our architecture. The configuration went much further, but eventually failed as well with the following message:
checking for GNU libc compatible realloc... no checking for rmdir... no configure: error: in `/home/xyz/Projects/gzip-1.4': configure: error: Your system lacks the rmdir function. Please report this, along with the output of "uname -a", to the [email protected] mailing list. To continue past this point, rerun configure with SKIP_RMDIR_CHECK=yes. E.g., ./configure SKIP_RMDIR_CHECK=yes See `config.log' for more details.
I am now pretty clueless on how to continue. Any suggestions?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400380068.47/warc/CC-MAIN-20141119123300-00143-ip-10-235-23-156.ec2.internal.warc.gz
|
CC-MAIN-2014-49
| 2,545 | 18 |
https://cloudacademy.com/lab/create-basic-api-go-programming-language/
|
code
|
Create an API with Go and Gorilla Mux
Go is an open-source programming language that makes it easy to build simple, reliable, and efficient software!
This lab is designed to show you how to install and setup a Go-based development environment, allowing you to compile and execute your own Go-based applications. The lab will then walk you through the process of creating a basic API in which you are shown how to use Gorilla Mux for API request routing.
Upon completion of this lab, you will be able to:
- Install and configure the Go toolset
- Create and compile basic Go applications
- Use Gorilla Mux for HTTP routing and URL matching
- Build basic APIs using Go
- Be comfortable with basic software engineering and development principles.
Note: This lab includes a complete solution to consult with when needed.
This lab will start with the following AWS resources provisioned automatically for you:
- A single EC2 instance, named ide.cloudacademy.platform.instance, which will have a public IP address attached. This will be the instance that you will connect to using your local workstation browser.
To achieve the lab end state, you will be walked through the process of:
- Using your local workstation browser to remotely connect to ide.cloudacademy.platform.instance
- Download, install and configure the Go toolset
- Create a basic API which leverages the Gorilla Mux package for HTTP routing and URL matching
- Compile, execute and test the resulting API
Jeremy is a Content Lead Architect and DevOps SME here at Cloud Academy where he specializes in developing DevOps technical training documentation.
He has a strong background in software engineering, and has been coding with various languages, frameworks, and systems for the past 25+ years. In recent times, Jeremy has been focused on DevOps, Cloud (AWS, Azure, GCP), Security, Kubernetes, and Machine Learning.
Jeremy holds professional certifications for AWS, Azure, GCP, Terraform, Kubernetes (CKA, CKAD, CKS).
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474775.80/warc/CC-MAIN-20240229003536-20240229033536-00650.warc.gz
|
CC-MAIN-2024-10
| 1,980 | 20 |
https://lists.oasis-open.org/archives/office/201402/msg00000.html
|
code
|
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Run-Time behavior for Metadata
seems I have left the IRC chat too early to see the metadata comment from Michael after discussing the ODF FOSDEM presentation https://fosdem.org/2014/schedule/event/simplifying_reuse_with_metadata_support_in_odf_and_plugin_apis/
[16:20] Michael Stahl: Svante: interesting that somebody actually uses that - did they complain about the missing metadata features like copy/paste etc too?
[16:21] Oliver-Rainer Wittmann: Michael: as far as I remember, they did not complain. But the talks were only 15min. and we had not much time for discussions
[16:22] Michael Stahl: Oliver: oh there wasn't time for complaints - isn't that the most important part of talks
I have contacted them (see http://commonsmachinery.se/author/peter/ for more details) for more problem details earlier today, but AFAIK they have talked about having problems when copying metadata where the xml:id can only exist once in an XML file.
Editing metadata is indeed problematic, but IMHO that was not solvable with the ODF 1.2 metadata spec, but might be when describing change (run-time XML changes). The xml:id is just an implementation detail without semantic value (which should neverless be stable - different topic). If the metadata is moved it would be kept, if the metdata is being copied a new xml:id would be created as object (target) of the same metadata.
Without knowing the exact use case of them, yet, I still remember the discussion of the general problems of move and copy "document parts" with metadata. In general I suggest that metadata is only being kept when it can be seen/viewed by the user or is controlled by a plugin.
Still there are different types of metadata that have to be handled different. It seems we need meta-meta data (types). The following three types important to us come to my mind at once:
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998943.53/warc/CC-MAIN-20190619083757-20190619105757-00135.warc.gz
|
CC-MAIN-2019-26
| 1,945 | 10 |
https://lists.libre-soc.org/pipermail/libre-soc-dev/2021-August/003482.html
|
code
|
[Libre-soc-dev] General Introduction
programmerjake at gmail.com
Mon Aug 16 18:06:50 BST 2021
On Mon, Aug 16, 2021, 09:32 <gautham at object-automation.com> wrote:
> Hello Everyone!
> I am Gautham, from Kerala, India. I am a pre-final year student at the
> Department of Electrical Engineering, Indian Institute of Technology
I have some exprerience with Gate Level Design and Verilog. I am
> also familiar with C, C++ and Python. I also fool around with popular
> Machine Learning algorithms and packages.
More information about the Libre-soc-dev
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00565.warc.gz
|
CC-MAIN-2023-50
| 547 | 11 |
http://timeseriesclassification.com/description.php?Dataset=HandOutlines
|
code
|
|Description: ||This series of 11 classification problems were created as part of Luke Davis's PhD titled "Predictive Modelling of Bone Ageing". They are all derived from the same images, extracted from Cao et al. "Digital hand atlas and web-based bone age assessment: system design and implementation". They are designed to test the efficacy of hand and bone outline detection and whether these outlines could be helpful in bone age prediction. A range of algorithms were applied to automatically extract the hand outlines of over 1300 images, and three human evaluators labelled the output of the image outlining as correct or incorrect.
The data is described in detail in the paper On the Segmentation and Classification of Hand Radiographs (IJNS Vol. 22, No 5)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823702.46/warc/CC-MAIN-20181211194359-20181211215859-00383.warc.gz
|
CC-MAIN-2018-51
| 764 | 2 |
https://forums.adobe.com/thread/2370217
|
code
|
Just said technical issues. I thought noise/artifacts were a specific reason they could post if that were it.
Maybe it's a new guy that hasn't found the noise option. Maybe they meant to hit noise, but hit technical instead (I don't know how their system is set up). Maybe there is some technical issue that you and I haven't noticed. Maybe you need to do some more work on your keywords/tags?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593004.92/warc/CC-MAIN-20180722022235-20180722042235-00018.warc.gz
|
CC-MAIN-2018-30
| 393 | 2 |
https://capgratuit.com/hostgator-99-cent-domain/
|
code
|
Hostgator 99 Cent Domain
In 2002, HostGator was founded by Brent Oxley in his dorm room at Florida Atlantic University. The firm has grown significantly since then and also continues to do so, time after time. Their logo is “We consume the competitors.”Hostgator 99 Cent Domain
Today, HostGator has head office in both Austin and Houston, Texas, after growing out of numerous other sites. In 2007, their Brazil office was opened. HostGator has actually won lots of honors for assistance and also hosting solutions.
An EIG Owned Eco-friendly Host In June 2012 HostGator was bought out by the Stamina International Team (a business that also has various other holding suppliers aside from HostGator). Nonetheless, it continues to trade under the HostGator name.
HostGator is an eco-friendly power company. The company gets Green-e licensed Renewable resource Credit reports (RECs) from a wind ranch in Texas. 130% environment-friendly power cools and also powers all shared as well as reseller servers.
We may earn a commission– at no extra cost to you– if you make a decision to buy any of the products, software or solutions we refer to as well as advertise on our website. The viewpoints revealed are of our very own independent reviewers & creating team, appointed to offer helpful testimonials & their unbiased opinion.
You should assume that every exterior link that you click on our web site is an affiliate web link that results in us being paid by a companion of ours.
Overview of HostGator’s Top Attributes
Whenever there’s a discussion concerning web hosts, the name HostGator is bound to find up, as well as with excellent reason. Hostgator 99 Cent Domain
Having been around for greater than a decade, HostGator can be claimed to be one of the most trusted and acknowledged host. It masters numerous areas consisting of consumer support, hosting adaptability, uptime, shared hosting, plus a lot a lot more.
This quality in a number of facets of webhosting combined with the company’s experience, variety of functions, as well as efficiency makes HostGator a smart choice for any kind of site owner.
What Advantage Do You Get?
HostGator offers a series of plans. If you’re having a hard time to decide on which plan to select, take into consideration these functions, which we’ll talk about below:
- You handle your account making use of cPanel, the industry-standard interface
- To maintain your account protected, you obtain a totally free Secure Sockets Layer (SSL) certification
- If you wish to increase safety as well as malware scanning, you will need to get SiteLock
- Also the entry-level common organizing strategy features support for unrestricted email accounts
- Month-to-month billing choices are offered
- One-click installs, even from the fundamental planHostgator 99 Cent Domain
- Accessibility to the internet site builder– at a cost
- A Content Distribution Network (CDN) keeps your website quick
- Multiple assistance alternatives consisting of real-time conversation
With all the various other host companies that are offered, why select HostGator? Well, the fact is that no single web host is excellent. So, whether you’re a beginner webmaster or are seeking to alter web hosts, right here’s a peek at the good and the poor of HostGator to aid you make the right choice.
HostGator’s Hosting Bundles
Among the very best attributes of HostGator is the truth that the firm offers versatile bundles that leave individuals (both big and little businesses/blogs) with plenty of area to expand.
One of the most fundamental of the plans, the “Hatchling Plan,” comes with support for one domain name, limitless data transfer, disk room, databases, shared SSL certificate, lots of email addresses, and assistance for third-party applications like material monitoring systems.
Other common hosting strategies build on this Hatchling package by adding added features such as limitless domains, private SSL certification, and also a toll-free telephone number (simply among others.).
VPS and also Committed Organizing Plans.
Alternatively, if you need more power, or have specific requirements that shared web servers can not fulfill, there’s the option of advanced packages such as VPS and also Committed server strategies. The greatest tier VPS plan offers 8GB RAM, 240GB storage space, and also regular monthly data transfers topped at 3TB.
Dedicated server bundles, on the other hand, can be customized with approximately 16GB of RAM, 25TB of monthly information transfers, and a remarkable 1TB of storage.
HostGator likewise supplies Cloud as well as WordPress hosting, which we go into below. You can constantly check out HostGator’s main websites to find one of the most upgraded organizing bundles available as well as their specifics.
The company likewise offers WordPress holding with the most inexpensive bundle allowing one website with as much as 100,000 site visitors each month. The most inexpensive WordPress plan likewise consists of 1GB back-ups. Higher-end plans enable approximately 3 websites as well as approximately 500,000 site visitors monthly.
At the same time, the leading WordPress hosting plan likewise enables up to 3GB in backups.Hostgator 99 Cent Domain
Lots Ahead of Its Competitors
All WordPress hosting strategies consist of enhanced cloud architecture, low-density servers, CDN, as well as numerous caching layers which indicate that websites load up to an alleged 2.5 times faster than rivals.
HostGator specialists are additionally handy to provide a complimentary movement solution and also top quality assistance in case anything breaks.
What Regarding Performance as well as Uptime?
HostGator promises a 99.9% uptime and has the sources to back it up.
Powered by Countless Worldwide Web Servers.
One of the biggest and also most preferred web hosts, HostGator has hundreds of servers under its management.
HostGator servers are monitored 24/7 by on-site technological team. Protected Facilities for Connection of Service. In addition to being strategically situated across the world, these web servers make use of top-notchweb server hardware as well as are housed in modern information facilities that take all the required actions (UPS battery backup devices, top-tier HVAC systems, continuous facilities tracking, fire security systems, and so on) to ensure efficiency continues to be perfect and also nonstop.
Thanks to these first-rate data centers and their critical places, HostGator supplies dependable, top quality efficiency that never disappoints.
Uptime and Speed
HostGator has an over 90% customer fulfillment (from a June 2008 customer contentment study). HostGator keeps approximately 99.9% uptime. As well as in addition to the dependable uptime, HostGator additionally delivers sufficient tons times with rates varying from 22 to 940ms relying on the browser’s location.
How Great is HostGator’s Client Assistance?
When it pertains to consumer assistance, very couple of host can take on HostGator’s customer care. The firm even has awards to verify this fact. For basic concerns and concerns, you can utilize HostGator’s e-mail assistance, which is always available, social networks assistance on Facebook, Twitter, Google+.
When you enroll in a HostGator strategy, you can ask for a totally free internet site transfer.
Or seek responses from the firm’s substantial knowledgebase, which teems with FAQs, handy write-ups, and video clip tutorials that stroll you through a few of the controls. HostGator also uses a discussion forum where you can ask questions and answer those presented by various other customers of the web host.
Alternatively, if you require a bit a lot more prompt aid, or are experiencing an issue that needs special attention, HostGator has customer assistance agents on standby 24/7/365 all set to help you with whatever questions you may have.
These reps can be reached by phone or live chat.Hostgator 99 Cent Domain
Exists a Money-Back Assurance?
No locked-in agreements and a 45-day money-back guarantee. Implying if you choose to terminate within the first 45 days of signing up with, you get a full reimbursement, no doubt asked.
Additionally making HostGator a good catch is the fact that the webhosting throws in a couple of additional features with their different hosting strategies. As an example, each holding strategy includes several giveaways.
You get a totally free website builder as well as internet site structure tools, limitless bandwidth and also disk area, over 4,000 internet site templates, totally free domain name transfers, and also limitless MySQL data sources.
Various other bonus that you can look forward to with HostGator consist of:.
- $ 150 well worth of Google Adwords or Bing/Yahoo advertising credits.
- Complimentary site transfers when you wish to relocate your website from one more host to HostGator. As well as the best part is that your internet site can be updated throughout the transfer at no cost. However, the stated migration has to be done within 30 days from the day you join.
- A free domain for the very first term when you move and set up a new account.
- 1-click installs readily available for all significant open-source projects such as WordPress, Magento, and Joomla.
- A 45-day money-back guarantee for all HostGator holding strategies. Many web hosting business only give you a 30-day window to terminate your account and also get your cash back.
- A getting-started email with links to every one of the sources you will certainly need to build your site and get it up as well as running.
What are the Advantages and disadvantages of HostGator?
So, is HostGator the ideal web host for you?
Well, offered the reality that HostGator gives you an easy method to build as well as manage your site, gives you with all the sources you’ll require to supply top-level services on your website, provides a number of feature-packed hosting bundles, and brings a ton of experience to the table, it can be a suitable host for any person with a web site.
A Lot Of Pros
HostGator offers a number of advantages including:.
- Trusted uptime and also fast response times.
- Inexpensive holding plans.
- Lots of area for growth.
- The choice of cloud hosting.
- Flexible email monitoring.
- Free shared or exclusive SSL certificate on all holding packages.
- Generous 45-day money-back warranty that gives consumers assurance.
- Comprehensive Knowledgebase.
- No constraint on transmission capacity, disk area, and emails.
- Rock-solid protection.
- Free Weebly site builder.
- An excellent control board with a lots of features varying from a web-based data supervisor to more advanced features such as cron work, image manager, error logs, and also apache handlers.
Furthermore, HostGator has a large data base with answers to practically any kind of concern you can have ranging from the simplest to one of the most sophisticated. So, when the customer assistance group takes as well long to address, you can choose the option to your issue from this knowledgebase.
What Are the Cons?
When it comes to the negatives of the business, you’ll just have to handle the problem of weekly backups, sluggish consumer response times (according to some of the host’s users), a sophisticated cPanel that needs some obtaining utilized to, and no one-stop WordPress import.Hostgator 99 Cent Domain
Attempt Without Any Commitment
Considered that HostGator has a whole lot to like and also very few things to dislike, you must absolutely attempt the business if you possess a site or plan to construct one.
If the web host does not make a good suitable for your web site, the 45-day money-back guarantee available will certainly enable you to leave without losing money.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058263.20/warc/CC-MAIN-20210927030035-20210927060035-00095.warc.gz
|
CC-MAIN-2021-39
| 11,751 | 84 |
http://www.mmmbitcoin.us/2016/06/hot-news-bitcointube-tips-and-trick-get.html
|
code
|
BITCOINTUBE Tips and Trick:
BitcoinTube is an advertising video if you know paidvert its same
system but different ads.
BitcoinTube pay member for watching video 30 second and withdraw
instant to your to your bitcoin wallet after your request. minimum
0.001btc for withdraw.
Tips and Trick:
1.Login to BITCOINTUBE
2.click bonus video for get 100 video poin
3.collect 1000 video point (its mean 10 day)
4.after get 1000 video point, now you level1 and get Paid video worth 0.005btc
5.after you watch all paid videos and get 0.005btc you poin decrease
100 poin. now you have 900 poin, click bonus video for get 100 video
6.after 2 day get paid videos you can withdraws or save for buy ads
pack is up to you...
for get Paid video you need minimum 1000 poin.
for detail level and look FAQ
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948512054.0/warc/CC-MAIN-20171211014442-20171211034442-00604.warc.gz
|
CC-MAIN-2017-51
| 784 | 17 |
http://anastaciaknitsdesigns.blogspot.com/2014/12/intentional-living-dec-14-20.html
|
code
|
How did I do last week? Well it was my first week but I did ok.
I did some wrapping, our date night was spent sleeping, I did spend a lot of time setting up the planner for 2015. I did none of designing to dos and I did not stretch at all last week (or any other exercise for that matter). I did go on facebook which I normally neglect.
For the upcoming week (not much since we are so clue to christmas)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590901.10/warc/CC-MAIN-20180719125339-20180719145339-00082.warc.gz
|
CC-MAIN-2018-30
| 403 | 3 |
http://www.msg.ucsf.edu/local/programs/ono/manuals/ofaq/Q.122.html
|
code
|
The question was: "I am trying to display a thick Ca trace, so I used stick, but the program is not displaying the same colour as the molecular object which is entirely yellow. What should I do? (the color of the sketch is red) I am using the color-map mode (not RGB mode) on an SGI."
Wim Burmeister replied: "If you get problems with the rendering of solid graphics switch around between the different graphic modes with F5 until you find something which works correctly. I have to use the sequence:
in order to get correct graphics on our Silicon Graphics under 4.0.5."
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705957380/warc/CC-MAIN-20130516120557-00029-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 571 | 3 |
https://lists.01.org/hyperkitty/list/[email protected]/thread/XUCTF5S5I7VCBKRO3TNUDZTEPU3WKQMX/
|
code
|
On Thu, 2016-06-30 at 15:05 +0200, Benjamin Ioller wrote:
I'm using Connman (v-1.32) on my Raspberry Pi and I wanted to try the
I found quite few interesting mailings and I looked over the code
(session.c, test-session) and the doc, but it looks like session is
not really a nowadays topic.
Does someone use the Connman's session? and for which application?
Can you give me an example?
Ping wagi on IRC, he was the last known user.
So here is what I understood so far about the session mode:
Connman session allows the application to use specific network
setting as selected technologies, roaming policy...
Connman uses Iptable to do so. Connman creates rules in the mangle
table to mark the packet based on the UID/GID.
Then rules are added to the filter table depending on the allowed
bearers, and other properties.
This routing is only functional when the connman state option is ON.
If you mean Manager API SessionMode boolean property, that one does
nothing. Sessions are nowadays always available and active as soon as
someone calls CreateSession().
Connman proposes two ways to create a session :
First, the application creates it's own session using the method
form /net.connman.manager. I try to use this method with a python
script, the application creates a session, connects to it and sends
UDP packet to a local host via ethernet. But I didn't manage to setup
the AllowedBearers, neither with
I have Variant encoding issue. Do you have any advice or exemple?
See the python code in test/test-session, it should work.
I was also wondering how does the mangle table identify the
application's packet? (or maybe it's just the UID again?)
The detection is done with UID or GID and set up in
'init_firewall_session()' using MARK target. The routing table is
identified with id numbers created on the fly, see 'session_mark' and
'init_routing_table(session)' in src/session.c.
The second way is to use session_policy. With this method you can
mark packet only based on the UID or GID. I need to create UID.policy
in var/lib/connman/session_policy_local which contained the different
With a policy plugin one can fine tune what parameters in
CreateSession() calls are allowed. No policy module, no constraints for
CreateSession() (IIRC, or that was the intention). The provided session
policy is just a simple example, one can create a new policy module
containing more code and get something fancy as a policy decision
instead of reading a simple file.
But when I turn the Connman's state session On, nothing
My pi user is still able to use wifi even if the pi.policy have
only Ethernet as AllowedBearers. I suspect the issue comes from user
rights or something...
CreateSession() has to be called also so that the specific session
routing and iptables rules are enabled. Otherwise it is assumed that
the default routing table is followed.
Does somebody had similar issue?
By the way, is the session priority only for notification hierarchy
or does the session priority have some effect on the network traffic
I don't remember session priority having any special meaning.
Hope these questions aren't too basic for you, and can help
If you have any literature which could help, I'll take it!
If someone will provide documentation, we'll be glad to proofread it
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337480.10/warc/CC-MAIN-20221004054641-20221004084641-00398.warc.gz
|
CC-MAIN-2022-40
| 3,266 | 56 |
http://www.grasshopper3d.com/forum/topics/kansai-international-airport-terminal?commentId=2985220%3AComment%3A600515&xg_source=activity
|
code
|
generative modeling for Rhino
So... I'm doing this case study of Kansai Airport...
I've been able to build it almost without new learning process, but something came up, and I'm not finding any solution.. I've tried everything I learned (wich is a few, since I'm new to grasshopper)
Anyway, look at the picture, and the printscreen I took...
Its the big pannel of glass with double arc trusses, inside and outside of the building.
In the FRONT view we can see lines in the X vector with the same length.. its the key point that is wrong.. it should have a variable length (small -medium -big -medium -small), in a way that a polyline in the end points would look like an arc.
I'm planning on do a video tutorial later on form the whole making of.. any help will be mantioned =)
Sending files from Rhino and Grasshopper!
Can you draw the effect you are looking for over the top of the screen shot?
dude, you solved it so easily! haha
I see what you did, but don't understand all of it... I'll try to study more..
Its all about math?
It's all about path/data management
ok, I'll take a better look on that subject..
Thanks a lot!
very nice pick for a case study!
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703306113/warc/CC-MAIN-20130516112146-00038-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,160 | 16 |
http://forums.pinstack.com/f22/what_are_jvm_errors-5951/
|
code
|
I see posts about people discussing "JVM" errors.. what exactly are they? I have a ... RIM Blackberry 87xx forum
what are JVM errors?
I see posts about people discussing "JVM" errors.. what exactly are they? I have a Mac so i was hoping someone could let me know either how to fix them with a Mac, in case it happens to me on my 8700, or at least what they are/how to avoid them?
Re: what are JVM errors?
JVM errors are indications of a problem with the Java Virtual Machine. They are indications that your OS or an App is having problems. You can find a list of the errors and help in curing the problems in the BB Error Codes Sub forum. I'm afraid that correcting them using you Mac, may be more difficult, but I'm sure someone will have help for you.
Tags for this Thread
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719192.24/warc/CC-MAIN-20161020183839-00236-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 774 | 6 |
https://www.sportstalksocial.com/hive-101690/@keys-defender/antiunsafelinks-keys-defender-bot-1603294853717
|
code
|
It looks like this post contains a link that does not use a secure protocol (HTTP is in use instead of HTTPS): http://discord.sportstalk.social. Be careful and do not enter sensitive information in that website as your data won't be encrypted.
More info on this service here. For more information on HTTP unsafety read: https://whynohttps.com https://web.dev/why-https-matters
These messages are throttled 1/20 to reduce spam. If this message bothers you reply OFF .
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514121.8/warc/CC-MAIN-20210118030549-20210118060549-00730.warc.gz
|
CC-MAIN-2021-04
| 466 | 3 |
https://www.247rack.com/dashboard/knowledgebase.php?action=displayarticle&id=161
|
code
|
Using IBM DB2 - 9.7.2 database with vCenter Server 4.1 Update 1
When using IBM DB2 9.7.2 database with vCenter Server 4.1 Update 1, you need to ensure that:
Only IBM DB2 -9.7.2 64-bit client is used to access the database.
IBM DB2 -9.7.2 32-bit client and 64-bit client do not co-exist on the vCenter Server system.
DB2Users and DBSysmon groups are created on the database system. If these groups do not exist on the system, create the groups and assign these groups to DB2 user.
The database system is configured with DB2 client, System DSN is created, and the parameter DBAlias is configured. If DBAlias is not configured and you connect to the database an error similar to the following is displayed: SQL1013N Thee database alias name or database name " " could not be found, SQLSTATE=42705.
To configure DBAlias:
In the database system, click Start > Run.
Enter odbcad32 and click OK.
In the System DSN tab, select the System DSN name and click Configure.
In the Advanced Settings tab, click Add.
Select DBAlias CLI parameter from the list and click OK.
In the Pending Value field enter the in upper case, and click OK.
Click Apply. Verify that after clicking Apply, for DBAlias, shifts from Pending Value cloumn to Value column.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110485.9/warc/CC-MAIN-20170822065702-20170822085702-00717.warc.gz
|
CC-MAIN-2017-34
| 1,233 | 14 |
https://support.seagullscientific.com/hc/zh-tw/community/posts/360044059413-Bartender-2019-Pro-License-Server-Auto-Start
|
code
|
Bartender 2019 Pro License Server Auto Start 追蹤
So we have a very simple implementation of this software where we have a dedicated machine for label printing. Every thing is installed there, Bartender, license server, etc... This computer is on our company network, but is accessed by multiple users and each user logs in which their own username (only one of which is a local admin). We are experiencing an issue where the license server service seems to just stop. It always stops after a reboot but sometimes it will just stop randomly requiring the one local admin (me) to stop everything and go restart the service. As you can imagine, this is rather inconvenient
I guess my questions are,
- Is there a way to auto-start this service? Why it doesn't start automatically is a little baffling
- Is there a way around this requiring admin privileges to start?
- Are we going to have to give anyone who uses this machine local admin rights in order to fix this?
Just to add another caveat to this, my company is about to implement new security measures and will be removing everyone's local admin rights, so is the best solution to move the license server to the company server?
Any help would be greatly appreciated
★ BarTender Hero ★
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303729.69/warc/CC-MAIN-20220122012907-20220122042907-00043.warc.gz
|
CC-MAIN-2022-05
| 1,244 | 9 |
http://victorianhaus.com/index2.html
|
code
|
I [Socrates] said, if the pleasant is the good,
nobody does anything under the idea or
conviction that some other thing would be better
and is also attainable, when he might do the
better. And this inferiority of a man to himself
is merely ignorance, as the superiority of a man
to himself is wisdom.
They all assented...
Then, I said, no man voluntarily pursues
evil, or that which he thinks to be evil. To
prefer evil to good is not in human nature; and
when a man is compelled to choose one of two
evils, no one will choose the greater when he
may have the less.
All of us agreed to every word of this.
Well, I said, there is a certain thing called
fear or terror; and here, Prodicus, I should
particularly like to know whether you would
agree with me in defining this fear or terror as
expectation of evil.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818688932.49/warc/CC-MAIN-20170922093346-20170922113346-00018.warc.gz
|
CC-MAIN-2017-39
| 810 | 20 |
http://oalib.hlsresearch.com/Modes/AcousticsToolbox/manual_html/node63.html
|
code
|
Both normal mode models and Fast-Field Programs are based on a contour integral representation of the acoustic pressure. Normal mode models evaluate the integral by residues which involves finding the poles of the Green's function. FFP models evaluate the integral directly by stepping along the contour.
In terms of efficiency, the question is whether one can find poles more rapidly than directly integrating. It takes about 15 Green's funtion evaluations to find a pole. The number of Green's function evaluations for an FFP model increases linearly with range.
On the other hand, the normal mode series neglects certain contributions which tend to be important in the near-field (say within 10 water depths). Indeed some problems have no modes at all such as the problem of a point source in free space. Also for very complicated problems (with elasticity) it can be difficult to reliably find the modes. Then an FFP model is a good alternative.
A complete explanation of when to use which model would require many pages. A rule-of-thumb is to use SCOOTER when you are concerned about the field within 10 water depths and KRAKEN otherwise. SCOOTER can be used for larger ranges but will generally require more CPU time. KRAKEN can be run for closer ranges but requires some insight in setting up the environment to make sure that the modes are adequate for describing the field. This is done either by extending the model of the ocean bottom in depth, introducing a false bottom, or computing leaky modes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741219.9/warc/CC-MAIN-20181113041552-20181113063552-00304.warc.gz
|
CC-MAIN-2018-47
| 1,509 | 4 |
https://javadoc-v4.openrefine.org/org/openrefine/runners/local/pll/util/package-summary
|
code
|
Skip navigation links
A class which reads line by line from an
, making sure it only reads the bytes it needs to complete the current line.
A future which supports pausing and progress reporting, assuming the underlying future was built on a task that relies on the supplied
object to periodically check for pause and report progress.
Utility class to represent the query tree associated with a PLL.
Utility class for a future and the underlying thread to communicate about pause and resume actions from the user, as well as reporting progress.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818740.13/warc/CC-MAIN-20240423192952-20240423222952-00761.warc.gz
|
CC-MAIN-2024-18
| 544 | 7 |
https://forums.avianavenue.com/index.php?tags/adoptions/
|
code
|
Search titles only
Welcome to Avian Avenue! To view our forum with less advertisments please register with us.
Memberships are free and it will just take a moment.
Looking for Senegal Parrot breeder or adoption?
Anyone have any references? I got scammed by an online bird seller the last time I bought, so now I am more catious and would love references to find a yellow-eyed Senegal parrot either young or an older adoption by anyone that may have suggestions?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816587.89/warc/CC-MAIN-20240413083102-20240413113102-00810.warc.gz
|
CC-MAIN-2024-18
| 461 | 5 |
https://docs.google.com/forms/d/e/1FAIpQLSfOaqQVe0HMsP7M8gw6FVWvp6TrRbSJY8h_88GWf0CAaRepYA/viewform
|
code
|
Please fill out the Project Information, Location information, and Project Information sections completely to submit a new project. A few notes:
* Projects must be conducted by or have support (funding or in-kind support) from at least one U.S. federal agency;
* Please be sure your project is not already in the Catalog before you submit (email [email protected]
if you would like to edit an existing project);
* Be aware each project submission needs to be verified by the appropriate Agency Crowdsourcing and Citizen Science Coordinator before it will appear online in the catalog; and
* Contact [email protected]
if you have any questions about submission.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00787.warc.gz
|
CC-MAIN-2023-40
| 673 | 7 |
http://remon.moe/2015/06/18/internship-hype-update/
|
code
|
Probably a bit late to be posting about this but for a week until now so 8 days now I've been doing an internship as a software engineer working on web components. So far the experience has been mixed from really interesting to really frustrating as my knowledge and skill with angularjs is being tested.
So far its been way to interesting, from the way the company operates to how they tackle security driven development. One thing that did shock me was to how relaxed the company is. You can grab a coffee whenever you want. From working at a superstore where you had a break and couldn't do anything out with this is a new experience.
Anyhow so far the experience has been great, learnt alot of things and I'm assuming more to come.
Anyway that's me just about to get off the bus to get started, byeeee
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886117519.92/warc/CC-MAIN-20170823035753-20170823055753-00100.warc.gz
|
CC-MAIN-2017-34
| 805 | 4 |
https://knowledge.broadcom.com/external/article/211104/moi-customer-test-data-collection-utilit.html
|
code
|
As part of the verification testing of Machine Learning algorithms, we are requesting customer test data be collected so that real world examples of metric data processing can be evaluated in partnership with the customer.
Release : 2.0.0*
Component : MF OPERATIONAL INTELLIGENCE
MOI Data Extraction for Machine Learning Algorithm Testing
- A Support Case should be opened with a subject like "Customer Data Collection for Testing of Machine Learning Algorithm"
- The extract data utility in the zipped tar file attached to this knowledge doc needs to be executed on the host where your MOI Appliance is running
- MOI Appliance should be running and all containers should be healthy
- The Host system needs to have free disk space to create and tar up the data backup. Without specific Cassandra database stats, we cannot provide an exact estimate of the amount of space needed. Our best guess is in the 5 to 20 GB range.
- It is recommended that a MOI Appliance with a limited number of metric data feeds be selected for this data extract as the size of the extracted data can be voluminous.
**How to Use:**
1) Ensure the /var/opt/moi/share/backups directory is created or empty if existing already. All extracted data will be copied here before being zipped and tar'ed up.
2) Download the moi-data-extractor.tar_1616445369805.gz utility to a folder of your selection on the Linux system where the MOI data needs to be extracted.
3) Extract the content of the moi-data-extractor.tar_1616445369805.gz archive. This will create an moi-data-extractor folder
tar -xvf moi-data-extractor.tar_1616445369805.gz
4) Change working directory to "moi-data-extractor" folder
5) Run the extract-data.sh script.
6) Wait until the extract-data.sh completes. Please note that depending on the amount of data, this script can run for several hours.
7) Once the data backup is done, you should see the 'moi-data.tar.gz' in directory /var/opt/moi/share. Please upload the moi-data.tar.gz file to the Support Case that was opened for this data capture.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100912.91/warc/CC-MAIN-20231209134916-20231209164916-00406.warc.gz
|
CC-MAIN-2023-50
| 2,033 | 18 |
https://www.engadget.com/2006/10/25/oxygen-depravation-and-ipod-hatred/
|
code
|
Climbing the tallest mountain on earth is no small feat, and is certainly something to be proud of, but it's not without its risks; most of which stem from the extremely low Oxygen content in the air in "The Death Zone" above 22,000 ft. Unfortunately, it seems that Neal Muller, a grad student at UPenn's Wharton School succumbed to this lack of O2 and lost some brain cells on the way down. Muller whines in a Washington Post article that he was unable to triumphantly mount the top of the world to to soundtrack of Van Halen, because his iPod died during the climb. Now, my first reaction to this is utter speechlessness, followed by anger and depression about the state of the human race. I won't address Muller's arguments here, as Dan over at Mac User has done a tremendous job of that, but I will outline some of his arguments and their flaws.
- Muller complains that the hard drive failed; almost 20,000ft above its designed maximum operating altitude, and likely 50 degrees below its minimum operating temperature.
- He complains that because the iPod doesn't use an "open connection standard," it suffers from a lack of accessories; I suppose that just over 3000 iPod specific accessories isn't really that much compared with... wait... no, thats actually a lot.
- Argues that the iPod is a "flash-in-the-pan": I guess 85% market share and 5 years of growth don't count for much.
In addition to contradicting with evidence every single one of this morons arguments, Dan poses a really great question; what the hell was this guy doing listening to his iPod on Everest? When you're doing something which kills as many people as summiting Everest does, you should probably be paying attention to your surroundings instead of worrying about how many stars to give the currently playing track.
It's really sad to see that some people really are so stupid as to make these kinds of arguments, and disappointing that the WP would post such drivel. In any case, check it out, if only to laugh at this guys utter clueless-ness.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866870.92/warc/CC-MAIN-20180524205512-20180524225512-00436.warc.gz
|
CC-MAIN-2018-22
| 2,027 | 6 |
https://scalability.org/2006/09/a-teraflop-here-a-teraflop-there-and-pretty-soon-you-are-talking-about-real-computing-power/
|
code
|
It seems IBM will be building another new NNSA machine. So whats interesting about this, other than IBM getting good press? Well this appears to be part of a growing wave of heterogenous high performance computing systems. Roadrunner appears to be a mix of COTS Opteron hardware, and Cell based blades as Accelerator Processing Units (APUs).
Why is that interesting? Programming parallel systems is hard. Programming heterogenous parallel systems is … interesting.
Its always about the apps. But off the shelf apps won’t run on this. Building apps for this will not necessarily be easy. But it will likely be worth it.
If you can offload processing to the Cell units that the Cell does well, and run other stuff on the Opteron’s that the Opteron does well, have them all communicate over a high bandwidth low latency fabric, you might just have something there.
We have been working on doing things like this in my day job. Some of our efforts have resulted in better utilization of tightly coupled processor resources, in Scalable HMMer. This is a good direction to go. The question is how to make it easier to program against.
This also ties in to the MPI/OpenMP or more accurately, the parallel API debate and many other similar debates. Generally speaking, if you can make using something easy, people will use it if it adds value to their efforts. Using OpenMP is very easy in most simple cases, and it will add value modulo the restrictions. MPI is harder to use, you have to design with it in mind. Then again it has far fewer restrictions. How would you program APUs and heterogeneous processors with OpenMP? With MPI?
At minimum with OpenMP, you would need to extend basic OpenMP to tag the sections of the code which should be able to reside on the APU and communicate via a shared memory region. So something that you might do is have (with a request for a pardon from my Fortranesque readership)
#pragma omp parallel
#pragma omp for target=apu
/* ... */
and have the compiler generate code for both the CPU and the APU, as well as an APU presence detection (should be done at OS level so we don’t get a million APU drivers all using different techniques of detection) that switches between the two, or even load balances.
Make it simple, let the compiler do the hard work. This forces the APU to have a fixed API or at least implement an API which has a consistent subset across multiple APUs. This also would require very tight coupling between the APU and the processor, say over a nice HyperTransport link,
Of course lots of MPI folks out there are shaking their heads now, as MPI is, according to most of them, the “one true way”. Fine. How do we do this with MPI then? Basically you would have to monkey about with the ranks. Say you assume that you have 1 APU per rank. Then you might be able to do something like negative ranks to represent the APUs. This won’t work once you have more than one APU though. You might need to do something like ranks 0 .. N-1 are for the main threads then N .. 2N-1 are for the first APU threads, 2N .. 3N -1 are for the second APU threads … and so on. The only problem I potentially see down the road is if N gets large enough, 2N or larger might overflow the ints …
Yeah, sure, 2**31 (thats pow(2,31) for the C speakers, isn’t that Fortran notation nice? 🙂 ) processors … Sure we will ever see that. Like we will ever need more than 640k of RAM … 😀
Ok, back to the programming Roadrunner. I am interested in seeing how it will be done. We have some ideas we have been working on related to this. MPI could work, though it would require a little work. Same with OpenMP, but as these processors are in different address spaces, OpenMP is moot for this.
The extending MPI idea might be quite interesting. Need to think on it some more.
And back to the machine in toto. People will use the machine if they can write programs on it and expect them and cause them to perform well. That means it has to be “easy” to some degree to use. Writing in assembly language is no fun, well it lost its fun for me about 20 minutes after I started playing with it in 1985. But if this is how people will need to program it, then the app porting will be slow and painful.
And hopefully the next big machine there will be either Wiley Coyote or Acme Supercomputing.
And again, kudos to IBM. This shows what happens when a company invests in R&D for HPC masquerading as a mass market processor architecture. Remember that the Cell is going into some mass market huge volume boxes for games. Sure its a game processor if you really want to call it that. It can still do a very nice number of single precision and double precision floating point calculations per second. And it doesn’t cost $5000 per unit.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107867463.6/warc/CC-MAIN-20201019232613-20201020022613-00472.warc.gz
|
CC-MAIN-2020-45
| 4,772 | 19 |
http://www.coffeecup.com/forums/web-calendar/amending-when-not-at-home/
|
code
|
This is another great value piece of Software from the Coffee Cup Team. Thanks folks.
I have a question about updating the calendar using my laptop when I am away from home, rather than my PC desktop.
I installed the software on both machines, but even though I have downloaded all the files from my web server, the calendar shows as blank on my laptop, ie there are no entries in it.
Grateful for any help/advice as to how I can populate it automatically with the data I posted to the web calendar.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053865/warc/CC-MAIN-20131204131733-00062-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 499 | 4 |
https://forums.nexusmods.com/index.php?/topic/3250199-request-infinite-batterry-mod-and-preferably-suppressor/
|
code
|
Good day. I would like to request an infinite battery (and suppressor, if possible) mod, or a tutorial how to make one myself.
I am obviously not interested in using Cheat Engine scripts or trainers for this. If I was, I would have been posting this on Cheat Engine forums. Thank you.
EDIT: I need this only for Stealth Camo. So if it would be easier to edit just one item's properties rather than entire battery properties, thats fine with me.
Edited by dahaka471, 25 September 2015 - 06:42 PM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400205950.35/warc/CC-MAIN-20200922094539-20200922124539-00594.warc.gz
|
CC-MAIN-2020-40
| 495 | 4 |
https://gis.stackexchange.com/questions/312232/prevent-user-from-creating-self-intersected-polygons
|
code
|
i'm working on a project in QGIS 3.4.1 Madeira. I want to prevent users from creating polygons with errors (like self intersection). When I digitize a polygon in QGIS i get a mark where the polygon self-intersects (see image), but I can continue and save my polygon without any further warning. Is there an option to prevent that and not ignore the topological error so that the user can redo his digitalization (e.g. pop up)?
In Layer Properties, Digitizing tab, tick on Is Valid Geometry check.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358118.13/warc/CC-MAIN-20211127043716-20211127073716-00157.warc.gz
|
CC-MAIN-2021-49
| 496 | 2 |
https://blueridgeblues.org/how-to-connect-name-cheap-domain-to-bluehost/
|
code
|
How To Connect Name Cheap Domain To Bluehost
Finding a top notch affordable host company isn’t very easy. Every internet site will certainly have various needs from a host. And also, you need to contrast all the attributes of an organizing company, all while searching for the best deal feasible.
This can be a whole lot to kind with, specifically if this is your first time acquiring organizing, or constructing a web site.
The majority of hosts will certainly provide very inexpensive introductory prices, only to raise those prices 2 or 3 times higher once your preliminary contact is up. Some hosts will provide complimentary rewards when you join, such as a totally free domain name, or a totally free SSL certification.
While some hosts will certainly be able to offer better efficiency and also high degrees of safety. How To Connect Name Cheap Domain To Bluehost
Below we dive deep right into the very best cheap host plan there. You’ll discover what core hosting functions are important in a host as well as how to assess your own organizing needs to ensure that you can pick from one of the best affordable organizing service providers below.
Disclosure: When you buy a webhosting plan with links on this web page, we make some compensation. This helps us to maintain this site running. There are no extra prices to you whatsoever by utilizing our web links. The list below is of the very best cheap webhosting bundles that I’ve personally utilized and also examined.
What We Consider To Be Economical Host
When we explain a web hosting plan as being “Inexpensive” or “Budget” what we imply is hosting that falls under the cost brace between $0.80 to $4 per month. Whilst investigating inexpensive hosting suppliers for this overview, we checked out over 100 various hosts that fell into that cost array. We then examined the high quality of their most affordable holding plan, value for money and also client service.
In this write-up, I’ll be looking at this first-rate web site holding business and stick in as much pertinent information as feasible.
I’ll go over the functions, the prices alternatives, as well as anything else I can think about that I assume may be of benefit, if you’re deciding to sign up to Bluhost and also get your internet sites up and running.
So without additional trouble, let’s check it out.
Bluehost is one of the greatest web hosting firms worldwide, obtaining both enormous advertising assistance from the business itself as well as affiliate marketing experts that advertise it.
It actually is a massive business, that has actually been around for a very long time, has a large credibility, and is certainly among the top choices when it comes to host (absolutely within the leading 3, at least in my publication).
However what is it exactly, as well as should you get its services?
Today, I will certainly respond to all there is you require to recognize, offered that you are a blogger or an entrepreneur that is trying to find a web host, and does not know where to begin, because it’s a terrific remedy for that audience in general.
Allow’s imagine, you want to organize your sites and make them visible. Okay?
You currently have your domain name (which is your website location or URL) and now you intend to “transform the lights on”. How To Connect Name Cheap Domain To Bluehost
You require some holding…
To complete every one of this, and to make your website visible, you need what is called a “web server”. A web server is a black box, or tool, that stores all your internet site information (documents such as images, messages, videos, web links, plugins, and other info).
Now, this server, has to get on at all times as well as it has to be connected to the internet 100% of the moment (I’ll be pointing out something called “downtime” later).
In addition, it likewise needs (without getting also fancy as well as right into details) a file transfer protocol typically called FTP, so it can show internet browsers your website in its desired type.
All these points are either pricey, or require a high level of technical ability (or both), to create and keep. As well as you can absolutely head out there and discover these things on your own and also established them up … yet what regarding instead of you acquiring as well as maintaining one … why not just “renting out organizing” instead?
This is where Bluehost comes in. You lease their web servers (called Shared Hosting) and also you introduce a site making use of those web servers.
Because Bluehost keeps all your documents, the firm also enables you to establish your web content monitoring systems (CMS, for short) such as WordPress for you. WordPress is a super prominent CMS … so it just makes good sense to have that option offered (nearly every hosting company now has this option too).
Simply put, you no longer require to set-up a server and after that incorporate a software program where you can construct your material, individually. It is already rolled into one package.
Well … picture if your web server remains in your house. If anything were to occur to it in all, all your data are gone. If something fails with its inner procedures, you require a service technician to fix it. If something overheats, or breaks down or obtains corrupted … that’s no good!
Bluehost takes all these hassles away, and deals with everything technological: Pay your web server “rental fee”, as well as they will certainly care for everything. And once you buy the service, you can after that begin focusing on adding web content to your site, or you can put your initiative right into your advertising and marketing projects.
What Provider Do You Get From Bluehost?
Bluehost provides a myriad of different services, but the main one is hosting certainly.
The organizing itself, is of different kinds incidentally. You can rent a common server, have a dedicated server, or also an online personal server.
For the objective of this Bluehost testimonial, we will concentrate on holding solutions and other services, that a blogger or an on the internet business owner would require, instead of go unfathomable into the bunny opening and also talk about the various other solutions, that are targeted at more seasoned folks.
- WordPress, WordPress PRO, and also shopping— these hosting services are the bundles that enable you to host a website utilizing WordPress and also WooCommerce (the latter of which permits you to do e-commerce). After purchasing any of these bundles, you can begin building your site with WordPress as your CMS.
- Domain name Industry— you can additionally purchase your domain name from Bluehost rather than various other domain name registrars. Doing so will certainly make it easier to point your domain to your host’s name servers, considering that you’re utilizing the same marketplace.
- Email— once you have actually acquired your domain, it makes good sense to additionally obtain an e-mail address connected to it. As a blog writer or on-line business owner, you must virtually never ever make use of a cost-free email solution, like Yahoo! or Gmail. An e-mail similar to this makes you look unprofessional. Thankfully, Bluehost provides you one free of cost with your domain name.
Bluehost likewise offersdedicated web servers.
And you may be asking …” What is a dedicated web server anyway?”.
Well, the thing is, the standard host packages of Bluehost can only so much website traffic for your internet site, after which you’ll require to upgrade your holding. The factor being is that the common web servers, are shared.
What this means is that server can be servicing 2 or more websites, at the same time, one of which can be yours.
What does this mean for you?
It indicates that the single server’s resources are shared, and it is doing several jobs at any given time. As soon as your internet site begins to strike 100,000 site brows through each month, you are mosting likely to require a devoted web server which you can likewise receive from Bluehost for a minimum of $79.99 per month.
This is not something yous should bother with when you’re starting out yet you ought to keep it in mind for certain.
Bluehost Prices: Just How Much Does It Price?
In this Bluehost evaluation, I’ll be focusing my interest primarily on the Bluehost WordPress Hosting packages, since it’s one of the most popular one, and likely the one that you’re seeking which will certainly match you the most effective (unless you’re a significant brand name, firm or website).
The three available plans, are as complies with:
- Standard Strategy– $2.95 per month/ $7.99 regular price
- Plus Strategy– $5.45 each month/ $10.99 normal rate
- Choice Plus Strategy– $5.45 monthly/ $14.99 normal rate
The initial rate you see is the price you pay upon join, as well as the second cost is what the price is, after the initial year of being with the company.
So primarily, Bluehost is mosting likely to charge you on an annual basis. And you can also choose the quantity of years you intend to hold your site on them with. How To Connect Name Cheap Domain To Bluehost
If you choose the Standard plan, you will pay $2.95 x 12 = $35.40 beginning today and by the time you enter your 13th month, you will now pay $7.99 each month, which is additionally billed annually. If that makes any kind of feeling.
If you are serious about your internet site, you should 100% get the three-year option. This means that for the standard strategy, you will certainly pay $2.95 x 36 months = $106.2.
By the time you strike your fourth year, that is the only time you will pay $7.99 per month. If you think about it, this strategy will save you $120 during three years. It’s very little, but it’s still something.
If you want to obtain more than one site (which I highly suggest, as well as if you’re severe, you’ll possibly be getting even more eventually in time) you’ll want to use the option plus plan. It’ll enable you to host unlimited internet sites.
What Does Each Strategy Deal?
So, in the case of WordPress hosting plans (which are similar to the shared holding strategies, yet are extra geared in the direction of WordPress, which is what we’ll be concentrating on) the attributes are as complies with:
For the Basic plan, you get:
- One internet site only
- Protected website through SSL certificate
- Maximum of 50GB of storage
- Free domain for a year
- $ 200 advertising and marketing debt
Bear in mind that the domain names are purchased separately from the hosting. You can obtain a complimentary domain name with Bluehost below.
For both the Bluehost Plus hosting and Choice Plus, you obtain the following:
- Unrestricted variety of internet sites
- Free SSL Certification. How To Connect Name Cheap Domain To Bluehost
- No storage or bandwidth limit
- Cost-free domain name for one year
- $ 200 marketing credit scores
- 1 Workplace 365 Mail box that is free for 1 month
The Choice Plus strategy has an added benefit of Code Guard Basic Back-up, a back-up system where your data is conserved and also duplicated. If any kind of collision takes place and also your site data goes away, you can recover it to its initial type with this function.
Notification that despite the fact that both strategies cost the same, the Option Plan then defaults to $14.99 each month, regular price, after the set quantity of years you’ve picked.
What Are The Perks Of Using Bluehost
So, why select Bluehost over various other host solutions? There are thousands of web hosts, most of which are resellers, but Bluehost is one pick few that have stood the test of time, and also it’s most likely the most popular available (as well as completely reasons).
Right here are the three main advantages of choosing Bluehost as your host provider:
- Web server uptime— your web site will not be visible if your host is down; Bluehost has more than 99% uptime. This is incredibly crucial when it concerns Google SEO as well as positions. The higher the better.
- Bluehost rate— exactly how your server feedback establishes exactly how fast your web site shows on a web browser; Bluehost is lighting quickly, which implies you will certainly reduce your bounce price. Albeit not the best when it concerns loading rate it’s still hugely vital to have a fast speed, to make user experience much better and also much better your ranking.
- Limitless storage space— if you obtain the And also strategy, you need not bother with how many data you save such as video clips– your storage capacity is limitless. This is really essential, since you’ll most likely run into some storage problems later down the tracks, and also you do not desire this to be a trouble … ever.
Lastly, consumer support is 24/7, which suggests despite where you remain in the globe, you can contact the assistance team to fix your website issues. Pretty typical nowadays, yet we’re taking this for provided … it’s likewise really crucial. How To Connect Name Cheap Domain To Bluehost
Also, if you have actually gotten a free domain with them, after that there will certainly be a $15.99 cost that will be deducted from the amount you initially bought (I envision this is due to the fact that it kind of takes the “domain out of the marketplace”, not exactly sure about this, however there probably is a hard-cost for registering it).
Finally, any type of requests after thirty days for a reimbursement … are void (although in all sincerity … they should probably be strict below).
So as you see, this isn’t necessarily a “no questions asked” policy, like with some of the other holding alternatives available, so make certain you’re alright with the policies before continuing with the holding.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588284.71/warc/CC-MAIN-20211028100619-20211028130619-00715.warc.gz
|
CC-MAIN-2021-43
| 13,808 | 82 |
https://docs.microsoft.com/en-us/dynamics365/unified-operations/supply-chain/cost-management/charges-manufactured-item
|
code
|
Display charges for a manufactured item
The constant costs of a manufactured item reflect the operation setup times and the components that have a constant quantity or a constant scrap amount.
The calculated amount of an item's charges can be displayed with the item's unit costs. However, the charges are sometimes displayed as separate fields, and they are not included in the item's unit costs. When the charges appear as separate fields, one field displays the total amount of charges, and another field displays the costing lot size that is used to amortize the amount. The Item price page, for example, displays the charges as two separate fields. However, the Complete page displays the item's total cost per unit, and the amortized costs are included in the unit costs.
The charges for a manufactured item are always included in the item's unit cost for standard cost purposes. They can optionally be included for planned cost purposes. A policy in the costing version enforces the inclusion of charges in the cost of a manufactured item. When you activate an item's cost record, you update the charges for the item's base cost information, which is displayed in the Item price page. The charges are displayed as two separate fields, and they are not included in the item's unit cost. Each activation updates the item's base cost information, even if the activation reflects different sites. Therefore, you should view the base cost information as reference information.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514437.69/warc/CC-MAIN-20181021224001-20181022005501-00192.warc.gz
|
CC-MAIN-2018-43
| 1,478 | 4 |
https://phys.org/news/2015-07-good-quantum-states-bad.html
|
code
|
Good quantum states and bad quantum states
It is impossible to obtain all information about a large quantum system consisting of hundreds or thousands of particles. A new technique allows to describe such systems in terms of 'continuous matrix product states.' With this approximation, the relevant information about a quantum system can be obtained by only a few measurements.
For a long time, quantum experiments were only carried out with a small number of particles. Even the behaviour of single atoms or molecules can be very hard to describe. Today, it has become possible to control several thousand atoms in an experiment, but for theoretical calculations this entails serious problems. The quantum state of such a large system is so complicated that all matter on earth would not be enough to store it in a classical way.
In the journal Nature Communications, scientists from the TU Wien (Vienna) and the Free University of Berlin now present a quantum tomography method, which makes it possible to measure and describe the state of a large quantum system very precisely with just a few measurements. The basic idea behind this new technique is simple: even though the system can be in one of unimaginably many quantum states, it is a very good approximation to ignore most of them.
Many Particles, Many States
The result of a coin toss is either heads or tails. The behaviour of quantum particles, however, is much more complicated. When a quantum system can be in two different states, any mixture of these states is also a physically allowed state. Therefore it is much more complicated to describe the state of a quantum particle than it is to describe the state of a coin lying on the table.
"The larger the number of particles, the more complicated the description of the systems becomes", says Professor Jörg Schmiedmayer from the Vienna Center for Quantum Science and Technology (VCQ) at TU Wien. "The storage capacity required to describe a quantum state grows exponentially with the number of particles. For a system of several hundred quantum particles, there are more possible quantum states than there are atoms in the universe. It is absolutely impossible to write down such a state or to do calculations with it."
But exactly knowing the quantum state is not always necessary. The new theoretical method, developed in Berlin by Professor Jens Eisert's research group, uses a special kind of description for the quantum states - the so called "continuous matrix product states" (cMPS). This special class of states only represents a vanishingly small fraction of all possible states, but from a physical point of view they are particularly important. "This class contains states with realistic quantum entanglement", says Jens Eisert. "Exotic, complicated entanglement patterns between many quantum particles may in principle be possible, but in practice they do not show up in physical systems. That is why we can limit ourselves to the cMPS in our calculations."
For any possible quantum state, there is a cMPS arbitrarily close to the true quantum state. No matter which state is really occupied by the system - the error that occurs by only taking into account the cMPS can be made arbitrarily small. "It is like fractions in mathematics", says Eisert. "The rational numbers, which can be written as fractions, only represent a tiny part of all real numbers. But for any real number, a fractional number can be found which comes arbitrarily close." The number pi is not a fractional number - but the approximation for pi used by a pocket calculator is. For all practical purposes, this is good enough.
Measurements Yielding a Quantum Picture
By restricting oneself to the cMPS, it becomes possible to read out the state of a large quantum system in an experiment. "We cannot gain complete knowledge about the system from a finite number of measurements, but that is also not what we need", says Tim Langen, who led the experiments in Schmiedmayer's research group. "With our new method, we can reconstruct the quantum state from only a few measurements. The precision is so high that we can use this approximate state to predict the result of further measurements." This technique is called "quantum tomography" - much like computer tomography in a hospital, where several pictures are used to calculate a 3D model, quantum tomography uses several measurements to calculate a picture of the quantum state.
The new method does not only open up new possibilities for many-body quantum physics. It could also path the way to new quantum simulators - quantum systems, which are prepared in such a way that they can be used to simulate other quantum systems that cannot be controlled by standard methods. "When two different quantum systems can be described with the same basic formulas, then we can learn a lot about one system by studying the other", says Schmiedmayer. "We can control thousands of atoms on our quantum chip, this system is thus very well suited for future quantum simulations."
Journal information: Nature Communications
Provided by Vienna University of Technology
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00133.warc.gz
|
CC-MAIN-2023-40
| 5,107 | 14 |
https://www.intersysconsulting.com/blog/is-data-modeling-only-about-modeling-data/
|
code
|
Velocity is a key factor in consulting and projects delivery. This is no different for data engineering/science projects. The urge to develop a “functional” product plus the creation of new tools such as Azure Machine Learning Studio have made it quite easy to create a model for data. With a “plug and play” framework you can easily preprocess your data, train, “validate” and test your model in order to deliver a product as fast as possible. With all this possible, one question I’d like to ask is, “Is data modeling only about modeling data?”
In order to answer this question let’s take a look at a use case where focusing only on data modeling has been the cause of a bottleneck, and a narrow one in my opinion.
Use Case: A biased criminal justice system.
Proposed solution: An impartial and objective AI algorithm to judge without the inevitable human bias.
Sounds good, right? It just might work. Let’s train a well-known logistic regression model with the U.S. Supreme Court database that holds information on court cases dating back to 1791. Better yet, let’s train a sophisticated deep neural network. Once we have our data model trained and tested, we can start using it on new court cases to make impartial judgments without human intervention. After all, an algorithm does not have feelings or emotions and its decisions are objective and neutral with no personal preferences or bias.
Outcome: The U.S justice system turned to technology for help (guided by the popular idea of “Algorithm neutrality”), just to find out that the algorithms had a remarkable bias too.
So what happened? The answer is simple:
In order to develop an AI algorithm, human-created data sets are used. If the underlying data is biased and reflects human preferences, the algorithm will also learn these inclinations. In other words, AI learns what you’re teaching it. In this particular case, the AI algorithm, trained with historical court cases, learned from what humans (judges) have decided in the past. If the judges had a bias at court, the neural network will find and use this pattern while making new judgments. There is a saying in data science: “garbage in, garbage out” or in this specific case: “Bias in, Bias out.” Machine learning algorithms are not magical. If you provide them skewed information, they will not fix the skews by themselves. If you are not careful enough, you risk automating the same biases you were supposed to eliminate.
When put this way, algorithmic bias sounds obvious, but many companies at the forefront of AI research have already encountered this very problem. For example, Google translation’s algorithms include gender stereotypes, LinkedIn’s advertising program shows preferences for male names, and Microsoft’s chatbot named “Tay” spent some hours learning from Twitter to adopt an anti-Semitic posture, among other cases.
So far researchers and data scientists have mostly focused on the learning part of the process, searching for new, better and faster ways to train an algorithm to learn. They have indeed progressed at this, however, is having the ability to learn all that matters? What about the teaching part? What would be the point of achieving the perfect learning algorithm if you only teach it with poor, outdated, unchecked or biased data?
It would be like teaching Albert Einstein all the dates of births of historical characters, sometimes even teaching unimportant information of fictional characters. In the human learning process, the teacher is the one that has the bigger responsibility. So, shouldn’t the same approach be used in a machine learning process?
There are some contexts where the problems of algorithmic bias and the opacity of algorithm’s decisions might not be harmful. For example, Netflix’s AI deciding which movies to recommend to you, Spotify recommending songs to listen to, and Amazon or Facebook showing you advertising based on previous patterns. However, there are other contexts where the awareness of these problems is crucial. Some of these situations include using AI to hire people at companies or to admit them to universities, using algorithms at banks to decide who is worthy of financing, or using AI to make court decisions.
It may be wise to take a step back in the path to full AI adoption in sensitive situations and consider a model of hybrid intelligence. We may not be ready for full AI adoption just yet. I believe it is too soon to let badly taught, black box algorithms drive the criminal justice system or the labor market by themselves. At this point, there is barely a federal law or organization that sets standards or performs inspections of AI algorithms making important decisions. If created, an such an organization operate similar to the way the FDA oversees new drugs and medical devices.
I know at this point you might be wondering, should we just eliminate AI as a possible solution to human bias and prejudice? My answer is: of course not, but I think we might need to attack the issue with a different approach. With state of the art AI we could get better results taking the “Hybrid Intelligence” approach. By this I mean humans and machines collaborating more satisfactorily. For example, we can use AI and Natural Language Processing (NLP) to develop a virtual assistant to team up with lawyers and judges while going through cases. The virtual assistant would have a knowledge base of not only previous cases, but it would also be up to date on the latest laws and regulations. It would be able to perform complex searches by concepts considering the context, instead of simple keyword searching.
If you are not aware of current machine learning limitations, and do not take them into account while modeling data, you will probably get deficient models that could indeed aggravate social inequalities. However, well-built and, most importantly, well-taught algorithms can lessen these limitations and consequential troubles. At Intersys Consulting, we are aware of this. Our expertise on the matter allows us to not only develop the best machine learners but also be great teachers, knowledgeable of how to distinguish between good and bad teaching material (data). We do not let swiftly designed algorithms blindly drive your business, but instead can help you take your AI technology to the next level.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655888561.21/warc/CC-MAIN-20200705184325-20200705214325-00413.warc.gz
|
CC-MAIN-2020-29
| 6,380 | 15 |
https://ec2-35-155-159-131.us-west-2.compute.amazonaws.com/jobs/software-engineer-aws-devops/
|
code
|
Software Engineer (AWS/DevOps)
Epsilon Data Management, LLCApply
As the Software Engineer, you will be a part of an interdisciplinary team that creates stellar data-driven cloud-based solutions. You will be responsible for the success of all technical and functional aspects of a project. We process billions of events every day using Scala, Python and Apache Spark and a variety of AWS and Azure services. We are building a new product offering which will require skills across the development stack from UI to backend data storage & processing. This is an opportunity to work on an exciting fully cloud based solution and shape a new product area.
- 100% of time spent on actual coding, refactoring and improving our solution
- Contributing to the technical design and implementation of practical, maintainable project solutions
- Participating in design reviews and recommending improvements
- Providing support in all phases of SDLC
- Collaborating with other Engineers in planning, prioritizing and executing tasks within deadlines
- 2+ years of hands-on development experience with Java or another high-level language. Bonus if you have experience with Scala, Python and/or Golang.
- Knowledge of Big Data stack of technologies, including Hadoop and Spark would be a plus
- A truly strong background in the computer science and general programming
- Experience with distributed data processing and management systems would be a plus
- Proficiency in Linux/MacOS environment as development platform
- Experience deploying and utilizing cloud-based services using AWS or Azure is a plus
- Must have solid Linux skills including shell commands, shell scripting
- Some basic understanding of PowerShell would be beneficial
- Solid experience in testing methodologies, test-driven design and the creation of effective and reliable test cases
- Excellent team skills
Epsilon is the leader in outcome-based marketing. We enable marketing that’s built on
proof, not promises.TM Through Epsilon PeopleCloud, the marketing platform for personalizing consumer journeys with performance transparency, Epsilon helps marketers anticipate, activate, and prove measurable business outcomes.
Powered by CORE ID,® the most accurate and stable identity management platform representing 200+ million people, Epsilon’s award-winning data and technology rooted in privacy by design and underpinned by powerful AI. With more than 50 years of experience in personalization and performance working with the world’s top brands, agencies, and publishers, Epsilon is a trusted partner leading CRM, digital media, loyalty, and email programs. Positioned at the core of Publicis Groupe, Epsilon is a global company with over 8,000 employees in over 40 offices around the world. For more information, visit epsilon.com.
Follow us on Twitter at @EpsilonMktg.
We see a world where modern marketing is built on truth, trust and transparency,
not smoke and mirrors. We want to be part of a world where consumers are
recognized and respected, privacy is protected and integrity is expected.
We enable marketing built on proof, not promises. We create robust customer
experiences that drive performance at the individual level, and help brands make
smarter decisions that drive real business outcomes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476399.55/warc/CC-MAIN-20240303210414-20240304000414-00871.warc.gz
|
CC-MAIN-2024-10
| 3,277 | 28 |
https://annafest.org/in/celine-dion-songs-mp3-free-download-skull/sugihbareng
|
code
|
Download Celine Dion Songs Mp3 Free Download Skull Now
|-|annafest.org|-| Download Celine Dion Songs Mp3 Free Download Skull MP3. You can Download celine-dion-songs-mp3-free-download-skull.mp3 for free. Céline Dion - I Love You (Official Audio) mp3 Download. See the most download MP3, popular songs, new releasing music download and popular artists. Click the download button to download or save the file in CelineDionVEVO, 05:34, PT5M34S, 7.64 MB, 14,289,412, 37,934, 2,789, 2015-02-24T22:21:06+0000, %createdAt%.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056120.36/warc/CC-MAIN-20210918002951-20210918032951-00234.warc.gz
|
CC-MAIN-2021-39
| 516 | 2 |
https://airvolute.com/dronecore-px/
|
code
|
Next generation autopilot
Visit our documentation for further details
Modular design: single motherboard with various extension boards
Unique modular design allows manufacturers to combine a single motherboard with various extension boards with all required peripherals and connectors.
Various hardware configuration options
Jetson Orin NX™ with support for various CSI and USB cameras (IMX477, OV9281, Flir Hadron, Intel Realsense, Ximea, Allied Vision, etc.)
Dual flight controller architecture for different use cases
- The Cube Pilot (Orange+ or Blue) as primary autopilot
- STM32H7 onboard FMU as secondary autopilot
Powerful SDK and easy-to-use API interface
- ROS2-based SDK ready to use for autonomous flights
- Unified Python API for various software layers (hardware access, localization, navigation, AI, etc.)
- Open Source architecture
Various vehicles support
Support for different types of drones like VTOL, copters, planes, rovers, etc.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818835.29/warc/CC-MAIN-20240423223805-20240424013805-00090.warc.gz
|
CC-MAIN-2024-18
| 953 | 15 |
http://www.cliqueio.com/
|
code
|
You've heard of LinkedIn. You've heard of Handshake. But now there's a new sheriff in town, Clique! With Clique, students are in power. We have created a site where students can team up with other students to work on different types of collaborations like school projects, passion projects, and so on. Everything from posting a project to applying for a project to chatting with the project leader is all possible with Clique!
So sign up and start applying for projects today!
I am a computer science student at SUNY Stony Brook University, looking for opportunities to grow as an aspiring software engineer and as a person!
I'm happy to be a part of this journey with the Clique.io team and we hope our platform will help create the foundations for great ideas.
I'm currently a sophomore student at Stony Brook University, pursuing a bachelors degree in Computer Science. I enjoy the process of making Clique.io as it provides a platform for many others to collaborate and radiate their creativity and energy and, at the same time, helps me improve as an aspring software developer.
I am currently a student at NYU majoring in computer science. I am passionate about technology and how it can make our lives more efficient. Personally, I am interested in working in web development and projects involving artificial intelligence. I've loved using computers ever since I was a kid and now am grateful to work with such a great team at Clique.
I am currently a sophmore at Stony Brook University. I aspire to be a software engineer, hoping to change the world with every line of code I write. It is a sight for sore eyes to see how much Clique.io has grown since its beginning phase.
I am an aspiring Computer Science at NYU student minoring in Cyber Security who loves the process of creation. From this love, I recognize that it takes major effort and dedication to fulfill any great idea. My goal is that this web service will allow others to achieve their goals.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988802.93/warc/CC-MAIN-20210507181103-20210507211103-00237.warc.gz
|
CC-MAIN-2021-21
| 1,965 | 8 |
https://www.ghacks.net/2020/06/03/firefox-78-set-firefox-as-the-default-pdf-viewer-on-windows/
|
code
|
Firefox 78: Set Firefox as the default PDF viewer on Windows
If you use the Firefox web browser to view PDF documents, you may have noticed that it is not possible to make it the default application for PDF files on Windows.
While you can open any PDF document in the Firefox web browser, it is not possible to associate the browser with the file type to load PDFs in the browser automatically, e.g. on double-click.
Firefox's installer does not associate PDF files with the browser, and that has been an intentional decision according to Mozilla.
The installer is responsible for registering support for default file associations on Windows. We've always intentionally left PDF out of that list, but that decision may be changing soon, so I'm moving this bug so that it can find its way into the installer team's planning.
Mozilla does not reveal why it has made the decision, but announced plans to change the handling of PDF file associations in Firefox 78, at least on Windows 10.
If you run Firefox 78 already, e.g. as a Nightly, Beta or Developer edition, you may be able to set Firefox as the default PDF handler already, e.g. when downloading a PDF document to the local system.
A new "open with" Firefox option should be displayed at the top and you may check the "Do this automatically for files like this from now on" option to automate the process and have Firefox open PDF documents automatically.
Firefox may also be associated with the PDF file type in Windows 10's Settings application. Just open Settings > Apps > Default Apps > Choose default apps by type, scroll down to PDF (why still no search on the page, Microsoft?), select PDF, and pick Firefox from the list of options to make the application the default PDF handler on the system.
Most Chromium-based browsers add themselves as the PDF handler on Windows 10 systems.
The addition of the option is a welcome change. While it may only be useful to a small set of Firefox users, those who want to set Firefox as the default PDF handler, it is a good move as its puzzling why Firefox is able to open PDF documents but cannot be set as the default program for the file type.
Firefox users who install the browser anew or upgrade the browser on Windows will benefit from the change.
I prefer to use a standalone PDF tool to view documents. Sumatra is my tool of choice provided that the PDF documents don't have advanced functionality that Sumatra does not support.
Now You: How do you open PDF documents? (via Techdows)
I have Sumatra PDF, why would I want a crippled, disabled wannabe PDF viewer as my default?
Came here to say the same thing. Sumatra PDF is the best.
+2 Great bit of gear, used it for years.
I used to use Sumatra, but since Okular came out on Windows I have been using that since I also use that on my Kubuntu systems.
SumatraPDF here as well (latest 3.2.0 (x64) version).
Generally speaking I have a rule which is to never associate a file type with a browser (besides of course html and the like within what is assumed as one’s default browser). A browser is a browser, not a computer and I don’t share the concept of universal integration. Divide, compartmentalize ans security/privacy will smile.
Regarding Firefox’s native PDF viewer, I encounter no issues besides one : some PDFs will require browser.display.use_document_fonts to be true which is bothering if you’ve set it to false as I have. Other than that, no problem.
FF should concentrate on the browser and stay away of applications where they have little experience.
Also an introductory course in logical thinking and concise writing would not hurt.
Firefox’s installer does not associate PDF files with the browser, and that has been an intentional decision according to Mozilla.
The installer is responsible for registering support for default file associations on Windows. We’ve always intentionally left PDF out of that list, but that decision may be changing soon, so I’m moving this bug so that it can find its way into the installer team’s planning.
What was it: a wrong decision or a bug???
This idiotic trend of stuffing everything into the browser taken to an extreme. Using stupid crap like Electron which is just a window with a Chrome wrapper running a webpage, or expecting your browser to be a dedicated media player instead of getting one separately. I’m actually surprised better sense prevailed at Mozilla.
Why in the world would I want to view a .pdf file in a browser? I’ve gone to great lengths to ensure that this kind of thing doesn’t happen on my system. Browsers are for .htm files, not .pdf files. I open all my .pdf files in PDF-XChange Viewer (freeware.)
The question is not why you’d want to use web browser as pdf viewer (which is a ridiculous idea anyway) but why They want you to use it as such; my bet is all about tracking and profiling once again.
Well they have their Activity Stream technology and all the potential for data mining sprouting from that. Theres chatter about contextual AI being worked on in the browser. These things need to be watched for abuse, huge new oportunities for sneaking out and monetising data and behaviour.
Adding the ability for a browser to safely view (only view, not modify) certain “web” files without needing plugins or helpers was a good idea. (The web is full of .pdf files.) But one hardly needs to be able to integrate the browser as the default system viewer for such files; it’s easy to use a browser as a .pdf viewer w/o this. It’s just an extra layer that’s unneeded, efficient though it may be workflow-wise.
(Of course, Chrome does this already [with ChromeOS].)
Using a web browser as PDF viewer is a ridiculous idea, as someone remarked.
Linux users may want to try qpdfview.
Just set your default pdf viewer with the operating system or simply turn off the browser feature.
Some people find it easier and quicker to use it within browser.
No need for such a hoorah about it.
More options for tracking and selling data, oh mozilla you have done it again
Personally I would strongly suggest not making Firefox your default pdf viewer. The last 8 years they have never fixed the autorotate when printing PDF. So you’ll be frustrated as hell as you constantly manually change the orientation to print.
Huh? I’ve been using Firefox as my default pdf viewer for at least a year now.
Why do I open pdf files in Firefox? It’s super quick to open pdf files since Firefox is always running, scrolling is very smooth and it works perfectly with my workflow thanks to opening in a tab right next to what I’m currently doing.
I view most of my PDFs in Firefox. It’s always open so they open instantly. I have SumatraPDF for the image-heavy ones (like scanned books with hundreds of pages), because it’s faster when rendering such PDFs.
The idea of rendering PDFs with the browser is acutally pretty smart. The process is similar to what the browser does when rendering HTML (https://andreasgal.com/2011/06/15/pdf-js/) and being more secure then PDF readers is another benefit.
Using Sumatra for years. Yes the workflow might be faster but I have no need for tracking in the browser.
I just noticed that Firefox 78 has associated PDF with Firefox, and I don’t like that.
It’s enough to know that such an association is possible, then it’s up to the user to decide, but doing this automatically is rude.
I re-associated PDF with Sumatra.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00014.warc.gz
|
CC-MAIN-2023-14
| 7,418 | 47 |
https://eclipseaudio.com/2016/04/22/fir-designer-1-0/
|
code
|
After many Alpha and Beta releases, FIR Designer 1.0 is now available! (Thanks very much to all the Beta testers.) Go to the FIR Designer page to download binaries for Mac and PC, and to purchase a license.
Changes since Beta 4:
- New: SysTune overlay (STO) file import.
- Update: UI tweaks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711114.3/warc/CC-MAIN-20221206192947-20221206222947-00668.warc.gz
|
CC-MAIN-2022-49
| 291 | 4 |
https://github.com/arendst/Tasmota/commit/89825907d05b8e3816f22ad1194734b8bc9327da
|
code
|
Please sign in to comment.
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add support for OBI smart socket
Model tested: WFG-1 Models maybe working: WFF-1, WFE-1, WFI-1, WFD-1, WFR-1, WFA-1, WFU-1 Manufactured by: Cixi Yidong Electronics Co. Ltd - http://www.cn-yidong.com/ Sold by: OBI DIY market in Germany - https://www.obi.de/
- Loading branch information
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991659.54/warc/CC-MAIN-20210516013713-20210516043713-00430.warc.gz
|
CC-MAIN-2021-21
| 426 | 5 |
https://community.nintex.com/thread/12749-check-in-item-step-does-not-execute-synchronously
|
code
|
Hi, I have a Nintex list workflow where at some point I check in the item. The next step is a webcall that I created, which will move the document to a document set that is created on the fly.
The problem is that in my webcall I get an error ",The file <my file> is checked out for editing by <my user>".
which I think can mean only one thing: The "Check in item" step hasn't finished yet.
Is it executed asynchronously? And if so, can I change that behaviour so that it works synchronously?
Many thanks in advance for your input/suggestions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583700734.43/warc/CC-MAIN-20190120062400-20190120084400-00342.warc.gz
|
CC-MAIN-2019-04
| 542 | 5 |
https://archive.ory.sh/t/50959/i-read-that-ory-kratos-supports-registration-and-user-profil
|
code
|
I read that ory kratos supports registration and user profile, does it mean all the user details should be in kratos db, or should they be saved in app db and just minimal profile details in kratos? What is the recommended approach. I guess we could either, but keen to know what do people do in general?
10/02/2021, 9:08 PM
10/04/2021, 6:55 PM
Traits can be modified by the user, so they are useful for storing user attributes that the user has full access to read and modify, such as their first/last name, phone number, etc. Sensitive attributes that could control whether a user has access to perform elevated privileges, such as an "admin" flag or role should not be stored as traits.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817146.37/warc/CC-MAIN-20240417075330-20240417105330-00594.warc.gz
|
CC-MAIN-2024-18
| 689 | 4 |
http://sisterhoodftw.blogspot.com/2009/01/were-cultured-thursdays-techgeek.html
|
code
|
Note: This post contains a lot of links that leads to very complicated Wikipedia pages (obviously updated by geeks), and an excessive use of abbreviations. Oh btw, the image says sisterhoodftw in l33t5p34k. :D
I was thirteen years of age when I told myself that I will not use mIRC, ICQ and MSN, because they are vile, evil devices lurking on the internet that do me no good.
Today I eat my shorts.
Also, let me introduce you to (if you have not known about) this wonderful thing called RSS - our RSS feed is right there on the right, and it makes keeping up with updates much easier. (: (Sodabug: I don't have a clue how to use RSS btw, I am the n00b of the two of us).
Indeed, the internet has changed the way we communicate as well, through chatrooms, instant messengers, internet forums, emails(now with nearly unlimited storage spaces), tagboards (lol), Twitter and Facebook. Communication technology includes SMS-ing, MMS-ing, GPRS, Bluetooth, Skype, webcam-ing,and so much more. All of them are developed to enhance our lives, make it more effective, efficient, etc.
I've learnt and appreciated these technologies even more, especially when staying overseas, to keep in touch with the family, or even back in Singapore, to keep in touch with the Perth loves. Definitely, with no means should we hide behind the monitor every day and night and live life - no amount of technology will amount to the same impact of a real human touch, a real spoken word. And of course, it should not rule your life - God should!
SFTW was a thought in the air that concurred in an MSN conversation with Sodabug, but everything was only crystallized when we sat down for a cuppa and talked it through in person. And when one of our new year resolutions said to give more time "to living life on the outside and not through the medium of the internet", we do mean it. It is true - to experience life with people, to spend time with God, get inspired, on fire, passionate and come back here to share it is way better/authentic/honest than conjuring up something from the figments of our imaginations that we've never been through before.
Gah, there's so much to write about these internet culture stuffs. So Jess has very much "kindly" let me write next Thursday's post - internet persona vs real life, how MSN Messenger (now known as Windows Live Messenger) could have possibly saved your life or killed you in various circumstances.. and yes. I know that you know what I am talking about. (Of course unless you've not been on MSN long enough to know that, or that you've known about it and thus abstained from Windows Live Messenger)
Let me hear your thoughts about how very pleased/mortified/appreciative/frustrated/meh/etc you feel about instant messaging, and why so. Feel free to share your experiences with you like, and if you like some privacy, email me at potsandkisses [at] gmail [dot] com yes?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708664942/warc/CC-MAIN-20130516125104-00016-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 2,890 | 9 |
https://mail.twiki.org/do/view/TestCases/TestCaseEmptyGroupTreatedAsNoGroup
|
code
|
NOTE: This is the TestCases web. You cannot edit any topic named "TestCase..." or "Web..." in this web, you can only create new topics. Any topics you do create that are not checked into subversion may be deleted by anyone, at any time.
Description: testcase for the bug reported as TWiki:Codev/InvalidALLOWWEBVIEWTreatedAsEmpty
Manual test. Read all the instructions before
- Make sure the GROUP definition in AnInvalidGroup is empty
- Edit this topic and uncomment the following line
# * Set ALLOWTOPICVIEW = AnInvalidGroup
- Save the topic
- If the bug exists, you can still access the topic.
- If the bug does not exist, you will not be able to view or edit the topic again from the browser. You can get access by adding yourself into the group in AnInvalidGroup
- Edit this topic and put the comment back
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474688.78/warc/CC-MAIN-20240227220707-20240228010707-00743.warc.gz
|
CC-MAIN-2024-10
| 809 | 10 |
https://discourse.aurelia.io/t/using-ssr-without-webpack/3186
|
code
|
I read the documentation about SSR and from what I understand, I need to use webpack to use SSR. Sadly my project isn’t currently using webpack. Do I have to switch to use SSR? I searched github and this forum but couldn’t find the information.
I don’t think you need to use webpack for this. As long as the loader is compatible, it will work just fine I believe
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147647.2/warc/CC-MAIN-20200228200903-20200228230903-00149.warc.gz
|
CC-MAIN-2020-10
| 368 | 2 |
http://www.mailenable.com/forum/viewtopic.php?f=5&t=42582&p=113411
|
code
|
For any other discussion relating to MailEnable.
1 post • Page 1 of 1
I have a web service that sends emails on behalf my users. For domains that implement a DMARC policy I need to construct the email such that the FROM field includes an email address from my domain and I need to stick the user's (the person I'm sending the email on behalf of) email address in the REPLY-TO field. This works fine for most cases and I believe is the standard practice. The problem I'm having is when the user tries to send an email that gets bounced for some reason. Usually an incorrect email address. The problem is that the bounce notification, NDR, gets sent to email address in the FROM field, which is my service's mailer email, instead of the email in REPLY-TO field, which is user's / sender email. Because of this the if the user has bad email addresses recorded they are unaware of it, because they don't actually receive the NDR. My question is this. Is there a way to configure mail enable to send the NDR to the address in the REPLY-TO field instead of, or in addition to, the FROM field? I see a setting that allows you to set an additional email address to deliver NDRs to on the SMTP Properties => Delivery dialog, but this is a static value. I'd prefer not to have to write a script that parses all NDR's for the REPLY-TO field and then forwards it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400197946.27/warc/CC-MAIN-20200920094130-20200920124130-00647.warc.gz
|
CC-MAIN-2020-40
| 1,353 | 3 |
https://codepen.io/AnalogAyub/details/AIoba
|
code
|
Some attention to detail, an exercise in minimalism for season three of The CodePen Pattern Rodeo.
<hr> element is used to add some finesse to a responsive and beautifully typeset article.
Added functionality on hover of the
hr similar to that of Kudos. Unfortunately, the JS library I'm using for the hover intent is a little buggy, and it times correctly 66% of the time.
I wanted to add extra functionality to the
hr but @jakealbaugh filled a lot of use cases and @trhino killed it with the progress bar. I already had a progress bar, and I didn't want to make that redundant, so I went with something like Kudos. It could be used to like portions of text or to add them to a favourites/bookmarking tool.
If you appreciate it, throw me a vote by hearting this pen.
(oh, and the
::selection is pink [blue in the dark version] just for fun)
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987795253.70/warc/CC-MAIN-20191021221245-20191022004745-00166.warc.gz
|
CC-MAIN-2019-43
| 841 | 9 |
http://frontlinesoftwaredev.blogspot.com/2010/12/quick-tip-linq-queries-require.html
|
code
|
Recently I was asked by a colleague to look at a poorly performing LINQ query that was taking an unreasonable amount of time to execute (> 3 min). It didn't require much investigation to see that the query needed reordering of its joins and limiting of the elements returned. Once we rearranged the joins (inner joins first!) and limited the elements returned in the select, the query times dropped to under a sec.
This made me review some of my own LINQ queries and sure enough I had often made the same mistakes as my colleague did. I bet if you review your own LINQ queries you may find the same issues.
Lesson learned by me today? You should take care of how you form your LINQ statements. LINQ is just different enough to make you lose sight of the fact its a query language.
See my earlier post on SQL query optimization. The tips outlined in this post will apply to LINQ queries as well.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592861.86/warc/CC-MAIN-20180721223206-20180722003206-00398.warc.gz
|
CC-MAIN-2018-30
| 894 | 4 |
https://quizlet.com/3278373/test
|
code
|
5 Written questions
5 Matching questions
- mental rotation
- parallel processing
- neurological equivalence
- implicit encoding
- perceptual equivalence
- a -A task in which participants are presented with a rotated figure and must discern whether the figure is normal or, say, mirror-reversed. Participants apparently must visualize the figure rotated to an upright position before responding.
-The response time is linear with how many degrees the subject has to mentally rotate the pictures (i.e., the less necessary the rotation, the quicker the response time)
- b -between imaging processes & seeing
1. Higher activity in occipital lobe and posterior cortex during imagery tasks (including dreaming), based on:
a-Cerebral blood flow (Roland & Friberg, 1985; (but not during mental arithmetic or imaging a tune)
-either way you do math, you do it mentally, and occipital lobe will light up
-sometimes, when you are imaging a tune, your auditory cortex will light up. For ex: if you are listening to a song on the radio and it cuts off, you will keep singing the song, if you know it
b-PET Scans (Goldenberg et al., 1990; Kosslyn et al., 1993) - will use more glucose
*visual questions caused occipital cortex to light up, but factual/imperative questions did not
*can also use fMRI
ex: Pine trees a darker green than grass?
-you have to generate an image of both to know which is darker.
ex(p2): Is the categorical imperative an ancient grammatical form?
-this question does not make you generate an image
2. Creation of visual images activates occipital lobe (Kosslyn & Ochsner, 1994); Kosslyn, Thompson, Kim, & Alpert, 1995).
**Transcranial Magnetic Stimulation (TMS) to area 17 interrupts imaging (Kosslyn et al., 1999).
3. Many Agnosia patients (like John and L.H.) report that they don't dream, and can't image; those with achromatopsia report that they don't image in color (Farah)
-parallel deficits in imaging and perception for many patients (ex. Oliver sachs who mistook his wife for a hat)
4. Many Hemispatial neglect patients also "neglect" the left side of space in their images.
- c -spatial relations can be implicitly represented in a picture/ image (without explicit attention ever having been paid to the spatial relations).
- d -The processing of several aspects of a problem simultaneously; the brain's natural mode of information processing for many functions, including vision. Contrasts with the step-by-step (serial) processing of most computers and of conscious problem solving. (Myers Psychology 8e p. 210)
- e -imaging is like seeing (with a "mind's eye"); the same 'visual screen' is used
1. Perky's (1910) tomato/leaf/banana experiment
2. Farah (1985), like Perky (1910), found that Ss found it easier to perceive a low-contrast letter (an H or a T) if they had been imaging that letter.
5 Multiple choice questions
- (Shepard, Kosslyn, Finke)
-mental images are Analog/ Geometric representations of visual stimuli; and are "functional isomorphs" to Euclidean space (Shepard)
-*visual imaging is functionally equivalent to seeing, with our "mind's eye"
- -A term used in logic to describe the content of assertions. Assertions are non-linguistic abstractions from sentences and can be evaluated as either true or false.
-The nature of ____________ is highly controversial amongst philosophers, many of whom are skeptical about the existence of _____________.
-Many logicians prefer to avoid use of the term, in favour of using sentences
- -Represents like pictures (not like sentences).
-Location, size, and distance are arranged in an image as they are in physical space.
--spatial relations among objects in an array are preserved
--1) Intramodal Interference
------Kosslyn: image & perception share a "visual buffer"
--------a. Brooks (1968)
----------Visual/Verbal Task x Visual/Verbal Response
- -The steps in the processing of sensory information that operate sequentially, an item at a time, on the available sensory information.
- States that imagery is like perception, in that images retain some of the sensory qualities of perception.
-There is a more or less direct relationship between representation and referent.
-Spatial relationships are also directly captured.
-Relations represented implicitly.
-Different kind of representation for each sense.
5 True/False questions
functional equivalence → don't know 2.
Demand Characteristics → (Kosslyn, Reiser, Farah, Fliegel, 1983)
-a. Takes longer to construct more detailed images, or those described as having more parts, e.g., "two overlapping rectangles" vs. "five squares in form of a cross"
-----Four columns of dots, 3 per column, vs. Three rows of dots, 4 per row
-b. The smaller the image size (or smaller the part/detail asked about), the longer the RT
--does a rabbit have ears, vs.does a rabbit have whiskers? (more obvious in our image generation that a rabbit has ears)
(also structural equivalence)
intramodal interference → (part of spatial equivalence)
-Kosslyn: image & perception share a "visual buffer"
a. Brooks (1968)
--Visual/Verbal Task x Visual/Verbal Response
RT (in sec) as a function of Task x Response Mode
*table shown with this info*
*(also implicit encoding of spatial information)*
structural equivalence → -the structure of Images is like that of actual perceived objects, and can be re-organized & re-interpreted.
-Images are analogous to 2-1/2 D sketches.
--Images are assembled; assembly based on description (and interpretation) of component parts
--more complex images take longer to generate
conceptual-propositional theory → A. Theoretical Claims:
1. ALL information stored in Propositional codes
--sentence-like: CHASED (Dog, Cat)
--it is these propositional codes which do all the work when we answer visual-spatial questions?
2. All spatial information must be Explicitly represented, or able to be inferred from other explicitly-stated propositions:
BEHIND (Jim, Todd)
BEHIND (Annie, Jim)
3. All information stored is conceptually dependent.
-E.g., Piaget's children without knowledge of
Geocentric levels in tilted beaker experiment
4. Epiphenomenalism: though people may have a subjective experience of having generated an image, the image itself is non-causal to being able to answer an imagery-type question
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471983578600.94/warc/CC-MAIN-20160823201938-00278-ip-10-153-172-175.ec2.internal.warc.gz
|
CC-MAIN-2016-36
| 6,259 | 81 |
http://streetlucas.xyz/archives/2832
|
code
|
Jellynovel The Bloodline System txt – Chapter 298 – Causing Disorientation (Side Story 3) pizzas beginner suggest-p2
Gallowsfiction The Bloodline System update – Chapter 298 – Causing Disorientation (Side Story 3) lighten unite propose-p2
Novel–The Bloodline System–The Bloodline System
almighty coaching allahabad
Chapter 298 – Causing Disorientation (Side Story 3) rebel hateful
They had been searching for him because they originated right out of the hover busses but hadn’t identified him once since that point.
The sole motor vehicle kept now was the plane which has been very incapable of moving everyone, the gang included.
He landed a kick in the actual pectoral portion of the gang participant sending him traveling by air in reverse.
“What am I taking a look at?” The bald person required.
Irradiations; Sand and Spray
“What am I checking out?” The bald gentleman inquired.
He threw out his left fist to the bald’s man deal with. However, the bald gentleman found his fist with no trouble and began twisting his arm for the facet.
He threw out his eventually left fist towards the bald’s guy confront. On the other hand, the bald person stuck his fist without trouble and began twisting his arm towards the section.
This person was obviously Gustav.
They had been looking for him since they got from the hover buses but hadn’t seen him once since this time.
Section 298 – Producing Disorientation (Area History 3)
About fifteen of them directed their weapons at the gang participant while three lifted him up forcefully before inserting him on his knee joints before the hairless male.
The good thing is for your gang, a number of them trapped wind from the circumstance very early and eventually left the convoy cars just before the very last explosion, so there seemed to be still many of the gang associates left behind.
A compact hole could be seen in the earth.
The Bloodline System
Your entire area was suddenly dyed in red fireplace, producing every person to be dumbfounded as they quite simply pondered that which was going on.
He could already show that the wasn’t the work from the MBO or any ability mainly because they wouldn’t threat the lives in the children to simply blow up their autos.
The Natural Philosophy of William Gilbert and His Predecessors
Bone tissue popping seems began to engagement ring out when he slowly brought up the gang member’s palm up while compressing.
young god divine armaments wiki
However, she couldn’t aid but think about the opportunity since she knew how daring Gustav is.
A syringe full of purplish water came out in their fingers, and then he stabbed it forward for a fast speed on the throat with the hairless gentleman.
“Cheif!” “Cheif!” “Cheif!”
A compact spot could possibly be viewed in the earth.
“Hnnngggh!” Muffled sounds of suffering may very well be heard from under the helmet because the gang new member used freeing himself out of the bald’s guy hold, nonetheless it was verifying tough.
He used his finger to remember to brush up a little bit speck of Gustav’s blood stream and placed it in his mouth area.
The bald mankind quickly followed regarding him towards the northeastern area of the vicinity.
He threw out his left fist towards the bald’s guy facial area. Even so, the bald guy grabbed his fist without difficulty and began twisting his arm towards area.
“Our chief loves to style the blood vessels of his people before their dying!” One of those voiced out with a loud tone.
“Our main needs to personal taste the blood flow of his victims before their death!” One voiced out with a loud color.
“What’s taking place ,?” The Hairless person voiced by helping cover their a astonished seem.
“Our key needs to style the blood stream of his patients before their loss of life!” One of those voiced out with a excessive overall tone.
This action surprised students as they observed his actions. Only all of those other gang people weren’t stunned.
“Hnnngggh!” Muffled noises of agony might be read from under the helmet since the gang user tried using liberating himself coming from the bald’s mankind proper grip, but it surely was verifying hard.
Touch! Touch! Touch!
This person was obviously Gustav.
He threw out his left fist into the bald’s mankind face. Nonetheless, the hairless man trapped his fist without trouble and commenced twisting his arm on the area.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00087.warc.gz
|
CC-MAIN-2023-14
| 4,435 | 42 |
https://www.experts-exchange.com/questions/20930677/How-to-run-MS-DOS-Utilities-within-a-VB-program-and-store-result-in-a-string-not-a-text-file.html
|
code
|
Language: Visual Basic 6
I am looking for VB code to run MS-DOS commands (such as ipconfig, tracert, etc...) from within the visual basic program and store the result in a string...
Note: I know how to run an MS-DOS command from within VB, write the output to a text file and display those results but that is NOT what I am looking for here.
I have done it before. Here is the program that contains the code to run things like ipconfig, tracert, ping, etc...from within VB without opening up the MS-DOS window and without writing to a text file:
I dont remember the code I used and have also lost the source code (my fault) so I am desperately searching for that piece of code that I used to perform those functions.
I remember it was something very short and simple and saved the result of the ms-dos command to a string and then I displayed the string in the text box...
Can anyone help me with that code.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657129257.81/warc/CC-MAIN-20200711224142-20200712014142-00396.warc.gz
|
CC-MAIN-2020-29
| 907 | 7 |
https://xn--h1aamcafs.xn--p1acf/%D0%B1%D0%B5%D0%BB/%D1%81%D0%BB%D0%BE%D0%B2%D0%B0%D1%80%D1%8C/%D0%B0%D0%B1%D1%81%D0%BE%D0%BB%D1%8E%D1%82%D0%B8%D0%B7%D0%BC
|
code
|
Convert CQL to ELM online using CQL-to-ELM Converter by Eckher — an online tool for translating Clinical Quality Language to Expression Logical Model.
Test CQL scripts against FHIR resources using Eckher CQL Testing Tool — an online tool for authoring, testing, and debugging Clinical Quality Language.
Test CDS Hooks using Eckher's CDS Hooks Testing Tool — an online tool for simulating, testing, and debugging CDS Hooks workflows. It allows the user to provide the content for the CDS Hooks request and mock FHIR server and view the CDS Hooks service response.
Browse HL7v2 specification online using HL7v2 Spec Viewer by Eckher.
Browse the HL7 RIM model using HL7 RIM Browser by Eckher — an online explorer for the Reference Information Model, base information model for HL7v3 standards.
Validate HL7v2 messages against the HL7 grammar (HL7 abstract message syntax) using Eckher's HL7v2 Validator — an online interactive tool that requires no registration or installation.
Eckher FHIR Converter is an online tool for converting FHIR resources between JSON and XML formats. It is a free and interactive tool that can be used without registration.
Eckher ECL Editor is an online editor for the Expression Constraint Language. It provides syntax highlighting and live querying of SNOMED CT terminologies to facilitate the authoring and testing of ECL expression constraints.
Eckher CQL Editor is an online editor for the Clinical Quality Language. It provides syntax highlighting and live execution against CQL engines to facilitate the authoring and testing of CQL libraries.
Eckher's FHIR Viewer is an online tool for browsing FHIR stores. A FHIR store is a service that exposes a FHIR API and provides access to FHIR resources such as Patients, Observations, and more. Find out more about Eckher FHIR Viewer here.
Browse the full list of AWS services, products, tools, and resources.
|абсолютизм||самодержавие, царизм, деспотизм|
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948609.41/warc/CC-MAIN-20230327060940-20230327090940-00400.warc.gz
|
CC-MAIN-2023-14
| 1,979 | 12 |
https://community.splunk.com/t5/Splunk-Enterprise-Security/How-do-I-display-2-lines-on-a-line-graph-The-fields-used-are/m-p/543495/highlight/true
|
code
|
I am using 2 csv files and the "inputlookup" method. Right now I am appending one of the csv to another csv, but the line chart that is displayed out only have one line. Both of the csv files has the same fields but i want the the graph to have 2 lines, one line for the first "batch" and the second line for the second "Batch" . How do I write the codes to let the graph get sorted by the "Batch" number so there will be 2 lines?
Current codes :
| from inputlookup:"5019609_V-094_9007270566.csv"| append [| from inputlookup "5019609_V-094_9007280926.csv"] | fields Hr MatlTemp
Current Picture of line graph :
Okay a second line appeared but is it there a solution to sort the line chart by fields instead? I have a big data so its not efficient to rename the fields every time I want to compare a new set of data. If there is a sorting solution then the data would automatically be sorted by the "Batch" number. Thank You!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.0/warc/CC-MAIN-20230401032604-20230401062604-00146.warc.gz
|
CC-MAIN-2023-14
| 923 | 5 |
https://hub.alfresco.com/t5/alfresco-content-services-forum/referenceerror-search-is-not-defined-alfresco-community-5-2/td-p/171478
|
code
|
ReferenceError: search is not defined - Alfresco community 5.2
I have created a dashlet to show all active workflows using workflow-instance & task-instance APIs. Its working perfectly. But, now what i need to do is, displaying that current task assignee username for every workflow. In task instance API, it returns only noderef as bpm_assignee.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00068.warc.gz
|
CC-MAIN-2022-40
| 346 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.