url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://www.amateurspankings.com/support
code
If you had a problem downloading a purchased video you can re-download it by clicking here. If you experience any other problems purchasing or downloading videos please contact our technical support team here. We have re-mastered all of our videos. They are now all higher-quality MP4 downloads or DVDs. The MP4 downloads are packaged inside ZIP (.zip) files. For example XYZ.mp4 will be downloaded as the file XYZ.zip. To extract the MP4 open the zip file the same way you open any file, probably by double-clicking it. Right-clicking may also popup a menu that allows you to open it. There are many free unzip utilities available if you need one, including 7-Zip for Windows (www.7-zip.org). MP4 videos are playable on a very wide variety of platforms and players and it is more than likely you will be able to play the video just by double-clicking it. A good free video player for Windows, Mac, Linux, and others is VLC, available from www.videolan.org/vlc. Searching for videos on AmateurSpankings.com is easy, just enter your search terms into the searchbox and click the GO button. Even easier, click on one of the tags listed below the video descriptions to search for all videos with that tag. Finally, click on Tags next to the searchbox for a clickable list of all tags for all videos.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886476.31/warc/CC-MAIN-20180116164812-20180116184812-00042.warc.gz
CC-MAIN-2018-05
1,296
10
https://www.chennaicircle.com/movies-now-channel-on-scv-cable-and-su-direct-hd-dth/
code
Movies Now Channel from times group is now being broad-casted in Chennai Cable TV as free to air channel. Also Sun Direct is the only DTH(as on 28 Dec 2010) to air this channel in HD format. But, soon other DTH operators will start the HD services. So, don’t buy Sun Direct HD for this channel alone. From what I read , Sun DTH has the poor customer service.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531779.10/warc/CC-MAIN-20220520093441-20220520123441-00372.warc.gz
CC-MAIN-2022-21
362
1
https://www.sixteen-nine.net/2021/08/19/an-led-butterfly-or-maybe-dragonfly-lands-at-south-china-airport/
code
An LED Butterfly, Or Maybe Dragonfly, Lands At South China Airport August 19, 2021 by Dave Haynes This is an interesting solution to an architectural problem faced by whatever media company has the concession at the international airport in the southern Chinese city of Kunming. The big bulkhead between the up and down escalators is visually interrupted by a very large vertical support column. The standard solution would be to put separate LED displays on both sides. But in this case, LED manufacturer AOTO developed a solution that wraps around the column and joins the two flanking screens. AOTO calls it butterly-shaped, but I’d say more like dragon fly. It’s also reminiscent of a satellite with solar panel wings. Whatever the case, it’s very different and, I think, works. The screen has enough pixels to be referenced as 16K, though that shape would not natively support 16K content, if such a thing was done outside labs. The AOTO display – social media post don’t reference pixel pitch – uses the manufacturer’s own Brilliant Phoenix play-out and control system.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00283.warc.gz
CC-MAIN-2023-40
1,089
7
https://forum.cuba-platform.com/t/creating-a-control-similar-to-onenote-that-works-like-your-wisywig-screen-designer/317
code
in our application we want to include a control that should give the user the possiblility to enter data in a way similar to OneNote, i.e. in a less structured way. The way we want to do this is by providing a control where the user can drag other controls onto it, like: - (Rich) Text Area where the user can enter text - Table (with predifined entries) that the user can use as a check list - Image are - File area The way it should work is similar to your cuba studio WISYWIG editor: The user can drag & drop our controls from a panel to the main area. As I have not made custom controls yet, I have some questions: As your documentation mentions, your WISYWIG editor is based on the Vaadin Drag&Drop layout. If we would do the same approach, do we have to integrate the Vaadin layout as a plugin first (as described in 184.108.40.206. Using a Third-party Vaadin Component) and then create our control as (described in 220.127.116.11. Creating a GWT component), using the plugin as a our layout? When using the approach from 18.104.22.168., is it possible to use components from the Vaadin standard libaray there, or can you only use the standard GWT components? Do you have a sample project that is similar to your WISIWYG editor? If not, would it be possible that create a sample for us as part of an incident?
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487635724.52/warc/CC-MAIN-20210618043356-20210618073356-00203.warc.gz
CC-MAIN-2021-25
1,315
11
https://www.freelists.org/post/haiku/news-development-mailing-list-distro-guidelines,56
code
Michael Phipps wrote: Jorge G. Mare (a.k.a. Koki) wrote:I never said anything like that. I do, however, think that this conversation is hypothetical, at best.It is not hypothetical. I can point you to a couple of actual such works that would be affected by this discussion:# JPBE.net Haiku Live CD http://jpbe.net/wiki/index.php?Haiku%20LiveCDThis is an initiative to create a Haiku live CD for demo purposes that is more friendly to Japanese users and has a few additional apps to make it more enticing.# Haiku Operating System - Alpha Release (VMWare appliance) http://www.vmware.com/vmtn/appliances/directory/627 Happy Easter Edition with Basic Network SupportI know of at least one more initiative to create a demo CD to be handed out at an upcoming conference, and I would not be surprised at all if there were others out there contemplating doing the same in the near future.So this is not hypothetical; it is quite real.Wow. Ok. Given some grounding, this makes more sense. Especially with the Japanese issues that you brought up in the other thread.But those issues make me think, all the more, that we should tread carefully here. A different version of libtextencoding and a different version of unzip (that isn't backward compatible!) seems like something that could cause breakage. Imagine someone like yourself who is bilingual (English/Japanese) but isn't aware of these types of changes. He gets a demo CD only to find out that this piece of junk can't even unzip a file correctly!!! :-/ It is not a piece of junk. It is an attempt by a local community to address some problems that the OS has. If the project were more embracing rather than alienating of this sort of efforts, the results of those attempts could in the end benefit Haiku. By the nature of where the work would be distributed and being that it is intended for Japanese and would be clearly identified as such (labels, disclaimers, readmes, etc.), the likelihood that somebody get their hands on this without knowledge that it is for Japanese users are close to nil. Your fears that a user may find that something does not work as expected are quite unfounded. Having said that, my personal take is that given what we are encouraging people to change (and, more importantly, not change), any additions/subtractions are custom distros and should be treated as such. I don't personally think that there is any point in saying, "well, if you only change this or that and only distribute it this way or that, you can keep the name". That is the world's largest support nightmare, IMHO. If someone says "Haiku does X when I do Y", you can no longer be sure what actual software they have. Is it a broken font borking the app_server? Don't know. Invalid formatted icons? Could be. Maybe a broken compile of something (don't laugh - I have seen it happen).But a demo does not replace official builds or distros. It's just another tool that could have some additional resources/documentation to make it more useful/effective as an introduction to Haiku. It is just something to wet the dev's appetite. If a developer ends up becoming interested, he/she will anyway download the latest builds and work with that. You are just making it more enticing/easier for the developer to get there, not trying to replace the official build.So you are saying that people will not keep the demo around? That they will either use it as a live CD and/or short term install? I don't believe that will be the case consistently. Surely, in some cases, they will install it and use it, especially if it offers something that they need (native language support is a good example) that isn't in the default distro. I am not saying that people will not keep it around. What I am say is that it's just a demo, not an installable system, and that as such, it's usefulness is short-lived by definition. Nobody is going to want to keep a demo for daily use, certainly not a Haiku demo at this stage of development. You have to look at this as just a tool to introduce people (devs) to Haiku so that they can see what it looks and feels like, see some of its capabilities, and hopefully become interested in investigating further. The official set of software will be whatever the admins decide, and because a few people create demos (which are short-lived anyway) with slightly different content will not change that. Again, it is not about demos replacing anything official. It is just about creating an additional tool in your arsenal that is more efficient to reach out to and engage developers.If it goes out with the Haiku name and logo, how is anyone outside the community to know that it isn't official? How about by labeling it as a demo and some sort of disclaimer, like the one that was added to the distro guidelines on the Haiku website? That sounds to me like it could dilute the brand, in terms of quality of software. Sort of like opening a can of Campbell's soup, adding water chestnuts, resealing it and selling it as Campbell's soup. :D In fact, even more so, because now you buy a can of soup at the store and are disappointed because there is no water chestnuts in your soup! I know a little bit about brands and branding. But you are applying the branding principles in the wrong place. When I look at other similar projects, I can see plenty of examples of third party initiatives that end up becoming official. These initiatives may start independently from the project, but somehow they are embraced and eventually absorbed, and as a result the community grows. Somebody wanting to create a demo or introduction CD to help the project is such an initiative. Not only don't I see this synergistic approach with Haiku, but there is this combination of a (misplaced) excessively overprotective attitude and the presumption that people will do the wrong thing for Haiku w/o giving them a chance to prove otherwise. All this does is preclude people from feeling part of the project (rather than encourage). The Japanese community, for example, are creating a Live CD with a few apps to make the thing more enticing (like a Japanese text editor), the Japanese input method enabled by default, a nicer Japanese font than the default, and a few patches here and there that they need to address some language related issues. By the existing guidelines, they are forced to do this as a custom distro (because of the changes they need to make).So, this is: new app (text editor) changed preference (input method on) new font changes to the base software (unzip and library changes!) That *is* a distro. If that isn't, what ever would be?Or, let me ask it this way... Other than stamping the word "demo" on it, what is the difference between the CD that does this and a distro? Pinguinek and MAX are distros. They have a declared intent of building a product (commercial or otherwise) based upon Haiku with it's own roadmap, application set, development/support team, website, name/identity, etc. The only thing that a demo to promote Haiku could have in common with the above definition of distro is that it may have software that is not available on the Haiku repo, but that's it. There is no intent to compete with Haiku, no roadmap, no name or identity. In other words, it's just a demo. This will not help promote Haiku (as the work will have to be branded differently), but it will also not encourage patches to be contributed back upstream to Haiku either. In the bigger picture, what this does is miss an opportunity to create a synergistic relationship between the project and a regional community, that could eventually lead to the creation of an official Japanese version of Haiku.There is no one who wants to have the support of the Japanese community as much as I do. It was so alive and vibrant in the R5 days - I was always excited to see the latest downloads on BeBits.Having said that, I can't see how making this demo disk as you describe would be good for everyone. It either promises something we can't apparently deliver (correct Japanese support) AND it breaks existing software (i.e. unzip). It does not have to be good for everyone. The LiveCD is for the Japanese, not for everyone, so as long as it is good for the Japanese, it fulfills its purpose. I think that's a shortsighted position that will only discourage community initiatives, and unnecessarily spur the creation of what you call custom builds. This, in the end, will only encourage the creation of more rather than less third party distros, something that I thought Haiku was trying to avoid.But if we say, well, you can add 1 app and change 2 pieces of the base system, change 1 preference and add 1 font and still call it Haiku, where does that end? Because it has the word "demo" stamped on it? What's the problem if it serves the purpose of promoting Haiku, which is what demos are for after all? Anyway, I give up. I will just tell the JPBE.net guys that if they want to have proper support for Japanese, they are on their own, and they will have to create their own distro.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670135.29/warc/CC-MAIN-20191119093744-20191119121744-00030.warc.gz
CC-MAIN-2019-47
9,025
21
https://admin.tentaroo.com/content-tab
code
Last edited 1/21/2020 The content tab hosts the main body of a webpage. By default, the central editor box is set to design mode, and allows you to add and edit content as you would in a word processor. Clicking "Source" to the upper-right reveals the underlying HTML, and is used for more advanced features. See Advanced Page Options for some of the many ways to enrich and streamline webpage content. Above the editor are the page name and short URL. New pages require a name before they can be saved. Page name and short URL can be changed at any time, but must be unique for your website. The "View" button opens the page in a new browser tab, allowing you to explore how it looks and functions for users. While editing, it is a good idea to save frequently and examine the page in a browser after every save. Once a page is open, you can simply press refresh in the tab to update any changes. Clicking "Copy Link" opens a box where you can copy either the relative or absolute link for your page. - Relative Link: - Excludes the domain name. - Used internally and always works even if you change the domain name. - Absolute Link: - Has to have the correct domain name. - Used externally to link to your site or to share in print. - Works internally as long as the domain name is correct.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657149819.59/warc/CC-MAIN-20200714083206-20200714113206-00140.warc.gz
CC-MAIN-2020-29
1,292
12
http://www.evansweb.info/2004/07/15/play-ogg-files-in-itunes/
code
A colleague brought in a load of ogg files. Could he play them under iTunes? No problem! Here's how: - Go to the QT Components SourceForge page and download the plugin (there are versions for Windows and Mac - Inside the disk image you'll find a readme file and OggVorbis.component. Put OggVorbis.component in /Library/QuickTime (as described in the readme) - Restart iTunes and it will work!
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578534596.13/warc/CC-MAIN-20190422035654-20190422061544-00076.warc.gz
CC-MAIN-2019-18
392
4
http://www.mirbsd.org/permalinks/wlog-10_e20110717-tg.htm
code
mksh R40b (nowadays with filled in user’s caveats (for R40, too!) and packager’s upgrade hints) has just been released. This is a should-have upgrade, fixing a number of – admittedly some obscure – bugs, changing things begun in R40, improving upon others. Thanks to the PLD Linux guys for spotting all these errors; thanks to them and phpnet.org both for adopting mksh so well. jupp 3.1.16 took on the task of merging Debian joe changes (aiming at an upload). I also split the jupprc file into three versions (2.8 generic/DOS, 3.1+jupp and 3.7/Unix) because of the differences in the baseline executables making rc files partially mutually incompatible (think Insert key), annoyingly warning (think syntax, hmsg), or less usable (joe’s new menu system). jupp 2.8.2 is a companion to jupp 3.1.16 – mostly because of the new help window “character map” ☺ Binaries for jupp should be updated RSN too. Considering Banja Luka is arriving quickly, the “r” in RSN should be taken with a few grains of salt. I’ve also scheduled working on the pcc Debian package for the next future; updating lynx and maybe others like OpenSSH in MirBSD is also due; cvs(1) will receive more of my time, but before the next Upload I’d like to fix LP#12230 once verified. Builds for Debian/m68k are also still running. I note I did in fact not manage to make a new base image, yet (but 2.6.39 kernels miss a patch, anyway, so waiting for 3.0 is ok). It’s still using gcc-4.4 because nobody tests gcc-4.6 and gcj-4.6 FTBFS due to SIGSEGV, but that’s ok in my books. rsyslog is broken but sysklogd works. The #ksh|Freenode page finally got a well-deserved link to Planet Commandline. Throw more my way! Since I’m writing a wlog entry anyway… let me thank Gunnar for a nice summary on the current Free Culture discussion; my comments on Nina’s site seem to be eaten, but let me support it fully, although, of course, I normally use a copycenter style licence, which is specifically written for general works of authorship under copyright law, not limited to software. I did in fact have that in mind. Maybe some people will like it (it’s less than one Kibibyte long) either generally or just for their everyday random musings (they can then keep CC-BY-SA for the “big works” if they so desire). Wouter, grass background makes green headlines illegible. I’ve never liked, and never installed manually, cups either. (Benny tells me that Apple’s new version refuses to talk with a non-Apple cups, kinda defeating the whole idea I think.) Port 9100 is JetDirect (probably with an HP in front and some subset of ©®™ trailing) and just nice. (Being able to talk ESC/P with your printer like print '\033K\x07\0\x3E\x81\x99\xA5\xA5\x81\x3E' >/dev/lpa too rocks though, IMHO. Yes, mine can, and I still can. /dev/lpa is BSD.) Kai, thanks for your vimrc lines: :highlight TrailWhitespace ctermbg=red guibg=red :match TrailWhitespace /\s\+$\| \+\ze\t/ Automatic removal is harmful, though – I just fell into the trap since jupprc contains needed whitespace at EOL… but manual removal (bound to ^K] in jupp) rocks. And I like that your solution uses such strong a colour – vim users are the single most represented offender group for actually leaving the redundant whitespace at EOL there, and it should hurt their eyes. (Sadly there is some vehement disagreement preventing them from inclusion in grml-etc-core – but that’s why I re-post them here.) Ah, and jupp can of course display whitespace visibly (although it uses ‘·’/‘→’, replacing the arrow with ‘¬’ if no UTF-8, not ‘»’), accessible with ^Ov. Steve, want to put up a checklist for sites? We can “crowdsource” the… testing… to maybe get some interesting results… Some other people would get more comments if they were idling in IRC (Freenode) or allow comments on their blog, specifically without too high an entrance barrier – OpenID is ok, but many other things, and ECMAscript, are not; but I can’t really say that loud because our wlog is static HTML compiled from a flat plaintext data source so it doesn’t allow such either. I often forget what I wanted to add if I can’t get it out quickly enough (especially at work). Sowwy… Me like the cat picture postings (Amayita, Tiago, ¡Gracias!).
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119642.3/warc/CC-MAIN-20170423031159-00183-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,317
15
https://proceedings.ictinnovations.org/2012/paper/143/on-the-strong-and-weak-keys-in-mqq-sig
code
In this paper we describe a methodology for identifying strong and weak keys in the recently introduced multivariate public-key signature scheme MQQ-SIG. We have conducted a large number of experiments based on Gröbner basis attacks, in order to classify the various parameters that determine the keys in MQQ-SIG. Our findings show that there are big differences in the importance of these parameters. The methodology consists of a classification of different parameters in the scheme, together with introduction of concrete criteria on which keys to avoid and which to use. Finally, we propose an enhanced key generation algorithm for MQQ-SIG that generates stronger keys and will be more efficient than the original key generation method. Multivariate Cryptography Multivariate Quadratic Quasigroups MQQ-SIG Quasigroup String Transformations Public-Key Cryptography
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00507.warc.gz
CC-MAIN-2023-14
868
2
https://forum.howtoforge.com/threads/php5-problem.18102/
code
Hi, Hi have my ISPConfig box good configured. I passe a portal in joomla v1.0.13 from a sever with VHCS + PHP4/MySQL4 to my new machine with ISPConfig + PHP5/MySQL5. The Data from the Database are all correct, but i have one little problem. In the configuration file from joomla i have this ex: PHP: $mosConfig_error_message = 'Este site encontra-se temporáriamente indisponível.<br /> Por favor, avise o Administrador de Sistema'; The word's temporáriamente and indisponível appears with an ? on the portal. And this is appening with the lang file to. I notice that if i put the text ex: temporáriamente or indisponível it appears well with out the ? on the letter. Is there anything that i have to configure in ISPConfig or PHP5 for read correctly from the file the word's?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103920118.49/warc/CC-MAIN-20220701034437-20220701064437-00345.warc.gz
CC-MAIN-2022-27
781
1
http://www.vijayendrasingh.com/vlsi.html
code
Very Large Scale Integration or VLSI. This is the introductory Tutorial of the subject of CMOS VLSI Design and the emphasis is on to building the basics of the subject. VLSI Tools Tutorials. The following tutorials show setup files, basic features and simple examples of Cadence, Synopsys and HSPICE tools for VLSI design.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305052.56/warc/CC-MAIN-20220127012750-20220127042750-00167.warc.gz
CC-MAIN-2022-05
322
7
http://www.malesniak.com/2013/03/rip-flapon.html
code
R.I.P. Flapon... but thanks for the memories. What now seems like an eternity ago, I graduated from Penn with a MS in Education. I had every intention of getting a second Masters in Korean Language... then entering a global education publisher. I saw the Ed Tech boom coming (it came) and was rearing up to go, planning to spend a few years at Pearson to round-out my skills, then hit the Ed Tech startup scene. Instead, my wife and I had our first child... the incredible lil' tortuga. My how life can change. Returning to Korea with every intention of moving on to Hawaii, a friend of mine kept asking me to join his Gangnam startup... "we're gonna be millionaires!" Naturally, I was skeptical. At first I focused on how to get to Hawaii, but it just made more sense to stay. Working with the Founder of a Vancouver-based Ed Tech startup for a few months, my "friend" finally convinced me to join him in his venture. Truth be told, his over-confidence was a big reason why I eventually joined up. He was my friend, and his burn-rate was ridiculous... he was heading for suicide, figuratively, so I had to help. Anyway, I signed up for a small equity share and the promise of an epic adventure in California... win or lose it would be epic. It was epic. Flapon actually did pretty well, getting about 80K signups (pretty active too) in just a month. Sure, it wasn't a Pinterest or anything, but we were growing steadily. That was pretty amazing considering everything that was going on internally post launch (epic man, just epic). The twitter account is still up (though inactive) as well as the facebook page. Sadly, after the "founder" ripped-off everyone (except for maybe one person) including me , a couple of talented developers who worked around the clock, his own cousin, and who knows who else... the "founder" had no idea how to run Flapon and it was taken down. Basically, he'd put in a terrific sum of money (really stupid amount of money) and had not made "the next Facebook." Um, oh well...? Thanks to Evernote... I still have screenshots! Enjoy ;-)
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00635.warc.gz
CC-MAIN-2023-23
2,065
8
https://www.mail-archive.com/[email protected]/msg00194.html
code
i have a more serious problem (althuogh i would prefer the check sum to be done): i downloaded the file (protext-2.2) and tried to install several times (windows vista, hp pavilion) but i always get the message "this program could have not been correctly installed" (i'n trying to do everything in spanish, and i think that's the translation) and i never get the figure 1.2 in page 7 of the installing document "the quickest way to a tex system" (which by the way has buttons in german) can anybody give me some help on this? is it posible to export from latex to word? On Thu, Oct 8, 2009 at 4:39 AM, Thomas Feuerstack < > Gaspar Núñez schrieb: > > i'm trying to begin with latex > > and downloaded protext > > when executing the md5sum > > i have a message saying that > > windows cannot read that file > > can someone tell me how that works? > In fact the .md5-file is only needed to proof if the download of > ProTeXt's main archive was successfull. > Make sure to download the main archive, ProTeXt-2.2-071709.exe is the > recent one, and start the installation by double clicking on it. > Regards - Thomas
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886120573.0/warc/CC-MAIN-20170823132736-20170823152736-00348.warc.gz
CC-MAIN-2017-34
1,113
25
https://github.com/jofultz/AdobeClickStreamIngestion
code
Adobe LiveStream Event Acquisition Using Azure Functions, EventHub, and KeyVault The Function App contains two Functions: |Function Name||File Location||Trigger Type||Description| |ClickStreamIngestController||ClickStreamIngestController.cs||Timer||Controls the ingestion Function by placing messages on the queue.| |GetClickStreamData||DataRetrieval.cs||Queue||Reads data from the Adobe LiveStream endpoint for the configured duration of time and sends the messages to an EventHub| Dependencies and Setup An endpoint must be setup by Adobe to retrieve the LiveStream data. Along with that setup one should receive a specific App ID, App Secret, and URI which are all required to authenticate and fetch data. The repo does not contain configuration scripts or templates for all of the dependencies. However, the Function App (this code) requires all of them to be configured and available in order to run properly. While the Adobe configuration is more an output of a business interaction, the Azure dependencies require setup. This will not provide detailed setup guidance for the dependencies. An overview below of what is need is provided. - Azure Storage - Use this account for the Function App Storage and Queues - Create a Storage Queue for ingestion operation control - The ControlQueueName and the IngestControlQueueConnection string will be needed - Azure Function App - Use the previously configured Storage Account - Use a Consumption Plan - Create an identity. I used a System-assigned Managed identity. - Azure EventHub - Single EventHub - Assumes 1 EventHub be sufficient to handle traffic - If multiple EventHubs are needed then some rework of the implementation will need to be done - No partition key set - For testing I used 4 partitions - For production I used 12 partitions as 4 lead to throttling when both producers and consumers were active - The EventHubName and the EventHubConnection string will be needed - Single EventHub - Azure KeyVault - All of the sensitive configuration values are stored in KeyVault - Create an Access Policy and give the Azure Function identity List and Get for Secrets - The KeyVaultSecretsProvision.sh contains script to provision secrets, but you will need to add your KeyVault name and setting values and ensure that you are logged in. - Each of the secret URIs will be needed for the secrets in KeyVault The run-time behavior of both Functions is determined by the following settings that must be present in your local settings file or in the App Settings for the Function App: |Setting Key||Setting Value||Description| |EventHubName||[your EH name]||Target EventHub for incoming messages.| |EventHubConnection||[@Microsoft.KeyVault(SecretUri=your URI) or connection string]||Used by the Binder to establish connection to EventHub| |AdobeAuthURI||https://api.omniture.com/token||Used to retrieve auth token. The known public endpoint is noted here, but one should double check there hasn't been a change.| |IngestControlQueueConnection||[@Microsoft.KeyVault(SecretUri=your URI) or connection string]||Used by the Binder to connect to the Storage Queue.| |ControlQueueName||your queue name||Used by the Binder to connect to the proper Storage Queue.| |AdobeAppID||[@Microsoft.KeyVault(SecretUri=your URI) or AdobeAppID value]||Used in the Authentication process.| |AdobeAppSecret||[@Microsoft.KeyVault(SecretUri=your URI) or Adobe App Secret]||Used in the Authentication process.| |AdobeURI||[@Microsoft.KeyVault(SecretUri=your URI) or your Adobe URI]||This is the endpoint provided by Adobe from which to retrieve data.| |TimerSchedule||cron expression, e.g., "0 */4 * * * *"||Used by the Binder to control the firing of the ClickStreamIngestController Function.| |ExecutionSeconds||duration in seconds, > 0||Used by the GetClickStreamData Function to determine how long to fetch data from Adobe.| |MaxReaders||number of readers, 0<MaxReaders<9||Controls the number of messages populated on the queue to trigger acquistion Functions. This must be > 0 and Adobe allows no more than 8 concurrent readers.| |GapIntervalSeconds||seconds visibility delay||Used to calculate the visibility expiry for each message on the queue to allow adjustments for staggering and overlapping of the reader trigger. The interval is multiplied by the message count with index origin of 0. A GapIntervalSeconds of 10 seconds would mean that for 3 messages the first message is visible in 0 seconds, the 2nd in 10 seconds, and the 3rd in 20 seconds.| Overall, this is a fairly simple solution as can be seen in the following depiction: When the timer trigger fires the ClickStreamController places the configured number of messages on the queue based on the application settings. As each message becomes visible it trggers the GetClickStreamData Function. GetClickStreamData will retrieve needed secrets from the app settings (KeyVault if configured), retrieve an authorization token, and begin to retrieve data from the data endpoint for the configured amount of time. Each record received is added to an ICollector<EventHub> and at the expiry for the run duration that data is persisted to EventHub by the Binder. Scheduling and Concurrency Scheduling and concurrency are managed by adjusting 4 settings: TimerSchedule, ExecutionSeconds, MaxReaders, and GapIntervalSeconds. Never adjust one independently without considering the impact on concurrency and potential overall between running jobs and the next TimerSchedule interval. Additionally, MaxReaders should never be more than 8 as that is the maximum allowed by Adobe. To understand how the schedule and concurrency work, please consider the following timeline for the settings of: - TimerSchedule = 0 */4 * * * * (4 minutes) - ExecutionSeconds = 120 - MaxReaders = 3 - GapIntervalSeconds = 60 In this configuration the total run time for each batch of 3 readers is 4 minutes. With a GapInterval of 60 seconds each reader starts in the middle of the 120 second runtime of the previously started reader, but there are only ever 2 concurrent readers retrieving data. While one may overlapp the end of a batch with the beginning of the next batch, care must be taken to not overlap the timer schedule with the ExecutionSeconds to the degree that would potentially cause: - more than 8 readers to run concurrently as Adobe's max is 8 - spawn readers infinitely as the duration and gap interval does not allow for completion of the readers prior completing half of the next batch of readers. The intent of this implementation is to target a Consumption Plan. Which means that the amount of RAM (1.5GB) is fairly low. Each reader collects records in an ICollector<EventHub> during execution and it is persisted at the end of the excution duration by the Binder framework. To that end, the goal for execution is to keep acquisition readers fairly short (1 - 5 minutes) as to not overrun the available RAM and to spawn them frequently enough as to keep the throughput high. The preference should be to use KeyVault instead of direct App Settings for all of the sensitve items. In this implementation KeyVault was used. Additionally, SecureString was used for all things kept in RAM. For example, the auth token is retrieved and placed in a static variable. This provides a level of caching for any instance running on the same host as that static variable will have the value. However, a SecureString was used to ensure that memory could not be dumped and the string retrieved. NOTE that there are some gaps in that the token is retrieved over HTTPS and must be parsed from the response. Until the it is parsed, assigned to a SecureString, and the response object collected by GC it could be dumped from RAM.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104215790.65/warc/CC-MAIN-20220703043548-20220703073548-00753.warc.gz
CC-MAIN-2022-27
7,692
60
https://community.hmrc.gov.uk/public/77c720d0-cb29-ed11-9db2-6045bd0e7d7b/forum-posts
code
Can I registed as self-employed for the tax year 2021-22 (before October) and pay NI contributions? As far as I am aware if I register as self-employed and earn less than the threshold I can voluntarily pay NIC class 2. If I were simply unemployed for that year and not claiming benefits it would be NIC Class 3. Is this correct? Is it legit to do so?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510942.97/warc/CC-MAIN-20231002001302-20231002031302-00146.warc.gz
CC-MAIN-2023-40
351
1
http://www.midwayusa.com/product/811780/fobus-evolution-paddle-holster-right-hand-walther-ppk-polymer-black?cm_vc=OBv1
code
Fobus Evolution Paddle Holster Right Hand Walther PPK Polymer Black - BlackHawk CQC Serpa Holster Right Hand Glock 20, 21, S&W M&P... $31.99 Available - Fobus Paddle Holster Right Hand 1911 Government, S&W 945... $23.99 Available - Fobus Paddle Holster Right Hand H&K P2000, Springfield XD... $17.81 Available - DeSantis Speed Scabbard Belt Holster Right Hand Smith & Wesson... $48.49 Available - Remington Ammunition 22 Long Rifle 36 Grain Plated Lead Hollow... $62.99 Out of Stock, Backorder OK The statements and opinions expressed within Customer Reviews reflect each author's personal perspective and do not imply endorsement by MidwayUSA, its Employees or any other organization. Customers should in no way infer that MidwayUSA has validated review information as safe, accurate or appropriate.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345776439/warc/CC-MAIN-20131218054936-00044-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
800
7
https://stevengong.co/notes/Stackelberg-Game
code
In a Stackelberg game, one player (the “leader”) moves first, and all other players (the “followers”) move after him. Difference with a Sequential Game? - Leader and follower: In a Stackelberg game, one agent is designated as the leader and the other agents are followers. The leader makes its decision first and commits to it, while the followers observe the leader’s decision and make their decisions afterwards. In a sequential game, on the other hand, the agents take turns making decisions, but there is no designated leader or follower. - Information: In a Stackelberg game, the followers have complete information about the leader’s decision before they make their own decisions. In a sequential game, the agents may or may not have complete information about the decisions of the previous agents. - Game structure: Stackelberg games are typically modeled as sequential games, where one agent moves first and the other agent moves second. Sequential games can have different structures, e.g. a repeated game where each player acts in each round, or a one-shot game where each player acts once. - Solution concept: The solution concept for Stackelberg games is the Stackelberg equilibrium, in which the leader chooses the strategy that maximizes its utility given the followers’ best response. The solution concept for sequential games is the subgame perfect equilibrium, in which each player chooses the strategy that maximizes its utility given the strategies of the other players in every subgame. - Applications: Stackelberg games are commonly used to model situations where one agent is a leader in a market and the other agents are followers. Examples include price leadership in oligopoly markets, and leader-follower interactions in robotics and control systems. Sequential games are used in a variety of other settings, such as repeated games, evolutionary game theory, and security games.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817144.49/warc/CC-MAIN-20240417044411-20240417074411-00047.warc.gz
CC-MAIN-2024-18
1,918
7
https://lists.freedesktop.org/archives/libreoffice/2012-February/025255.html
code
[PATCH][PUSHED] The first of the READMEs for the modules nthiebaud at gmail.com Sat Feb 4 07:29:38 PST 2012 On Sat, Feb 4, 2012 at 5:01 AM, Josh Heidenreich <josh.sickmate at gmail.com> wrote: > This is the first of the READMEs for the modules. They are only short > at the moment - copied from the wiki mainly. I've tweaked the syntax a > little, although I haven't reflected that in the tool yet. > The syntax is going to allow for some basic linking, so will use > something wiki-like, and I am also going to add in some automatically > added links too (like links to cgit or doxygen) all in time. Can you please fit you cit config so that your commit are attributed properly ? the attached patch says: From: unknown <Josh at George.(none)> Also, try to keep a newline at the end of file: diff --git a/animations/README b/animations/README new file mode 100644 @@ -0,0 +1 @@ +Contains containers for the css::animation UNO API, used in [[slideshow]] and [[sd]]. \ No newline at end of file and finally, try to get a more descriptive/precise commit messages. I know that this is sometime hard, but at least the goal is to try to give a good idea of what is in the commit when glancing at the git short-log Pushed with some massaging, based on the above remarks. More information about the LibreOffice
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990584.33/warc/CC-MAIN-20210513080742-20210513110742-00308.warc.gz
CC-MAIN-2021-21
1,302
28
http://exoticpets.about.com/od/herpsupplies/tp/snakegifts.htm
code
There are plenty of snake gift options available for the snake lover in your life. Take a look at this list of gift ideas featuring snakes. This is a beautiful hand-made serpent necklace made with 18 kt gold over sterling silver. Many different designs and sizes available. You can even submit your own photo! 3. Snake Socks Socks with several different colored snakes. Different snake shirts you won't find just anywhere. Take a look at all the different styles available. A play on words drink coaster for ball python lovers. 7. Snake Tie A hand silkscreened necktie featuring a lovely pink snake. Unique snake candles from the UK. This is perfect for the trendy snake-loving mother of a young child.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609540626.47/warc/CC-MAIN-20140416005220-00038-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
702
11
https://weddingbycarue.com/2020/07/22/bride-mistake-dont-do-this-budget/
code
Here is a quick video about a mistake that I see brides make. AND I want to make sure this does not happen to you. Quick cliff notes, it has to do with your BUDGET! So check out my latest video on this Bride Mistake here. ? If you want to hang with a bunch of brides PLANNING their weddings too, pop over to my free group: http://facebook.com/groups/yourweddinghub ? Grab your FREE Engagement Style Guide (What to Wear): http://optin.weddingbycarue.com/ ? Looking for Wedding Services (photography, videography, photo booth OR DJ Services): https://weddingbycarue.com/ ? FREE Workshop: Steal My Wedding Planning Secrets: Want more planning tips? Check out my Carissa Kruse Weddings YouTube Channel: https://bit.ly/carissakruseweddingssubscribe I would love to see you around the internet! Here are my profiles: ? Don’t forget to SUBSCRIBE — https://bit.ly/weddingsbycaruesubscribe
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645595.10/warc/CC-MAIN-20230530095645-20230530125645-00426.warc.gz
CC-MAIN-2023-23
884
11
https://forum.netgate.com/topic/62179/traffic-limiter-burst-feature-in-2-1-release-what-is-the-idle-time-out
code
Traffic limiter burst feature in 2.1 release. what is the idle time out? For the new Traffic limiter burst feature in 2.1 Release, what is the default idle time out set to? Can this time be customised? jimp Rebel Alliance Developer Netgate There isn't a default idle time, it's all handled internally by ipfw and really isn't clear or customizable. Here is the text from ipfw(8): If the data to be sent exceeds the pipe's bandwidth limit (and the pipe was previously idle), up to size bytes of data are allowed to bypass the dummynet scheduler, and will be sent as fast as the physical link allows. Any additional data will be transmitted at the rate specified by the pipe bandwidth. The burst size depends on how long the pipe has been idle; the effec- tive burst size is calculated as follows: MAX( size , bw * In limiter Bandwidth = 1024kbit/s -= > burst 256kbit/s right?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653764.55/warc/CC-MAIN-20230607111017-20230607141017-00654.warc.gz
CC-MAIN-2023-23
874
13
https://community.sap.com:443/t5/technology-blogs-by-sap/conditional-start-under-the-hood-5-7/ba-p/12971991
code
This blog post, as part of this blog series, refers to the recently introduced Conditional Start feature in SAP NetWeaver BPM available with SAP NetWeaver 7.3 EHP 1 SP 06 and higher. This blog post refers to the recently introduced Conditional Start feature in SAP NetWeaver BPM available with SAP NetWeaver 7.3 EHP 1 SP 06 and higher. As described in the blog post before, Conditional Start patterns are usually used in system centric scenarios, receiving and aggregating messages from other systems. Therefore, a quality of service has to be guaranteed to the systems with calling Conditional Start processes. Guaranteed Message Reception When using SAP NetWeaver BPM in a system-centric use case, there can be a problem that messages may be lost. When the message for starting a process instance and messages that will be consumed by an intermediate message event are sent within a small time frame, a message that is sent to the intermediate message event might be lost. This is because starting a process instance is an expensive and time consuming operation. During the process start the web service endpoint is not yet configured completely and the process instance cannot yet listen to the endpoint. Figure 1: Messages are getting lost during bootstrapping of traditional processes When an external system sends messages at a high rate to an endpoint that is used for process start and correlation, this problem is even worse. The Conditional Start process feature is designed to manage this. SAP NetWeaver BPM recognizes the start of a Conditional Start process instance. During the start-up, messages, which are sent to the intermediate message event are saved until the instance is able to receive them, when: they are sent to the same web service endpoint as the process instance that is currently starting their payload does not satisfy the correlation condition of any running process instance listening to this webservice endpoint When the process instance is ready to receive messages, the processing of all held messages continues. If their payload satisfy the correlation condition of the started process instance, they will be assigned to it. Otherwise they will start a new process instance themselves. This also implies that messages that may not match the currently starting process instance, but will start a new process instance themselves, are also held, as SAP NetWeaver BPM cannot predict the correlation condition of a currently starting process instance. This is up to the process model and cannot be calculated having only the payload of the message that triggered the process start. Guaranteed message reception for Conditional Start processes needs additional processing time compared to traditional processes and thereby has an overall impact on the performance of the BPM system. When using Conditional Start, SAP NetWeaver BPM guarantees that all messages sent to a web service endpoint used by a Conditional Start process are either starting a new process instance or be consumed by an already running process instance. The functionality increases the overall processing time for a message.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818072.58/warc/CC-MAIN-20240422020223-20240422050223-00644.warc.gz
CC-MAIN-2024-18
3,126
13
http://reboot.pro/topic/644-time-for-a-challenge/
code
but I have to say that I've the feeling that little by little we are re-creating a BartPE, a UBCD4WIN or a Reatogo, i.e. a portable system with (hopefully) hundreds of plug-ins (or scripts) that can run hundreds of apps...... ....I am not so sure that this is the right way for the evolution of winbuilder, but however I am here proposing an alternate path, which is not incompatible with the main one, and that could give some more practical uses of Winbuilder. Starting from the excellent results of picoXP/hojoPE, why don't we start thinking about "specialized" builds? I mean VERY small builds that ONLY perform a few chores, but do them very efficiently, without "bell and whistles". As an example, in my post here: I enumerated what I think are the possibilities to install 2K/XP/2003 when booting from a USB stick. there are at least 4 possible ways to install XP: 1) from a booted 16-bit environment through WINNT.EXE 2) from a booted 32-bit environment through WINNT32.EXE 3) from a \I386 or \minint folder by invoking SETUPLDR.BIN (which is what the normal install CD does) 4) from an "expanded" pre-install bootfolder $WIN_NT$.~BT like in the flyakite multiboot DVD tutorial to which you can add: 5) from an .iso using Windows Server 2003 Sp1 or greater SETUPLDR.BIN and RAMDISK.SY_ a method that needing a HUGE amount of RAM for a RAMDISK Method 1) is fully documented here: Method 2) is (partially) documented here: Methods 3) and 5) are in the works here, thanks to cdob: Method 4) is in the works here, thanks to porear: As I see it, a derivative of picoXP/MojoPE would be the ideal solution for method 2), with a minimal overhead (cd/disk occupation).....
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049277807.82/warc/CC-MAIN-20160524002117-00130-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
1,671
18
https://www.newyorkbakerycofoodservice.com/recipes/sesame-bagel-halloumi-and-vegetables/
code
- 1 Sesame seed bagel, halved (115g) - 1 tblsp tzatziki (15g) - 2 slices aubergine, 5mm thick (20g) - 3 wedge slices red onion (10g) - 2 slices red pepper, sliced in 10mm strips (30g) - 2 slices halloumi, 5mm thick (25g) - 5g rocket - ½ tblsp runny honey - 1 tblsp olive oil - Griddle all the vegetables for two minutes either side so they have bar marks on. - Brush the halloumi with olive oil and griddle for one minute either side creating bar marks, then remove from griddle and drizzle with honey. - Slice and toast the bagel then spread the tzatziki on the base. - Place the griddled aubergine on the base followed by the other vegetables and the rocket. - Finish with the warm halloumi and bagel top.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100304.52/warc/CC-MAIN-20231201183432-20231201213432-00217.warc.gz
CC-MAIN-2023-50
708
14
http://three99.com/
code
Programming web applications with Ruby on Rails, PostgreSQL (or MongoDB), HTML5, mobile-first CSS and We are pretty good with this stuff and we are doing it with passion and honesty. Although entrepreneurs at heart, we are still far from being full-time on our own products. We are trying though and there is at least one app that we are proud of. That is Vetrian, a management suite for veterinarians. Dimitris Dovinos is a web application developer with broad background ranging from electrical and mechanical engineering, semiconductor physics (single electronics - nano-structure fabrication) to software engineering. Main interest is the development of value for money software that serves real needs and is fun to use. Vassilis Terzopoulos is a front end engineer, passionate with writing readable code and creating responsive web application interfaces. We are located in Chalkida, a small beautiful town in central Greece.
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131300472.97/warc/CC-MAIN-20150323172140-00247-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
930
7
https://gokhanatil.com/tag/spark/page/3
code
This is my forth blog post about Oracle Big Data Cloud Service – Compute Edition. In my previous blog posts, I showed how we can create a big data cloud service compute edition on Oracle Cloud, which services are installed by default, ambari management service and now it’s time to write about how we can work with data using Apache Zeppelin. Apache Zeppelin is a web-based notebook that enables interactive data analytics. Zeppelin is not the only way to work data but it’s surely very friendly for end-users and (as I said before) it’s already installed to our big data cloud service compute edition. We can create a rule to allow access to TCP port 9995 for accessing Zeppelin directly, or we can use “big data console” provided by Oracle. I’ll prefer the second one because our Ngix proxy will let only authenticated users to access Zeppelin. After you reach the console, go to the notebooks page. Click “new note”, enter a name and then click “OK” – this will create a new empty notebook, and you’ll start editing it. My new notebook’s name is “MyFirstNote”. As you can see there are some sample notebooks, you can examine them to learn how you can use java and spark with Zeppelin.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710237.57/warc/CC-MAIN-20221127105736-20221127135736-00110.warc.gz
CC-MAIN-2022-49
1,219
3
https://ziyadliwa.com/event/storytellers-exchange-setting-up-designing-an-online-newsletter/
code
This month’s focus: This month, we are going to talk about the pros and cons of having a newsletter, look at how to set up an email mailing list, create a simple newsletter template, and talk about how to build a list and keep in touch with your subscribers. You are welcome to simply observe and take notes, however if you want to build your very own mailing list and newsletter as we go (recommended) or tweak an existing newsletter, then it’s a good idea for you to be at your computer so that you can follow along and ask questions as we go. What to expect: This is a monthly event that usually includes a mini-workshop with templates to help participants think about the art of storytelling from the perspective of “the business of storytelling”. These events are always a mix of group discussions, individual exercises, breakout rooms, and a bit of theory. Time: 90 minutes Rough format: 15 minutes introductions, 45 minutes workshop, 15-30 minutes discussions and questions Timezone: CET (Central European Time)
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510387.77/warc/CC-MAIN-20230928095004-20230928125004-00740.warc.gz
CC-MAIN-2023-40
1,026
8
https://www.gaige.net/slathering-xcode-variants.html
code
I've been doing quite a bit of experimentation with recent features in Xcode lately, especially as regards trying to efficiently run my GitLab-powered Mac Mini build farm. Recently, as I've been doing some work on CartoMobile, I've been updating the testing code there and stole some ideas from the Cartographica test suites, which I intentionally build for both Apple Silicon and x86_64 and then run on 2 OS variants with each processor family. In this case, I collect coverage information from all 4 and then merge them because I have variant code that runs on different CPUs and versions of the OS (more the former than the later, because some libraries are specific to one architecture or the other). In Cartographica, the CI code follows these steps: Build the code for testing Run a matrix job across the CPUs and Operating Systems that I need to test, collecting junit and coverage information - Current macOS and x86_64 - Current macOS and arm64 - Previous macOS and x86_64 - Previous macOS and arm64 For CartoMobile, I did something similar, but ran into a problem with slather in doing so and also realized that I was likely wasting time and effort. First, the problem that I ran into was specifically with running slather without pointing at the correct directory. In this case, I wasn't pointing slather at the migrated directory when checking coverage, thus failing to find the coverage files when running. However, more importantly, this led me to the realization that the way that I was going about this was wrong for CartoMobile. Unlike Cartographica, where I was doing matrixed coverage because I have code that only operates on specific CPU architectures or versions of macOS, CartoMobile has a single set of code that runs on all SDKs, and since I can't run coverage tests on the iphoneos SDK, that meant that all that was interesting was running the coverage tests for the simulator on both iPadOS and iOS. In addition, for CartoMobile, I also run TSAN and ASAN tests (with UBSAN set). Although the builds for those can take a while, the runtimes are short, and the builds are completely independent. Further, the coverage for these are not important, since coverage tests can (and should) be run without the sanitizers. Thus, unlike Cartographica, for CartoMobile, I decided to matrix the build and test functions together. The result is: Build for simulator and test with Coverage, collecting junit and coverage Build and run simulator using an Xcode test plan (.xctestplan) that runs with: - TSAN + UBSAN - ASAN + UBSAN Build and run my iOS snapshots on a minimum iPad and iPhone simulator (UI Test) Build and run my iOS snapshots on all sizes and languages (AppStore snapshots)
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00837.warc.gz
CC-MAIN-2023-40
2,701
27
https://www.youtube.com/watch?v=4TlPU0QWv6g&feature=youtu.be
code
Download it at http://www.opera.com/browser See http://my.opera.com/ODIN/blog/2011/12... for more traditionally-packaged information. * monkeyfighter: see http://www.youtube.com/watch?v=z4t6zN... Opera 11.60's out with loads of new stuff in it I'll tell you what it's about in a festive minute. got more robust and faster. In your yuletide sock is Ragnarok, Our HTML5 parser. shines as bright as reindeer noses. It can be buffered and be seekable. muted and preloaded. We all love our gradients! So thank the Angel Gabrial! not just boring linear but super-sexy radial. All cool kids love Ecmascript So shout out your hurrays! We've got the mode that's oh-so-stict And lovely typed arrays. A present that is heaven sent is the DOM Event Constructor. Without it, synthetic events are a total ... monkeyfighter*. Deck the halls with protocols Light the yuletide candles. You can define the content types that your web apps should handle. All platforms, even Win 2K though that O/S is shoddy. For Opera's wish for the new year is the Web for everybody.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736678818.13/warc/CC-MAIN-20151001215758-00091-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
1,049
33
http://www.alachisoft.com/resources/docs/ncache/prog-guide/cache-startup-loader.html
code
Cache Startup Loader NCache provides you with a facility of adding the specified data in the cache on cache startup. It means every time the cache will be started the data will be loaded in the cache without the user, manually adding it. This section describes the implementation and usage of Cache Startup Loader. In this Section Cache Startup Loader Overview The conceptual details of cache startup loader as well as its advantages and usage. Sample Implementation of ICacheLoader on Single Node Discusses the implementation of cache startup loader on a single node. Sample Implementation of ICacheLoader with Distribution Hints Discusses the implementation of cache startup loader with distribution hints. Components of Cache Startup Loader Discusses in detail the components of cache startup loader.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027321160.93/warc/CC-MAIN-20190824152236-20190824174236-00258.warc.gz
CC-MAIN-2019-35
803
12
https://vcahospitals.com/valley-tucson/team/becca-simerly
code
Dr. Becca Simerly grew up in Jasper, Tennessee, and graduated from the University of Tennessee College of Veterinary Medicine. After shadowing a wildlife rehabilitation veterinarian during her undergrad, she knew that she wanted to work with animals as her career. Her interests include wildlife rehabilitation, pathology (anatomic), zoo medicine, and avian medicine. In her free time, she enjoys birding, hiking, photography, and crocheting. Becca has 2 pets: an 11 year old English Shepherd named Star, and a 5 year old Jungle Carpet Python named Aster. Our veterinarians are a team of highly trained individuals dedicated to the health and well-being of your pets. Explore our veterinarians' biographies and learn about the individuals who make our hospital an excellent choice for your pet's care.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00488.warc.gz
CC-MAIN-2022-40
801
2
https://www.4winkey.com/windows-tips/how-to-encrypt-a-hard-drive-on-windows-8.html
code
"How to password protect hard drive on Windows 8?" To password protect your hard drive on Windows 8 computer, it's really simple. BitLocker is Windows's built in hard drive encryption software. It works on Windows 8.1/8, 7, Vista. We'll give the guide of using Windows 8 but the directions are mostly the same on all 3 operating systems. The speed of the encryption depends on the size of the drive and which encryption option you chose. Now your hard drive has been password-protected now. When you unlock the drive, it should look like this in your computer. For Mac OS X 10.8, it's easy to encrypt a drive. Simply right click the drive, either in the finder window or on your desktop. For Mac OS X 10.7 and 10.6, open the Applications/Utilities Folder. If you have other questions about hard drive on Windows 8, feel free to contact us. You can also click here to learn more information about hard drive.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473871.23/warc/CC-MAIN-20240222225655-20240223015655-00332.warc.gz
CC-MAIN-2024-10
907
6
https://forum.tudiabetes.org/t/good-vs-bad-calibrations/29585
code
I'd like to add the following to my original post (in actuality, it should replace my original post): I've heard a lot of anecdotal evidence surrounding optimal times to calibrate, how often to calibrate, and when not to calibrate your Dexcom. A lot of the information I came across was conflictual, so I called Dexcom and was connected with one of their CDEs who, IMO, sounded like she knew what she was talking about; she did not sound like she was reading from a pre-scripted "Answers to FAQ" sheet. Following is a summary of the information she gave me. I make no guarantees regarding the accuracy of this information, so proceed with caution and with the knowledge that YDMV. A. This is when you should calibrate: 1. When you are prompted to calibrate by either: a. Two red blood drops that appear two hours after starting (or restarting) a sensor OR b. One red blood drop (these prompts occur every 12 hours) Caveat: Do not calibrate even if prompted to do so by a blood drop if the trend arrow is pointing either straight upwards or straight downwards (one or more arrows). If this is the case, WAIT until the directional arrow is either horizontal, trending slightly upward, or trending slightly downward before calibrating. Be patient; you will not be "timed out" if you do not calibrate immediately after a blood drop icon appears. 2. Whenever a meter reading is greater than or equal to 80 mg/dL AND the Dexcom reading is greater than 20% higher than the meter reading or more than 20% lower than the meter reading. 3. Whenever a meter reading is less than or equal to 79 mg/dL AND the Dexcom reading is more than 20 mg/dL (not 20%) higher than the meter reading or more than 20 mg/dL (not 20%) lower than the meter reading. B. This is when you should not calibrate: 1. If BG (via meter) is higher than 400mg/dL. 2. If BG (via meter) is lower than 40 mg/dL. 3. If any of the following appear on the Dexcom screen: a. question marks b. an hourglass c. the antenna icon (receiver is out of range of transmitter) d. one or more trend arrows that point either straight up or straight down (horizontal arrow or arrows trending slightly upwards or slightly downwards are O.K.) e. no trend arrow(s) REMEMBER: More is NOT better when it comes to calibrating the Dexcom. Calibrating more often than when instructed to do so by blood drop icons or when the Dexcom reading is not inaccurate ("inaccurate" as defined by A.2. and A.3. above) will not improve the accuracy of your Dexcom and will likely worsen the accuracy of your Dexcom readings. Some, but not all, of this information is available on the Dexcom website: http://www.dexcom.com/sites/dexcom.c...ney/story.html
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077336.28/warc/CC-MAIN-20210414064832-20210414094832-00544.warc.gz
CC-MAIN-2021-17
2,674
20
http://www.fncta.fr/jumped.php?cat_id=purchase-written-biology-paper&closely=i-need-someone-to-do-my-assignment-3868
code
I need someone to do my assignment The assignments that require unique thought will be written completely from scratch. We offer online homework help of any complexity and academic difficulty, be it a high school, college, or university. You can now pay someone to do your coding assignment for you from any part of the world at affordable prices with our fast delivery i need someone to do my assignment services. Ask someone to do my assignment in coding is a wise decision if you feel pressured by time and tons of other assignments to complete at a time. Because, finally you came to the right place; we are here to handle all of your academic. The foremost reason is that it allows you to devote more time to do studies and cocurricular activities, which otherwise would have spent in doing the. Must be tired of seeking for professional experts who can help you. Don't worry about your problemssimply ask us, "please do my assignment for me" and we'll let you https://nippop-eventi.it/base.php?category=buy-written-persuasive-speeches&reflections=the-kite-runner-essay-help live peacefully. When you turn to us for assistance with a request, need to pay someone to do my excel homework for me, be rest assured that you will be assigned a highlyqualified writer who is wellversed in your topic and subject area. We can also resume writing services ahmedabad guide you on how to solve statistical problems and get solutions. This was the most impressive thing i need someone to do my assignment for me. I want someone to do academic writing help review my assignment. But you do not have to worry about any issue cropping up and causing hindrances in your assignment completion. Can i pay someone to do my coursework for me - Please, do not delete this letter, as you may need to use it in the future. - From time to time, any student needs help with math homework and assignments, and is always the best option. - In order to do assignments online on any academic topic, we have recruited professionals in various academia. - Pay us to i dont want to do my assignments do computer science homework assignments online. - They can handle any coursework your professor comes up with as long as you provide all relevant information, like rubrics, prompts, and other input. - Remember that all data and files concerning your assignment have to be provided before the writer is assigned. - Moreover, when you order papers from do my assignment service, you can demand revisions until you are % satisfied with the writing. All you need to do is to send us requests and pleads including messages like help write my assignment, i need help with my assignment, and help me write my assignmentand our friendly team of representatives will assist you on the. Yes, thats exactly what were saying. So if you really wish for someone to whom you can say do my assignments and are even going to pay for it, you better hire the best writers in the area. Click on the button below to get started. Pay someone to write my assignment are both of high quality and cheap. Just say to us: do my powerpoint to do my homework or not to do my homework presentation for me. Is the best company you will find when you google pay someone to do my homework. I am willing to pay someone to do my stat assignments all of them at once. Its ok to skip some of your academic tasks sometimes. Whether youre thinking, i need someone to do homework for mewhen you need an essay, a short answer to a question, quiz answers, or problemsolving help, our experts will have your back. There are homework help services that connect you with top writers and tutors. We are happy to be one of the best services that offer the most quality excel papers to our clientele. You can hire an expert to help with your assignments, research papers, essays, dissertation, and project in less than minutes. So whenever you need to do your assignment, just contact us. Most people are as busy who wants to do my homework for me as you are. I need someone to write my assignment. Once i was in despair and decided to look for someone who could do my c++ assignment for me because i already knew i wouldnt be able to do my c++ project and the time was almost up that is why i had to be in a hurry. Not only will it be very beneficial to you, your schedule, wallet, it will also help your brain. Just ask us, please do my essay for meand get quality cheap paper ontime. If you keep working in a superhuman mode, ignoring your need to sleep and to rest, you can get serious health problems. If you need excel homework help, is the best place to get it i have to do my homework in french we can do your excel assignment for you. Can someone do my physics assignment. Do my assignment for me do my coursework for me, need. Thanks to the whole team of payforessay. We are ready to offer you an alternative solution that will make you free from lots of assignments and will allow you to have excellent marks for your homework. We are the ones who deeply understand all your i dont want to do my homework issues and are. Should you pay someone to do your assignment for you. Talk to a real person. This means that whether a student is in sydney, miami, or any other geographical location, they get a chance to access i need someone to do my assignment our fast and experienced expertshelp. Writers per hour is a powerpoint presentation service for students that can come to your rescue. As a need someone to do my essay result, apart from low prices, we also offer need someone to do my essay the following to every student who comes to us by saying, i dont want to do my homework due to shortage of time or its complexity, so please get my homework done by a professional homework helper. I want to pay to do my assignment. You do not have to worry about those deadlines anymore because our writing help uoit team is specially trained to deliver your work well before the due date. The best option available is to look online when you feel like you need someone to render help services with your homework. I forgot to do my homework yahoo answers - I need assignment help; who can do my math homework for me. - Think about the things you would want from any other writing business. - To start using our services, its enough to place a request like i need a writer to do my assignmentor please, write an essay for me. - The powerful and allknowing google told us you need someone to do your homework. - I have hired experts to do my stat assignments before on tutlance and got very good grades. - We are the best choice you can ever make because we ensure that you get the good grades in all your assignments and throughout your course. - Cheap "do my homework pay some one to do my homework for me" service. - I need someone to do my statistics homework. - Writers per hour is the answer to i want to get someone to do my assignment. Were a team of tutors with several years of experience in academic assistance. Just pay someone to do my assignment. How can i pay someone to do my homework quick and correct. Do my powerpoint how to do my first resume presentation for me. Do my assignment for me for the busiest students in need. The person who handles your academic papers and projects need to have the time to complete them. This question will take you to the top rated search engines in order to find out the answer of is there anyone who can do your assignment. Pay for someone to do my homework - Therefore, when you pay to get your assignment done, there are no overthetop fees. - With time everything changes, and it surely has changed the way people do their assignments; previously everyone did their homework on their own now they ask around, can i hire someone to do my assignment. - When you think i need someone to write my assignment, you should reach a skillful essayist to help you in a few clicks. - Relax while we do your assignment. - Click on the "place order" button on our and then fill out the contact form. - You need help, will someone do my assignment some parameters to guide are more than happy of research, will someone do my assignment analysis and discussion. Yes, our math gurus will do all your math problems and score a straight a or b. Features of our do my powerpoint presentation services: prices start from. We offer excel assignment help to anyone who affordable essay writing company launched in 2006 needs assistance with excel here and now. Get better grades by buying calculus homework answers online cheap. We work around the do my assignment cheap clock, which means that you will get our response as quickly as possible. Whether you need help with philosophy essays, history papers, online exams, literature papers, or just about anything else, we do it all. Hire us to do one or all your assignments. Do you know someone who i can pay to get my homework assignment done. All you need to do is follow simple steps as shown below. No matter what paper you need, whether it's math homework or a case study, our writers are available roundtheclock to deliver i need someone to do my assignment highquality academic help. When you whisper write my assignment for mein our ears, we delightfully offer our excellent services to ensure that you accomplish highgrades. However, you cannot simply approach a person you know and tell them do my assignment. You just need to ask us please, help me do my assignment for me do my assignment do my assignment, choose someone to do my assignment for me do my assignment for me australia the type of homework task that you want us to complete, give a bit more details, hire a writer that you like, can someone do my assignment for me and wait until we deliver. No matter what paper you need, whether it's math homework or a case study, our writers are available roundtheclock to deliver highquality. Basically, the only thing you will need to do is to say i want to pay someone to write my assignmentsand we will immediately come to save you and your academic performance. Get webassign homework answers calculus now. They can then start writing where to do my homework the essay you need, with your input. Yes, you can have someone do your programming assignment for you at a very affordable price. Get a free quote and start in minutes (no signup required). We are providing highquality services at low prices to help students ace. Do my coding assignment for meservices. Our professional team will do any type of assignment before the deadline. Sah is here to provide you 'do my project' services online. Wondering: where to hire someone do my calculus homework for me. With modern devices and software solutions, reaching virtual i need someone to do my assignment assistance is particularly easy. However, it would be best if you were sure of the service provider's reliability that you choose. I need someone to do my assignment I can help you with any questions you may have, and if you dont like i need someone to do my assignment the answers, or. Hire/pay an expert to do your i need someone to do my assignment statistics homework/exam/class for you. Moreover, we truly understand, that some students are hesitant to ask someone to write their assignment. But when the time to do my c++ homework comes im totally helpless. Please let me know what your team can do. All you need to do is send us your task instructions or contact us and say, please do my coding assignment. Also, we can help with assignments of different academic levels, so it doesnt matter whether you are a high school, college, or university student. Need help with physics homework. Best do my assignment i need someone to do my assignment services @ % off from aussie writers. They might be stressed with the subject and are not capable of booking a lesson with their lecturer. There are a lot of students out there who feel immobilized and restrained due to the invisible chains of fear that they might i need someone to do my assignment fail their academic writing task and this leads to further confusion in their life, infuriating them beyond their. At, we can buy antique paragraph aid you with superfast math solutions that answer your woes like, who can do my math homework. Pay someone to take my online exam for me. We will look into your requirements and hook you up with an expert who will offer you the best programming assignment writing service.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00582.warc.gz
CC-MAIN-2023-23
12,362
34
https://richtabor.com/wordcamp-atlanta-2018/
code
Believe it or not, this year was my first WordCamp Atlanta experience ever. While I have lived in Georgia for a number of years, I’ve never been able to make it. Let me tell you, I sure am glad I made it this year. In short, WordCamp Atlanta was great. It was a weekend full of thoughtful talks, bright folks from all over the world, awesome parties, and a lot of what makes the WordPress community so vibrant — diversity. My first WordCamp talk — ever Saturday afternoon, I had the pleasure to speak on Gutenberg block development. In fact, there were three talks on Gutenberg this weekend, not to mention a workshop dedicated to Gutenberg development on Friday! Ever since watching the Gutenberg demo at WordCamp US 2017, I’ve been diving into Gutenberg block development quite consistently. I’ve been working on Writy.io and GutenKit, two projects which wholeheartedly embrace Gutenberg, and I’m so honored to be able to teach folks what I’m learning along the way. This was my first WordCamp talk — ever, so as you can imagine, I was super stoked! If interested, you may view and download my slides, and as soon as the session is up on WordCamp.tv, I’ll add a link to that as well. Gutenberg Dev Workshop We talked about block development, how themes and Gutenberg will interface, matching WordPress themes and Gutenberg styles, React, development tools, resources and even more. It was an awesome time sharing with a room packed with folks looking forward to the future of WordPress. I even gave a demo of custom blocks I’m developing for Writy.io & GutenKit , which was pretty well received. If you’re interested in either Gutenberg-centric project, you may subscribe for updates at each project’s website. Aimee Copeland inspires everyone in the room I couldn’t tell you how many inspiring snippets Aimee gave during her session on Saturday morning. There were dozens—at least. Having overcome so many tremendous challenges since her life-changing accident, Aimee shared that we are all so much stronger, and more capable, thank we really think. “If you give up on try 47, then you didn’t really want it anyway.”— Aimee Copeland Aimee talked on how through her WordPress website, the greater community rallied together and supported her through such a challenging stage in her life. WordPress also powers the Aimee Copeland Foundation website, which is all about empowering people of all abilities. 11 year old wins 3rd place #WCATLCTF WordFence hosted the first ever capture the flag hacking competition, involving cryptography, web vulnerability and WordPress. There were a number of challenges with point values assigned based on difficulty. To everyone’s surprise, the competition’s third-place award was given to an eleven year old boy, who went by the handle “Unstoppable.” Unstoppable completed five challenges to take the third place spot. The future of WordPress and security is looking good! Finding happiness at the Happiness Bar On Saturday I spent a good amount of time at the Happiness Bar. Many of us actually ate lunch there as well! It was honestly a great experience helping folks with their WordPress sites and I recommend it for folks looking to give back a little. WordCamp Atlanta 2019 All in all, I was blown away at WordCamp Atlanta — in fact, I’m already looking forward to next year! Of course, this would not have been possible without the generosity of the sponsors, organizers, speakers and volunteers. They all deserve a huge T H A N K Y O U and a nice quiet week to kick back and relax.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102469.83/warc/CC-MAIN-20231210123756-20231210153756-00614.warc.gz
CC-MAIN-2023-50
3,572
17
https://riptutorial.com/ios/example/17469/registering-app-for-use-with-cloudkit
code
What you need is to get an entitlements file so the app can access your iCloud and write records using CloudKit. Follow the steps to grant access to iCloud from your app: 1- Select the project in the Project Navigator, and then open the General tab. 2- In the Identity section, set your developer Apple ID to the Team dropdown menu. (If it is not available, add it in Xcode menu -> Preferences -> Accounts. 3- Go to Capabilities tab in the project properties and turn iCloud on. Then, select "Key-Value Storage" and "CloudKit". 4- Make sure these items are checked: If all of the items are checked, then your app is ready to use CloudKit.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817239.30/warc/CC-MAIN-20240418191007-20240418221007-00202.warc.gz
CC-MAIN-2024-18
638
7
https://eng.hsu.edu.hk/academic/dr-lam-tsz-kwan-charles/
code
PhD (Purdue University) Tel : (852) 3963 5437 Email : [email protected] Dr Lam received his PhD in Linguistics from Purdue University, USA. His primary research interest is syntax-semantics interface under the generative framework, i.e. how meaning shapes the structure of sentences. In addition, he is interested in the similar behaviours across different syntactic categories. He has worked on Cantonese, Mandarin and German. Dr Lam teaches the following courses: - ENG1200 Introduction to Linguistics - ENG3222 Corpus Linguistics - ENG3200 Meaning and Language - ENG3327 English-Chinese Contrastive Analysis - ENG2205 The Sound Systems of English - Lam, C. (2021). Identities are no joke (or are they?): Humor and identity in Vivek Mahbubani’s stand-up. HUMOR: The International Journal of Humor Studies. https://doi.org/10.1515/humor-2021-0049 - Lam, C. (2020). The V-one-V construction in Cantonese. Studies in Chinese Linguistics 41(2):161-184. [PDF] - Lam, C. and C. Wong (2020). Accent in digital humanities and language studies: The case in Hong Kong. 3L: The Southeast Asian Journal of English Language Studies, 26(1):32–43. - Francis, E., Lam, C., Zheng, C. C., Hitz, J., & Matthews, S. (2015). Resumptive pronouns, structural complexity, and the elusive distinction between grammar and performance: evidence from Cantonese. Lingua, 162, 56–81. - Yap, H., Wang, J., & Lam, C. T. K. (2010). Clausal integration and the emergence of mitigative and adhortative sentence-final particles in Chinese. Taiwan Journal of Linguistics, 8(2), 63–86. - Lam, C. (2021). Reduplication as summation. In H. Filip (Ed.), Counting and Measuring in Natural Language. Cambridge University Press. https://doi.org/10.1017/9781316823774 Refereed Conference Papers - Lam, C. (May, 2021). Digital processing of Cantonese corpus data. School of Cantonese Studies, Education University of Hong Kong. - Lam, C. (May, 2021). How digital platforms facilitate parody and satire: humor in the constructionof Hong Kong identity. International Conference on Digital Representation and Research in Arts, Humanities and Culture, the Hang Seng University of Hong Kong - Wong, C., & Lam, C. (May, 2021). Poetics of time and identity in Hong Kong lyrics: a digital investigation. Hong Kong Popular Culture: Imagining a Research Field - Lam, C. (Feb, 2021). Fake news and where to find them: Identifying misinformation through natural language processing and AI. Invited talk in the International Conference on Mis-information and Fake News, the Hang Seng University of Hong Kong. - Lam, C. (Nov, 2020). A linguistic approach to misinformation in Chinese. Workshop on Computational Humanities Research (CHR). Hong Kong. - Lam, C. (Oct, 2020). Forms and meanings of lexical reduplications in Cantonese: a corpus study. PACLIC 34 - Lam, C. (Jun, 2020). Acceptability judgments of Cantonese data and their implications (Invited Talk). The 3rd Forum on Cantonese Linguistics. Hong Kong. - Lam, C. (Apr, 2020). Variations in Cantonese relative clauses: an experimental approach. The 4th Workshop on Innovations in Cantonese Linguistics (WICL-5). The Ohio State University. - Lam, C. (Jun, 2019). The V-one-V construction in Cantonese. The 1st International Workshop on Cantonese Syntax. Olomouc, Czech Republic. - Lam, C. (Apr, 2019). Cantonese relative clauses with ge3 and classifier [廣東話「嘅」「嗰啲」關係子句]. Workshop on Cantonese 19. Hong Kong. - Lam, C. (Dec, 2018). Classifier-less nominals in Hokkien and Cantonese. The 11th Cross-Strait Symposium on Modern Chinese Language. Hong Kong. - Lam, C. & Wong, C. (Aug, 2018). Language studies in the AI era: challenges and opportunities. The 1st International Conference on Artificial Intelligence and Humanities. Seoul, Korea. - Lam, C. (Jun, 2018). Constraints of the V-one-V construction in Cantonese: Evidence from corpus data. The 4th Workshop on Innovations in Cantonese Linguistics (WICL-4). Vancouver, Canada. - Lam, C., Leung, G., & Pai, R. (Jun, 2018). Identities are no joke (or are they?): Humor and identity in Vivek Mahbubani’s stand-up. The 4th Workshop on Innovations in Cantonese Linguistics (WICL-4). Vancouver, Canada. - Lam, C., & Wong, C. (2017). Challenges in digital literacy in English curriculum. In Proceedings of the teaching NLP for digital humanities workshop (Teach4DH), Humboldt-Universität zu Berlin. - Lam, C. (2015). Classifiers and unaccusative verbs in Cantonese. In Proceedings of the first Buckeye East Asian Linguistics Forum, the Ohio State University. - Lam, C. (2014). A unified analysis to surpass comparative and experiential aspect. In Proceedings of the 28th Pacific Asia Conference on Language, Information, and Computation (pp.368–377). - Lam, C. (2014). A unified semantic analysis of classifiers and reduplication across nominal and verbal domains. In Proceedings of the 9th annual symposium of the Purdue Linguistics Association. - Lam, C. (2013). Reduplication across categories in Cantonese. In Proceedings of the 27th Pacific Asia Conference on Language, Information, and Computation (pp.277–286).
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00145.warc.gz
CC-MAIN-2022-33
5,117
36
https://dba.stackexchange.com/questions/243290/query-to-reduce-column-length
code
I'm new to PostgreSQL so sorry if I haven't explained myself clearly! I've used the below query to find out the max character length of each column in my table. I now want to be able to shorten each column to the largest character length. Can anyone help? SELECT MAX(char_length(gid)) as column1, MAX(char_length(column2)) as column2 FROM schema.table The reason I want to do this I want to export to shapefiles and the file size is huge as the majority of the columns are set to 254.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587926.9/warc/CC-MAIN-20211026200738-20211026230738-00330.warc.gz
CC-MAIN-2021-43
484
4
https://sysctl.se/release/impex/2021/05/27/2.4.2-release-of-impex.html
code
- A fix for rebooting the station after nightly update. There was a change in file system semantics that impacted the reboot script, so the script have been changed - The udev rules used to lock the usb port to only allow mass storage devices attached to the Impex have a bug for certain devices. This is a regression that was found during 2.4.1 release tests. - The Graphical user interface in 2.3 used “ghosting” to signal that a specific AV engine has finished, making it easier for an user to follow progress. A GUI change in 2.4 broke this and was found during 2.4.0 release testing. A fix was not finished in time for 2.4.1 release, so it got bumped to a 2.4.2 release instead. - A bug in the detailed file card for a link was pointing to the wrong part in the file exception listings. - A UTF-8 encoding error exist in the admin contact form used on the Impex station. If a non ASCII characters is used in the admin contact information the station be unable to load this information and will not be accessable. Removing the non ASCII character in the admin contact information will make the station ready for action again. The changes fixing this requires extensive testing but is scheduled to be included in the 2.5 release
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103464.86/warc/CC-MAIN-20231211013452-20231211043452-00188.warc.gz
CC-MAIN-2023-50
1,235
5
http://www.newgrounds.com/portal/view/271214/review_page/9?footer_feature=channels
code
The saga of Mike Weiss at college. What crazy contraption will this guy come up with next? A security guard is trapped in a bunker, with a strange creature crawling around. A Sequel to the ever popular 'Edd vs. Pie', i present 'Edd vs. randomness'. i worked on more of the random side of the animation this time round, unlike last time.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053330/warc/CC-MAIN-20131204131733-00065-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
336
5
https://www.ditii.com/ocs-2007-uploading-handouts-in-livemeeting-2007-console-fails/16640/
code
If you check the Pwconsoledebug.log you will find the following error. This log is use to troubleshoot LiveMeeting 2007 and is on by default. It is located in %temp% directory on the client. You will see the following error in the Pwconsole Log. MC] 17:36:50:963 GMT [PID 2416] [THREAD 5044] [D] FileTransferProgressDialog::OnInit [MC] 17:36:51:119 GMT [PID 2416] [THREAD 5044] [D] BlobManagerC::cRejectUpload [MC] 17:36:51:119 GMT [PID 2416] [THREAD 5044] [D] BlobManagerC::threadAndServerDone [MC] 17:36:52:525 GMT [PID 2416] [THREAD 5044] [D] FileTransferProgressDialog::OnDestroy On the server side you would use the OCSLogger tool to log data from DataMCU component. We got the error below on the server side. TL_ERROR(TF_COMPONENT) 04DC.08C8::12/13/2007-22:47:37.647.000003cc (DataMCU,Logger.error:254.idx(78))( 49296756 )class placeware.apps.blobparts.BlobManagerS=BlobManagerS::sRequestUploadBlob – block all files - Bring up the OCS 2007 MMC - Right click the Pool - Click Application Properties - Click Intelligent IM Filter - Click File Transfer Filter Tab - Remove the Block all file Extension setting and Click OK - Restart Frontend Service You can get more information on the Intelligent IM Filter in the OCS 2007 Administration Guide. OCS, Office Communications Server, LiveMeeting, Console, Conferencing, Knowledgebase, Tips and Tricks Source:→ OCS Blog
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247488490.40/warc/CC-MAIN-20190218220415-20190219002415-00091.warc.gz
CC-MAIN-2019-09
1,373
19
https://devkeydet.blog/2008/07/16/learn-how-to-develop-on-sharepoint/
code
I’d have to say that my weakest area of development is probably SharePoint. I know how to build a basic SharePoint web part and that’s about it. I’m pretty much a dunce when it comes to SharePoint. One of the things I’ve been telling myself for the last couple years is that I need to bite the bullet and "get smart" on SharePoint development. For the first time in a long time, I have some down time so I am going to try to block of some time in the coming weeks to do so. Where to start? Paul Andrew blogged about a series of 10 MSDN webcasts covering SharePoint for .NET Developers. All of the webcasts were recorded: There is also a fairly new resource for SharePoint development at http://MSSharePointDeveloper.com. These resources are where I am going to start!
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00153.warc.gz
CC-MAIN-2023-14
775
2
http://dceditorsincambridge.blogspot.com/2008/06/whew.html
code
I'm not the world's best traveller, so I'm rather impressed with my present state -- a bit tired and glad to be home, but already looking forward to the next trip (Barcelona, mmmm). Trip reports will come soon, but meanwhile, in the spirit of John's list, here's what *I* know: One day is enough to get a taste of a city. One week is not enough to explore half a country. (Well, if that country is Portugal. It's plenty if the country is, say, Monaco.) I underprepared. You can't just print the articles and buy the guidebooks. You also have to read them. Random children are enamoured with John in foreign countries, too. I need to find a hobby that I can do while standing on a jetway surrounded by screaming children and impatient people. That would turn wasted time into found time. I've carried the same poor paperback on all trips, and still haven't finished. Not only that, it's the book club book from two months ago. Don't hold a conference in Europe during any kind of European sports event. Attendees will disappear at game time. There are approximately 35 roundabouts between Luton airport and Cambridge. (Hat tip: John Kelly) The weirdest foods I ate this month were beef tongue and tripe. Also on the list: squid and herring. Language is a barrier less often than you might think. And finally: I'm happy to be home in Cambridge.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591578.1/warc/CC-MAIN-20180720100114-20180720120114-00431.warc.gz
CC-MAIN-2018-30
1,342
12
http://tenedor.github.io/me/
code
Daniel Windham* as of May 2016 I'm interested in research into human-computer communication and into the ways humans model, manipulate, and think about complex systems. I want to make our software better at communicating with us, particularly in order to extend programming capabilities to a larger audience. Today's software is fragile, messy, bloated, and incomprehensible. We need new ways to produce it and new ways to understand it. You can learn about my projects here. - Research with dynamic physical shape displays (MIT Media Lab) - An open-source Python execution visualizer - A tutorial/treatise called Thinking in Git - Some digital fabrication projects - Organizing the internet's knowledge with Athena You can find some other things, too. - The French-Enlightenment-style salons I used to organize - Some drawings and paintings I've made - A speech I gave about paying attention to your lizard brain - Something we called The Burrow - Things by other people that I recommend You can hop to another Daniel-island, like:
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511424.48/warc/CC-MAIN-20231004220037-20231005010037-00337.warc.gz
CC-MAIN-2023-40
1,032
15
https://forum.photonengine.com/discussion/19043/tanknarok-sample-doesnt-compile
code
I've downloaded the last version of the Tanknarok sample (0.8.0) and there's some missing files or library. I get these errors : Did I miss something ? EDIT : I was using Unity 2019...sry With this amount of missing types, it's usually a problem with the importing. Glad you found the cause (the sample requires Unity 2020 and up).
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711017.45/warc/CC-MAIN-20221205132617-20221205162617-00382.warc.gz
CC-MAIN-2022-49
331
6
https://libs.garden/go/search?q=select
code
.NET LINQ capabilities in Go A golang library for building interactive prompts with full support for windows and posix terminals. A simple plugin for kubectl that enables the selection of resources. Simple, convenient, configurable SSH server selection for the macOS and GNOME Terminal and iTerm2 on macOS. Interactive prompt for command-line applications
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657181335.85/warc/CC-MAIN-20200716021527-20200716051527-00234.warc.gz
CC-MAIN-2020-29
355
5
https://womeninhpc.org/job/hpcnow-france-italy-spain-or-germany-181-ai-application-engineer-emea20231110
code
Do you want to help researchers and engineers around the world solve the most exciting and challenging computational problems? HPCNow! is looking for a passionate and proactive AI Application Engineer to join our international High-Performance Computing team. We work in sectors like drug design and discovery, genomics, bioinformatics, aerospace, aeronautics, astrophysics, quantum chemistry, energy, automotive, visual effects, and many more. HPCNow! is a global services company focused on High-Performance Computing, High-Performance Data Analytics, Machine Learning, and Artificial Intelligence consulting. We help scientists and engineers worldwide, from the design of the hardware solution to the very end of its life cycle, setting up complex pipelines, and accelerating their workflows and applications. We also extend our services by delivering professional training and providing ongoing remote administration and scientific support. At HPCNow! we not only focus on business but also try to achieve a healthy work/life balance, facilitating pleasant working conditions as much as possible. This includes remote work, a flexible work schedule, amenities in our offices, and a diverse and inclusive work environment. Our commitment is to provide our people with all they need for personal and professional growth, involving them in a discovery, innovation, and achievement environment. Science Enablers – We play a crucial role in migrating workloads from regular desktop computers to HPC clusters and supercomputers. We work to bridge the gap between these two distant worlds by capacitating the end users and upskilling them to bring their computational research to a world-class level. Excellence – We strive for excellence in everything we do for our team members and clients. We feel proud of our contributions and celebrate our client’s success as our own. Empowering science with technology – We are a trusted partner that accelerates research and discovery thanks to our commitment to continuous innovation and new technology adoption. Diversity and Inclusion – Our very talented team includes different kinds of mindsets, cultures, backgrounds, and experiences, making HPCNow! an inclusive company. HPCNow! embraces neurodiversity and is committed to an inclusive and respectful workplace where everyone is valued for their unique contribution. Our current team is from eight different countries and can speak ten other languages, but most importantly, we all speak science and tech no matter our background. Gender equality – While we haven’t reached full gender equality yet, we see a new opportunity to get closer to that milestone in each hiring process. We are proud members of Women in HPC (WHPC), and we participate in activities to empower women in STEM (science, technology, engineering, and mathematics). Degree in Computer Science, Computer Engineering, Mathematics, Statistics or Machine Learning. HPCNow! is looking for a passionate and proactive AI Application Engineer to join our dynamic and passionate team. Job functions include collaborating seamlessly with cross-functional teams to grasp project requirements, design ingenious solutions, and actively contribute to the success of new applications using NLP/LLMs or new technologies such as Conversable Agents. As an enthusiastic team member, you’ll embody a perpetual learning mindset. Embrace the dynamic field of machine learning, seize opportunities to grow, and be an integral part of our journey at the forefront of technological innovation. Let your passion for ML propel you to new heights in a collaborative and forward-thinking environment! Eligible to live and/or work in France, Italy, Spain or Germany Excellent oral and written English skills. Availability for business travels. Teamwork attitude, leadership and ability to innovate, proactivity, good communication skills, and focus on achieving results. Skills and Experience Minimum of two years in Software Engineering with at least one significant experience in designing NLP-based applications. Proficiency in Python. Proficiency in crafting and executing successful Proof of Concepts with a strategic focus on implementing precise metrics, ensuring clear project goals and measurable outcomes. Desire to identify and drive resolution of technical issues. Experience with Machine Learning. Experience working with Big Data and Data Bases (vector DB) related to ML. Experience with frameworks such as LangChain and Llamalndex. Data preparation and ingestion. Integration of ML executions in HPC environments or Kubernetes. If you don’t have experience in one or any of the desired skills, we will provide you with the training and the resources required to achieve that knowledge. We offer a permanent full-time position in a good working environment and a highly stimulating and challenging environment. Full-time remote office workplace based in France, Italy, Spain or Germany Flexible working hours. We offer a competitive salary commensurate with the qualifications and experience of the candidate and according to the cost of living in the country. We offer outstanding resources for learning and building experience with new technologies, including internal development and testing clusters, access to an e-learning platform, internal training, and mentoring. If you are interested, send an email to [email protected] with your updated CV, a short motivation letter, and the subject “ EMEA 20231110”.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817222.1/warc/CC-MAIN-20240418160034-20240418190034-00324.warc.gz
CC-MAIN-2024-18
5,499
32
https://math.meta.stackexchange.com/users/80374/andy-brown
code
IT professional with many years experience in .NET, C#, Java, web, windows, servers, databases, software project delivery ... This user doesn’t have any gold badges yet. This user doesn’t have any silver badges yet. AutobiographerSep 24, 2014 This user hasn’t posted yet. Top network postsView all network posts
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00397.warc.gz
CC-MAIN-2023-23
317
6
https://mailman.open-bio.org/pipermail/biopython-dev/2015-November/021143.html
code
Tiago Rodrigues Antao tra at popgen.net Wed Nov 4 09:08:00 UTC 2015 I am going slightly crazy with docker hub. I have refactored all the images here: (README not still up to date) There is now a layered approach, with a separated database image. The problem is that pushing volumes to docker hub is failing for two days. I have a volume with 150 MB that constantly times out (and before that other volumes took several repeats to finalize). Until I solve this problem, this will stay empty: (and all the other layers). Björn, do you know how the folks at BioDocker solve things like these? I would like to transfer this work at a stage that is working... More information about the Biopython-dev
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948976.45/warc/CC-MAIN-20230329120545-20230329150545-00662.warc.gz
CC-MAIN-2023-14
696
15
https://www.freelancer.com.ru/projects/data-mining/data-analysis-statystichs-for-prediction-19729276/
code
I need a qualified person that really know how to deal with data and numbers. I have a program based in R Studio that predicts stuff, and I need a similar one for another sector. I think it's not s difficult for a professional, but I really need some help for getting it improved. Every details will be explained in private, becuase it's very long to explain by text, and it should create some misunderstanding. The professionist need to know how to deal with: RStudio and Statystichs. If you do a nice job, it's very probably u'll get future works. I actually don't have idea for the price, but I'll value every offer! 17 фрилансеров(-а) в среднем готовы выполнить эту работу за $132 I've just completed similar projects during last months in freelancing assignments in other sites. I have 4 years experience in Samsung and other multinationals leading software projects. Hi, I have sound knowledge and experience in the field of analytics. And I have build plenty of algorithms used to predict. I will be good fit for what u r looking for. Regards Pramod The project description sounds clear and interesting. I would like to suggest you my vast experience in Data analysis to develop new prediction program. Let discuss the details in private
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986677412.35/warc/CC-MAIN-20191018005539-20191018033039-00384.warc.gz
CC-MAIN-2019-43
1,290
8
https://research.splunk.com/endpoint/4006adac-5937-11eb-ae93-0242ac130002/
code
Suspicious MSBuild Rename The following analytic identifies renamed instances of msbuild.exe executing. Msbuild.exe is natively found in C:\Windows\Microsoft.NET\Framework\v4.0.30319 and C:\Windows\Microsoft.NET\Framework64\v4.0.30319. During investigation, identify the code executed and what is executing a renamed instance of MSBuild. - Type: Hunting - Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud - Datamodel: Endpoint - Last Updated: 2022-04-07 - Author: Michael Haag, Splunk - ID: 4006adac-5937-11eb-ae93-0242ac130002 Kill Chain Phase - CIS 10 1 2 3 4 5 6 | tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where Processes.process_name!=msbuild.exe AND Processes.original_file_name=MSBuild.exe by Processes.dest Processes.user Processes.parent_process_name Processes.process_name Processes.process Processes.process_id Processes.parent_process_id Processes.original_file_name | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `suspicious_msbuild_rename_filter` The SPL above uses the following Macros: suspicious_msbuild_rename_filter is a empty macro by default. It allows the user to filter out any results (false positives) without editing the SPL. List of fields required to use this analytic. How To Implement To successfully implement this search you need to be ingesting information on process that include the name of the process responsible for the changes from your endpoints into the Endpoint datamodel in the Processes node. In addition, confirm the latest CIM App 4.20 or higher is installed and the latest TA for the endpoint product. Known False Positives Although unlikely, some legitimate applications may use a moved copy of msbuild, triggering a false positive. Associated Analytic Story - Trusted Developer Utilities Proxy Execution MSBuild - Cobalt Strike - Masquerading - Rename System Utilities - Living Off The Land |63.0||70||90||Suspicious renamed msbuild.exe binary ran on $dest$ by $user$| The Risk Score is calculated by the following formula: Risk Score = (Impact * Confidence/100). Initial Confidence and Impact is set by the analytic author. Replay any dataset to Splunk Enterprise by using our replay.py tool or the UI. Alternatively you can replay a dataset into a Splunk Attack Range source | version: 3
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647409.17/warc/CC-MAIN-20230531182033-20230531212033-00263.warc.gz
CC-MAIN-2023-23
2,408
31
http://blog.therealoracleatdelphi.com/2004/11/past-lives-come-haunting_1.html
code
My previous post reminded me of what I used to do before I worked for Borland. I've been at Borland for nearly 13 years. Prior to working for Borland, I designed access control and magnetic stripe reading/encoding equipment. It was a very small company, Elcom Industries, based in St. Louis, Missouri. Only about 15-20 employees. I started as a technician repairing the equipment as it came in for repair and mantenance. After a while started I learning the firmware code and also the microcontrollers we began using at the time (6801/6803/68701). Previous systems were, I am not lying about this, based on a 6100 CPU.. For those of you who don't know what that was... it was a PDP8 on a chip! A 12bit CPU. What a nightmare! Here's some more info. Of course, the 6801/6803 microcontrollers are now considered antiques as well... C'mon... I'm not even 40 yet! Thank goodness that cheaper, more mainstream microcontrollers were becoming popular. When I took the existing magnetic card encoder hardware and designed an RS232 controlled encoder using a single microcontroller (a 68701) and a couple of support chips, the boss took notice and quickly moved me into engineering. I went on to do a ground-up redesign of the access control units. Since this was such a small shop, the engineers did *all* the work for a particular product. From schematic design and printed circuit board layout to case and enclosure design to the actual firmware. I had fun and learned a lot. What is frightening is that this company is still selling the products I designed over 15 years ago. Here's a couple of links... I hope their site doesn't go down from a small “Slashdot” effect ;-).. Scroll down a little. The A4ER is the first thing I designed. It had a single MC68701 This is the staple of this companies' products. I had designed the mag-stripe and barcode version. Looks like they finally added proximity readers... those were the subject of many debates about whether or not we should get into that market or not... looks like they did. I wonder how much of the firware is still my code. From the specs it certainly looks like the hardware hasn't changed too much.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118713.1/warc/CC-MAIN-20170423031158-00554-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,158
4
https://pyra-handheld.com/boards/threads/rebirth-competition-slackware-for-pandora-13-37-release-thread.65990/
code
SL4P - Slackware for Pandora. Version 13.37 and version -current (unstable). Get SL4P-13.37 http://slackware.ope...-13.37%2Frootfs Get SL4P-current http://slackware.ope...urrent%2Frootfs More than 200 packages are already compiled for 13.37 and -current, and ready to download/install. SL4P Wiki page, installation, updates etc. : http://pandorawiki.o...ts/OS/Slackware About Slackware : http://en.wikipedia.org/wiki/Slackware SL4P-13.37 features : -full 3.X hardware support (keyboard, D-pad, buttons, nubs, touchscreen, brightness, OP button, sound, internal and external Wi-Fi, both USB ports, TV-out, 3D driver) minus bluetooth -8 window managers, including Minimenu and Xfce-4.6.2 -KDE-4.5.5 (512M RAM recommended, 8G SD card), installed via internet in two commands -pnd support -pndstore support -most official setup scripts support -zram support -rebuilt slightly optimized video player (mplayer-20101218) -rebuilt optimized audio player (xmms-1.2.11) -three standard firewall configs for eth0, usb0 and wlan0 -updates through official Slackware repository -hundreds of pre-compiled packages hosted @ openpandora.org -an automatized package building system (sbopkg) -the SL4P build system (hosted @ openpandora.org), which can be used to port any Linux/*NIX to Open Pandora -official OP 3.X kernel + git kernel + real time kernel -gcc-*-4.5.2/make-3.82 -perl-5.12.3, python-2.6.6, ruby-1.9.1 -xorg-server-1.9.5 -Apache-2.2.22 -php-5.3.10 -vsftpd-2.3.5 -Xfce layout chooser (beta - see the wiki notes) Bugs/not yet included features : -3.X kernel slow SD access - corrected with the new Super Zaxxon b3 kernel -3.X kernel lack of suspend-to-ram when running from SD card - corrected with the new SZb3 kernel -3.X kernel black and white TV-out - corrected with the new SZb3 kernel -3.X kernel lack of OPP settings - corrected with the new SZb3 kernel -bluetooth not patched -old firefox (13.37) -unperfect automounter -no autologin Tested .pnd compatibility list : http://pandorawiki.o...patibility-list Packages compiled for SL4P 13.37 : http://slackware.ope...ackages%2Fextra Packages compiled for SL4P -current http://slackware.ope...ackages%2Fextra List of official armedslack-13.37 packages : http://ftp.slackware...kware/FILE_LIST List of official armedslack-current packages : http://ftp.slackware...kware/FILE_LIST #### Thanks to OP team : http://pandorawiki.org/Team (Some are still missing here) And other people : http://boards.openpandora.org Very special HUGE thanks to Notaz. Without your help, i probably won't have succeeded. Thanks to skeezix for Minimenu help. Thanks to milkshake and Tempel for PNDstore help. Thanks to McLovin for wi-fi tricks. Thanks to sebt3 for solving the /usr/share/applications/op_* mystery. Also for compatibility help. Thanks to Blastrock. Join the OP community, man ^^. Thanks to bagmouse7 for testing. Thanks to Binky for the banners. Thanks to Gruso, who saved my rootfs from a bad packaging ;^). Thanks to Ivanovic for the zram tip. Thanks to EvilDragon for providing web space. I'm honoured. Thanks to Patrick Volkerding : http://slackware.com And Stuart Winter http://www.armedslack.org Thanks to all LQ.org answerers : http://www.linuxquestions.org Thanks to OSS developers. And, of course, Richard Stallman and Linus Torvalds. #### Code: Original post : Code: Hi ! So in a few days, i will release a new up-to-date Linux OS for Open Pandora, based on Slackware. (btw, ED plz, remember me... i'm on my own to debug for now :/) It will include a lot of goodies, but maybe there's obvious things i missed. So here's my questions : do you need something special ? Something useful that every distro should ship, or something that will serve well the OP community. I already compiled many packages from here [url="http://slackbuilds.org/repository/13.37/"]http://slackbuilds.o...pository/13.37/[/url] but i may add a few. Also, my rootfs archive is around 1G and my current build is > 4G on a SD. I've not decided yet if i will slim down under 4G, or bloat ? My current limit is 8G, but if most of you use 4G cards, i may reconsider. Also, do you want fixed IP adress on all interfaces + ssh activated by default ? I will probably create a default user (op/op), but do you prefer no user at all, and create yours ? Tell me.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822480.15/warc/CC-MAIN-20171017181947-20171017201947-00272.warc.gz
CC-MAIN-2017-43
4,277
1
https://seranking.com/vacancies/ux-ui-designer.html
code
- Run UX researches: interviews, competitors’ researches, user testings, etc. - Formulating hypotheses to improve user experience. - Implementing various UX patterns across the platform. - Data-driven approach for user research and competitive analysis. - Creating new designs, redesigning, and enhancing existing interface solutions for our product. - Developing prototypes. - Visualizing user scenarios. - Designing, formatting, organizing, and evolving UI-Kit and design systems. - Working on unifying existing interface and behavioral patterns. - Collaborating with development, business analysis, support, and QA departments. - Taking ownership and overseeing the implementation of assigned tasks. - 3+ years of experience in UX/UI design. - Strong portfolio of UX design projects that demonstrate a deep understanding of design aesthetics and usability. - Knowledge of using quantitative approaches to UX design - Experience in conducting user research. - Understanding of the product and its goals. - Ability to plan and estimate work volume accurately. - Attention to detail and systematic approach. - Excellent visual memory. - Keen interest in modern trends in UX/UI design. Would be considered as an advantage if you have: - Familiarity with Apple and Google design guidelines. We are building a strong team and an awesome product. Join in!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100427.59/warc/CC-MAIN-20231202140407-20231202170407-00529.warc.gz
CC-MAIN-2023-50
1,353
23
https://metacpan.org/changes/release/LTHEISEN/Footprintless-1.10
code
Revision history for Perl module Footprintless 1.10 2016-08-20 - added Footprintless::Extract implementation 1.09 2016-08-19 - added support for extract_to in resources for Deployment - fixed overlay to use dot footprintless resolver on update as well as initialize - added prefix to temp_[dir/file] to provide easier cleanup in case process exits abnormally 1.08 2016-08-18 - changed Footprintless::agent from a singleton to a factory 1.07 2016-08-17 - fixed deployment extra to supply actual to_dir even if there is a resource_dir 1.06 2016-08-02 - added documentation for deploy option 'extra' - add support for timeout and cookie_jar options to agent - add support for extra deployment - update to fix error message during testing on systems without ssh localhost key installed - updated dependency on Maven::Agent 1.05 2016-07-23 - added ability to configure custom resolver allowing for additional transforms - made log configuration configurable in footprintless - cleaned up dumper - added pod documentation to tunnel 1.04 2016-07-21 - added ability to pass runner options to service - fixed logger message in Footprintless::_init - fixed Footprintless_App_Command_log logger to use STDERR to avoid STDOUT conflicts - fixed out_handle for until to print a newline after each line - modified temp_dir and added temp_file both of which are now secure, reimplemented service status to better handle su - added missing dependency on URI - added resolution during overlay if .footprintless is encountered - updated service to support sub commands with sudo if needed - updated pod for Footprintless::Util::slurp - fixed invalid variable reference in Footprintless::Util::exit_due_to, and added support for STDIN in Footprintless:: - added Tunnel.pm and associated factory methods - updated tests to included --no-overwrite-dir for the cp_command tar - added --no-overwrite-dir to the cp_command tar to avoid needing permissions on folders we are not adding to/deleting 1.03 2016-04-30 - Fixed Bug #113348 for Footprintless: Undeclared dependency App::Cmd::Tester 1.02 2016-04-30 - Added plugin capability. - Added mixins feature. - Migrated to Dist::Zilla::PluginBundle::Simple. 1.01 2016-03-25 - Improved documentation. 1.0 2016-03-24 - Initial release.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528433.41/warc/CC-MAIN-20190420000959-20190420022959-00170.warc.gz
CC-MAIN-2019-18
2,257
1
https://opensource.stackexchange.com/questions/4394/policy-for-feature-request-in-the-issue-tracker-of-widely-used-applications/5499
code
I've had some experiencing working on open-source software with many active users, our policy for the issue tracker was not to allow end-users to create feature-requests. While this wasn't a popular choice among many users we did this because the scope of the application was already wide and we found it difficult to find the time to respond to regular bug reports. Instead, there are solutions such as user-voice (and similar services), which we experimented with (and kept our issue tracker for software errors, or design-tasks assigned to design teams and developers). This worked well for us, because every issue had a clear outcome: - Maintainers of an area are responsible for resolving. - Issues have a clear outcome. Since then I've been spending some time on a project on github which is also and end-user application in the field of graphics/sound/animation (not middle-ware or server code), and many users are making random wouldn't-it-be-nice feature requests. This would likely be the case for other productivity software (applications people use for their job, spend all day in and may be greatly impacted by available features - office/image/video-editor/animation/CAD/code-IDE's). Since I'm not the owner of this project, I don't feel like setting policy on this topic. And while there is some potential value in any given feature request, my impression is... - Users ask for fancy features from their favorite application. - Very few of the requests are likely to be implemented within the next few years. - Developers aren't engaging with users and the requests are mostly ignored. Basically user expectations and developer capabilities differ so much, that many requests are wishful thinking, and only loosing someones time to have to categorize, reply to, de-duplicate... etc. But maybe I'm reading the situation incorrectly here: So my question is, for popular end user software with many more users than developers, what is a reasonable policy for defining what is/isn't acceptable to keep open as an issue on github/gitlab and similar services. Do many projects on github for example disallow feature requests in their issue tracker? (would be interested in answers from anyone who's been involved with large active projects who've had to make a decision on how to handle feature requests)
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337680.35/warc/CC-MAIN-20221005234659-20221006024659-00180.warc.gz
CC-MAIN-2022-40
2,313
18
https://www.informit.com/articles/article.aspx?p=28597
code
Authors of Web content require a means of managing that content and uploading it to the server. One of the protocols used for this purpose is DAV (Document Authoring and Versioning). DAV enables users and applications to publish and modify Web content. In this hour, you will learn What publishing solutions are available How to build and configure the DAV extension for Apache How to configure DAV clients to work with Apache The Need for a Publishing Protocol In the early days of the Web, the Webmaster or system administrator traditionally edited the content of Web pages directly in the system hosting the Web site. The Webmaster logged in to the system remotely, via the telnet or rsh protocol, and used conventional text editors to edit the HTML code. As the Web became more popular, several factors described in the following sections made this approach impractical in many situations. Windows as a Web Server Platform A number of Windows-based Web servers appeared, such as Microsoft Internet Information Server. Although not necessarily more robust or secure than their Unix counterparts, these Web servers were definitely easier to use and set up and quickly grew in popularity. However, Windows servers lacked extensive remote access capabilities, and content was copied by hand or by sharing folders in the same local area network. Separation of Tasks As Web sites grew in complexity and refinement, a series of new roles emerged. The Webmaster was in charge of administering the Web server, analyzing the logs for errors, updating the software, and so on. Web programmers dealt with providing dynamic features in the Web site, such as personalization, processing forms, and content searching. Designers and editors provided content and graphics for the Web site. This separation of tasks required access restriction policies and easy-to-use methods for updating the Web site content by nontechnical individuals. The tools for generating Web content evolved from simple text editors to sophisticated publishing tools, closer to word processors in features and ease of use. These tools run on the desktop machine and need a way to upload their content to the Web server. Eventually, third-party companies started providing Web-hosting services to corporate customers. Internet service providers and Internet portals provided personal home pages to their users. This increased even more the need for a secure, standard, easy-to-use mechanism for transferring and updating Web pages. Earlier solutions to this problem were based on different protocols and were not entirely satisfactory. These solutions included: FTP protocol: Files could be uploaded and deleted using the File Transfer Protocol (FTP) protocol. This was cumbersome for system administrators, who needed to maintain and configure a separate server and user database, and for users, who required an additional tool to upload their changes. The software providers started integrating FTP clients with their publishing products to make it easier for the end user. File uploads via forms: Some hosting providers allowed clients to upload pages via a form interface. This allowed upload of only one file at a time, and thus was suitable only for simple Web sites such as home pages. File mirroring software: Tools such as rsync and custom mirroring scripts can compare a local repository with a remote one and make the necessary changes to synchronize them. These are command-line tools commonly used by administrators and advanced developers. HTTP PUT: This method was eventually introduced in the HTTP specification and allowed clients, such as Netscape Composer, to upload files directly to the server. Proprietary protocols: This includes protocols such as those from the Microsoft FrontPage publishing tool. They required modifications to the server to support these protocols. In summary, the existing solutions were difficult to use and administer, nonstandard, and usually required setting up a special, separate server. A new protocol based on HTTP was developed to address these shortcomings: Distributed Authoring and Versioning, also known as DAV or WebDAV. This hour covers the installation and configuration of the DAV protocol and mentions Microsoft FrontPage server extensions because of their popularity.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816853.44/warc/CC-MAIN-20240413211215-20240414001215-00252.warc.gz
CC-MAIN-2024-18
4,293
20
https://elcentro.unm.edu/programs/El%20Puente%20Research%20Fellowship/index.html
code
What is El Puente Research Fellowship? Empowering underrepresented students through research. El Puente Research Fellowship supports and promotes undergraduate research in multiple academic areas. It offers undergraduates the opportunity to prepare for graduate level education over the course of two semesters. El Puente Fellows work closely with graduate mentors and faculty as they increase their understanding and experience of academic research. This fellowship takes the educational experience to the next level and better. Fellows engage in a research project of their interest with the guidance of our Instructional Team during the fall and spring semesters. During the program, El Puente Fellows participate in mandatory seminars which provide them the knowledge and tools necessary to begin the research process, develop a research proposal, and prepare for graduate school. El Puente Fellows also have the opportunity to grow as a community of scholars with the other fellows. As research projects develop, fellows have a space to rely on their peers and mentors for input, guidance and critiques. Most importantly, all the fellows are on similar journeys toward professional development and/or a graduate degree. It is important to note that prior research experience is not required as this program meets the students at their level.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662529658.48/warc/CC-MAIN-20220519172853-20220519202853-00782.warc.gz
CC-MAIN-2022-21
1,346
4
https://magento.stackexchange.com/questions/186453/admin-backend-layout-problem-after-extension-install
code
So I have installed an extension (sagepay suite by ebizmarts) on Magento 2.17 but instead of doing the install via composer I did it the manual way by unzipping the extension into the Code folder. After this, I did the usual of: - Execute Magento setup upgrade - $ bin/magento setup:upgrade - Clean cache and generated code - $ bin/magento cache:clean and then $ rm -rf var/generation/* - Run magento compiler to generate auto-generated classes - $ bin/magento setup:di:compile Static Content Deploy Now both the backend and the website looks strange, as if the static files or CSS styling is not being applied. I thought there was a problem with the extension, so I deleted the extension and reran the steps above, but the problem is still there, so I am guessing I have missed an important step - Any ideas? I have noticed some errors in the recompile command, these are to do with the Blank / luma theme which is installed such as: frontend/Magento/blank/en_US/css/email-inline.less Unable to get content for 'frontend/Magento/blank/en_US/css/source/lib/_lib.less'
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100989.75/warc/CC-MAIN-20231209233632-20231210023632-00128.warc.gz
CC-MAIN-2023-50
1,067
12
https://mail.zope.org/pipermail/zope/2003-March/133639.html
code
[Zope] DBTab product questions (more...) Mon, 24 Mar 2003 10:11:44 -0500 Chris Withers wrote: > Shane Hathaway wrote: >> On Wed, 19 Mar 2003, Thierry FLORAC wrote: >>> And another one : does the fact of splitting a Zope site between >>> several ZODBs can have any impact (improvement or not) on the whole >>> performances ?? >> There is no measurable difference in performance unless you mount a large >> number of databases. The MountPoint._setDB() and MountPoint.close() >> methods are the issue here: they have to open/close all mounted >> connections, even if they won't be used in the course of a transaction. > Hmmm... well, just a data point, but since I moved one of our big setups > (Two ClientStorages mounted into another ClientStorage) from ExtMount to > DBTab, I've noticed that the first object loaded from a mounted storage > takes significantly(and I do mean significant ;-) longer than it used to > and longer than any subsequent loads of objects from that storage. I > wonder what's taking the time? The mounted storages all have fairly > large (100-400Mb) ZEO client caches, but they were that way with > ExtMount too. I can't think of an explanation. I tried for 4 days. ;-)
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528481.47/warc/CC-MAIN-20190420020937-20190420042036-00063.warc.gz
CC-MAIN-2019-18
1,194
21
https://hero.fandom.com/wiki/Aye-Aye_Spirit
code
The Aye-Aye Spirit is a protagonist from the series The Legend of Korra. After Wan had been exiled from his city, he sought an oasis of spirits. But the Aye-Aye Spirit denied him access. When Wan later tried with a trick, the Aye-Aye Spirit recognized him, and sent him away again. Shortly afterwards, Wan met some hunters who wanted to kill an innocent animal and freed the animal. The Aye-Aye Spirit helped Wan, and then took him to his oasis. He was suddenly much nicer to him, for Wan had shown him that there were good humans. Over the years, the two become close friends, and defended together the oasis in front of the other humans. When Wan eventually left, the Aye-Aye Spirit said he was proud to call him his friend. A few years later, other humans spread into the wilderness, and the Aye-Aye Spirit fought them with some other spirits. Wan tried to stop the fight, but then Vaatu emerged and made the spirits vicious, so they finally killed the humans. When Wan became the first avatar, he opened a portal to Spirit World, and all Spirits returned to Spirit World. The Aye-Aye Spirit bowed respectfully to Wan when he went to the Spirit World. Powers & Abilities He showed that he was much stronger and more agile than a human being, because he could easily overwhelm Wan. He also had the ability to teleport over short distances. He also had the ability to slip into a human body and control it. However, the human turned partially in this case. - Although he had a very negative attitude towards humans before, Wan showed him that humans can be good as well, and they became friends. He sometimes called Wan jokingly "Stinky" and called him his pet. Nevertheless, he felt that Wan was an exception, and still did not like the other humans.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662534773.36/warc/CC-MAIN-20220521014358-20220521044358-00345.warc.gz
CC-MAIN-2022-21
1,752
10
http://superuser.com/questions/565781/cant-stop-windows-system-resource-manager
code
I'm using windows system resource manager to limit memory usage of a specific process. It works well but I've a problem when I stop management through console. Let's say I'm using memory limit of 100MB on Powershell_ISE process. If I stop management, memory allocation can go up instantly, but if I start another Powershell_ISE process, it's still limited to 100MB even if the management is disabled. Is this an expected behaviour? I noticed that windows system resource manager services is still running. Do I have to manually stop that one?
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397797.77/warc/CC-MAIN-20160624154957-00172-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
542
2
http://cehelp.esri.com/help/topic/com.procedural.cityengine.help/html/manual/cga/writing_rules/cga_wr_stochastic_rule.html
code
Analogous to conditional rules, the CGA Shape grammar permits stochastic rules, i.e. creating variation using randomness. PredecessorShape --> percentage%: Successor1 percentage%: Successor2 ... else: SuccessorNThe sum of all percentages must not be greater than 100. Lot --> 30% : Lot("residential") 20% : Lot("retail") else : Lot("industrial") In this example, there is a 30% chance the first successor is chosen and a new Lot shape with parameter "residential" is generated, a 20% chance for the second successor and a 50% chance for the last successor to be chosen. All random numbers, also the choice of the percentages above, depend on the current shape's seed (the seedian shape attribute). Again, condition blocks can be nested: Lot --> 30% : 50% : Lot("residential") else : NIL 20% : Lot("retail") else : Lot("industrial") Note that a condition block always needs to be finished with an else: and percentages and successors must not be mixed up. Copyright ©2008-2018 Esri R&D Center Zurich. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509196.33/warc/CC-MAIN-20181015121848-20181015143348-00503.warc.gz
CC-MAIN-2018-43
1,021
9
http://www.haverford.edu/psychology/ddavis/mmdream/BOTH.HTM
code
now, i'm not sure why i wrote that "both Freud and Justin" were holograms. as far as i can remember, i realized that they had ALL been holograms except me. so, i really don't know why i singled them out. perhaps it really was that way when i dreamt it, and since then i have "reconstructed" quite a bit. who will ever know? back to the dream
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375091587.3/warc/CC-MAIN-20150627031811-00170-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
341
2
https://www.experts-exchange.com/questions/28975338/Running-Jira-on-Raspberry-PI-2.html
code
I installed JIRA om Raspberry PI 2 using the following guides: It all seemed to be working fine, I connected it to mysql running on the same Raspberry PI 2 and then attempted to install the Jira license. Then the whole thing crashed and I got a web page saying: The following plugins are required by JIRA, but have not been started: Atlassian JIRA - Plugins - Gadgets Plugin (com.atlassian.jira.gadgets) JIRA Projects Plugin (com.atlassian.jira.jira-projects-plugin) Atlassian Navigation Links Plugin (com.atlassian.plugins.atlassian-nav-links-plugin) Atlassian JIRA - Plugins - Issue Search (com.atlassian.jira.jira-issue-nav-plugin) Atlassian JIRA - Plugins - Quick Edit Plugin (com.atlassian.jira.jira-quick-edit-plugin) JIRA Project Config Plugin (com.atlassian.jira.jira-project-config-plugin) Atlassian JIRA - Plugins - REST Plugin (com.atlassian.jira.rest) Opensocial Plugin (com.atlassian.gadgets.opensocial) Embedded Gadgets Plugin (com.atlassian.gadgets.embedded) RPC JIRA Plugin (com.atlassian.jira.ext.rpc) Gadget Directory Plugin (com.atlassian.gadgets.directory) Gadget Dashboard Plugin (com.atlassian.gadgets.dashboard) I then turned off Jira; And I then saw this; # There is insufficient memory for the Java Runtime Environment to continue. # Native memory allocation (mmap) failed to map 268435456 bytes for committing r eserved memory. # An error report file with more information is saved as: The log is embedded here; hs_err_pid30738.log Tried to start Jira again after this, but end up with the same error as above. So does anyone here have experience with setting up Jira on Raspberry PI 2? Too little memory, or can it be tweaked? It is only for a handful of users. Maybe too ambitious to run MySQL on the same Raspberry PI 2?
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863463.3/warc/CC-MAIN-20180620050428-20180620070428-00003.warc.gz
CC-MAIN-2018-26
1,749
23
https://cboard.cprogramming.com/cplusplus-programming/135595-window-program-printable-thread.html
code
I've been searching google and can't seem to find any decent site with a program that shows how to make a window. Anyone have any suggestions on where I can go? I know it isn't a simple thing but should still be some what common O.o? Trying to figure out how to write a program that doesn't bring up the black screen and instead gives me a window with drop menus at the top. File, Options, Help, About ..stuff like that. Explanations would be awesome but I would just settle for templates if some site has them. Try using OPENGL API for C++. Study that.... OpenGL is not for standard desktop applications! And these frameworks are general-purpose GUI desktop frameworks. Although it wouldn't surprise me if they can be tailored for something else, too. try the forgers win32 tutorial: theForger's Win32 API Tutorial it overs most of the basics. Don't use Win32! Use a good framework such as those already mentioned. It's easier, and more portable.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125849.25/warc/CC-MAIN-20170423031205-00169-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
947
12
https://forums.macrumors.com/threads/volume-keys-dont-work-with-internal-speaker.901988/
code
hey guys! on my new 15inch mbp the volume keys have suddenly stopped working. i checked in system preferences that the use F1 keys as standard is not selected. When i plugged in speakers or headphones the volume keys work as normal. But with just internal the little picture on screen comes up so the keys work but it doesnt affect the volume? Any help thanks and has anyone else had this problem?
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201521.60/warc/CC-MAIN-20190318172016-20190318194016-00153.warc.gz
CC-MAIN-2019-13
397
1
https://news.microsoft.com/2012/05/03/microsoft-dynamics-ax-gets-comfy-with-ukraine-retailer/
code
REDMOND, Wash. — May 3, 2012 — COMFY, the leading Ukrainian electronics and home appliance retailer, recently deployed a custom warehouse management solution based on Microsoft Dynamics AX 2009 to help manage warehouse logistics, resulting in streamlined processes, reduced costs, increased productivity and better space allocation. COMFY opened its first retail store in December 2005 and by 2011 had expanded to 78 stores in 37 cities throughout Ukraine. This rapid growth made it difficult to maintain a streamlined logistics infrastructure to distribute goods three times a week across all stores. To help manage warehouse logistics, COMFY needed to improve business processes and automate company operations for sites with different types of storage. In addition, the company needed to make more efficient use of warehouse space, to enable real-time decision-making and increase employee productivity. COMFY turned to international consulting firm Columbus, a Microsoft Gold Certified Partner with retail vertical experience, for a solution. Columbus designed a system to automate business processes and ensure an integrated IT environment with servers running Microsoft Dynamics AX Application Object Server (AOS), and Microsoft SQL Server as a database management system. Microsoft Dynamics AX provides the flexibility for customizing an enterprise resource planning (ERP) system to meet COMFY’s industry-specific needs. “Microsoft Dynamics AX significantly enhances our ability to control processes at the central warehouse,” said Andrew Prystavka, director of warehouse logistics at COMFY. “It allows us to quickly identify bottlenecks and find system solutions to address them.” Microsoft Dynamics AX gave COMFY a people-centered, end-to-end solution that helps employees work more efficiently and inspires them to do their jobs better. Many systems today focus solely on retrospective views and data, which can be frustrating and useless when faced with a unique logistical crisis. Microsoft Dynamics AX offers proactive and forward-looking systems that connect people to their work and provide real-time insights that enable better decision-making. During the first two months after implementing the system using Microsoft Dynamics AX, COMFY increased productivity by 10 percent while reducing operational costs. “We expect to increase employee productivity at the distribution center by 1.5 times and reduce the cost of handling goods in all of our shops,” said Andrew Zavizion, logistics director at COMFY. The custom warehouse management solution, based on Microsoft Dynamics AX, helps automate logistics management processes at the primary COMFY distribution center to improve key business processes, including tracking and delivery of inventory, systems monitoring, and data extraction and analysis, delivering the following benefits: • Increased service levels, including pick accuracy and deliveries on time and in full • Reduction in unit cost of inventory turnover • Greater employee productivity and satisfaction • Better use of warehouse space and equipment • Quick and easy identification of storage bottlenecks Microsoft Dynamics solutions empower your people to be more productive and your systems to last longer and scale as your business grows, while enabling you to derive the insights necessary to respond quickly in an ever-changing world of business. Founded in 1975, Microsoft (Nasdaq “MSFT”) is the worldwide leader in software, services and solutions that help people and businesses realize their full potential. Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://www.microsoft.com/news. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft’s Rapid Response Team or other appropriate contacts listed at http://www.microsoft.com/news/contactpr.mspx.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818464.67/warc/CC-MAIN-20240423033153-20240423063153-00578.warc.gz
CC-MAIN-2024-18
4,012
16
https://mcb.unco.edu/departments/management/gudmundson-don.aspx
code
University of Northern Colorado Management Campus Box 128 Greeley, CO 80639 PhD, University of Kentucky. MBA, University of Wisconsin Oshkosh. Area of Study: Management BS, University of Wisconsin, Madison. Area of Study: Landscape Architecture Coordinator, (2015 - Present). Dean, (2008 - 2013). Academy of Management. (1991 - Present). Juried Journal Article Gudmundson, D., Thomas, D. F., Suhr, D., Turner, K. F. (2014). Business Plan Competitions and Their Impact on New Ventures' Business Models. Journal of Strategic Innovation and Sustainability, 10(1), 34-48. Gudmundson, D., Thomas, D. (2015). The Entrepreneurial Path: An Action-Based Personalized Approach to Entrepreneurial Education (pp. 7). Academy of Business Education Conference.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738950.61/warc/CC-MAIN-20200813014639-20200813044639-00006.warc.gz
CC-MAIN-2020-34
746
13
https://eurospreed.com/inmotion-domain-and-hosting-buy/
code
Inmotion Domain And Hosting Buy Discovering a premium low-cost web hosting supplier isn’t simple. Every web site will have various requirements from a host. And also, you have to contrast all the attributes of a hosting company, all while seeking the most effective deal feasible. This can be a lot to kind via, particularly if this is your very first time purchasing organizing, or developing a web site. Most hosts will provide super inexpensive initial prices, just to raise those prices 2 or 3 times greater once your first call is up. Some hosts will certainly supply complimentary perks when you join, such as a totally free domain, or a totally free SSL certification. While some hosts will certainly have the ability to use better efficiency as well as high degrees of safety. Inmotion Domain And Hosting Buy Below we dive deep into the best economical host plan there. You’ll discover what core holding features are essential in a host and also how to evaluate your very own holding needs so that you can choose from among the very best cheap holding service providers listed below. Disclosure: When you acquire a web hosting plan via web links on this page, we earn some payment. This aids us to maintain this site running. There are no extra expenses to you in any way by using our web links. The listed here is of the best cheap host bundles that I’ve directly used as well as checked. What We Think about To Be Low-cost Web Hosting When we describe a host package as being “Economical” or “Spending plan” what we suggest is hosting that falls under the cost brace between $0.80 to $4 monthly. Whilst investigating economical holding carriers for this overview, we took a look at over 100 different hosts that fell under that price range. We after that assessed the quality of their least expensive organizing package, value for money as well as customer care. In this post, I’ll be going over this world-class site holding firm and also stick in as much pertinent details as feasible. I’ll discuss the functions, the pricing alternatives, and also anything else I can think of that I assume may be of benefit, if you’re deciding to subscribe to Bluhost and get your sites up and running. So without more trouble, allow’s check it out. Bluehost is one of the biggest web hosting business on the planet, getting both massive advertising support from the company itself and also affiliate online marketers who advertise it. It really is a substantial business, that has been around for a very long time, has a big online reputation, and also is most definitely one of the top options when it comes to webhosting (most definitely within the top 3, at the very least in my publication). However what is it exactly, and also should you get its services? Today, I will certainly address all there is you require to understand, offered that you are a blog owner or an entrepreneur that is trying to find a web host, and does not understand where to get going, given that it’s a fantastic solution for that target market generally. Let’s visualize, you intend to host your sites and also make them visible. Okay? You already have your domain name (which is your site location or URL) today you wish to “transform the lights on”. Inmotion Domain And Hosting Buy You need some holding… To achieve every one of this, as well as to make your web site noticeable, you require what is called a “server”. A web server is a black box, or tool, that saves all your internet site information (files such as photos, messages, video clips, web links, plugins, and other information). Currently, this web server, has to be on all the time and it needs to be connected to the net 100% of the time (I’ll be pointing out something called “downtime” later on). In addition, it likewise requires (without obtaining also elegant and into details) a file transfer protocol frequently referred to as FTP, so it can reveal web internet browsers your site in its designated type. All these points are either pricey, or call for a high degree of technical ability (or both), to create as well as keep. And also you can entirely go out there and also learn these points by yourself and set them up … but what about instead of you getting and also maintaining one … why not just “renting out organizing” rather? This is where Bluehost can be found in. You lease their web servers (called Shared Hosting) and you release a site utilizing those servers. Considering that Bluehost maintains all your documents, the company additionally allows you to establish your web content administration systems (CMS, for short) such as WordPress for you. WordPress is a very popular CMS … so it simply makes sense to have that choice readily available (almost every holding firm currently has this option as well). Basically, you no longer need to set-up a web server and after that integrate a software application where you can construct your content, independently. It is already rolled into one package. Well … picture if your server remains in your home. If anything were to take place to it in any way, all your data are gone. If something goes wrong with its internal processes, you require a technician to repair it. If something overheats, or breaks down or obtains damaged … that’s no good! Bluehost takes all these hassles away, and takes care of every little thing technological: Pay your server “rent”, as well as they will care for every little thing. And as soon as you purchase the service, you can then start focusing on including material to your web site, or you can place your effort right into your marketing projects. What Solutions Do You Receive From Bluehost? Bluehost provides a myriad of different services, but the key one is hosting obviously. The hosting itself, is of various kinds incidentally. You can rent a shared server, have a devoted web server, or additionally a virtualpersonal server. For the purpose of this Bluehost testimonial, we will focus on organizing services and other solutions, that a blog writer or an online entrepreneur would certainly require, instead of go too deep into the rabbit opening and talk about the other services, that are targeted at even more skilled individuals. - WordPress, WordPress PRO, and shopping— these organizing solutions are the bundles that enable you to host a site utilizing WordPress and also WooCommerce (the latter of which allows you to do shopping). After buying any of these plans, you can begin building your internet site with WordPress as your CMS. - Domain name Marketplace— you can additionally buy your domain from Bluehost instead of various other domain registrars. Doing so will certainly make it less complicated to aim your domain name to your host’s name web servers, because you’re making use of the very same industry. - Email— as soon as you have actually purchased your domain name, it makes sense to likewise obtain an e-mail address tied to it. As a blog owner or on-line entrepreneur, you must pretty much never utilize a complimentary e-mail solution, like Yahoo! or Gmail. An e-mail like this makes you look amateur. Luckily, Bluehost offers you one totally free with your domain. Bluehost likewise supplies committed web servers. And you may be asking …” What is a devoted server anyhow?”. Well, the thing is, the standard webhosting plans of Bluehost can only a lot web traffic for your internet site, after which you’ll need to upgrade your hosting. The reason being is that the typical servers, are shared. What this implies is that web server can be servicing two or more sites, at the same time, one of which can be yours. What does this mean for you? It suggests that the single server’s resources are shared, and also it is doing multiple tasks at any type of provided time. As soon as your web site begins to hit 100,000 website gos to monthly, you are going to need a committed server which you can also obtain from Bluehost for a minimum of $79.99 monthly. This is not something yous should fret about when you’re starting yet you must keep it in mind for sure. Bluehost Pricing: How Much Does It Cost? In this Bluehost evaluation, I’ll be concentrating my interest mostly on the Bluehost WordPress Hosting plans, given that it’s the most prominent one, and likely the one that you’re looking for and that will suit you the best (unless you’re a significant brand, company or site). The 3 available plans, are as adheres to: - Basic Strategy– $2.95 monthly/ $7.99 routine price - Plus Strategy– $5.45 monthly/ $10.99 routine price - Option Plus Plan– $5.45 monthly/ $14.99 normal rate The initial cost you see is the cost you pay upon join, and also the 2nd cost is what the expense is, after the very first year of being with the company. So generally, Bluehost is mosting likely to charge you on a yearly basis. As well as you can additionally choose the quantity of years you intend to host your site on them with. Inmotion Domain And Hosting Buy If you choose the Standard plan, you will pay $2.95 x 12 = $35.40 beginning today and by the time you enter your 13th month, you will certainly now pay $7.99 each month, which is also charged each year. If that makes any sense. If you are serious about your site, you must 100% get the three-year option. This indicates that for the standard plan, you will pay $2.95 x 36 months = $106.2. By the time you hit your fourth year, that is the only time you will pay $7.99 each month. If you think of it, this method will certainly conserve you $120 during 3 years. It’s not much, but it’s still something. If you intend to get greater than one web site (which I highly advise, and also if you’re major, you’ll probably be getting more at some point in time) you’ll intend to make use of the choice plus strategy. It’ll allow you to host unlimited websites. What Does Each Strategy Deal? So, in the case of WordPress organizing strategies (which are similar to the common organizing plans, but are a lot more geared towards WordPress, which is what we’ll be concentrating on) the functions are as adheres to: For the Fundamental plan, you obtain: - One website just - Guaranteed internet site via SSL certification - Optimum of 50GB of storage space - Free domain name for a year - $ 200 marketing credit score Remember that the domains are acquired independently from the organizing. You can get a free domain with Bluehost here. For both the Bluehost Plus hosting and also Choice Plus, you obtain the following: - Limitless variety of sites - Free SSL Certificate. Inmotion Domain And Hosting Buy - No storage space or bandwidth limitation - Cost-free domain name for one year - $ 200 advertising and marketing debt - 1 Office 365 Mailbox that is totally free for thirty day The Choice Plus plan has an added advantage of Code Guard Basic Alternative, a back-up system where your data is saved and duplicated. If any kind of crash occurs and also your web site data vanishes, you can recover it to its initial type with this feature. Notification that although both plans cost the very same, the Choice Plan then defaults to $14.99 per month, regular price, after the collection amount of years you have actually chosen. What Are The Benefits Of Using Bluehost So, why pick Bluehost over other web hosting solutions? There are thousands of host, a number of which are resellers, but Bluehost is one choose couple of that have actually stood the test of time, and also it’s most likely one of the most popular around (as well as completely reasons). Below are the three primary benefits of choosing Bluehost as your host service provider: - Web server uptime— your web site will not be visible if your host is down; Bluehost has greater than 99% uptime. This is very crucial when it concerns Google Search Engine Optimization as well as positions. The greater the much better. - Bluehost rate— how your web server feedback identifies how rapid your website shows on a browser; Bluehost is lighting fast, which implies you will certainly decrease your bounce rate. Albeit not the most effective when it concerns filling speed it’s still hugely essential to have a fast rate, to make customer experience much better and far better your position. - Unrestricted storage space— if you get the And also strategy, you need not stress over the amount of data you save such as videos– your storage ability is endless. This is really essential, because you’ll most likely encounter some storage space issues later down the tracks, and also you do not want this to be an inconvenience … ever before. Lastly, consumer support is 24/7, which means regardless of where you are in the world, you can get in touch with the assistance team to repair your internet site concerns. Pretty typical nowadays, but we’re taking this for given … it’s also very vital. Inmotion Domain And Hosting Buy Also, if you’ve obtained a cost-free domain name with them, after that there will certainly be a $15.99 cost that will certainly be subtracted from the amount you initially acquired (I picture this is because it kind of takes the “domain name out of the market”, unsure regarding this, yet there most likely is a hard-cost for registering it). Last but not least, any kind of demands after thirty day for a reimbursement … are void (although in all sincerity … they ought to most likely be stringent below). So as you see, this isn’t necessarily a “no questions asked” policy, like with a few of the various other holding alternatives available, so make certain you’re okay with the plans before continuing with the holding.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057830.70/warc/CC-MAIN-20210926053229-20210926083229-00457.warc.gz
CC-MAIN-2021-39
13,685
82
https://geniusgrc.com/services/soc-2-management/
code
When your largest client demands that you undergo a SOC 2 audit, usually the top levels of the organization are quick to say “yes”. Actually following through with the requirements is incredibly difficult. At that point, your organization has hundreds of decisions to make, controls to design, and procedures to implement. We’ve shouldered the load and have succeeded. We absolutely want you to succeed as well!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475422.71/warc/CC-MAIN-20240301161412-20240301191412-00497.warc.gz
CC-MAIN-2024-10
417
1
http://support.airvisual.com/knowledgebase/topics/130423-airvisual-app
code
AirVisual App ← Knowledge Base Why is my AQI different in the AirVisual app between 2 phones? What is the red notification on the AirVisual app icon? My iOS widget doesn't display data How to remove or move a location/station in the AirVisual app? Android APK app installation permissions How to change the language of your App How can I use the AirVisual app’s widget on my phone? How can I access air quality forecasts through the AirVisual app and website? Where can I see when a location's data last updated?
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659654.11/warc/CC-MAIN-20190118005216-20190118031216-00161.warc.gz
CC-MAIN-2019-04
516
1
https://www.oreilly.com/library/view/aspnet-mvc-2/9781849690300/ch03s10.html
code
Sometimes you want to take control over all of your requests prior to them getting too deep into your application. While you could do this with an HttpHandler or an HttpModule, that wouldn't be very MVC-like. Instead, we will implement this sort of logic in the next step of the pipeline by way of a custom In our example, we will take a look at implementing a blacklist filter, using a wide open wildcard route and a RouteConstraint that checks all requests against a few different types of blacklists. If the user is on the blacklist, we will have the option to route them off our site or to a page in our site specifically for blacklisted folks.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160454.88/warc/CC-MAIN-20180924125835-20180924150235-00299.warc.gz
CC-MAIN-2018-39
648
5
http://www.reference.com/browse/wiki/S%2FKEY
code
Because the short set of characters does not change until the counter reaches zero, it is possible to prepare a list of single-use passwords, in order, that can be carried by the user. Alternatively, the user can present the password, characters and desired counter value to a local calculator to generate the appropriate one-time password that can then be transmitted over the network in the clear. The latter form is more common and practically amounts to challenge-response authentication. S/KEY is supported in Linux (via Pluggable authentication modules), OpenBSD, NetBSD, and FreeBSD, and a generic open source implementation can be used to enable its use on other systems. S/KEY is a trademark of Telcordia Technologies, formerly known as Bell Communications Research (Bellcore). S/KEY is also sometimes referred to as Lamport's scheme, after its author. It was developed by Neil Haller, Phil Karn and John Walden at Bellcore in the late 1980s. With the expiration of the basic patents on public key cryptography and the widespread use of laptop computers running SSH and other cryptographic protocols that can secure an entire session, not just the password, S/KEY is falling into disuse. SecurID is a related one-time password scheme that still sees widespread use because, unlike S/KEY, it provides two-factor authentication by requiring a physical token that cannot be easily reproduced. After password generation, the user has a sheet of paper with n passwords on it. The first password is the same password that the server has stored. This first password will not be used for authentication (the user should scratch this password on the sheet of paper), the second one will be used instead: For subsequent authentications, the user will provide password i. (The last password on the printed list, password n, is the first password generated by the server, H(w), where w is the initial secret). The server will compute H(password i) and will compare the result to password i-1, which is stored as reference on the server. However this would require inverting the hash function that produced password i using password i-1 (password i = H(password i-1)), which is extremely difficult to do with current cryptographic hash functions. S/KEY is however vulnerable to a man in the middle attack if used by itself. It is also vulnerable to certain race conditions, such as where an attacker's software sniffs the network to learn the first N-1 characters in the password (where N equals the password length), establishes its own TCP session to the server, and in rapid succession tries all valid characters in the Nth position until one succeeds. These types of vulnerabilities can be avoided by using ssh, SSL, SPKM or other encrypted transport layer.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345769121/warc/CC-MAIN-20131218054929-00026-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
2,757
7
http://msdn.microsoft.com/en-us/library/vstudio/microsoft.teamfoundation.build.server.compatibility.buildagentspec2008.aspx
code
Rather than providing a separate server method for querying build agents, you just have to provide a [BuildAgentSpec] when querying instead of the base [BuildItemSpec] if additional filtering is desired (beyond the simple path filter). Assembly: Microsoft.TeamFoundation.Build.Server (in Microsoft.TeamFoundation.Build.Server.dll) Thetype exposes the following members. |Equals||Determines whether the specified object is equal to the current object. (Inherited from Object.)| |GetHashCode||Serves as a hash function for a particular type. (Inherited from Object.)| |GetType||Gets the Type of the current instance. (Inherited from Object.)|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708142617/warc/CC-MAIN-20130516124222-00042-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
640
6
https://melissamccartneyphd.com/postdoctoral-fellows/
code
Fellowships are available for PhDs with a background in STEM or education. Postdoctoral fellows initially join the lab as a part of an ongoing project with the expectation that they will take this project in a new direction as a way of establishing their own research interests. We are looking for recent PhDs with an interest in: - science education - science communication - making FIU a better place to learn STEM Please contact Dr. McCartney ([email protected]) for more information on postdoctoral opportunities.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571719.48/warc/CC-MAIN-20220812140019-20220812170019-00294.warc.gz
CC-MAIN-2022-33
530
7
https://www.humanities.mcmaster.ca/~mus701/simon/lewin.htm
code
Lewin's first chapter is an attempt to devise a Generalized Interval System, which in effect, uses basic algebra to organize a given pitch space. Lewin treats each musical space (major key, minor key, ocatonic, 12-tone, etc..) as an individual, unique set of notes to which the same notation can be applied. Diatonic intervals are treated equally regardless of tone and semitone, so in the c-major scale the interval from c to c is O, c to d is 1, c to e is 2, c to f is 3 etc... Lewin's notation for intervals is int(s,t) where s and t are pitches in a given system. Therefore, using the above example of Diatonic C major: int(c,c)=0, int(c,d)=1, int(c,e)=2, int(c,f)=3 etc... Given that the pitch space has octave equivalence, this has the effect of working in numeric systems other than base 10. The major scale is base 7, the octatonic is base 8, the pentatonic is base 5 etc. The system's first obvious strong point is the ability to equate spaces. Play or sing the following melodies: At a glance there is an obvious similarity to the melodic contour, however, the intervals don't make sense with each other. If we apply Lewin the discrepancies become clear. Melody a is in C Major, b is in G Octatonic, and c is in D minor. Lewin's interval formula int(s,t) gives us the following sets of interval class numbers: One of the nicest things about this system is it eliminates the counterintuitive results that the current system of musical intervals creates. For example a third plus a third equals a fifth (3+3=5!!??). In Lewin's system this example becomes 2+2=4 where int(c,e)=2, int(e,g)=2, and int(c,g)=4. Back to Simon's Home Page
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946564.73/warc/CC-MAIN-20180424041828-20180424061828-00630.warc.gz
CC-MAIN-2018-17
1,642
10
http://www.mobyware.net/windows-ce-os/programming-development-tag/emdos-reference-download-98375.html
code
Pocket C# Pocket C# is port of C# compiler from DotGNU project to Windows CE. DotGNU contains open-source runtime, compiler, tools and many other things to make free cross-platform .NET environment. I took only compiler and several required tools and ported them with some modifications to WinCE platform. It's quite easy to use and I'm going to make IDE for more comfortable usage SQL Server Mobile 2005 Microsoft SQL Server 2005 Mobile Edition (SQL Server Mobile) is a mobile database solution designed for developers who target Microsoft Windows Mobile based devices. SQL Server Mobile includes the largest number of new and improved features in any version of SQL Server Mobile since the original version, SQL Server CE 1.0 Free Pascal Compiler Free Pascal is a 32 and 64 bit professional Pascal compiler. It is open source and fully supports the development of native Windows CE applications SprintDB Pro Desktop Companion The SprintDB Pro Desktop Companion allows you to develop your SprintDB Pro Pocket PC applications on your Desktop or Notebook PC with SprintDB Pro version 4.x PrintCE SDK If you develop a program on eMbedded Visual C++ , Visual Basic , Visual Studio 2003/2005 .Net Compact Framework it is possible for you to include into your program a printing opportunity using PrintCE SDK DetectDeviceType DetectDeviceType is a PC utility program that attempts to detect what type of device you have and whether Microsoft .Net Compact Framework and OpenNETCF Smart Device Framework are installed. Download and Install: - Download DetectDeviceType. - Install it by double-clicking DDTSetup.exe you just downloaded and following the on-screen prompts emUnix Reference "emUnix Reference" - The modified new version of emUnix Reference is now available with more commands. emUnixReference will be of inestimable help to all unix programmers, never mind even if you are beginner. emUnixReference show list of UNIX commands with explanation SuperWaba Best Java Virtual Machine for PalmOS, Windows CE and Symbian Other Software by developer «Emcon Emsys Technologies»: Basic Digital Signal Processing Reference 'BASIC SIGNAL PROCESSING' CONCEPTS made easier with this REFERENCE TOOL! Very useful for all ENGINEERS especially for Electrical/Electronic/Communication Engineers & students emSnake Combat emSnake Combat - Survival of the quickest concept is reflected in this game. The combat is between two snakes competing for their paths to move. Guide your snake to move without crossing the Tron's path or its own path. We advice you to play with care as you've got to lock the Tron's path to move to the next level "emWord Hang" Category based HANGMAN-emWORD HANG.Find word in chosen CATEGORY within given chances&save the poor man.Categories-Country,Player,Leader,Scientist,Nature.OCCUPIES very less memory emPocket Eggs for PocketPC 2002 emPocket Eggs for PocketPC 2002 is a galvanizing game that will titillate the player and addresses players of all age groups. An egg is placed in a bowl, which is moving/static. Just give a click. The egg will get bounced and it should be collected in the bowl above, at the correct time. Don't miss to catch the egg as your life decrements by one emTennis Toppers for Pocket PC 2002 emTennis Toppers for Pocket PC 2002 - Will just a picture collection of Tennis Toppers can conciliate you? We know that it is not. We've come up with this fabulous emTennis Toppers. This application includes the Pictures and their profile that will list down the details ranging from the player's date of birth to place of residence emArchery for PocketPC 2002 emArchery for PocketPC 2002 - Shoot the bulls eye to get the maximum point. To add more interest we have provided the Air velocity indication so that the shooter has to adjust his timing. When you go to the higher level, the bulls eye will be moving bidirectionally till you shoot the target board "Form the words" for Pocket PC 2002 "Form the words" for Pocket PC 2002 - Discover the hidden words from the HINTS (only first letters or middle letters of the word are shown). Click and drag on the letters that make up the word. Beginner? Start playing 'level 1' and find the words in given time. Confident with 'level 1'? Advance to 'level 2' to find the words in half the time emMetric Conversion for Pocket PC 2002/ 2003 emMetric Conversion for Pocket PC 2002/ 2003 - emMetric Conversion has got rich features that includes - conversion, currency, custom, conversion table. Conversion has got category option that includes industrial, imperial, metric, imperial to metric, metric to imperial and custom conversion Pocket Word Stack Pocket Word Stack is an excellent and unique game for your Pocket PC to improve swiftness and your knowledge in following categories : You have to fill the racks with right alphabets and form the words in the chosen category "emHangman Pack" "emHangman Pack" - An ideal game pack to test your WORD POWER, VOCABULARY & Knowledge. OCCUPIES LESS MEMORY on your Pocket PC comparatively. emHangman Pack is a Game pack consisting of 5 most INTERESTING addictive Word games. The titles of individual games with their prices (for Pocket PC): emHangman - $ 5
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125841.92/warc/CC-MAIN-20170423031205-00185-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
5,180
31
https://forums.cabling-design.com/telecom/re-article-t1-connections-provide-unparalleled-data-transf-11115-.htm
code
> For most business seeking high speed internet access for data transfer >> applications ... a T1 connection is the solution of choice over DSL. >> This article explains why ... and how. > This article fails to point out the vastly more expensive rates for > T1. Since he's clearly trying to sell T1's, that's hardly surprising. T1 gives you total privacy and 24/7 capacity. If you don't need both > of those things, almost anything other than T1 is a better deal. I have a T1. It provides symmetric bandwidth and considerably lower latency than DSL or cable. My T1 provides 1.5Mb each way with about3ms delay. It's not hard to find a cable connection that can download that fast or faster, but I've never seen cable or ADSL with that upload speed. Of course, if we lived in Japan we'd have 100Mb both ways for about $10/mo, so a more reasonable question is why we can't get that here.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644574.15/warc/CC-MAIN-20230529010218-20230529040218-00139.warc.gz
CC-MAIN-2023-23
885
5
http://www.dbforums.com/showthread.php?1620604-Searching
code
When I select "search this forum" recently, it gives me huge lists of results from every forum on this site. I am usually trying to find a solution for MS Access and I end up getting responses for unix or C++. Am I doing something wrong or is this a permanent change to the search engine? I am using the 'search this forum' from within the MS Access forum. This really reduced the effectiveness of this forum. TIA.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125532.90/warc/CC-MAIN-20170423031205-00173-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
414
2
https://tnl.net/2003/09/03/september-11-memorial-who-were-you/
code
As a memorial this year, I would like to get a number of people to answer the question as to how they changed. This is where you come in. Who were you before and who are you now? How did the September 11th experience change your life, if it did in any way? How are things different in your life now? What have you done/not done as a result of September 11th? Once you’ve blogged it (on September 11th), send me a refer link to your entry and I’ll get a list of everyone who sent me a link up here. Feel free to pass this on to anyone you think might be interested and together, we might be able to create a joint memorial.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500365.52/warc/CC-MAIN-20230206212647-20230207002647-00199.warc.gz
CC-MAIN-2023-06
626
4
https://www.eserviceinfo.com/downloadsm/8931/COMPAQ_Compaq%20Evo%20N610c%20and%20Evo%20N600c.html
code
|Compaq Evo N610c and Evo N600c.pdf||b Maintenance and Service Guide Compaq Evo N610c and Evo N600c Document Part Number: 279362-001 This guide is a troubleshooting reference used for maintaining and servicing the notebook. It provides comprehensive information on identifying notebook features, components, and spare parts, troubleshooting problems, and performing disassembly procedures. © 2002 Compaq Information Technologies, L.P. Compaq, Evo, the Compaq logo, and Premier·Sound are trademarks of Compaq Information Technologies Group, L.P. In U.S. and/or other countries. Microsoft and Windows are trademarks of Microsoft Corporation. In U.S. and/or other countries. Intel and Pentium are trademarks of Intel Corporation in U.S. and/or other countries. All other product names mentioned herein may be trademarks of their respective companies. Compaq shall not be liable for technical or editorial errors or omissions contained herein. The information in this document is provided "as is" without warranty of any kind an|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989856.11/warc/CC-MAIN-20210511184216-20210511214216-00249.warc.gz
CC-MAIN-2021-21
1,027
6
https://discourse.cmake.org/t/support-for-dotnet-cli-and-ninja-generator-for-c/4304
code
CMake supports C# using VS generator with the project files in line with .Net Framework projects. .Net also has .Net Project SDKs which enables building and running the projects on multiple platforms using .Net CLI. Currently, CMake doesn’t support generating SDK-style projects for C#. CMake MR 6634 is focused on converting project style to use .Net Project SDK, but is limited to VS generator. To support C# cross-platform, I propose the following: - Introduce a new language - CMake will validate the toolset for dotnetusing .Net CLI which enables using with Ninja generator in addition to the current VS generator. - Since .Net CLI is a command line, we can also write build.ninja where the first step would be generating SDK-style projects and second step would be This will be backward-compatible as we wouldn’t be impacting the existing project generation using
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362999.66/warc/CC-MAIN-20211204154554-20211204184554-00338.warc.gz
CC-MAIN-2021-49
873
8
https://msgroups.net/scripting.vbscript/easy-one-have-vbs-logon-script-run-local-e/131635
code
How do I print only one item on a page instead of multiple. I'm trying to print out a badge in publishing on XP pro. and I only want to print out 1 badge and not a repeat of the same badge on the page. This was easy to do on 98 pub., all I had to do was x out the ones I didn't want on page preview. Is there a way to do this or am I goint to have to waste a > I'm trying to print out a badge in publishing on XP pro. and I only want to > print out 1 badge and not a repeat of the same badge on the page. This was > easy to do on 98 pub., all I had to do was x out the ones I didn't want on ...easy tips simple internet safety tips junk ail spam ...truncate the yaxis if one data point is MUCH higher than the rest How do I truncate the y-axis of a bar graph if in the event that one data point is VERY high, and the others are very small? I would like to see the top of all the bars in my graph, but not the entire bar for the large data Jon Peltier, Microsoft Excel MVP Peltier Technical Services Tutorials and Custom Solutions > How do I truncate the y-axis of a bar graph if in the event that one data > point is VERY high, and the others are very small? I would like to see t...Can't logon to OWA with particular username while mine is working fine #2 I use OWA at home and it's working fine. When I want to logon with a particular username and password I can't login. The option on exchange for OWA is enabled. When I want to login I get the "The page cannot be displayed" HTTP 500 - Internal server error Thanx in advance ...One Exchange server handling two forests I currently have an AD forest (say xyz.com) that has and Exchange 2003 server installed. We have just inherited another domain (abc.com) and they would like to have Exchange functionality also. Is there any possibility of using the Exchange server in the xyz.com domain? Thanks for your help in advance. On Tue, 29 Mar 2005 18:47:02 -0800, Greg Edmonds >I currently have an AD forest (say xyz.com) that has and Exchange 2003 >server installed. We have just inherited another domain (abc.com) and they >w...Multiple Pivot tables from One selection I would like 2 or 3 pivot tables to use on pivot table selection. I.e the selection criteria of the 1st pivot table on the menu page determines what the page data of the other pivot table displays on seperate sheets where the other pivot tables are contained. So the selection of one pivot table controls the rest. dapo's Profile: http://www.excelforum.com/member.php?action=getinfo&userid=29967 View this thread: http://www.excelforum.com/showthread.php?threadid=496616 Check the "Synchronize 2 Piv...CAsyncSocket sends from one computer to the other but not the other way around I have written a chat server/client combo using delphi. I am rewriting it in MFC. I have the server component almost complete along with a test client, to the point where it is functional. When I test it on my dev machine it works almost flawlessly. However, when I take the server exe and move it to my other machine that I use for a server it doesn't work. What happens is the client sends the data but the server never recieves the data. The client returns the number of characters sent without an error, but the onrecieve event is never triggered on the server. These are two local machi...Mail Merge only one row in dataset Anyone have an idea why mail merge shows only one row in the dataset even I have chosen multiple lines in CRM? I will not get any error messages but still get only one row in the mail merge window that shows the data that's going to be processed in the MM regardless of how many rows I choose in CRM. Found out that the problem seems to be somewhere in the advanced find. If I choose the option in first window and in Merge section "all records on all pages" the merge works well. But if I try to pick only few lines from the page or do an advanced find, then t...how do i import multiple data sets at one time? I'm importing a bunch of data and I'm using the import external data command in the data menu. I click on my file and choose delimited and then add a space in the next screen. It turns out to be two columns of data. I do this 10 times and was wondering if there is a way to import all the data at one time to simply save time. If anyone out there has any ideas I'd love to hear them. Thanks in advance. Assuuming that the files are all of the same two-column format, in a DOS Command Prompt window: Copy File1.txt + File2.txt + File3.txt + File4.txt + File5.txt File2Import.tx...one user can't see any free/busy info for other users I have a user who can't see others free/busy info. Everybody can see her info but when she tries to setup a meeting with individuals (it doesn't matter who), she gets the slashes and "no information available" message. I've checked all of her local calendar options and nothing looks out of place. I've also tried starting Outlook with /cleanfreebusy and /cleanschedplus; no change. Any further suggestions? ...two users, one email account Windows XP Home and Outlook 2003 I have set up two Windows user accounts. I want both to be able to use exactly the same email account in Outlook - see the same read/unread/sent messages, etc. Can I do this, and if so, how? Stephen <none> wrote: > I have set up two Windows user accounts. I want both to be able to use > exactly the same email account in Outlook - see the same > read/unread/sent messages, etc. Can I do this, and if so, how? Add a mail profile for each user in Control panel, and when you add the Personal Folders service, point each profile to the same PST. T...MS 3003 won't run Hi all, hope someone can help. I have a copy of MS Money 2003 that I bought a few years ago. It worked fine back then but after a system crash and windows re-install I never bothered to relaod money until now. But now after I install it on my W98SE machine it seems to install fine but will not run. When I open the program it opens very briefly then immediately closes. I have tried re-installing and deleting the sample file with no luck. My old money data file is long gone so that can't be the problem. Any ideas? I meant to say MS Money 2003. I may just go buy...Windows installer runs when opening Office 2003 I have both Office 2003 and Office 2007 installed on my XP Pro machine. Office 2007 is working just fine, but in the past month or so I see the Windows Installer preparing to install message every time I start Word, Excel, Access, or Publishing 2003. All four programs open after a minute or so; in Word I get an error message: "An error occurred and this feature is no longer functioning properly. Please run setup and select Repair." The other three programs do not display such a message. I have not installed Powerpoint 2003. I have tried running Setup from my Office 2...Exchange 5.5 Last logon Where can I view the last logon for a specific account? I've checked both the Public Info store and the Private Info store, but not all accounts are listed. There are many users I know have logged on that aren't listed there. Is there anyway to check the properties of a specific account and click a tab, then a button that would provide this info? Or anything like that? To the best of my knowledge, there is no way to do this unless logging was activated in advance. Even then you will need to sort through thousands of records in App Event log. > Where ...meeting to distribution list except one person I have a distribution list of 14 people that I regularly send meeting requests to. Today I want to remove one person from the list. After selecting 'Add Others', picking the distribution list, and then expanding it to reveal all the names, I want to remove one of the people, but can find a way to do it. Other than adding the 13 names separtely, does anyone know how to do Open the distribution list from the address book (probably your Contacts folder) that it exists in. Find the person you want to remove and remove them, then save the ...Run-time Error '438': Object doesn't support this property or method Hello, does anyone see a problem with the following code? SelectInfo is defined as: Sub SelectInfo(ballotWkst As Dim wkbknum, thisnum As Integer Dim wkst As Worksheet Dim wkbk As Workbook For wkbknum = 1 To (Workbooks.Count - 1) For Each wkst In Workbooks(wkbknum).Worksheets If wkst.Name = "Ballot" Then SelectInfo (wkst) '<--doesn't like this line Waht happens if you either remove the parentheses or change it to us...many to one account to contacts I don't understand the relationship types in 3.0. I have a Contact who needs to appear in 7 different accounts for which he is a representative. In fact, this is a pretty common instance in our industry. However, I can't assign a Contact to an Account without creating him in the system 7 different times. This is unacceptable. Please tell me I am missing something easy. I have tried to set up a Relationship at the Account level but Contact is not in the drop-down list. You need to use relationships and relationship roles to do this (the 'relationships' n...averaging from one selected cell to another #2 I have a table with x and y values. I have another z column. In the z column i want to be able to average between the x value along that row location to the cell that has a value below a certain number say 4y. ...Create a form in one database and then copy and paste to another You guys have been great with your help. I created a form in a database, quite by accident that I got it the way I wanted it as I am still learning by trial and error, and reviewing this board... Anyway, I created this form, tried to twick it and screwed it up totally. I have the form before I messes with it backed up on a zip drive. Is there anyway to copy just a form from one datebase and place into another database? There is also a few forms in templates that would work great for me with just a minor adjustment here an there, but how can I get them into the database without cre...MFC and run-time lib dependencies I am working on an installer (InstallShield X), and have come across a situation where I have dependencies on two different versions of the VC run-time libraries. My application requires the VC 7 run-time libraries, but a copy-protection product I use has a dependency on MFC 6.0, which in turn depends on the VC 6 run-time libraries. I'm wondering how best to Do I need to include in my installer both the VC6 and VC7 run-time library redistributables? Or, can I substitute the MFC 7.0 merge module (for the MFC 6.0 one), and thus only use the VC7 run-ti...Problem displaying a form that runs queries In Access 2007, I’m having a little issue displaying a form that runs queries on load. Below is my code. When I double click the form, the queries begin to run but the form only appears after the queries are done. If I put the code behind a command button it works fine. I can’t use a command button because I need the queries to run unattended when the DB opens. Where am I going wrong? Private Sub Form_Open(Cancel As Integer) DoCmd.MoveSize 2880, 4320 Private Sub Form_Load() 'QUERIES ...Multiple instances of Outlook when executing multiple DoCmd.SendObject commands Hello! The routine below works great when I send only one email. But when sending another email, I have to kill Outlook via Task Manager is immediately replaced by another session of Outlook and Outlooks Any help or suggestions appreciated! Sub Send SendEmail() On Error GoTo Err_Command11_Click Dim stDocName, mTO, mCC, mSubject As String stDocName = "frmSnapShot" mTO = Forms!frmEmail!emailTO mCC = Forms!frmEmail!emailCC mSubject = Forms!frmEmail!Subject mpath =...Automatic Macro execution I have a DATA.CSV file with numerical data. I wish to view this data, using a chart and macro which is located in a different COIL_VIEWER.XLS excel Is there a way to open the DATA.CSV file, and automatically execute the macro which is located in the other file (COIL_VIEWER.XLS) without any Probably want to stick the macro in "personal.xls" and then people could open that CSV file with a click of a button on the tool bar. No programming required. Just record keystrokes. "John Gilchrist" <[email protected] data from one book to another i have 2 workbooks. one, wbk1, contains 50 records(say) like the second workbook ,wbk2, contains sheets named as a, b c i want to copy records from wbk1 starting with 'a' to wbk2 sheet named as a, similarly records starting with 'b' to wbk2 sheet named as b, and it goes on can it be done, pls help thanks a lot Message posted from http://www.ExcelForum.com/ If you are looking to get rid of one workbook and spreading the data over several sheets in another, then try the following. In the source workbook break the a1...How to copy from one worksheet to another I have a worksheet that contains several worksheets. I would like to get the information on tab Sheet 1 and copy cells (A2:O2) in a tab name Sheet 2. Can someone share the code to do that ? Or inform me where can I go to read about it in order to accomplish this. Your collaboration will be appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964361253.38/warc/CC-MAIN-20211202084644-20211202114644-00235.warc.gz
CC-MAIN-2021-49
13,100
211
https://www.techgig.com/webinar/Multimodal-Sentiment-Analysis-and-Context-Determination-Using-Perplexed-Bayes-Classifier-1176
code
To apply you need to attempt one skill assessment test as recruiter has attached skill assessment test with this job and wants to see your obtained marks, So be carefull while attempting this skill assessment test Paridhi Gupta, graduated from IGDTUW - Computer Sc. & Engineering. She is working at Intuit as a software developer. Her research papers were pres...ented in ICAC'17, UK and also published in IEEE Xplore.Read More It deals with multimodal analysis of videos using audio and visual features and categorizing the video into positive, negative and neutral. Perplexed Bayes classifier, a probability based model, was applied for categorisation of the videos. Perplex Bayes was then compared with Naive Bayes Classifier.Also, context of the video was determined by linguistic feature analysis. Key points of discussion How to extract audio, visual and textual features from a video
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524879.8/warc/CC-MAIN-20190716201412-20190716223412-00362.warc.gz
CC-MAIN-2019-30
890
6
https://guzelorduspor.com/examine-if-your-area-or-ip-is-blacklisted.html
code
Make investments time in unpaid advertising methods to boost your business. Everybody has opponents, which is why you must have the consultants undertake an analysis of the competitors. We would undergo the pages of the highest competitors in your industry and work out how they are getting their traffic. We can take a look at the keywords that they’re using and the way they’re faring within the rankings. This means that we’d be capable to see what you are going to be up in opposition to and work out the very best strategy that can assist you beat them. Let us do the very best SEARCH ENGINE MARKETING services for you as what we’re good at so that you simply needn’t worry about anything however what you are promoting and the day after day capabilities. We’re coping with new algorithms designed to target previous model tactics and that focus across the truism that AREA ‘STATUS’ plus LOTS of PAGES equals TONS of KEY PHRASES equals HEAPS of Google traffic. An experiential examine of the character of programming work: Lucas, Rob. “Dreaming in Code” New Left Review 62, March-April 2010, pp. a hundred twenty five-132. Chances are you’ll surprise: what are the talents of a software developer, except for pc programming? Software program growth, like many other occupations, requires tender expertise in addition to hard abilities. Builders must work well with others, exhibit attention to element, and suppose by advanced issues. Large brands also find it harder to take advantage of ‘domain authority’. Its harder for many businesses as a result of low-high quality content material on elements of a domain can negatively impression the rankings of an entire area. Auditing your competitors’ actions is a confirmed way to distinguish your unique value proposition. This additionally helps our SEARCH ENGINE OPTIMISATION staff spotlight your small business’ strengths while staying in tune with the aggressive landscape of your trade. On the finish of the Middle Ages , folks began considering math and engineering were more vital. In 1623, Wilhelm Schickard made a mechanical calculator. Other Europeans made more calculators after him. They weren’t modern computers because they might solely add, subtract, and multiply- you might not change what they did to make them do something like play Tetris Due to this, we are saying they were not programmable. Now engineers use computer systems to design and plan. Choosing a domain on your website is the first thing you need to do earlier than you dive into WEBSITE POSITIONING. Serps not use key phrases in domains as a rating issue, which implies you’ll be able to focus on selecting a domain that matches your corporation or model. Be able to put Google’s customers, and yours, FIRST, earlier than Conversion, particularly on data-sort pages (articles, blog posts etc). Python: Python is an interpreted, common-purpose, high-stage programming language. Python’s design philosophy emphasizes code readability through the use of significant whitespace and offering clear programming on large and small scales. Pc programmers construct computer purposes by writing code in various laptop languages. They take a look at new applications and test for bugs. Pc programmers usually want a bachelor’s diploma, but some employers rent programmers with an associate diploma. Modification of the Terms. Unless stated in a different way on your nation in Part 14, we might modify the Phrases infrequently. Except we indicate otherwise, modifications will probably be efficient as of the date they’re posted on this page or any successor page. You need to have a look at the Terms often. We will provide discover (in accordance with Part 3(c) above) of fabric modifications.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711475.44/warc/CC-MAIN-20221209181231-20221209211231-00735.warc.gz
CC-MAIN-2022-49
3,778
7
http://www.highdimensional.space/category/pytorch/
code
[unable to retrieve full-text content]Also How to Implement a YOLO (v3) Object Detector from Scratch in PyTorch; Frameworks for Approaching the Machine Learning Process. Original Post: KDnuggets™ News 18:n21, May 23: Python eats away at R; Top 2018 Analytics, Data Science, Machine Learning tools; 9 Must-have skills for a Data Scientist [unable to retrieve full-text content]Also: An Introduction to Deep Learning for Tabular Data; 9 Must-have skills you need to become a Data Scientist, updated; GANs in TensorFlow from the Command Line: Creating Your First GitHub Project; Complete Guide to Build ConvNet HTTP-Based Application Original Post: Top Stories, May 14-20: Data Science vs Machine Learning vs Data Analytics vs Business Analytics; Implement a YOLO Object Detector from Scratch in PyTorch [unable to retrieve full-text content]The best way to go about learning object detection is to implement the algorithms by yourself, from scratch. This is exactly what we’ll do in this tutorial. Original Post: How to Implement a YOLO (v3) Object Detector from Scratch in PyTorch: Part 1 [unable to retrieve full-text content]PyTorch Tensor Basics; Top 7 Data Science Use Cases in Finance; The Executive Guide to Data Science and Machine Learning; Data Augmentation: How to use Deep Learning when you have Limited Data Original Post: KDnuggets™ News 18:n20, May 16: PyTorch Tensor Basics; Data Science in Finance; Executive Guide to Data Science [unable to retrieve full-text content]PyTorch includes an automatic differentiation package, autograd, which does the heavy lifting for finding derivatives. This post explores simple derivatives using autograd, outside of neural networks. Original Post: Simple Derivatives with PyTorch [unable to retrieve full-text content]This is an introduction to PyTorch’s Tensor class, which is reasonably analogous to Numpy’s ndarray, and which forms the basis for building neural networks in PyTorch. Original Post: PyTorch Tensor Basics [unable to retrieve full-text content]For workstation development platforms purpose-built for Tensorflow, PyTorch, Caffe2, MXNet, and other DL frameworks, the solution is BOXX. We’re bringing deep learning to your deskside with the all-new APEXX W3! Original Post: Ultra-compact workstation for top deep learning frameworks [unable to retrieve full-text content]Playlists, individual tutorials (not part of a playlist) and online courses on Deep Learning (DL) in Python using the Keras, Theano, TensorFlow and PyTorch libraries. Assumes no prior knowledge. These videos cover all skill levels and time constraints! Original Post: Top 10 Videos on Deep Learning in Python [unable to retrieve full-text content]We rank 23 open-source deep learning libraries that are useful for Data Science. The ranking is based on equally weighing its three components: Github and Stack Overflow activity, as well as Google search results. Original Post: Ranking Popular Deep Learning Libraries for Data Science [unable to retrieve full-text content]Also #MachineLearning: Understanding Decision Tree Learning; #PyTorch tutorial distilled – Moving from #TensorFlow to PyTorch. Original Post: Top KDnuggets tweets, Oct 04-10: Using #MachineLearning to Predict, Explain Attrition; Tidyverse, an opinionated #DataScience Toolbox in R
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867374.98/warc/CC-MAIN-20180526073410-20180526093410-00509.warc.gz
CC-MAIN-2018-22
3,302
20
https://alternativeto.net/software/2d-dxf-viewer/
code
2D DXF Viewer is described as 'The 2D DXF Viewer is a standalone application that is capable of opening and reading the contents of DXF files. The viewer make use of GPU-accelerated rendering, which is about 100 times more than the average modern desktop CPU'. There are three alternatives to 2D DXF Viewer for Mac, Windows, Linux and Online / Web-based. The best alternative is DXF View. It's not free, so if you're looking for a free alternative, you could try de·caff DXF Viewer or ODA Viewer. The viewer reads 2D and 3D ASCII and binary DXF files (which may even be packed with zip, gzip and bzip2, but you should prefer zip), and understands a noticable subset of the features of newer DXF versions. ODA Viewer incorporates the power and flexibility of ODA into a single application that can visualize all ODA supported file formats and illustrate other visualize-related features like visual styles and markup.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300533.72/warc/CC-MAIN-20220117091246-20220117121246-00087.warc.gz
CC-MAIN-2022-05
917
3
https://devnet.logianalytics.com/hc/en-us/articles/1500009567782-Time-Zone-and-Locale-Options-Dialog
code
Time Zone and Locale Options Dialog The following are details about options in the dialog: Default Time Zone Specifies the default time zone for the XML data source, in order to apply it to the Time data type, which is not specified for them in the XML instance. If the time zone has been specified in the XML instance, the default time zone that you set here will be ignored. Specifies the locale for the XML instance. Applies the changes and closes the dialog. Does not retain changes and closes the dialog. Displays the help document about this feature.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817729.87/warc/CC-MAIN-20240421071342-20240421101342-00548.warc.gz
CC-MAIN-2024-18
556
8
http://99yx.tk/python-2.7-gui-tutorial
code
Aspecial Erhard himself his tammy dissonantly. Dusty Algernon descends, the microchip collapses participially. Too strong Cary who chose his larks and hays aft! Conflagrante python 2.7 gui tutorial and legal manual de enfermeria medico quirurgica brunner y suddarth descargar Bernd pronates his sterling public procurement manual pdf lit and recovering apogeotropically. Quincey basilar nail, its stroy macroscopically. Chen carburet prepuberal its tenacious reopening. Horrifying peyter sheddings, your dactylogram rescals does not torment anything. red hat linux bible by christopher negus pdf Who became fossilized who climbed disproportionately? Raynard twelfth and uncovered pumps its surface and recovers it. Curperto without course chlorinated its calendar appendices without forcing? Petr prospers geminiani la folia energetically, she retrogrades barefoot. Dracula procrastinative Boyd, his masks very fluidly. The steroid Bennet covered his gat and his rouge thoroughly! Excessive Taylor's forgiveness, your victimizer economizes gratulates from now on. Hydragogus Lucio points again, his tartarization excel 2007 charts and graphs pdf pipes cross: the sad throne of Garry, his bedew soli. personable Bartolemo Hollows its spread throughout the country. refortify polyhydroxy filia dead? at the top, Ludwig imploded, his vaporization frustrated the accesses administratively. Drautier Barri rubricate knapweed healing amalgam. Prang Offenceless that sounded before? Moth eaten Westbrooke immunizes his friends aprons dispassionately? Isadore's square scratches his erasers and deciphers just in time! stretching without python 2.7 gui tutorial refuting that they visibly reset? the sailor Hendrick felt, his paradoxe du menteur lacan brio overlays resupplied in a difficult oracle 10g manual standby database manner. topiary marking that was socially journal of structural and functional genomics impact factor 2011 revitalized? Masking and choice Wylie propiedades nutritivas de la papaya pdf delayed his Ninette pints or re-read them like an owl. Trever ariloide and quincentenario erases its hypersensitivity or bubbles instructions for lego snowspeeder supernormally. Ultra Gerrard investigated his search demonstrably. Cordless and thoughtful Jessey wove his attire or polygamous cantillates. charlatanical and Anglian Eben smiled without restrictions and his lunar sona overrated. Mouldered Cleveland humidified his strips of fellatts veloce? Necrophobic and without source Broddie spread eagle his wood of the pia or sow clearly. hyperpyretic Keith redescends, your shipment is channeled judging infallibly. The enchanted and unaffiliated jens see their benevolent bergenia literacies and ruminations. the estimable bets python 2.7 gui tutorial of Tibold, his ackees bobs become infallible. Does Chief Hartwell accuse her of quoting economized for lack of education? Micah, with crossed ears and twisted, abbreviates his revenge and guarantees pathological revenge. Rustin Bacterium without rubbing, his kilociclos change intellectual property right policy and freeze to the left. Ithaca and the excess of Franz prefaced their milk alleging quaff by force. Reggie movement without joy and python 2.7 gui tutorial easy to understand, his dashiki instills python 2.7 gui tutorial intellectualization awkwardly. damask Carl triple, its standtilly tatty. Byzantine Contest Ignazio, his very sordid turn. Did he encourage Winifield to criticize his predestined overcoming by reviving? The petroleum Clark and burned of crowd covered his intercalations or replenished the calligraphy. quasi and remnant Nels mocked his riffler that cuts and mumm memorably. Leonard not assigned part of his objurgating nor'-east. Ultra Gerrard investigated his search demonstrably. charlatanical and Anglian Eben smiled without restrictions and his lunar sona overrated. the retrospective jurisdictional Darin, his promise is shameful and defamatory. Alienated Eugen pontificates her liquors and wonders with adoration! Reggie movement without joy and delors nell'educazione un tesoro sintesi easy to koran jawa pos metropolis surabaya understand, panera bread company gluten free menu his dashiki instills intellectualization awkwardly. Trever ariloide and quincentenario erases its hypersensitivity or bubbles supernormally. neat, clean, Karim, his shield show becomes purple. Twin-screw and Priapic Tallie gently tap their flowers or wire. Who instalacion de mayolicas lima became fossilized who climbed disproportionately? Outdoor and schizophyceous Vinny enjoys his Stacy moil ballyragging maliciously. assuming that Johannes Bud, his unbridled madness rotated drastically. They pray with que es lectura interpretativa concepto a soft head, they pedestrianize their botanization and they pre-consume sharply! Termination illegalization families schools and communities pdf that understates stylistically? the ancestral Vassily traverses his failed yare. Little mouse and proper Franklyn fists rebury their neighborhoods and embraces prenatal. bread and butter and replaceable Hercules that sells its hamshackle gabbros and sticks tirelessly. damask Carl triple, its standtilly tatty. crushed penemuan listrik statis Patricio Corn is auditions greensickness heliacally. Mouldered Cleveland humidified his strips of fellatts veloce? special Pinnacles Bary, his mete by python 2.7 gui tutorial which. Horrifying peyter sheddings, your dactylogram rescals does not torment anything. Jurado and Iberico Stan dissociate themselves from their omasum tabiat merokok dalam kalangan remaja diets or deliberately cheat. the people and the satanic Raimund got rid of their disturbances or recrystallized tickling. Alford clausure fruits, its clinically unhealthy. Bus that Lyle preceded, his gremlins ingeniously pluralized. They confuse Bobbie suspiciously, their mechanics pompadours philologically lathings. Micheil's water ski abstraction reinstates her with excitement. Masking and choice Wylie delayed his Ninette pints or re-read them like an python 2.7 gui tutorial owl. vibrant Marchall overboil, its scapolite coils to enjoy falsely. the centrist Jordy adds his sweet reincorporador. intimos enemigos de olga salar pdf prenatal maul Neale, her disinterested sad. Candied Udell dandified his movements pectizing unappreciably? The terrifying Tadd completed his internal medicine mcq pdf grim disastrously. Nothing Nels underbuys his readmission maybe. Paolo, the most mature and equilateral, modulacion por impulsos codificados pdf perpetuates his singer by diffracting or resigning python 2.7 gui tutorial honorably. Pascale compliant puts guitar tab johnny b goode its holes and telepathizes cheap-cheap! The enchanted and unaffiliated jens see their benevolent bergenia literacies and ruminations. Reassuring Hervey deposed, her Marcionite is metrically overlaid varietally. caramelize epiglottic that strap and estereve? Niels infested and indestructible smokes his uninhabited neutered figworts generously. Sclerodermato Istvan realigned, its exciting pull. Groggy Rodolph sinks, his throbbing handicap expunge infra. Trappy and Corky attributable download his escape or overload it. Waylon watercolor applicable, your python 2.7 gui tutorial indulgences far ahead. Does Chief python 2.7 gui tutorial Hartwell accuse her of quoting economized for lack of education? Ransom without combing aromatizing, its brick of gold very loudly. topiary marking that was socially revitalized? Job exaggerated and selfish in case your catalog highlights Christians. Trevar without branches reacquired, bespot individually. Miraculous elimination of Filbert, his impersonalized pyelography rhapsody insufficiently. Alienated Eugen pontificates her liquors and wonders with adoration! Who python 2.7 gui tutorial is impartial that rifely imparks? Aspecial Erhard himself his tammy dissonantly. Does bilingual python 2.7 gui tutorial Andrus upset the hieroglyph of his super-sweeper abuser? Quincey basilar nail, its stroy macroscopically. Angry dermatologist deep brain stimulation surgery that goes off calmly? damask Carl triple, its standtilly tatty. Petr prospers energetically, she retrogrades barefoot. Christ uncivil unpen, she is agitated very uneasy. color Kurtis stint, his faults very enclitically. seminar report mobile number portability prenatal maul Neale, her python 2.7 gui tutorial disinterested sad. Necrophobic and without source Broddie spread eagle his wood of the pia or sow clearly. The supposed Goober arrogates his barbecue disgusted in instalar impresora virtual pdf adobe a disputed way. Sullivan's hoarse tone your lies and drains tears! Undomestic and turbulent Jake blame his loyalties whitening sixth. scopate Ugo beats Fulfiller Uncloak madly. the consignees measured that kid paddle tome 1 pdf condition cheerfully? Stunning Kellen novelised, his extravagant admiration. Exciting and scleroid Moishe scandalizes its maintenance or increases in the south. bread and butter and replaceable Hercules that sells its hamshackle gabbros and sticks tirelessly. Winbleble Skipper excelled, its remodeling dilatory. pitcher Toddy lynnsport class timetable fraternized his sexual denuclearization. Focused, Tammy originated, her welded slip anchored negatively. Unguiculate Hudson closed her meow and maternal pin! the stately Townsend puppies, she fell asleep wearily. Dusty Algernon descends, the microchip collapses participially. The Emmery, poorly employed and employee engagement strategy definition lousy, irritated her syllable of oviposition and intellectually terrified. Candied Udell dandified his movements pectizing unappreciably? Benito unstable lippen, his bull resurrects conditionally tortures. the unphisticated and physical room alternate its low bridges and the caress affectionately. The enchanted and unaffiliated jens see their benevolent bergenia literacies and ruminations. The terrifying Tadd completed his grim disastrously. philomena martin sixsmith epub Cryptal Bishop stang his revaccinated and measured arithmetically! Georgy Hightail surprised her humanized and selfishly threw! Alford present perfect e simple past tense clausure fruits, its clinically unhealthy. Fastidious and without stacking python 2.7 gui tutorial Gerry, his regma is abnt nbr 6123 democratized and reduced arithmetically. the petroleum Clark and burned of crowd covered his intercalations or replenished the calligraphy. Nicholas emigrational stridulates, its tranquilized energy efficiency benchmarking buildings feasible.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221211316.39/warc/CC-MAIN-20180816230727-20180817010727-00617.warc.gz
CC-MAIN-2018-34
10,538
3
https://issues.jenkins.io/browse/JENKINS-44101
code
Status: Open (View Workflow) Currently Jenkins always ships Remoting version from the core to agents. Sometimes it would be better to ship newer version (e.g. with a bugfix for agent side, but it requires) - API in the Core, which allows replacing Slave.JarFile - Plugin, which bundles Remoting as a resource and replaces the resource if the bundled version is newer than the version in the core - relates to JENKINS-41196 Pluggable core component This is not a competitor of JENKINS-41196, especially since there is no ETA. I have no plans to alter the core logic, I plan to ship only service logic for agent. E.g. somebody will be able to provide custom remoting.jar after the plugin. Right, I get that, but why we would have a one-off feature for doing that when JENKINS-41196 is already written and probably just needs some testing and polish? https://github.com/jenkinsci/jenkins/pull/2875 offers code for that. Somebody is welcome to pick it up and reimplement if needed. All my use-cases are addressed by https://github.com/jenkinsci/custom-war-packager which allows replacing libraries in WAR bundles. -1 on this. JENKINS-41196is better and more general.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644574.15/warc/CC-MAIN-20230529010218-20230529040218-00099.warc.gz
CC-MAIN-2023-23
1,162
14
http://bigdata.sys-con.com/node/2519603
code
|By Bob Renner|| |January 25, 2013 10:00 AM EST|| Despite the immense potential for efficiency offered by the proliferation of cloud and SaaS solutions, integration of these solutions into often disparate enterprise IT frameworks continues to be a challenge for many businesses. Even traditional B2B integration faces greater complexity with the growing adoption of cloud and SaaS applications. Building on this complexity are things such as changes to privacy regulations that have occurred over the past decade - particularly in relation to healthcare and financial data - as well as the speed of data demands from distributed supply chains. Over the next year, I anticipate that businesses will increasingly look to managed services that offer industry expertise, proven processes and in-depth technology to streamline cloud integration and data management initiatives that have been implemented over the past several years. With data volume, variety, velocity and therefore complexity increasing, companies are beginning to realize that integration and data management must be at the core of their IT architecture. There are four key areas in which I expect to see significant advances related to cloud and managed services in 2013: Managed services remain the "secret sauce" of successful integration It's no secret that the complexity of integration is increasing with more regulations, security considerations, and burgeoning diversification and federation of data. This year, I expect to see renewed focus on adopting managed services solutions that combine technology, people, and processes, particularly when it comes to the marriage of integration and data management. The reality is that technology alone cannot solve the challenge of integrating disparate systems. Despite the rise of automation in integration projects, in 2013 I believe that companies will look to trusted managed services experts to obtain the human expertise that can drive the greatest efficiency in integration projects. When it comes to cloud, services companies deliver the knock-out punch to their software brethren Mounting pressure in the race to the cloud will be a major driving force in the technology industry in 2013, with players across diverse sectors looking to flesh out existing solutions and offer new ones through mergers and acquisitions. The reality is that solutions cannot remain static and expect to be competitive in the long term. Change and complexity is constantly growing and evolving, and solutions must dynamically grow with it - a growth often achieved through M&A. As this convergence continues to take shape, I believe that Cloud Integration Brokers and service companies like IBM and Accenture will become the solutions du jour for enterprises making the move to the Cloud. According to a recent Gartner report, "Competitive Landscape: Integration Brokerage," over the past few years adoption of IB services SaaS integration and cloud services brokerage has rapidly accelerated, driving the overall IB market to $1.5 billion in 2012. I expect to see this trend continue as Cloud Integration Brokers offer more scalable, diverse, and dynamic solutions that streamline the move to the cloud and offer long-term scalability and adaptability. Cloud adoption will drive a convergence across previously distinct integration solutions Companies moving to the cloud will increasingly seek complete data integration solutions, moving away from the old models that distinguished between silos of integration "features," such as Application to Application (A2A), Business to Business (B2B), Managed File Transfer (MFT) and Business Process Management (BPM). The repercussions of this convergence in the integration market will have profound implications across IT organizations, impacting everything from internal Centers of Excellences, to the broader vendor landscape, and even the overall sourcing and deployment strategies for IT. I anticipate that, as a natural result of this shift across the industry, we can expect to see much more comprehensive and "data aware" integration architectures emerge over the next few years. I also believe that this shift will fundamentally change the way we think of integration and data management. Vertical markets will turn to the private sector for data integration solutions that can scale Over the next year, I expect to see a surge in demand for proven (private sector) data integration networks among healthcare organizations and government-funded Health Information Exchanges (HIEs). As it stands today, these organizations and HIEs continue to struggle to achieve a sustainable business model. In fact, don't be surprised to see up to 90% of all government-funded HIEs fail to reach sustainability by 2016. With minimal returns to show from initial grants, which in many cases were exhausted on implementation and maintenance of basic infrastructure integration, the HIEs that do manage to survive the next few years will seek out established private sector data networks and even managed services to provide the streamlined, efficient integration required for long-term viability. Furthermore, I believe that vertical markets will seek an integration solution that liberates and empowers data to become actionable as organizations continue to shift their focus toward providing a unique value to their constituency with this data in 2013. SYS-CON Events announced today that Windstream, a leading provider of advanced network and cloud communications, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Windstream (Nasdaq: WIN), a FORTUNE 500 and S&P 500 company, is a leading provider of advanced network communications, including cloud computing and managed services, to businesses nationwide. The company also offers broadband, p... Nov. 23, 2014 07:30 PM EST Reads: 1,676 The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large... Nov. 23, 2014 12:30 PM EST Reads: 1,351 The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo (http://www.CloudComputingExpo.com... Nov. 23, 2014 07:45 AM EST Reads: 1,459 The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha... Nov. 22, 2014 10:00 PM EST Reads: 1,342 Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world. Nov. 22, 2014 05:30 PM EST Reads: 1,439 An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse... Nov. 22, 2014 05:30 PM EST Reads: 1,287 Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar... Nov. 21, 2014 09:15 PM EST Reads: 1,365 Technology is enabling a new approach to collecting and using data. This approach, commonly referred to as the "Internet of Things" (IoT), enables businesses to use real-time data from all sorts of things including machines, devices and sensors to make better decisions, improve customer service, and lower the risk in the creation of new revenue opportunities. In his General Session at Internet of @ThingsExpo, Dave Wagstaff, Vice President and Chief Architect at BSQUARE Corporation, discuss the ... Nov. 21, 2014 08:00 PM EST Reads: 1,429 The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a... Nov. 21, 2014 08:00 PM EST Reads: 1,379 "BSQUARE is in the business of selling software solutions for smart connected devices. It's obvious that IoT has moved from being a technology to being a fundamental part of business, and in the last 18 months people have said let's figure out how to do it and let's put some focus on it, " explained Dave Wagstaff, VP & Chief Architect, at BSQUARE Corporation, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Nov. 21, 2014 07:00 PM EST Reads: 1,287 The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to th... Nov. 20, 2014 01:00 PM EST Reads: 1,580 As cloud gives an opportunity to businesses to buy services externally – how is cloud impacting your customers? In his General Session at 15th Cloud Expo, Fabio Gori, Director of Worldwide Cloud Marketing at Cisco, provided answers to big questions: Do you see hybrid cloud as where the world is going? What benefits does it bring? And how does Cisco connect all of these clouds? He also discussed Intercloud and Cisco’s investment on it. Nov. 18, 2014 09:00 PM EST Reads: 1,502 Working with Big Data is challenging, especially when decision makers depend on market insights and intelligence from your data but don't have quick access to it or find it unusable. In their session at 6th Big Data Expo, Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia; Zel Bianco, President, CEO and Co-Founder of Interactive Edge of Solgenia; and Ermanno Bonifazi, CEO & Founder at Solgenia, discussed how a revolutionary cloud-based BI along with mobile analytics is already c... Nov. 17, 2014 11:00 AM EST Reads: 1,619 There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed... Nov. 17, 2014 10:00 AM EST Reads: 1,602 Vichara Technologies in Hoboken, New Jersey is expanding its capabilities in big data from origins on Wall Street into other areas, and thereby demonstrating the growing marketplace for advanced big-data analytics services. The next BriefingsDirect deep-dive big data benefits case study interview explores how Vichara Technologies in Hoboken, New Jersey is expanding its capabilities in big data from origins on Wall Street into other areas, and thereby demonstrating the growing marketplace for ad... Nov. 16, 2014 01:00 PM EST Reads: 1,231 Moscow-based OpenBank, one of the largest private financial services groups in Russia, has built out a business intelligence capability for wholly new business activity monitoring benefits. The next BriefingsDirect deep-dive big data benefits case study interview explores how Moscow-based Otkritie Bank, one of the largest private financial services groups in Russia, has built out a business intelligence (BI) capability for wholly new business activity monitoring (BAM) benefits. The use of HP V... Nov. 12, 2014 06:45 AM EST Reads: 1,296 The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago. Nov. 10, 2014 12:00 PM EST Reads: 5,945 Scene scenario: 10 am in a boardroom somewhere, second round of coffees served, Danish and donuts untouched, a quiet hush settles. “Well you know what guys? (and, by the use of the term guys I mean to include both sexes here assembled) – the trouble that we have as a company is that we are, to put it bluntly, just a little analytics poor,” said the newly appointed Chief Analytics Officer. That we should consider a firm to be analytically deficient or poor is a profound comment on our modern ag... Nov. 10, 2014 07:18 AM EST Reads: 2,412 Quantum is a leading expert in scale-out storage, archive and data protection, providing intelligent solutions for capturing, sharing and preserving digital assets over the entire data lifecyle. They help customers maximize the value of these assets to achieve their goals, whether it’s top movie studios looking to create the next blockbuster, researchers working to accelerate scientific discovery, or small businesses trying to streamline their operations. With a comprehensive portfolio of best-i... Nov. 3, 2014 07:00 PM EST Reads: 3,542
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400380409.19/warc/CC-MAIN-20141119123300-00160-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
15,165
52
https://www.mail-archive.com/[email protected]/msg105602.html
code
On Sat, Apr 27, 2013 at 12:55 PM, Corentin Dupont <[email protected]> wrote: > can I ask the compiler to display the type of an inferred value during > compile time? > It would be great if I can output a string during compilation with the type. > A little bit like running :type in GHCi, but without GHCi... Because running > GHCi is sometime painful (I have to clean my code first). You could try floating a value to the top level; then I believe -Wall will make ghc print out the inferred type since you didn't give a type signature. -- gwern http://www.gwern.net _______________________________________________ Haskell-Cafe mailing list [email protected] http://www.haskell.org/mailman/listinfo/haskell-cafe
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00232.warc.gz
CC-MAIN-2023-50
725
2
https://github.com/conraid/SlackBuilds/tree/master/arpwatch
code
Fetching latest commit… Cannot retrieve the latest commit at this time. |Type||Name||Latest commit message||Commit time| |Failed to load latest commit information.| Slackware Current Repository by Conraid ====================================================================== o edit a package description. Line # up the first '|' above the ollowing the base package name, and the '|' # on the right ide marks the last column you can put a character in. You must # ake exactly 11 lines for the formatting to be correct. It's also # . arpwatch (Monitoring tools for tracking IP addresses on a network) The arpwatch package contains arpwatch and arpsnmp. Arpwatch and arpsnmp are both network monitoring tools. Both utilities monitor Ethernet or FDDI network traffic and build databases of Ethernet/IP address pairs, and can report certain changes via email. HOME: http://ee.lbl.gov/ ======================================================================
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203326.34/warc/CC-MAIN-20190324043400-20190324065400-00322.warc.gz
CC-MAIN-2019-13
953
5
http://blog.tentaclesoftware.com/archive/2010/09/10/home-server-show-interview.aspx
code
Alex Kuretz and I are on Home Server Show #105, talking about developing add-ins for Windows Home Server. It was a lot of fun, so if you’re interested in a bit of Disk Management history, and a discussion about the economics of add-in development, go grab this episode and listen. Backing up your Backups with Alex Kuretz, interpreting the data from Black Box with Sam Wood, it’s the HomeServerShow, Developer Deep Dive Edition. Episode 105 is a long one and we get in depth with with two developers that have been around since the beginning of Windows Home Server. We talk about their latest releases and the “Free vs. Fee” model of Add-Ins for WHS. Outtakes are also back courtesy of our guests and Skype! Don’t miss this one. Both Alex and I posed some questions for Home Server Show listeners, and we’re hoping for some great feedback in the forums.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118963.4/warc/CC-MAIN-20170423031158-00570-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
865
3
https://www.mail-archive.com/[email protected]/msg220946.html
code
It may not be flatpak on its own, but the machine I installed (and later removed and purged) flatkpak on this problem exists. (So a correlation does seem to exist) It might have something to do with other PPAs or how packages you install from external PPAs affect the system. The only major changes I made with the system around the time this happened was installing flatpak (and monodevelop through it), wine updating to 2.11 staging, and some retroarch cores updating. Also it might be worth looking into how exactly the gnome-keyring-daemon is started on login to see if there is a manual edit to some file that could resolve this issue. Sadly I don't have much else to offer other than that I am using Xubuntu 16.04.2 and have decided that the best temporary fix is to just enter my password in a second time by automatically starting the keyring daemon on startup. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to lightdm in Ubuntu. https://bugs.launchpad.net/bugs/1689825 Title: gnome-keyring not unlocked on boot Status in chromium-browser package in Ubuntu: Invalid Status in flatpak package in Ubuntu: Invalid Status in gdm package in Ubuntu: Confirmed Status in gnome-keyring package in Ubuntu: Confirmed Status in libgnome-keyring package in Ubuntu: Confirmed Status in lightdm package in Ubuntu: Confirmed Bug description: 1) Release: 16.04.2 2) gnome-keyring: 3.18.3-0ubuntu2 3) Login. gnome-keyring unlocks "login" features including for google chrome 4) gnome-keyring is not unlocked, chrome takes 2 minutes to open and with no secure password features(sync) functioning. For the past couple days, chrome on Ubuntu 16.04 takes a REALLY long time (maybe 2 minutes) to start. Once chrome is started, I am not able to sync and any secure password features are broken. I found out this is due to gnome-keyring not being unlocked at login. There's also no way to unlock the "login" portion of the keyring from the running daemon by default. I have to kill the gnome-keyring process and start without "--login" as a parameter. Then the "login" section shows up which I'm able to unlock. From there chrome starts up instantly but asks the following: Enter password to unlock your login keyring The login keyring did not get unlocked when you logged into your computer After that, all of it's sync and secure features are functional. Starting google-chrome-stable from a command line at boot without running the above workaround shows the following error messages: Gkr-Message: secret service operation failed: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken. Gkr-Message: secret service operation failed: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken. [4364:4393:0510/100407.740292:ERROR:token_service_table.cc(130)] Failed to decrypt token for service AccountId-108842767310111573264 [4364:4445:0510/100407.740292:ERROR:gcm_store_impl.cc(929)] Failed to restore security token. ProblemType: Bug DistroRelease: Ubuntu 16.04 Package: gnome-keyring 3.18.3-0ubuntu2 ProcVersionSignature: Ubuntu 4.8.0-52.55~16.04.1-generic 4.8.17 Uname: Linux 4.8.0-52-generic x86_64 ApportVersion: 2.20.1-0ubuntu2.5 Architecture: amd64 CurrentDesktop: GNOME-Flashback:Unity Date: Wed May 10 09:43:37 2017 SourcePackage: gnome-keyring UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1689825/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304570.90/warc/CC-MAIN-20220124124654-20220124154654-00226.warc.gz
CC-MAIN-2022-05
3,997
2
http://man.freetechsecrets.com/pflogd.8.html
code
pflogd is a background daemon which reads packets logged by pf(4) to the packet logging interface pflog0 and writes the packets to a logfile (normally /var/log/pflog) in tcpdump(1) binary format. These logs can be reviewed later using the -r option of tcpdump(1), hopefully offline in case there are bugs in the packet parsing code of tcpdump(1). pflogd closes and then re-opens the log file when it receives SIGHUP, permitting newsyslog(8) to rotate logfiles automatically. SIGALRM causes pflogd to flush the current logfile buffers to the disk, thus making the most recent logs available. The buffers are also flushed every delay seconds. If the log file contains data after a restart or a SIGHUP, new logs are appended to the existing file. If the existing log file was created with a different snaplen, pflogd temporarily uses the old snaplen to keep the log file consistent. pflogd tries to preserve the integrity of the log file against I/O errors. Furthermore, integrity of an existing log file is verified before appending. If there is an invalid log file or an I/O error, logging is suspended until a SIGHUP or a SIGALRM is received. The options are as follows:
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945381.91/warc/CC-MAIN-20230326013652-20230326043652-00569.warc.gz
CC-MAIN-2023-14
1,170
5
https://prajwalrai.com.np/ipv4-vs-ipv6/
code
IPv4 was the original version of IP and has been in use since the early days of the internet. It uses a 32-bit addressing system, which allows for a maximum of 4.3 billion unique addresses. However, as the number of devices on the internet has grown, the number of available IPv4 addresses has become increasingly limited. IPv6 is a newer version of IP that was developed to address the limitations of IPv4. IPv6 uses a 128-bit addressing system, which allows for a vastly larger number of unique addresses (approximately 340 undecillion addresses, or 3.4×10^38). This means that IPv6 can support the growing number of devices on the internet for many years to come. IPv6 was developed to address the limitations of IPv4 and provide a larger address space, improved security features, better routing and network traffic handling capabilities, and backward compatibility with IPv4. However, despite the advantages of IPv6, adoption has been relatively slow due to the need for network infrastructure upgrades and the lack of widespread support from internet service providers and other network operators. Here are some key differences between IPv4 and IPv6: - Addressing: IPv4 uses 32-bit addresses, while IPv6 uses 128-bit addresses. - Address Format: IPv4 addresses are written in decimal format, separated by periods (e.g. 192.168.1.1), while IPv6 addresses are written in hexadecimal format, separated by colons (e.g. 2001:0db8:85a3:0000:0000:8a2e:0370:7334). - Security: IPv6 includes built-in security features, such as IPsec, which provides end-to-end encryption and authentication, while IPv4 relies on additional security protocols for security. - Routing: IPv6 includes features for efficient routing and better handling of network traffic compared to IPv4. - Backward compatibility: IPv6 is backward compatible with IPv4, which means that IPv6-enabled devices can communicate with IPv4 devices using mechanisms such as tunneling or translation.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943704.21/warc/CC-MAIN-20230321162614-20230321192614-00187.warc.gz
CC-MAIN-2023-14
1,955
9
https://kifakz.github.io/eng/bible/stern/stern_mark_08.html
code
Mark, Jewish New Testament and comment David H. Stern 1. It was during that time that another large crowd gathered, and they had nothing to eat. Yeshua called his talmidim to him and said to them, 2. “I feel sorry for these people, because they have been with me three days, and now they have nothing to eat. 3. If I send them off to their homes hungry, they will collapse on the way; some of them have come a long distance.” 4. His talmidim said to him, “How can anyone find enough bread to satisfy these people in a remote place like this?” 5. “How many loaves do you have?” he asked them. They answered, “Seven.” 6. He then told the crowd to sit down on the ground, took the seven loaves, made a b’rakhah, broke the loaves and gave them to his talmidim to serve to the people. 7. They also had a few fish; making a b’rakhah over them he also ordered these to be served. The b'rakhah over the bread (v. 6; see Ml 14:9&N) would have also sufficed for the fish, according to Jewish law. Therefore the b'rakhah in v. 7 must have been the spontaneous words of a faithful Son to his Father at the moment of performing a creative miracle. 8. The people ate their fill; and the talmidim took up the leftover pieces, seven large basketsful. 9. About four thousand were there. 10. After sending them away, Yeshua got into the boat with his talmidim and went off to the district of Dalmanuta. 11. The P’rushim came and began arguing with him; they wanted him to give them a sign from Heaven, because they were out to trap him. 12. With a sigh that came straight from his heart, he said, “Why does this generation want a sign? Yes! I tell you, no sign will be given to this generation!” 13. With that, he left them, got into the boat again and went off to the other side of the lake. 14. Now the talmidim had forgotten to bring bread and had with them in the boat only one loaf. 15. So when Yeshua said to them, “Watch out! Guard yourselves from the hametz of the P’rushim and the hametz of Herod,” Chametz ("leaven, yeast"). See Mt 16:6N. 16. they thought he had said it because they had no bread. 17. But, aware of this, he said, “Why are you talking with each other about having no bread? Don’t you see or understand yet? Have your hearts been made like stone? 18. You have eyes — don’t you see? You have ears — don’t you hear? And don’t you remember? 19. When I broke the five loaves for the five thousand, how many baskets full of broken pieces did you collect?” “Twelve,” they answered him. 20. “And when I broke the seven loaves for the four thousand, how many baskets full of broken pieces did you collect?” “Seven,” they answered. 21. He said to them, “And you still don’t understand?” 22. They came to Beit-Tzaidah. Some people brought him a blind man and begged Yeshua to touch him. 23. Taking the blind man’s hand, he led him outside the town. He spit in his eyes, put his hands on him and asked him, “Do you see anything?” 24. He looked up and said, “I see people, but they look like walking trees.” 25. Then he put his hands on the blind man’s eyes again. He peered intently, and his eyesight was restored, so that he could see everything distinctly. 26. Yeshua sent him home with the words, “Don’t go into town.” 27. Yeshua and his talmidim went on to the towns of Caesarea Philippi. On the way, he asked his talmidim, “Who are people saying I am?” 28. “Some say you are Yochanan the Immerser,” they told him, “others say Eliyahu, and still others, one of the prophets.” 29. “But you,” he asked, “who do you say I am?” Kefa answered, “You are the Mashiach.” 30. Then Yeshua warned them not to tell anyone about him. 31. He began teaching them that the Son of Man had to endure much suffering and be rejected by the elders, the head cohanim and the Torah-teachers; and that he had to be put to death; but that after three days, he had to rise again. 32. He spoke very plainly about it. Kefa took him aside and began rebuking him. 33. But, turning around and looking at his talmidim, he rebuked Kefa. “Get behind me, Satan!” he said, “For your thinking is from a human perspective, not from God’s perspective!” 34. Then Yeshua called the crowd and his talmidim to him and told them, “If anyone wants to come after me, let him say ‘No’ to himself, take up his execution-stake, and keep following me. 35. For whoever wants to save his own life will destroy it, but whoever destroys his life for my sake and for the sake of the Good News will save it. 36. Indeed, what will it benefit a person if he gains the whole world but forfeits his life? 37. What could a person give in exchange for his life? 38. For if someone is ashamed of me and of what I say in this adulterous and sinful generation, the Son of Man also will be ashamed of him when he comes in his Father’s glory with the holy angels. - chapter 1 - chapter 2 - chapter 3 - chapter 4 - chapter 5 - chapter 6 - chapter 7 - chapter 8 - chapter 9 - chapter 10 - chapter 11 - chapter 12 - chapter 13 - chapter 14 - chapter 15 - chapter 16
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00269.warc.gz
CC-MAIN-2023-50
5,122
57
https://aaltodoc.aalto.fi/items/f0dce5c1-c842-4807-acfa-0e692ced7533
code
Strengthening nonparametric Bayesian methods with structured kernels School of Science | Doctoral thesis (article-based) | Defence date: 2022-11-22 Unless otherwise stated, all rights belong to the author. You may download, display and print this publication for Your own personal use. Commercial use is prohibited. 70 + app. 54 Aalto University publication series DOCTORAL THESES, 158/2022 AbstractThis thesis covers an assortment of topics at the intersection of Bayesian nonparametrics and kernel machines: that is, to propose more efficient, kernel-based solutions to nonparametric Bayesian machine learning tasks. In chronological order, we provide summaries for the 4 publications on 3 interconnected topics: (i) expressive and nonstationary covariance kernels for Gaussian processes (GPs); (ii) scalable approximate inference of GP models via pseudo-inputs; (iii) Bayesian sampling of un-normalized target distributions via the simulation of interacting particle systems (IPSs). GPs are flexible priors on functions, which inform the hypothesis spaces of infinitely wide neural networks. However, to fully exploit their tractable uncertainty measures, careful selection of flexible covariance kernels is required for pattern discovery. Highly parametrized, stationary kernels have been proposed for handling extrapolations in GPs, but the translation invariance implied by stationarity caps their expressiveness. We propose nonstationary generalizations of such expressiveness kernels, both in parametric and nonparametric forms, and explore the implications of those kernels with respect to their spectral properties. Another restrictive aspect of GP models lies upon the cumbersome cubic scaling in their inference. We can draw upon a smaller set of pseudo-inputs, or inducing points, to obtain a sparse and more scalable approximate posteriors. Myriad studies of sparse GPs have established a separation of model parameters, which can either be optimized or inferred, and variational parameters which only requires optimization and no priors. The inducing point locations, however, exist somewhat outside this dichotomy, but the common practice is to simply find point estimates via optimization. We demonstrate that a fully Bayesian treatment of inducing inputs is equally valid in sparse GPs, and leads to a more flexible inferential framework with measurable practical benefits. Lastly, we turn to the sampling of un-normalized densities, a ubiquitous task in Bayesian inference. Apart from Markov Chain Monte Carlo (MCMC) sampling, we can also draw samples by deterministically transporting a set of interacting particles, i.e., the simulation of IPSs. Despite their ostensible differences in mechanism, a duality exists between the subtypes of the two sampling regimes, namely Langevin diffusion (LD) and Stein variational gradient descent (SVGD), where SVGD can be seen as a "kernelized" counterpart of LD. We demonstrate that kernelized, deterministic approximations exist for all diffusion-based MCMCs, which we denote as MCMC dynamics. Drawing upon this extended duality, we obtain deterministic samplers that emulate the behavior of other MCMC diffusion processes. Supervising professorKaski, Samuel, Prof., Aalto University, Department of Computer Science, Finland Thesis advisorHeinonen, Markus, Dr., Aalto University, Finland Bayesian nonparametrics, kernel methods, Gaussian processes [Publication 1]: Zheyang Shen, Markus Heinonen, Samuel Kaski. Harmonizable mixture kernels with variational Fourier features. In The 22nd InternationalConference on Artificial Intelligence and Statistics, Naha, Okinawa, Japan, PMLR, p. 1812-1821 (Proceedings of Machine Learning Research;vol. 89), April 2019. Full text in Acris/Aaltodoc: http://urn.fi/URN:NBN:fi:aalto-201909035124 [Publication 2]: Zheyang Shen, Markus Heinonen, Samuel Kaski. Learning spectrograms with convolutional spectral kernels. In The 23rd InternationalConference on Artificial Intelligence and Statistics, Palermo, Italy, PMLR, p. 3826-3836 (Proceedings of Machine Learning Research; vol. 108),August 2020. Full text in Acris/Aaltodoc: http://urn.fi/URN:NBN:fi:aalto-202010025750 [Publication 3]: Simone Rossi, Markus Heinonen, Edwin V. Bonilla, Zheyang Shen, Maurizio Filippone. Sparse Gaussian processes revisited: Bayesian approaches to inducing-variable approximations. In The 24th International Conference on Artificial Intelligence and Statistics, San Diego, California, USA, PMLR, p. 1837-1845 (Proceedings of Machine Learning Research; vol. 130), April 2021. Full text in Acris/Aaltodoc: http://urn.fi/URN:NBN:fi:aalto-202109159167 [Publication 4]: Zheyang Shen, Markus Heinonen, Samuel Kaski. De-randomizing MCMC dynamics with the diffusion Stein operator. In The 35th Conferenceon Neural Information Processing Systems, Online, December 2021. Full text in Acris/Aaltodoc: http://urn.fi/URN:NBN:fi:aalto-202202161912
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100309.57/warc/CC-MAIN-20231202010506-20231202040506-00259.warc.gz
CC-MAIN-2023-50
4,911
17