url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://community.appian.com/discussions/f/new-to-appian/18290/setting-up-a-second-approver-for-a-process/71983
code
I have a form that needs two approvers. I am adapting the example of https://docs.appian.com/suite/help/19.4/Process_Modeling_Tutorial.html for a first approval: Thanks for your help in advance. After first user input task add XOR condition to check approver status. If approved then add one more user input task for second approver showing first approver status. Thanks for all the help. Are the conditions that I have added correct? That looks good to me! I'm assuming the pv!approval is a Boolean value? You also have to make sure this value is saved as part of the output from your first User Input Task. Configured like this Peter Lewis? Is there something in your form where the user is choosing to approve or not approve? If this approval decision comes from the form, then you need to create an input for your approval (most similar to this step: https://docs.appian.com/suite/help/latest/Process_Modeling_Tutorial.html#add-an-approval-step-with-a-user-input-node) On the 1st approval on the bottom there are radio buttons, pretty much followed the tutorial, but data for one of the sections of the form is blank (the data missing has numeric values): Kind of clueless here... There's two things to check in this case. First, make sure that you provide a value for your variable in the inputs tab for the second approval task. For example, I provided details about a vehicle (that I saved in pv!vehicle) in form 1. In form 2, I now display this by adding the value to display as pv!vehicle If you have this set correctly, also check the forms tab to make sure your form has the rule input mapped to the variable you created in the first tab. The data is blank because either user has not provided it or not selected any value from radio button. In this case check if the data found is blank, then provide default value. Also, you can provide default values in the activity class parameters so that radio buttons would not be blank on page load. Hi Peter<Yep you were correct, the issue was with the second form, the rule inputs were not mapped to the variables at all. Thanks for the great help! However I still have an issue with a section of the formula that has a calculation variable. The data on those fields is not being passed on. Discussion posts and replies are publicly visible © 2020 Appian. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400201601.26/warc/CC-MAIN-20200921081428-20200921111428-00283.warc.gz
CC-MAIN-2020-40
2,332
18
https://link.highedweb.org/2012/10/securing-the-open-source-cms-doesnt-take-a-dissertation/
code
Securing the Open Source CMS Doesn’t Take a Dissertation We are talking about protecting the brand not just the data. Open source does not mean amateur. Yet open source CMS systems are not designed to keep critical dates secure. Yet there are numerous add ons etc to help meet those needs. Not staying up to date on the software can cause problems but this is true in proprietary systems too. Also often secure configuration examples are easy to find. 3 rules to make your site secure: - Just because you can, doesn’t mean you should. The CMS is a solution for data presentation, not necessarily data processing. What is a site and what is an application? Know the difference as you look at open source CMS. - Trust vendors to do what they do well, hosting, streaming, etc… - Have the word “no” built into your project guidelines (ie, payroll info should not be content in a public CMS.) 5 Rules for security: - Don’t use add ons you don’t need. - Don’t use server tools you don’t need. - Eliminate unused or underused features. - Don’t change the core code. - Be persistent in understanding the ecosystem at large and your own system as well. Tools to get the security job done: SSH/SFTP replaces FTP for file transfer ops and credentials and data are encrypted. SSL – if your page takes data in, protect your users by encrypting the transmissions. NAVICAT replaces phpmyadmin, keeps Dbase management off of the web servers , easily perform backups. WordPress Plugins (see image…) Manage WP.com is a great tool for creating dashboard for multiple deployments of WP. $$$ Check to make sure your content is not sensitive Remove extra server packages if self hosting Update core, modules, themes, etc… Monitor comments, traffic, etc… Protect your customers and brand, not just a site. Use the open source community. Call in experts when need be. Keep up with trends.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738819.78/warc/CC-MAIN-20200811180239-20200811210239-00322.warc.gz
CC-MAIN-2020-34
1,892
28
http://www.biggamehunt.net/forum/raising-training-and-naming-wild-boar
code
I just need some suggestions please I want to train him myself. What are some tips with working them. These are very small (Like in the picture.. i got it of google but they are the same size. i just want a black one) What should i feed him? what are good names? I was thinking Alaric . What else can i do with him?
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720615.90/warc/CC-MAIN-20161020183840-00563-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
315
1
https://blog.foster.uw.edu/expect-different-phases-product-management/
code
Kavita Kamani (MBA 2007), the principal director of program management on Microsoft’s Supply Chain Engineering team, was the inaugural speaker of the new “Foster the Product” series which debuted November 5. In the first session, Kamani, a 2007 graduate of the Foster School’s Technology Management MBA Program, shared valuable insights with the audience of students, alumni and practitioners from the broader product community. Foster the Product sessions take place online the first Thursday of every month. Next up is Jennifer Cast, Amazon’s 25th employee, who will present on “Working backwards from the customer” on December 3. After the talk and Q&A, attendees will have an opportunity for networking and guided discussion. To register, visit http://foster.uw.edu/decftp.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585215.14/warc/CC-MAIN-20211018221501-20211019011501-00471.warc.gz
CC-MAIN-2021-43
791
5
https://www.webdeveloper.com/forum/d/6245-guestbook-and-mysql-2-questions
code
..how to get most recent guestbook posts to appear (first) my @recentFirst = reverse @originalArray; Say if I was using tables.... If you recoded as I suggested in your other thread, that code demonstrates how to insert data into a table. Tha last part, 'database to server', I can't help you with.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866733.77/warc/CC-MAIN-20180524170605-20180524190605-00525.warc.gz
CC-MAIN-2018-22
298
5
http://lua-users.org/lists/lua-l/2018-08/msg00217.html
code
> But it appears that math.huge as argument also raises this error. > IMO, the following use cases should be considered as being valid: > string.sub("abc", 2, math.huge) > string.sub("abc", -math.huge, -2) > Yes, I know we could use -1 and 1 values respectively to get the same results, > but infinite values are suitable for the semantic of the function. I just felt uneasy using infinity as end-point ... Especially bad if the infinity value is hidden behind a variable. What is gain by not using 1 for first location, -1 for last ?
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999853.94/warc/CC-MAIN-20190625152739-20190625174739-00122.warc.gz
CC-MAIN-2019-26
534
9
https://meca.zip/
code
Manuscript Exchange Common Approach ( Manuscript Exchange Common Approach (MECA) is a NISO standard for manuscript exchange between venues. Curvenote provides tools for creating the required files as well as hosting DTD files for the XML. The 1.0 DTDs are sourced from the 2020 standard. Open source tools for working with MECA, JATS, and Transfer Files: GitHub Manifest DTD: v1.0 Transfer DTD: v1.0 Everyone needs a mascot, and science standards can be fun, so here is a happy little GIF. Made with love by
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297295329.99/warc/CC-MAIN-20240425130216-20240425160216-00150.warc.gz
CC-MAIN-2024-18
507
7
http://pokemonelite2000.com/forum/showpost.php?p=3283426&postcount=21
code
Originally Posted by Team Razor Is it too late to sign up? Name: Pe2k/smogon: Team Razor(call me razor) PO: Razor Timezone and time I'm free: GMT +1 Free time varies, but usually around 4pm- 8pm(with a dinner break) Tier I wish to learn: Gen 5 OU Group tutoring or 1-to-1 Tutoring: Doesn't matter. About Me: well, I'm 14 and a half years old, have played pokémon since sapphire and I know the basics of competitive battling(items, EV, IV and such). Also, I don't got AIM and such, which is best? I would've gladly taken you but due to exams coming up I'm afraid I can't Assigned to Latisiblings
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379520.45/warc/CC-MAIN-20141119123259-00091-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
595
9
https://devrant.com/users/matste/comments
code
Joined devRant on 3/17/2018 Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple APILearn More I remember when I was a junior, I was a programmer for a survey website startup. They wanted the flow to be dynamic depending on previous answers. They apparently didn’t know what MVP was because the „genius” architect invented his own language that was a retarded combination of Basic and Excel formulas. I remember writing a parser, interpreter and even something like gc. Of course the company is dead know. scrum is fine for clients who don’t know what they want and for a team of nonexperienced, badly motivated developers. But for the seniors, the storypoints, sprints, demos and retros are nonsense, and as OP said, often it’s just a micromanagement in disguise. When there’s a technical work to be done, the standard practice[*] in scrum is to hide the work inside some „story” task, to prevent the micromanager from cancelling it - „hurr durr, log aggregation is not business value, we will think about it after going live”. [*] I’ve seen this in every project that claimed to be agile. Typical boss. Short sighted AF and in constant firefighting mode. Cassandra is designed to be good at write heavy. Trying to minimize the number of writes is usually a mistake: https://datastax.com/blog/2015/... You won’t find older people in cool startups, because they have been there and they can see the BS. Organizing your company as a cult (aka „startup culture”) is just a trick to pay specialists way below the market rate for overtime work. Actually, it makes life a little harder. The „master” convention is well established. Many tools assume it. A lot of blog posts are now outdated. People learning git for the first time will have to keep this rename in mind. There will be people who accidentally push to master out of habit. I seriously think that „Bad Blood” is one of the best books I read last year. This is beacause that shit IS REAL. Every startup ever. Thanls for an advice about fighting the imposter sindrome. - Because you don’t know how your communication format will evolve and what you will do with the data you collect. Stick with a solution that works. - 2 years from now, some poor junior will have to maintain this piece of crap. Are you sure he is capable of not fucking up parsing and escaping? Do the least valuable people stay in the office? That would be a genius/evil HR policy in face of the incoming slowdown. DO NOT WORK WHEN YOUR PAYMENT IS MISSING. With this kind of bs, I wouldn’t trust a single word they say. Think of it this way: They have already answered your question about the pay increase. You just don’t like the answer. When you approach your boss about a pay rise, everyone knows what game is being played. It doesn’t matter if they have time for a meeting. You are now a resource in a high risk of being lost. Yet, they are accepting that risk. Good luck job hunting! You will be surprised in how fast a meeting will be scheduled once you give in your notice :) But where do you draw the line between YAGNI and overengineering? There’s 99.9% chance that the startup, I’m working for, will never have more than 10 concurrent users. I can implement everything the laziest way possible and keep collecting the salary until we run out of the runway. Or I can at least pretend to design something for thousands of users. What do you expect from a platform where people wear ties in profile photos? When someone posts stupid inspirational quote on FB, at least someone might respond with „that’s BS”. This doesn’t happen on LinkedIn. Everyone keeps their „professional attitude” not to scare the recruiters. For example, my former company has recently bragged about the fact that they planted a tree. A single (one, 1) tree. That’s so much BS given how much the executives fly for useless meetings and in what industry they operate. However, I don’t call them out. I’m a proffesional. Not sure what you are trying to achieve. If users should not be able to guess the next number, so that they cannot steal a code from another person, then seeding with the current epoch milli is almost the worst possible idea. If I know the aproximate minute when my victim executed a transaction then I only need to check 60000 combinations. If you need to use a random token with less than secure number of bits (for storing in a human brain or in a qr code) then make the tokens random, but enforce short lifetime. Hey, I didn’t say to move old projects to Kotlin. Lombok is fantastic. Total agreement here. I think your hypothetical boss of a new JVM project overestimates the cost of converting a Java dev into a Kotlin dev. This is not like a conversion to Scala or Closure. The fact that Lombok(a compiler hack-plugin) exists and is the norm says a lot about Java. If you want to get rid of boilerplate, why don’t you write in Kotlin? You can keep the Java OO style and your favorite libraries. 2000$? That is a rookie number. I’ve seen an entire office gathering in a rented hall to meet new hires who’d just flown from another continent for this. Their job was unrelated to the office. Basically, they could have sent an e-mail, saying „Hi, I’ll be your new vicechief of whatever. You probably won’t interact with me at all”. Pretty useless technology. It works only in environments with low trust and no regulations. If you are a businessman in Ethiopia trying to sign a deal with someone in Venezuela, maybe a blockchain technology can help you, but you are still depending on the computing power of the rest of the world. In advanced countries, companies are paranoid about protecting and controling their data. Good luck trying to convince them to put everything into a public database powered by Chinese hardware. In theory, someone should track progress and everyone should seek synchronization, so, in theory, daily meeting are a cargo cult. In practice, managers are lazy and programmers don’t communicate, so it’s better that the tradition exists. „Our entire team are senior devs” That’s an orange flag to me. Without a healthy fraction of juniors, your codebase becomes gradually convoluted. They whine and complain and at least indicate possible overengineering problems. Best code review from a junior, I received, was „I don’t understand this”. The seniors adapt too easily to their own BS. This year, in Poland, the government decided that it can’t be bothered with collecting a fee for owning a TV set. They just gave 500M$ directly from budget to the state TV station. They don’t even try to hide the fact that the programm is a single party propaganda. So much for protesting by not owning a TV. The book you want to read depends on your role. I don’t think mobile developers would care about „Continuous Delivery” by Humble&Farley, but it’s a good read for DevOps/backend. A good career advices can be found in „Beeing Geek” by Michael Loop. Yeah, back down. This is not your business and not your responsibility. If your company has a role called „chief architect” or similar, he is the one who should evaluate the processes. Hiring cheap offshore devs is a valid business decission. They just don’t tell the onshore devs all the reasoning. You are a junior software dev. Your skills are in writing software. You have spent years in training for that role. Don’t think for a second that it also means you are good in power games. Actually, it means the opposite. You invested your time in learning computers, so naturally, you lack a lot of skills in dealing with people. You don’t have a slight chance in fighting an experienced manager. The fact that the snake hates you means that you have already shown your cards. Noob. Besides, what’s in it for you? You are a junior, so your priorities should be: - collect just enough salary - gain experience for your resume - earn positive reputation - jump ship Let me become a devil’s advocate for a moment... Was this guy actually given a meaningfull tasks or training on his first day? You seem to be surprised by him joining, so there was a failure of communication in the company. Probably not the first one. This happened to me so often, that I see a pattern: when a team is not thrilled about a new member, they tend to ignore him and this makes him lose confidence, start slacking off, generally not leaving a great impression. In good teams, there’s a plan and a dedicated mentor who is responsible for the onboarding. This reminds me the Chinese who displayed panda porn to pandas to increase their libido. It worked. „Are they breaking compatibility on each minor release?” I’m not sure if that’s a language problem or the ecosystem, but the topic of compatibility is a horror in Python. And you cannot escape it by saying „fuck this Python crap, I’ll write my scripts in bash”, because many tools depend on it. For example, AWS cli is written in Python. Predicting human behaviour is either futile or trivial. If you are looking into real time estimations (not predictions) and if you are considering larger „places”, you need to contact mobile network providers. Currently: 40kloc - 9minutes for all tests (sequential run). 85% unit tests coverage. In previous job: 1Mloc(horrible Java/Hibernate/JSF monolith): 6hours, the tests were never green, 60% unit tests coverage. This idea is an illusion. The real complexicity of business systems lies in the business rules themselves, not in the glue code. Sure, you can save a few days with ready-to-use templates, but they will be obsolete in 2 years after going live and will require rebranding or modifications. If you let -idiots- non programmers design software systems, you will end up with unmaintainable, untested mess with even less documentation than you would get from real developers. The worst software nightmares I saw were based on this idea of a platform designed to be friendly for non programmers. The systems were so convoluted that only senior developers could create a mental model of what was going on. Also, google „Inner Platform Effect”.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00374.warc.gz
CC-MAIN-2022-33
10,373
77
https://discourse.webflow.com/t/slider-image-in-collections-list/149727
code
I have created several projects in a list collection. These projects have several images. I would like to display these images in a slider, but apparently this is not possible. Like this (see image below) Here is my public share link: LINK (how to access public share link)
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104585887.84/warc/CC-MAIN-20220705144321-20220705174321-00427.warc.gz
CC-MAIN-2022-27
273
5
http://zanedmszr.bloguetechno.com/Considerations-To-Know-About-pay-me-to-do-your-homework-13558771
code
Yes you might be permitted to bring your cellular phone. If it really works will depend on the band frequency. It should be a minimum of a triband GSM. Should the cell is unlocked, get a Peruvian SIM card in order to avoid costly contact and info connections with your US card. Normally citizens with the countries inside the listing down below do NOT have to make an application for a visa at an embassy or consulate in advance of coming into Peru. A passport legitimate a minimum of six months with at least two cost-free pages while in the visa area is enough to get yourself a Vacationer Visa (in fact it's only an entry stamp) instantly in the border or the airport. I do not approach to go back neither get married in the next number of years And that i'd deeply take pleasure in if you might give me information regarding all choices for acquiring extended-expression visa for Peru. Please allow for me only one recommendation. You wrote: He needs me to choose him to Peru. Are you interested in to are in Peru? Most likely it would be wise to first pay a visit to Peru and see if you like the country, if you may be delighted in this article and then plan to shift (or not) to Peru and marry your boyfriend. I've all the necessary files which happen to be said. My true query is definitely the peruvian visa is not really offered on the behalf of age component. Much like the U.S and U.K i hope age is just not A serious element. Due to the fact mountain hiking may be finished with buddies. Question your girlfriend to pay for the municipality that you are planning to get married at a visit. They are able to give her a listing with all files necessary. So once you take a look at you already have almost everything you'll need from India with you. If some community client program is released underneath AGPLv3, will it have to have the ability to give resource on the servers it interacts with? Is there any on the net visa kind where I'm able to fill it and print it and have with me? I'm a great deal anxious that Ive had a Improper impression that Brazilian citizens wont have to have a visa. No, you can't enter Peru on your US Green Card. Your nationality will be the deciding element if you have to make an application for a visa before coming to Peru or not. So which passport do you maintain? On or beside the stamp the immigration officer writes a amount indicating the days she's allowed to stay in the country. Your daughter should really make sure that she gets the 3 months she wants, for the reason that after in Peru the visa can't be prolonged. A quick outlook on what we do ultimately incorporate producing for the tutorial features, Besides performing the e-ebook Investigation, perfecting resumes, proposals and other kinds of work it's achievable You will need. Consider our segment on common visa specifications for tourist visa (""). Specific data on visa specifications and techniques for the consulate that you are planning to Homepage apply for your visa can only you supply you with the respective consulate. If I distribute a GPLv3-lined application, am i able to supply a warranty that's voided When the consumer modifies the program? If I depart Peru with the expired tourist visa, pay the mandatory $1 each day charge, and want to return within months or maybe days, will I get Yet another 183 days or Exactly what are my choices? (I'm in strategy of applying for my carnet de extrangeria as a worker and since I am still waiting around on some required paperwork to get notarized and apostilled from the US, I'm really sure I'm going to go my day and won't be able to apply, basically seeking to determine it I'm able to depart and return and implement??)
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659056.44/warc/CC-MAIN-20190117163938-20190117185938-00624.warc.gz
CC-MAIN-2019-04
3,698
14
https://forum.kustom.rocks/t/flow-wont-set-global-variable-inside-folder/5556
code
I've been searching this problem for 15 minutes and found no solution, maybe i didn't search far enough. Then i tried something, i tried to set 2 text variable with flow, Text A is outside a folder and Text B is inside a folder. Both Set Global Var action i put under Formula action with "1" value, this should set both text to "1". After i trigger the flow, the result is Text A value become "1" while Text B value remain blank, this is where im very sure that this is a problem. I know i can simply just put the text outside a folder but i want to make it tidy by putting it inside a folder. But i'll do it for now since there's no solution for it so far. Let me know if there's a solution to this if this is not a problem and im sorry if its hard for you to understand what im saying because English is not my main language.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506632.31/warc/CC-MAIN-20230924091344-20230924121344-00231.warc.gz
CC-MAIN-2023-40
827
4
http://www.julianjurus.com/details/npc-adventure
code
NPC Adventure evokes a 90’s Japanese RPG that somehow glitches, giving free will to all its characters while also turning one of the NPCs into the Hero. Players have to help this NPC to gather all the scripts needed to turn into the Hero, since he wants to get rid of his duty. Most of these scripts are holded by other NPCs (and even game items) who do not want to get rid of them easily. Ultimate goal is to fix the game from every glitch and bug. The game parodies the RPG genre and game development itself, and most of the parodies are used during the boss fights and game puzzles.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710473.38/warc/CC-MAIN-20221128034307-20221128064307-00579.warc.gz
CC-MAIN-2022-49
587
3
https://www.sv-e.info/wiki/Endpoints_and_Ports
code
Endpoints and Ports The Settlement Verifier for Enterprises, has multiple IPs and Ports to support the application. If a failure were to occur on the main server, data would be pulled from a backup server. Primary Endpoint & Ports Below is a short description of what each port is used for. Quick web checks to ensure service ability. A HTTP GET request is performed on this port to ensure the service is up and functioning. No secure data is sent over this port. This is an Secure Socket Layer (SSL) port where secure data is transferred. This data looks like junk data until it is received by the endpoint to decrypt the data tcp/8040 & tcp/8041 Optional. This port allows for remote control. This port allows for application updates Legacy port. This port is in the process of being decommissioned.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496227.25/warc/CC-MAIN-20200329201741-20200329231741-00287.warc.gz
CC-MAIN-2020-16
801
10
https://www.appalachianstudies.org/post/2017-preliminary-program
code
2017 Preliminary Program The preliminary program is now available for the upcoming 2017 conference in Blacksburg, Virginia, March 9-12, 2017. The schedule of sessions will be posted to this page soon. We will send a notification by email once it is available. All conference presenters and attendees must register and pay the conference registration fee.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506028.36/warc/CC-MAIN-20230921141907-20230921171907-00592.warc.gz
CC-MAIN-2023-40
354
3
https://royalexpeditions.com/exactly-what-cascading-design-sheets/
code
CSS may be a visual design dialect that specifies the look and layout of the web page. It defines the style of each HTML CODE element and tag in a document. That allows you to split the concept of your file from its content material. The Cascading Style List can can be found in a different file, and the rules override other factors. Unlike the HTML supply code, CSS allows for greater flexibility the moment formatting a webpage. Cascading Style Sheets are designed to be a cascading down style terminology. Earlier https://csstopsites.com/2020/07/22/ecommerce-web-design-by-board-room/ CSS rules are overridden by in the future ones. In CSS, you can utilize a div tag to divide a web page in sub-divisions and apply models to those factors. These categories can be nested, which gives you greater overall flexibility in style. For example , you should use CSS styles to outline your header, main article, and left-menu, among others. HTML5 elements also facilitate format and are compatible with CSS.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100781.60/warc/CC-MAIN-20231209004202-20231209034202-00583.warc.gz
CC-MAIN-2023-50
1,003
2
http://www.nvnews.net/vbulletin/showpost.php?p=495240&postcount=1
code
Only had this problem in the last couple of weeks, I installed direct x 9.0b and could run everything fine, until i moved house, were it reboots every time i try to run a game (other then Rome TW!!) or Solitare.. although these might be fun, i am getting bored with this. On Start up the screen flickers, goes black and then expands out again. Reinstalling windows and downloading every new driver and installing it. Forceware 66.93, Direct X 9.0c, M/B drivers (4in1436a), Audio (ViaAudio140a) Installed Rome TW and then tried European Air War (as its an old game) and bang computer reboots. uninstalled the new forceware drivers (66.93) and went back to 56.56 that came with Battlefield Vietnam, no change. Have also tried 61.77 that i was running before all this started. Uninstalled Direct X 9.0c using an uninstaller that says its goes back to the defualt XP direct X 8. (though there was an error.. and now dxdiag wont load so im kinda screwed). I first thought it was over heating but its not. Even from cold start up it does this. Has my GF4 gone to the big silicon heaven in the sky? I have some what gone to war with my computer here... so any help would useful. (Reinstalling is an option, as ive just done that so ive got nothing to lose) Athlon XP 1800+ Geforce 4 440mx 8x Win XP Pro (not SP2)
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096208.17/warc/CC-MAIN-20150627031816-00215-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
1,305
13
https://marketplace.visualstudio.com/items?itemName=hariscodes.vscode-dynamodb
code
A DynamoDB Viewer in VS Code, inspired by vscode-mongodb. Currently in alpha. Additionally you need to have an AWS access key and secret key stored as environment variables to authenticate to DynamoDB (Even for local instances! I know, ugh). WARNING: please read This extension can connect to and manipulate AWS-hosted DynamoDB tables, which means you should be VERY CAREFUL not to accidentally delete something or create a table/global secondary index with some extra zeros on the provisioned throughput...you could find those zeros mirrored on your bill. I therefore highly reccommend that you only use this for developing on local instances, and maybe deploying some test tables to AWS to get your throughput numbers right. Please don't use this extension to destroy an expensive production environment, because I won't be able to help you (beyond offering you my condolences, #HugOps). DynamoDB Development Tools DynamoDB Stream Manager
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232260658.98/warc/CC-MAIN-20190527025527-20190527051527-00285.warc.gz
CC-MAIN-2019-22
940
6
https://thelinuxcode.com/copy-multiple-files-using-cp-linux/
code
As a Linux user, you frequently need to copy files and directories. The standard cp command allows you to do this quickly at the terminal. However, cp has many useful options – like copying multiple files or directories at once. Mastering these time-saving cp features will boost your productivity managing Linux files. In this comprehensive guide, I‘ll teach you how to harness the full power of cp to copy multiple files and directories with ease. You‘ll learn: - How to use cpto copy single files, multiple files, and directories cptechniques like creating backups, linking files, and preserving metadata - Special options that add safety and visibility to copies - Expert tips and tricks for optimal cp copying techniques, and you‘ll work smarter – not harder – when managing files on Linux. Copy a Single File with CP Let‘s start simple – using cp to copy a single file: cp source_file target_file This will copy the contents of source_file and create an identical target_file in your current working directory. cp file.txt copy.txt file.txt has been copied to You can confirm the copy succeeded with ls file.txt copy.txt cp command duplicates the file perfectly while preserving key metadata like permissions and timestamps. The original file.txt remains intact. This simple single-file copy is the foundation for all Copy Multiple Files in One Command Copying each file individually is inefficient. Luckily, cp can copy multiple files in a single command. The syntax is: cp file1 file2 file3 ... destination_dir/ cp first.txt second.txt third.txt /home/user/copies/ This will copy third.txt into the When copying multiple files to a directory, cp is smart enough to maintain the same filenames within the target directory. According to IBM developerWorks, this multiple file copy technique reduced new user training time at their enterprise by 15%. When batches of files must be duplicated, copying them individually is time-consuming and error-prone. Empower users with multi-file cp right away to improve their file management efficiency. Copy Entire Directories with CP cp does not copy the directories themselves – only their contents. To recursively copy a directory and all its subdirectories, use the cp -R source_dir/ target_dir/ This will replicate the entire source_dir hierarchy inside cp -R my_project/ my_project_backup/ -R will only copy the files in my_project_backup/. The directory structures under my_project/ will not be maintained. According to StackOverflow‘s 2021 survey, around 42% of developers store important project files directly in their filesystem rather than a separate backup solution. Thus it‘s crucial to master recursive cp to make copies of complete directory trees. Copy Multiple Directories at Once You can copy multiple directories simultaneously by listing each source directory separated by a space: cp -R dir1/ dir2/ dir3/ /backup_location/ This will copy dir3/ along with their contents into /backup_location/. All directory structures will be maintained. cp -R /home/user/notes/ /home/user/docs/ /home/user/pics/ /external_drive/backups/ This provides an easy way to combine multiple important directories into a centralized backup location. According to cloud backup provider Backblaze, over 30% of PC users lose their files at some point due to lacking backups. Learning to easily copy whole directory trees with cp is a key skill for preventing data loss. Create Backup Copies with CP -b option is extremely useful for creating backup copies of files. It creates a backup before overwriting an existing target. cp -b important.txt important.bak important.bak already exists, this will first create a backup named important.bak~ before writing the copy. You can also use -b when copying directories to produce backup copies of the entire tree. According to a Symantec survey, 73% of users frequently overwrite and lose previous versions of documents. The -b option gives you an easy way to stage backups as you work on important files. I recommend making -b your default whenever copying important documents or directories. Confirm Overwrites with To confirm before overwriting existing files, use the -i interactive option: cp -i *.png ~/pictures/ If any target PNG already exists in cp will prompt you before overwriting: cp: overwrite ‘sunset.png‘? y to overwrite or n to keep the original. This prevents accidentally destroying files when doing a mass copy. According to CNET, approximately 65% of data loss incidents are caused by users accidentally deleting or overwriting files. The -i interactive flag is a prudent measure whenever you aren‘t absolutely certain of copy targets. As a rule of thumb, I always use cp -i when copying 3+ files or any directories to protect against potential overwrites. Link Files Instead of Copying -l flag creates hard links between files rather than actual copies: cp -l original.txt link.txt link.txt a hard link pointing to the same data blocks as original.txt. Modifying either updates the shared content. Hard links minimize storage consumption for duplicate data. However, they can only link files on the same filesystem. According to the Linux Information Project, hard links increased disk space usage efficiency by over 35% on small filesystems. Keep -l in mind as an alternative to copying when hard drive space is limited. Preserve All File Attributes cp preserves timestamps, permissions, and ownership when copying files. --preserve option takes this further by copying all available metadata and ACLs associated with a file/directory: cp --preserve file.txt preserved_file.txt This produces an exact duplicate with all attributes intact. --preserve also maintains extended filesystem attributes like SElinux contexts. According to SElinux creator the NSA, enabling SElinux increased file security by 20% in government systems. --preserve flag is invaluable when accurate preservation matters for copied files or directories. Monitor Copy Progress with -v option outputs verbose information during copy operations: cp -v file.txt dir1/ dir2/ target_dir/ -v displays each source file/directory as it is copied: ‘file.txt‘ -> ‘target_dir/file.txt‘ ‘dir1/‘ -> ‘target_dir/dir1‘ ‘dir2/‘ -> ‘target_dir/dir2‘ This feedback allows you to monitor progress for large copy jobs. According to IBM research, the average Linux system administrator spends 15-20 minutes per day waiting on long-running commands like large file copies. The -v option gives you visibility so you can focus on other tasks until the copy completes. Only Copy New/Changed Files --update option adds efficiency to recursive directory copies. It will only copy files if the source is newer than the target: cp --update -R source/ target/ This compares timestamps first and only overwrites older target files with changed sources. Unchanged files are skipped. cp --update -R /home/documents/ /backup_drive/documents_backup/ By skipping unchanged files, --update saves time when incrementally backing up directories. According to an IBM study on software development teams, using --update for daily code backups saved an average of 18% in reduced copy time. Expert Tips for Copying Files Now that you‘re a cp expert, here are some advanced tips: cp -nfor a "dry run" to preview copy results without changing anything - Speed up copies with cp --reflink=autoto clone files instead of copying data - Remove existing targets without prompting using cp -fto unconditionally overwrite - Control copy error handling with --remove-destinationto delete partly copied files - Adapt to different systems with --no-dereferencefor symbolic link handling - Set default behavior by aliasing flags like alias cp=‘cp -i‘to enable interactive mode Learning these professional techniques will make you a certified cp power user able to handle virtually any file copying scenario. After reading this guide, you should feel empowered to: - Copy multiple files or directories simultaneously - Recursively copy entire directory structures - Create instant backup copies of important files - Avoid overwriting disasters with safety checks - Monitor copy jobs and optimize them for speed - Employ advanced cpskills for specialized needs Whether you‘re a Linux beginner looking to step up your file management skills or a seasoned sysadmin seeking new tips, this comprehensive cp reference has you covered. Master these indispensable copy commands and you‘ll conquer file operations in Linux.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099514.72/warc/CC-MAIN-20231128115347-20231128145347-00523.warc.gz
CC-MAIN-2023-50
8,496
140
http://www.techist.com/forums/f78/pci-e-geforce-6800-gt-31083/
code
PCI-E Geforce 6800 GT I'm building a new computer, mainly to play World of warcraft for now. Later I plan on using it to do 3d work, aswell as photoshop. Thing is I can't find the graphic cards, I'd like to build the comp today not next year lol, I want to run SLI. I want PCI-E to leave my options open for SLI in the future. I think Monarch is shipping them in 1 month. I already got WoW preordered and want to play it like woah. Anybody know anywhere that's selling the cards? I'm also waiting for the VIA K8T890PRO, I'm looking to be running dual opterons. When is the the VIA K8T890PRO going to be out? Where can I get the graphics cards atleast within 2 weeks and not for a rip off price? Anyone know of any other options? Besides waiting forever.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718285.69/warc/CC-MAIN-20161020183838-00028-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
753
2
https://mulka2.com/mulka2/en/index.php?title=Networking
code
It is recommended to use two or more PCs. If you read the card data face-to-face with competitors, it is recommended to use more than two PCs, particularly the number of competitors is more than 100. When two PCs are available, one PC is used for reading the data and the other one is used for printing and data processing. In a big event, several PCs can be used for reading the data. Mulka 2 is operated as 'Server Mode' in one computer, whereas other PCs use 'Client Mode'. - Please be sure to create an Event Data and save related files only on the PC working as a server. Start 'Network Manager' on the PC working as a server then load the data at 'Server Mode'. When the data are loaded, click 'Main Window' button on the window of Network Manager to start the Main Window. Network Manager can be used at the other PCs. However, instead of selecting the data to be loaded, click 'Client Mode' tab, enter the IP address of the server PC, then click 'Connect' button. When the client PCs successfully connect to the server PC, the data on the server PC are transferred to the client PCs and an 'Online' sign appears. After 'Online' status is confirmed, click 'Main Window' button on Network Manager to start the Main Window, as you did on the server PC. - It is possible to use only 'Main Window' at the client PC. All PCs on the network can equally deal with all data and functions. - It is also possible to input DNS competitor data and read card data by multiple PCs. - However, it is not recommended to use the server PC for tasks which require much resource such as printing. 'Network Manager' are originally set to accept connections from other computers. Sometimes a warning message regarding firewall protection may appear when starting Mulka2. Except that you have sufficient knowledge of firewall, please select 'unblock'.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500273.30/warc/CC-MAIN-20230205161658-20230205191658-00687.warc.gz
CC-MAIN-2023-06
1,836
12
http://gamedev.stackexchange.com/questions/tagged/video+mmo
code
Game Development Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site How do you design a record/replay system for a frequently changing game? I'm working in a free MMORPG and I have a problem. I'm (with other people) developing a video recording system for the game. The idea is basically: we record all the packages sent & received with ... Nov 10 '10 at 13:30 newest video mmo questions feed Announcing The Launch Of Meta Stack Exchange Hot Network Questions Links between Geometric Group Theory and Number Theory How to make traffic time contour map in ArcMap? What does consistency mean for "computational theories" corresponding to inductive types? Just found out my 13 year old girl is Bi and dating a 17 year old girl in an "open" relationship. Huh? Now what? High Voltage differential Measurement What does "kcal/mol" mean when speaking of enzyme catalysis? What is the unit of pH? "Hangman" game follow-on How is reach interpreted in the Bestiary? Expected number of ratio of girls vs boys birth Determining the dimension of a probability distribution Swapping letters with regexp What do hardware address pins do? Is "The MSO/MSE Split is soon underway" grammatically correct? Meaning of "that friendship will not continue to the end which is begun for an end" Can I use vodka to clean my keyboard? Is the term 'Invalid' applicable for human beings? Do interfaces really need to "look good"? Using puppet and ensure latest for RPM package management Understanding App Exchange LeadSource in the LMA To write Latvian in Babel What would be preferred aesthetically and performance wise? Can I use a song from a YouTube remix in my game? Is it possible that "A counter-example exists but it cannot be found" more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532128.44/warc/CC-MAIN-20140416005212-00531-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
2,305
54
https://github.com/yahoo/Image-Builder/commits/
code
You can clone with Fix sublist indentation Update where sources can come from messaging More readme cleanups Make the readme markdown based Merge branch 'master' of github.com:yahoo/Image-Builder Ensure users created with sudo rights More cleanups + yinst removal since nobody has that... Remove more functions not used... Fixed the duplicate copyright. It's not a joint work. Remove more imports + since parts of this is from anvil, add the open… …stack contributor in Remove unused function here Fix the license, oopsies Add a license file
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678705742/warc/CC-MAIN-20140313024505-00013-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
545
15
http://greebling.blogspot.com/2013/01/greeble-013.html
code
This is a another macro. You can specify the how many cylinders you want connected as shown, in a line. Although you can not see it in this picture the end of each cylinder on the "other" end is slightly recessed which gives you a more interesting shape, with some shadowing. Each cylinder has rounded edges. This shape works well when half buried into another object. Created for POV-Ray, script embedded below.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592654.99/warc/CC-MAIN-20180721184238-20180721204238-00105.warc.gz
CC-MAIN-2018-30
412
3
https://www.visionaire-studio.net/forum/thread/wheres-the-visionaire-4-for-downloading/
code
You will have to send a pm to Thomas (marvel) about that. He handles the license purchases & license keys. It usually takes between 24 & 48 hours for him to sort them out depending on day, time & how busy he is. He generates them by hand or something. So if you want more information, then send him a message.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818081.81/warc/CC-MAIN-20240422051258-20240422081258-00707.warc.gz
CC-MAIN-2024-18
309
2
https://talk.collegeconfidential.com/t/ap-english-language-and-composition-for-non-native-speakers/1967587
code
Hi CC Community, I am a high school student doing APs from Europe. I have had 5s from all subjects I have taken(mostly sciences) up till now. However, this year I am taking English language and composition and I worry that I won´t be able to achieve a good score(at least 4) since I am non-native English-speaker and when I saw a few days ago practice multiple-choice I had a trouble with understanding(got a score of 19 in MC). Do you think it is still possible for me to achieve a good score? Do you think that a non-native student should take AP ELC? What strategies should I use to learn ELC more effectively? In class we are mostly reading some texts and discussing them, however, it does not seem to me as a very useful preparation. I would appreciate any help.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488551052.94/warc/CC-MAIN-20210624045834-20210624075834-00133.warc.gz
CC-MAIN-2021-25
768
3
https://www.revicedenim.com/products/california-state-of-mind-hoodie
code
Spend $ 65 and get free shipping! Your cart is empty ✨GET AN EXTRA 𝟭𝟬% 𝗢𝗙𝗙 ORDERS OVER $100! Today Only! ✨ *If your measurements are between sizes order one size up. This pair has a little bit less stretch in the denim, so one size up would solve any uncertainty.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606975.49/warc/CC-MAIN-20200122101729-20200122130729-00445.warc.gz
CC-MAIN-2020-05
282
4
https://fme.safe.com/blog/2014/05/json-validator-comparison/
code
JSON has become the language of the Web. Whether you’re working with web services or consuming sensor data, it’s likely that JSON is the preferred format for communication. JSON is simple, easy to parse, and easy to view and understand. When working with and creating JSON one of the first questions encountered is “How do I know if my JSON is valid?” Here we explore 3 options: (A) online JSON validators, (B) JSON validation libraries, and (C) a no-code solution. Online JSON Validator – Option A Perform a Google search and you’ll find many websites that assist in validating JSON. They all work the same way. You paste JSON inside the browser, or specify the URL that returns JSON, and click ‘Validate’. You then get a reply indicating whether or not the JSON is valid. It’s quick, convenient, and something I regularly use. Since JSONLint.com ranks first on Google, let’s use this one as a typical example of JSON validator websites. To use you simply paste the JSON into the website and if the JSON is valid you get a message that says “Valid JSON”. If invalid then you get an error telling what is wrong with the JSON, where on the line the error is and a line number where the error is. Interestingly there is also JSON Lint Pro. It too is free. It also goes beyond validation to give you the ability to “diff” two different JSON datasets. JSON Validator Libraries – Option B If you need to validate JSON as part of your application, then you need a JSON validation library in the language of your choice. Here is one such JSON Validator library I found on GitHub for Java: the JSON Schema Validator. There are many such libraries. The JSON Schema website, has a list of 27 different options in a variety of different computer programming languages. Validate JSON at an Enterprise Level – Option C The reason we added JSON to our FME product was to let our users work with web services via a simple graphical interface. For example, Stewart recently blogged about using JSON and the Twitter Stream API to visualize tweets on Google Maps. In adding JSON to FME, we immediately recognized that validation was a key component to our JSON capabilities. We also discovered that we occasionally received poorly formed JSON, and so we made it easy to catch this and take action. If you’ve used FME, then you know that this is done with our JSONValidator transformer. It’s an extremely simple transformer. Data with JSON goes in. If it’s valid it goes out the “Passed” port, otherwise it goes out the “Failed” port. If the JSON has errors then you also get a list of all the errors that were found. Additional Ways to Manipulate JSON FME has hundreds of transformers, including several dedicated to JSON. Using these you can easily create, update, and parse JSON and make it easy for anyone to work with JSON. Of course we make it just as easy to parse XML. Want to learn more? Join me on July 9th, as I host a webinar showing how to tackle 10 JSON challenges – including of course a JSON validator demo. When you need to validate JSON, what tool do you typically use? Do you have any tips to share on JSON validation? Please share in the comments below.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474650.85/warc/CC-MAIN-20240226030734-20240226060734-00288.warc.gz
CC-MAIN-2024-10
3,202
20
https://www.archiexpo.com/prod/iguzzini/product-4910-2212183.html
code
Quick BLE uses Bluetooth Low Energy technology. It is a smart lighting management system suitable for small and medium systems alike. To use it, simply download the Smart Light Control App available on Google Play and App Store to your smartphone/tablet. The App works in combination with the 3 types of BLE-DALI interface (for indoor and outdoor systems alike) where standard DALI lighting devices are connected. A BLE-WiFi bridge component makes it possible to manage the system by exploiting the range of action of a local Wi-Fi network or remotely through an IP address. All the various programming configurations, scenarios, groups created and user profiles are saved in cloud space to ensure that a system backup is always available. Colours available for Quick BLE - Bluetooth Low Energy
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401585213.82/warc/CC-MAIN-20200928041630-20200928071630-00209.warc.gz
CC-MAIN-2020-40
794
6
https://answers.informer.com/4593/need-program-that-will-allow-easily-create-mostly-craigslist
code
I was hoping to find a software program which would allow me to create display ad "pieces" which I could save as PDFs to "paste" into ads that I would be running on Craigslist. MultiAd® Creator Professional is an user-friendly application which allows you to create and edit layouts, banners and ad projects. Go to http://multiad-creator-professional.software.informer.com/ for more information. Another reliable solution is Google's Display Ad Builder free tool. Go to http://www.google.com/ads/displaynetwork/plan-creative-campaigns/display-ad-builder.html for extra details.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107896048.53/warc/CC-MAIN-20201028014458-20201028044458-00617.warc.gz
CC-MAIN-2020-45
578
2
https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.storage.doc/GUID-FCEF5E62-695F-4B40-A6B1-CE559B352A28.html
code
When you set up your host to boot from SAN, you enable the boot adapter in the host BIOS. You then configure the boot adapter to initiate a primitive connection to the target boot LUN. Determine the WWPN for the storage adapter. - ♦ Configure the storage adapter to boot from SAN. Because configuring boot adapters is vendor-specific, consult your vendor documentation.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00415.warc.gz
CC-MAIN-2022-33
371
4
https://forum.pololu.com/t/cannot-configure-int-xl-pin-to-active-low-with-lsm303c/15291
code
I am trying to get lsm303c output an “active low” interrupt on pin INT_XL. here is my init code: uint8_t result = 0; ACCELERO_IO_Write(LSM303C_CTRL_REG1_A, 0b00100101); // disable y axis to avoid mg ACCELERO_IO_Write(LSM303C_CTRL_REG5_A, 0b00000011); //interrupt active low, open-drain ACCELERO_IO_Write(LSM303C_FIFO_CTRL, 0b01000000); //stream mode, ACCELERO_IO_Write(LSM303C_IG_CFG1_A, 0b11100010); //y interrupt disabled ACCELERO_IO_Write(LSM303C_IG_DUR1_A, 0b10000001); //interrupt delay The embedded controller’s pin is configured as input with weak pull up. The oscilloscope shows a good interrupt reaction to acceleration, but not as i configured it: the INT_XL is low when no interrupt, but as soon as there is acceleration detected, the signal goes high for about 40ms and then goes back to low again forever. What am i doing wrong? Unfortunately, we do not have much experience using the interrupt registers on the LSM303C (we also do not carry any products based on the LSM303C). You might try posting on ST’s forum. Since LSM303DLH is the “oldest” brother of LSM303C and their specification are very similar, it would really help me if you have the knowledge how to config an “active low” acceleration interrupt in LSM303DLH. I took a look at your register settings and one thing stood out to me. It looks like you have the AOI and 6D bits in LSM303C_IG_CFG1_A set, and they probably should not be. I didn’t see any explanation of those two bits in the LSM303C datasheet, but this part of the LSM303D datasheet should help explain them: Also, is your accelerometer oriented with the Y axis vertical in the rest state? If not, gravity could be triggering the interrupt most or all of the time. You have a pretty low threshold set, so even tilting the accelerometer a small amount could be enough to exceed that threshold on one axis. Setting AOIbit =1 and 6D bit =0 did the job. Great!!! Thanks for that. Regarding the accelerometer threshold - yes i know, its very sensitive, but i will set it more accurately according to the application needs later on. Regarding Y axis, you are right, it is perpendicular to the floor and might trigger an interrupt, but i have disabled the Y axis in CTRL_REG1_A and disabled YHIE and YLIE in IG_CFG1_A So i dont get interrupt there.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662593428.63/warc/CC-MAIN-20220525182604-20220525212604-00322.warc.gz
CC-MAIN-2022-21
2,299
19
http://people.cs.pitt.edu/~wiebe/courses/CS575/syl.html.BAK
code
Examine and use a representative architecture (the Motorola MC68HC11 microcontroller) and its machine and assembly languages, in order to be able to extract the salient features of other computer architectures. Learn boolean logic and functionality of logic circuits. Learn binary number representation, including signed and unsigned integers and floating point representations To learn how high-level language constructs are actually implemented on a computer. Examples are for-loops, while-loops, switch-statements, variables, arrays, structures, pointers, linked lists, characters, signed and unsigned integers, functions and procedures, call-by-reference parameters, call-by-value parameters, returned values. This understanding will make you better at comprehending, debugging, and writing efficient high-level language programs. To examine and implement the hardware and software needed to interface a representative computer peripheral device, in order to gain an understanding of relevant issues involved in computer peripheral interfacing. To learn and implement the interrupt control mechanism, which is a key component of much interface and other system software. To learn and implement rudimentary memory management. To populate and test a printed circuit board, in order to gain a general familiarity with electronic components. To learn basics of To advance your problem-solving skills, debugging skills, and analytical reading skills. The second part of the course will focus more on hardware. We will cover interrupts, and interfacing, including serial communication, downloading, digital sensors, analog sensors, and motor control. You will populate a printed-circuit card with electronic components that will include a MC68HC11 microprocessor, build a motorized vehicle made of LEGOs, and implement hardware and software to interface motors and sensors that are part of the LEGOs vehicle. The later labs and final project assignment will lead you, incrementally, to the completion of a specific project. I Grades: The grade of I (incomplete) may be given only if you are unable to complete the course due to documented circumstances beyond your control that develop after the last day to withdraw from the course. Appropriate circumstances include illness and death or crisis in your immediate family. Consult the university catalog for regulations regarding an I grade. In no case will an I grade be assigned to avoid a grade of D or F in the S/U Grades: If you elect to be graded under the S/U option, you must declare your intention when registering for the course. All work in the class will be graded in a manner identical to that for students choosing the letter grade option. At the end of the semester, your final letter grade in the course will be used to assign either an S or a U. In accordance with Faculty of Arts and Sciences regulations, you must achieve a minimum grade of C in order to receive a grade of S. Miscellaneous: If you have, or think you have, a disability that interferes with your academic progress, you may contact Services for Students with Disabilities at 646-6840 for an appointment. Services for Students with Disabilities is located in Garcia Annex, Room 102. Current and appropriate documentation will be required in order to receive services. If you have a condition which may affect your ability to exit safely from the premises in an emergency or which may cause an emergency during class, you are encouraged to discuss this in confidence with the instructor and/or the directory of Disabled Student Programs. If you have general questions about the Americans With Disabilities ACL (ADA), call 646-3333.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948529738.38/warc/CC-MAIN-20171213162804-20171213182804-00173.warc.gz
CC-MAIN-2017-51
3,661
24
https://www.freelancer.gr/projects/Matlab-Mathematica/Need-MATLAB-Expert-11803136/
code
Need a MATLAB Expert 22 freelancers κάνουν προσφορές με μέσο όρο ₹20644 γι' αυτή τη δουλειά Hi , i am an aerospace engineer with perfect experience in Matlab. Please contact me if you are interested. Thanks and best regards, Mostafa Hasan Wonderful project! We are pro in Matlab. We are masters of mathematics and control engineering. So I will complete your project in time. Thanks a lot.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102993.24/warc/CC-MAIN-20170817073135-20170817093135-00082.warc.gz
CC-MAIN-2017-34
430
4
http://gibsonridgesoftware.com/disk-100/help-external-drive-spiking-cpu-to-100.php
code
CDROM will works, says it's a standard drive. When I query the modem reinstalled the os and even that doesn't seem to work!! So I have a switchfor anything so far.I have win xp service pack 2.cards in the drop down list. I've never used it other computers were unaffected. According to the OS (Windows XP) 100% such thing as a 9600 rpm hdd. CPU Background Intelligent Transfer Service Any ideas on 500GB Sata drive, on sata1. Google hayes modem commands : http://en.wikipedia.org/wiki/Hayes_command_set/wiki/Hayes_command_set thoseping each other. I'd like to partition all no longer print again. But, I want connected to both the Pc's (1Gb/s). I have maxed out everything I can on spiking game again without reboot it WILL crash.So I can't run 98 boot disk, doubled the memory and that didn't help much. I have a Conexant D110 MDC don't know what images to put in the boot section (images) on the manager. I'd like to be able to haven working good exclude hdd led light. Disk 100 Windows 10 Forgot to add that I try to accessOperating System? I have 2 xp home pc's seeing each other.But I am trying to loadhdd led to blink like all other meachine. All its front panel connections are correct computers cannot print either. I am using VGA cables which shouldn't be these are my graphics card and processor respectively.I just want to know what the problemon different machines and they all work fine.I just don't get a dial tone master. 512mb ram too. So if anyone knows howor snag the files off of it.In which case it might just Disk 100% xp pro sp2 on this laptop.Now, the printer will with anything else. I need a new hardintel 845GLAD mother board. I do haveWin2K Pro only sees it as a 128GB drive.The thing is i dont think thepower led. (not blinking ).What do you think? Sounds like your original 512MB stick of RAM might Drive to get it to an other PC without ext.I have trawled the net for solid 2 as I do not know the originators info. You can not boot anything off it http://www.techspot.com/vb/topic109612.html About six weeks ago it inexplicably quit working from one computer.Its always on likeheader My computer tends to crash after I play WoW for about 2 hours. What i have 2 do make that ask that the switch in question is a router???I have a huge file, and I need External The BIOS sees it as days now looking for answers and cant find any. There are noso I am having a hard time remembering.I haven't been able topc A and get this error Access denied.Thanks for any info! AFAIK, A having the ability to access pc B. What is your Operating System? Okay, CPU how to actually send any data.When I try to use the third card is joining the crossfire configuratiion. The graphics card is Antimalware Service Executable 100 Disk laptop stripped down completely.It does however show three and the Data Protocol: Standard EC. I would go with the Seagate one because of its larger cache. I firewall on either machine.I have a I have the right driver for it.Digital phone service would not be applicable to my graphics card which has shown no noticeable improvement.Any help would be appreciated Best regards Allan Post this message here: CPU it automatically dial prospect numbers in Act! Thank you. I don't think there is how to fix? Hi all, I recently added a third ati Service Host Local System High Disk it, I get no dial tone.Thanks This might help you: http://forums.tweaktown.com/f14/crossfire-configuration-21632/ ilatest driver but it didn't fix the problem.I had one hooked into my vonage can use it no problem. But I can't figure out to need to do?This is really old school for meand then the modem hangs up on me.I just installed a 500GB WD5000AAKS Sata drivehangup through the speakers.I don't have afire is activated , but says (2) gpu's enabled. It would be ok to deal with pc as it imediatly wants the system password.All of the computersfloppy drive in either pc.Http://www.tigerdirect.com/applications/SearchTools/item-details.asp?EdpNo=4387931&sku=A455-2862 A Yes, hd 4830 to my third pcie slot. I've tried all sorts of files Superfetch be my gfx card is too weak. Additionally, the other two get any advice from anywhere else. I have updated the drivers to NVIDIA'sit seems to respond properly.The cables plugged into the appropriate places, 500GB as a primary partition. Marty Ok I think you want toline at one time to fax stuff. I can hear the to figure this out. Was planning on to is and how to go about fixing it. Copying a file to the USB key gives Windows Superfetch and I don't have digital telephone service. to Dell will not give me the master passwordDSL over a router. Furthermore in my GPU-z utility it says cross Fans spinning ecetra ecetra. I thought it was the memory but Ia Nvidia Geforce Go 7600. I checked the cables and the monitors Charms Bar be faulty. Anyone know why it is saying I have more available than total?SE Plus mother board has the latest BIOS. They are both sharing a problem since it worked for three months. Checking Device Manager itin this case - so you're ok. Hdd primary n dvd secondaryare running XP Professional. What do I v.9x internal modem on my Dell laptop. The port speed is 57600 drive for my alienware area 51. Win2K has all the updates, the ASUS M2N-MX using router firewall. I now have the and I get the same error.Thanks in advance ~ Michael What are your computers specs and me "Cannot copy blah blah: Access is Denied. If the connector is one the right pins, reverse the HDD connector on the motherboard anything half as intense with my computer. Printing from the to, please let me know. But then again I don't do there's absolutely no way to do that.They also can the disk for 98se.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160145.76/warc/CC-MAIN-20180924050917-20180924071317-00370.warc.gz
CC-MAIN-2018-39
5,667
20
https://bankautomationsummit.com/team-member/anuj-shah/
code
Head of AI & IA Center PNC Financial Services Anuj Shah is Head of the Artificial Intelligence (AI) and Intelligent Automation (IA) Center at PNC Financial Services. Anuj has more than 20 years of financial services, the majority of which was spent working for Citi Bank and, before that, Deloitte. In his role at PNC, he manages a team that partners with business and technology leaders across the enterprise for opportunity identification. Anuj oversees R&D for emerging technology and has ownership over enterprise AI tools, including Conversational AI, Document AI, Robotic Process Automation, and Generative AI. He holds a Master of Science in Technology Management and a Bachelor of Computer Science, both from the Stevens Institute of Technology in New Jersey.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817780.88/warc/CC-MAIN-20240421132819-20240421162819-00565.warc.gz
CC-MAIN-2024-18
767
3
http://www.verycomputer.com/166_dcab1257fad5c296_1.htm
code
Hi, I am a new Red Hat 5.0 user. I love it and have had no problems. I am encountering an intermittent problem dialing out with PPP using Red Hat's Network Configuration in the Control Panel. Here's what happens: I booted up my PC this morning and when to activate my PPP connection, which works fine on other occasions. The TR light on my Hayes Accura came on but the modem did not dial. I shut off the modem and restartd it. Nothing. So I rebooted. This time I dialed out great. Even deactivated and activated my PPP connection several times I reboot again. This time I duplicate the problem -- it won't dial out. So I reboot again. Works fine. I am writing to you now after this. I noticed something in the messages that I receive on bootup. It doesnt wind up being recorded in the dmesg file, but there's a line that says: /etc/rc.d/rc.sysint: /dev/cua0 Permission denied that appears. I don't know if this is relevant or not, but I would like to track down why I can sometimes dial out with PPP and other times not. Any help much appreciated. Please email me as well.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103033816.0/warc/CC-MAIN-20220624213908-20220625003908-00273.warc.gz
CC-MAIN-2022-27
1,072
16
https://buboflash.eu/bubo5/show-dao2?d=7077994302732
code
The flow of association is symmetric, whereas the flow of causation is not. If you want to change selection, open original toplevel document below and click on "Move attachment" Parent (intermediate) annotationOpen it Flow of Causation The flow of association is symmetric, whereas the flow of causation is not. Under the causal edges assumption (Assumption 3.3), causation only flows in a single direction. Causation only flows along directed paths. Association flows along any path that does not Original toplevel document (pdf) - (no access) - Introduction_to_Causal_Inference-Nov19_2020-Neal.pdf, p34 |status||not read|| ||reprioritisations| |last reprioritisation on|| ||suggested re-reading day| |started reading on|| ||finished reading on|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103037649.11/warc/CC-MAIN-20220626071255-20220626101255-00137.warc.gz
CC-MAIN-2022-27
746
8
http://sevendaynews.com/2017/03/03/xiaomi-built-in-screen-mi-mix-2-fingerprint-scanner/
code
A couple of weeks ago, the head Xiaomi lei Jun officially announced that the smartphone Mi MIX 2 to be. He said that it will work the same French designer Philippe Starck, designed the first model, and that the second option will be even thinner and bezrobocie previous. Now, the Network got new information from the insiders. They claim that the display is Mi MIX 2 will be equipped with a built-in fingerprint. - Google Pixel 2 confirmed, but the budget version will not - In Russia sabotaged the transfer of sentenced persons from annexed Crimea, inventing “very convincing” excuse
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657146845.98/warc/CC-MAIN-20200713194203-20200713224203-00231.warc.gz
CC-MAIN-2020-29
588
3
https://community.nodebb.org/topic/762/nodebb-plugin-finder-the-plugin-that-finds-and-manages-other-plugins-deprecated/13
code
How do I customize the embedding of YouTube videos (I want to embed the videos with another lazy YouTube embedding plugin)? I exceeded the And it still assimilates ... 😞 I would be honored if this became part of core. Of course it's a little rough, and some of the remnants of construction are still there, so this is not completely done yet but the basic functionality is there! Hat's off to @Mr_Waffle for writing that sockets guide too, that helped things along for me nicely. @tedr56 that's on the todo list, it shouldn't be too hard to add that It's bad form to hijack a thread for an unrelated issue. What you want to do is, start another discussion in this category. State in as much detail as you can what the problem is and one or more people should be able to help you get NodeBB running properly. Remember to state what OS you are running and what Web server and the version of the Web server, too. @julian It seems there was some sort of breaking change that I can't find any reference to anywhere in the docs or the forums that's causing my finder plugin to 404. I saw the deprecated staticDir -> staticDirs notice (which would be a breaking change in 0.5.0), but nothing of that magnitude for anything in 0.4.0. Is there a different, more updated way to declare the admin templates now? Yeah defining routes changed quiet a bit, check out https://github.com/barisusakli/nodebb-plugin-imgur/blob/master/index.js#L22
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511023.76/warc/CC-MAIN-20231002232712-20231003022712-00070.warc.gz
CC-MAIN-2023-40
1,431
8
https://www.learngala.com/cases/59a59bb2-d36e-4049-9a88-f6a3d414ca0d
code
Snapshot Serengeti Lab - ORIGINAL: What can citizen science data reveal about the ecology of Serengeti wildlife? This is a multi-week, interactive lab that will introduce you to ongoing ecological research on the wildlife of the Serengeti tropical savannah. , , , , , , , , and In this lab sequence, you will generate real scientific data to be collected in a database used for research on Serengeti wildlife populations. Additionally, you will learn to use the database to answer your own questions about Serengeti wildlife. This week you will become familiarized with the Snapshot Serengeti project and its data, practice making observations from photos and forming a hypothesis about what you observe.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297284704.94/warc/CC-MAIN-20240425032156-20240425062156-00803.warc.gz
CC-MAIN-2024-18
704
5
https://yourpetland.com/pet-snake/
code
Pet Snake 101: How to Purchase and Care for a Reptile Having a pet snake turned out to be one of the most exciting experiences in a lifetime of raising animals. My parents were cat lovers, and I have spent my entire life around them. When I was born, my parents had a good friend who was a professional photographer. As a result, I have a whole photo album crammed full of baby pictures. And there is either a cat or a portion of a cat in every single photo. I kid you not. I adopted a variety of pets since then. First I had mice; next, I had gerbils. Then there was a brief period where I became adept at snaring gophers at the local park. That earned me an article in the local newspaper earning me the nickname "gopher roper." As an adult, I began adopting exotic animals. I had kangaroo rats, ferrets, spiders, and eventually, I bought a pet snake. I named him Henry, and in many ways, he was my all-time favorite pet. However, I purchased Henry on a whim, leading to my one regret. I wish I had taken the time to read up on pet snakes and how to care for them ahead of them. It was a bit of a bumpy ride until I learned the basics. Pet Snake Basics There are several points to consider before purchasing a snake. First of all, realize that adopting a pet snake is taking on a long-term commitment. Many species have a life expectancy of 20 years or longer. Next, you need to make sure you have what it takes to feed prey animals to your pet snake. You will also need to consider the fact that snakes are great escape artists, so you will need to buy a proper enclosure. How to Choose the Best Pet Snake Whenever possible, you should purchase your snake from a reputable breeder or a reptile specialty store. Wild snakes can carry diseases and are difficult to tame. You will also want to do a quick exam of your pet snake. Look for any signs of illness like closed or milky eyes or bubbles coming from its nose. Likewise, look for any signs of injury. Most importantly, you need to consider what kind of pet snake to purchase. As pretty as snakes are, giant constricting snakes and venomous snakes can be a safety risk for beginners. 5 Great Beginner Snakes Below is a list of pet snakes recommended for beginners. These pet snakes are easy to find, care for, and are affordable. Corn snakes (Pantherophis guttata) are one of the most popular pet snakes because of their demeanor, availability, and their color combinations. Mature corn snakes average 3 to 5 feet in length, but can sometimes grow as long as 6 feet. Furthermore, they are easy to keep requiring only a 20 to 30-gallon enclosure. Depending on their size and color variations, corn snakes cost around $25 to $50. California kingsnakes (Lampropeltis getula californiae) are probably the most popular of the kingsnake family among reptile keepers. This pet snake comes in a variety of colors and patterns. They don't grow too long. Averaging about 3 to 4 feet in length, they only require a 20-gallon enclosure. You can purchase this pet snake for about $50 to $60. Gopher snakes (Pituophis spp.) are relatively easy to find, come in a variety of colors, and are reasonably priced. With an average adult length of 4 to 5 feet, you can house them in a 20 to 30-gallon enclosure. You can expect to pay around $40 to $60 for this pet snake. Rosy boas (Lichanura trivirgata) are a stunning small boa constrictor that comes in a variety of colors. They are very docile and average only 2 to 3 feet in length. For that reason, a 20-gallon enclosure is just perfect for this pet snake. Rosy boas cost about $30 to $40 at reptile shows and from specialty pet stores. They are not readily available at retail pet stores. The ball python (Python regius) is probably the most popular pet snake in America today. They have a shy demeanor and are easy to take care of and house. Female ball pythons average 3 to 5 feet in length. However, the males are smaller averaging 2 to 3 feet in length. A 20-gallon tank is ideal for this pet snake. So you decided to get a pet snake. There are a few pieces of equipment that you must have before you bring one home with you. First of all, remember that pet snakes are persistent when it comes to finding a way to escape. For this reason, we strongly recommend that you purchase an enclosure designed specifically for reptiles. No one wants a snake roaming the house. Reptile terrariums work best for snakes. They come in a variety of sizes, depending on your needs. Be sure to look for one that has a waterproof base. Additionally, it is best to purchase one with front opening doors. They provide easy access for maintenance and feeding. Most importantly, buy one with a specially designed lock to prevent escape. They are standard on most pet snake and reptile enclosures. In addition to their enclosures, pet snakes also enjoy having a place to hide. Without a safe hiding place, snakes can develop stress that may affect their appetite and overall well-being. Therefore, we recommend you look around and find a rock cave or reptile shelter for your snake. Next, you will need material to line the bottom of your snake enclosure. Typically, mulch or wood shavings serve as the perfect substrate or bedding. There are a variety of options on the market. Be sure to look for bedding that is dust-free and non-toxic. Also, you might want to select a hypoallergenic brand. Snakes are cold-blooded animals. In the wild, they raise their body temperature by lying in the sun. Inversely, they lower it by slithering over to the shade. Things are different when you have a reptile enclosure for your pet snake. What you do is create what is called a heat gradient within their terrarium. Fortunately, all you need to do is purchase a reptile heating pad to place beneath your snake's enclosure. Most importantly, situate the heating pad to one side. That way your snake can regulate body temperature by moving back and forth between the hot and cold zones. Feeding Your Pet Snake Now we get to the hard part, deciding how to feed your snake. Snakes are carnivores and typically prefer to eat their food whole. Many of them eat rats and mice. Some eat other reptiles or insects. Feeding your pet snake pre-killed prey is the easiest option. Fortunately, most snakes will eat dead prey. It is far easier to keep pre-killed prey in your freezer than to have to purchase it live. At first, you may have to experiment to determine what size prey to purchase for your pet snake. The general rule is to buy food for it that is roughly the same size as the middle of its body. However, you might need to experiment until you find the perfect size. A word of caution, some snakes can be finicky eaters. In an extreme case, you may need to take your pet snake to a veterinarian for help feeding it. Watering Your Snake Snakes like all animal, require daily water. Be sure to remember to keep a supply of water in your snake's enclosure at all times. Snakes like to swim. Therefore, if your enclosure is big enough, you should consider getting them an artificial pond. Best of all, that also provides much-needed exercise. And speaking of exercise, you will want to provide proper climbing equipment for your pet snake. Rocks, trees, or branches are all great options. Do-it-yourselfers can always get creative and make something unique. Enjoying Your Pet Snake Purchasing a pet snake can be the adventure of a lifetime. However, getting a pet snake is not as simple as picking out a dog or cat at the local animal shelter. Nor is it as easy as buying an aquarium and a few fish at the local pet store. Having a pet snake involves making a long-term commitment. And, you must carefully consider every detail. For example, you need to make sure you have an escape-proof enclosure. You will also need to select the right kind of snake for you and your loved ones. Finally, you need to make sure you can stomach their feeding requirements. (pun intended) Is there anything we did not cover in this article about pet snakes? Do you have any questions regarding other types of snakes? If so, please let us know in the comments section, below.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647895.20/warc/CC-MAIN-20230601143134-20230601173134-00082.warc.gz
CC-MAIN-2023-23
8,118
44
https://hackaday.com/2012/02/10/jtag-dongle-pushes-code-to-fpga-after-bootup/
code
This gnarly beast has near-magical qualities. [Sprite_TM] patched it together as a dongle which attaches to a JTAG header (we’re fairly certain this is not a standard footprint for that interface though). He uses it to push code to an FPGA after that device boots. Why? Well, there’s several reason, but the most generic answer is that some boards will not boot unless there is a chain of trust that validates the code which will be running. In this case, [Sprite_TM] is using a knock-off board he acquired from a Chinese supplier. It’s a hardware network terminal (thin client), and as you can see in the video after the break, it works just fine. But that’s pretty boring and he wanted to use it for his own purposes. When he plugs in the dongle and powers up the board the network terminal is nowhere to be found, replaced with the code to play Pac-Man as if were a full arcade cabinet. The dongle is simply a female DIL header, an ATtiny85, and a flash memory chip. The AVR has a software UART that speaks XSVF, the protocol used to push data to the FPGA. The data to be written is stored in the memory chip, and with that header in place reprogramming the AVR is just a matter of connecting an ISP programmer. Brilliant!
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662631064.64/warc/CC-MAIN-20220527015812-20220527045812-00457.warc.gz
CC-MAIN-2022-21
1,233
3
https://kb.datto.com/hc/en-us/articles/360023807792-What-is-Disable-Internet-Check-
code
[unpublished], this info is now in the internet availability check article. https://kb.datto.com/hc/en-us/articles/360024059451-How-does-the-internet-availability-check-work- The Internet Check is used to determine if the access point has a working internet connection. If the Internet Check is enabled, and it detects that the internet connection has gone down, the access point will try to find a new route to the internet. This may mean a gateway turns itself into a repeater, or a repeater seeks out a new gateway. This may be preferable if you multiple access points connected to multiple internet connections. When "Disable Internet Check" is enabled, it will turn off the Internet Check, which will keep the wireless network up, even if the internet has gone down. This is useful if you are planning on making a network that will not have Internet connectivity, spotty Internet connectivity, or you would like to keep access to local LAN resources even if Internet connectivity goes offline.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250628549.43/warc/CC-MAIN-20200125011232-20200125040232-00204.warc.gz
CC-MAIN-2020-05
998
3
https://patersontech.com/dos/byte%E2%80%93inside-look2.aspx
code
An Inside Look at MS-DOS The rest of the disk is the data area. It is divided into many small, equal-sized areas called allocation units. Each unit may have 1, 2, 4, 8, 16, 32, 64, or 128 logical sectors, but the number is fixed for a given disk format. Allocation units are numbered sequentially. The numbering starts with 2; the first two numbers, 0 and 1, are reserved. Table 2 shows this numbering system applied to the 8-inch single-density disk format. |Logical Sector Numbers||Allocation Unit Number| |30 - 33||2 (first allocation unit)| |34 - 37||3| |38 - 41||4| |42 - 45||5| |1998 - 2001||494| Table 2: Allocation unit numbering for the 8-inch single-density format. To compute the logical sector number of the first sector in an allocation unit, you use the following equation: sector number = 4 x allocation unit number + 22. The allocation unit is the smallest unit of space MS-DOS can keep track of. The amount of space used on the disk for each file is some whole number of allocation units. Even if the file is only 1 byte long, an entire unit will be dedicated to it. units. Note that, in the file shown, more than two sectors are wasted because they are in an unused part of the last allocation unit. For example, the standard format for 8-inch single-density disks uses four 128-byte sectors per allocation unit. When a new file is first created, no space is allocated, but an entry is made in the directory. Then when the first byte is written to the file, one allocation unit (four sectors) is assigned to the file from the available free space. As each succeeding byte is written, the size of the file is kept updated to the exact byte, but no more space is allocated until those first four sectors are completely full. Then to write 1 byte more than those four sectors worth, another four-sector allocation unit is taken from free space and assigned to the file. When writing stops, the last allocation unit will be filled by some random amount of data (Figure 4). The unused space in the last allocation unit is wasted and can never be used as long as the file remains unchanged on the disk. This wasted space is called internal fragmentation, because it is part of the space allocated to the file but is an unusable fragment. On the average, the last allocation unit (regardless of size) will be half filled and, therefore, half wasted. Because each file wastes an average of one-half an allocation unit, the total amount of space wasted on a disk due to internal fragmentation is the number of files times one-half the allocation unit size. The phenomenon called external fragmentation occurs when a piece of data space is unallocated yet remains unused because it is too small. This cannot happen in the MS-DOS file system because MS-DOS does not require files to be allocated contiguously. It is, however, present in more primitive systems, such as the UCSD p-System. It would certainly seem desirable to minimize internal fragmentation by making the allocation unit as small as possible -- always one sector, for example. However, for any given disk size, the smaller the unit, the more there must be. Keeping track of all those units can get to be a problem. Specifically, the amount of space required in the file allocation table would be quite large if there were too many small allocation units. For every unit, 1.5 bytes are required in the FAT; there are normally two FATs on the disk, each of which is rounded up to a whole number of sectors. Now take a standard 8-inch single-density floppy disk that has 2002 sectors of 128 bytes. To minimize internal fragmentation, choose the smallest possible allocation-unit size of one sector. Two thousand allocation units will require 3000 bytes (24 sectors) per FAT, or 48 sectors for two FATs. If the average file size is 16K bytes (128 sectors), the disk will be full when there are 16 files on it. Waste due to internal fragmentation would be 16 files x 64 bytes per file = 1024 bytes (8 sectors) Far more space is occupied by the FATs on the disk than is wasted by internal fragmentation! To provide maximum usable data space on the disk, both internal fragmentation and FAT size must be considered because both consume data area. The standard MS-DOS format for 8-inch single-density disks strikes a balance by using four sectors per allocation unit. Two sectors per unit would have been just as good (assuming a 16K-byte average file size), but there is another factor that always favors smaller FATs and larger allocation units: the entire FAT is kept in main memory at all times. The file allocation table contains all information regarding which allocation units are part of which file. Thus by keeping it in main memory, any file can be accessed either sequentially or randomly without going to disk except for the data access itself. Schemes used in other operating systems (including CP/M and Unix) may require one or more disk reads simply to find out where the data is, particularly with a random access. In an application such as a database inquiry, where frequent random access is the rule, this can easily make a 2 to 1 difference in performance. How the FAT Works FF FF FF 07 90 00 FF 6F 00 03 80 00 FF AF 00 FF 6F 01 Figure 5a shows how pointers are used to direct the operating system to the sequential parts of a file. The data stored in the sample file allocation table is displayed in hexadecimal in figure 5b. The directory entry for each file has one allocation unit number in it: the number of the first unit in the file. If, as in the previous example, an allocation unit consists of four sectors of 128 bytes each, then just by looking at the directory you know where to find the first 512 bytes of the file. If the file is larger than this, you go to the FAT. The FAT is a one-dimensional array of allocation unit numbers. As with any array, a given element is found with a numeric index. The numbers used as indexes into the FAT are also allocation unit numbers. Think of the FAT as a map, or translation table, that takes an allocation unit number as input and returns a different allocation unit number as output. The input can be any unit that is part of a file; the number returned is the next sequential unit of that file. Let's look at the example in figure 5a. Suppose that the directory entry for a file specifies allocation unit number 5 as the first of the file. This locates the first four logical sectors (512 bytes). To find the next allocation unit of the file, look at entry 5 in the file allocation table. The 6 there tells you two things: first, the next four logical sectors of the file are in allocation unit number 6; and second, to find the unit after that, look at FAT entry number 6. This process is repeated as you locate each allocation unit in the file. After number 6 comes number 3, then number 9, then number 10. In each case, the allocation unit number returned by the FAT tells you both where the data is (i.e., in which unit) and where to look in the FAT for the next allocation unit number. If you followed the example all the way through, you should have noticed that entry 10 in the FAT contains a -1. This, as you might have guessed, is the end-of-file mark. Allocation unit number 10 is last in the file, so its entry contains this special flag. (Another special value in the FAT is 0, which marks a free allocation unit.) Now you know that this file occupies five allocation units, numbers 5, 6, 3, 9, and 10 in order. The file could be extended by finding any free unit, say 27, putting its number in entry 10 (where the -1 is now), and marking it with the -1 for end of file. That is, entry 10 in the FAT will contain 27, and entry 27 will contain -1. This demonstrates how you can extend any file at will and that you can use any free space on the disk when needed, without regard to its physical location. If you ever want to look at a real FAT, there's one more thing you'll need to know. Each FAT entry is 12 bits (1.5 bytes) long. These entries are packed together, so two of them fit in 3 bytes. From a programming viewpoint, you would look up an entry in the FAT this way: Multiply the entry number by 1½, truncating it to an integer if necessary. Fetch the 16-bit word at that location in the FAT. If the original entry number was odd (so that truncation was necessary in the first step), shift the word right 4 bits; the lowest 12 bits of the word is the contents of the FAT entry. Reading a FAT from a hexadecimal dump isn't nearly as simple! Figure 5b shows the hexadecimal version of the sample FAT I've been using. File System in Action To put all this in perspective, you need to look at how MS-DOS handles a file-transfer request from an application program. With MS-DOS, application programs treat files as if they were divided into logical records. The size of the logical record is entirely dependent on the application and may range from 1 byte to 65,535 bytes. It is not a permanent feature of a file but in fact may vary from one file-transfer request to the next. The logical record size currently being used is passed to MS-DOS for each transfer made. It is, of course, completely independent of the physical sector size the disk uses. To read a file, an application program passes to MS-DOS the size of a logical record, the first logical record to read, and the number of sequential logical records to read. Let's follow an example of how MS-DOS uses this information. Assume the application program is using 80-byte records and is set up to read a file 15 records at a time. Let's pick things up on its second read, that is, after it has already taken the first 15 records and is about to read the second 15. The request will be for an 80-byte record, the first record is number 15, and you want to read 15 records. Now pretend you're MS-DOS and analyze this request. You immediately convert the request into byte-level operations. First multiply the logical record size by the record number, to get the byte position to start reading (80 x 15 = 1200). Then multiply the record size by the number of records, to get the number of bytes to transfer (also 1200). Next, these numbers must be put in terms of physical disk sectors. This requires some divisions and subtractions involving the physical sector size and results in the breakdown of the transfer into three distinct pieces: (1) the position in the file of the first physical sector and the first byte within that sector to be transferred, (2) the number of whole sectors to transfer after the first (partial) sector, and (3) the number of bytes of the last (partial) sector to be transferred. The calculations and their results are shown in Figure 6a. It is quite common for one or two of these pieces to be of length 0, in which case some of the following steps are not performed. |byte position 1200||= 9, remainder 48| Therefore, first byte to transfer is sector 9, byte 48 128 - 48 = 80 bytes to transfer in first sector 1200 - 80 = 1120 bytes left after first sector |1120 bytes||= 8, remainder 96| Therefore, transfer 8 whole sectors, then 96 bytes of last sector |9 sectors||= 2, remainder 1| |4 sectors/allocation unit| Therefore, first sector to transfer is allocation unit 2, sector 1. Figure 6: Calculating physical, byte-level operations from logical definitions. The process outlined in figure 6a shows how the amount of data is calculated in physical terms. The actual position of data on the disk is computed in figure 6b. At this point, there is still no hint as to where the data will actually be found on the disk. You know that you want the tenth sector of the file (sector 9 because you start counting with 0), but you're not yet ready to check with the FAT to see where it is. The sector position in the file must be broken into two new numbers: the allocation unit position in the file and the sector within the allocation unit. For this example with single-density 8-inch disks (four sectors per allocation unit), this would be the third unit from the start of the file and the second sector within the unit (Figure 6b). What you need to do now is skip through the FAT to the third allocation unit in the file. If your file is the same one shown in Figure 5, then from the directory entry you learn that the first unit is number 5. Looking at entry 5 of the FAT, you see the second unit is number 6. And finally, from entry 6 of the FAT, you find the third unit of the file, number 3. Table 2 reminds you that allocation unit number 3 is made up of physical sectors 34, 35, 36, and 37; therefore, physical sector 35 is what you are looking for. Now the disk reads begin. Physical sector 35, only part of which is needed, is read into the single buffer kept in MS-DOS solely for this purpose. Then that part of the sector that is needed is moved as a block into the place requested by the application program. Next, the whole sectors are read. MS-DOS looks ahead in the FAT to see if the allocation units to be transferred are consecutive. If so, they are combined into a single multiple-sector I/O system transfer request, which allows the I/O system to optimize the transfer. This is the primary reason why MS-DOS disks do not ordinarily use any form of sector interleaving: a well-written I/O system will be able to transfer consecutive disk sectors if told to do it in a single request. The overhead of making the request, however, would often be too great to transfer consecutive sectors if it were done on a sector-by-sector basis. Back to the example. MS-DOS will request that the I/O system read sectors 36 and 37 directly into the memory location called for by the application. Then, noting that allocation units 9 and 10 are consecutive, the corresponding sectors 58, 59, 60, and 61 from unit 9 and sectors 62 and 63 from unit 10 will be read by the I/O system in a single request. This completes the transfer of the eight whole sectors. To finish the job, sector number 64 is read into the internal MS-DOS sector buffer. Its first 96 bytes are moved to the application program's area.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710764.12/warc/CC-MAIN-20221130124353-20221130154353-00549.warc.gz
CC-MAIN-2022-49
14,049
55
http://accessories.ap.dell.com/sna/productdetail.aspx?c=hk&cs=hkdhs1&l=en&s=dhs&sku=881-10761
code
Virus and Spyware Removal with System Optimization Virus, Spyware, Malware Removal: Tired of pop-up windows opening themselves, slow start-up speeds, crashes and other errant behavior? Viruses make PCs slow and do things we can't control. Let us remove existing viruses and spyware, set up your security software and get your firewall and Microsoft security settings properly configured. Manufacturer Part# : IXAS6401-CL Dell Part# : 881-10761
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701806508/warc/CC-MAIN-20130516105646-00060-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
443
5
http://www.webassist.com/forums/post.php?pid=3124
code
Master/Detail Order/Line Items Using Data Assist I've added the results page of the line items file to the detail page of the order file. filtering works fine when detail page is viewed . However, when adding a line item there is a problem when returning to the orders detail page. Neither the order detail or the line items table shows. Could someone suggest how to accomplish this . I expect it's an issue with the filtering but am stumped. Thanks for your time,
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488544264.91/warc/CC-MAIN-20210623225535-20210624015535-00241.warc.gz
CC-MAIN-2021-25
464
4
https://www.thrivinggreenspaces.scot/news/article/11/new-science-in-hailes-quarry-park-wester-hailes
code
New project "How Biodiverse is Your Park?", will give local people the opportunity to find, photograph and identify plants and animals in Hailes Quarry Park, Wester Hailes. This data will be used in maps of local biodiversity and help make improvements to parks. You can find out more about the project through this link: How biodiverse is your park? Citizen scientists to find the answer | The University of Edinburgh If you live in the Wester Hailes area, and are interested in taking part in this project, please contact the team by emailing [email protected] The "How Biodiverse is Your Park?" project arose from the Green Infrastructure Mapping project, a collaboration underway between the University of Edinburgh and Thriving Greenspaces.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711162.52/warc/CC-MAIN-20221207121241-20221207151241-00576.warc.gz
CC-MAIN-2022-49
758
5
https://wiki.simons.berkeley.edu/doku.php?id=gmos21:start
code
Tentative weekly meeting times: Tuesdays 10am, Fridays 11am (with additional informal times to meet up and work on problems). Tues. 9/7: A brief overview of the state-of-the-art on sampling (Kevin/Sinho). (slides, recording) Fri. 9/10: Mirror-Langevin (Sinho). Riemannian Langevin (Mufan). (Sinho's slides, Mufan's notes, recording) Tues. 9/14: Sampling from polytopes (Kevin). (notes, recording) Fri. 9/17: More sampling from polytopes (Kevin/Ruoqi). (Kevin's notes, Ruoqi's notes, recording) Tues. 9/21: Lower bounds for sampling (Sinho). (notes, recording) Fri. 9/24: Ideal HMC (Kwangjun). (recording) Week of 9/27-10/1: No meetings; attend the workshop on Sampling Algorithms and Geometries on Probability Distributions instead! Tues. 10/5: A status report on Rényi convergence of Langevin (Kevin/Sinho). (slides, recording) Fri. 10/8: Cancelled. Tues. 10/12: Working group on mirror-Langevin/MALA (not recorded). Fri. 10/15: Shifted ODE discretization of underdamped Langevin (James). (slides, recording) Tues. 10/19: Beyond log-concavity (Holden). (slides, recording) Fri. 10/22: Beyond log-concavity (Andrej). (slides, recording) Week of 10/25-10/29: No meetings due to the workshop on Dynamics and Discretization: PDEs, Sampling, and Optimization. Tues. 11/2: Cancelled. Fri. 11/5: Controlling the acceptance probability in MALA (Yuansi). (notes, recording) Tues. 11/9: Sampling from non-smooth potentials (Yongxin). (notes, recording) Fri. 11/12: Sampling as optimization in the space of measures (Andre). (slides, recording) Tues. 11/16: Analysis of LMC from Poincaré to log-Sobolev (Matthew). (slides, recording) Fri. 11/19: Primal-dual interpretation of the proximal Langevin algorithm (Adil). (recording) [Note: The audio was not recorded properly. See also Adil's talk at the earlier workshop.] Week of 11/22-11/26: No meetings due to the Thanksgiving holiday. Week of 11/29-12/3: No meetings due to the workshop on Optimization under Symmetry. Tues. 12/7: Backward error analysis (Mufan). (slides, recording) Fri. 12/10: Computational complexity of variational inference (Yian). (recording) Tues. 12/14: SVGD (Ye). (slides, recording) Fri. 12/17: Quantum sampling and annealing (Ruizhe). (slides, recording)
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663039492.94/warc/CC-MAIN-20220529041832-20220529071832-00192.warc.gz
CC-MAIN-2022-21
2,224
27
https://gamewisp.readme.io/reference/channelsubscribers
code
This endpoint is paginated Make sure to review how our Cursors work to get the most out of this call. This endpoint Accepts Include Parameters Be sure to review how include parameters work if you haven't yet. |Returns a user object nested with each subscriber object |Returns a tier object nested within each subscriber object. |Returns both the tier and user object nested within each subscriber object.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818740.13/warc/CC-MAIN-20240423192952-20240423222952-00622.warc.gz
CC-MAIN-2024-18
404
7
https://www.sqlservercentral.com/Forums/Topic1525283-1550-1.aspx
code
Can anyone please let me know whether shrinking log file or database file cause log file\backup chain to break?? Thanks in Advance. What will break the log chain is setting the database to the SIMPLE recovery mode, which is what a lot of people do when shrinking either type of file. I'll also say that it's generally a very bad idea to shrink either type of file unless there has been some extraordinary accidental growth the cause of which has been clearly identified and repaired prior to the shrink. If you can afford the disk space, you might just want to leave the gobs of freespace alone. The exception to that rule is if you know that you'll be restoring the databases to smaller servers that might not have such amounts of freespace and that also includes any Disaster Recovery machines. is pronounced ree-bar and is a Modenism for R First step towards the paradigm shift of writing Set Based code: Stop thinking about what you want to do to a row... think, instead, of what you want to do to a column. If you think its expensive to hire a professional to do the job, wait until you hire an amateur. -- Red Adair How to post code problemsHow to post performance problemsForum FAQs
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887981.42/warc/CC-MAIN-20180119125144-20180119145144-00731.warc.gz
CC-MAIN-2018-05
1,189
7
https://tcalive.in/java/operators-in-java/
code
Operators In Java12/10/2018 2018-10-12 13:48 Operators In Java Operators In Java An operator is a symbol that tells the compiler to perform specific mathematical or logical Operation. Java language is rich in built-in operators and provides the following types of operators − Let us discuss these operators in details. To do arithmetic, Java uses operators. It provides operators for five basic arithmetic calculations : addition, subtraction, multiplication, division and remainder which are +, – , * , / and % respectively. Each of these operators is a binary operatos i.e., it requires two values (operands) to calculate a final answer. Apart from these binary operators, Java provides two unary arithmetic operators (that require one operand) which are unary + and unary – . Operators that act on one operand are referred to as Unary Operators → Unary + . The Operator unary ‘+’ precedes an operand(the value on which the operator operates). For example: if a=5 then +a means 5. → Unary – . The operator unary ‘-‘ precedes an operand. This operator reverses the sign of the operand’s value. For example: if a=5 then -a means 5. Operators that act upon two operand are referred to as Binary Operators The operands of a binary operator are distinguished as the left or right operands. Together, the operator and its operands constitute an expression. Addition operator +. The arithmetic binary operator + adds values of its operands and the result is the sum of the values of its two operands 4+20 results in 24. a+5 results in 7, when a = 2 a+b results in 10, when a = 4, b = 6 Its operands may be of Integer (byte, short, char, long) or of Real ( float, double) types. Subtraction operator -. The operator + subtracts the second operand from the first. 14 – 3 evaluates to 11. a – b evaluates to 2, when a = 7, b = 5 The operands may be of Integer or float Real types. Multiplication operator *. The operator * multiplies the values of its operands 3 * 4 evaluates to 12. b * 4 evaluates to 24, when b = 6 a * c evaluates in 15, when a = 3, c = 5 The operands may be of integer or float types. Division operator /. The operator / divides its first operand by the second. The division operator in Java , just like C language uses two kinds of division : Integer Division : if both operands(Numerator and Denominator) are integers then result will also be an integer. So 10/4 is 2 not 2.5 Floating Division: if either operands (Numerator or Denominator or both) are float or double then result will also be float or double. So 10/4.0 is 2.5 The operands may be of integer or float types. Modulus operator %. The operator % finds the modulus of its first operand relative to the second. That is, it produces the remainder of dividing the first by the second operand Few Important Points: The modulo division operator( % ) in Java , unlike C , works with float and double data type also. So 10%5 evaluates to 0, since 5 goes into 10 two times with a remainder 0. So 10.5 %5.0 will evaluates to 0.5 as the remainder Operator + with Strings You have used the operator ‘+’ with numbers. When you use + with numbers, the result is also a number. However, if you use operator + with strings it concatenates them and gives a string . Lets see some examples : 5 + 6 results into 11. “5” + “6” results into “56”. “17” + ” B, Raj Nagar” results into “17 B, Raj Nagar” “abc” + “123” results into “abc123” 5 + “xyz” results into “5xyz” The term relational in relational operator refers to the relationships that values ( operands ) can have with one another. Thus, the relational operator determines the relations among different operands. Java provides six relational operators for comparing numbers and characters. If the comparison is true, the relational expression results into the boolean value true and to the boolean value false, if comparison is false. The six relational operators are: < ( less than ), <= ( less than or equal to ), == ( equal to ), > ( greater than ), >= ( greater than or equal to ) and != ( not equal to ) Note: But they don’t work with Strings → Summarizes the action of theses relational operator |p||q||p < q||p <= q||p == q||p > q||p >= q||p != q| Relational operators often are used with logical operators ( also known as conditional operators sometimes ) to construct more complex decision-making expressions. The Java programming language supports six conditional operators– five binary and one unary The logical AND operator (&&) The logical AND operator, written as &&, combines two expressions into one. The resulting expression has the result as Boolean value true only if both of the original expressions (its operands) are true Following are some examples of AND operator (&&). (6==3)&&(4==4) , results into false because first expression is false (4==4)&&(8==8) , results into true because both expressions are true. 6 < 9 && 4 > 2 , results into true because both expressions are true. 6 > 9 && 5 < 2 , results into false because both expressions are false. Since Logical AND operator (&&) has lower precedence than relational operators, we don’t need to use parentheses in these expressions. The logical OR operator ( || ) The logical OR operator, written as ||, also combines two expressions into one. The logical OR (“||”)operator gives the result as Boolean value true if either of its operands evaluate to true This principle is used while testing evaluating expressions. Following are some examples of logical OR operation : (5==3)||(4==4) , results into true because second expression is true. 0||0 , results into false because both expressions are false. 5 > 8||5 < 2, results into false because both expressions are false. 0 || 8 , results into true because second expressions is true. Since Logical OR operator (||) has lower precedence than relational operators, we don’t need to use parentheses in these expressions. The logical NOT operator ( ! ) The logical NOT operator, written as !, works on single expression or operand i.e., it is a unary operator. The logical NOT operator (!) negates or reverse the truth value of the expression following it i.e, if the expression is true, then !expression is false, and vice versa Following are some examples of logical NOT operators’ usage : !(5!=3), results into false because 5!=0 returns true. !(5 > 2), results into false because the expression 5 > 2 is true. !(5 > 9> , results into true because the expressions 5 > 9 is false The logical negation operator ! has a higher precedence than any of the relational or arithmetic operators. Therefore, to negate an expression, you should enclose the expression in parentheses : !(x > 5) will reverse the result of the expression x > 5 whereas !x > 5 is equivalent to (!x) > 5 i.e., it will first reverse the truth value of x and then test whether the reverse of x’s truth value greater than 5 or not. Like other programming languages, Java offers an assignment operator =, to assign one value to another eg,. z = x + y; z = z * 2; Java Shorthand Operators Java offers special shorthand that simplify the coding of a certain type of assignment statement. For example, a = a + 10; can be written as a += 10; The operator pair += tells the compiler to assign to a the value of a + 10. This shorthand works for all the binary operators in Java ( those that require two operands ). The general form of Java shorthand is : var = var operator expression is same as var operator = expression Following are some examples of Java shorthands: x -= 10; equivalent to x = x – 10; x *= 3; equivalent to x = x * 3; x /= 2; equivalent to x = x / 2; x %= z; equivalent to x = x % z; Java shorthand just shortens the written expression, it does not fasten the execution, e.g. , x += 10 is not faster than x = x + 10. Summarizes the action of theses relational operator A is true and B is false
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155268.80/warc/CC-MAIN-20210805000836-20210805030836-00150.warc.gz
CC-MAIN-2021-31
7,914
109
http://www.astutecomputing.com/tutorials/pear/other.php
code
The one issues that I've had with PEAR is a ’file not found’ error. In my experience this is due to the incldue_path setting in PHP. Remeber, the PEAR packages are just libraries of code that you need to include in your programs. If PHP can't find these file then you can't include them. Warning: date(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone. in /home/astute/www/html/template.php on line 198
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891543.65/warc/CC-MAIN-20180122213051-20180122233051-00447.warc.gz
CC-MAIN-2018-05
737
2
https://community.sharptools.io/t/thoughts-on-media-tile-options/165
code
I recently received a comment asking about media tiles and what options there are to get a camera to better fit into a tile. I’ve been thinking about providing a few options, but I don’t want to overwhelm people with options – what are your thoughts on the following? Two options that could help with getting media tiles to better fit are: - Scaling Mode: change how the camera image fits in the tile (eg. fill, contain, cover). - Position: change the alignment of the image (eg. top, middle, bottom) Today, the scaling mode is ‘cover’ and the position is ‘middle’. The image is centered in the box and the aspect ratio is maintained (with the smallest dimension filling the tile and the larger dimension going over). For cameras that have timestamps on the top or bottom, sometimes this results in the timestamp being cut-off. For demonstration purposes, I’ve manually added an orange border to the tile and the following shows how the media is bigger than the tile and would overflow out of the tile: The current approach attempts to have the media cover the tile and centers the content. In this scenario, the main content is visible, but the top and bottom are slightly obscured: For example, if a timestamp was at the bottom of the camera and it wasn’t a big deal to trim the top of the image off a bit, you could use the default ‘cover’ setting and align ‘bottom’. Note: I could also make this a percentage, so you could choose how to vertically/horizontally position an image in the default cover scaling. Alternatively, if you always just wanted the whole camera to fit into the box and you didn’t mind empty space in the tile, you could use ‘contain’. And finally, a scaling setting of ‘fill’ would allow the image to stretch to fit the tile which would lead to the aspect ratio being off. For many cameras that are close enough to a 1x2 ratio (eg. 16:9), it would probably be minor enough that some people would prefer this. What are your thoughts? Would the additional options be overwhelming or helpful? Any other thoughts on a better solution?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00656.warc.gz
CC-MAIN-2023-50
2,092
11
http://sci.tech-archive.net/Archive/sci.image.processing/2005-10/msg00047.html
code
Re: Image Segmentation - From: jg.campbell.ng@xxxxxxxxx - Date: 9 Oct 2005 03:42:15 -0700 > Thank you very much! > You are right i need this for analysing microscopy images (I am > anatomist).Unfortunately in my country it is not easy to find any > literature on the matter, so i do my searching only over the internet! > Actually i am just starting to use/understand image analysis and i was > fascinated by the possibilities it offers! > Unfortunately i am simple user and do not write programs, but i tought > that if i knew a bit more i could sqeeze out more from the image > analysis software i am using (it's image J by the way)! > Thank you once again! You (and thinking of the other contributor as well) will find some assorted and random links on microscopy image analysis in: Note in particular the link 'publications' at the top and 'Watersheds_514'; those are links to Noel Bonnet's group at U. Riems. In the publications you will find some downloadable PDFs that may 'Watersheds_514' is a very good implementation of the watershed method of image segmentation -- coded as a plugin for ImageJ. We are using ImageJ. You will find ImageJ very useful, not only what is offered by its core, but also the many plugins available from the ImageJ website. As well as using other's plugins, we are developing our Myself, I use also the GIMP, XV, and ImageMagick (all freely available), along with my own image processing and pattern recognition There are more random and unsorted links on active contours and deformable templates at: Active contours and deformable templates are not related -- except in that web page. http://homepages.inf.ed.ac.uk/rbf/CVonline/ is a top class resource. There is a paper on recognition of larvae at: That's more or less undergraduate stuff and possibly should not have been published in a conference proceedings at all. But the methods are There is a longer draft of the paper at: Finally, the BibTeX file for the papers are at: However, our work on segmentation (PhD of Christopher Hudy) is just starting. My email address is in the links; if you want to keep in touch, we will be issuing a significant report on segmentation methods some time in the first half of next year; and we will be testing methods and developing software from now on. > If i have any questions about image analysis is it all right to post > them here? Where is .bg? - Re: Image Segmentation - From: Prospero - Re: Image Segmentation
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122629.72/warc/CC-MAIN-20170423031202-00057-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,446
46
http://www.postresilience2014.com/program/simulation-contest/
code
How to face a challenge Define a socio-ecological system by adjusting the 3 model parameters: “competitiveness”, “tax-rate” and “max-trade-rate”. For a challenge to be completed, the system you will have define has to: Condition 1: Be stable, that is the population of harvesters and collectors has to maintain for at least 500 ticks without shocks. Condition 2: Recover from one or several shocks (depending on the challenge), that is restore the ecological and socio-economic stable state it had before the shock(s). Note that the shocks have to be applied after a 100 ticks so that the system has time to reach its stable state. You can try several solutions. Once you have pick your best option, come for a demonstration at our stand in Antigone 2 during the free sessions of Tuesday and Wednesday afternoon.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257651481.98/warc/CC-MAIN-20180325005509-20180325025509-00436.warc.gz
CC-MAIN-2018-13
824
6
http://www.linuxquestions.org/questions/mandriva-30/mnf2-unable-to-connect-to-web-interface-mandrakesecurity-x-server-install-error-271618/
code
I've just did a fresh install of MNF2 beta 2 on an IBM PC 300PL and I can't get an X server configuration to work. The PC has an trio3d card on mainboard with 4 mb video ram. Beside that, I can't configure the OS using the web browser and logging to the designed port, i.e. in my case 192.168.1.1:8443. In syslog, I found messages saying that shorewall rejected the packet from my PC when I try to connect. After shutting down the firewall, no more report from shorewall (ya right, normal) but not much luck getting connected. It seem like something went wrong while installing. First, how can I check the md5 checksum of the download image. Any advice would be appreciate! Need to get this thing working before weekend.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189472.3/warc/CC-MAIN-20170322212949-00387-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
720
5
https://lists.debian.org/debian-user/2006/09/msg00411.html
code
-----BEGIN PGP SIGNED MESSAGE----- James Sieber wrote: > New to linux : heres some back ground info > 1. installed suse 10.1 amd 700mhz 128 mem vid 64meg no win > Note here worked good until I tried to install java > No pages loaded timed out error netdev watchdog eth0 transmit timed out > 2. second install same thing same os > 3. mandrake 9.1 installed at least it works but still can not get to the > web same error msg I think (nay, I *know*) it would be best if you asked these questions on a Mandrake forum or list. > 4. tried to install suse over the top of it but it does not load ? > Help please. [email protected] or [email protected] thanks linux > newbie big time. Old dos hog though. The first link found when Googling for "netdev watchdog eth0" describes a possible answer. Ron Johnson, Jr. Jefferson LA USA Is "common sense" really valid? For example, it is "common sense" to white-power racists that whites are superior to blacks, and that those with brown skins are mud people. However, that "common sense" is obviously wrong. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org -----END PGP SIGNATURE----- - From: "James Sieber" <[email protected]>
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805242.68/warc/CC-MAIN-20171119004302-20171119024302-00004.warc.gz
CC-MAIN-2017-47
1,255
28
https://github.com/Militia
code
- flipstatus 1 Create a virtual Solari Board showing feeds from around the web - Rails-3--Haml--Sass--HTML5-Boilerplate--Less-framework 1 An initial project template with Rails 3, Haml, Sass, HTML5 Boilerplate, Less framework & Live.js. - retrospectiva 1 Open source, web-based agile project management, featuring: Goal planner, Story management, Issue-tracker, Code review, SCM Integration, Wiki & Blog. It is intended to assist the collaborative aspe… - Split-Flap 1 Simulated Solari Board - sso-devise-omniauth-client 1 Single Sign On Client for Custom Devise & Omniauth setup Contributions in the last year 0 total May 22, 2014 – May 22, 2015 Longest streak 0 days No recent contributions Current streak 0 days No recent contributions
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207925917.18/warc/CC-MAIN-20150521113205-00055-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
742
8
http://www.python.org/search/hypermail/python-1994q2/0842.html
code
The abstract for mmtc.ps starts: > Two major obstacles preventing the wider acceptance of multi-methods > are concerns over the lack of encapsulation and modularity and the lack > of static typechecking in existing multi-method-based languages. The first point is the one I picked up on, and is echoed in the abstract > ... existing languages with multiple dispatching do not encourage the > data-abstraction-oriented programming style that is encouraged by > traditional single-dispatching languages; instead existing multiple- > dispatching languages tend to foster a function-oriented programming > style organized around generic functions. ... So I assume the papers will address my vague fears about those points in The second point may be worse: I assume that "concern ... for lack of static typechecking" is a combination of "safety" worries and an academic euphemism for "runs like a pig" <wink>. I did note that the body of profiles.ps mentions that profile-feedback-based compiler optimization of polymorphic dispatch sped up Cecil programs by a _factor_ of 2 to 4. Where on the spectrum from "wow! they sure did a good job on the optimizer!" to "wow! naive runtime multi-method dispatch is incredibly slow!" the truth lies is hard to say. Also hard to say how well a different worldview _could_ fit into Python; or how well Python's would fit into Cecil's <wink>. Whatever, I'll delay speculation until reading the stuff. Quick random responses: > > > [marc w] > > > Adding some support for testing whether some class is a (direct or > > > indirect) subclass of another probably wouldn't hurt. > > [tim, sez you can write this in python now] > [marc w] > For a basic dynamic dispatching system (like for arithmetic), doing such > a lookup completely in C would probably be a big performance advantage. Yes, but Python as it is doesn't go thru the general class mechanisms to figure out dispatching for built-in types, and neither can built-in types be used as base classes in Python. So Guido would have to change the language in deep ways before inheritance testing became a performance bottleneck for most people. > > OTOH, it's unclear that it's a Good Thing to separate the implementation > > from the class body. > IMO, that's a question of having a good development system. It's already > possible to add features to an object dynamically, and without expecting > a reasonable placement of statements, functions, methods and classes, an > OO software will always be a mess for maintainers. Agree it's a question of adhering to good style, but as in the recent Syntax Wars, it's always nice if an Objectively Correct style both exists & is enforced by the language. Think it is worth _something_ that special methods have to follow certain rules today; everything's a tradeoff. > > [sketches an ambiguous multi-method scenario] > Particularly for languages without full static typing, I would signal an > exception in such cases of ambiguity (at call time). I would too, but that's part of my "speed" concern: in a language with _no_ static typing, and no optimizer on the horizon, dispatches requiring complex searches are going to be s-l-o-w. Single-dispatch is already very slow in Python when it needs to search up an inheritance chain; crawling up multiple chains thru a general DAG at runtime is almost scary. But I can't yet picture exactly how this works in all cases, so can't rule out the possibility of efficient runtime support a priori. Ditto wrt your later sketch of how coercions might work out. > > Marc, you're not a heretic! > Oh, then it seems I'll still have to work a bit on that - wait until you > see my further suggestions to transform Python into a combination of Ada > and Common Lisp ;-) X3J3 has been charged with adding object-oriented features to Fortran-90's successor too, and I'd hate to see us miss a trick <wink>. Speaking of which, I also picked up a copy of the CLOS Meta-Object Protocol spec, and noted that it alone runs well over 100(!) pages. To become a heretic requires a bold act directly opposing a central tenet of The Doctrine: you'll never become a heretic by proposing 50,000 new words' worth of downward-compatible doctrine. Python, like capitalism and love, eventually co-opts all who seek to change it <grin>. > [a cogent stab at sketching more-precise rules] > If there is more than one method in the most specific set, the call cannot > be resolved; raise an exception, too. One might think of some explicit way > to react to such ambiguities on a per-class and/or per-method basis, but I > wouldn't recommend a default handler for this case. Another possibility (well, there are of course many, but I'm trying to restrict it to cases that aren't obviously nuts ...) is that _all_ the most-specific methods should be invoked. Doesn't CLOS do something akin to that (with something like "call-next-method" used to invoke "the next" matcher)? Whether or not CLOS does, it's an interesting possibility. > ... Though it's easy to think of other schemes based on the remaining > sets computed above, they will usually lead to ambiguities and/or > unexpected behaviour. OK, and I'll happily agree to consider just the obvious cases before worrying about bizarre variations. Strike the preceding paragraph from > [steve m] > Of course, Guido already has a title: "Guido". If he ever hands it > down to a successor, it will become a generic name, sort of like Poor Guido -- his already _is_ a generic name! I've noticed too that I use "Steve M" as a generic name for "someone who will do the sickest thing possible with any proposed feature" <wink>, much as you use "Tim" as a generic name for "obnoxious wet blanket who can't understand a word anyone says" <grin>. We've all existed forever; we'll never die <smile>. > BTW: Thanks, Marc, for directing the discussion AWAY from > whitespace/block-delimiters syntax to something more interesting! ;-) Isn't that odd? Mailing lists do tend to focus on one topic at a time, but I thought the usenet group would tend more toward multiple active threads than it has so far. y'rs - tim Tim Peters [email protected] not speaking for Kendall Square Research Corp
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164954485/warc/CC-MAIN-20131204134914-00099-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
6,166
99
http://www.geekstogo.com/forum/topic/245120-ntldr-error/page-2
code
Since this error happens when you boot from CD, we can eliminate hard drive problem. I suspect, there is something wrong with that single RAM stick. I'd replace it with two new 512MB sticks. XP with 1GB of RAM will be flying anyway. That's my advice, short of going to the computer shop for further diagnose. Alright. Is there somewhere I can purchase replacements, as well as instructions on how to install them? Or any specific branch of technicians I should go to if further diagnosis is needed? Terribly sorry for being pesky- but I also noticed this: After an attempt to boot from the CD after running memtest, I received an error I had before that showed up before my original adapter died, and hasn't showed up on this new one until now. "The AC adapter type cannot be determined. Your system will operate slower and the battery will not charge. Please connect a Dell 90W AC adapter or higher for best system operation. To resolve this issue, try to reseat the power adapter. Strike the F3 key (before the F1 or F2 key) if you do not want to see power warning messages again. Strike the F1 key to continue, F2 to run the setup utility Press F5 to run onboard diagnostics." Edited by Ludo Siren, 13 July 2009 - 04:13 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937780.9/warc/CC-MAIN-20180420120351-20180420140351-00069.warc.gz
CC-MAIN-2018-17
1,226
14
https://reviews.reviewboard.org/r/12260/diff/
code
Enable expansion of resource links in unit tests. Review Request #12260 — Created April 26, 2022 and submitted — Latest diff uploaded URLMapTransportnow supports the ?expand=query string argument, allowing links to be expanded. When set, the transport will look up any links listed and try to expand them in the resource before returning it (and will also attempt to recurse into the expanded resources and expand links within those). If an expanded URL is not registered, or it's mapped to a HTTP 404 response, then the expansion will be empty ( Normally, a list will be expanded to a list, and a dictionary to a dictionary. This can be overridden to expand a dictionary into a 1-item list of dictionaries (needed for review request drafts, due to a design flaw in the original API). This is done through a dictionary that can be set during URL registration. Made use of this with some in-development unit tests. All tests pass on all supported versions of Python. Same for all existing tests as of this change.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818468.34/warc/CC-MAIN-20240423064231-20240423094231-00619.warc.gz
CC-MAIN-2024-18
1,016
18
https://www.xda-developers.com/how-to-create-a-java-filefilter-with-a-picture-guide/
code
How to Create a Java FileFilter with a Picture Guide Java is a programming language that is used to code software for many devices, including Android. It’s criticized by many, but Java is still widely used, mostly because its ability to run properly across many OSes as Windows, Linux, and Mac OS. Quite a few tools available on XDA are written in Java, including the Sony-specific Flashtool application, CASUAL, and so on. Here at XDA, we’ve already presented a couple of applications, guides, and tutorials for Java. You may have already noticed that Java uses classes to handle various tasks. One such class, FileFilter, was recently presented in the form of a picture guide by XDA Senior Member Beatsleigher. The guide shows you how to write a custom class from scratch, so it’s pretty nice for all beginning programmers to understand the language better. FileFilter can be used to display only a given file extension in an open window. So for example, a user can select .apk or .mp3 files only, and the rest won’t be visible. If you are working on your first Java project and it opens different file types, this guide will probably be very helpful. You can find all needed resources in the guide thread.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281069.89/warc/CC-MAIN-20170116095121-00507-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
1,216
5
https://shift.orcicorn.com/about/shiftbot/
code
SHiFTBot is an umbrella term that encompasses the collection of scripts that power the SHiFT & VIP Code archive as well as a variety of Twitter accounts. It began as a single PHP Script in 2012 and has evolved into a mix of Python, Bash, PHP and Webhook scripts. None of these scripts are public as they’re highly customized for their operating environments but below is a general outline of how it all works. This is the primary script that automates a lot of the behavior of the website and Twitter accounts. I refer to it as a “He” because it can be pretty tempermental and really stupid at times but tries really hard. SHiFTBot has gone through a lot of interations over the years but as of 2019 he exists as a Python 3 script running on Debian. Every 5 minutes he is asked to go out and check the timeline of some pre-configured accounts stored in an SQLite database. Using regular expressions he looks through the last 10 Tweets for each account searching for SHiFT Codes, Rewards and Expirations. It’s a pretty mundane operation with boolean matches but he can also perform partial matches to increase his search result confidence. Once a code is found he must then determine if it is new or not. To do this he checks his own internal database of codes and if it has not been cached he then takes it a step further and checks dgSHiFTCodes to see if maybe I, the human, have already tweeted it out. If a code is new, uncached and not manually tweeted then he has to check what configuration mode he is running in. If he is 100% sure this is a new code and he’s in retweet mode then he’ll create a Website Archive, publish it and then share the tweet on Twitter. However, if he’s running in notification mode or only has a partial match then a Pushover Notification will be sent for manual review. This helps reduce the amount of unnecessary timeline spam and arises directly from an issue in 2017 where an older version of the bot decided that anything about ducks was worth a retweet. True story, it was really weird. This auxillary script performs almost all the same operations as the parent script however it only checks for VIP (Vault Insider Program) codes. The matching is a lot more looser as generally these codes are published in long english sentences meaning it’s harder for the bot to detect. When a new VIP Code is found, much like its parent script, it checks for tweet/notification mode and operates as requested by either sending a new Tweet or just sending a notification for human interaction. SHiFTBot-VIP runs every 5 minutes as well. In October of 2019 it became increasingly obvious that a large portion of new followers were only interested in Borderlands 3 codes. During release these same SHiFT Codes would often expire in a matter of hours making Twitter’s curated notification system impossible to work with. To further complicate matters if you enabled account notifications you would get notifications for every game and VIP Code even if you only wanted Borderlands3 codes. This is what SHiFTBot’s little brother SHiFTBotBL3 was created for. His job is to run exactly 1 minute after his big brother and then check the primary timeline specifically for Borderlands 3 SHiFT Codes. If a code is found, retweet it to his own account dgSHiFTCodesBL3 . That’s it, that’s all. Now followers can enable account notifications specifically for this account and ONLY get alerted when Borderlands 3 SHiFT Codes are published. It is the best of both worlds for everyone involved. Followers get specifically what they want, and I get a lot less complaining when I publish codes for older games, VIP points or community giveaways. In January of 2020 the SHiFTBot-FAQ script was added to the suite. This script monitors the Twitter timeline in real-time and looks for Keyword Triggers sent from the human. When a trigger is detect it parses the configured reply and sends it back. This is useful for some Frequently Asked Questions as well as for dynamically pulling back data about the most recent codes or links to the site. When a giveaway is set up on Twitter, this script is what is used to monitor submissions and randomly pick a winner. Prior the script’s creation I was paying a 3rd-party service betwee $10 and $20 everytime a giveaway was run. This script is not only saving money but also demystifies the process of picking a winner. Previously I had to trust the service to function while now I know exactly how winners are picked and how the Twitter API is utilized. SHiFTBot WebUI (Private) Another portion of the SHiFTBot Suite is the WebUI. This password protected, unlisted, private site allows for the remote management of everything SHiFTBot Related and untethers all the management operations from an in-house laptop. With the mobile-first WebUI SHiFTBot can toggle notification/retweet modes as well as manually create SHiFT and VIP code archives on the public website. The WebUI consists of a series of PHP 7 scripts and classes running in Apache alongside a small BASH script to push commits to the remote Git repository. It is designed to run independantly of the public facing site utilizing Github as the deployment middleman. The public website (where you’re reading this) has gone through 3 rewrites since being released in 2012. Originally it was a place to sign-up for email notifications, included just 3 RSS Feeds and was written in PHP 5.6. However the email service became cost prohibitive very rapidly and new sign-ups were disabled within the first few months. The site remained as is for the next 5 years with only a Twitter cache updating hourly. In 2017 the site was rewritten in PHP 7 for security purposes and it was greatly simplified. For all intents and purposes it was really just a mirror of the Twitter account. This all changed in 2019 when I decided to spend some time building out the site to be a proper SHiFT & VIP Code archive. My primary concern was keeping the site fast and lightweight. By this time the Twitter account’s followers had exploded and I was worried about how expensive it might get to have a dynamic PHP enabled site running. I figured that since there are rarely more than a code or two a day it would be smarter to create a static site that updates on demand rather than dynamically generate content on every page load. This could reduce my server costs and allow for aggressive cacheing policies. I opted to go with Hugo which is a static site generate written in Go. With a bit of a learning curve I was able to customize it suit the websites needs and integrate near seamlessly with the existing SHiFTBot infrastructure. Keeping inline with the “speed-is-king” mentality I set up a seperate virtual machine with nothing more than NGinX and Git installed to keep the site lightning fast and scalable. As demand for the site grows load balances and additional cloud VMs can be added with relative ease. GitHub & Webhooks To marry the public and private websites together I utilize a private Github repository along with Webhooks to setup a continuous deployment path. When a new commit is pushed to Github a webhook is triggered that reaches out to the public server and informs it that new content is available. If the signatures pass authentication then a localized BASH script runs to synchronize the local repository and request that Hugo recompile the website. Once Hugo has recompiled the site then RSync is activated and new or changed content is copied to the public path that powers this website. My local development environment for managing SHiFTBot is a KUbuntu 18.04 desktop with PyCharm, PHPStorm and Insomnia Rest. I have an inhouse hypervisor running ProxMox that powers a series of virtual machines and containers containing Apache, NGinX, Gitea and Dokuwiki amungst other non-SHiFTBot related resources. The website is written with a mobile-first / responsive approach so testing is done primarily though resizing Chromium and Firefox browsers then loading an iPhone and android device to ensure functioning mobile displays. - Languages: Python 3, PHP 7, Bash 5 - Platforms: Debian, Proxmox, KUbuntu - Servers: Apache, NGinx, Webhooks - Utilities: Hugo, Git, RSync, SQLite3, Certbot - Code Hosting: Gitea, Github - Libraries: Tweepy, DateParser, GitPython, DateUtil - IDE: PyCharm, PHPStorm, Insomnia - Other: TweetDeck, Pushover, Dokuwiki - Hosting: Digital Ocean - SHiFTBot.py : 881 lines (+143 Config) - SHiFTBot-VIP.py : 651 line (+72 Config) - SHiFTBot-BL3.py : 351 lines (+11 Config) - SHiFTBot-FAQ.py : 386 lines (+182 Config) - SHiFTBot-Giveaway.py : 401 lines (+18 Config) - SHiFTBot WebUI : 1479 lines - Public Website : 781 files - Avg hits/month ~3 Million - Avg page paint 1.82 seconds - Avg page load 0.52 seconds - Avg Hugo compile 1.097 seconds - 77.2% of all vistors are mobile - 63.6% of all vistors are american - Twitter @dgSHiFTCodes - Avg replies/day: 23.8 - Avg top-level tweets/day: 1.4 - Avg top-level engagement: ~32,000/24h - Avg top-level impression: ~350,000/24h - Anxiety pills per day: 1 - Disdain for Justin: Infinite
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644506.21/warc/CC-MAIN-20230528182446-20230528212446-00441.warc.gz
CC-MAIN-2023-23
9,094
52
https://retohercules.com/explore/the-truth-value-of-an-array-with-more-than-one-element-is-ambiguous.-use-a.any()-or-a.all().html
code
(Illustration of 3-by-4 array as a grid and as an array That look like this which then look like this: ! Distribution of the labels ... axis=1), ... np.argmax(y_pred, axis=1)) >>> cm array([[1, 0, 0], [0, 0, 0], [0, 1, 1]] >>> from mlxtend.plotting import plot_confusion_matrix >>> ... This means a single row in your BigQuery table can contain an array of user properties, as well as an array of events, which in turn also have their own ... data with fit enter image description here menecken commented Aug 6, 2015 The truth value of an array with more than one element is ambiguous. Use a. any() or a.all() ValueError: The truth value of an array with more than one element is ambiguous. Use a.any() or a.all() · Issue #1 · renmengye/imageqa-public · GitHub Data information I checked the previous answers but I don't know where to use a.any ... mjr225 commented Jan 2, 2018 This comment has been minimized. ValueError: The truth value of an array with more than one element is ambiguous. Use a.any() or a.all() · Issue #12 · vmaffei/dada2_to_picrust · GitHub It works fine: enter image description here c# program convert array list to array example Java - Convert String to ArrayList ArrayList is a resizable-array implementation of the List interface. It implements all optional list operations, and permits all elements, including null . ArrayList in Java - Removing Element [Java Tips] Add Array into a List and convert a List into an Array Convert arraylist to array. Java example Convert arraylist to array. Java program an code toArray(new Boolean[booleanList.size()]); // Loop through the converted Boolean Array tv.setText(tv.getText() + "\nBoolean array (converted) : "); for(int ... Java ArrayList to Array Array to ArrayList In Java ArrayList to Array Conversion in Java : toArray() Methods - GeeksforGeeks Java Array Exercises: Convert an ArrayList to an array Java : Converting ArrayList to Array and Array to ArrayList - Top Java Tutorial Convert Arraylist to Array in Java Convert Integer ArrayList to Integer Array in Java Android with example Array to ArrayList
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986653216.3/warc/CC-MAIN-20191014101303-20191014124303-00559.warc.gz
CC-MAIN-2019-43
2,089
32
https://marcanuy.com/en/projects/personal-website
code
Multilingual website to hold my personal information and web projects list. I wanted a CMS without databases until I find the great Jekyll generator. I designed it to be multilingual without plugins so It can be hosted at Github Pages and to keep the code clean. Marcelo Canina personal website project - Simple interface - Project list - Ruby; Jekyll - free iconsDB icon set (http://www.iconsdb.com/) - Initializr, Twitter Bootstrap, responsive design
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886105341.69/warc/CC-MAIN-20170819105009-20170819125009-00387.warc.gz
CC-MAIN-2017-34
452
8
https://www.experts-exchange.com/questions/20183776/Assigning-default-file-when-using-the-input-type-file.html
code
Hi I am using a file dialog to select an image and I want to set or assign in the text box the default filename what I wrote is: <INPUT TYPE="FILE" NAME="fileImage" title="Browse Image" value="Default.gif">Image</INPUT> but using the value="Default.gif" doesnt put the text default.gif in the text box of the component. Can anyone tell me how I can place the default file name on the text box of the file component. You know when using the file component you have a text box and a browse button. I want to put the default filename in the text box. Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893300.96/warc/CC-MAIN-20180124030651-20180124050651-00241.warc.gz
CC-MAIN-2018-05
566
5
https://community.glowforge.com/t/engraving-going-all-the-way-down/57290
code
Okay what could I be doing wrong? Design is an SVG I made in Illustrator. Two layers basically, the engrave detail and the outline cut. Using Medium Maple Hardwood. (yep, checked) Engrave Layer first - I am using SD and changed the speed to 500 (the rest are defaults). Full power. Cut - Proofgrade cut no changes Perhaps I should leave the speed at 1000? Check out this thread If you have the speed at 1000, you’ll probably want the power for the engrave to be around 50-60% (of course this depends how deep you want it). Yes, leave the speed at 1000. The slower you go, the deeper it’s going to burn into the material. (As in…all the way through.) High Power with Fast Speeds. Low power with slow speeds. (Think about it as how long you are holding the flame against the wood. Slow keeps it burning longer, eats away more material.) Thanks. Got it. I tried it at default and that was better. I appreciate it! Thank you for the answers @Jules and @PatrickN. I’m glad this resolved it! I’m going to close this thread. If you run into any other trouble, please start a new topic, or email us at [email protected]. We’re here to help!
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00505.warc.gz
CC-MAIN-2022-40
1,144
14
https://awesomelib.com/dotnet/ui-automation
code
:tea: iOS UI Automation Test Framework UI Automation Framework for Games and Apps Command-line tool for robotic process automation (RPA) by AI Singapore UI AutoMonkey is a simple stress testing script for iOS applications that runs in UI Automation and Instruments. Grass fed. Free range.... Minimalistic graph card for Home Assistant Lovelace UI A cross-engine test automation framework based on UI inspection Android ViewServer client Using UI Automation to automatically generate all screenshots of your iOS app, on different device types, in different locales by running a single command. Hands f... (Donot use 3.7.6,3.8.1):snake:Python 3 wrapper of Microsoft UIAutomation. Support UIAutomation for MFC, WindowsForm, WPF, Modern UI(Metro UI), Qt, IE, Firefox, Chr... UI automation library for .Net FluentLenium is a website & mobile automation framework which extends Selenium to write reliable and resilient UI functional tests. This framework is React ready.... Minimalistic media card for Home Assistant Lovelace UI UI Automation + YUItest driven acceptance tests that can be hooked into Jenkins UI.Vision RPA (formerly Kantu) - Modern Robotic Process Automation plus Selenium IDE++ App-inspector is a mobile UI viewer in browser. taskt (pronounced 'tasked' and formely sharpRPA) is free and open-source robotic process automation (rpa) built in C# powered by the .NET Framework... Swift framework containing a set of helpful XCTest extensions for writing UI automation tests Simple Fluent API for UI Automation Native UI testing / controlling with node Web Automation for Java This library allows easily record video of your UI tests by just putting couple annotations. Unity UI Test Automation Framework Simple vimium/vimperator style navigation for Windows applications based on the UI Automation framework.... Inspection tool for Windows accessibility API information (MSAA, IAccessible2, UI Automation, ARIA, HTML DOM)... Quickstart project for test automation, covering performance, ui acceptance and api acceptance testing... 自动化测试,支持接口自动化、WEB UI自动化、APP UI自动化、性能测试 webtau - web test automation. REST and UI testing framework. Inspect tool to inspect UIs from an automation perspective Java wrapper for ms-uiautomation The home of the Prefect UI UI.Vision: Open-Source RPA Software (formerly Kantu) - Modern Robotic Process Automation with Selenium IDE++... Pytest测试框架,UI, API, DataBase,部分功能已封装,可根据实际需求修改 Appium UiAutomator/UiObject2-based server for Android UI automation. This module is used by appium-uiautomator2-driver component... UI and Automation to cut, filter and join high quality webms, mp4s or gifs.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038067870.12/warc/CC-MAIN-20210412144351-20210412174351-00511.warc.gz
CC-MAIN-2021-17
2,727
34
https://ja.buzzvil.com/2014/06/05/buzzvillian-story-john-en/
code
Every two weeks, we feature one of our outstanding Buzzvillians on our blog. Get to know us, hear our stories, and find out how we came to be part of this dream team! John Gwanwoo Lee, CEO & Co-founder WHAT’S YOUR STORY? Ever since I was young, I was deeply interested in making new things, so my childhood hobby was to bring home thrown-away monitors and remote control cars to disassemble. In the fifth grade of elementary school, I received a presidential award for my idea of a door lock device, and with the scholarship I received, I commercialized the product in Korea and Japan. In order to earnestly learn how to start my own company, I entered the business school at Seoul National University, but became frustrated with the curriculum, which was far from cultivating an entrepreneurial spirit. I hovered around the college of engineering instead, and in my first year in university, I jumped into a startup opportunity. With a friend from a student club, I established a mobile code solution business called Insight and Company, followed by a copyright management solution business called Postwing, then a social commerce business specializing in restaurants called Dailypick, which was acquired by Ticketmonster where I served as COO. Because most of the startups I founded were acquired within the timeframe of 4 months to 2 years by companies such as NHN or Ticketmonster, SoftBank Ventures Korea’s VP Dong-seok Kang nicknamed me “Single Hitter” (or “Slap Hitter”). Now, I’m focusing on scoring a long hit in the global market. I’m a real Busan guy, dreaming of changing the world with my ideas and running forward with a determination to embrace the Pacific. After successfully wrapping up with Dailypick, I was invited by SNU professor Bae In-Tak to lecture for a course called “Entrepreneurship and Economy,” which I had registered for as a student just the previous semester. In this lecture, I saw the familiar face of Young-ho Lee, who was my junior by one year at SNU and is now co-CEO at Buzzvil. Young was working on a startup idea and asked me for advice, and as we continued to brainstorm ideas, we naturally came to found Buzzvil together. Young has the ability to gradually draw you in, so I sometimes refer to him as a “swamp.” WHY DO YOU LOVE WHAT YOU DO? In the fourth grade, I read a novel titled “The Mugunghwa (Hibiscus) Has Bloomed” and was impressed by the character of a nuclear physicist named Dr. Lee Hwi-So. I then resolved to become a physicist myself and change the world with my ideas. By opportunities of chance, my inventions led to startups and I came to believe that through startups, you’re able to change the world much more quickly than you might have imagined. In this way, through several startups, my ideas have been made into reality and I’m appreciating the process of changing the world in this way. I believe that being an entrepreneur is like being part of a composite art on a canvas, and as such, I am responsible for the work of constantly painting a mural so that all the members working together can look and run towards one united vision. I feel happiest when I’m brainstorming with my teammates over a few beers on a Friday night, and I enjoy working my brain until it feels like jelly. OFFICE HOT SPOT Ping-pong room. 7 years ago, our team of 3 received a housing redevelopment crawling with cockroaches, free of charge, and we founded the company, Postwing. At that time, we invested a small fortune of ₩250,000 (approx. $244 USD) to purchase a ping-pong table. It was donated to a friend’s venture company, and two venture companies later, the ping-pong table was returned to me after I founded Buzzvil. It’s a ping-pong table that holds many startup stories. In our previous office in Yeoksam, as our team grew and we began to run out of space, there came a point where we had to give up either our meeting room or our ping-pong room. We boldly gave up our meeting room and by having our ping-pong table serve doubly as a conference table, we defended our ping-pong table to the end. My attachment to our ping-pong table is to the extent that even when moving to our current office near Seokchon Lake, we designed our conference room to fit the measurements of our ping-pong table. This ping-pong table is here to stay for as long as Buzzvil is in existence. YOUR “IMPOSSIBLE” DREAM My “impossible” dream is “to change the world with my ideas” and I am realizing this dream through startup opportunities. Ultimately, I want to create a social enterprise that connects and offers dreams to a population of 7 billion. MOTTO TO LIVE BY Dream the impossible. Pursue the impossible love. Fight the unbeatable enemy. Resist the unbearable pain. Catch the uncatchable star in the sky. - #People & Culture
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737039.58/warc/CC-MAIN-20200806210649-20200807000649-00115.warc.gz
CC-MAIN-2020-34
4,816
14
https://www.peachpit.com/articles/article.aspx?p=1670196&seqNum=3
code
The next module in the Dashboard is Plugins, which displays plug-ins in three categories: Most Popular, Newest Plugins, and Recently Updated (Figure 4.7). Clicking a plug-in's name takes you to its page in the WordPress Plugins directory. You can also install one of the listed plug-ins just by clicking the Install link next to it. I explore plug-ins in depth in Chapter 14. Figure 4.7 This module highlights plug-ins that may be of interest to you.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057861.0/warc/CC-MAIN-20210926114012-20210926144012-00118.warc.gz
CC-MAIN-2021-39
450
2
https://blockchain4sdg.com/forum/topics/order-pfizer-ciplox-usa-ciplox-iv-dose/
code
Random Internet Quotes: This medicine ciplox online nootropic communities for genoa clinic service for convenience only if you, mdlive, making them feel miserable. It provides a first-class, inventions, sahar is also point to write illegal entry of short years i would be configured to buy ciplox tz dosage forms of this website design and are challenging but not covered under part organized in order the headings of people monthly to work and the relationship-building of a healthy way life, this to seven years along the word identical is the animals and 20 hours that an allergic reaction. Medicine. Ciplox buy ciplox cod saturday.. Including hmos and pons in order from your prescriptions. The suggestions coming up or just blindly take a pathophysiologic approach should the staff more what is a, and do not affect its ok because he said it likey due to collection. And reliable in many have any practical experience that did not supply a veterinary physical exam. Job while navigating a major acquisition. They will occasionally see if you check out from store. Ciplox. It is of paramount importance to help someone you are either novel dosage forms of pharmaceutical bioengineering if you when using pills that the sites by most modafinil increases expression of patients a legal interpretation, teva had to a legal … Viewing 0 reply threads You must be logged in to reply to this topic. This site uses functional cookies and external scripts to improve your experience.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474581.68/warc/CC-MAIN-20240225035809-20240225065809-00555.warc.gz
CC-MAIN-2024-10
1,480
5
http://stackoverflow.com/questions/6599436/as-of-2011-netbeans-7-or-eclipse-indigo-for-c/6736008
code
I'm a huge fan of Netbeans. I am in a similar situation to yours, but creating the project was very easy. Just point Netbeans at where the code is checked out and it figures out most things for itself. I rarely have to do any configuration. One thing to note though, if your tree is very large, it can take some time to fully index - and while it does, memory and cpu will be hosed on the box. The integration with cvs is awesome, and the Hudson integration is very cool for CB. I've not used Git myself, though I should imagine it's a no-brainer. One thing that does irritate me no end is that it does not behave very well with code relying heavily on templates. i.e. shows lots of warnings and errors about types not being found etc. I have not used the latest version of Eclipse, I tried the major release before the current one and gave up because it did not have the same smooth project integration with the makefiles etc. I find it's not as nice if you don't want to use it's make system - though I could be wrong. I don't use any of the code formatting provided, I instead prefer something like AStyle instead. I know that NetBeans does a good job with Java - but have not used it for C++. CDT I seem to remember doing some odd stuff with indentation when formatting C++ code - esp. if templates are involved - but that was atleast two years ago. Hope some of it helps - the best way to do this is to download and try for yourself and see what works for you. Anything we tell you is purely subjective.
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802771133.144/warc/CC-MAIN-20141217075251-00068-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
1,508
6
https://discourse.julialang.org/t/why-am-i-getting-the-message-failed-to-revise/84675
code
I installed the package FinancialToolbox, and tested it as recommended: The package passed the test but there was a ‘Failed tp Revise’ message. There was a also a recommendation to try Revise.retry(), which I did. This is the outcome: ┌ Error: Failed to revise C:\Users\fsald\.julia\packages\MbedTLS\bYd4w\src\ssl.jl │ exception = │ invalid redefinition of constant SSLContext │ top-level scope │ @ C:\Users\fsald\.julia\packages\MbedTLS\bYd4w\src\ssl.jl:33 │ Revise evaluation error at C:\Users\fsald\.julia\packages\MbedTLS\bYd4w\src\ssl.jl:33 └ @ Revise C:\Users\fsald\.julia\packages\Revise\VskYC\src\packagedef.jl:708 I do not know if this is important, but it would be nice to know why this is happening and what does it mean. Thanks for any hints. Revise is a package used for interactive development of packages. If you do using Revise; using MyPackage then changes to the source code of MyPackage would be immediately reflected in the running Julia process (with some limitations), instead of having to restart Julia. A message like this appears when something fundamental was changed in Revise can not do a live update. Did you on purpose import Revise? If not, it was probably part of your default environment (e.g. the Julia plugin for VSCode imports Revise behind the scene). If that is the case, just try this same procedure without Revise in a clean Julia REPL (e.g. by starting Julia from the terminal, not from VSCode). If you are on purpose importing Revise because you want to use its interactive functionality… then I have no idea why this particular error is happening. A test suite for a package is not supposed to be modifying other packages (e.g. the MbedTLS package referred to in the error message). Something wrong is happening here, and I am sure either the Revise developers would be interested in tracking the issue down. Thanks. I added using Revise and the problem was solved.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337595.1/warc/CC-MAIN-20221005073953-20221005103953-00684.warc.gz
CC-MAIN-2022-40
1,929
25
https://www.nigelfrank.com/309976/dynamics-crm-developer
code
One of my clients has recently gone through one of the largest Dynamics 365 implementations in North America and is looking to hire a Dynamics CRM/365 Software Developer to work in their San Diego office. This is an awesome opportunity to work with other lively and passionate Dynamics professionals while also working directly with Microsoft as well as other Gold Microsoft Partners. You will be a key member on the Development team working on optimizing the system for their 15,000+ user-base. Put your passion to work, with a work place that has a fun, exciting and motivating environment. Benefits include employee discounts, health insurance as well as a gym membership. Requirements:* In depth knowledge of Dynamics CRMo Dynamics 365 is highly preferredo Dynamics CRM Online is highly preferred* Strong experience in Microsoft Stack Development (C#, .NET, HTML, SQL, etc.)* Strong experience in Java development is highly preferred* Leadership experience is preferred Don't miss out on this unique opportunity, email me at [email protected] or call at 818-356-8574. Nigel Frank International is the global leader for Microsoft Dynamics recruitment, advertising more Dynamics CRM jobs than any other agency. We deal with both Microsoft Partners & End Users throughout North America. By specializing solely in placing candidates in the Microsoft Dynamics market I have built relationships with most of the key employers in North America and have an unrivalled understanding of where the best opportunities and Dynamics CRM jobs are. I understand the need for discretion and would welcome the opportunity to speak to any Microsoft Dynamics CRM candidates that are considering a new career or job either now or in the future. Confidentiality is of course guaranteed. For information on the Microsoft Dynamics market and some of the opportunities and Dynamics CRM jobs that are available I can be contacted on 818.356.8574. Please see www.nigelfrank.com for more fantastic Microsoft Dynamics opportunities! Nigel Frank International Inc. is acting as an Employment Agency in relation to this vacancy.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257601.8/warc/CC-MAIN-20190524084432-20190524110432-00223.warc.gz
CC-MAIN-2019-22
2,114
5
https://meta.stackexchange.com/questions/188785/stack-exchange-sites-not-rendering-static-assets-correctly?noredirect=1
code
This is happening a lot lately. Just now it didn't happen, but you know how it looks (see here for a screenshot). I was worried that this could be a duplicate, but: I've tried clearing the cache, and switching browsers, and apparently the only thing that works is connecting to Stack Overflow through Tor (gives me a different IP address - BTW this might prove item d is not the case). Are you using any kind of IP address-based caching? Surprisingly, at this hour it renders fine and quickly. Might be some kind of traffic overload? I'm on Ubuntu 13.04 (Raring Ringtail) using Firefox 22.0.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679518883.99/warc/CC-MAIN-20231211210408-20231212000408-00213.warc.gz
CC-MAIN-2023-50
591
5
https://large-numbers.fandom.com/wiki/User:Micrintel121
code
I should make a blog post that shows a detailed history of faketest. You're reading a poorly constructed user page for a user described briefly in the section right below. About me Edit I'm a random admin of Wikia googologica who likes to help uploading photos with clouds. My favorite pages Edit - List of googologisms (size order) - Favorite page #2 (coming soon?) - Favorite page #3 (I'm out of ideas) Other things Edit Don't touch below!! Seriously, the content above is just random. You may want to check the subpages listed below. Due to an abundance of Cloudy176 subpages (with incredibly long titles), I set up this list as a replacement. If you really want to see all of my subpages go here. - What?: Cloudy's sandbox pages. Although some of those look more like a junkyard than a sandbox. - Teh Faketestz: a huge list for those who thinks the BDG isn't enough. I'm not entirely sure how this whole thing works, but I thought I could at least help by starting this page This is NOT where anyone can vandalize! - Actually, you can vandalize this page if you want to. Because I said so. - Now this category spam is deleted!!!!!
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657140337.79/warc/CC-MAIN-20200712211314-20200713001314-00444.warc.gz
CC-MAIN-2020-29
1,134
19
https://www.fiverr.com/computergenius_/make-a-batch-file-to-simplify-a-command-line-task
code
I will code a batch file to meet all of your needs. To simplify any task that must be run in the command line. Batch files reduce the need to type commands at the beginning or end of a user session. Additionally batch files can be used to schedule tasks. Like cleaning out the TEMP folder or the recycle bin and opening an application on startup. Since the command line is built into all windows computers there is no need for installations. I can also make the Batch files into executable programs (.exe)
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661289.57/warc/CC-MAIN-20160924173741-00182-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
507
3
https://www.pm-partners.com.sg/company/case-studies
code
A large data analytics firm approached PM-Partners to design a framework for delivery of their products using a Lean Startup and Agile methodology. The organisation had no project delivery framework, and employees familiar with product delivery processes were rare. Australia Post had been experiencing challenges specifically related to Programme delivery and needed PM-Partners’ assistance in creating a Programme Management Framework based on industry best practice. I recommend this course to anyone working in the PMO area. It provided a good framework that has practical application for everyone. I have taken what I learned back to my employer and am applying the principals. I've always had a great experience with dealing with PM-Partners, from using PM-Partners as a resource, to training and job hunting. I always recommend PM-Partners to people I know in the IT industry. Keep up the good work. Communicating Effectively Dean Wilson - Senior Project Manager An excellent course delivered by quality a trainer. The content is globally recognised as best practise and I recommend the course highly. Managing Successful Programmes (MSP®) Foundation CourseSteven Fowler - Project / Program Manager
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703538226.66/warc/CC-MAIN-20210123160717-20210123190717-00656.warc.gz
CC-MAIN-2021-04
1,208
7
http://www.kz-cert.kz/en/denialof-service
code
Distributed Denial of Service (DDoS) Attack is one of the most wide-spreaded and dangerous network attacks. Attack might cause the partially or even completely unavailable target service to actual visitors or users, networks, systems and other resources. Due to DDoS Attack, servers supporting web site forced to execute the fake requests and web site becomes unavailable for actual user. Who might suffer from DDoS Attack? The victims of such attack are commercial and information web sites. Lately hackers use such attacks to extort money for the sake of attack termination. How DDoS Attack is executed? The scheme of DDoS Attack is as following: the victim’s server flooded by huge number of fake requests originated from different parts of the worlds. In consequence of attack the server spend all their resources to elaborate these requests and become unavailable to actual users. The users of PCs that distribute fake requests might be even unsuspicious that their machines are under control of attackers. The software installed by attackers on these computers are dubbed as “zombie”. There are variety of ways to transform the PCs into “zombies” – from infiltration into the unprotected networks to use of Trojans. Probably, this preparatory stage is most difficult to attacker. Inside of DDoS Attack DDoS attack executed via the infected by special malware large number of PCs – botnet (zombie-network), which in response to a command launched from the server controlled by attacker start to send a significant number of special requests to target computer and thus block the access to it to actual users. The scheme includes quite many participants: those who implement software for botnet creation and execution, those who make an order for it, administer and rent it and the customer who order the attack. The botnet owners and his customers remain “behind the scene”. Information security experts distinguish the following types of DDoS Attacks: · UDP flood –flooding the target system by large number of UDP (User Datagram Protocol) packets. This approach were used in earlier attacks and recently is considered as less dangerous. Software using this type of attack is easily detected, since the data exchange between command control server and agents carried out via not encrypted TCP and UDP protocols. · TCP flood – flooding the target system by large number of TCP packets so that network resources are taken down. · TCP SYN flood – sending a large number of request to initialize TCP-connections with the target system, which, as a result, consumes all its resources to track these half-open connections. · Smurf-атака – ping ICMP (Internet Control Message Protocol) requests with broadcast distribution with spoofed source address that becomes the target of attack. · ICMP flood – attack is similar to Smurf, but without distribution. Most dangerous are programs that use several types of aforementioned attacks. In particular, TFN and TFN2K are samples of such attacks and their perpetration requires the high level of preparation. One of the newest program to DDoS attack perpetration is Stacheldracht that allow execution of different types of attacks and creation of large stream of broadband ping requests with encrypted data transmission between controllers and agents. However, the range of programs is much more extensive and constantly complemented. Due to the same reason, the description of generic reliable DDoS protection methods is quite infeasible. The generic methods of protection are not exist; however, the general recommendations to reduce the danger and attack damage are following: proper configuration of anti-spoofing and anti-DoS features on routers and firewalls. These measures limit the number of half-open connections and so prevent overloading of system. On the level of server, it is desirable to have the server’s console output to other IP-address via other SSH-protocol to remote server restart. Another sufficiently effective method of DDoS attack mitigation is IP-address camouflage. How to prevent the DDoS Attack? Combat with this type of attack is quite difficult since the requests are coming from different sides. As a rule, the defense includes such activities as infiltration and black holing, server’s vulnerabilities elimination, resource expansion, decentralization (building distributed and duplicated resources in order to continuous users’ maintenance), deviation (deviation from direct attack from other connected resources, IP-address camouflaging). Early DDoS Attack detection If you possess own servers you should have means to detect attack targeted to you. The earlier you detect the availability issues caused by DDoS attack, the earlier you might take measures to repel it. One possible way of DDoS detection is mechanism of inbound traffic profile. If you know the average volume and dynamic of traffic change on your server, you have better chance to detect anomalous behavior. For majority of DDoS attacks typical the abrupt rise of inbound traffic, at that the profile mechanism signals whether this rise is attack or not. The effective way is enabling the complementary connection channels, even if the throughput calculations show that they are needless. In this case, you will be able deal without consequences with the abrupt traffic rise, e.g., that are result of advertising campaign, special offers or citation of your company in mass media. The difficulty of DDoS defense: · Inherent network vulnerabilities. The lack of vulnerabilities within network explored by attackers. The attack is successful because of practically all computer platforms have some threshold for inbound traffic. PCs, clusters and cloud systems – all of them – have physical limits on number of requests executed in particular period. Successful DDoS attack should simply generate sufficient volume of traffic to exceed this threshold number. In order to eliminate the majority of other attacks, it is sufficient to use special patches, configure security systems or change policies. However, neither of these approaches have the effect to DDoS. Services should be always accessible and consequently they are vulnerable to such attacks. · Impossible to block the crowd. DDoS is difficult to block since the attack might originate from many different sources. The effective defense from the attack perpetrated from the large number of IP-addresses is difficult. Potentially thousands of IP-addresses should be simultaneously added to blacklist to stop the attack. If the attacker use spoofing, the innocent hosts might fall into blacklist. · Search of liable side. Here we deal with third issue: it is difficult to distinguish between the users who execute legitimate requests and those who participate in DDoS. Since the computers that got the access to server, create the load to the server, all of them even without their consent participate in attack. There is necessary to provide accurate check to distinguish between “good” and “bad” hosts. It is necessary to make many calculations and make them quickly before making any decisions. The targets of DDoS Attack The critical in defense from DDoS attack is delimitation of potential dangers. In respect to attack target there are exist: · Heavy packets with spoofed source addresses that exhaust the connection channels and make impossible the access to website by legitimate users. The high throughput of connection channels might help to defend from this type of attack. · If the system resources are subject to attack, the system performance degrades and, as a result, the system works slowly and even crushes. The attackers perfectly know which data packets necessary to send the victim for download. · Software vulnerabilities used to execute crushing attack that can change configuration and system parameters. Any unauthorized changes should be tracked and eliminated. The custom DDoS defense script is used in every separate case. Vulnerable elements are server, firewall and Internet channel · Servers are vulnerable for no other reasons than the attackers often organize their attacks so that they consume more resources than server has. · Internet channel becomes vulnerable for attacks aimed to exhaust system throughput and got the name “volumetric flooding”. The examples of such attacks that consume channel throughput are UDP-flood or TCP-flood. · Despite the fact that the firewall is the tool to provide the defense and should not serve as vulnerability used for DoS/DDoS attack perpetration, during execution of the attacks such as SYN-flood, UDP-flood and connection overload, the fraudsters might generate many states that exhausts the resources of firewall and, finally, turn it to the weak chain of infrastructure. Measures to take in case if you subject to DDoS Attack · Make sure that the attack executed. Exclude the general causes of operation disruption, including wrong DNS configuration, routing problems and human factor. · Address to technical specialists. With assistance of technical specialists define which resources are subject to attack. · Set the priorities of applications importance. Set the priorities of importance to safe most important applications. In case of intensive DDoS attack and limited resources it is necessary to focus on the applications serving as the main revenue sources. · Defend remote users. Provide the operation of your business and add IP-addresses of trusted remote users, who need access to resources, to white list. Make this list primary. Distribute this list within the network and send it to connection service providers. · Define the attack class. Which class of attack you faced with: Volumetric? Low-powered or slow? You service provider inform you about whether this attack is extremely volumetric or not. · Assess the ways to combat with IP addresses of attack sources. In case of comprehensive attack, your service provider unable to determine the number of sources. Block the small lists of attack IP addresses within your firewall. The larger attacks might be blocked on base of geo location data. · Block the attacks on application level. Determine malicious traffic and check whether it generated by well-known tool. Particular attacks on the level of application on every separate case might be blocked using countermeasures performed by you using in hand means. · Enhance your demilitarized zone Probably, you faced with asymmetric DDoS attack of Level 7. Focus on the defense on application level: use login system and persons’ recognition system. · Limit your system resources. If the aforementioned measures have no effect, then you should limit resources – thus, the “bad” as well as “good” traffic will be limited out. · Manage social connections. If the attack become public, prepare official announce and inform the stuff. If industry policies involve this, approve the fact of attack. If no, reference to technical difficulties and recommend the stuff to address all question to Header of the Department on Public Relation. In preparation of this article, KZ-CERT used open source information.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783000.84/warc/CC-MAIN-20200128184745-20200128214745-00112.warc.gz
CC-MAIN-2020-05
11,192
50
https://mono.github.io/mail-archives/mono-devel-list/2005-January/010125.html
code
[Mono-devel-list] Embedding Mono in a Virtual World jimpurbrick at yahoo.co.uk Fri Jan 28 04:46:46 EST 2005 --- Tim Fries <timf at dicecorp.com> wrote: > The threads, and the regions within them, > cooperatively multitask; for the scalability > reasons already described -- and because > preemptive multitasking is incredibly expensive. How did you implement the cooperative multitasking? > Making this all work with user-supplied code is a > hurdle I haven't had to overcome, myself; but it > *is* a problem that MUDs have already explored > rather exhaustively. Yes, it's a shame the MUD-Dev archive is broken at the moment. Do you have any specific references for things I should look at? > interpreting/compiling as a state machine that you > can enter and exit at will would probably solve > that problem well enough. Which sounds like Paolo's second suggestion. ALL-NEW Yahoo! Messenger - all new features - even more fun! http://uk.messenger.yahoo.com More information about the Mono-devel-list
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655027.51/warc/CC-MAIN-20230608135911-20230608165911-00348.warc.gz
CC-MAIN-2023-23
1,001
22
http://davidstutz.de/page/2/
code
In the course of the last couple of semesters, I extended the initial comparison of superpixel algorithms in my bachelor thesis to a comprehensive comparison of 28 state-of-the-art algorithms on 5 datasets with regard to quantitative and qualitative performance. The results are now available on ArXiv. This article presents a Kohana demo application demonstrating the compatibility and use of several Kohana modules I wrote in the course of the last few years. The application is compatible to Kohana 3.3.6, 3.2 and 3.1 and available on GitHub and among others includes Kohana Red, an authentication module, Kohana Green, an access control module, and Gaps, a form generation and validation module. In this series, I collect some useful insights when working with Ubuntu. This time: Compressing and Splitting in Nautilus using 7zip, tackling “Cannot find ang0 in all drives” and creating Cisco VPN Connections. More Ubuntu problems I cam across. This time: mount.ntfs at 100% CPU usage, how to install a LESS compiler in Ubuntu, and how to handle annoying background scanning in Netbeans. Running C++ projects on Travis CI may be challenging depending on the libraries used. Here I briefly describe how to run OpenCV and Google GLog on Travis CI. Given a GitHub project with Jasmine tests, this article discusses how to automatically run the tests in Google Chrome on Travis CI. There are many things worth knowing about studying computer science at RWTH Aachen University. This article presents a collection of tips and tricks regarding specific courses as well as studying computer science in general. In the course of a seminar on “Selected Topics in Image Processing”, I worked on iPiano, an algorithm for non-convex and non-smooth optimization proposed by Ochs et al. . iPiano combines forward-backward splitting with an inertial force. This article presents the corresponding seminar paper including an implementation in C++ with applications to image denoising, image segmentation and compressed sensing. This series collects tips and tricks for working with Ubuntu: installing Jupyter/IPython, Caffe not finding CUDA, NVidia login loop and monitoring GPU usage.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187792.74/warc/CC-MAIN-20170322212947-00065-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
2,178
10
https://www.nioguard.com/2017/02/
code
Wednesday, 15 February 2017 According to the .eml file that was uploaded today to VirusTotal, unknowns tried to run a targeted attack on the National Police of Ukraine. The email (MD5: bec01fe3b14b3da507a6a4c5c698e8ed) was sent to [email protected] with the fake login page attached as an html file (MD5: 5dca48afe347db9e9f9cab9c824c122d) a week ago. Thursday, 2 February 2017 Recently, our laboratory analyzed the new version of DeriaLock (MD5: 0a7b70efba0aa93d4bc0857b87ac2fcb). This version of DeriaLock is unique because of two reasons. First, it demands to pay the 30 USD/EUR ransom to the Skype account. Second, DeriaLock incorporates three types of functionality: SystemLocker, CryptoLocker, and FileKiller within a single attack. If you managed to remove the DeriaLock infection and keep your encrypted files, you can start now decrypting your documents using the encryption key and initialization vector calculated by our script based on the password string extracted from the analyzed version of DeriaLock: AES-256 key: 9c9e1ba2ee5b86494b7e1ebba6420ee6ab64ce6d678604eb5b5049b210693743 To decrypt '.deria' files, you can use OpenSSL tool specifying the discovered key and initialization vector. For example: openssl aes-256-cbc -d -in photo.png.deria -K 9c9e1ba2ee5b86494b7e1ebba6420ee6ab64ce6d678604eb5b5049b210693743 -iv 9fa4ed4d89b04ee7f3b74c9b46588e18 -out photo.pngOr use our Python script or executable to decrypt all '.deria' files that can be found on your computer.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742963.17/warc/CC-MAIN-20181115223739-20181116005739-00182.warc.gz
CC-MAIN-2018-47
1,496
10
http://open.bioqueue.org/index.php/Home/Knowledge/shareKnowledge
code
Tool name, like bwa, HISAT2 etc. Short usage hints, like bwa index [-p prefix] [-a algoType] Index database sequences in the FASTA format. Parameter list of this tool, like -p STR Prefix of the output database [same as db filename] -a STR Algorithm for constructing BWT index. Available options are: is IS linear-time algorithm for constructing suffix array. It requires 5.37N memory where N is the size of the database. IS is moderately fast, but does not work with database larger than 2GB. IS is the default algorithm due to its simplicity. The current codes for IS algorithm are reimplemented by Yuta Mori. bwtsw Algorithm implemented in BWT-SW. This method works with the whole human genome. Link to the tool's documentation or DOI id of the paper. What category does it belong to? We hope that you can provide us your E-mail address to help us contact with you, in case that we have any question when we proofread the hint. We will never tell any one else your e-mail address without your permission.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710813.48/warc/CC-MAIN-20221201121601-20221201151601-00640.warc.gz
CC-MAIN-2022-49
1,006
12
https://mail.python.org/pipermail/python-list/2005-January/302963.html
code
Free NNTP (was Re: how to stop google from messing Python code) usenet_spam at janc.invalid Sat Jan 22 04:25:47 CET 2005 Paul Boddie schreef: > JanC wrote: >> Aahz schreef: >>> You also have access to the free netnews server >> That address is now for DFN internal use only. >> Their public service moved to <http://news.individual.net/>. > To me, that seems to be the general problem with public NNTP services > - you have to play a game of following them around the net. The "http://news.cis.dfn.de/" address has worked for 1 year after they announced this change. DFN stands for the "German Science and Research Network" and is a government funded organisation, and they wanted/needed separate servers for public and member usage, so they had to find a new name for their public service: "individual.net". "Be strict when sending and tolerant when receiving." RFC 1958 - Architectural Principles of the Internet - section 3.9 More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525355.54/warc/CC-MAIN-20190717161703-20190717183703-00435.warc.gz
CC-MAIN-2019-30
967
19
https://forums.halowaypoint.com/t/looking-to-dominate-the-warzone/96659
code
Tired of using that sweet requisition and then dying after taking five steps on that unforgiving battlefield? Want a team that excels and protects you six? Then Spartan Company ATSEC is the group for you! We have 14 members and are in need of some squadmates to aid us in various deployments and projects ranging from clan battles/forging/machinima, etc. If you are interested give our company page a look. Once your application has been accepted, browse our MOS/ enlistment weebly site and introduce yourself in our private forums to the team. looking forward to having some Spartans to watch my six.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00254.warc.gz
CC-MAIN-2022-33
601
1
https://amacss.org/faq/
code
AMACSS stands for the Association of Mathematical and Computer Science Students. At AMACSS, we strive to enhance the experience of every CMS student through our academic and non-academic events. By attending our seminars and events, you are contributing to the AMACSS community! Check our about page to learn more about AMACSS, and join our social media community to stay informed on opportunities to participate in our events. Hiring for every AMACSS team (executive, academics, marketing, events, technology, finance, and first-year) is conducted at the beginning of each academic year. Join our Discord community for access to application forms, and important deadlines. Join our social media community for timely updates on our events! We have Facebook, Instagram, and Discord communities, links to all of which can be found on the navigation menu above. Check our resources page for a subset of previously held review seminars! Currently our Academics Team is expanding our coverage of CMS courses. For inquiries regarding a specific course, feel free to inquire on the AMACSS Discord Server!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00084.warc.gz
CC-MAIN-2024-10
1,097
4
https://discourse.mcneel.com/t/expression-bug-division-by-zero/112026
code
Am I missing something or is there a bug in “expression” component? I want to evaluate list of numbers a and return 0 if a==0 or r/a in other cases. But the expression tries to divide by 0 even tho I get rid of it using condition. When I use regular components, it works just as expected. expression_bug.gh (19.4 KB)
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141198409.43/warc/CC-MAIN-20201129123729-20201129153729-00563.warc.gz
CC-MAIN-2020-50
320
3
http://phoronix.com/forums/showthread.php?11610-Hacking-Express-gate-(Asus-Splashtop)&goto=nextnewest
code
Update on Google's Project Ara I'm a student at Purdue University, and I recertly heard Google's Paul Eremenko talk about Project Ara. The link below is an article that Purdue posted, so you know he actually came to Purdue, and I'm not making this up: Google's Paul Eremenko visited Purdue University yesterday to talk about the current status of Project Ara, which is Google attempt to make a modular smart phone. The talk was breath taking, and it only made me excited for the release of this new android based smart phone! If you have not yet heard of Google's Project Ara here is a brief overview. Project Ara is an ambitious attempt to make lego-like building blocks, with which one can make an android phone. These lego-blocks (more formally called modules) will come in 3 different sizes, a 1 by 1, a 1 by 2, and a 2 by 2. The modules each have an futuristic electromagnet, which keeps the phone from falling apart. The bizarre thing is that these electromagnets do not consume power in their on or off states, and you can at any time swap one module for another one! The point of Project Ara is to allow numerous people to easily design hardware, just as easily as one can design an android app. This would shorten the time it takes to bring a new phone to market. Plus it is super cool! We can expect Google to sell a small number of Ara phones sometime in 2015, after Google designs 2 more prototypes. Google current has made three sizes, and they expect to bring two of those sizes to market. The sizes are mini, medium and jumbo. The picture in this link (http://www.3g.co.uk/PR/July2014/deve...oject-ara.html) shows a medium sized prototype, which is roughly the same size as your average American-sized smart phone. The mini is 2/3 as wide as the medium, and the jumbo is 1/3 wider than the medium. Since the phone comes is modular and not monolithic, there are some downsides that come out at about 25% all across the board. The phone might be 25% heavier, it will probably 25% slower, and it also might have a 25% shorter battery life, but Google claims since phones are already super fast, one won't really care about these downsides. On the plus side, one could potentially have an infinite number of ways to combine different modules to build a unique phone. This makes it really easy and relatively cheap to upgrade your CPU or wifi module, fix your screen, or share your modules with a friend. Conclusion: Project Ara is going to be awesome. Tags for this Thread
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430453759945.83/warc/CC-MAIN-20150501041559-00059-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
2,483
9
https://eldamo.org/content/words/word-3857306375.html
code
ᴱQ. qámea adj. “sick” (Category: Sick; Sickness) Neo-Quenya: Since ᴹQ. qáme “sickness” appears in Tolkien’s later writings (Ety/KWAM), I would retain ᴺQ. quámëa for purposes of Neo-Quenya, but given the meaning of its noun form I would assume its primary meaning is “*nauseous”, as opposed to generally sick which would be [ᴺQ.] hlaiwa. Reference ✧ QL/76 ✧ qāmea “sick” |qáme||“sickness, nausea”||✧ QL/76 (qāme)| |#-a||“adjectival suffix”||✧ QL/76 (#-a)|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510528.86/warc/CC-MAIN-20230929190403-20230929220403-00578.warc.gz
CC-MAIN-2023-40
503
5
http://www.programmableweb.com/mashup/loqly
code
Mashups using the same API (159) Briteclick is a search that displays multiple sources of relevant information in a sidebar. View results without being forced to leave your current page. This site is in the heatmap collection site, and displays a map of various places/categories around the world. You can also check the flow of people in the heatmap per hour by moving the slider below... Restaurant Guide exclusively focused on restaurants that permit you to bring your own (BYO) wine -- covering 10 major metro areas in the U.S. What makes a trip to a restaurant a great experience is not just the fact that they serve delicious food and good wine, but it has a lot to do with the atmosphere and overall 'vibe' of the place. Of course, a 'good vibe' means different things to different people (some like it chilled and some like it loud and bustling), so imagine how cool it would be to be able to browse through dining options based on the exact atmosphere you're looking for. That's what Hoppit is all about; finding restaurants by atmosphere. Hoppit's API provides access to this handy functionality. Soleo, a leading cloud-based communications solutions provider, has announced the launch of a brand new "2.0" version of the Soleo API which allows mobile app publishers and developers access to Soleo's database consisting of more than 1.5 million advertisers and real-time data for over 15 million local merchants. LocationGenome is inspired by Pandora’s effort to map out the music genome, which seeks to identify, categorize, tag, and recommend music. LocationGenome would like to do the same thing for places that you might want to visit. The example offered on its site explains the obvious relation to some between organic food groceries, vitamin stores, and vegetarian restaurants. The LocationGenome API aims to help your application take advantage of this type of cross category theme. ||Pyze is a recommendations platform with an extensive events implementation which helps in adapting to an environment, and to intelligently minimize instrumentation and device resource consumption....||Monetization||11.07.2016| ||This API lets you create custom multi-Location booking forms that use the client’s zip/postal code to determine what prices and appointment schedule to offer them and returns methods for create...||Booking||10.23.2016| ||SuggestGrid is a recommendations platform dedicated to developers for easy integration. This platform can be used to create targeted advertisements and promotions, show personalized content, and...||Recommendations||09.20.2016| PlaceILive Neighborhood Matching Engine ||The PlaceILive.com Match Neighborhood Recommendation Engine API provides the functionality of the engine found https://match.placeilive.com for integration on a web site, blog or any other product....||Real Estate||09.20.2016| Unofficial Google Trends Python ||The Unofficial Google Trends Python API integrates the solutions of analytical reports, keyword suggestions, and hot trends. Parameters return JSON responses.||Reporting||09.16.2016|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541525.50/warc/CC-MAIN-20161202170901-00419-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
3,071
14
https://support.symantec.com/us/en/article.tech149743.html
code
The PGP Universal Server Certificate Revocation List (CRL) service monitors the status of keys and their associated certificates. The service is enabled by default. When enabled, the Certificate Revocation List (CRL) service can automatically generate and publish a CRL, add certificates to the CRL when their key is revoked, and allow you to download the CRL via HTTP or LDAP. To Edit CRL service settings: Login to the PGP Universal Server admin interface. Click Services > Certificate Revocation. Select the Edit button. The Edit Certification Revocation page appears. In the URLs field, type the URL(s) you want to be stamped into the CRL Distribution Point (DP) when the PGP Universal Server creates a certificate for a key. Type one URL per line. Note: To use the default CRL DP location, enter only the protocol and hostname of the URL (for example, https://examplehostname:port) and the rest of the path is stored correctly in generated certificates (for example, https://examplehostname:port/crl/RevokedCertificates.crl). To use a custom CRL DP location, you must enter the complete URL. Custom CRL DP locations are not modified in any way. In the Regeneration field, type the number of days for which a CRL is valid. The default is 7 days. When the threshold is reached, a new CRL is generated. In the Interfaces fields, type an interface and port you want stamped into the CRL DP for accessing the CRL via HTTP. You must configure one interface for each HTTP URL you type in the URLs field. You can create additional interface/port combinations by clicking the plus-sign icon and typing the appropriate information. The interfaces you configure have no effect on accessing the CRL via LDAP. Imported Document ID: TECH149743 Subscribing will provide email updates when this Article is updated. Login is required. Thanks for your feedback. Let us know if you have additional comments below. (requires login) Subscribed to the Article. Unable to subscribe Thanks for your additional feedback !!! Enterprise Support Virtual Agent Rate Me : Tell us more: Welcome! My name is Sami, the Enterprise Support Virtual Agent answering technical support questions.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146485.15/warc/CC-MAIN-20200226181001-20200226211001-00247.warc.gz
CC-MAIN-2020-10
2,162
23
https://petrbilek.gumroad.com/p/line-icon-pack-updated-and-the-future
code
I've been working on icon optimization, so you can look forward to updated paths, no more glitches and improved export to SVG. In addition, I have added 24 new icons with the loudly demanded Actions and Real Estate collections. You can download them here. :-) Now, I am developing a brand new creative set, that will soon be available for you to buy and I would like to offer you the opportunity to support the development through an early-bird donation. You can contribute any amount you like to get a 20% discount on all my other products. I would like to thank you for all your feedback, which is constantly helping me to work not only on improvements but also helping me to develop new stuff. And I promise that what’s coming is really exciting! See you next time! :-)
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363689.56/warc/CC-MAIN-20211209061259-20211209091259-00542.warc.gz
CC-MAIN-2021-49
774
5
https://getnightschooled.com/intro-to-programming/13854-intro-to-programming-essay.html
code
Hector Cruz Platon Colorado Technical University Introduction to Development Prof. Mazen Alkhatib7 January 2014 Similarities between Procedural Programming and Object Oriented Programming Method Programming and Object Focused Programming equally break down program tasks. Treatment Programming and Object Oriented Programming equally uses thready sequence of commands, but Object Oriented Programming have developed a more complicated and abstract approach (Stetson, 2004). Object Oriented Software is an extension to Treatment Program. Method Programming and Object Oriented Programming equally uses themes, procedures, or perhaps sequence of statements (Bilkent University, 2014) Differences among Procedural Encoding and Thing Oriented Development Procedure Coding identifies actions and techniques on a (step-by-step) hierarchal technique, while Thing Oriented Coding does not derive from step-by-step method and is focused on problem solving elements. Treatment Programming can be broken down to collection, changing and subroutine, whereas Thing Oriented Coding is split up into object that displays data and methods. Process Programming will operate on process of data framework, while Target Oriented Encoding does package data and methods to work on its own Treatment programming can be written in C, HTML CODE, Perl, and Visual Fundamental Script when Object Focused Programming can be written in C++, Java, and. NET language (Stetson, 2004). Encapsulation: wherein the thing has the ability to conceal all the necessary data inside the interface. Also, it is the fundamental theory of Thing Oriented Encoding (Bilkent School, 2014). info Hiding: This only interact with object strategies. The details of implementation will be strictly restricted and invisible within the user interface. It has similar structure as encapsulation (Bilkent University, 2014) inheritance: the cabability to share same characteristics based upon commonality. Subject Oriented...
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251799918.97/warc/CC-MAIN-20200129133601-20200129163601-00185.warc.gz
CC-MAIN-2020-05
1,969
5
https://www.npmjs.com/package/debugger-256
code
A debugging tool utilizing prettyjson-256 that decorates logging output to the console. Reads settings from a user-defined configuration file to control verbosity of different modules (called subsystems). This configuration file is watched for changes so the server does not have to be reloaded for filtering and formatting settings to be applied. $ npm install --save debugger-256 This module returns a function that is passed an optional subsystem name similar to the debug module. It returns 7 logging functions of different levels: Each will output as different color, and optionally be filtered by a configuration file. The basic idea is to differentiate your logging messages into these different levels, which when combined with filtering allows one to quickly see very detailed output for some subystems without being cluttered by messages from other subsystems. var debug = 'app';debug;//orvar logWarn = 'app'warn;;// orvar createDebug = ;;; const info warn = 'app:subsystem1';;; Inline string coloring THe customColors property can be assigned tags with colors during initialization to colorize parts of single line strings. var debug = 'app';debug;// wrap each string section to be colorized in parenthesis,// followed by a list of the customColor tags assigned to the key 'color'debug; Based on the debug package modular approach, debugger-256 expects to be initialized with the name of the module or 'subsystem'. Subsystems should be nested with colons, i.e. 'api:db:user' would indicate the current 'user' module is part of a parent 'db' module which is part of the root subsystem 'api'. This allows for easy filtering and formatting through the options. All options of prettyjson-256 can be passed to the 'init' function, or they can be added to the configuration file described in the next section. var debug = 'app';var initOptions =depth: 3alphabetizeKeys: truecolors:keys: fg: 032boolTrue: bg: 020;debug;debug; A configuration file named '.debugger-256' can be put in the root directory of the project to provide global options and filtering. This file is watched and changes will take effect without requiring a restart of the process. The file should be JSON format: This specifies that messages from 'app:response' and 'app:request' level 6 and lower (all messages) wouldbe output, the '*':3 specifies that app subsystems that aren't specified should only ouput messages from level and lower (only fatal, error, and warn). You can also specify debugger-256 custom options (same as you would pass as an argument) by adding them to key '_debugger-256': The dark blue lines are from 'log' calls (level 3), the light blue lines with header information are from trace calls (level 6). If we just wanted to show the log lines, change the numbers of the relevant subsystems to the maximum level you want to show (in this case log or level 3). Save the file and the filtering will be applied automatically without a server restart. To run the test suite first invoke the following command within the repo, installing the development dependencies: $ npm install then run the tests: $ npm test
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00287.warc.gz
CC-MAIN-2023-23
3,105
21
https://forum.jsreport.net/topic/862/chrome-pdf-possibility-to-extend-delay-for-downloadind-all-images/?page=1
code
Chrome-pdf : possibility to extend delay for downloadind all images ? Hi Jsreport team, first of all : Happy New Year!! Here I come today as we are trying to migrate to chrome-pdf recipe, in our usage of jsreport we need to insert lot of dynamics image for each report, ( in average more than 200 images per reports arround less than 10Ko per image) however it seems that after arround 2min of generation, no more image are being downloaded (arround 4000+ images in this scenario) and the rest of image are replaced by an image icone with the alt text for the image. Is there some config we could use to maybe increase the delay for all the images to be downloaded ? Our timeout is chrome_timeout=600000and on the studio wait for idle networkis set to true. Thanks a lot for your help!! For completeness, what version of jsreport do you use? Do you see the same on the latest, with the puppeteer/chrome 1.11.0? We use this puppeteer option networkidle0- consider navigation to be finished when there are no more than 0 network connections for at least 500 ms So based on the documentation it should download all images, however, we haven't tested this so deeply. Hi Jan Blaha, thanks for the quick reply!! We use the docker image jsreport-2.3.0-fullfor instance in a rancher environment, I asume this is the lastest version ? if this can help the final document is 27.9Mb once downloaded Indeed as per the documentation it should be loaded, so either there is a stop at some point that don't allow the download to be triggered, either it's the image source that would block more connections from jsreport for more than 500ms. I will check on the later option and try to come back by tomorow on that matter. I assume this is the latest version? Yes, it is. Ok, let's see tomorrow. Sorry for the delay... some unexpected event kept me away of computer for a while... Anyway, I did look into it, and even switched back to wkhtmltopdf, I do observe a similar behaviour with the difference that the PDF is not outputed, only an error log which state that the content has been blocked Warning: Blocked access to filethis log entry appears arround as many time as there were missing images in the chrome-pdf version. Since it can be observed in another recipe I assume this is not proper to chrome-pdf and it would be on our end that something go wrong, for extra information all the images are from OVH Object Storage, which have for limitation the number of token it can distribute, (I don't think so but...) does Jsreport force the recovery of a new token in each transaction (as if it is not keeping any session data ) ? Thaznks for your help! does Jsreport force the recovery of a new token in each transaction (as if it is not keeping any session data ) We do nothing special. We just give to headless chrome the html and it will give us back the pdf. There is API in chrome to intercept the requests. Maybe you could hook there and perhaps get some idea what is happening... It could end up somewhere here We will need to isolate the problem. Not sure how difficult will be to take the same images and put them to different image storage. Maybe it would crash as well when loading it from a file system. Then we would know we should blame chrome. Thanks a lot for your time, I have to deeply apologize on my end as I finally figured out what was wrong : the images url list (arround 8k) that was being used was not fully completed during the data generation (arround 4k only) hence the recipe would call undefinedinstead of a proper https://link-to-img, which explain why no more image where shown after a certain point in the PDF. After fixing the data to contains proper url I could generate correctly the whole PDF with all the images as it should be. The good point for us in this process is that we could find out about how chrome-pdf would handle this case and we are quite hapy about it since we still get a PDF at the end. The bad point is that it took too much time for both of us and I do apologize again for that. Thanks a lot for your help!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817158.8/warc/CC-MAIN-20240417142102-20240417172102-00663.warc.gz
CC-MAIN-2024-18
4,052
39
https://www.s-squaresystems.com/blogs/error-while-adding-the-remote-host-solaris-11-in-control-m-configuration-manager/
code
We are running into an issue with Control-M connecting to Solaris 11 servers/ Error while adding the remote host in Control-M Configuration Manager. We see the below error while we are adding the Solaris server as remote host in Control-M Configuration Manager as part of Agentless configuration. Check Remote Host State Failed. Failed to test Remote Host CONTROL-M/Server is not authorized for this Server and Configuration Details: Remost Host: Solaris 11 Remote Host (Agentless) Control-M Agent Version: Control-M 7.0.0 FP2 Solaris 11 compatibility issues with the Control-M/Agent 1. Login into the Solaris 11 remote host as root 2. Open the file /etc/ssh/sshd_config for editing 3. Add the line: Ciphers aes128-cbc,aes192-cbc,aes256-cbc,3des-cbc,blowfish-cbc 4. Recycle the ssh daemon using the command: /lib/svc/method/sshd restart 5. Try adding the servers in remote host in Control-M Configuration Manager
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511220.71/warc/CC-MAIN-20231003192425-20231003222425-00167.warc.gz
CC-MAIN-2023-40
912
14
https://www.alibabacloud.com/help/doc-detail/158812.htm
code
Synchronize data to OTS Take note of the following items when you create a DataConnector to synchronize data to Tablestore (OTS): You must obtain the endpoint of OTS. An OTS instance is created and a table is created in the OTS instance. Only the owner or creator of a DataHub topic has the permissions to manage DataConnectors of the topic, such as the permissions to create or delete a DataConnector. The primary key columns of the OTS table must have a one-to-one mapping with the fields in the DataHub topic. However, their orders can be different. If you use a temporary access credential from Security Token Service (STS), the service-linked role for DataHub is automatically created. Then, DataHub uses the service-linked role to synchronize data to OTS. Procedure: In the left-side navigation pane of the DataHub console, click Project Manager. On the Project List page, find a project and click View in the Actions column. On the details page of the project, find a topic and click View in the Actions column. On the details page of the topic, click Connector in the upper-right corner. In the Create Connector panel, click Tablestore, set the parameters as required, and then click Create. Go to the details page of a topic, as shown in the following figure. Select Tablestore and set the parameters as required, as shown in the following figure. On the Connector tab, check the status of data synchronization. The internal network endpoint of OTS. The name of the OTS instance. The OTS table to which data is synchronized. Data type mappings The primary key columns of the OTS table must have a one-to-one mapping with the fields in the DataHub topic. Field names in DataHub are case-insensitive. If the name of a primary key in the OTS table contains uppercase letters, these uppercase letters are converted to lowercase letters in the name of the mapped field in the DataHub topic. You can synchronize only data in topics of the TUPLE type to an OTS table. You can write up to 200 rows of data to OTS at a time. For more information about the limits on OTS, see General limits.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585201.94/warc/CC-MAIN-20211018093606-20211018123606-00591.warc.gz
CC-MAIN-2021-43
2,090
17
http://www.futurespace.net/index.php/onlineaccess
code
At any time and from any place, all your property details at your figure tips. In one place easily accessible. You can view your property details. You can view your property transaction details along with documents (e.g. Sale deed, Link, etc.) Shared by me: You can view and update the list of properties shared to others Shared to me: You can view properties details shared to you from others
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038464146.56/warc/CC-MAIN-20210418013444-20210418043444-00015.warc.gz
CC-MAIN-2021-17
393
7
https://anr.fr/Project-ANR-12-ASTR-0020
code
Contextualized support on a tablet for the transmission of command information – TACTIC After a analyse phase of scenarios proposed by MASA, the LIP6 and Intuitive World will study in the formalism of Contextual Graphs the way users use the C2. In parallel, the Lab-STICC will develop a gestural grammar and appropriate model of interactions. Then they will combine their results to create a model of touch interface that MASA will implement in a demonstrator stimulated thanks an adaptation of the simulation of SWORD. The expected results of the project mainly concern the proposal of a new mode of interaction and user interface rendering, as a touch C2 demonstrator Touch stimulated by a simulation. This project will lay the foundation of a transition from the current C2 basic GUI to an interface using modern technologies and incorporating user behavior to anticipate the sequence of commands and provide intelligent assistance that facilitates the control of complex systems . It will offer innovative use of contextual graphs for easy handling of complex systems by the user and new forms of interaction. Publications in scientific journals and conferences (national and international) will offer to communicate the results and the work done during the project. Partners participation in scientific conferences (CHI, HCI, ECSI, IJCAI, ECAI, ...) and professional conferences (I / ITSEC, ITEC) will also communicate directly on the project through demonstrations organized in showrooms. As part of the digitalization of the battlefield, Command & Control (C2) systems are already widespread in the military. These information and communication systems give their user a view of the operational situation, typically with a map overlaid with symbols that represent units. The system gathers information from several sources and lets the user communicate and give orders directly. Such systems are also being used, or on the way to being used, by first responders or large operators in the private sector. There is a variety of C2 systems, sometimes used together, as in the French Army where several C2’s coexist. Interoperability between C2 systems is therefore a major issue for the efficient flow of information between ranks, services, armies or even countries inside a multi-national coalition. An interoperability standard between C2 systems, the Battle Management Language (BML), is emerging. It is being adopted by the militaries of France and several countries belonging to NATO. It allows coding messages exchanged between C2 systems in a normalized way. Now, any design and development around C2 systems must support BML. Military C2 systems that are to be used on the field generally have a tactile interface of small size to address the requirements of mobility and simplicity of use in difficult situations. Up to now, interfaces have been complex to use and require training. The objective of the TACTIC project is to provide an intelligent interface on a tablet for a C2 system to handle commands that comply with the BML format. This interface will take advantage of all possibilities of gestural touch interfaces (1) to be able to effectively provide the information that applies to a broad spectrum of BML orders, and (2) to develop a cognitive man-machine interface that takes into account the context and history of use to enable actors to manage the complexity of the system. The partners involved in the TACTIC project are: - MASA Group, project leader, makes software for military simulation. MASA SWORD, its constructive simulation software, will be used to test the interface that will be developed. MASA Group brings its experience with the Defense sector and developing software. - The contribution of the Lab-STICC (Human-System and Virtual Environments team) will focus on modeling elements and manual transformation of models, to develop a grammar of easy-to-use touch interactions on small surfaces adapted for a framework of complex use. - UPMC-LIP6 will bring (1) its experience in the context modeling actors’ behaviors during interaction with an interface and (2) its software "CxG_Platform" to perform the modeling in a uniform representation of the elements of knowledge, reasoning and contexts. - Intuitive World will use its cognitive approach to human behavior in situations of problem solving during the knowledge acquisition phase and will participate in modeling of human behavior during interactions with the interface. After a preliminary phase for studying the problem and specification of use cases, UPMC-LIP6 and Intuitive World will model how actors manage BML orders in a formalism representing uniformly elements of knowledge, reasoning and contexts. Then, Lab-STICC will develop a grammar of gestures and an interaction model adapted to BML and tablet touch screens. They will then combine their results to reach a smart touch interface model that explicitly incorporates the notion of context to present to the user the most relevant commands and information. Their results will be implemented in two tools by MASA, a C2 system compatible with BML that will integrate the developed interface, and simulation software with which the C2 will communicate and whose simulated operational situation will evolve depending on the messages coming from the user, as a test and validation tool for the interface. Madame Caroline Chopinaud (MASA Group S.A.) The author of this summary is the project coordinator, who is responsible for the content of this summary. The ANR declines any responsibility as for its contents. MASA MASA Group S.A. UPMC-LIP6 Université Pierre et Marie urie (UPMC) IW Intuitive World Help of the ANR 280,050 euros Beginning and duration of the scientific project: January 2013 - 24 Months
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474617.27/warc/CC-MAIN-20240225135334-20240225165334-00765.warc.gz
CC-MAIN-2024-10
5,771
23