url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://virtual2023.aclweb.org/paper_P1126.html
code
Automatic machine translation (MT) metrics are widely used to distinguish the quality of machine translation systems across relatively large test sets (system-level evaluation). However, it is unclear if automatic metrics are reliable at distinguishing good translations from bad translations at the sentence level (segment-level evaluation). In this paper, we investigate how useful MT metrics are at detecting the segment-level quality by correlating metrics with how useful the translations are for downstream task. We evaluate the segment-level performance of the most widely used MT metrics (chrF, COMET, BERTScore, etc.) on three downstream cross-lingual tasks (dialogue state tracking, question answering, and semantic parsing). For each task, we only have access to a monolingual task-specific model and a translation model. We calculate the correlation between the metric's ability to predict a good/bad translation with the success/failure on the final task for the machine translated test sentences. Our experiments demonstrate that all metrics exhibit negligible correlation with the extrinsic evaluation of the downstream outcomes. We also find that the scores provided by neural metrics are not interpretable, in large part due to having undefined ranges. We synthesise our analysis into recommendations for future MT metrics to produce labels rather than scores for more informative interaction between machine translation and multilingual language understanding.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00767.warc.gz
CC-MAIN-2023-50
1,478
4
https://channel9.msdn.com/Blogs/donovanf/Demystified-Series-AzMan-on-Windows-Server-Code-Name-Longhorn-and-Windows-Vista
code
The Demystified Series is pleased to present a collection of screencasts on Windows Authorization Manager (AzMan). Keith Brown, a contributing editor for MSDN Magazine and co-founder of PluralSight, states that this series provides, “…what may be your first look at Authorization Manager – a hidden gem in Windows that can help you build Role-Based Access Control (RBAC) into your applications.” I trust you will discover this statement to be true for yourself as well. In this fourth session “AzMan on Windows Server Code Name “Longhorn” and Windows Vista,” the future is now! In this screencast Keith highlights the new features for AzMan that are present in “Longhorn” and Windows Vista. Several new capabilities and programming efficiencies are in store for developers that want to leverage this new version of AzMan. Keith also talks about some of the key performance enhancements that were made as well. Of course you can’t experience server-side development with this new version of AzMan until “Longhorn” ships – but if you just can’t wait, go to your Windows Vista machine and Run… azman.msc. The future is now! Other AzMan screencasts: Getting Started with AzMan AzMan in the Enterprise Windows Server 2003 Administration Tools Pack donovanf's Identity and Access Blog AzMan Team Blog Keith Brown's Blog
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703538431.77/warc/CC-MAIN-20210123191721-20210123221721-00615.warc.gz
CC-MAIN-2021-04
1,345
9
https://support.verato.com/hc/en-us/articles/11279498782228-Using-Smart-Views-for-Providers
code
Verato Smart Views present a single best view of a user's identity composed using core, extended, and custom attributes. Organizations can create many different Smart Views, each suited to the needs of a specific audience or application. Smart Views allow you to go beyond a traditional master view or golden view. Smart Views allow administrators to manage data governance and create multiple composite views to provide the right data, at the right time, for the right workflow. Smart Views can also help you ensure only relevant data—for example, core attributes such as name, license number, phone number, etc.—is exposed to your end users without revealing any sensitive or restricted data persisted in Provider Data Management. Each distinct Smart View is assigned a unique name, and can be configured to control: - Which data attributes are included in the Smart View - Which data sources contribute to the Smart View - What cardinality should be assigned to each attribute (1-to-many) - What logic should be used to order and select the ‘best’ attribute value (for example, most recently updated, or based on a source priority) For example, you might define two Smart Views—one, named “Contact Info”, designed to deliver only name, address, phone and email; and the second, named “License Details” designed to deliver all the national and state licensing identifiers assigned to the individual. The Contact Info view could be defined to include a single best attribute value for name, address, phone number, and email address, where the best attribute value is determined by a combination of source priority ranking and most recently asserted. The License Details view could be defined to include a single name, and all known identifier values, such as NPI , DEA number and State License ID for the individual. When interacting with Verato’s web services, you can specify in your web service request which Smart View (or Views) you want to receive back in the web service response via the “responseIdentityFormatNames” element in the web service request. How to enable Smart Views All Provider Data Management customers can use a set of predefined Smart Views. The Smart View name in the API call is case sensitive and should match the following. DEFAULT– Returns all attribute values from all source records–it is a superset of all data known for a given Link ID. GROUP_BY_SOURCE– Returns all attribute values from all source records, but it is grouped into an identity object for each distinct source record (Source + Native ID). LINK_ID_ONLY– Returns only Link ID and Source + Native IDs. Most recently asserted– Returns a single attribute value for each attribute, where the single value is selected based on the most recently asserted attribute value.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473347.0/warc/CC-MAIN-20240220211055-20240221001055-00800.warc.gz
CC-MAIN-2024-10
2,797
17
http://anekdotas.info/search?q=Freshman%20high%20girls
code
There's definitely a difference in attitude between Freshman year vs SENIOR year! Click to check out our hilarious take on the realities of being a freshman in high school versus being a senior! EXCITING NEWS! We are launching our very own "Lash Next Door" mascara this spring, and you can PREORDER it by clicking and contributing to our Indigogo campaign HERE! https://www.indiegogo.com/projects/br... Special thanks to our friends Cameron, Kelly, Kenni, Kamri, and Hannah for helping us with this funny video! These skits take a lot of work, but are super fun to film, awesome for when you need a good laugh, and meant generally to make you smile! How many of you can relate to any of these school or class situations? When do you graduate from school? Please be sure to click the "🔔" next to the SUBSCRIBE button, to join our Notification #BBSquad for #PowerHour each week, and leave a comment below telling us if we will be seeing you at our upcoming tour dates, or if you've already attended, what was your favorite part? 💋's - Brooklyn Get our own LASH NEXT DOOR mascara HERE before it sells out! ▶️ http://www.brooklynandbaileyshop.com STREAM our Original Music! 🎤🎶 👉🏻 Dance Like Me - https://brooklynandbailey.lnk.to/DanceLikeMe 👉🏻 Simple Things - https://brooklynandbailey.lnk.to/SimpleThings 👉🏻 What We're Made Of - https://BrooklynandBailey.lnk.to/WhatWereMadeOf Don't forget to subscribe to our YouTube channel... Follow us on SnapChat: @BrookAndBailey Follow us on Musical.ly: @BrooklynAndBailey FTC Disclaimer: This is not a sponsored video. 💥SUPERFANS💥: You can help us translate our uploads, and get credit below each video (and be our fav people ever}! Click here to help: http://www.youtube.com/timedtext_cs_p...
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530253.25/warc/CC-MAIN-20190421060341-20190421082341-00452.warc.gz
CC-MAIN-2019-18
1,770
16
https://www.ninjatb.com/howtofindkeywordsforawebsite/how-to-find-keywords-used-in-a-website-2019-how-to-find-words-in-a-book-2019.html
code
The objective of keyword research is to generate, with good precision and recall, large number of terms that are highly relevant yet non-obvious to the given input keyword. Process of keyword research involves brainstorming and the use of keyword research tools. To achieve the best SEO results, it is important to optimize a website as well as backlinks for the most relevant keywords. It is good practice to search for related keywords that have low competition and still a high number of searches. This makes it easier to achieve a higher rank in search engines which usually results in higher web traffic. The downside of this practice is that the website is optimized for alternative keywords instead of the main keyword; main keywords might be very difficult to rank for due to high competition. There are three essential concepts to consider when conducting keyword research. Good keywords are closely related to the subject of the website. Most search engines use an internal quality system to check website relevance related to possible keywords, a non relevant keyword is unlikely to rank well for a website. Good Keyword that are highly competitive are less likely to rank in the top. Keywords that have no monthly searches generate no traffic and therefore are useless for SEO. Keyword stuffing in a web page should be avoided. Click the Download Free Trial button above and get a 14-day, fully-functional trial of CrossOver. After you've downloaded CrossOver check out our YouTube tutorial video to the left, or visit the CrossOver Chrome OS walkthrough for specific steps. Once you have CrossOver installed and running you can come back to this page and click the Step 2 button, or follow the manual installation guide, to begin installing your Windows application. As for the history of the company, as I explained, I created Long Tail Pro back in 2011. At the time, I was creating tons of niche sites and was doing alot of keyword research and content creation. I was trying to figure out what types of keywords would rank quickly in the search engines, specifically Google, and I was frustrated with the other keyword research tools (in particular Market Samurai) out there.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232254882.18/warc/CC-MAIN-20190519121502-20190519143502-00484.warc.gz
CC-MAIN-2019-22
2,191
3
https://www.rapid7.com/blog/post/2013/11/05/how-to-dynamically-pick-up-logs-when-scaling-your-amazon-web-services-ec2-environment/
code
Last updated at Thu, 26 Oct 2017 19:18:36 GMT I recently wrote about how to easily get all your logs from A mazon Web Services’ EC2. The point with that article was to show how easy it is to instrument your EC2 application for logging and forwarding to Logentries. But the whole point of using AWS EC2 is the ability to scale quickly and near infinitely, right? So what about the scaling aspect? Sure, you can rerun the setup script every time that you spin up an instance. When scaling is achieved by launching new instances from existing snapshots though, log forwarding becomes even easier! Why Clone An Instance? With EC2 instances, you can create snapshots of an instance and then launch new instances from these snapshots. Doing so, you end up with an exact replica of the first instance. For instance, you can clone your web server in order have two of them sharing the traffic coming to your website. As anybody well versed in cloud infrastructure knows, this is common enough practice when you need to scale up in the cloud. How Does This Help with Logging as We Scale? Logentries makes it possible for you to use the same configuration on as many servers as you wish. Moreover EC2 instances launched from snapshots inherit installed software as well as configuration files from the original instance. Combining both provides with a way to automatically and transparently get your EC2 logs forwarded to Logentries. To use dynamic pick up, just use token-based logging through RSyslog. Having several sources for a single log in Logentries is no problem. Configurations files will get cloned along with the instance. Because cloned instances logically represent a single concept (e.g. your web server), it often makes sense to have log entries of those instances in one single log within Logentries. Plus if the host name is set to be part of the log entries, then it is still possible to isolate data coming from a single instance, using the Logentries filtering/search feature. So, to wrap it all up, between our easy log set up for AWS EC2 and scaling your application by cloning instances, you should have no problem with getting all the log data from your application regardless of how big or how quickly your environment has to grow.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649348.41/warc/CC-MAIN-20230603233121-20230604023121-00382.warc.gz
CC-MAIN-2023-23
2,249
8
https://confluence.ecmwf.int/display/UDOC/My+first+Web+API+request+-+Web+API+FAQ
code
- We strongly advice you to start with a simple request. ( 1-2 parameters 1 time step 1-2 steps etc) - The request has a Python dictionary format. - You can use the example below as a basis to write your own script ECMWF members (i.e. licence holders, authorised users, staff and members of NHMSs in Member and Co-operating States): You can use the 'mars' script with the MARS syntax or you can request it from Python using this class:
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.31/warc/CC-MAIN-20231206063543-20231206093543-00731.warc.gz
CC-MAIN-2023-50
435
5
http://www.yorksj.ac.uk/information-learning-services/ict/using-ict-at-ysj/lync/lync-client-software.aspx
code
Lync client software There are different versions of the Lync client depending on your platform (Windows, Mac, etc) and requirements. The different versions are explained below: - Lync Client - Windows (YSJ Users only) - Lync Web App (Browser based client) - Lync Client - OS X - Lync Client - Mobile devices (Android, Windows Phone, iOS) Lync Client (Full) - Windows (YSJ The Windows Lync client offers the best functionality and is available on all campus PC's. The Lync client is available to download for free from Microsoft's website. As long as you have an Internet connection and a YSJ email address your Lync client will connect to our servers on campus. Choose the required Client depending on your Operating System. You can find out if you have a 32 or 64 bit OS by pressing the Windows key + Break key together. This will launch the System Properties windows and display the System type. 2013 Client 32-bit 2013 Client 64-bit The first time you launch the Lync client you will be asked for your "Sign-in address", this is your YSJ email address. You'll then be prompted to enter your YSJ password. Lync Web App (Browser based client) Lync Web App for Lync 2013 is a browser-based meeting client that you use to join Lync Meetings. You can’t schedule a meeting from Lync Web App, but can only join a Lync Meeting that was scheduled using either Microsoft Outlook. You don’t need to download and install Lync Web App before a Lync Meeting. Instead, when you click the Join Lync Meeting link in a meeting invitation, Lync Web App will open automatically if: - the computer you’re using for a Lync Meeting doesn’t have Lync - you’re using a Macintosh computer Lync Web App for Lync 2013 makes joining a Lync Meeting quick and simple. When you click the URL for a Lync Meeting from the meeting invitation, the Lync Web App window opens. Enter your name in the text box and select Join the meeting. See Join a Lync Meeting from Lync Web App to learn about the different ways in which you can join a meeting. Depending on how the meeting organizer has set up the meeting, you’ll either enter the meeting right away, or wait in the meeting lobby until the organizer or a presenter admits you. After you enter the meeting, you’ll be able to use all the convenient features of the Lync Web App meeting room. Lync Client - OS X The best Lync experience is with the Windows client however a Lync client for Mac is available as part of "Office for Mac 2011". Alternatively you can download it from this Lync Client - Mobile devices (Android, Windows Phone, iOS) Mobile clients are now fully featured, including video conferencing and voice calls. Previously they were limited to the IM and presence functions. Lync for Mobile allows you to maintain your presence wherever you are through your Windows Phone, iPad, iPhone or Android device. Mobile clients are free and can be found in as appropriate for your device.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163042430/warc/CC-MAIN-20131204131722-00069-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
2,927
61
https://mattrudetech.wordpress.com/2009/05/29/postfix-archiving-mail-when-sent-from-or-to-the-outside-world/
code
The goal here is to send an BCC message for every email send to or from the outside world, for a group of internal addresses. Use sender_bcc_maps or recipient_bcc_maps. Configure them so that the archive copy is made when the sender is remote OR the receiver is remote. sender_bcc_maps = pcre:/etc/postfix/archive-check recipient_bcc_maps = pcre:/etc/postfix/archive-check This is a predicate transformation, from (NOT (local AND local)), what you asked for, into ((NOT local) OR (NOT local)), shown above.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347392142.20/warc/CC-MAIN-20200527075559-20200527105559-00485.warc.gz
CC-MAIN-2020-24
506
4
https://lists.debian.org/debian-user/2000/11/msg02971.html
code
Setting up SMTP and POP servers - QMail or what? Up till now I've shyed away from implmenting mail on my Linux boxes, it seems so complicated and my nice friendly (!) Windows POP3 clients seem generally far easier to use. However, I've now gone back to an ISP (Demon) which tries to deliver mail using SMTP, the only ISP I've ever had where this is an option. It therefore seems time for me to get to grips with this-here Linux I still need to retain POP3 client access to other mailboxes, so at present I'm thinking that from the vast array of MTAs, MUAs (etc. etc.) these seem to fit the bill for me: 1) QMAIL - 'cos it's also a POP server, meaning I can revert to my Windows clients if I fail to find a Linux one I likt. 2) FETCHMAIL - to get my mail from other ISPs. As far as I can see QMAIL will receive my Demon mail via SMTP and FETCHMAIL can go off to my other ISPs and get the mail there and wack it into QMAIL, so I have all my mail ready for reading via POP. Will this work like I think it will? Will QMAIL act as an SMTP server to deliver mail I send out, meaning I won't have to use an ISP's SMTP Sorry if this are naive questions, but even after reading a _lot_ of HOWTOs, READMEs etc. I find the whole area of Linux mail systems pretty much impenetrable :)
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317688.48/warc/CC-MAIN-20190822235908-20190823021908-00292.warc.gz
CC-MAIN-2019-35
1,272
20
https://protists.co.uk/fiona_savory.html
code
I am an evolutionary biologist with broad interests, particularly in how genomic innovations underpin life-style transitions. My current research focuses on the evolution of symbiotic interactions, using Paramecium bursaria-Chlorella as a model system. I use a range of comparative and functional genomics approaches to investigate the molecular basis of nutrient exchange and factors underlying variation in host-symbiont compatibility. My past research has spanned the evolution and functional diversification of horizontally acquired genes, molecular evolution of a multipartite plant virus, and the genetic basis of stress resistance and life-history trade-offs. - Savory, F. R., Milner, D. S., Miles, D. C. and Richards, T. A. (2018). Ancestral function and diversification of a horizontally acquired oomycete carboxylic acid transporter. Mol. Biol. Evol. 35(8): 1887-1900. - Savory, F. R., Leonard, G. and Richards, T. A. (2015). The role of horizontal gene transfer in the evolution of the oomycetes. PLoS Path. 11(5): e1004805. - Savory, F. R., Varma, V. and Ramakrishnan, U. (2014). Identifying geographic hotspots of reassortment in a multipartite plant virus. Evol. Appl. 7(5): 569-579. - Savory, F. R., Benton, T. G., Varma, V., Hope, I. A. and Sait, S. M. (2014). Stressful environments can indirectly select for increased longevity. Ecol. & Evol. DOI: 10.1002/ece3.1013. - Savory, F. R., Sait, S. M. and Hope, I. A. (2011). DAF-16 and Δ9 desaturase genes promote cold tolerance in long-lived Caenorhabditis elegans age-1 mutants. PLoS One 6(9): e24550. Hiking and experimenting with new cuisines.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.42/warc/CC-MAIN-20231203161435-20231203191435-00542.warc.gz
CC-MAIN-2023-50
1,611
7
http://alignmeeting.com/open_positions/
code
Our initial web application is a cloud-based interactive meeting platform. We’ve road-tested our concept and we’re ready to code. We need gifted software engineers to join our early-stage start-up to go from concept to code, from design to a scalable, extensible platform. Does that appeal to you? - Design, develop, code, install, debug and test fast, scalable cloud-based meeting and sales acceleration system. - Design and implement web-based user interfaces permitting clients and operational staff to provision, configure, deploy and monitor users. - Develop solutions by studying information needs; conferring with users; studying systems flow, data usage, and work processes; investigating problem areas. - Collaborate with UI designers and other software engineers to build apps and other deliverables from mock-ups and requirements. - Analyze ongoing support needs and update scrum deliverables and team behavior – documentation, monitoring, deployment processes and other long-term operational needs. - BS/MS in Computer Science or Engineering - IT systems and programming experience - Java programming experience - Experience building high performance and scalable software system - Linux/UNIX experience - Web/Database integration skills - At least 1 Scripting language (BASH, Perl, Tcl/Tk) - Database experience, such as with MySQL, Postgres, Oracle - Excellent communication skills Please email us at jobs at alignmeetung dot com to inquire about the position and to submit your qualifications.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816094.78/warc/CC-MAIN-20180225031153-20180225051153-00165.warc.gz
CC-MAIN-2018-09
1,514
16
https://newyork.theaisummit.com/speakers/justin-swansburg
code
VP, Applied AI Experts - Americas, DataRobot Justin Swansburg is the VP, Applied Data Science Practice at DataRobot with 10+ years of experience in data science and machine learning. Based in Boston, he leads a team of data scientists and engineers advising businesses across the Americas on how they can leverage machine learning and DataRobot to solve their business problems. Justin has worked with hundreds of customers at DataRobot across many verticals, including Financial Services, Retail, Insurance, and Healthcare. 06-Dec-2023See Booth Number in TitleDataRobot: Solving the Confidence Problem with Generative AI [Booth 210] 06-Dec-2023Headliners StageGenerative AI: DonorSearch + DataRobot A CxO’s Must-Know Guide to Unlock Business Value
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.17/warc/CC-MAIN-20231205105136-20231205135136-00600.warc.gz
CC-MAIN-2023-50
750
4
https://revengearena.com/about/
code
Revenge Arena is a Community in the making, with only two Developers and great ideas for a big Project. As we have years of experience such as: old metin2 projects [Luna (2016) & Bro (2018)] and in general mmorpg and coding, we would like to create a new GamePlay style for Metin2. Selling the actual Serverfiles is only to fund our project, and the first step to the Mission. Every step will be announced in the Discord Server and Two Test Sections will be available: Alpha with testers & Beta with open doors before the grand opening. Creating a great community with quality based content New Metin2 GamePlay Style Selling our first Metin2 ServerFile is the First step we need to make in order to Fund the Project, as we need time and money to create new features. Project Community Events - Marketing Artwork Contests, Youtube Montages, Discord Challanges and WorldWide internet Adds will be our way to fullfill our Mission's very first steps Every donation and every discord invitation will be honored with great rewards when the server launches. Special Discord roles will be assigned to highlight your support. Every suggestion will be processed and with high chances of it getting implemented with Community Pool Votes Server Testers will be needed with only few slots available Join our Discord to find out more!
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178372367.74/warc/CC-MAIN-20210305122143-20210305152143-00369.warc.gz
CC-MAIN-2021-10
1,320
15
https://deepai.org/publication/on-the-inevitability-of-online-echo-chambers
code
The rise of social media has led to unprecedented changes in the scale and speed at which people share information. Social media feeds are key tools for accessing high volumes of news, opinions, and public information. However, just by fostering such a proliferation of information to which people are exposed, social media may interfere with cognitive selection biases, amplifying undesirable phenomena such as extremism and spreading misinformation HillsProliferation18 . Further, they may introduce new biases in the way people consume information and form beliefs, which are not well understood yet. Theories about group decision-making and problem-solving suggest that aggregating knowledge, insights, or expertise from a diverse group of people is an effective strategy to solve complex problems, a notion called collective intelligence Bonabeau2009 ; page2008difference . While the Web and social media have often been hailed as striking examples of this principle in action surowiecki2005wisdom ; benkler2006wealth , some of the assumptions upon which these systems are predicated may harm the very diversity that makes them precious sources of collective intelligence salganik2006experimental . Social media mechanisms, in particular, tend to use popularity signals as proxies of quality or personal preference, despite evidence that rewarding engagement may come at the expense of viewpoint diversity and quality Nematzadeh2017popularity-bias . There is increasing empirical evidence of these phenomena: polarization is observed in social media conversations Conover2011 ; Conover2012 ; Bright2016 and low diversity is found in online news consumption Bakshy2015 ; DelVicario2016a ; flaxman2016filter ; Schmidt2017 . These observations have in common two features: network segregation (the splitting of the social network in two or more disconnected or poorly connected groups) and opinion polarization (the high homogeneity of opinions within such groups). Fig. 1 shows what an information diffusion network with those two features looks like. Human factors such as homophily McPherson2001 (the tendency to form ties with similar people) and social influence friedkin2006structural (the tendency of becoming more similar to somebody as a result of social interaction) are often thought to drive the emergence of polarization and segregation. Del Vicario et al. DelVicario2016a ; DelVicario2017 observe that social media debates tend to polarize in exactly two opinion groups and study a class of models of social influence with confirmation bias (the tendency to pay attention only to information that aligns with prior beliefs) Nickerson1998 . They model confirmation bias with the bounded confidence principle Deffuant2000 and introduce an additional repulsion effect driving opinions outside the bounded confidence farther apart. Some of the consequences of socio-cognitive biases have been explored in social dynamics models Castellano2009 and in the social psychology literature HillsProliferation18 . Yet, the interplay between these and additional biases introduced by social media mechanisms is not clear. The algorithms at the heart of social media make a number of assumptions to deliver their recommendations. For example, news feed algorithms favor stories with which users are more likely to engage in the future, based on past engagement Backstrom2016 . Friendship recommendation engines suggest new ties based on common interests, beliefs, and friends, often resulting in the closure of open triads Adamic2003 ; Backstrom2006 ; Leskovec2008 ; weng2013role . And finally, social media empower users to dissolve ties that, although not by design, often tend to be the ones connecting them with those with whom they disagree Sibona2011 . By curating the information to which users are exposed and by facilitating their management of social ties, social media platforms may enhance homophily and confirmation bias. This would have the net effect of leading social media users to connect preferentially with like-minded individuals, which would then result in selective exposure to only that information which conforms to their pre-existing beliefs, as opposed to more diverse points of view Sears1967 . Ultimately, these dynamics would drive users of social media toward polarization and segregation sunstein2017republic , more so than users of legacy media like TV, radio, or newspapers, where social sharing and link management mechanisms are not at play Gentzkow2011 . The risk that online communication networks could splinter into different ‘tribes’ was recognized at the dawn of cyberspace, and given the name of cyber-balkanization katz1998struggle ; sunstein2002republiccom as an analogy to the well-known phenomena of cultural, racial, and ethnic segregation schelling1971dynamic . With the rise of modern personalization technologies, there has been renewed interest in understanding whether algorithmic bias is accelerating the fragmentation of society. The terms filter bubble pariser2011filter and echo chamber Jamieson2008 have been coined to refer to two different algorithmic pathways to opinion fragmentation, both related to the way algorithms filter and rank information. The first refers to search engines fortunato2006topical , the second to social media feeds nikolov2015measuring ; Nikolov2018biases . Analysis of online consumption of political news by Facebook users shows that exposure to cross-cutting ideological information is reduced for the most part by their social contacts and by their individual choice of what to click on Bakshy2015 . Furthermore, opinion-reinforcing information promotes news story exposure Garrett2009echo . Although those empirical observations suggest that the role of social media platforms in information exposure is relatively modest compared to individual preferences, they cannot explain why the network is so ideologically polarized and segregated. Empirical analyses of echo chambers in the literature are mainly based on observations of static network snapshots like the one shown in Fig. 1, therefore they too fail to account for how network segregation and opinion polarization emerge in the first place. Here, we are interested in studying the emergence of joint polarization and network segregation in online social media, specifically focusing on the interplay between the mechanisms of influence and unfriending. Our approach is to model how these mechanisms are mediated by the basic activity of information diffusion in social media. Furthermore, we wish to explore how biases in recommendation algorithms may exacerbate the dynamics of echo chambers. Although our model is idealized, it captures some key features of social media sharing — limited attention, social influence, and social tie curation. Through a series of simulations, we find conditions under which opinion polarization and network segregation coevolve, providing a generative mechanism for the formation of echo chambers in social media. We also illustrate how the predictions of the model are consistent with empirical data from Twitter. Let us introduce a model of opinion dynamics in an evolving social network. We incorporate various ingredients from models in the literature: information diffusion via social sharing Weng2012 , opinion influence based on bounded confidence Deffuant2000 , and selective unfriending Holme2006 . The model begins with a random directed graph with nodes and directed edges, representing an online social network over which messages spread. Nodes represent social media users and edges represent follower ties, as in Twitter and Instagram. In the initial step, each user’s opinion () is randomly assigned a value in the interval . Each user has a screen that shows the most recent messages posted (or reposted) by friends being followed. A message conveys the identity and opinion value of the user who originated the post, together with the information about who reposted it. Users can see this information. A message’s opinion is concordant with an opinion if they are within a bounded confidence distance (). It is discordant otherwise. In addition, each user can unfollow a friend by rewiring the connection, thus following someone else in their place. These mechanisms allow us to capture two common ingredients of social media platforms: the possibility to share information with one’s friends, and the possibility to form a new connections. At every time step , user is selected at random, and sees messages on the screen that are posted or reposted by friends. The opinion of user then changes based on the concordant messages on the screen: where is an influence strength parameter, the sum runs over the messages in ’s screen, and is an indicator function for concordant opinions based on the confidence bound : Equation 1 provides a simple mechanism for modeling social influence based on an individual’s tendency to favor information that is similar to their pre-existing opinions (), such as the confirmation bias and selective exposure mentioned earlier. This is referred to as bounded social influence and its breadth and strength are controlled by the parameters and . Larger indicates broader-minded users, and larger indicates stronger social influence. Two more actions may be taken by user at each time step . First, with probability, the user reposts a concordant message from the screen, if any are available; otherwise, with probability , they post a new message reflecting their own opinion. Second, with probability , the user selects a random discordant message from the screen, if one exists, and unfollows the friend who (re)posted the message, following a new friend in their place. We explore three different rewiring strategies for selecting the new friend: random: a user is selected at random among all nodes in the network that are not already friends of ’s; repost: a user is selected at random among the originators of reposts, if any are on ’s screen; recommendation: a user is selected at random among non-friends who recently posted concordant messages. Note that the size, density, and out-degree sequence of the network stay the same throughout each simulation, while the in-degree distribution can change over time. As we mentioned earlier, our model incorporates various elements that have been explored in the literature. Both opinion dynamics and the rewiring of social ties (unfriending) are notably present in the model proposed by Holme and Newman Holme2006 , which first explored the roles of the two mechanisms. There are however a few key differences between the model presented here and previous models. One is that in our model, opinions take continuous values and unfriending is based on bounded confidence. More importantly, when links are rewired, they do not necessarily select nodes with concordant opinion (this is only one of the three rewiring strategies we consider); rather, the targets of the selection are the links to be broken — those outside the opinion confidence bound. Finally, our model aims to capture the crucial features of information diffusion in social sharing platforms, where influence may take place indirectly. Consider for example the following scenario: user A posts a piece of information that reflects A’s opinion; user B reshares the message to their followers, which include user C. Now user C may be influenced by A’s post, even though A and C are not directly connected, and irrespective of whether B’s opinion was concordant with or influenced by A’s opinion. This indirect influence mechanism is asymmetric: the opinion of the consumer of a post changes, while the opinion of the originator of the post does not. The average opinion is therefore not conserved, unlike in the model proposed by Deffuant Deffuant2000 . The code to simulate our model and reproduce our findings is available online at github.com/soramame0518/echo_chamber_model. To facilitate the exploration of our model, we developed an interactive demo allowing one to run Web-based simulations with different realizations of the model parameters. The demo makes certain simplifications to be accessible to a broad audience: it is based on an undirected network, nodes can see all messages from their neighbors, and unfriending only occurs by random rewiring. Fig. 2 provides a screenshot of the demo, which is available online at osome.iuni.iu.edu/demos/echo/. To illustrate the dynamics of the model, in Figure 3 we show one simulation run. Over time, due to social influence and unfriending, each user is increasingly exposed to similar messages endorsed by friends (Fig. 3A), and the system reaches a steady state characterized by two distinctive features often observed in reality: opinion polarization (Fig. 3B) and network segregation (Fig. 3C). Note that by “polarization” we mean a division of opinions into distinct homogeneous groups, which are not necessarily at the extremes of the opinion range. We wish to examine the conditions under which opinion polarization and network segregation coevolve. Recall that our model has two mechanisms that appear to be relevant to this process: social influence (regulated by parameters and ) and rewiring (regulated by ). Let us first examine the role of the confidence bound parameter . This threshold affects the number of final opinion clusters and the diversity of surviving opinions, in a manner consistent with the original bounded confidence model Deffuant2000 and some of its extensions DelVicario2017 . As shown in Fig. 4(A,B), the smaller , the more opinion clusters with more heterogeneous opinions. If is large enough, the network converges to a single homogeneous opinion cluster. Next, let us explore the joint effects of influence and rewiring. Here we limit our attention to the case , which yields, on average, two segregated opinion groups as illustrated in Fig. 3. In the presence of social influence alone without rewiring (Fig. 5A), the network structure is unaffected, but opinions may become polarized after a long time. In the presence of rewiring alone (Fig. 5B), no opinion change can happen but like-minded users cluster together and the network may become segregated after a very long time. The joint effect of social influence and rewiring accelerates the joint emergence of both polarization and segregation (Fig. 5C). To further explore how influence and rewiring jointly affect the speed of emergence of echo chambers, we plot in Fig. 6 the time until two conditions are both satisfied: (i) the network clusters are segregated and (ii) opinions are homogeneous, i.e., any two nodes within the same cluster have opinions that differ by less than the bounded confidence . In some cases, a cluster may form that is smaller than the out-degree of one or more of its nodes, so that links from these nodes cannot be rewired to their own cluster; these cases are excluded because segregation can never occur. Focusing instead on the common cases in which segregation can take place, even relatively small amounts of influence and rewiring greatly accelerate the emergence of segregated and polarized echo chambers. When both the rewiring rate and the influence strength are above 0.1, echo chambers appear in a fraction of the time. We therefore observe a synergistic effect in which influence and unfollowing reinforce each other in leading to the formation of echo chambers. All three rewiring strategies used in the model (random, repost, recommendation) produce comparable stable states in terms of the number and diversity of stationary opinion clusters. In other words, what leads to an echo chamber state is selective unfollowing and not the specific mechanism by which one selects a new friend to follow. However, the emergence of echo chambers is greatly accelerated by the rewiring strategy based on recommendations of users with concordant opinions. The speed of convergence to the steady state is more than doubled compared to the other rewiring strategies. The rewiring strategy also affects the development of closed social triads. A closed social triad is a network motif with three nodes and links . It can be thought as the smallest unit of an echo chamber network Jasny2015 , since it enables the same information to be transmitted from a source to a recipient through different paths, directly and via an intermediary . As shown in Fig. 7A, rewiring strategies based on recommendations of users with concordant opinions and on exposure via reposts — both common mechanisms in social media — result in significantly more closed triads than following users at random. Repost-based rewiring, in particular, leads to doubling the number of directed closed triads, making it much more likely that users are exposed to the same opinions from multiple sources. The number of users posting/reposting a message can affect its ranking and be displayed to the user through platform-dependent interface elements, boosting user attention and exposure. Finally, the rewiring strategy affects the in-degree distribution of the network in the stable state. Compared to random rewiring, the other two methods yield more skewed in-degree distributions, indicating the spontaneous emergence of popular users with many followers, whose message have potentially broader reach (Fig.7B). Again, the effect on hubs is stronger in the case of repost-based rewiring. This is consistent with the copy model for network growth, which approximates preferential attachment kleinberg99b . However, unlike the copy model, the number of nodes and links is fixed in our model; only the patterns of connection change. Thus, the skewed in-degree distribution arises due to the spread of information. Since recipients can see who originally posted each message, the originators of popular messages have the best chance of receiving new followers and becoming hubs. It is tempting to use our model to reproduce a few stylized facts about empirical echo chambers. To this end, let us consider data about an empirical retweet network of US political conversations (see Methods, § V.1 ). To fit the model against this data, we plug in values of known parameters estimated in prior work, and then perform a sweep of the remaining parameters (§V.2). We simulate the resulting calibrated model to see if the synthetic network snapshot generated at the end of the simulation is in agreement with the observed snapshot of the empirical network (§ V.3). As a stopping criterion for the simulations, we check that the simulated network has reached the same level of segregation as the empirical one (§ V.4). Fig. 8 shows the results. We compute two metrics to draw a comparison between the empirical data and our simulations. The first is the fraction of closed triads in the network. To compute the number of triads, we record each time a user reposts something in our model as a ‘retweet,’ and build a simulated retweet network. We then count all instances of closed directed triangles in both networks (§ V.5). The central panel in Fig 8 shows that the fraction of triads in the synthetic network is consistent with that observed in the empirical data. The second metric is the distribution of opinion distances. We infer the latent opinions of the Twitter users in our data from their hashtag usage (§ V.6), and define a distance in hashtag binary vector space. In the model, we simply consider the distancebetween two users in the opinion space. Fig. 9 shows that both distance distributions have peaks around low values of distance for users in the same cluster and around high values for users in different clusters. While the ways in which the distances are measured and consequently the distributions are necessarily different, the qualitatively similar binomial behaviors suggest that the calibrated model attains an analogous level of opinion polarization in correspondence of the level of network segregation observed in the empirical data. In studying an idealized social media platform using an agent-based model, we followed the rich tradition of several models of opinion dynamics under social influence Castellano2009 , in which agents adjust their opinions based on those of the ones with whom they are connected (social influence), and rewire their ties with peers based on their shared opinions (social selection). Other models have explored the essential tension between social influence and social selection Holme2006 ; Crandall2008 ; durrett2012graph ; yu2017opinion ; Teza:2018:Network . The effect of the interaction between these two mechanisms on the emergence of opinion clusters has also been studied within a bounded confidence framework similar to the one presented here PhysRevE.77.016102 ; Kozma_2008 . Our model seeks to capture more closely the key components of social media by focusing on indirect interactions enabled by information diffusion, in addition to disagreement-driven dissolution of ties via unfollowing/unfriending. Furthermore, our model combines social influence and selection with the competition for limited attention, which has been shown to explain the empirical scale-free distribution of content popularity in social media Weng2012 ; Gleeson2014 . The results presented here suggest that the proliferation of online echo chambers may be an inevitable outcome of basic cognitive and social processes facilitated by social media: namely, the human tendency to be influenced by information and opinions to which one is exposed, and that of disliking disagreeable social ties. Social influence and rewiring appear to provide synergistic conditions for the rapid formation of completely segregated and polarized echo chambers; this phenomenon is accelerated by an order of magnitude in the presence of both relatively strong influence and relatively common unfollowing, compared to cases when either mechanism is weak. A social network that is both segregated and polarized can be also generated with a variant of the Schelling model schelling1971dynamic on networks, proposed by Henry et al. Henry2011 . This model is based on aversion-driven rewiring, but starts from a bimodal distribution of opinions. Our approach shows how both polarization and segregation emerge without assuming that opinions are already polarized. The literature has explored other factors and mechanisms that foster the emergence of isolated cultural or political subnetworks as well as polarization of opinions: one-to-many communication and network transitivity Keijzer2018 are also incorporated in our model; pressures toward stronger opinions doi:10.1098/rsos.181122 or more radical opinions DelVicario2016a are not. Finally, echo chambers can emerge from cognitive mechanisms, such as confirmation bias, when information propagates through centralized channels reaching a large portion of the population Geschke2018 . Focusing on the rewiring of social ties, we tested three different selection mechanisms: two inspired by triadic closure and social recommendation — intended to model the ways in which social media work in practice — and one based on purely random choice. All variations yield qualitatively similar steady states, suggesting that disagreement-driven unfollowing is a sufficient rewiring condition for echo chamber emergence. However, the more realistic selection mechanisms help explain two additional features of online social networks. First, the presence of users with many followers. These hub nodes affect the dissemination of the same messages in many cases, but not always bakshy2011everyones . Second, the large number of closed triads weng2013role . Triadic closure connects individuals to friends of their friends, facilitating repeated exposure to the same opinion. Such “echoes” are a powerful reinforcing mechanism for the adoption of beliefs and behaviors Centola2007 . Although our model does not accounts for the adoption of false information, it has been speculated that echo chambers may make social media users more vulnerable to this kind of manipulation lazer2018science ; LEWANDOWSKY2017353 . There are multiple ways in which echo-chamber structure may contribute to the spread of misinformation. First, because people are repeatedly exposed to homogeneous information inside an echo chamber, the selection of belief-consistent information and the avoidance of believe-inconsistent information are facilitated, reinforcing confidence in minority opinions, such as conspiracy theories and fabricated news, even in the presence of preponderant contrary evidence HillsProliferation18 . Second, echo chambers foster herding, which may lead to quick and premature convergence to suboptimal solutions of complex problems and simplistic interpretations of complex issues Nematzadeh2017popularity-bias ; HillsProliferation18 . Third, the threshold for perceiving a piece of content as novel may be lower within echo chambers by virtue of the reduced diversity of viewpoints to which people are exposed. The crafting of false news with perceived novelty may thus be promoted, leading to faster and broader consumption of misinformation vosoughi2018spread and triggering the production of more information about similar topics ciampaglia2015production . Finally, echo chambers may reinforce the influence bias of personalized filtering algorithms toward a user’s current opinions Perra2019personalisation . Casting doubt on theories that political echo chambers reduce belief accuracy, recent experimental results suggest that social information exchange in homogeneous networks increases accuracy and reduces polarization Becker201817195 . More work is certainly needed to understand the relationship between online echo chambers and misinformation. Our results suggest possible mitigation strategies against the emergence of echo chambers on social media. Often-recommended solutions involve exposure to content that increases a user’s social distance from their preferences. However, such strategies must be consistent with current understanding of cognitive biases HillsProliferation18 . For example, it does not help to promote content that will be disregarded LEWANDOWSKY2017353 . A more neutral possibility suggested by our findings is to discourage triadic closure when recommending the formation of new social ties. Moreover, the complete dissolution of ties with those users with whom one disagrees should be discouraged, for example by providing alternative mechanisms, like snooze buttons — a solution that some social media platforms are already experimenting with NewsfeedFYI — or the possibility to block only certain types of information, but not others. Another approach is to alert users who are about to unfollow their only conduits to certain types or sources of information. As we better understand the unintended consequences of social media mechanisms, ethical and transparent user studies are needed to carefully evaluate countermeasures before they are deployed by platforms. We must not only ensure that new mechanisms mitigate undesired outcomes, but also that they do not create new vulnerabilities. To evaluate the model’s prediction, we use empirical data from Conover et al. Conover2011 , who studied the political polarization of Twitter users. The data comprises a sample of public tweets about US politics, collected during the 6 weeks prior to the 2010 US midterm elections. The tweets were obtained from a 10% random sample of all public tweets. The dataset is available online at carl.cs.indiana.edu/data/#icswm2011_2. Tweets with hashtags about US politics were included in the dataset. The hashtags were drawn from a list, which was obtained by expanding a manually curated seed set of then-popular political hashtags, such as #TCOT (‘Top conservatives on Twitter’) and #P2 (‘Progressives 2.0’). This initial set was recursively expanded with co-occurring hashtags above a minimum frequency, until no additional hashtag could be found. Finally, the list was manually checked and any hashtag that was not about US politics was expunged. The final list included 6,372 hashtags about US politics. Three networks are provided in the dataset: retweets, mentions, and retweets plus mentions combined. We used the largest strongly connected component of the retweet network ( and ), which is known to be polarized in two groups, roughly corresponding to the two main US political factions — conservatives and progressives. The network is the same shown in Fig. 1. v.2 Parameter Fitting Our model includes several parameters that need to be estimated. The rate of reposting was set to based on empirical results from Twitter qiu2017limited . The number of nodes in the simulations was taken to be the same as the number of Twitter users in the empirical retweet network. Edges were drawn at random between any two nodes with probability chosen so that the density of the follower graph is . This value is within the range observed in the literature cha2010measuring ; bollen2011happiness . We performed a parameter scan for the rest of the parameters, finding the following values: screen length , rewiring rate , influence strength , and tolerance . Note that the tolerance value to reproduce the two opinion clusters in the US-based online political conversations is larger than the value found for smaller networks (Fig. 4). Finally, for simplicity, we use the random rewiring rule. v.3 Model Evaluation Our goal is to compare model predictions about the emergence of echo chambers with empirical data from social media. Unfortunately, lacking a probability distribution over the data, our model does not allow us to compute the likelihood of a given network or distribution of opinions. Thus we need to devise a method to evaluate our approach. This has become a common challenge, especially with the rise of agent-based modeling in the social sciencesepstein1996growing . There is a vast literature devoted to developing rigorous methods to test simulation models on empirical data of social phenomena windrum2007 ; Ciampaglia2013 . Although no single universal recipe exists, we adopt the common approach of generating synthetic data from our agent-based model and comparing them to the empirical data under appropriate distance measures. Our main hypothesis is that both social influence and rewiring are required to reproduce patterns consistent with the empirical data. Under those conditions, the system will always reach a state in which there will be no ties connecting users with discordant opinions (see Fig. 5). In reality, the empirical network is never completely disconnected in two communities. Therefore, we simulate our model until the system reaches the same level of segregation observed in the empirical data, and compare the two networks. The empirical and model networks are however different. The former is a network of retweets, while the latter is a network of ‘follower’ ties. Therefore we cannot compare these two networks directly, but instead we generate a synthetic retweet network from the simulated data. Every time a user performs a ‘repost’ action in our simulations, we count it as a retweet, and add the corresponding edge in the simulated retweet network. The plots in Figs. 8 and 9 are based on snapshots of this synthetic retweet network, taken at evenly spaced time intervals of 10 epochs each. Each epoch consists of steps of the model, so that each user performs one post and/or rewiring action per epoch on average. At the end of each tenth epoch we consider the latest distinct retweet edges, so that each simulated network snapshot is guaranteed to have the same number of edges as the empirical one. We then consider the largest strongly connected component of each simulated network snapshot. Therefore, the two networks do not generally match in the number of nodes. To measure the segregation in both the simulated and empirical networks, we group users into two clusters . In the simulated network, is defined as the set of users having opinion and as the set with . In the empirical network, the two clusters correspond to the labels obtained via label propagation Conover2010predicting . Let denote the set of edges connecting nodes in different clusters. We define the segregation index as: The segregation index compares the actual number of edges across the two clusters with the number we would observe in a random network with the same density . When the network is completely segregated, . v.5 Closed Triads Let us denote by a directed edge from node to node . A closed directed triangle or closed triad is any node triplet such that . An open directed triangle or open triad is any node triplet for whom only a proper subset of those edges exists in . Let us denote by the set of closed triads and by the set of open triads. We compute the frequency of closed triads as the ratio where is the number of all node triplets. v.6 Latent Opinion Inference Our model generates opinions in the range, while the empirical network has binary labels (‘liberal’ or ‘conservative’) inferred from a training set and propagation through the network Conover2010predicting . Comparing the opinions predicted by the model to these labels would not be meaningful, since the labels are trivially correlated with the network structure, by construction. A more meaningful comparison is between pairwise opinion distances, which we can generate for the Twitter users using a criterion that is not induced by the network’s community structure. Since hashtag usage is also polarized Conover2011 , we infer opinions distances from adopted hashtags. We say that a hashtag is adopted by a user if it is found either in tweets retweeted by the user (incoming edges), or in tweets by the user that were retweeted by someone else (outgoing edges). Let us consider the -th user and the -th hashtag. We define an empirical opinion vector where if user adopted hashtag , and otherwise. We define the empirical opinion distance between two opinion vectors based on shared tags: where is the norm, or number of shared tags. To mitigate the effects of sparsity and noise, we use only the most popular hashtags to define the vectors. The selected hashtags were adopted by 93% of the users. We restrict the retweet network to the subgraph spanned by those users, but the overall results do not change significantly if we select enough hashtags to cover 100% of the users. K.S. was supported by JST PRESTO grant no. JPMJPR16D6, JST CREST grant no. JPMJCR17A4, and JSPS/MEXT KAKENHI grant numbers JP16K16112 and JP17H06383 in #4903. G.L.C. was supported by the Indiana University Network Science Institute, where he carried out the work presented here. F.M. and A.F. were supported in part by DARPA contract no. W911NF-17-C-0094. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding agencies. K.S., G.L.C., A.F., and F.M. designed the research. K.S. and W.C. performed simulations, W.C. and F.M. analyzed the data. H.P. developed the online demo. K.S., G.L.C., F.M., and A.F. drafted the manuscript. All authors reviewed and approved the manuscript. - Lada A Adamic and Eytan Adar. Friends and neighbors on the web. Social Networks, 25(3):211–230, 2003. - Lars Backstrom. Serving a billion personalized news feeds. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, WSDM ’16, pages 469–469, New York, NY, USA, 2016. ACM. - Lars Backstrom, Dan Huttenlocher, Jon Kleinberg, and Xiangyang Lan. Group formation in large social networks: Membership, growth, and evolution. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’06, pages 44–54, New York, NY, USA, 2006. ACM. - Eytan Bakshy, Jake M. Hofman, Winter A. Mason, and Duncan J. Watts. Everyone’s an influencer: Quantifying influence on twitter. In Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, WSDM ’11, pages 65–74, New York, NY, USA, 2011. ACM. - Eytan Bakshy, Solomon Messing, and Lada A Adamic. Exposure to ideologically diverse news and opinion on Facebook. Science, 348(6239):1130–1132, 2015. - Joshua Becker, Ethan Porter, and Damon Centola. The wisdom of partisan crowds. Proceedings of the National Academy of Sciences, 2019. - Y. Benkler. The Wealth of Networks: How Social Production Transforms Markets and Freedom. Yale University Press, New Haven, CT, USA, 2006. - Johan Bollen, Bruno Gonçalves, Guangchen Ruan, and Huina Mao. Happiness is assortative in online social networks. Artificial Life, 17(3):237–251, 2011. - Eric Bonabeau. Decisions 2.0: the power of collective intelligence. MIT Sloan Management Review, 50(2):45–52, Winter 2009. - Jonathan Bright. Explaining the emergence of echo chambers on social media: the role of ideology and extremism. arXiv:1609.05003v2, 2017. - Claudio Castellano, Santo Fortunato, and Vittorio Loreto. Statistical physics of social dynamics. Rev. Mod. Phys., 81:591–646, May 2009. - Damon Centola and Michael Macy. Complex contagions and the weakness of long ties. American Journal of Sociology, 113(3):702–734, 2007. - Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, and Krishna Gummadi. Measuring user influence in twitter: The million follower fallacy. In International AAAI Conference on Web and Social Media, ICWSM ’10, pages 10–17, Palo Alto, CA, USA, 2010. AAAI. - Giovanni Luca Ciampaglia. A framework for the calibration of social simulation models. Advs Complex Sys., 16:1350030, 2013. - Giovanni Luca Ciampaglia, Alessandro Flammini, and Filippo Menczer. The production of information in the attention economy. Scientific Reports, 5:9452, May 2015. - Giovanni Luca Ciampaglia, Azadeh Nematzadeh, Filippo Menczer, and Alessandro Flammini. How algorithmic popularity bias hinders or promotes quality. Scientific Reports, 8:15951, 2018. - M Conover, B Gonçalves, J Ratkiewicz, A Flammini, and F Menczer. Predicting the political alignment of twitter users. In Proceedings of 3rd IEEE Conference on Social Computing (SocialCom), pages 192–199, 2011. - Michael Conover, Jacob Ratkiewicz, Matthew Francisco, Bruno Gonçalves, Filippo Menczer, and Alessandro Flammini. Political polarization on Twitter. In International AAAI Conference on Web and Social Media, ICWSM ’11, pages 89–96, Palo Alto, CA, USA, 2011. AAAI. - Michael D Conover, Bruno Gonçalves, Alessandro Flammini, and Filippo Menczer. Partisan asymmetries in online political activity. EPJ Data Sci., 1(1):6, 2012. - David Crandall, Dan Cosley, Daniel Huttenlocher, Jon Kleinberg, and Siddharth Suri. Feedback effects between similarity and social influence in online communities. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’08, pages 160–168, New York, NY, USA, 2008. ACM. - G Deffuant, D Neau, and F Amblard. Mixing beliefs among interacting agents. Adv. Complex Syst., 03(01n04):87–98, 2000. - Michela Del Vicario, Alessandro Bessi, Fabiana Zollo, Fabio Petroni, Antonio Scala, Guido Caldarelli, H Eugene Stanley, and Walter Quattrociocchi. The spreading of misinformation online. Proc. Natl. Acad. Sci. U.S.A., 113(3):554–559, 2016. - Michela Del Vicario, Antonio Scala, Guido Caldarelli, H Eugene Stanley, and Walter Quattrociocchi. Modeling confirmation bias and polarization. Sci. Rep., 7:40391, 2017. - Richard Durrett, James P. Gleeson, Alun L. Lloyd, Peter J. Mucha, Feng Shi, David Sivakoff, Joshua E. S. Socolar, and Chris Varghese. Graph fission in an evolving voter model. Proceedings of the National Academy of Sciences, 109(10):3682–3687, 2012. - J.M. Epstein, R. Axtell, and 2050 Project. Growing Artificial Societies: Social Science from the Bottom Up. Complex Adaptive Systems. MIT Press, Cambridge, MA, USA, 1996. - Tucker Evans and Feng Fu. Opinion formation on dynamic networks: identifying conditions for the emergence of partisan echo chambers. Royal Society Open Science, 5(10):181122, 2018. - Seth Flaxman, Sharad Goel, and Justin M. Rao. Filter bubbles, echo chambers, and online news consumption. Public Opinion Quarterly, 80(S1):298–320, 2016. - S. Fortunato, A. Flammini, F. Menczer, and A. Vespignani. Topical interests and the mitigation of search engine bias. Proceedings of the National Academy of Sciences, 103(34):12684–12689, 2006. - Noah E Friedkin. A structural theory of social influence, volume 13. Cambridge University Press, 2006. - R. Kelly Garrett. Echo chambers online?: Politically motivated selective exposure among Internet news users. Journal of Computer-Mediated Communication, 14(2):265–285, 2009. - Matthew Gentzkow and Jesse M. Shapiro. Ideological segregation online and offline. The Quarterly Journal of Economics, 126(4):1799–1839, 2011. - Daniel Geschke, Jan Lorenz, and Peter Holtz. The triple-filter bubble: Using agent-based modelling to test a meta-theoretical framework for the emergence of filter bubbles and echo chambers. British Journal of Social Psychology, 58(1):129–149, 2019. - James P. Gleeson, Jonathan A. Ward, Kevin P. O’Sullivan, and William T. Lee. Competition-induced criticality in a model of meme popularity. Phys. Rev. Lett., 112:048701, January 2014. - Adam Douglas Henry, Paweł Prałat, and Cun-Quan Zhang. Emergence of segregation in evolving social networks. Proc. Natl. Acad. Sci. U.S.A., 108(21):8605–8610, 2011. - Thomas T. Hills. The dark side of information proliferation. Perspectives on Psychological Science, 14(3):323–330, 2019. Petter Holme and M. E. J. Newman. Nonequilibrium phase transition in the coevolution of networks and opinions.Phys. Rev. E, 74:056108, November 2006. - K.H. Jamieson and J.N. Cappella. Echo Chamber: Rush Limbaugh and the Conservative Media Establishment. Oxford University Press, 2008. - Lorien Jasny, Joseph Waggle, and Dana R Fisher. An empirical examination of echo chambers in US climate policy networks. Nat. Clim. Change, 5(8):782–786, 2015. - James E. Katz. Struggle in cyberspace: Fact and friction on the world wide web. The ANNALS of the American Academy of Political and Social Science, 560(1):194–199, 1998. - Marijn A. Keijzer, Michael Mäs, and Andreas Flache. Communication in online social networks fosters cultural isolation. Complexity, 2018(9502872), 2018. - Jon M Kleinberg, Ravi Kumar, Prabhakar Raghavan, Sridhar Rajagopalan, and Andrew S Tomkins. The web as a graph: measurements, models, and methods. In Computing and combinatorics, pages 1–17. Springer, 1999. - Balazs Kozma and Alain Barrat. Consensus formation on adaptive networks. Phys. Rev. E, 77:016102, Jan 2008. - Balazs Kozma and Alain Barrat. Consensus formation on coevolving networks: groups’ formation and structure. Journal of Physics A: Mathematical and Theoretical, 41(22):224020, May 2008. - David M. J. Lazer, Matthew A. Baum, Yochai Benkler, Adam J. Berinsky, Kelly M. Greenhill, Filippo Menczer, Miriam J. Metzger, Brendan Nyhan, Gordon Pennycook, David Rothschild, Michael Schudson, Steven A. Sloman, Cass R. Sunstein, Emily A. Thorson, Duncan J. Watts, and Jonathan L. Zittrain. The science of fake news. Science, 359(6380):1094–1096, 2018. - Jure Leskovec, Lars Backstrom, Ravi Kumar, and Andrew Tomkins. Microscopic evolution of social networks. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’08, pages 462–470, New York, NY, USA, 2008. ACM. - Stephan Lewandowsky, Ullrich K.H. Ecker, and John Cook. Beyond Misinformation: Understanding and Coping with the “Post-Truth” Era. Journal of Applied Research in Memory and Cognition, 6(4):353–369, 2017. - Miller McPherson, Lynn Smith-Lovin, and James M Cook. Birds of a feather: Homophily in social networks. Annual Review of Sociology, 27(1):415–444, 2001. - Shruthi Muraleedharan. Introducing snooze to give you more control of your news feed. https://newsroom.fb.com/news/2017/12/news-feed-fyi-snooze/, December 2017. Last accessed 27 February 2019. - Raymond S. Nickerson. Confirmation bias: A ubiquitous phenomenon in many guises. Review of General Psychology, 2(2):175–220, 1998. - Dimitar Nikolov, Mounia Lalmas, Alessandro Flammini, and Filippo Menczer. Quantifying biases in online information exposure. Journal of the Association for Information Science and Technology, 2018. preprint arXiv:1807.06958. - Dimitar Nikolov, Diego F.M. Oliveira, Alessandro Flammini, and Filippo Menczer. Measuring online social bubbles. PeerJ Computer Science, 1:e38, December 2015. - S.E. Page. The Difference: How the Power of Diversity Creates Better Groups, Firms, Schools, and Societies. Princeton University Press, Princeton, NJ, USA, 2008. - Eli Pariser. The filter bubble: What the Internet is hiding from you. Penguin UK, 2011. - Nicola Perra and Luis E. C. Rocha. Modelling opinion dynamics in the age of algorithmic personalisation. Scientific Reports, 9:7261, 2019. - Xiaoyan Qiu, Diego F. M. Oliveira, Alireza Sahami Shirazi, Alessandro Flammini, and Filippo Menczer. Limited individual attention and online virality of low-quality information. Nature Human Behaviour, 1:0132–, June 2017. - Matthew J Salganik, Peter Sheridan Dodds, and Duncan J Watts. Experimental study of inequality and unpredictability in an artificial cultural market. Science, 311(5762):854–856, 2006. - Thomas C. Schelling. Dynamic models of segregation. The Journal of Mathematical Sociology, 1(2):143–186, 1971. - Ana L Schmidt, Fabiana Zollo, Michela Del Vicario, Alessandro Bessi, Antonio Scala, Guido Caldarelli, HE Stanley, and Walter Quattrociocchi. Anatomy of news consumption on facebook. Proc. Natl. Acad. Sci. U.S.A., 114(12):3035–3039, 2017. - David O. Sears and Jonathan L. Freedman. Selective exposure to information: a critical review. Public Opinion Quarterly, 31(2):194–213, 1967. - C. Sibona and S. Walczak. Unfriending on facebook: Friend request and online/offline behavior analysis. In 2011 44th Hawaii International Conference on System Sciences, pages 1–10, January 2011. - Cass R. Sunstein. Republic.com. Princeton University Press, Princeton, NJ, USA, reprint edition, 2002. - Cass R. Sunstein. #Republic: Divided Democracy in the Age of Social Media. Princeton University Press, Princeton, NJ, USA, 2017. - J. Surowiecki. The Wisdom Of Crowds. Anchor Books. Anchor Books, New York, NY, USA, 2005. - Gianluca Teza, Samir Suweis, Marco Gherardi, Amos Maritan, and Marco Cosentino Lagomarsino. A network model of conviction-driven social segregation. arXiv:1808.00808, 2018. - Soroush Vosoughi, Deb Roy, and Sinan Aral. The spread of true and false news online. Science, 359(6380):1146–1151, 2018. - L Weng, A Flammini, Alessandro Vespignani, and Filippo Menczer. Competition among memes in a world with limited attention. Sci. Rep., 2:335, 2012. - Lilian Weng, Jacob Ratkiewicz, Nicola Perra, Bruno Gonçalves, Carlos Castillo, Francesco Bonchi, Rossano Schifanella, Filippo Menczer, and Alessandro Flammini. The role of information diffusion in the evolution of social networks. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’13, pages 356–364, New York, NY, USA, 2013. ACM. - Paul Windrum, Giorgio Fagiolo, and Alessio Moneta. Empirical validation of agent-based models: Alternatives and prospects. Journal of Artificial Societies and Social Simulation, 10(2):8, 2007. - Y. Yu, G. Xiao, G. Li, W. P. Tay, and H. F. Teoh. Opinion diversity and community formation in adaptive networks. Chaos: An Interdisciplinary Journal of Nonlinear Science, 27(10):103115, 2017.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300573.3/warc/CC-MAIN-20220129062503-20220129092503-00147.warc.gz
CC-MAIN-2022-05
47,834
135
https://www.data-hunters.com/question/using-existing-customer-and-social-media-data-to-calculate-social-media-reach/
code
Kantar Media’s Social Engagement dataset provides social media engagement data, allowing companies to determine their brand’s popularity and reputation. This dataset also measures press coverage volume and allows users to filter results by emotion. TheySay Social Media identifies customers through the use of social media platforms and sends a brand message. Social media advertising targets social media users building and executing campaigns. Alphamatician Social Media Datasets gives access to track social media statistics. Amerium Data provides Social Media Optimization services on all social media platforms to increase brand awareness and popularity.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100172.28/warc/CC-MAIN-20231130062948-20231130092948-00758.warc.gz
CC-MAIN-2023-50
663
5
http://www.vmwhorizonair.com/partners/
code
Vice President, End User Computing Solutions, Dell “VMwares’s industry-leading multi-tenant DaaS platform was built from the ground up for the cloud, unlike other VDI approaches. By combining VMWare Horizon DaaS technology with Dell’s investments in global data centers, cloud computing and our world-class Dell Services, we will further enable our customers to drive real business results and thrive in the Virtual Era.” VMware Horizon DaaS is 100% dedicated to service providers. VMware Powered brings a complete desktop as a service (daas) solution to partners allowing your customers to embrace desktop virtualization without the cost, complexity or performance issues commonly found with VDI technology. More than 50 system integrators, service providers, resellers and technology partners are fueling their cloud offerings with VMWare Horizon DaaS. Our solution extends beyond our technology providing service providers with technical blueprints, operational models and sales and marketing tools. VMware Powered Gives Partners Access to: - The VMWare Horizon DaaS Partner Portal – An online solutions center with documentation, troubleshooting materials, marketing collateral and an interactive forum for feedback - VMware Horizon DaaS University – Online training and certification programs for technical, sales and marketing professionals - Quick Start Tools – Three month rapid proof of concept and free demo desktops to try out the VMware Horizon DaaS Platform - Technical Support – Platform installation services, monitoring, testing and help desk support - Professional Services – Expert support from a VMWare Horizon DaaS Technical Accounts Manager, a Channel Sales Manager and a Project Manager to assist with business optimization VMware Powered Supports a Variety of Partners: VMware Powered Service Provider: VMware Horizon DaaS was built from day 1 for service providers and cloud delivery. VMware Horizon DaaS has the industry’s only multi-tenanted architecture providing the scale and flexibility required for cloud services. If you're a managed service providers (MSPs), outsourcing, cloud, or hosting provider you can create new services with VMWare Horizon DaaS. VMware Powered Reseller: If you are an IT channel partner or managed service provider (MSP’s) in cloud services and IT outsourcing you can grow your customer base and top line by reselling a VMware Powered DaaS offering. VMware Powered Technology Partner: Have your service provider customers been asking for a multi-tenanted desktop virtualization platform? We can help. VMWare Horizon DaaS can integrate with your products and bring the powerful capabilities your customers are asking for now.
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207926620.50/warc/CC-MAIN-20150521113206-00300-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
2,703
17
https://www.spudd64.com/is-macos-terminal-case-sensitive/
code
Is macOS terminal case-sensitive? Is macOS terminal case-sensitive? MacOS is not a case sensitive file system by default. So you can’t have two files named File. How do I make my Mac terminal case-sensitive? Case-sensitive git in Mac OS X like a Pro - Launch Disk Utility. - Choose “New Image” - Enter a nice Name for your Volume, e.g “Workspace” - Set the size to something that will most likely fit your needs (resizing is a whole another story) - Select “Mac OS Extended (Case-sensitive, Journaled)” in “Format”. Is the terminal case-sensitive? Ubuntu’s Terminal uses case-sensitive auto-completion, as I suppose would be expected for Linux. But I think it would often be more convenient to use a case-insensitive one instead, to save you having to be accurate while starting a name, and would probably be worth the extra false positives. How do you turn off case sensitivity on a Mac? Restart your Mac, and then hold down Command-R before the Apple logo appears to bring up macOS Recovery. Click Disk Utility in the list of options that appears. Select the internal drive or boot partition in the list at left. Reformat it using a case-insensitive option. Are Mac file names case sensitive? Mac OS X, like the classic Mac OS before it, is not case sensitive; it doesn’t care whether you said File1. txt or file1. txt. Only one of them can exist in a folder at the same time, and there’s no ambiguity for either computers or humans in telling which file you meant. What operating systems are case sensitive? File names: Traditionally, Unix-like operating systems treat file names case-sensitively while Microsoft Windows is case-insensitive but, for most file systems, case-preserving. For more details, see below. Variable names: Some programming languages are case-sensitive for their variable names while others are not. What is a case-sensitive file system? In computers, case sensitivity defines whether uppercase and lowercase letters are treated as distinct (case-sensitive) or equivalent (case-insensitive). For instance, when users interested in learning about dogs search an e-book, “dog” and “Dog” are of the same significance to them. How do I turn on autocomplete in Mac terminal? How to Enable Autocomplete in Mac Terminal - Type in terminal nano ~/.inputrc. - Paste the following on separate lines. - set completion-ignore-case on set show-all-if-ambiguous on TAB: menu-complete. - Hit control+O to save changes to .inputrc followed by control+X to exit nano. How do I make terminal not case sensitive? You can make this feature case insensitive by adding a setting to Linux’s . inputrc file. This file handles keyboard mappings for specific situations on the command line (or bash shell), and lets you customize the behavior of the command line. How does case sensitivity affect the way you use commands? How does case sensitivity affect the way you use commands? When we talk about case sensitivity, commands are considered identical only if every character is encoded as is, including lowercase and uppercase letters. This means that CD, cd and Cd are three different commands. Which format on Mac is case insensitive? APFS (Encrypted): Uses the APFS format and encrypts the volume. APFS (Case-sensitive): Uses the APFS format and is case-sensitive to file and folder names. For example, folders named “Homework” and “HOMEWORK” are two different folders. How do I know if my Mac is case sensitive? Open Disk Utility, located in the /Applications/Utilities directory. Select Macintosh HD. In the bottom-left corner, check if Case-sensitive is listed. What does it mean Mac OS is case sensitive? If it reads something like Mac OS Extended (Case-sensitive, Journaled) it means that it is case-sensitive. If it just reads Mac OS Extended (without the Case-sensitive) then it is only case preserving but not case sensitive. How to tell if a terminal is case sensitive? Look for the Name: line. If it reads something like Mac OS Extended (Case-sensitive, Journaled) it means that it is case-sensitive. If it just reads Mac OS Extended (without the Case-sensitive) then it is only case preserving but not case sensitive. Is the OSX terminal case insensitive or case preserving? This is actually a feature of the filesystem of your disk, not bash or Terminal.app. HFS+ (the Mac filesystem) is usually configured to be case insensitive but case preserving. What does it mean when a file system is case sensitive? When you format a disk with HFS+ you can chose whether the file system should case sensitive or not. If you chose to format with UFS (Unix FileSystem) it is always case sensitive, AFAIK. Look for the Name: line. If it reads something like Mac OS Extended (Case-sensitive, Journaled) it means that it is case-sensitive.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545548.56/warc/CC-MAIN-20220522125835-20220522155835-00661.warc.gz
CC-MAIN-2022-21
4,785
42
https://www.shopsys.com/composer-2-0-released/
code
Dear SSFW colleagues, please be advised, Composer 2 is now available. You can read the official announcement on the packagist blog https://blog.packagist.com/composer-2-0-is-now-available/ . What does it mean for your projects based on Shopsys Framework? Your project will download automatically a version 2 of Composer, because the script installing Composer programmatically will always download the latest version. (script is located in docker/php-fpm/docker-install-composer) It’s possible for your new builds to fail with the new version. Composer 2 includes support for parallel downloads, and it is now not necessary (nor possible) to continue using the hirak/prestissimo plugin. You will need to remove this plugin from Dockerfile. You can find inspiration here – https://github.com/shopsys/shopsys/pull/2089. You will probably need to update your dependencies with the … … command, because some packages (for example symfony/flex) added support for Composer 2 in versions you may not have installed yet. In case you need to fallback to Composer 1, you can update the docker/php-fpm/docker-install-composer file |– php composer-setup.php ––quiet ––install-dir=/usr/local/bin ––filename=composer| + php composer-setup.php ––quiet ––1 ––install-dir=/usr/local/bin ––filename=composer We promise, all that extra work is worth the efforts. We are all pleased with the noteworthy speed improvements. Have fun.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224643585.23/warc/CC-MAIN-20230528051321-20230528081321-00185.warc.gz
CC-MAIN-2023-23
1,450
10
http://portalmafia.com/unix3/vi/appb_01.htm
code
This appendix describes the syntax of ex commands and then presents an alphabetical list of ex commands. address is the line number or range of lines that are the object of command. If no address is given, the current line is (usually) the object of the command. In ex command syntax, address can be specified in any of the forms shown in Table B.1. |1,$||All lines in the file| |x,y||Lines x through y| Lines x through y, with current line reset to x |0||Top of file| |n||Absolute line number n| |%||All lines; same as 1,$| |x-n||n lines before x| |x+n||n lines after x| |-[n]||One or n lines previous| |+[n]||One or n lines ahead| |'x||Line marked with x| |/pat/ or ?pat?||Ahead or back to line where pat matches| In ex command syntax, options might be any of the following: Indicates a variant form of the command, overriding the normal behavior. Copyright © 2003 O'Reilly & Associates. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891807660.32/warc/CC-MAIN-20180217185905-20180217205905-00553.warc.gz
CC-MAIN-2018-09
911
18
https://www.imec-int.com/en/work-at-imec/job-opportunities/modeling-nanofluidic-transport-single-proteins-through-nanopores
code
Master projects/internships - Leuven | More than two weeks ago Use state-of-the-art computational methods to help develop the single-molecule sensors of the future. Over the past two decades, nanopores have been developed as highly sensitive sensors, capable of detecting and distinguishing individual molecules through the monitoring of the ionic current that flows through them . Due to their broad applicability and inherent small size, nanopores are poised to enable personalized healthcare (e.g., affordable DNA sequencing and real-time biomarkers detection). As single-molecule sensors, they are also useful tools in the fundamental sciences, for example to investigate the kinetics of individual enzymes, or to improve our understanding of fluidic transport at the nanoscale. In this thesis topic, the student will make use of computer simulations to investigate how the combined dynamics of ions, water molecules, and analyte molecules—all within the confinement of the nanopore—results in the experimentally observed signal. At imec, we are performing state-of-the-art research on solid-state and biological nanopores using both experimental and simulation methodologies. The focus of this project will be two-fold to expand and improve the existing nanopore simulation methods, and to model the transport of individual proteins through these nanopores. Hence, the successful candidate should be eager to learn about the physics of fluids and proteins but should also not be averse to solving partial differential equations (analytically or numerically). Preexisting knowledge is not required but experience with problem-solving using a programming language (Python, C++) would certainly be beneficial. Type of project: Thesis Duration: 6 months Required degree: Master of Engineering Science Required background: Nanoscience & Nanotechnology Supervising scientist(s): For further information or for application, please contact: Kherim Willems ([email protected]) Only for self-supporting students.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301063.81/warc/CC-MAIN-20220118213028-20220119003028-00464.warc.gz
CC-MAIN-2022-05
2,011
13
https://tfl09.blogspot.com/2015/01/
code
Licensing with Office 365 is a bit different than normal on-premises software. With Office 365, rather than purchase a SKU, you subscribe to a Plan. A plan represents a set of services the user of that plan receives. In the early days of Office 365, the plans and the ability to move between them was problematic. If you took out a small business type plan and then wanted to move that subscription up to an Enterprise plan – you couldn't. It was all a bit messy. Then MS did two things: they simplified the plan structure, and enabled you to mix and match with the plans. The new plan structure for Office 365 contains 6 separate plans: - Office 365 Business Essentials - Office 365 Business - Office 365 Business Premium - Office 365 Enterprise E1 - Office 365 Pro Plus - Office 365 Enterprise E3 The Office 365 Business/Pro Plus plans are just the on-Prem fully installed set of Office software products. This includes Word, Excel, PowerPoint, Outlook, Publisher and One note). The Pro Plus plan adds Access. These plans are a way of subscribing to Office, versus outright purchase. These two plans just include the software – there's no on-line services or server software. These plans appeal to organisations that are looking to spread the cost over time. Once nice aspect of these plans is that you can load Office on up to 5 systems (e.g. laptop, desktop, home, etc). The Business Essentials and Enterprise E1 plans are, in effect, online Office (including the Office Online Apps, plus and Exchange mailbox, file and storage space, plus both SharePoint and Lync. The E1 plan has a few added features appropriate to larger firms, such as compliance, BI and enterprise management of applications. Finally, the Business Premium and E3 plans are the combination of the first two: full office plus mail, SharePoint, Lync. The E3 plan as above gets a bit more. For fuller details of precisely what each plan offers, see https://products.office.com/en-gb/business/compare-more-office-365-for-business-plans. What this now means is that any organisation can mix and match any of the plans. The restriction is that a a given subscription is limited to 300 seats of less of the business plans. So you could give the Business/ProPlus subscription to the road warriors who need off line access, while giving Business Essentials to in-house staff could use Office in the cloud. This offers a lot of flexibility.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510454.60/warc/CC-MAIN-20230928194838-20230928224838-00018.warc.gz
CC-MAIN-2023-40
2,409
13
http://everythingsysadmin.com/2010/10/episode-5-why-im-excited-about.html
code
One perk of being on the committee is you get to read the papers before anyone else. The security papers this year are really exciting. One being presented on Wednesday (previously I wrote Thursday; that was a typo) applies AI techniques to fixing firewall rulesets. Imagine if a firewall noticed a new set of ACLs made certain unit-tests fail. This system can actually modify the rules and, with pretty good likelihood, fix the problem. The solution might not be optimal, but it is good enough until a human can come in and fix the problem optimally. The abstract is online, and if you are a Usenix member, you can read the entire paper now. The entire paper will be readable by all after the conference. The paper is called "First Step Towards Automatic Correction of Firewall Policy Faults" by Fei Chen and Alex X. Liu, Michigan State University; JeeHyun Hwang and Tao Xie, North Carolina State University. Maybe you think this kind of self-correcting firewall system is crazy. If you attend the conference, you can be there for the Q&A session and participate. A list of all the papers and technical presentations are here: http://www.usenix.org/events/lisa10/tech/tech.html See you there!
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189680.78/warc/CC-MAIN-20170322212949-00583-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,193
5
https://dlandroid.com/learn-game-development-with-unity-c-apk/
code
|Name||Learn Game development with Unity & C# Mod Apk 2.1.39 Pro| |Updated||14 Dec 2021| |Category||Apps > Education| |Requires Android||5.0 and up| |Developer||Coding and Programming| Learn Game development with Unity & C# Mod Apk Are you interested in becoming a game developer? Are you interested in learning more about the technologies that power mobile games? The Learn Game Development app will help you to learn the languages and frameworks of game development. This app offers tutorials and courses to assist you in your game programming skills. This app allows you to not only understand the theory behind game programming and development but can also practice game coding with this app. This app contains interactive, step-by-step lessons that will help you to learn about game development. Experts in software engineering have curated all the courses on the app. Game Development Course App includes courses that will teach you Unity and C#. Unity is an open-source framework that allows you to create mobile apps for iOS and Android. Introduction to C# Different types of data Strings input Output Unity allows you to create 2D or 3D games Unity Game Objects Unity Asset Store Unity User Interface (UI). Add audio to your game These courses can be used to learn coding. You may also use our app compiler to live code and practice programming. To help you learn faster and more efficiently, there are several samples programs available. This app is worth it This Game Development Tutorial App is the ideal choice for Unity Game Development. Fun bite-sized course content Audio annotations (Text to Speech) Keep track of your course progression Google Experts Create Course Content Learn how to get certified in game development Supported by Programming Hub, the most widely used app This is the best tutorial app to help you prepare for the software exam or job interview for game development in Unity and C#. This fun learning tool allows you to code and show off your programming skills. Show some love Please rate our app on Google Play if you love it. We Love Feedback Do you have any comments? Feel free to send us an email on [email protected] About Programming hub Google”s experts back Programming Hub, a premium learning platform. Programming Hub is a research-backed learning app that combines Kolb”s learning techniques insights with expert advice. This ensures that you are able to learn in depth. For more details visit us on
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662606992.69/warc/CC-MAIN-20220526131456-20220526161456-00317.warc.gz
CC-MAIN-2022-21
2,453
33
http://forum.purseblog.com/career-and-workplace/finger-tattoo-work-appropriate-yes-or-no-602391.html
code
I want to get my grandmothers (may she R.I.P) first name tattooed on the inside of my middle finger on my left hand -- not the top part of the finger and not palm side--. I would like to do a small script font in black covering roughly the first knuckle maybe a little past it. I always loved how finger tattoos looked and wanted to get my future childrens initials on my ring finger. My personal take on this is that it's not noticable unless I'm doing certain things with my hands, I have minimal contact with clients at work and I do wear rings ( in case of a situation where it must be covered). My question to you : Do you think this is work appropriate? I test drove the design at work ( I work in Banking) and showed it to one of my co-workers who reacted by saying " what if you get fired for it?." I'm going to let this soak in for a week before making my final decision but would like to hear some feed back. T.I.A. If you work in a conservative industry it seems like it might cause some problems. Even if it doesn't get you fired it could preclude you from getting promoted in the future if someone doesn't think it's appropriate. I agree with Lily. You use your hands everyday and it is something that people with notice. While I don't think it would look bad, I don't think it will be appropriate for your work enviroment. I would wait it out or if you wouldn't mind changing the location, do that.
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051299749.12/warc/CC-MAIN-20160524005459-00022-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
1,412
4
https://blog.adafruit.com/2016/07/26/amateur-radio-is-alive-and-thriving-and-always-relevant-to-maker-skills-hamr/
code
It’s a good time to be technical. Maker communities are thriving around the world, tools and materials to create and adapt are cheaper and more powerful now than ever, and open source hardware, software, and information mean that if you can think it, you can learn how to do it and then make it happen. For one group of technological explorers, this is more than just a golden age of opportunity: it’s providing the means to save one of the oldest traditions in electronic invention and self-education, one that helped shape the modern world: amateur radio. Radio amateurs get a sweet deal, with effectively free access to many gigahertz of the same radio spectrum that companies pay billions for. They’ve earned it. Throughout the history of electronics, they’ve been at the borders of the possible, trying out ideas that commerce or government deem impossible or pointless—and making them work. Here’s one example of hundreds: Allied military comms in World War II needed a way to reliably control the radios used by front-line forces, replacing tuning knobs with channel switches. Hams had the answer ready and waiting—quartz crystal oscillators. (Those are part of computing history, too. You’re probably using about 10 of them right now.). Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts. Join us every Wednesday night at 8pm ET for Ask an Engineer! Maker Business — @the_prepared is Soliciting Original Content on Diversity, Equity, and Inclusion Wearables — Victorian Arduino pizzazz Electronics — Counting Pin Numbers Biohacking — Exploring Our Inner Reality : Entopic Visions Python for Microcontrollers — Building robots with Python, CRICKITS of the week, upcoming hackchat’ & more… No comments yet. Sorry, the comment form is closed at this time.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863109.60/warc/CC-MAIN-20180619173519-20180619193519-00603.warc.gz
CC-MAIN-2018-26
1,851
12
http://tech.secretescapes.com/2015/07/ab-testing/using-google-sheets-as-a-backend-for-ab-testing/
code
It’s often joked about by the Tech team, that I’m trying to use Google Sheets/Forms to build a new Secret Escapes. This month, I’ve begun trying out how we can use Google Sheets to make changes on the front end that would usually need to go into the database. One example is sale titles. Usually we use sale titles which are descriptive, as opposed to inspirational. A Marriott hotel in Paris, would be called “Marriott Hotel Paris” – we wanted to try changing all sale names, so they are something more like “Luxury 4* Hotel with view of the Eiffel Tower”. Usually, we’d make a change in our CMS and Database to include 2 sale titles, and then toggle what was shown depending on AB test conditions. This allows our editors to make changes on the fly, and not have Tech push changes. Another option would have been a static JSON or CSV provided on an occasional basis, but this requires both regular Tech updates and ensuring they are kept up to date is a task with overhead. So – I decided to use Google Sheets as a makeshift CMS, and then use it to create a JSON feed which could then be pulled into Optimizely to manipulate the front-end using Jquery. I set up a Google sheet with the internal sale reference ID, and the new name we wanted to call it. Then I set it to be publicly available, so we could access the JSON. Obviously as it’s publicly accessible, you don’t want any personally identifiable information in there – but for this experiment it’s fine. All this is accessible on the website, anyway. Next up was to set-up the Optimizely experiment, the JS needed to pull this information through is actually remarkably simple. I spent some time setting up the firing rules, and testing it. But voilà, the new names pull through on our page Obviously this should never be a long term solution or alternative to a DB or CMS. But as a quick way to allow editable data in an AB test for none technical users, it’s perfect.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120206.98/warc/CC-MAIN-20170423031200-00210-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,960
8
https://scholars.esri.ca/profile/?uid=Zachary%20Harmer
code
In my own words... Receiving the 2015 Esri Canada GIS Scholarship has been a rewarding experience for me. It has provided me with a multitude of ways to improve my competence with ArcGIS as well as the ability to create Python programs. ArcGIS is a tool that I use at school with each one of my projects and the resources which accompany this scholarship have been a great benefit to succeeding with these projects in the final year of my undergraduate degree in Physical Geography. Because of this scholarship I was able to build an application which I am happy to continue developing as a Research Assistant in the coming years as I pursue my Masters of Sustainability at Brock. I sincerely thank Esri Canada for the opportunity to receive this scholarship, it truly meant a lot. Recipients of the Esri Canada GIS Scholarship, Esri Canada Higher Education GIS Award and Esri Young Scholars Award in Canada Recipients of the Esri Canada GIS Scholarship Recipients of the Esri Canada GIS Scholarship and Esri Canada Higher Education GIS Award in 2015 If you wish to contact this person and they have not provided contact information, you may send your message to [email protected]. The Scholarship Coordinator will review your message and forward it to the intended recipient if deemed appropriate.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00437.warc.gz
CC-MAIN-2023-14
1,311
6
https://job-openings.monster.co.uk/full-stack-php-developer-central-bristol-bristol-sw-uk-sr2-rec-ltd/11/202692006
code
Full-Stack PHP Developer | Central Bristol I met an impressive software company earlier today in Central Bristol who are looking for a Full-Stack PHP Developer who has experience writing beautiful, well documented and maintainable code, to join their team. This is a company whose software has widespread use within the higher education space particularly and impacts on the efficiency of thousands of organisations. You will be a part of a full-stack team responsible for all aspects of development from design, right through to test and launch. They are also moving towards a Microservice architecture so you'll have a hand in this. The MD in his words 'will bend over backwards' for his team by way of flexible working (48% of the workforce are on some form of flexible working arrangement), hackathons, socials, training (both inhouse and external), conferences, gym membership, extra day holiday every year etc etc They aren't too hung up on level of experience but more interested in your attitude and desire to learn so regardless of your level, they would be interested to hear from you. Salary-wise they are open-minded but as a ball-park between £30-48k is realistic. Their ideal developer will come with: - Framework experience within PHP (Symfony preferred although Laravel, Codeignitor, Cake, Yii etc all considered!) I would love to tell you more about this company and projects they are working on, apply now for immediate consideration.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743007.0/warc/CC-MAIN-20181116091028-20181116113028-00181.warc.gz
CC-MAIN-2018-47
1,453
10
https://support.huawei.com/enterprise/en/knowledge/EKB1000019041
code
In the live network find when Eudemon8080 in two-node cluster Active - Active (not enabled session immediate backup) cases, the session number between master and slave have a difference about 200000-300000, and which session can't backup? 1, make sure the active/standby FW whether configure HRP mirror session enable command (whether enable session immediate backup), and the active/standby FW HRP synchronous state is normal or not 2, through elog to query, collect session record to analyze after two-node cluster HRP synchronize and do not enable session immediate backup, there are several types of message do not synchronize backup active/standby: A, the session established when message to firewall itself will not make active/standby backup. B, To some user Behavior only the first bag is UDP message (such as the Edonkey/Emule, Bittorrent), and then do not use UDP message to transmit data, this P2P behavior firewall will not make active/standby backup. C, the session do not successfully complet TCP 3 way handshake will not make active/standby backup. 1, the session as long as complete TCP 3way handshake, or continuous hit session table UDP message will make active/standby backup. 2, when the user use P2P software, usually when first track seed (SEED, Torrent file), will use UDP message. When make sure the seed is Peer, will use TCP message to transfer data message. Suggest that can check session record of the firewall UDP message from the Elog, if find there are many UDP message stay in firewall in a very short time, it also means there are some UDP message of the above 2 (b) type exist in the live network, so lead to two-node cluster (Active - Active) appearing session number is inconsistent.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578742415.81/warc/CC-MAIN-20190425213812-20190425235812-00417.warc.gz
CC-MAIN-2019-18
1,719
8
https://navtechy.com/10-best-emulators-for-windows-to-run-any-android-apps-on-pc-online/
code
In running Android Apps on Phone, we have to always worry about battery life. To run any Android Apps on PC Online, we need PC emulators. Mostly we are having problems with Games Apps. Using Keyboard and mouse for Gaming is the perfect isn’t?In fact, there are a number of Emulators and Software you can find on Google. If you search Google, you can find many Android emulators. Here are the 10 best emulators for Windows to run any android apps on PC Online. What is Emulator? According to Wikipedia ” In computing, an emulator is a hardware or software that enables one computer system to behave like another computer system. An emulator typically enables the host system to run software or use peripheral devices designed for the guest system. The Emulator runs as a Virtual host on PC. Enables us to run any Android Apps on PC Online. Best Emulator to run any Android Apps On PC The 10 best Windows emulators among all the Emulators is the one that is easy to set up and has a good Interface. Not all the tricks are legal, in some cases, they are illegal so you can try VPN Services. Also, Emulators used for productivity in the development of Apps by Developers. Below is the list of 10 Best Android Emulators to run any Android Apps On PC Online with a short description and Download Link. 10 Best Android Emulators to run any Android Apps On PC - Android Studio’s Emulator Android studio is the development studio offered by Android. It has a bunch of tools for the development and testing of apps. Despite using as emulator it needs some setup which can be difficult for regular people. If you know some Coding stuff, its best fo you. Download Android Studio ARChon setup requires a lot of efforts, the best part is it can be run on any OS which runs an instance of Chrome. You have to install a chrome extension( Windows OS, Mac OS, Linux e.t.c) and then use the compatible version of App. You can find all the detailed instructions from below GitHub link. Download From Github Bliss is totally different from the above emulators. Also, It works as a Virtual Machine for PC via Andriod Emulator. This Emulator runs Android Oreo. So, you are tech-savvy I would recommend this to you. Download Bliss From Xda-Developers Price: Free/$2 per month Bluestacks is mostly used by the Gamers and among all the Android Emulators. The reasons are to use BlueStacks are several, it is compatible with both Windows and Mac. The latest version Bluestacks 4 is aimed to fix the mixed results. It runs the Android 7.1.2(Nougat) launched in 2018, it is one of the recent of any emulator. The speed of BlueStacks is also better than any other Emulator. Download BlueStacks v 4.0 Droid4x is a classical Android Emulator for PC with a simple design. The work on Droid4x is too easy. The last version update of Droid4x was launched in 2016. So, I recommend use with caution it may be buggy and unstable for your latest OS. Download Droid4X for Windows Price: Free (with paid options) Genymotion is Freemium Emulator with availability on Cloud and your Desktop Computer. Mostly used by developers to test the Apps by switching between the virtual devices. KoPlayer is mostly used by Gamers to run Mobile Games on PC. Also, has a feature to record the stream and upload it wherever you want. The setup is too easy for regular peoples. It’s not a bad option for free cost. It also offers productivity features and seems to okay. MEmu is another emulator used by the user lineup of BlueStacks and similar ones. It offers Android Jelly Bean, Kit Kat, and Lollipop. It’s the latest version is MEmu 6.25. In fact, It only works on the Windows Platform. You can run multiple instances at once for your Games Apps. The most recent update of MEmu is in December 2018. According to a report from its blog, it’s still in development. Nox is a free emulator, best for gaming. It offers usual features as Keyboard-mapping with the controller support. It is actively in development phase. The setup requires very little time and easy to use. PrimeOS is not a fully Android Emulator. It requires partition in your PC to run and boots up running native Android. Also, it will give you an Andriod experience on your PC. You can also use it for productivity as the development of Apps. It is a newly launched Emulator from an Indian start-up. You can do multitask as you do on your Android Device. Best Android Emulators For Windows (2020) Among the 10 best Android Emulators used by Gamers and Developers. What I recommend is PrimeOS. PrimeOS is Android Home for Desktops as a Standard user perspective and as Gamer Perspective. It installs on Hard Drive and boots up running native Android. If you are an android developer and have to test the Android app, then I recommend to use Android Studio. We will update the article whenever we find an update to it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100399.81/warc/CC-MAIN-20231202105028-20231202135028-00192.warc.gz
CC-MAIN-2023-50
4,840
27
https://quanttype.net/posts/2014-10-21-four-scientific-learning-hacks.html
code
During my university studies, I haven’t been to any book examinations until now. I’m studying a minor in cognitive science and there’s a bunch of book examinations I need to take. The book I’ve now studied is Fundamentals of Cognition (Michael Eysenck, 2012). I’ve been worried, because I don’t have any practice in studying for a book examination. Luckily this book covers topics such as memory and learning! What does cognitive psychology say about studying efficiently? Process the information deeply According to the level-of-processing theory, the deeper your analyze the information you’re learning, the longer-lasting the memory traces are. Do not just read the material - do something with it. For example, put the key points in your own words. This forces you to process the text semantically instead of just glossing over. The best thing you can do is to relate the information to yourself somehow - this gives an extra boost to recollection. Test your learning Research says that the long-term retention is better when you test yourself while you study. Instead of reading a chapter twice, read it once, close the book and try to remember as much as you can. (This is also known as the Feynman Technique.) When rehearsing the material, spaced repetition software (SRS) such as Anki can be a powerful tool. The forgetting curve hypothesis says that forgetting happens exponentially. Anki will test you just ahead of this curve. Also, creating a deck of flashcards is a way to process the material more deeply. Learn in environment similar to the exam hall You recall information better when you’re in similar context as you were in when learning the information. This includes the physical environment but also your internal physiological state and mood. This would suggest that you should study at the same time of the day as the exam is. If you’re going to eat or drink coffee before exam, do it before studying, too. Study in an environment that is similar to the examination hall. Bonus: Get very drunk immediately after studying Consolidating new memory traces is a process that takes hours. Alcohol inhibits consolidation of memory, so if you drink heavily, nothing will interfere with consolidation of the material you’ve learned while studying. This means you will remember the material more clearly. I haven’t tried out this method myself, but hey, there’s research so it must be true.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510412.43/warc/CC-MAIN-20230928130936-20230928160936-00068.warc.gz
CC-MAIN-2023-40
2,428
14
https://scottfarrisdesign.wordpress.com/2016/12/15/giant-blue-moth-boss/
code
Design for another insect boss for the Glitch Metal game. Shades of Mothra. Mostly blue shades. Preview the game here https://timebomb.itch.io/glitch. Works best on Google Chrome browser, and keep in mind it is currently in development, so might be a lil buggy. And you can vote for it to be Greenlit on STEAM here https://steamcommunity.com/sharedfiles/filedetails/?id=792444287.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866965.84/warc/CC-MAIN-20180624141349-20180624161349-00620.warc.gz
CC-MAIN-2018-26
380
1
http://lwn.net/Articles/539388/
code
But if I understand this aright, your "fix" has an equally troubling ethical consequence. Let's say I've spent loads of time and money developing my product. I want to PROTECT my customers, like Qt/KDE did. It sounds like I can't use your licence to do it. Oooppsss. Personally, I have no problem with people trying to monetise and sell their software. But as a customer I don't want to be trapped with outdated software and no source when technology moves on, and I think developers have a duty to their customers. Pity I can't use your licence to achieve that :-(
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706624988/warc/CC-MAIN-20130516121704-00071-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
565
3
https://forum.sentinel-hub.com/t/fis-geometry-character-limit/505
code
Is there a limit on the length of the WKT geometry string passed to the FIS? It seems that it is 2000 characters, therefore working in a Web Mercator projection with high accuracy will only allow about 50 coordinate pairs to be passed at a time. Yes, there indeed is a limit, based on common URL length limits. In terms of “accuracy” - take into account that Sentinel-2 has 10 meter resolution. In Web Mercator the decimals of the coordinates go beyond one-meter, so two orders of magnitude less than the accuracy of the Sentinel-2. I suggest you round coordinates to integers. Thanks Grega, that is a good suggestion. I am also using a proxy page to handle the FIS requests, but it does not seem to work with the longer request strings, even though it uses a POST method. Can you send an example of such a call, so that we can debug? Ok I’ll email you off the forum.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649343.34/warc/CC-MAIN-20230603201228-20230603231228-00370.warc.gz
CC-MAIN-2023-23
873
6
https://www.mondaylovesyou.com/web-accessibility/wcag-2-4-3-focus-order/
code
Let’s say that, in an effort to use crowdsourcing techniques to decide on which kind of pizza you should eat for dinner, you create a survey on your site for people to fill in. The survey begins with fields where users are asked to enter their name and contact information, followed by a series of questions where they indicate their answers by selecting checkboxes. Sighted users can take one look at the survey and almost instantly know the order in which to answer the questions that would make the most logical sense. However, you carelessly forget to check the tabbing order on your page (shame on you!), and so unbeknownst to you, someone using a screen reader has to jump between questions in totally different fields—marking a checkbox, filling in their name, marking another checkbox, then filling in their email—rather than moving through the survey in the order you intended. It’s not an impossible task, but you can imagine it’d be confusing as heck. It’s important to make sure that when people navigate sequentially through your site, they go through everything in an order that makes sense for the content. The eye can often naturally infer a logical navigation order. However, someone using a screen reader would lack the visual context necessary to ascertain a logical navigation order and would be reliant on the underlying coding of your page. The way you determine the navigation order of your page depends on the technology of your content. With basic HTML, you can establish sequential navigation order by the tabbing order. Imagine, for instance, you’re designing a website for the Metropolitan Museum of Art in New York. There’s the main body content, along with a navigation bar on the left-hand side. You want users to focus on the main content first. After all, they ostensibly used that same navigation bar to get to this page. They don’t need to look at it again right away. So, you place the menu in the HTML after the main body content and then style it with CSS to appear where you’d like it, on the left. That way, those using screen readers can tab through the main content first, before returning to the navigation menu. In Dynamic HTML, you can alter the navigation sequence using scripting, with the addition of a tabindex attribute to facilitate focus on additional elements. If scripting and tabindex aren’t used, the navigation order is simply the same as how everything appears in the content stream. It’s possible the navigation order of your page is irrelevant. The point is to ensure that the order doesn’t adversely affect the meaning and operability of the content on your page. If you determine that this isn’t a concern, then you don’t have to worry. Just use your best judgement, and err on the side of caution. It’s also a possibility that there are a number of navigation orders that make sense for your site. If this is the case with your site, you only need to create a linear pathway for one of those navigation orders.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474541.96/warc/CC-MAIN-20240224144416-20240224174416-00026.warc.gz
CC-MAIN-2024-10
3,005
9
https://answers.informer.com/146230/cant-acess-the-camera-and-a-blue-light-is-flashing
code
Each camera works differently and the blue light might indicate a warning or an error, but since you don't have an image on the screen, then it means it's likely to be a serious error. Each CCTV camera has a button called Reset that restores the camera's settings to default state. In some cases the button is available in plain sight, otherwise you will have to open it up as protection method. Reset the camera, connect directly using a LAN camera and then check its stream. By default, the camera should display image on screen, but if it doesn't do that, then you might have to take it to servicing repair as this might be a hardware problem.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141183514.25/warc/CC-MAIN-20201125154647-20201125184647-00140.warc.gz
CC-MAIN-2020-50
646
1
http://forum.audacityteam.org/viewtopic.php?f=61&t=88241&sid=16ec162c1b05fa8eedbe04b8fb4afa12&start=10
code
John79 wrote:"So do you want to hear First Phrase, 2 seconds silence, Second Phrase, 2 seconds silence, Third Phrase... ? " YES Thank you In between I found a solution 1. Import all for example 1000 VOICE files 2. Mark all tonsures ( OSX CMD+A?). 3. TRANSPORT "Skip to Start " 3. GENERATE Silence for example 2 seconds. 4. TRACKS Allign tracks End to End 5. Insert Background music 5.1 Import MP3 Background music files in Audacity per Drag n Drop 5.2 Reduce Silince gain to -28 DB (Voice Records should be louder) 5.3 Mark background Music, then copy n paste background sound till end of voice record time (for long files this can be 10 times) 6 Tracks -> Mix und Render 7. Export Audio als MP3 What is the advantage of installing some plugins? From your description I thought you wanted to insert silence at the start of all the original files, automatically. The method I wrote would do that, rather than having to paste repeatedly. It would not add fairly loud room noise, though by default the export would add extremely quiet dither As you now say you wanted only one file as the result, you would then with my suggestion have to import all the new files, align them, then export as one file.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118831.16/warc/CC-MAIN-20170423031158-00512-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,198
17
http://www.geektonic.com/2009/03/windows-media-center-health-monitor.html
code
Have you ever missed a recording, had a tuner go bad or had other problems with your Windows Media Center HTPC? Most HTPC users have probably experienced problems like these one time or another, but usually we find out after it happened or days after the fact. Ian Dixon of the Digital Lifestyle has developed an app that may not fix those problems, but it will monitor your Media Center HTPC for these sort of problems and will notify you the moment something goes wrong. What does it Monitor? Media Center Health Monitor watches your scheduled recordings for any problems and lets you know whether the shows have recorded successfully or if they failed for any reason. The app also monitors Media Center recordings and scheduled services for any signs of trouble and alerts you to potential problems before they happen - nice! Media Center Health Monitor can notify you via e-mail, RSS feed, on the Media Center Health Monitor website and even twitter!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100381.14/warc/CC-MAIN-20231202073445-20231202103445-00454.warc.gz
CC-MAIN-2023-50
954
4
https://www.econstor.eu/handle/10419/61776
code
The necessity to quantify the risk caused by the high volatility of asset prices, large insurance claims or floods has lead to an increasing interest in extreme value analysis. Generalized Pareto and extreme value distributions are well suited to model data which are exceedances above a threshold or maxima. We describe two statistical software systems - XploRe and Xtremes - that support a user in performing an extreme value analysis. Within both systems, various estimators for the above distributions are provided. We give an overview of their application and mention visual tools to check the adequacy of a parametric modeling by means of non-parametric procedures. Both systems utilize a client/server architecture to provide access to their resources across a network. While the server version of XploRe supports an interactive Java client which can be used from a web browser, the Xtremes system implements a CORBA interface that exports statistical objects to a client program.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057225.57/warc/CC-MAIN-20210921161350-20210921191350-00379.warc.gz
CC-MAIN-2021-39
987
1
https://www.walmart.com/reviews/product/19497924
code
I am pretty happy with the Brother MFC-J425W. I did have a lot of trouble setting it up, but once I figured out what to do, it was easy. Also, sometimes it loses connection, in which case I usually have to restart my internet modem and it's fine. Also, the quality of the print is not that good, but I am not doing any heavy graphics. I like the scanning capability and the wireless capability.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170823.55/warc/CC-MAIN-20170219104610-00120-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
394
1
https://freecmsthemes.com/drupal8-w3css-theme/
code
Guaranteeing to be the main Drupal 8 theme that uses the littler and less demanding to-learn w3.css system, Drupal8 W3CSS theme is intended to be easy to use, with quick loading times. It’s responsive by default and gives CSS equity over all browsers and devices. It likewise accompanies 22 predefined themes, and has 22 locales and 26 sections with variable colours. - Drupal8 W3CSS Theme is utilizing the modern W3.CSS framework with worked in responsiveness. - Drupal8 W3CSS Theme has 22 regions. Check README.txt for more details. - Drupal8 W3CSS Theme has 26 sections with variable colors. With w3.css structures you can change the background color, text color, text shadow and more to any section in your website. Just apply the w3.css class to the section. - Drupal8 W3CSS Theme accompanies capacity to change the site width. Simply embed any of the predefined classes into site width in theme settings. (w3-width-100-percent, w3-width-2560, w3-width-1920, w3-width-1600, w3-width-1360, w3-width-1280, w3-width-1024 and w3-width-800). - Drupal8 W3CSS Theme accompanies flat principle menu or vertical side nav. Simply add the main menu to the horizontal region or the vertical region. - Drupal8 W3CSS accompanies the capacity to make your own particular private W3.CSS Theme and apply it to your site. - Drupal8 W3CSS comes with 6 color libraries. (US Highway Colors, US Safety Colors, Camouflage Colors, Vivid Colors, European Signal Colors and Food Colors). You can create unlimited color themes. - Drupal8 W3CSS Theme comes with 8 social media links that are easy to configure. - Drupal8 W3CSS Theme has a top region that includes three flexible regions. (The total space in the top region will be divided by the number of regions you filled.) - Drupal8 W3CSS Theme has a base area that includes four adaptable regions. (The total space in the bottom region will be divided by the number of regions you filled.) - Drupal8 W3CSS Theme comes with Font Awesome 4.7.0 added to the css library. - Drupal8 W3CSS comes with jQuery match height. Example: If you have three squares in the top area, they will dependably have matching height on the large screen size. - Drupal8 W3CSS comes with a responsive fundamental menu and It is three level drop-down menu. The drop-down works on hover for big screen and on click for small screen. - Drupal8 W3CSS will hide completely (divs, wrappers, classes) any area you don’t utilize. Nothing will be printed in the back. - Drupal8 W3CSS Theme utilizes the base HTML structure to show the content.Illustration, You won’t see div > div > div > div > div. - It accompanies the capacity to make a custom page layout as per content write’s name. If you have two content types article and video you can have page–article.html.twig and page–video.html.twig. - This Theme comes with the capacity to make a custom page template for any view. Example if you have a view name “recent_video”, then you can create a page template name page–recent-video.html.twig. - Drupal8 W3CSS Theme comes the capacity to change the main container’s columns layout to equal width. Change the columns from (25% half 25%) to (33%) . - It has the ability to create a responsive horizontal three level secondary menu or a responsive vertical three level secondary menu. - Smaller and faster than other CSS frameworks. - Simpler to learn, and less demanding to use than different CSS frameworks. - Speeds up and simplifies web development. - Supports modern responsive design (mobile first) by default. - Gives CSS fairness to all programs. Chrome, Firefox, IE, Safari, and more. - Provides CSS equality for all devices. PC, laptop, tablet, and mobile.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335054.79/warc/CC-MAIN-20220927162620-20220927192620-00250.warc.gz
CC-MAIN-2022-40
3,685
27
https://discuss.streamlit.io/t/poems-clip-alph-the-sacred-river/8874
code
The app will tell your story with images (as best it can – it’s mostly landscapes!). You can also enter your own text. Check it out and let me know what you think! Nice use case, @metasemantic! This is a wonderful use case, @metasemantic I write poetry in Spanish, and I think I can give it a try as a method to showcase my own poetry. I tried with the input box and it resulted in very interesting things. I’ll fork it, play around with it for a bit and report back! Great work, I loved it! I’d love to see what you do with it! I’m also @metasemantic on Twitter, so if you post something there please tag me and I’ll promote it! I noticed that the BPE (byte-pair encoding) had tokens for other languages so it should have at least a minimal understanding of Spanish – no guarantee on how well it will work though.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178363782.40/warc/CC-MAIN-20210302065019-20210302095019-00344.warc.gz
CC-MAIN-2021-10
828
7
https://howtomanagedevices.com/intune/6553/how-to-cleanup-intune-device/
code
This post will show how to configure cleanup intune device rules in the Intune portal (a.k.a Endpoint Manager portal). As Intune Admins, we often get many inactive and stale Intune records due to the nature of test device enrollments. To keep Intune environment and reports current by cleaning up these stale devices. You can configure the automatic Intune device cleanup rules, which cleans up inactive, orphaned, or obsolete devices and has not checked in recently. The rule allows us to automatically choose between 30 and 270 days to remove inactive/obsolete device records from Intune. These cleanup rules continuously monitor your device inventory so that your device records stay current. Before proceeding to next step, It’s important to know few points. According to Microsoft – - Device cleanup rules don’t support Android Enterprise devices, including fully managed, dedicated, corporate-owned work profile, and personally-owned work profile. - If a removed device checks in before its device certification expires, it will reappear in the console. - The device clean-up rule doesn’t trigger a wipe or retire. Intune Device Cleanup Rules - Sign in to the Microsoft Endpoint Manager admin center. - Choose Devices > Device cleanup rules. - Under Device cleanup rules, In Delete devices based on last check-in date. Select Yes. When set to Yes, Intune deletes devices based on the custom number of days you specify. - In the Delete devices that haven’t checked in for this many days box, enter a number between 30 and 270. - Choose View affected devices. Based on the above specified days, you can see the list of devices that haven’t checked in for 60 days. - You can also export the list of inactive device records from Intune before configuring the device cleanup rules, By clicking the Export button located under Affected devices. By clicking View affected devices, you can validate a list of inactive/obsolete device records from Intune that will automatically remove by device cleanup rules. - After you click Save, Once this rule is enabled, Intune will automatically remove all devices that have been inactive for the number of days you set. ⚠️Important – After you click Save, all devices that have been inactive for the specified number of days will immediately be deleted from Intune. Intune will continue to delete devices as they exceed the number of set days. Reports with data about the deleted devices may take up to 48 hours to refresh. Intune Device Cleanup Rules FAQs Microsoft listed out Intune Device Cleanup Rules Frequently Asked Questions (FAQs) to clarify device types affected from device cleanup configuration, I will recommend you to read once – What happens behind the scene for Device Cleanup rules? After the Intune Service Admins enable the rule, Intune services run a background job every few hours to remove all applicable devices from the Intune portal. They won’t show up in any Intune blade or device list anymore. What device types get affected from this device cleanup? Device cleanup rules aren’t available for Jamf-managed devices and Android Enterprise scenarios like Fully Managed, Dedicated, and Corporate-Owned with Work Profile. All other enrolled devices, including MDM, EAS/MDM, MDM/SCCM (Co-Management) devices, will be removed. This includes registered devices and devices whose approval is pending. Does this device cleanup rule perform device wipe or retire? No, this automatic rule only removes the devices from the Intune portal, which are inactive for the specified number of days. Is it possible to have devices removed by the device cleanup rule to come back in some scenarios? Yes, it is possible that some devices can come back in the Intune portal as there are service criteria to auto-recover the cleaned-up devices if they check-in to the Intune service recently. The purpose of this behavior is to recover devices owned by somebody that took a long leave (e.g., Extended vacation, sabbatical, maternity leaves). The grace period for the device to show up in the Intune portal again is before the device cert expires, which is 180 days. If you do not want devices to check back in, consider filtering for stale devices, and bulk delete from the All devices view instead. - Automatically delete devices with cleanup rules – Microsoft Docs - Intune device cleanup rules - Learn How to Setup Azure AD Device Cleanup Rules - How to Delete Azure AD Stale Device Records
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948234904.99/warc/CC-MAIN-20240305092259-20240305122259-00880.warc.gz
CC-MAIN-2024-10
4,462
30
https://mail.python.org/pipermail/python-dev/2012-April/119097.html
code
[Python-Dev] [RFC] PEP 418: Add monotonic time, performance counter and process time functions steve at pearwood.info Sat Apr 28 02:50:37 CEST 2012 Some issues with the PEP 418: 1) time.clock is deprecated, but also supported by get_clock_info. Why bother supporting it if you don't want people to use it? 2) get_clock_info returns a dict. Why not a namedtuple? 3) The dict returned by get_clock_info includes an optional key, "is_adjusted". Why is it optional? 4) The section on mach_absolute_time states: According to the documentation (Technical Q&A QA1398), mach_timebase_info() is always equal to one and never fails, even if the function may fail according to its prototype. I've read the linked technical note and I can't see anything about it always being equal to one. I don't think your description is accurate. 5) In the glossary, you mark some terms in angle brackets <> but there is no definition for them: <clock monotonic> (which I think should be <monotonic clock> instead) 6) A stylistic suggestion: the glossary entries for Accuracy and Precision should each say "Contrast <the other>" and link to the Wikipedia article. 7) There is a mismatch in tenses between "Adjusted" and "Resetting" in the glossary. Suggest something like this instead: Adjusted: Reset to the correct time. This may be done either with a <Step> or by <Slewing>. 8) The glossary defines steady as high stability and "relatively high accuracy and precision". But surely that is not correct -- a clock that ticks every once per second (low precision) is still steady. 9) The perf_counter pseudocode seems a bit unusual (unPythonic?) to me. Rather than checking flags at call-time, could you not use different function definitions at compile time? 10) The "Alternatives" section should list arguments made for and against the alternative APIs, not just list them. Thanks for your excellent work Victor! More information about the Python-Dev
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141733120.84/warc/CC-MAIN-20201204010410-20201204040410-00670.warc.gz
CC-MAIN-2020-50
1,927
34
https://cstheory.stackexchange.com/questions/11218/are-there-fixed-context-sensitive-grammars-which-are-pspace-complete
code
To draw continued attention, here are some explanatory comments, with a tentative proof based on the idea of universal CSG. The original quote (in my original post) is from wikipedia entry: Context-sensitive grammar, requote here: "There are even some context-sensitive grammars whose fixed grammar recognition problem is PSPACE-complete." The statement that the word recognition problem for CSG is PSPACE-complete and the statement that the same kind of problem for some fixed grammar in CSG is PSPACE compelte are different! The former is sometimes called universal recognition problem for CSG, and the latter, well, may be called just fixed CSG grammar recognition problem. Let's refer to the two problems as UCSG and FCSG respectively. The instances of UCSG are pairs of (G,x) where G can be any CSG, and x can be any strings; whereas those of FCSG for a fixed grammar G', are pairs of (G',x) where G' is fixed, and x can be any string. Thus to say UCSG is PSPACE complete, it means that there is a polynomial time transformation T such that for any decision problem Q in PSPACE, there is pair (G,x)=T(Q) such that the answer to (G,x) is the answer to Q; Whereas to say FCSG for a fixed CSG G' is PSPACE complete, it means that there is a polynomial time transformation T' such that for any decision problem Q in PSPACE, there is string x, such that (G',x)=T'(Q) is the equivalent problem to Q. When the original author states that FCSG is PSPACE complete without giving a reference, he (she) may think that it is kind of obvious or its importance does not justify more detail. But I think a reference or certain hints are valuable here, assuming it is right. Along this line of thinking, my tentative proof plan for FCSG being PSPACE complete is the following: Let H be such a special grammar in CSG such that H accepts x if and only if x=u#v where u is the coding (by some coding funciton) of arbitrary grammar G(u) in CSG and G(u) accepts v. Since the condition of H is fulfillable by a LBA (or not so?), by the equivalence of LBA and CSG, such H exists; and any ICSG for such a H is PSPACE complete. Since this H can simulate any other CSG, we may call it universal CSG. Are there proofs along this line already, where, or this purported proof plan has flaws? If the idea of universal CSG is essentially right, we may continue asking what other classes have their own universal instances.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00764.warc.gz
CC-MAIN-2023-50
2,396
12
http://foswiki.org/Development/FoswikiBot
code
What is FoswikiBot? FoswikiBot is an IRC bot for the #foswiki IRC channel. The bot used to be a Mozbot with a few custom modules. As of 12th of June 2011, it has been migrated as a BasicBot because Mozbot uses Net::IRC which is highly discouraged, and anyway didn't install properly. wrote a module for it to emulate most of its previous functionalities, and to add new wishes by the community. The code is available on github and it should be on CPAN too. What can FoswikiBot do? FoswikiBot does the following: - Expands Plugins.InterwikiPlugin style links - gives a URL to foswiki.org for any TML link it can work out TODO - so like the Jump to topic, but in any web - best attempt - FeatureRequest would goto FeatureRequest, SolrPlugin would point to SolrPlugin, Maln.WebHome etc etc - some variation on autocompletion - user enters a WikiWord like FeatureReq - the bot searched on anything starting with that, and picks the best match it can - Only replies with a topic's URL once ever XXX lines to avoid spammage - Sven Wishes - newtask:asdasf and newfeature:something - create a new task and a new feature - Provides a link to the current line in the LOGGER logs - Notifies #foswiki-dev to changes in RSS feeds - Remembers little bits of information - Checks spelling - Other random IRC bot things How do I use FoswikiBot? FoswikiBot generally only understands commands when you directly address him. There are two ways to address the bot: by name or by a command character. The command character is currently set to Addressing the bot by name < QBFreak> foswikibot: slap QBFreak * foswikibot pokes QBFreak in the ribs Addressing the bot by command character < QBFreak> !slap foswikibot < foswikibot> QBFreak: Oh you'd like that, wouldn't you, you sadist pervert. Plugins.InterwikiPlugin style links FoswikiBot automatically expands any Plugins .InterwikiPlugin style links he hears in conversation, no special command is required. Link expansion example < SomeUser> kenneth, other topic, on Tasks:Item5967 < foswikibot> http://foswiki.org/Tasks/Item5967 for a list of links the bot supports. Link to the current line of the LOGGER logs FoswikiBot can provide a link to the IRC logs, selecting the current line and causing the browser to jump to it. If you request a link for a channel from somewhere other than that channel, a note will be appended to the message stating which channel the log is for. Requesting a link to the current line in the #foswiki logs < QBFreak> !logtime #foswiki < foswikibot> http://irclogs.foswiki.org/bin/irclogger_log/foswiki?date=2006-05-31,Wed&sel=673#l669 (channel #foswiki) Requesting a link to the current line in the current channel's logs < QBFreak> !logtime < foswikibot> http://irclogs.foswiki.org/bin/irclogger_log/foswiki?date=2006-05-31,Wed&sel=673#l669 These logs are recorded by a seperate bot run by ColasNahaboo . Perhaps [LOGGER] needs its own topic hint hint FoswikiBot notifies the #foswiki-dev channel of changes in the foswiki.org Development web, foswiki.org Tasks web, and new SVN < foswikibot> Just appeared in SVN: Foswiki Project - http://foswiki.org : < foswikibot> Revision 10407 by SomeUser < foswikibot> Just appeared in Foswiki's Tasks web - http://foswiki.org/Tasks : < foswikibot> New -- http://foswiki.org/Tasks/Item5967 - viewfile partly broken. (SomeUser) This happens once every 15 minutes. If you would like to check the entries sooner, privately message the bot with one of the following commands: || foswiki.org Tasks || foswiki.org's Development web || Subversion commits /msg foswiki development <foswikibot> QBFreak: Items in Foswiki.Development - http://foswiki.org/Development: MiniAhah <foswikibot> QBFreak: CopyPreviousRevisionTopicContentIntoNewRevision -- KindsOfFoswikiDocUsers <foswikibot> QBFreak: ReleaseMeeting2006x05x29 -- FoswikiAjaxFrameworkShowcaseTools <foswikibot> QBFreak: FoswikiAjaxFrameworkShowcase -- FunctionsNeededForPlugins -- WebTopicCreator <QBFreak> shut up <foswikibot> Dropped 4 messages. You can always use the command to make the bot stop reading off the message queue. This works any time he responds with multiple messages. FoswikiBot can tweet to the Foswiki twitter feed <SvenDowideit> !tweet yay! http://fosiki.com/Foswiki_debian/ now has 200 extensions in the debian repository - and foswiki 1.0.6 Foswikibot twitted (SvenDowideit) yay! http://fosiki.com/Foswiki_d... now has 200 extensions in the debian repository - and foswiki 1.0.6 URL's may be automatically tinyurl-ified, just like using the twitter web interface. Storing and retrieving information (factoids) FoswikiBot can associate a phrase with a word and when asked about the word respond with the phrase. These are called factoids, originally from the Infobot IRC bot. To set a factoid, say word is phrase , FoswikiBot will pick up assoications like this from conversation and save them. For instance, this occured quite by accident shortly after the bot was started: Setting a factoid < SvenDowideit> vi is like... <giggle> Retrieving a factoid < QBFreak> !vi < foswikibot> QBFreak: vi is like... <giggle> Quite often we all forget how to spell one word or another, thankfully FoswikiBot is here to help. Any word you're unsure of how to spell, make a best guess and then type after it, the bot will pick this up in your conversation and make spelling suggestions. < QBFreak> it was quite the conondrum (sp?) < foswikibot> Suggestions for 'conondrum': conundrum, conundrums, corundum, condemnor, condoners, condoner, condemnors... Other bits of fun Like most IRC bots, FoswikiBot also has a few fun and semi-useless commands. One of which is the command used to illustrate the different ways to address the bot. FoswikiBot can also track karma. You give or remove karma points with the operators. Karma can be checked with the < QBFreak> !rank foswikibot < foswikibot> foswikibot has 1 points of karma (rank 2). < QBFreak> foswiki++ < QBFreak> !rank foswikibot < foswikibot> foswikibot has 2 points of karma (rank 1) It is possible to display all ranked entries using with no parameters. FoswikiBot will annouce the person with the most points in the channel and privately message the list to avoid spamming the channel.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256314.52/warc/CC-MAIN-20190521102417-20190521124417-00449.warc.gz
CC-MAIN-2019-22
6,203
93
http://www.networkworld.com/article/2345037/microsoft-subnet/meet-me-in-houston-at-microsoft-wpc.html
code
This week I'm attending the Microsoft WPC, Worldwide Partner Conference, in Houston Texas. It's going to be a hot one, oh and the conference should be really good too, lol. If you are in town for the conference, stop by, introduce yourself and say hello. I'll be at the Absolute Performance booth (#1081, right next to the Microsoft Software+Services partner hosting area and the OpSource booth), one of my companies who is also a Microsoft NXT partner for Software + Services, and also covering the show for Network World. If you are a blogger, I'd also like to tell you about the Feedburner network I've started, the Microsoft Blogger's Network. I'll say more about that in just a bit. Hope to see you in Houston. Stay cool! Like this? Here are some of Mitchell's recent posts.Live Mesh & Virtualization Saves Gas5 Things You Need To Know About Hyper-V7 Skills For IT Fame & FortuneiPhone's A Useless Brick With Me (AT&T)A Weekend With Hyper-VLimitations Won't Dampen Hyper-V Product Reviews: Microsoft Live Mesh Google App Engine LiveNewsCameras.com Xobni Outlook plugin Rock Star jobs in SaaS: SaaS JobsRecent Converging Network Blog Posts: Get Ready For XaaS Everywhere Unbelievably Bad Web Password Security Back From Hiatus, Saved by Web 2.0 Technology It Takes a Village.. ah, actually, being there first and tons of hard workThe Converging Network and SSAATY Security Podcast.Visit Microsoft Subnet for more news, blogs, opinion from around the Web.Sign up for the bi-weekly Microsoft newsletter. (Click on News/Microsoft News Alert.)
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122996.52/warc/CC-MAIN-20170423031202-00300-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,543
4
https://community.imgtec.com/forums/topic/emulation-of-accelerometer-data/
code
- March 16, 2010 at 10:37 am #30080 I was wondering whether an emulation of the accelerometer data could be included in the PowerVR SDK for Windows? (I’m thinking of something like holding down the Alt-key and dragging the mouse to simulate tilting a hand-held device in the corresponding direction. There could also be some visual feedback to convey the currently simulated orientation of the device.) (Of course, if the accelerometer data is emulated, the next feature would be to emulate the compass data and then multitouch positions and then the camera video stream etc 🙂 What I understood from previous postings is that the PowerVR SDK should support only the smallest common feature set of PowerVR devices with respect to interactions (similarly to GLUT); but I think the SDK for Windows would be a lot more attractive for developers if they could use it to emulate more of the interaction features that are available on their target platform. In particular because certain ways of interacting are often required for particular applications. Thus, from this point of view the PowerVR SDK for Windows should emulate as many features of different devices as possible. The more features are supported, the more of the development of an application can be done within the PowerVR SDK only. While this can result in platform-dependencies, it might also encourage developers to support multiple kinds of interactions for the same functionality; thus, applications might actually become more platform-independent. Of course, Imagination Technologies might not have the resources to code emulations for many more features; thus, would it make sense if developers code them and post their results here?March 16, 2010 at 1:02 pm #33790 Simple accelerometer support has been addedto PVRShell, but not to emulation as of yet. It’s a good suggestion that we will look at for our next major release. Our initial policy with PVRShell has been, like you say, to give a common feature set that can be accessed across all platforms. With the advent of touch interfaces, often with minimal buttons, this has changed slightly and your points concerning the emulation environment make sense – we’ll look at it this as well. In the past we’ve not really fed any code back into our SDK from third parties, although I don’t believe there is any policy reason for this. If you have changes we’d certainly be interested in them, but we reserve right to reject any code proposed and any code we use would need to be released entirely from copyright etc. If you just want to help other developers by posting examples then you are most welcome to do so here.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886436.25/warc/CC-MAIN-20180116125134-20180116145134-00269.warc.gz
CC-MAIN-2018-05
2,653
8
http://forums.adobe.com/thread/322414
code
I am using a brush on a path but the arrow symbols are in the wrong direction! I would just need to reverse the path of the line in order to put the arrows symbols in the correct direction but as I am a novice in Illustrator, I don't know how to do that? If somebody can help... Other drawing programs have a proper Reverse Path command. Illustrator doesn't. Illustrator has a Reverse Path Direction button in the Attributes palette, but it only works on subpaths of compound paths. (Very lame.) This .zip archive is named "JET_ReversePath." Put that script your Presets/Scripts folder. Relaunch Illustrator. Then you should be able to: 1. Select any number of paths, including paths that have Brushes applied to them.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539493.17/warc/CC-MAIN-20140416005219-00201-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
718
4
https://boards.eune.leagueoflegends.com/en/c/community-creations-en/OME8Nfb6-ingame-voice-chat
code
Old and overused suggestion but will this ever happen? It just makes it easier and more accessible everyone, especially in what is a heavily team-orientated game. It just makes the whole process more enjoyable and you can simply mute people as if it's normal chat. You say that it's unlikely because of flaming and it's hard to monitor but that makes absolutely no sense considering that CS:GO and various other extremely competitive games allow for the feature If you don't like what someone is saying, the logical option is just mute them and report them instead of limiting the development of what would be an incredibly useful and effective feature.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671363.79/warc/CC-MAIN-20191122143547-20191122172547-00050.warc.gz
CC-MAIN-2019-47
653
5
http://honeynet.org/taxonomy/term/85
code
Today Apple unveiled the next generation of OS X, Lion and new iOS 5. Among the features, I'm concerned about two features: AriDrop and iCloud. UPDATE: the log data is posted here. A notification group about new log sharing is here. We are a 501c3 non-profit, all volunteer organization. Consider donating to support our forensic challenges, tools development, and research.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164758033/warc/CC-MAIN-20131204134558-00020-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
374
3
http://narocad.blogspot.com/2008/07/work-progress-31-july.html
code
Ported NaroCad on the wrappers and it worked well. Started working at the ApplicationFramework wrappers. In 1-2 days also these wrappers should be finished. With these wrappers the wrapping task should be finished. Will improve them while working at Naro. After wrapping will continue with working at the application architecture. This task should take 2-4 days.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864039.24/warc/CC-MAIN-20180621055646-20180621075646-00100.warc.gz
CC-MAIN-2018-26
362
3
https://www.woodstockproduction.com/programming-definitions
code
Here is a glossary for Python programming definitions.Learn a meaning of a term here. Learn game programming through our video tutorials here. Game programming terms and tutorials "Python programming definitions explained" Argument:The part of a statement that Python will operate on.For example,in a print statement,the text that will actually be printed to the screen is the argument. Example---->print"hello world!"The "hello world" text statement is the argument that Python will operate on. Comment:A comment is a specially marked element(looks like this #) in a program that is ignored by Python.Comments are useful for explaining what you're trying to accomplish. Compiled Language:In compiled languages,the code is translated completely into a machine-readable format before it runs.In general,compiled languages are faster-running programs,but interpreted languages can be more flexible. Console:A text based interface.You can interact with Python at DOS or UNIX shells in a console mode. Docstring:A unique text value that happens at the beginning of a Python program.Docstrings are used to create the automatic documentation for the program,and they are usually multi-line string. IDLE(Interactive Development Environment):A simple-but-potent text editor and Python environment that comes with most versions of Python. Interactive Mode:A special way of interacting with the Python environment.When you use interactive mode,you type the commands directly into Python rather than storing them in a text file.Interactive mode is useful for quick code checks and accessing the online help system. Interpreted Language:An interpreted language(such as Python) is one translated from a human-like dialect into machine-readable code in real time.Programs written in an interpreted language cannot run unless the user also has the interpreted program installed on the same system.Interpreted languages can be slow,but the programmer can interact with with them in real time.The alternative to an interpreted language is a compiled language(such as C+). Method:Something an object knows how to do.For example,Python's built-in string object has a method to convert to lowercase(string.lower()). Object Oriented Programming:A form of programming that allows the programmer to organize code in objects much like those in the real world.Most built-in Python elements(variables,lists,etc) are objects. Pygame:A module that adds game-programming functionality to Python. Python:An interpreted language designed to be powerful yet simple for beginners. Slicing:Using the square braces() operators to pull a subset of a string or list. Statement:A command or line of code in a programming language. String:A variable containing text. String Interpolation:A technique for embedding(or enclose firmly) variables into a string for easy formatting. Syntax:A programming language's rules of grammar and punctuation. Tuple:Values inside parentheses,separated by commas.The elements can't be changed. Variable:A variable is a reference to a specific place in a computer's memory meant to store information.Each variable has a name and value. Data Type:What kind of data a variable contains.Even though Python automatically assigns a data type to every item of data,the programmer has to know what type a variable is because each type has different methods associated with it. Debugger:A special program that allows you to view your program one line at a time and watch what it's doing.IDLE has a debugger built in. Dynamically Typed Language:A programming language that allocates data types automatically as the programmer assigns values to variables.Python is dynamically typed. Float:A floating-point real number. For Loop:A programming structure that repeats code once for each element of a list.Use the range() function to make the code repeat a certain number of times. Example---> for i inrange(2): print"I love woodstock production!" I love woodstock production! I love woodstock production! I used the range(2) function to make a list with two elements and repeat the line "I love woodstock production!" two times in a row using the for loop to step through the (two elements) list.So the line is repeated once for every element in the list. Integer:A number without a decimal part. List:A variable containing multiple values. Operator Overloading:A mathematical operator sometimes does different things on different data types.For example,an operator will concatenate(combine) string data with the plus sign(+),but it will add integers and real numbers with a plus sign(+) as well. Real Number:A number that can include decimal values.Real numbers can be referred to as floats. String Concatenation:Combining two strings to make a larger string.This can be done with the plus sign(+). Boolean Variable:A variable containing either True or False.Boolean variables are often used to make main loops easier to follow. Condition:An expression that can be evaluated to True or False.Can be compared to a Boolean value or something else that Python can interpret as a Boolean value. Encapsulation:The concept that functions can be used to conceal(hide) details from the main program,making the program easier to read and maintain. Equality Operator:Checks to see whether two values are equal.Use the double equals sign(==)to see whether two values are equal to each other. Example--->lastName=raw_input("what is your last name?") if lastName == "woodstock": print"Hi jason woodstock!" what is your last name?woodstock Hi jason woodstock! This example asks the user a question on what is their last name.I used an if statement to indicate a condition(if lastName == "woodstock").Whatever the user types to respond to the question,that value will equal the lastName variable. If the user types in woodstock as a response to the question on what their last nameis,then the lastName variable will equal woodstock and the user receives a greeting(Hi jason woodstock!) Function:A subprogram that works by itself to solve a specific problem. Global Scope:A variable declared outside any function.The variable's value can be read from any function. Local Scope:A variable created inside a function is considered local to that function.The variable has a value only as long as the function is running. Main Loop:Most programs have a primary loop that controls how long the program runs.This loop is usually some form of a while loop.Main loops often have a plethora(many)of exit points,so they are best controlled by a Boolean sentry variable. Parameters:When you define a function,you can indicate a number of variable names inside the parentheses behind the function's name.These variables become local variables when the function is called.When you call a function that has parameters,you must supply a value for every parameter. Self-Documenting Code:Code designed to be as easy to read as possible.You can make your code self-documenting by choosing your variable names carefully and making your code as straightforward as possible. Sentry Variable:A variable which controls access to a loop.Sentry variables must be properly initialized,must be part of of the condition,and must be changed inside the body of the loop. Shortcut Evaluation:If you have a prolific amount of conditions chained together with a series of elif statements,Python exits the chain as soon as it finds the first True condition.This means the order in which you place the conditions can be very important. Example----> firstName=raw_input("what is your name?") if firstName == "Jason": print"Hey Jason Woodstock!" elif firstName == "Mark": print"Hello Mark.Where's Jason?" what is your name?Jason Hey Jason Woodstock! I made python asks the user for its name using the raw_input() function and then setup two conditions.If the user types in Jason as their response,then the user gets "Hey Jason Woodstock!".If the user types in Mark,then the user gets "Hello Mark.Where's Jason?". The user then types in Jason as their name and python greets the user with "Hey Jason Woodstock!",but ignores the other condition that I set up if the user types in Mark.Python exits the program as soon as the first condition's value is True and this is known as shortcut evaluation. Variable Interpolation:A technique for putting many kinds of data into a string,which allows automatic conversion and formatting. Variable Scope:The notion that variables only have value within some block of code. Application Programming Interface(API):A set of programming tools that allows you to add functionality to a programming language. Blit:Short for block transfer,this technique for copying one surface to another is used to draw surfaces onto the screen. Display:A special pygame module used to control the screen display hardware.Usually referred to as pygame.display,its most important functions are pygame.display.set_mode() and pygame.display.flip(). Double Buffer:All image manipulation is done on a secondary surface that resides only in memory,and the entire surface is copied onto the display screen in one special,high-speed blit.Double buffering makes the display smoother and faster.Use the pygame.display.flip() function to use double buffering. Event:Some kind of stimulus that the user sends to the game through the keyboard,mouse,or joystick. Event Buffer:A special list that contains all the events that have occurred during the current frame.Use pygame.event.get() to retrieve the event buffer. Frame Rate:The basic speed of your game.Python games usually run 30 frames per second. Game Loop:Sometimes referred to as an animation loop,the game loop is the logical structure that manages what happens during each frame. Module:Python's tool for adding functionality.Python comes with several useful modules(like pygame, for example).In order to use the tools in a module,you need to import it. Pixel:The basic graphical unit of a computer display.A pixel can produce colors by varying the amount of red,green,and blue in the light it emits. Rect:A data structure representing a rectangle.Every surface has a rect associated with it,as do many other graphical objects in pygame. Resolution:The number of pixels used in a game.Usually specified by width and height. Simple Direct Media Layer(SDL):A multi-platform graphics API used by pygame to simplify graphics and game programming. Surface:A pygame object that represents a rectangular image in memory. Tuple:A python structure much like a list but with fewer capabilities.Used within pygame to manage color values and screen coordinates. I used the fill() method of the surface object to create a single-color surface that is black.The tuple (0,0,0) represents the color black.Python uses a three-number system to define colors. Widget:A graphical element like a button or list box. Constant:A variable that is not meant to change as the program runs.Constants are often used for clarity and are written entirely in uppercase. Font:A combination of typeface with size.Pygame has an object for the font to be used in computing to refer to a file containing typeface information(using the pygame.font.Font() or pygame.font.SysFont() function). Immutable:Certain data types(strings and tuples for example) are immutable.This means assignment is the only way to change them. Keyboard Constants:A series of keyboard names stored in the pygame module.They usually begin with K and contain the letter or key name(for example,pygame.K_ESCAPE or pygame.K_b). Radian:The length of a circle's radius inscribed on the circumference of the circle. Typeface:The characteristic shapes of whole sets of letters. Attribute:A characteristic of an object.In python classes,attributes are usually defined with self.attributeName in the classes' __init__() method. Bounding Box:The smallest box with horizontal and vertical sides that surrounds a sprite.Used in collision detection. Class:A template or definition for creating instance objects. Class Module:A file containing multiple class definitions.Can be loaded with import statement. Color Key:A color that is designated as transparent.Any pixels that are this color will not be drawn,and the background will be shown instead. Constructor:A special method called when an object is created.In python,use the initializer __init__() to act as a constructor.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500671.13/warc/CC-MAIN-20230208024856-20230208054856-00443.warc.gz
CC-MAIN-2023-06
12,293
96
https://slashdot.org/search/books
code
You can have a sneak preview by looking at the current draft of pre-fascicle 5a (52 pages), last updated 18 January 2017. As usual, rewards will be given to whoever is first to find and report errors or to make valuable suggestions. I'm particularly interested in receiving feedback about the exercises (of which there are 125) and their answers (of which there are 125). Over the years Knuth gave out over $20,000 in rewards, though most people didn't cash his highly-coveted "hexadecimal checks", and in 2008 Knuth switched to honorary "hexadecimal certificates". In 2014 Knuth complained about the "dumbing down" of computer science history, and his standards remain high. In his most-recent update, 79-year-old Knuth reminds readers that "There's stuff in here that isn't in Wikipedia yet!" Adams also wrote a collection of short stories called "Tales From Watership Down" in 1996, and the original "Watership Down" was also made into a movie and an animated TV series. In announcing his death, Richard's family also included a quote from the original "Watership Down". "It seemed to Hazel that he would not be needing his body any more, so he left it lying on the edge of the ditch, but stopped for a moment to watch his rabbits and to try to get used to the extraordinary feeling that strength and speed were flowing inexhaustibly out of him into their sleek young bodies and healthy senses. "'You needn't worry about them,' said his companion. 'They'll be alright -- and thousands like them.'" The article even criticizes the "Santa's Village" site at Google.org, which includes games like Code Boogie, plus a game about airport security at the North Pole. Their complaint is its "Season of Giving" game, which invites children to print out and color ornaments that represent charities -- including DonorsChoose.org. The article ends by quoting Slashdot reader theodp ("who documents the influence of Big Tech in education") as saying "Nothing says Christmas fun more than making ornaments to celebrate Google's pet causes..." But now long-time Slashdot reader Qbertino has a question: I've had The Art of Computer Programming on my book-buying list for just about two decades now and I'm still torn...about actually getting it. I sometimes believe I would mutate into some programming demi-god if I actually worked through this beast, but maybe I'm just fooling myself... Have any of you worked through or with TAOCP or are you perhaps working through it? And is it worthwhile? I mean not just for bragging rights. And how long can it reasonably take? A few years? Share your answers and experiences in the comments. Have you read The Art of Computer Programming? These are all DRM-free ebooks (in multiple formats), and there's even some "early release" editions -- advance copies distributed before their official publication. The discount also applies to new titles like "Head First Python" as well as old-school classics like "Learning Perl". Right now their best-sellers are "Wicked Cool Shell Scripts", "Modern Linux Administration", and "You Don't Know JS: Up and Going" -- but again, the discount applies to any ebook that they sell, and they also still have their selection of free programming texts. Tim O'Reilly was one of the first people interviewed by Slashdot -- more than 17 years ago.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285244.23/warc/CC-MAIN-20170116095125-00494-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
3,309
11
https://dymondlab.org/former-phd-students-2/
code
2011-2015: Marc Bennett Ph.D, KU Leuven, Belgium (external co-promoter; now at University College Dublin). 2009-2012: Anita Munnelly Ph.D. (now at University College Dublin). 2009-2012: Richard J. May Ph.D. (now at University of South Wales). 2008-2012: Alice E. Hoon Ph.D. (now at College of Medicine, Swansea University). 2006-2009: Matteo Cella, Ph.D. (now at King’s College London, Institute of Psychiatry).
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986675316.51/warc/CC-MAIN-20191017122657-20191017150157-00430.warc.gz
CC-MAIN-2019-43
413
5
https://www.freelancer.com/job-search/android-apk-iptv/
code
Address modifications to code in development, provide maintenance assistance before app release. Source Code is already created, we have APK & IPA that just need modifications and ect... We are also looking for on-going long term development support I'm looking to decompile a game app to get the source code then compile it as my own with different tweaks. I know there are already apps out there that can do this like "Show Java", so it should be easy. This is a small project/test and if successful you will be included in a big project coming soon which has the potential to generate millions (you will get a % piece). Disc... ...our previous developer, who is unfortunately no longer available, so reliability is important, as is communication and speed and accuracy. I have attached the available app APK file and excel outlining functionality and design for each page/section. You will need to review these, we have the working files too, so if you feel comfortable, ideally we I have android music player work from local music files ( raw folder ) Application work good but i need someone to edit : - Add seekbar that can control music flow , forward and backward music - Code for repeat one music ( when finish replay the same ) . ( icon is : [url removed, login to view] ) add icon with repeat and shuffle button . (I already I have an apk file, which I need to get the source code for. If you are a professional who can get the source code, please let me know. Also, make sure to type, "I can get the Source Code" while bidding so that I know you have read the project. Thank You. I need a script implemented into an apk file. The purpose of the script is to disable update feature in the app. The app has a feature where it forces you to update to the newer version of the app if you are still using the old version. If you can do this, please let me know. Also, type "I can make this Script" while bidding so that I know that you We are mature and growing IPTV company located at Brooklyn, NY. Currently we are looking for Mid-level UI/UX Designers working remotely (from anywhere around the world) or onsite in New York. You'll work on multiple projects. Here are some examples: 1. [url removed, login to view] 2. [url removed, login to view] 3. [url removed, login to view] We are looking for someone I have an apk app already created but need to customize it with our artwork, logo & contact ...looking for a simple application like this one - [url removed, login to view] Its a APK downloader enter the url it downloads the apk and lets you install it. I also want to hard code some apk files into it for 1 push downloads and also a update notification so it will notifiy clients when updates are available ...shortest time possible. please read the details carefully and ask all the questions you need via private chat. 1) make app 100% compatible with Android 4.2.2 Details: currently the app works ok on Android 4.2.2 TV Boxes, but when changing channels, we're facing 2 major problems; 1st problem = audio works but picture is frozen for 5-20 seconds, then I have a app and have contacted the developer directly to try and sort a re...contacted the developer directly to try and sort a rebrand/diffrent version but they have not got back to me and would like to get one sorted, i would love an app built off xtreme Iptv that uses the xtremecodes api but would like it to have a EPG layout like perfect player i have a key but when i try gradle and build apk with it is not work from some reson, i need someone to help me with it by give me final apk that i can upload to play store, you can use teamviewr as well , np We need to test our CRM Android APP on different users. Testing basic functions: login, registration, basic menus and functionality. The users need to speak english, and a little understanding of how a CRM app works. The APK will be provided. Each individual tester should describe each screen: what they understand on that screen which parts Hi arifjaunpur, I noticed your profile and would like to offer you my project. We can discuss any details over [url removed, login to view] provide me your contact info to discuss ...would like to offer you my project. We can discuss any details over [url removed, login to view] provide me your contact info to discuss further . It is really a big project regarding streaming IPTV . Thx Pacote completo de canais TV, na sua smartv, tablet ou celular. Sem precisar de fios, aparelhos e furos em paredes. Requisitos: ter uma smartv e internet igual ou superior a 10 megas. Configuração e compartilhamento de rede internet. Instalação e apontamento de todas as antenas e atualização. Ligue agora mesmo. Kami mencari seorang front end developer untuk aplikasi android bertema Inbox. Kami tidak membutuhkan file apk jadi, hanya source code atau project yang dapat digabungkan dengan core dari aplikasi (backend). Project harus dibuat di dalam android studio. Pada dasarnya akan terdapat dua buah halaman : 1. Halaman pertama berisikan daftar pesan (memuat Hello, a developer created an Android APP for me, but the app has some errors. The App is very simple, because its just my mobile website converted in an App. I got the .apk File. Is that enough to edit the app? It's needed to change: - the app icon - the loading screen - activate firebase (notifications) - it's not possible to click on
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112533.84/warc/CC-MAIN-20170822162608-20170822182608-00354.warc.gz
CC-MAIN-2017-34
5,378
17
https://devrant.com/search?term=ubiquity
code
Do all the things like ++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatarSign Up Get a devDuck Rubber duck debugging has never been so cute! Get your favorite coding language devDuckBuy Now Search - "ubiquity" I’ve started the process of setting up the new network at work. We got a 1Gbit fibre connection. Plan was simple, move all cables from old switch to new switch. I wish it was that easy. The imbecile of an IT Guy at work has setup everything so complex and unnecessary stupid that I’m baffled. We got 5 older MacPros, all running MacOS Server, but they only have one service running on them. Then we got 2x xserve raid where there’s mounted some external NAS enclosures and another mac. Both xserve raid has to be running and connected to the main macpro who’s combining all this to a few different volumes. Everything got a static public IP (we got a /24 block), even the workstations. Only thing that doesn’t get one ip pr machine is the guest network. The firewall is basically set to have all ports open, allowing for easy sniffing of what services we’re running. The “dmz” is just a /29 of our ip range, no firewall rules so the servers in the dmz can access everything in our network. Back to the xserve, it’s accessible from the outside so employees can work from home, even though no one does it. I asked our IT guy why he hadn’t setup a VPN, his explanation was first that he didn’t manage to set it up, then he said vpn is something hackers use to hide who they are. I’m baffled by this imbecile of an IT guy, one problem is he only works there 25% of the time because of some health issues. So when one of the NAS enclosures didn’t mount after a power outage, he wasn’t at work, and took the whole day to reply to my messages about logins to the xserve. I can’t wait till I get my order from fs.com with new patching equipment and tonnes of cables, and once I can merge all storage devices into one large SAN. It’ll be such a good work experience.7 ---WiFi Vision: X-Ray Vision using ambient WiFi signals now possible--- “X-Ray Vision” using WiFi signals isn’t new, though previous methods required knowledge of specific WiFi transmitter placements and connection to the network in question. These limitations made WiFi vision an unlikely security breach, until now. Cybersecurity researchers at the University of California and University of Chicago have succeeded in detecting the presence and movement of human targets using only ambient WiFi signals and a smartphone. The researchers designed and implemented a 2-step attack: the 1st step uses statistical data mining from standard off-the-shelf smartphone WiFi detection to “sniff” out WiFi transmitter placements. The 2nd step involves placement of a WiFi sniffer to continuously monitor WiFi transmissions. Three proposed defenses to the WiFi vision attack are Geofencing, WiFi rate limiting, and signal obfuscation. Geofencing, or reducing the spatial range of WiFi devices, is a great defense against the attack. For its advantages, however, geofencing is impractical and unlikely to be adopted by most, as the simplest geofencing tactic would also heavily degrade WiFi connectivity. WiFi rate limiting is effective against the 2nd step attack, but not against the 1st step attack. This is a simple defense to implement, but because of the ubiquity of IoT devices, it is unlikely to be widely adopted as it would reduce the usability of such devices. Signal obfuscation adds noise to WiFi signals, effectively neutralizing the attack. This is the most user-friendly of all proposed defenses, with minimal impact to user WiFi devices. The biggest drawback to this tactic is the increased bandwidth of WiFi consumption, though compared to the downsides of the other mentioned defenses, signal obfuscation remains the most likely to be widely adopted and optimized for this kind of attack. For more info, please see journal article linked below. So today's the day. We've now successfully installed four Ubiquity AP's with a Ubiquity Security Gateway onto a 1000/1000 fiber line. Feels really nice when you're finished with the cable laying and everything just works™. Just getting the fiber in there was a project of its own, but now it's all complete. Tommorow I'll be working from home, and on Monday I guess I'll be bombarded with connectivity issues. Oh well, let's enjoy the weekend first 😁2 Woo hoo, how I just love having to develop an extension to a system that the company bought 😍 Especially when there is an API that is completely undocumented, not even mentioned on their site 😍 Even more when it's a feature you expected to be there when you bought the system, because it's a reasonable thing to expect 😍 Fucking Ubiquity Unifi Video 😭 "I recently saw another demonstration of graphic design’s ubiquity. Someone had taken a series of photographs of busy streets and then painstakingly removed all the logos, symbols, signs, colours, street names and road markings. In other words, they had removed all the graphic design from these photographs. The results were staggering. A world without graphic design is an unrecognizable world — more alien than all but the most extreme sci-fi imaginings." - Adrian Shaughnessy May Somebody helps me with the build of an interesting thing with a ubiquity and a icore slackware running os1
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655929376.49/warc/CC-MAIN-20200711095334-20200711125334-00066.warc.gz
CC-MAIN-2020-29
5,427
32
https://www.odesk.com/o/jobs/job/_~0148cfe261fa608add/
code
we need a highly talented and responsible linux admin guy who able to wok with different- different open source tools/software like mail server, openerp, opencms, openhrm, fms (flash media server), vls (videolan server), Asterisk, AWS with Good networking concept, security skills for web server and little knowledge of programming language (like python, perl, c++, java). We have lot's of client and lot's of project from them. So i need a complete responsible guy. Who response me asap. First we start contract in a fixed priced projects and after surety we will hire selected guy in a monthly mode. Every project is assigned in legal NDA document which contain fixed price, time duration and other things. Note :- Payment will be cleared after completion of project. No upfront payment. So if you have trust then bid but it's matter of long term relationship.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206118.10/warc/CC-MAIN-20140423032006-00626-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
862
4
https://metacpan.org/pod/SemanticWeb::Schema::WinAction
code
Looking for help! - SEE ALSO - COPYRIGHT AND LICENSE SemanticWeb::Schema::WinAction - The act of achieving victory in a competitive activity. The act of achieving victory in a competitive activity. A sub property of participant. The loser of the action. A loser should be one of the following types: A predicate for the "loser" attribute. Please report any bugs or feature requests on the bugtracker website https://github.com/robrwo/SemanticWeb-Schema/issues When submitting a bug or request, please include a test-file or a patch to an existing test-file that illustrates the bug or desired feature. Robert Rothenberg <[email protected]> This software is Copyright (c) 2018-2021 by Robert Rothenberg. This is free software, licensed under: The Artistic License 2.0 (GPL Compatible)
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060908.47/warc/CC-MAIN-20210928214438-20210929004438-00279.warc.gz
CC-MAIN-2021-39
796
14
https://github.com/jruby/jruby/pull/4054
code
Join GitHub today GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.Sign up RubyEnumerator implements java.util.Iterator #4054 feels like a good fit and this makes enumerator usable with Java 8 (with some boilerplate) : ... ideally some more integration would be handy but JRuby would need compiling under Java 8 for easy : Ruby enumerator (and thus Ruby array) usability with 8 streaming is confirmed with test-cases. also possible by hooking up
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198942.13/warc/CC-MAIN-20200921050331-20200921080331-00742.warc.gz
CC-MAIN-2020-40
528
7
https://mapscaping.com/podcast/geoserver/embed/
code
GeoServer is an open-source server for sharing geospatial data. Designed for interoperability, it publishes data from any major spatial data source using open standards Simone Giannecchini Founder and Director https://www.geosolutionsgroup…. Copy and paste this URL into your WordPress site to embed Copy and paste this code into your site to embed
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00609.warc.gz
CC-MAIN-2022-33
350
4
http://ask.metafilter.com/47559/Job-Identity-Crisis
code
Job Identity Crisis! September 29, 2006 7:45 AM Subscribe What am I? (Job title question) I want to request my job title be changed to something more appropriate. My current title is something both obscure and generic because when I started, the company didn't know what I would be doing. Here is the problem though, I still don't know what I am. Though this time its because my job is sort of a mixture of two jobs. I am the company's web designer, but that's not all I do. My job also requires print layout and heavy image editing for print. I'd say I do 75% web related work and 25% other graphic related work. What I'm stumbling on is would a title like Web Designer be appropriate, or Graphic Designer. Web Designer seems to leave out the other stuff I do, and Graphic Designer leaves out the web stuff. My personal goal is to lean more towards graphic designer (yes, part of the reason I'm looking at this is because I really want to be able to put a good title on my resume when I decide its time to look for a new job) Here is the breakdown on the web side of my job: HTML & CSS coding basic flash animations. The "other stuff" Print layout for things like instruction sheets and brochures image manipulation for my projects as well as when our other branch needs items for print. This could be making composite images or just simply things like sharpening and color correcting creating new artwork using illustration programs helping other employees fix their own images or fixing them for them for things like presentations. ocassionally take photographs of product. (not sure how relivant that is since it really is occassional) So I'm stuck. What title would be appropriate for me?
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663611.15/warc/CC-MAIN-20140930004103-00353-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
1,693
16
http://www.agileroots.com/sponsor/xmission/
code
AtTask AtTask is a cloud-based Enterprise Work Management solution that helps marketing, IT, and other enterprise teams conquer the chaos of excessive email, redundant status meetings, and disconnected tools. Pluralsight Pluralsight is the global leader in high-quality online training for hardcore developers. The revolutionary Pluralsight training library provides developers with instant access to a rich collection of online training courses delivered by industry authorities. Western Governors University At WGU, you earn your degree based on what you’ve learned, not how long you’ve spent in a classroom. Founded in 1993 by technology entrepreneur Pete Ashdown. XMission has a commitment to quality service, leading-edge technical expertise, and strong advocacy for the local community. From its early days as a private, local ISP to its current role supporting customers across the globe, XMission has expanded its technical offerings to include sophisticated hosting, business telephony, and connectivity solutions. Throughout its history, XMission has also proudly worked with hundreds of Utah’s nonprofit organizations by providing free web hosting services, and by sponsoring a variety of community-based events and facilities. XMission only offers carefully developed and thoroughly tested services. We strive to provide exceptional technical support every time we interact with a customer. Plus, whenever we schedule maintenance or respond to issues, we email clearly-worded announcements explaining the situation. This adherence to high standards means customers receive a quality of service not offered by larger providers.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021587780/warc/CC-MAIN-20140305121307-00091-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
1,644
9
https://www.kvraudio.com/product/extreme_drumsynth_by_sonic_sidekick/news
code
Today I was thinking to get this finally, and to my surprise, sadly, there's seemingly no way to obtain this synth. Nice question, .. is it discontinued?. huh... that would be a great loss for many. Would anyone have an idea how to obtain this?. I only have the demo from several years ago, and I'd really like to have the full version to create with.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055684.76/warc/CC-MAIN-20210917151054-20210917181054-00700.warc.gz
CC-MAIN-2021-39
351
1
http://tucursogratis.online/category/ukraine-girls-46/
code
When I’& rsquo; ve informed my pals I’& rsquo; m happening a lengthy service travel to Ukraine, they begrudged and also thought that I was actually the luckiest person on the planet. ‘’& lsquo; & rsquo; Dude, you perform understand that Ukrainian girls are actually the trendiest worldwide? & rsquo; & rsquo;. & lsquo; & rsquo; They are actually very hot and also’simple, I & rsquo; m certain you & rsquo;’re going to possess so much fun!!! & rsquo; & rsquo;, I was actually questionable about their claims due to the fact that none of them have actually ever been actually to Ukraine. These are all merely things that they’& rsquo; ve read on the Web and you understand exactly how occasionally these kind of points are certainly not true. As quickly as I’& rsquo; ve landed in Ukraine, I knew that they weren’& rsquo; t being located regarding the elegance and panoramic appeal of Ukrainian girls. The Streets of Kiev, Lviv, and Odessa teemed with beautiful women proudly revealing their beauty. Nonetheless, gaining an Ukrainian lady’& rsquo; s soul is certainly not as quick and easy as many individuals think, myself included. That is why I’& rsquo; m going to share my adventure with Ukrainian girls during the remain. If you would like to figure out even more regarding these Slavic beauties, their individuality, and also looks as well as the best means to rack up an Ukrainian woman, satisfy kept reading. How do Ukrainian girls appear? Many people point out that Ukrainian girls are amongst the best wonderful girls around the world as well as they’& rsquo; re not as well far from the reality. These are actually the girls that will definitely make your mandible reduce and also head twist. Why are Ukrainian girls taken into consideration being one of the best lovely girls? Range is possibly among the causes. Through past, various parts of Ukraine has actually combined with different ethnicities, resulting in a varied appeal and also spectacular bodily functions of these females. Depending on the location you’& rsquo; re going to, you & rsquo; re heading to comply with various forms of Ukrainian ladies, all beautiful and appealing in their personal way. The girls coming from Kiev, the capital of Ukraine, as well as various other aspect of the Core region often have much smaller cheekbones, rounded head, and also light brown hair. They are actually not as well high but certainly not also short either. The southern region like Odessa is actually a home of dark-haired, dark-eyed girls along with oval face and straight nose. Nevertheless, these are actually just small variations that I’& rsquo; ve seen in different locations of Ukraine. Whatever aspect of Ukraine you see, you’& rsquo; re going to comply with a ton of attractive girls with pleasant facial functions, light-to-medium skin complexion, as well as generally a brown hair. There are organic golden-haireds as well in addition to girls with eco-friendly and blue eyes. This sort of girls is much more popular in Kiev, Lviv and a few other portion of Ukraine. Although they have beautiful face components, Ukrainian girls wear a considerable amount of makeup. Most of all of them utilize makeup to emphasize their components yet sometimes it may possess an unpleasant effect. In either case, wear’& rsquo; t expect all of them to be organic as well as makeup-free like girls coming from Germany or Austria. High heels, skirts, and gowns are the best common clothing that Ukrainian girls use, whether they’& rsquo; re happening a Sunday stroll or even in a club. There are girls that have more informal type but they are even more an exception than guideline. Points you need to recognize prior to dating a Ukrainian gal Once our company’& rsquo; ve completed talking about the appeals of Ukrainian girls, there are actually some simple facts you need to learn about their courting culture as well as way of life that are mosting likely to keep your assumptions in check. Ukrainian girls are different than their Western equivalents. If you’& rsquo; ve ever before been actually to any of the Eastern European nations, you probably recognize what I indicate. Extra traditional, fatherlike lifestyle, religion, the value of household create all of them quite different than Western side girls. Having said that, that doesn’& rsquo; t suggest that all the girls coming from Far eastern European countries coincide. Sure, they have a considerable amount of correlations however there are some traits that produce Ukranian girls different than both their Eastern and also Western counterparts. Going out with lifestyle is actually different in Ukraine Ukraine possesses a different, even more traditional courting lifestyle that is much more similar to the Far eastern European than Western side culture. Ukrainian girls like to take factors slowly and you require to put a ton of time and effort if you intend to gain their center. They are actually logical and put on’& rsquo; t only pay attention to their soul when selecting a guy. Many girls coming from Ukraine take partnerships seriously and put on’& rsquo; t intend to lose time with guys that’put on & rsquo; t possess good purposes. Different courting lifestyle also indicates that there are some customs when going out with a Ukrainian gal. For beginners, a guy needs to be paying for every little thing and also anywhere. You shouldn’& rsquo; t locate it’rude, it & rsquo; s just their cultural thing. Ukrainian girls are hard There are numerous reason that this misunderstanding about Ukrainian girls exists but I think that the absolute most prominent explanations are actually the political as well as financial situation and also their womanliness. Ukraine, identical to various other Slavic and also Asian European nations, is actually much less established and also is still bouncing back from their past. As a result of this, lots of people assume that Ukrainian women will definitely carry out everything for cash and financial support. Having said that, this is certainly not correct. Certain, Ukraine is actually a much less developed nation that has financial issues as well as there are actually considerable amounts of gold-diggers however doesn’& rsquo; t suggest that every lady is trying to find an individual that possesses funds. Yet another main reason is their womanliness. Several men presume that Ukrainian girls respect their appearance and also regularly look excellent since they’& rsquo; re searching for a guy, wrong. They are aware of the truth that they are among the best lovely girls on earth and they’& rsquo; re not scared to reveal this. They’& rsquo; re primarily doing this on their own and certainly not because of the guys. What carries out that mean for male immigrants who want to have a simple one evening stand up? Although it is actually tougher to find a gal that’& rsquo; s into connections, current way of living and social modifications have caused girls being even more open-minded. They’& rsquo; re womanly with a loads of feminism Much more conventional, patriarchal society means that many Ukrainian girls adhere and also loving wives and also moms that value their household and possess significant regard for their men. Sex tasks are still found in Ukraine and also it does not seem that they’& rsquo; re leaving anytime very soon despite the fact that their lifestyle has changed a lot in recent times. Although Ukrainian girls are womanly, it is difficult to gain their heart. They’& rsquo; re intelligent as well as recognize what they prefer. At times, you may locate that your experiences along with Ukrainian girls have a somewhat «negotiable» feel, you purchase dinner and also she dresses up rather. If you intend to continue the relationship then you far better manage to provide for her. Listed here is actually an abusive yet very on point perspective of exactly how ex-Soviet association girls view the planet In addition, latest impact from Western side nations has actually transformed the technique a Ukrainian woman deals with her part in the community. They’& rsquo; re even more familiar with their ability to become prosperous and also would like to have a considerably bigger part. They wear’& rsquo; t wish to be only caring wives and mommies. They’& rsquo; re into manly males with lord manners Unlike German girls, Ukrainian girls cling to the conventional female fashions. Identical to other countries with standard lifestyle, Ukranian girls anticipate of guys to lead. That doesn’& rsquo; t imply that you should ‘’be an & lsquo;’ & rsquo; alpha male & rsquo; & rsquo; dork who is as well prevalent and also out-of-line. It is actually extra along free throw lines that you should pay attention to her viewpoint but pick the meetup location and activities you’& rsquo; re heading to do on your date. Often, possessing the last word could be beneficial to reveal bloodsucker considering that they’& rsquo; re visiting disagree with your option of venue as well as desire something even more lavish and extravagant. Being actually masculine doesn’& rsquo; t mean that you’shouldn & rsquo; t be actually a gentleman and also have manners. Ukranian woman really loves when a male unlocks for her, take her jacket or relocate the seat. This will present her that you’& rsquo; re not some jerk that doesn’& rsquo; t regard girls. Ukrainian girls from various locations have different characteristic Although the majority of Ukrainian girls have an identical character, there are actually still some variations, relying on the region you’& rsquo; re checking out . There are some areas like Lviv where religious beliefs is a big aspect of a way of life. I’& rsquo; ve been told that they have a rather higher rate of religion appearance so you shouldn’& rsquo; t anticipate them to be very unbiased. Furthermore, gossip as well as slut-shame are various other causes for their sex-related reserve. Lviv is actually by no means a small area yet each of the activities are concentrated in the little place, meaning that chatter and also slut-shaming trip rapidly. On the contrary, girls coming from Kiev are more broad-minded and also welcoming. They’& rsquo; re extra right into getting to know new people, hearing their life history as well as maybe even carrying out something even more. That doesn’& rsquo; t suggest that you shouldn & rsquo; t approach the girls in smaller sized or more conventional urban areas. Ukrainian girls like when guys approach all of them, whether it’& rsquo; s on the road, at a bar or a nightclub. You just need to have to maintain your assumptions low for anything more than a date. What to expect from your initial time along with a Ukrainian gal? When it relates to your initial meetup with a Ukrainian woman, at times it may be like you’& rsquo; re under investigation. Ukrainian women could be quite questionable as well as secured thus be prepped to answer a bunch of inquiries on your very first time. They such as to know your goals and the reason why you’& rsquo; re seeing Ukraine since they & rsquo; re knowledgeable about their appeal and also the fact that many guys wish to sleep with all of them. Credibility is actually the most ideal policy along with Ukrainian girls. Make an effort to mount your solutions in a manner that will delight her as well as wear’& rsquo; t series if you possess a motive to sleep with her. Certainly not a singular gal would love to hear that you’& rsquo; ve invited her on a day because you want to sleep around with her. A lot of flatter as well as talking just excellent aspects of her country can also be actually counter-productive as well as you’& rsquo; re going to end up without your date. After she’& rsquo; s made with the interrogation component, the remainder of the day will be smooth sailing, particularly if you have a lot in common. Ukrainian girls are smart, well-read and have a great deal of interests so I’& rsquo; m certain you & rsquo; re going to select the appropriate subject matters on your very first time. Having said that, when it pertains to even more vulnerable and also private subject matters, you’& rsquo; re going to stand by a bit longer prior to she opens to you. Perform Ukrainian girls utilize dating apps and also internet sites? I wasn’& rsquo; t counting on much coming from dating apps and also web sites in Ukraine due to the fact that they possess even more conventional dating lifestyle. Having said that, Ukrainian girls really make use of dating apps and also web sites. There are great deals of dating websites as well as applications that are local as well as not recognized among immigrants. The dating website UkraineDate is an excellent area if you’re trying to find Ukrainian girls who adore dating an international man. A good thing regarding this internet site is that you can anticipate the girls on there to communicate English. Tinder, among the absolute most preferred dating applications around the world that is actually utilized by a lot of, is one more really good choice for on-line outdating, I’& rsquo; ve involved the verdict that the girls that are actually making use of Tinder in Ukraine are actually even more broad-minded and also in to connections. Tinder additionally has a supposed Ticket add-on which permits you to converse with Ukrainian girls also just before you show up there. It is a spent alternative however it’& rsquo; s worth it. You & rsquo; re visiting contend least one time set up also before you’& rsquo; ve place your feet on the Ukrainian ground. Just how is actually the night life in Ukraine? Evening activity may be fairly successful in Ukraine, specifically in bigger metropolitan areas like Kiev, Lviv or Odessa that are filled with bunches of trendy clubs, art-centric places, and also barroom. Don’& rsquo; t forget clubs that possess a terrific company, amazing setting, as well as gorgeous girls too. These are actually several of my beloved places to walk out in Kiev, Lviv, and Odessa. I’& rsquo; ve included practically every little thing coming from the cool and also cool and trendy pubs to great clubs so I’& rsquo; m sure you & rsquo; re mosting likely to locate something for your choice The mixed drink fans who are certainly not merely right into the world’& rsquo; s famous beverages but would likewise just like to make an effort some brand new ones. Loaded with a variety of pictures of Freud, this location is a cool spot where you may find natives and also wonderful Ukrainian girls. Skybar If you desire to possess an impressive sight of the resources of Ukraine, Skybar is the location for you. Popular one of natives, this club is actually known for its terrific setting, amazing songs played by different well-known DJs and also exceptional beverages. It is certainly not the cheapest spot in Kiev yet everything has its price, specifically if its own an area along with a bird’s-eye view and bunches of stunning Ukrainian girls rolling on the dancefloor. Loggerhead Pub is one of several hidden areas that the Ukrainian financing hides. Concealed responsible for an unnamed door in a darkened courtyard, the area is actually a real-time jazz nightclub with an interesting inside as well as wonderful cocktails. So as to get in, you need to have to think the security password, which makes this place a lot more unexplainable as well as appealing. Masoch Out of all the locations I’& rsquo; ve gone to in Lviv, Masoch bar was the one that left me with the greatest perception. Committed to a sensual author Leopold von Sacher-Masoch, the spot is loaded with different S&M and sensual ornaments. They likewise have a masochistic-themed menu with harsh mixed drinks and also meals with aphrodisiacs. Odessa, the third biggest urban area in Ukraine situated on the coast of Dark Oceans has become the nightclub principal city of Ukraine, specifically in the summertime along with lots of liquor, music, and gatherings. If you’& rsquo; re checking out Odessa during summer and happen to be there certainly just for the weekend break as I carried out, I highly recommend going to the taka Seaside Nightclub. You may invest the time by the swimming pool and proceed partying after the sundown when this bar improves right into a club. I’& rsquo; m grateful I & rsquo; ve had an opportunity to see much more than one metropolitan area in an overseas country like Ukraine and also not just the principal city. Nations this huge have different impacts in different regions, leading to a more distinctive construction along with way of living and also society. This also translates to women. Although there are many traits that girls from Kiev, Lviv, and also Odessa have in common, there is actually constantly some characteristic or attribute that makes all of them different as well as exclusive. Like I pointed out in the on the web dating segment, the site UkraineDate is an excellent location to look for Ukrainian ladies that are serious about foreign males. I really hope that through this message you’& rsquo; ve found out more regarding Ukrainian ladies, their appearances as well as individuality so you’& rsquo; ll be readied to gain her heart when the moment comes.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737050.56/warc/CC-MAIN-20200807000315-20200807030315-00484.warc.gz
CC-MAIN-2020-34
17,336
71
https://scaruffi.com/nature/common02.html
code
Piero Scaruffi(Copyright © 2013 Piero Scaruffi | Legal restrictions ) These are excerpts and elaborations from my book "The Nature of Consciousness" Common sense is a key factor for acting in the real world. We rarely employ classical Logic to determine how to act in a new situation. More often, the new situation “calls” for some obvious reaction, which stems purely from common sense. If we used Logic, and only Logic, in our daily lives, we would probably be able to carry out only a few actions a day. Logic is too cumbersome, and allows us to reach a conclusion only when a problem is “well” formulated. In more than one way, common sense helps us deal with the complexity of the real world. Common sense provides a shortcut to making critical decisions very quickly. Common sense encompasses both reasoning methods and knowledge that are obvious to humans but that are quite distinct from the tools of classical Logic. When scientists try to formalize common sense, or when they research how to endow a machine (such as the computer) with common sense, they are faced with the limitations of classical Logic. It is extremely difficult, if not utterly impossible, to build a mathematical model for some of the simplest decisions we make. Common sense knows how to draw conclusions even in the face of incomplete or unreliable information. Common sense knows how to deal with imprecise quantities, such as “many”, “red”, “almost”. Common sense knows how to deal with a problem that is so complex it cannot even be specified (even cooking a meal theoretically involves an infinite number of choices). Common sense knows how to revise beliefs based on facts that all of a sudden are proved false. Logic was not built for any of these scenarios. Furthermore, common sense does not have to deal with logical paradoxes. Paradoxes arising from self-referentiality (such as the liar’s paradox) have plagued Logic since the beginning. A program to ground common sense in Predicate Logic is apparently contradictory, or at least a historical paradox. Science was born out of the need to remove the erroneous beliefs of common sense: e.g., the Earth is not the center of the universe. Science checks our senses and provides us with mathematical tools to figure out the correct description of the world notwithstanding our sense’s misleading perceptions. Science was born out of the need to get rid of common sense. What was neglected is that common sense makes evolutionary sense. Its purpose is not to provide exact knowledge: its purpose is to help an individual survive. Back to the beginning of the chapter "Common Sense" | Back to the index of all chapters
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487586239.2/warc/CC-MAIN-20210612162957-20210612192957-00155.warc.gz
CC-MAIN-2021-25
2,681
8
https://www.netapp.com/us/company/news-rel-20090624-storage-partner-award.aspx
code
Sunnyvale, Calif.—June 24, 2009— NetApp (NASDAQ: NTAP) today announced that it has been named the Microsoft 2009 Partner of the Year, in the Advanced Infrastructure, Storage Solutions category. NetApp was chosen out of an international field of top Microsoft partners for delivering market-leading customer solutions for Microsoft® Hyper-V™ environments. This award, chosen by a panel of Microsoft judges, reflects NetApp's long-standing partnership with Microsoft and its commitment to and success helping Microsoft customers do more with less in Microsoft Exchange, SharePoint® Server, SQL Server®, and Hyper-V environments. NetApp was chosen as Solutions Partner of the Year based on its partnership with Microsoft and complete solutions that help reduce customers' costs, maximize storage efficiency, and improve availability in virtual environments. With NetApp, Microsoft customers can reduce the amount of storage they need by at least 50% when they also use NetApp® technologies such as thin provisioning and deduplication. Earlier this year NetApp announced a unique storage efficiency program that guarantees that customers running Hyper-V environments will use 50% less storage with NetApp compared to traditional storage*. The NetApp guarantee can help minimize investment costs and risks while enabling customers to achieve greater storage utilization in their virtual server and desktop environments. NetApp utilizes a variety of Windows® Server platform technologies to improve storage system management and streamline backup, recovery, and remote replication in Windows Server 2008 Hyper-V environments. In addition, tight integration with the Microsoft System Center family of products and additional application-integrated NetApp products help maximize uptime for a wide variety of application environments, including Microsoft Exchange Server, SQL Server, and SharePoint Server. Since NetApp storage solutions are tightly integrated with Microsoft's technologies, customers are backed by NetApp's global customer support infrastructure, which integrates Microsoft Premier Support. By combining the ability to take snapshots of a running virtual machine via Hyper-V with NetApp's unique approach to Snapshot™ copy backups, NetApp also enables automated, consistent, space-efficient backup creation in a matter of seconds. Not only can customers back up their environments more frequently and meet existing or shrinking backup windows, with NetApp they can store more backup copies and recover data twice as fast as with other solutions in virtualized environments. Effective and efficient backup and recovery also complement Microsoft business continuity features and help customers implement more complete disaster recovery schemes while keeping costs under control. "We are very excited about working with NetApp to deliver innovative end-to-end solutions to our joint customers," said Kim Akers, general manager, Global Partner Team, at Microsoft. "The combination of our technology with NetApp's storage solutions gives our customers the tools they need to improve efficiency, reduce costs, and drive their businesses forward." "We are pleased to honor NetApp as our Advanced Infrastructure Storage Solutions Partner of the Year," said Ross Brown, vice president, Solution Partners and ISVs, Worldwide Partner Group, Microsoft Corp. "By pairing its solutions with Microsoft's Hyper-V, NetApp is helping enterprise customers leverage the power of virtualized environments to dramatically reduce costs and increase availability so they can get the most out of their IT infrastructure." "Being chosen as Microsoft's Storage Partner of the Year is a great honor for NetApp," said Jay Kidd, chief marketing officer at NetApp. "While this award establishes NetApp as the leading storage solutions provider for Microsoft virtualization customers, more than anything it underlines the customer success our partnership and close collaboration has delivered." For more information about Microsoft's Partner of the Year Awards, visit www.microsoft.com/presspass/press/2009/jun09/06-24POTY09PR.mspx. For more information about NetApp and Microsoft's Global Alliance Partnership, visit www.netapp.com/us/solutions/solution-partners/global-alliance/microsoft-partnership.html. For more information about NetApp's 50% guarantee, visit www.netapp.com/guarantee, where you can access program details including FAQs, technical resources, best practices, and the new NetApp Storage Efficiency Calculator to evaluate your current environment and learn how NetApp storage-efficiency technologies can lead to higher storage utilization. Discuss this news in the NetApp Community, where you can exchange thoughts and ideas on a variety of topics with our community members. Collaborate with our company, engage in conversation with NetApp leaders and employees, our customers, and partners. Participate in our passion to go further, faster. Join now at www.netapp.com/us/communities. NetApp creates innovative storage and data management solutions that accelerate business breakthroughs and deliver outstanding cost efficiency. Discover NetApp's passion for helping companies around the world go further, faster at www.netapp.com. To learn more about the history and culture of NetApp, get a copy of How to Castrate a Bull by NetApp founder Dave Hitz at www.howtocastrateabull.com. NetApp, the NetApp logo, Go further, faster, and Snapshot are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. Microsoft, SharePoint, Windows, and SQL Server are registered trademarks and Hyper-V is a trademark of Microsoft Corporation. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. *This guarantee and related Program are limited to the terms set forth in www.netapp.com/guarantee applicable only to prospective orders placed after the Program effective date and are dependent upon your compliance with the terms and conditions set forth in this document and any of the instruction sets and specifications set forth in the referenced documents. NetApp's sole and exclusive liability and your sole and exclusive remedy associated with the terms of this guarantee and related Program is the provision by NetApp of the additional storage capacity as set forth in this guarantee and related Program. Ph: (408) 822-7284
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400193087.0/warc/CC-MAIN-20200920000137-20200920030137-00292.warc.gz
CC-MAIN-2020-40
6,439
16
https://dba.stackexchange.com/questions/151491/performance-of-long-primary-keys
code
There are plenty of discussions on the benefits and drawbacks of using hashes as primary keys, but in my case I have a database of webpages that I need to look up by address, and these addresses are longer than the maximum text index length. Also, it's quite the performance hit to index on Until recently I was using MD5 checksums to look up addresses due to the speed of the function and a limited need for protection against hash collisions. But this specific application has the potential for the submission of "database-malicious URLs" that are invalid*, but crafted with the same checksum as valid URLs. Is there a big performance hit switching from a primary key using 128-bit MD5 to a primary key of SHA-224+ (the smallest "unbroken" SHA-based hash I can find)? Should I index these as byte arrays or chars? Or is there another solution if I need reverse lookup AND collision security? My DBMS is MySQL 5.7, but I would consider switching if there's an amazing solution in another DBMS with similar resource requirements that is freely available. *Invalid as in technically resolvable, but not a "real" URL, i.e. http://example.com/reallyLongStringThatYieldsAHashCollisionWithARealURL
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027330233.1/warc/CC-MAIN-20190825130849-20190825152849-00297.warc.gz
CC-MAIN-2019-35
1,192
5
https://forums.sketchup.com/t/how-to-fix-bad-triangulation/247461
code
When exporting Sketchup models to render in other applications, I noticed the triangulation of those models is not very good. Most of the time, Sketchup creates very thin triangles which result in rendering issues in those other applications. Is there an easy way to see these triangles within Sketchup? Selecting Hidden Geometry does not show these triangles. Is there a way to edit or manually re-triangulate these objects in Sketchup? What format are you exporting? I generally use CleanUp to get imported geometry looking better. The results are the same regardless of the export format as the geometry is generated by Sketchup. What program are you exporting to? Some programs make automatic triangulation, sketchup doesn’t make triangles when a face is coplanar and you can have ngons without any issue, if you’re exporting to a software like blender and your model wasn’t modeled using quads, blender will create triangles on faces with more than three vertices, cause blender modeling is different than sketchup’s and it needs to have quads or triangles if it can’t detect quads. You can fix it by making your model using quads, there’s a plugin that helps you to make models with quads, it’s called quadfacetools, it’s free, it has a newer feature on the overlays if you activate it, it shows with green color the Quads, purple for triangles and red for Ngons. Exporting as FBX seems to produce better results in terms of the triangulation where it seems to respect the faces better whereas the SKP file seems to ignore the faces unless different materials are assigned to each of those. I’ll give QuadFaceTools another try to see if that might work better. P.S. I think QuadFaceTools appears to produce better triangulation because the Live Mesh Analysis appears to assign different material to those faces which in turn changes affects the triangulation. If you use the overlays, no materials are applied. How do you enable this overlay feature? Go to window/default trays and activate the overlays.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099514.72/warc/CC-MAIN-20231128115347-20231128145347-00459.warc.gz
CC-MAIN-2023-50
2,028
12
https://markdingemanse.net/publications/visuals/tags/scatterplot
code
Iconicity ratings are a key tool in psycholinguistic studies of vocabulary. This figure shows the distribution of ratings for 14,000 English words in two ways: (a) A kernel density plot of the distribution of average ratings; the dashed line indicates a normal distribution with the same mean and standard deviation; (b) standard deviations across raters (y-axis) as a function of average rating (x-axis). Extreme values are rarer, but people agree more strongly on them. (Figure by first author Bodo Winter, open data here.) Discriminability of iconicity measures from different tasks. Iconicity ratings have been transformed so that they vary between 0 and 1 (to compare with guessing accuracies). Guesses —where people try to guess the meaning of an iconic word, or the word form belonging to a given meaning— appear to be somewhat more evenly spread than ratings. Iconicity ratings by native speakers (rightmost, showing data from Thompson et al. 2020) are on average higher than iconicity ratings by people who don’t speak the language whose words they rate, confirming the notion that native speakers will generally feel that words of their own language are more iconic. (Figure by Bonnie McLean, open data here.) Response tokens like English mhmm, uhuhh, yeah or Catalan mm, sí, vale are tricky to study in the wild: their phonetic realizations can be quite different from how they are transcribed. Here we use UMAP, a method for dimensionality reduction used in bioacoustics and other fields, to explore the shape of inventories of response tokens in 16 languages. Every point represents a single response token; the closer two points are the more similar they are acoustically. Spectrograms drawn around the rim of the plots provide a direct view of the acoustic structure of tokens and enable quick sanity checks. L: Distributions of durations of utterances and sentences (in ms) in corpora of informal conversation (blue) and CommonVoice ASR training sets (red) in Hungarian, Dutch, and Catalan. Modal duration and annotation content differ dramatically by data type: 496ms (6 words, 27 characters) for conversational turns and 4642ms (10 words, 58 characters) for ASR training items. R: Visualization of tokens that feature more prominently in conversational data (blue) and ASR training data (red) in Dutch. Source data: 80k randomsampled items from the Corpus of Spoken Dutch (Taalunie, 2014) and the Common Voice corpus for automatic speech recognition in Dutch (Ardila et al., 2020), based on Scaled F score metric, plotted using scattertext (Kessler, 2017) Most NLP methods and models focus on text rather than talk. What are they missing? Scattertext plot of words and phrases characteristic of spoken interaction (green) versus written text (purple) in English, with words most characteristic of conversational interaction in the upper left (and shown in a separate inset on the right). High-frequency metacommunicative interjections like uhhuh, hm, wow, um are most typical of talk, and most often underrepresented in text. A Across the Indo-European language family, the proportion of rough words with /r/ is much higher than the proportion of smooth words with /r/; B Each dot represents a language (size of the circle = number of words); whiskers show 95% Bayesian credible intervals corresponding to the mixed-effects Bayesian logistic regression analysis indicating that rough words have a much higher proportion of /r/ (posterior mean = 63%) than smooth words (posterior mean= 35%). Proportional number of publications cataloged in Web of Science (1900–2017), showing concurrent upsurges in six topics related to iconicity (corrected for overall publication volume). The intersection of iconicity and funniness ratings for 1419 words. A: Scatterplot of iconicity and funniness ratings in which each dot corresponds to a word. A loess function generates the smoothed conditional mean with 0.95 confidence interval. Panels B and C show the distribution of iconicity and funniness ratings in this dataset. The relation between structural markedness and funniness ratings (A), iconicity ratings (B), and funniness and iconicity together (C), in a set of 1.419 English words. Each dot represents 14 or 15 words. Solid line with smoothed mean shows cumulative markedness. Other lines show relative prevalence of complex onsets (flap), codas (clunk), and verbal diminutives (drizzle). Higher structural markedness goes together with higher iconicity and funniness ratings. This supports the theory of structural markedness as a metacommunicative cue. Vowel-colour associations for 1164 participants (central panel), showing, clockwise from bottom left, (a) a participant with very low structure yet high consistency across trials, probably a false positive synaesthete, (b) a typical nonsynaesthete with mappings that are both inconsistent and unstructured; (c) a middling participant with significant structure but inconistent choices across trials; (d) a highly structured but inconsistent participant; and (e) a typical vowel-colour synaesthete, with highly structured, consistent and categorical mappings.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00787.warc.gz
CC-MAIN-2023-40
5,137
10
http://stackoverflow.com/questions/11673675/jquery-mobile-1-1-1-ui-mini
code
I have just upgraded jquery mobile from 1.1.0 to 1.1.1 and my navbar is messed up now. Googling I've discovered that, in 1.1.1, the .ui-mini class is added by default. Unfortunately the documentation isn't up to date so I don't know how to get back the "classic" style for my tabs. I've tried data-mini="false", data-full="true" but it doesn't works. Any idea?
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398452385.31/warc/CC-MAIN-20151124205412-00276-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
360
2
http://emilyssketchblog.blogspot.com/2014/10/drawing-again-whaaaat-and-of-course-its.html
code
Anyways, perhaps all it takes to get me into a creative mood is to copy two or three of Chris Sanders' exceptional sketches. That's what I did, then BAM! I wanna draaaaawww! When I copy another artist's work, it's like drinking a large glass of their style. It's in me! I then draw until it drains out of me bit by bit. (Hopefully I retain SOMETHING…) You can see that this first sketch is a lot more Sanders-y in it's style, proportions, subject matter (wink), etc. The second one - the ballerina - is more me combining the Sanders influence with some other things in my artistic repertoire. More 'me' I suppose. Meh.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591332.73/warc/CC-MAIN-20180719222958-20180720002958-00025.warc.gz
CC-MAIN-2018-30
620
4
https://users.rust-lang.org/t/rust-fullstack-developer-denmark-or-remote/22072
code
Impero is a compliance company: we deliver a cloud-based solution to help companies across the world comply with existing regulations and facilitate audits. We are looking for a Rust developer to join our team. We have started an incremental rewrite of our product in Rust, and we need someone with a strong backend experience to help us with this. It is an opportunity to take part in the design of our internal and external APIs, and deliver the best experience to our customers. More details on the job offer page.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663019783.90/warc/CC-MAIN-20220528185151-20220528215151-00396.warc.gz
CC-MAIN-2022-21
517
3
http://www.gmforum.com/lounge-99/%2A%2A-its-d_day-%2A%2A-she-s-here-4-18-a-254766/page2/
code
Its from rocketry. T is time of launch. Anything after launch time would be 'T PLUS' whatever time has passed; so anything before launch must be 'T minus' time. Its use is actually older than most realize, IIRC its from a 1930'* movie. She started having contractions Wednesday afternoon; my wife was sure she was going that night. I spent all day Thursday over there and ended up taking the grandson home with me - still having contractions but far apart. I took her to the doc'* today they said she'* not even dialated; they Bracks & Hickson'* (?) and the baby is fine and won't be out just yet. I hit every pothole there was on the way home; the bumpy car ride inducing labor theory being tested here - LOL
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718840.18/warc/CC-MAIN-20161020183838-00289-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
709
3
https://www.experts-exchange.com/questions/23874363/Best-Practice-for-Partitioning-SAN.html
code
We have an Equal Logic PS5000XV 300Gbx16 coming to us to act as the datastore for our new completly virtual environment. Exciting! We'll be running RAID50. We're looking for suggestions on how to partition the SAN? Is there a best practice? We're going to have 5 VM's running in this environment. Average I/O is about 1100. All machines are running w2k3 Enterprise: All sizes are capacities USED on the current machines. Exchange and File Server = 95Gb IIS Server & SQL Server = 396Gb Email Hosting and DNS Server = 50Gb Development Server = 18Gb VirtualCenter = 10Gb We'll be separating the above SQL server to be on it's own sometime next year.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584518983.95/warc/CC-MAIN-20190124035411-20190124061411-00222.warc.gz
CC-MAIN-2019-04
646
11
https://stackshare.io/porowneo-pl/porowneo-pl
code
Used to write PHP extensions - AZTEC Decoder - License Driver scan - Axis2/C to PHP wrapper Axis2/c, rampart/c, savan/c, barbershop and custom php extensions. used on top of nodejs services, mobile website all frontends (backbone.js, require.js) Used for Talend, custom routines and external libs All frontends use less used with pattern publish/subscribe Hypervisor used in a private cloud platform Used in all new projects (mobile website with AZTEC scanner) As a real-time proxy between frontend and backend components. (socket.io, publish, subscribe, redis, http restful api) frontend framework for UI. All frontends use this framework except new mobile experience.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583804001.73/warc/CC-MAIN-20190121172846-20190121194846-00583.warc.gz
CC-MAIN-2019-04
669
15
https://libguides.library.cpp.edu/copyright
code
LEGAL DISCLAIMER: Please keep in mind that librarians are not lawyers. This resource guide does not constitute legal advice. If you need legal advice, consult a lawyer. Some tips that will help you though for finding content that should be safer are as follows: "Large copyright sign made of jigsaw puzzle pieces" by Horia Varlan. Licensed under CC BY 2.0
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00370.warc.gz
CC-MAIN-2023-50
355
3
https://www.yoursdao.xyz/posts/playpaldao
code
PlaypalDAO invests in the metaverse economy, develops tools for guilds and new DAO protocols, and provides liquidity to DAOs. PlaypalDAO hack the digital world by creating largest infrastructure of metaverse. Currently, the metaverse is developing rapidly by incorporating blockchain technology and crypto-assets. Among them, games are the biggest gateway to the metaverse, and a world where anyone can make money anytime on the metaverse through P2E games is already coming. In fact, with the advent of the scholarship system, many young people in developing countries are making a living from gaming instead of getting a job in the real economy. However, there is an emerging problem that the experience and trust gained within a particular game or guild cannot be applied to other communities, which will hinder the further development of the metaverse. PlaypalDAO wants to solve this problems. By creating tools for gaming guilds, we will extend the network of guilds and ensure that their activities everywhere in the metaverse remain forever. PlaypalDAO will be a hub for gamers and guilds. YGG and other gaming guilds have contributed to the development of blockchain game by bringing many new players into it, and we believe that the guild scheme will be useful for the future development of DAOs. We intend to develop the gaming guild structure and play a role in providing liquidity to various DAOs. In addition, we will be working on the development of payment and talent assessment tools that are essential for guild management, as well as the development of new DAO protocols. Our ambitious project will attract talented and visionary community members, which will lead to even better initiatives and make the metaverse even more valuable. We will engage in the following activities to realize our vision. 1. Guild management - Scholarship business in P2E games - Invest in BCG assets - Support game creators by financial supports and providing early test users - Utilize the knowledge and network of the CEO, who owned BAYC. - Provide several DAOs with scalars' time and effort 3. DAO and subDAO - subDAO(1): Create tools for guilds and expand the network with guilds. - subDAO(2): Develop DAO protocol and provide it as a service - subDAO(3) Develop Defi protocols for loans, insurance, etc., mainly for unbanked people - subDAO(4): Develop a gaming engine During the initial period, the founder team will take the lead in these activities. Scholarship and investment management projects will be conducted as subDAO, and the knowledge gained from these projects will be used to create tools for the guild. Ultimately, we plan to lead to the development of better DAO protocols and Decentralized services. Of course, we hope that PlaypalDAO participants will launch various projects in the future! We have already invested in the following games. The games to invest in the future is below; - The Sandbox Of course, we will expand the range of games to invest and it will contribute to the development of metaverse economy. We are planning to develop the following tools, and some of the tools for guilds have already been developed (e.g. payment automation tools). Tools for guilds Scalar - Scalar management automation tool (payment, progress management) - Scalar Achievement Measurement Tool (Integrated evaluation of achievements in various guilds and games) - Recruitment support tool - general-purpose HR tool (management of performance measurement, payment, etc.) - tool to evaluate achievements and trust in various DAOs - treasury management tool Defi protocols for loans, insurance, etc. We are thinking of providing services such as loans and insurance for people who do not have bank accounts, especially in developing countries. The HR protocol we are developing for DAOs should help to make this happen. I would like to create a game engine specialized for BCG and develop it into a general-purpose engine like unity, unreal engine. Ideally, PlaypalDAO participants should be able to collaborate freely and make progress.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650620.66/warc/CC-MAIN-20230605021141-20230605051141-00786.warc.gz
CC-MAIN-2023-23
4,049
36
https://bh.indeed.com/cmp/Dairy-Queen/reviews/productive-fun-and-fast-learner-and-fast-moving?id=550f688ab110906c
code
Dairy Queen Employee Review Productive fun and fast learner and fast moving I can say the job is okay..but the problem is salary.they are not give salary on time we almost experience 4 months salary delay that's why i want to experience in other country to contribute my knowledge and skills. Ratings by category 12 to 16 hours
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400279782.77/warc/CC-MAIN-20200927121105-20200927151105-00127.warc.gz
CC-MAIN-2020-40
327
5
https://www.chiefdelphi.com/t/path-planner-event-markers/430848
code
I am a little confused about the path planner with event markers example on the path planner docs: // This will load the file "Example Path.path" and generate it with a max velocity of 4 m/s and a max acceleration of 3 m/s^2 PathPlannerTrajectory examplePath = PathPlanner.loadPath("Example Path", new PathConstrains(4, 3)); // This is just an example event map. It would be better to have a constant, global event map // in your code that will be used by all path following commands. HashMap<String, Command> eventMap = new HashMap<>(); eventMap.put("marker1", new PrintCommand("Passed marker 1")); eventMap.put("intakeDown", new IntakeDown()); FollowPathWithEvents command = new FollowPathWithEvents( getPathFollowingCommand(examplePath), examplePath.getMarkers(), eventMap ); I can see that the example adds an event to drop the intake and another event to print something but how does the path know where to put the markers along the path. How can I specify when to trigger the event?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950528.96/warc/CC-MAIN-20230402105054-20230402135054-00164.warc.gz
CC-MAIN-2023-14
988
3
https://www.maths.manchester.ac.uk/connect/events/seminars/?page=2
code
We maintain a varied and collaborative series of seminars across our research areas. - Analysis and dynamical systems - Applied maths (informal) - Geometry, topology and mathematical physics - Mathematics in the life sciences - Number theory - Numerical analysis and scientific computing - Physical applied mathematics - Probability and statistics - Pure postgraduate seminar - Statistics, inverse problems, uncertainty quantification and data science Abstract: In his seminal work on modular curves and the Eisenstein ideal, Mazur studied the existence of congruences between certain Eisenstein series and newforms, proving that Eisenstein ideals associated to weight 2 cusp forms of prime level are locally principal. In this talk, we begin by discussing several generalizations of Mazur's resul.. Join us for this research seminar, part of the SQUIDS (Statistics, quantification of uncertainty, inverse problems and data science) seminar series. Abstract: TBA The Informal Applied Mathematics seminar series will continue with a series of short talks from first-year PhD students. Talks will take place in Frank Adams 2 (next to the Alan Turing Building's kitchen), with complimentary hot drinks and biscuits from 2.45pm on the atrium bridge. Title and abstracts for the talks can be found below. FYI.. (Zochonis Lecture Theatre D) Join us for this seminar by Rea Antoniou-Kourounioti (John-Innes Centre) as part of the Mathematics in the Life Sciences Series. Abstract to follow. To subscribe to the mailing list for this event series, please send an e-mail with the phrase “subscribe math-lifesci-seminar” in the message body to listserv@l..
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370507738.45/warc/CC-MAIN-20200402173940-20200402203940-00154.warc.gz
CC-MAIN-2020-16
1,650
15
http://blog.code-cop.org/2011/11/
code
Last DemoCamp a fellow craftsman asked me how to find a proper employer to work for. How to find out if a team you are going to join is kicking ass? How to check if the future team mates are good people? (By our definition a good person cares about his or her work, doesn't rush, writes unit tests, keeps the code clean and does many other nice things. :-) So how to find out if you want to work with them? These are good questions. Applying for a job is symmetric which means it's a process working in both directions. Of course you try to prove yourself worthy of the new job. There are many resources on the internet that tell you how to write your CV and how to behave during interviews, so you would not screw up. There are even guidelines for managers which questions to ask including the famous FizzBuzz. All these guides are targeting your value as employee and how to present it properly. On the other hand your future employer has to show to you that he is worthy, too. The interviewer is his first representative and must be prepared well and take the interview serious. Later he or she might tell you about the company's generous compensation scheme or the team or the development process to impress you. In the end of the interview you are usually asked if you have any questions. This is the time to ask and so I do. During the past years I have compiled a list of questions that I ask during interviews. Today I want to share some of them. I always start by asking the Joel Test. Although it failed me in the past, I still believe it gives a good overview of the used development process. Then I ask the interviewer to define quality. Quality is perceived different by different people and the manager's idea of quality has considerable influence. Usually this leads to an interesting discussion if the manager is really interested in you. The team I'm going to work with is important to me and I start asking about it right away. "How large is it? How is it structured? When was it formed?" A team needs time to form and I like to join high performance teams. So is it a real team where each team member found its place or is it just a group of individuals sharing the same room? Starting a gig with setting up a new team is risky if you lack authority to influence future hiring decisions. The team might not end as you would like it to be. Next I try to figure out the team spirit. "When did the last person leave the team and why? Why is there an open position? Are there any contractors on the team?" A high percentage of contractors is a bad sign. First contractors do not fully participate in teams as their engagement feels more temporarily. Second most contractors I know either have no idea about coding or are extremely prolific but then their code looks like hell. (But I'm sure this is a coincidence.) How Does it Feel? If all things are going well you might be invited to meet the team, which in some cases has the final word in the hiring decision. And even if not, a tour of the office never hurts. I always try to meet my future team mates and spend at least half of a day with them. How does it feel spending time with those people? Are they in a good mood or is there a dark cloud of fatalism hanging above them? Are they friendly and open minded? How do they communicate? You will spend a lot of time with them, so you better like them. What Do You Know? During this time I "interview" my future colleagues. Well, it's not a real interview, more a chat to figure out what makes them special. My questions just guide me during these conversations. And I would also tell them things about myself. Most likely they know better than me if I fit into the open position and the team or not. To get started I'm looking for someone who knows more than me. In our technical domain it's very easy to know more in some area than most developers. "So what's your background? How long have you been developing software? What were your most exciting projects? Was it cool stuff? Were you excited about them?" (Did you care?) As these people are developers, I get more technical and ask them about their favourite Java framework or library. I like language fundamentals so Apache Commons fit me perfectly, but that's just me. Everyone has his or her favourite toys. Think about them, discuss them. Are they esoteric, mainstream, fundamental, boring? On the other hand the similar question, which is the first library to add to a new project, has only one right answer. It's not Apache Commons and it's certainly not Spring or Hibernate, but it's JUnit. Even if you do not develop test driven, you will need it sooner or later. If we happen to talk about design I always ask "What's your favourite design pattern?" I hope it's not singleton, because singletons are evil, all other answers usually lead to a good discussion about object orientation. After talking for some about what he knows and what I know I sum it up with my last question of this section, "What will I learn from you?" Do You Care? Next I'm looking for individuals that love to code, that care for their craft and are burning with enthusiasm. Asking about hobbies and how one spends his or her personal time doesn't sound related at first, but it is. The real question is if he or she does code on personal time, maybe is even an open source contributor. For example, some time ago I met an older guy and he didn't seem very enthusiastic. The whole team had impressed me so far and I was sure that he would just be a nine to five employee. I started asking him about his duties on the project but quickly moved to the area of personal time. It turned out he was into wireless network topology and played around with wireless infrastructure at home. He wasn't coding but still fooling around with technology. I was impressed. Further I want to know "Which blogs do you read?" If you are interested in your craft you have to stay in touch, play around with new stuff and read books. The pragmatic programmers recommend reading four technical books each year. So "What was the last technical book you read?" Talking of books, "Who is Donald E. Knuth?" What About Quality? Ultimately I'm looking for software craftsmen and I wouldn't be genuine without diving into code quality and clean code. Everybody with just a faint interest in code quality, object orientation or self improvement knows Robert C. Martin, so I always ask if they know Uncle Bob. Finally I try to determine if I will hate this person every time he or she commits some changes to the repository: "What is most important about code? What is the worst defect for code? What is clean code for you?" Let's finish with a word of caution: These questions help me figuring out if a future job is good for me but it's not foolproof. It happened that everything looked great and still the real job experience was awful. Also be aware that these questions result from my personal experiences. They need not to be good for you. Don't blame me if you end up in a group of coders from hell.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124297.82/warc/CC-MAIN-20170423031204-00340-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
7,032
17
https://community.powerbi.com/t5/Desktop/Filter-Pane/m-p/624711/highlight/true
code
Do one thing, You can Import the same dataset in your new power BI insatnce and you can copy the visuals from existing pbix file to new file. Then you can use that new filter pane. Note:- You can copy the charts or nay visuals across the pbix files unless you have same dataset imported. You can't copy the measure or calculated column. You need to to create those If you are using those in any of the chart. If you don't want this feature for your current pbix file then Go to File->Optipns->Current File UnderFiltering experience, uncheck the first check box (Enable the updated folder pane, and show filter in the visual header for this report)
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540531917.10/warc/CC-MAIN-20191211131640-20191211155640-00284.warc.gz
CC-MAIN-2019-51
647
3
https://wiki.industrial-craft.net/index.php?title=User:Chocohead/Sandpit/Tooltip_Testing_A
code
This template is used to create a grid that looks similar to the Crafting Table's GUI screen. - (Row)A-C(Column)1-3: (Optional) Input items - Output: (Optional, bit silly without it) Output item - A-C1-3,Output-tooltip: (Optional) Override item tooltip - A-C1-3,Output-link: (Optional) Override item link - nobreak: (Optional) Don't have a newline made at the end of the template - infobox: (Optional) Adds the necessary <br/> to move to the next line when to the left on an infobox Items in the grid are set by parameters A1 to C3 in the following formation: Each item can have a custom image by setting the "-image" parameter For Example: A2-image would set a custom image for item A2 If this parameter is omitted, the template will attempt to use Grid item.png For Example: If C2 was "Generator", then the default image would be "Grid Generator.png" Each item can have a custom link by setting the "-link" parameter For Example: A2-link would set a custom link for item A2 If this parameter is omitted, the template will attempt to use [ [ item ] ] For Example: If C2 was "Generator", then the image would try to link to [ [Generator] ] |A1=Rubber |B1=Copper |C1=Rubber |A2=Rubber |B2=Copper |C2=Rubber |A3=Rubber |B3=Copper |C3=Rubber The OA field accepts 1-99. Leaving it blank will show nothing, using 100 to 109 will only show the last two digits (although this can be utilized to output 01 instead of just 1, for example), using anything higher will only show the last digit. Base Minecraft items and other mods If you are using items from outside the Industrial Craft mod, you can use the "-link" parameters to link to an alternate page (typically Non-IC Items). |Output=Mining Pipe |OA=2 When uploading mod images, the following standard is used: item name.png -- A 16x16 two dimensional image of the item. Grid_item name.png -- A 32x32 image of the item as it appears in a player's inventory. item name_ig.png -- A larger image of the item placed in the game world (for blocks).
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00228.warc.gz
CC-MAIN-2022-40
1,989
28
http://cybergreet.net/spinrewriter5/5-top-risks-of-spin-wordai-get-your-free-trial-now.html
code
This excellent article rewriter tool will thoroughly scan your entire content, looking for the words that it can replace with a synonym. All the words that it replaces with a substitute will be highlighted in the bold and colorful text. By clicking on any of the highlighted words or phrases, you can see the original word, suggestions or add your own word. Also, you can click on the original word to revert or click on any other word to replace. So it is pretty hard actually to achieve unique and human readable article, but with little twists it can be done. I needed my wordai account just for FCS Networker, but I figured out that Spin Rewriter will fit perfectly for me because of their affordable price. If you need article spinner just for seo purposes, avoid them. If you want to create amazing articles, yes they are very good ..but pricey as ****… Some writers browse for batches of cheap private ticket rights articles and spinning them before submitting them. These PLR articles might not be the best quality but anything can be much better upon by the spinner. These PLR content are utilised anticipated to the actuality that though the level of quality is average even, they possess helped catch the attention of in website traffic still. Unlike other spinners, WordAi fully understands what each word content means. It doesn't view sentences as just a list of words, it views them as real things that interact with each other. This human like understanding allows WordAI to automatically rewrite entire sentences from scratch. This high level of rewriting ensures that Google and Copyscape can't detect your content while still remaining human readable! Looking at both spinner’s spun articles, they both seem to generate spun content that looks pretty good. Both have some grammar issues I would correct if I was posting it on a high tier 1 site, but overall SpinnerChief produced better content. Not sure if WordAi is being overly aggressive on the spins at the cost of quality. This test is very hard to call. If you go by raw numbers, SpinnerChief won. I want to leave this up to you to decide which one won. Winner none – draw! When you integrate Perfect Tense with WordAi, Perfect Tense will check any text you spin for grammatical errors. Perfect Tense will then add those spelling and grammatical errors as synonyms. This means that your spintax will be more unique and more readable. When using Perfect Tense with WordAi, your spun content will often end up even higher quality than the original. ArticleRewriterTool.org is a free, programmed article rewriter that can efficiently rewrite human-readable text into a new and different version of a readable text. Content is the King; you must have heard; it is at least as important as SEO. An uninterrupted flow of fresh and human-readable content is the key to success for your blog or website as it helps to achieve search engine optimization. The use of article spinner or paraphrasing tool is not just limited to search engine optimization; you can use it to serve any purpose that requires the creation of fresh and unique content. If you consider that you can spin articles with Search Engine Optimization (SEO) in mind it definitely makes Spin Rewriter 9.0 worth the money. Your articles will now be able to rank in Google for your keywords you want to rank for. The more content you can produce and put on your website the quicker Google will rank you. This allows you to quickly create scalable evergreen content that will rank for years. Customer Testimonials — Disclaimer: The testimonials displayed on this website were sent to us by our actual customers and were not altered in any way. Some of the testimonials also display a photo of our customer who sent us that particular testimonial — we always obtained our customer's full permission to use their photo as part of their testimonial. With this in mind, of course every user is different so we want to point out that while these results are possible, they are not guaranteed by us (as the product vendor). The results described are not typical and not experienced by every one of our customers. Very Fast Results - The main benefit that you can get with the tool is that you will be able to get very fast results when it comes to your rewrites. Its a well known fact that this product has been updated over time to the point where it can rewrite a 500 word article into something thats new and unique to the eyes of potential viewers within 9 seconds or less compared to the past version where it will take 2 minutes to finish rewriting. If you have not used a spinner before then I would suggest that you first use something that require more human imput like The Best Spinner or Spinner Chief in order to understand the basic principles. However if you must go fully auto then I would suggest you go for Wicked Article Creator. I have it and understand it is similar to wordAI but a one off fee of $47. SpinnerChief 5 has super-advanced functions such as auto-grammar fix, for example it will correct "a apple" to "an apple," plus it can spin "I want to eat the apple, orange and banana" to "I want to eat the banana, orange and apple." We can't list all functions here, there are too many to list! - But one thing is sure, SpinnerChief 5 will give you the best rewritten article - no other spinner can do what SpinnerChief 5 does! This will no doubt seem very obvious to many people and for others it will send a shudder of fear down their spine! But if you want to make money online, be an affiliate marketer or a well known blogger, then there really is only one way to do it. The best way to get ranked and make money online is to do must things manually. Sure, there are legit shortcuts and additional tools that can make the process faster. But in general if you are looking to create content for your website, then you need to learn the correct way of doing it. Any article rewriter or paraphrasing tool basically scans through the content you provide it in order to look for all the words that it can replace with suitable synonyms or substitutes. Every replaced word will appear bold and highlighted in a colorful text. Clicking on the word will give you details such as original word or other suggestions, you also have an option to add your own word. By clicking on the original word, you can go back to original. WordAI is probably the most famous content spinning service. Many people swear by it and the quality of the content it produces and it is not empty talk. But let’s see how it will spin my short story. WordAI has two modes of spinning – “Standard” and “Turing”, with the latter being the one that produces better results. I will spin the text with both of them. In this tough overall economy who can't make use of a several extra cash? Another upside is that you can develop upward your cache of initial content material and boost your status for composing and probably attract some increased paying clients. Lastly, simply believe of the understanding you are usually getting by getting to study some of the subjects you create about. You are usually, or will soon be, a fountain of ineffective information. Has a 250,000 words monthly limit on the “Turing Spinner” and a 2,500,000 words monthly limit on the “Standard Spinner”. Anything above that will be charged additionally ($10 per 1,000,000 words for the “Standard Spinner”, and $3 per 10,000 for the “Turing Spinner”). However, they do offer custom plans for heavy API users – all you need to do is contact them. Would you ask somebody who does not talk great English and has no capabilities or experience to revamp site content? No? All things considered, this is precisely what many individuals do when they go to some modest administrations or specifically procure the least expensive specialists that they can discover, The final product is regularly add up to refuse that has unmistakably been composed by somebody that does not see either the subject or the dialect. Far more detestable it will regularly fall flat a literary theft checker which will cause you real issues with the web search tools. The content above is 98% unique according to Spin Rewriter and I really like it. It actually seems better than the WordAI spin – only the “Standard” one however, it is no match for the “Turing”. One thing that the spinner failed to recognize is the “green eyes” phrase where it replaced it with “environment-friendly”. Yea, I laughed too. Anyway, here is the spintax for those interested in more testing: Most of our customers have no problem making the less than $2 per day it costs to use WordAi. Artificial intelligence isn't cheap, and we want to provide only the best quality service possible with no compromises, and our customers appreciate the superior quality. Most of them are running their SEO sites like a business, where they don't mind paying $50/mo if it will help them make $5000/mo. Use Article Rewriter to rewrite or paraphrase articles, full-length essays, or to find different and better ways to express simple words, phrases, or sentences. Whether you wish to reproduce textual content for a website, business document, email, tweet, or term paper, article rewriter will do the trick. Facilitate essay writing, expand your blogs and enhance your website’s online visibility with quality content now. Special algorithm in our paraphrasing tool enables the synonymization of words, detection and exchange of inflectional forms, as well as rewording of phrases, expressions and even the whole sentences. It converts the inserted text, but preserves its meaning, generating the most accurate synonyms. The principle of the application is very simple and similar to many popular translators available on the Internet.After filling "Text before" field, just press the "Paraphrase!" button and your new content is ready. You don't need to search for synonyms word by word anymore, all you need to do is type or paste text you are interested in paraphrasing, and the program will do all the work for you. However, if you don't like the results, or you think you could find a better words to express yourself, you can change any synonym (clicking it and choosing new from the list) or edit text manually. We believe that it is very useful both at school, at work, as well as in everyday life. By using Paraphrase Online you can be sure, you are using the best paraphrasing tool avaible on the web. Use our best paraphrasing tool online and get your article rewrite instantly. This paraphrase tool is free and great for content rewriting and will help you avoid plagiarism. Paraphrase Online does more than just altering the words in the text. With the help of our paraphrase tool, you will get the benefit of good writing with the correct use of right words and phrases to convey your message properly. If you use a free article spinner or an article rewriter like our free paraphrasing tool even then, there is a lot of manual work that needs to be done to achieve the best results. When you paraphrase online, you don’t just consider the sentence or phrase rather you must also take into account the theme and the writing style of the writing in the full document. You shouldn't put too many quotes in your diploma thesis, essay or homework because it is assumed that over 40% of borrowings will disqualify yout work. So what to do if the work is theoretical and let's be honest - largely imitative? Instead of using infinitely long quotes, use paraphrase! And of course, present your own views, enter into polemics, discuss with others researchers. Paraphrase is simply writing the same information in other words. Instead of quoting a fragment of the text, you can compile and elaborate. Thanks to the use of this technique, you don't have to put long quotes at work, because it is not well received by the evaluators and teachers. The purpose of the paraphrase is to discuss a given text (view, opinion), it's about changing expressions, phrases, words and text structure. That is why you must always go for a rewording tool that offers you best results such as the free paraphrasing tool that we provide you. WordAI also comes with several settings that can help you do the things you need to do. These help make your content more readable and unique so that there will be no issues with Google. One of the things you will surely appreciate about this tool is that this take and replaces words with exactly the same meaning then puts these in the sentences in a way that makes sense to the readers. In the past there lived a kid. He had blue eyes with blonde hair as yellow as gold. The young kid was vulnerable as well as little, yet his mind was speedy like the wind. He might compute the end result of any type of scenario in the blink of an eye. That was not his largest skill. No. His largest skill was assumption. The young child could possibly view and also recognize anything faster compared to anybody he had actually ever before fulfilled. He dropped in love with a gorgeous princess. She had magnetic environment-friendly eyes as well as brown hair. He liked her quite and also she liked him back much more. There was just one issue – the young kid was the kid of a blacksmith. The princess’s papa would certainly never ever enable her to wed an easy boy of a blacksmith. Their love was also solid. In one dropped swoop, the young child increased a military of undead as well as began a disobedience to topple the wicked king that did not count on beloved. After months of combating versus the militaries of his loved’s dad, the young kid was executed as well as the battle ended. No tunes were sang.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583700734.43/warc/CC-MAIN-20190120062400-20190120084400-00260.warc.gz
CC-MAIN-2019-04
13,731
24
http://www.thebluegarret.com/blog
code
One of the reasons to invest in professional copyediting for your book is to publish a work that is as free of errors as possible. But what is an error, anyway? Who makes the rules, and what is the logic behind them? Can it spot a cliché or catch a redundant phrase? Yes. Can it evaluate whether your syntax and diction are in line with other books in your genre? I think so. Can it predict whether your novel will be a bestseller or evaluate your story arc? Not yet.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213405.46/warc/CC-MAIN-20180818060150-20180818080150-00594.warc.gz
CC-MAIN-2018-34
468
2
https://www.klayout.de/forum/discussion/119/no-qtruby-library-on-windows
code
I'm running klayout 0.21.11 on Windows 7 using the installable version, and I've been playing around with scripting. RBA seems to work fine, but when I try to run any of the QtRuby examples, they fail with the error 'no such file to load -- Qt'. Is the qtruby library supposed to be included with the klayout installation, or does this need to be installed manually? I don't see any qtruby-ish files in the lib folder of the klayout installation. I assume this lib folder gets used by the klayout ruby interpreter, not any system ruby lib directory. If this does need to be manually installed, it would be helpful to add a note in the docs.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103344783.24/warc/CC-MAIN-20220627225823-20220628015823-00140.warc.gz
CC-MAIN-2022-27
640
1
https://shanewelgama.com/study-notes/identify-data-formats/
code
We can store data in various formats. The types of formats are: Structured, Semi-structured and Unstructured. Commonly, we like to group data that represent an entity (such as customers, products, sales orders, and so on). Each entity normally has one or more attributes (such as a customer might have a name, and an address). Structured data means that the data is tabular in nature. Basically tabular means the data is in tables with rows and columns. The rows represent each instance of a data entity and the columns represent attributes of the entity. The relational model is designed for structured data. Multiple tables can reference one another by using key columns. As the name suggests, semi-structured data has some structure but it allows for some variation between entity instances. If the term ‘entity instance’ confuses you, consider it a row in a table. A single row is an entity instance. In structured data, we know that each entity instance will have the same fields (columns). However, in semi-structured data, this is not the case. The specific fields may vary between entity instances. So speaking in structured data terms, this is like saying each row in a table may have its own specific set of columns. Which we know in structured data, is not possible but it is possible in semi-structured data. Some data simply has no structure to it. Such as images, audio and video data. This type of data is referred to as unstructured data. Organisations store data for analysis and reporting. There are two broad categories for data stores: - File stores
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00554.warc.gz
CC-MAIN-2022-33
1,573
10
https://www.mobachampion.com/pt/champion/pyke/build/
code
LoL Pyke players may find him to be a confusing character to build out properly. You'll notice that his build is modified when he is up against either generic or homogenous team compositions, showing you shouldn't follow the same Pyke build every game of League of Legends The best items to incorporate into your champ's build include: Crepúsculo de Draktharr, Anjo Guardião, and Glaive Sombria. Those who included these pieces in their gear had a much better win rate than players who tried for other item builds for Pyke. Likewise, if you are trying to beat a well-mixed enemy team comp, you should strongly consider getting Pyke the Dominação, and Determinação runes. In recent matches, he won the greatest fraction of his matches when equipped with these runes. We established our Pyke build recommendations by examining 84.845 recently ranked League rounds with him in them. We only propose the best winrate Pyke builds that have been used by ranked LoL players enough times for us to reccomend them. With so many games in our data, we are confident in our provided builds.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710933.89/warc/CC-MAIN-20221203143925-20221203173925-00263.warc.gz
CC-MAIN-2022-49
1,084
3
https://www.extremetech.com/tag/silverlight
code
Netflix only streams 1080p to a PC if you're using a Microsoft browser If you want 1080p streaming via Netflix on your PC, Microsoft's Edge and Internet Explorer are the only way to get it -- Chrome, Firefox, and Opera all top out at 720p. By Joel Hruska Firefox 26 released, brings click to play plug-ins and reduced memory usage The latest version of Firefox, Firefox 26, is now officially available to download. This is one of the most significant releases in recent history, introducing built-in "click to play" functionality for all plug-ins (except for Flash). Firefox 26 also represents the dramatic culmination of Mozilla's MemShrink project, which has spent the last two and a half years trying to battle Firefox's reputation for being a memory hog. Firefox 26 has a very svelte memory footprint indeed. Netflix switches from Silverlight to HTML5 in Windows 8.1, reduces CPU usage dramatically With the release of Windows 8.1 Preview, Netflix now supports streaming over HTML5 instead of Microsoft's proprietary Silverlight plug-in. The caveat is that only Internet Explorer 11, which is bundled with Windows 8.1, supports the necessary HTML5 extensions; if you're a Firefox or Chrome user, you'll continue to use the Silverlight plug-in. In our initial testing, the switch to HTML5 sees a massive reduction in CPU usage -- about one third of Silverlight's CPU usage. Netflix begins the move to HTML5, but DRM stands in the way Netflix uses Microsoft's Silverlight plug-in to deliver its streaming video. It works fairly well on OS X and Windows, but it's not a viable option on Linux, mobile devices, or set-top boxes. At this point, the writing is on the wall in regard to the future of Flash and Silverlight. A different playback method is necessary going forward, and HTML5 video is the obvious choice here. Sadly, there are numerous obstacles in the way -- DRM being the biggest. Microsoft flips Flash whitelist policy after Windows 8 fails to drive HTML5 adoption Microsoft has changed its Flash policies for Windows 8 and switched from a whitelist to blacklist policy. Instead of only allowing approved apps, the new strategy is to blacklist just the handful of apps that won't work -- but the change comes too late to help public perceptions of Windows RT. By Joel Hruska Flash and Java to be click-to-play in future Firefox After more than two years on the back burner, Firefox has finally introduced click-to-play for all plug-ins, including Flash, Java, and Silverlight. Plug-ins are the single biggest cause of browser slow-downs and security vulnerabilities, so, really, it's about time Mozilla added this to Firefox.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945381.91/warc/CC-MAIN-20230326013652-20230326043652-00691.warc.gz
CC-MAIN-2023-14
2,639
14
https://www.whodidioutlive.com/About
code
About this website Who Did I Outlive? is based on a morbid idea by Danny Glasser. Whence the data? All the data comes from Wikipedia. They provide an API to fetch data programmatically. Here's the sequence: First, pages of notable deaths by year and month are parsed, looking for names. Then, web requests for the full page of each name is kicked off, 50 at a time in separate threads. Most biography pages have an "info box" where birth and death rates are stored in a standard format. There's high confidence that those biographical details are parsed correctly, but if no info box is found, an attempt is made to parse the English text. Such parsing probably isn't entirely reliable. There are many variations on how dates are entered. I can't possibly catch them all, but the algorithm gets updated from time to time to include more people. Most famous people have clear death dates, but many birthdates are approximate or completely unknown. Billy the Kid might have been born in September 1859. Or maybe November. Persons with uncertain dates, notable or not, can't be included. Another restriction is that I only look for deaths in the year 1200 or later, so Julius Caesar doesn't show up either. Data before about 1500 are sketchy anyway. Records are unreliable. Calendar systems changed and differed throughout the world. Biographic details are often completely unknown. We think Joan of Arc was about 19 when she died, but nobody knows for sure even what year she was born. (She finally met her match on May 30, 1431.) In other words, people show up here only if they have a known birth and death date, and those dates are encoded in their Wikipedia page in some format that the software understands. Wikipedia provides another API for photos. We show thumbnails when they're available. The database currently has 173,165 dead people. 75,086 of them have photos. This website runs on ASP.NET Core 8.0. That means I can develop it using the free Visual Studio Code on Unix, Mac or PC, and the service can run on any of those environments too. Server-side code is written in C#. The site is based on the newer Razor Pages template rather than the traditional MVC model. The website is now hosted at Everleap. Learn about building Web apps with ASP.NET Core. This instance of Who Did I Outlive is running on server MD16-167.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00114.warc.gz
CC-MAIN-2024-10
2,331
19
https://www.powerplatformug.com/meetings/event-description?CalendarEventKey=86341284-9fd1-445b-a498-8975b95841d7&CommunityKey=13fa330d-53c4-4822-b297-2b913d154829&Home=%2Fcommunities%2Fcommunity-home%2Frecent-community-events
code
Getting Started with Power Automate This session introduces the fundamental concepts of Power Automate and demonstrates how to get started building and testing flows in the flow designer. Attendees will learn about the different types of flow triggers used to build flows that can be scheduled, executed in response to external events or run on demand using a button on a mobile device. The session will explain how data within a flow is propagated from step to step and discusses how to use control-of-flow actions to author business logic. Attendees will be provided with hands-on lab exercises to create a Power Platform test environment and to begin creating and testing flows.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400192778.51/warc/CC-MAIN-20200919142021-20200919172021-00639.warc.gz
CC-MAIN-2020-40
681
2
http://nyetokinaja.xyz/archives/4242
code
Lovelynovel Astral Pet Store – Chapter 691 – Contention lowly good recommendation-p3 Novel–Astral Pet Store–Astral Pet Store Chapter 691 – Contention title glamorous Lectures of Col. R. G. Ingersoll – Latest Xue Yunzhen rolled her view. “Get missing.” Bang. It was like a nuclear bomb established off in the secure every person observed they had missing their hearing. After that minute of quietness, a deafening racket resounded. The electronic great fist swallowed the ray of sword mild. The close began to enlarge! The popular conflict animal fighters discussed, continue to stunned. Never ever had they imagined there could be this type of guy above ground! Su Ping was capable to be part of them. Ye Wuxiu smiled. “Brother Su, we shall take a peek then. We have now a number of people who still have a few vacant attractions.” Su Ping nodded. He nevertheless possessed seven Void Express challenge domestic pets inside the shop there would be enough for them to pick from. “You lunatic, don’t communicate when you don’t realize. Mr. Su usually means nicely, let’s at the very least have a look,” Xue Yunzhen mentioned grumpily. The impressive combat animal warriors outlined, nonetheless surprised. In no way got they thought possible there might be such a person above ground! The fingers overlapped using the wonderful internet fist. It was subsequently as if the stunning being have been the main one relocating the fist! Xiang Fengran didn’t pay off significantly attention to the 2 main new renowned challenge dog or cat fighters. “Brother Su, you reported you will have challenge house animals on sale. Show us the items. We’ll discuss company following that.” The hands overlapped using the glowing digital fist. It was subsequently almost like the majestic creature were definitely one shifting the fist! The woman who was preserving the seal off waved her hand. She observed she obtained eaten a great deal of astral capabilities. She gazed at Su Ping having a severe appearance. She, too, was really a captain and she wasn’t any weakened than that center-aged mankind in black colored armor. A couple of legendary struggle animal warriors were definitely keeping that seal off together as well as the secure cracked. The energy that brought on a very impact must be over the Void State! “What would you like? I believe I can obtain it for you personally treasures or elements, you name it.” Obviously, he wouldn’t have settled any focus on him if Su Ping wasn’t close to par. “That became a alarming impact!” He’s offering Void Point out house animals?! In fact, if all aspects and trump greeting cards ended up built community, anyone that didn’t buy the fight furry friend would know it good enough to get countermeasures and target it. “So a lot of monster master skills…” “Wow…” One particular bout and that he recognized how terrifying Su Ping was. Quite as he finished conversing, 2 people showed up. It turned out Qin Duhuang and Zhou Tianlin. Venerable the Blade and Wu Guansheng experienced removed straight back to their specific safeguard lines Wu Guansheng traveled to the Sheng-Longer Defense Line, and Venerable the Blade towards the Xing-Jing Defense Collection. This store… is operate by such a legendary conflict dog or cat warrior! A virtual structure appeared to showcase the knowledge just after the tips have been subtracted. Bang. The close up chipped. A few of the strength seeped right out of the seal off, distributing a broken of heat. A swirl showed and as a result arrived a azure snake which had been more than a dozens meters extended the snake is in its miniature type however its strength was everything but. “Mr. Su, these individuals are…?” Qin Duhuang requested with regard. Ye Wuxiu, the girl and the ancient mankind who were maintaining the seal off had been transfixed. They unleashed a lot more astral abilities to bolster the seal but their foreheads were definitely perspiring. Ye Wuxiu plus the other people saw that the 2 main were definitely in the mythical get ranking. He sensed it more robust than someone else present. Just then, if the online fantastic fist was facing his encounter, he experienced just as if all of his things were actually eliminated the single thing left in the entire world was him and also the fist. In comparison with that fist, he was as an ant which may be crushed. Su Ping nodded. He nevertheless had seven Void Condition struggle dogs and cats during the retailer there would be enough so that they can select from. Xiang Fengran shrugged. He didn’t care and attention he wasn’t serious. “Void Point out?” While they were still wondering, Qin Duhuang and Zhou Tianlin approached the group. Both had been amazed to determine that great number of popular struggle animal fighters. That they had been up to date that many men and women of mythical position were actually headed to Longjiang, however they experienced consumed the content like a joke. Though mingling inside the group, Li Yuanfeng has also been looking at Su Ping with wide open astonishment. He knew that his young brother was powerful, but he only believed that Su Ping’s sturdiness got their start in his strange and powerful conflict animals, particularly the white-colored skeleton. Only then did he discover that Su Ping themselves was just as intimidating! The famous challenge dog warriors experienced their hearts and minds were sporting. Even they had observed the fact that brutal vitality can have swallowed them. A gold virtual fist sprang out looking at him, s.h.i.+ning in every brilliance. Associated with him, there was a faint sense showing a primitive and stunning figure, also bringing up an left arm. When mingling in the crowd, Li Yuanfeng had also been looking at Su Ping with start astonishment. He was aware that his more youthful buddy was strong, but he only considered that Su Ping’s strength originated in his strange and highly effective struggle house animals, specially the white skeleton. Only then did he learn about that Su Ping themselves was only as a little overwhelming!
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948708.2/warc/CC-MAIN-20230327220742-20230328010742-00546.warc.gz
CC-MAIN-2023-14
6,151
39
https://djinni.co/r/114506-middle-recruiter-at-artkai/
code
Currently Andrii Pashchenko has no open positions. About ArtkaiArtkai | Customer-centric digital innovations We are a global digital product design & development team of 100+ people headquartered in Ukraine. From whiteboard to market we assist enterprises and startups to shape, build and enhance products that make sense. Our services help businesses derisking product innovation, accelerate time to market, improve customer satisfaction and increase profits. We're actively growing and working with US and EU clients in the following niches: - Customer-facing applications for Blockchain/Crypto and FinTechs; - Digitalization and digital product innovation for SMB/SME; - End-to-End MVP development for Startups. We are proud that our projects are used by dozens of millions of people, and were recognized by Apple, Y-Combinator, and Forbes. Support Ukraine by supporting our economy. 100% of our employees continue working from safer locations. We continue covering salaries, hiring talents, and exploring business opportunities to help the economy run. We volunteer, donate and help people in need and Ukraine on the company and personal levels. We can and want to work to rebuild and support our country. Our team is more than motivated. DOU company page:
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818312.80/warc/CC-MAIN-20240422144517-20240422174517-00097.warc.gz
CC-MAIN-2024-18
1,260
14
https://www.lewistownpistolclub.com/
code
Follow us on Facebook Site is best viewed with google chrome when on mobile devices Please take a moment to fill out our VERY short, completly anonymous survey to help us better meet your needs. Click the link below to be directed to the survey. Feel free to check the "other" box for each question to add your own comments. Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669225.56/warc/CC-MAIN-20191117165616-20191117193616-00300.warc.gz
CC-MAIN-2019-47
332
3
https://www.my.freelancer.com/projects/website-design/need-software-developer/
code
Bajet ₹1500-12500 INR Hi! I need a software to manage my instagram accounts. If the developer is from india that will be great! Kemahiran: App Developer, Reka Bentuk Laman Web Lihat lagi: cost per hire software engineer, how much does custom software cost, find freelance software developer, how much does it cost for software development, how much does it cost to hire a software engineer, how much does it cost to become a software engineer in india, software development hourly rate, how to find software developer for startup, i need software developer freelance in philadelphia, i need software developer contact details to get whatsaa contact filter, i need a developer to help develop a web based software program i will provide full project details once you place a placeholder, i need software developer, i need software developer in goa, i need a developer who can help me develop my app, i need a developer to put my game on apple ID Projek: #14837132 I have just read the details regarding the project and interested in working for your project. I have confident to complete this within specified time. Relevant Skills and Experience iOS & Android native & Hybr Alamat emel telah digunakan dengan sebuah akaun Freelancer. Masukkan kata laluan anda di bawah untuk memautkan akaun: Saya terlupa kata laluan Pautkan akaun anda dengan akaun Freelancer yang baharu Pautkan dengan akaun Freelancer anda yang sedia ada
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590127.2/warc/CC-MAIN-20180718095959-20180718115959-00476.warc.gz
CC-MAIN-2018-30
1,425
14
https://onmeta.in/crypto-onboarding
code
How to onboard the next billion users into the crypto world? That’s the hot question on web3 Twitter spaces right now. Web3’s value proposition is that it is an internet of value, and these values can be leveraged to build organisations and businesses on top of it. For a user to participate in this new economy, the user has to either create value in the economy by mining or, but not limited to- contributing to a Decentralised Autonomous Organisation(DAO), or has to transfer value from the real world to the crypto world, by exchanging their fiat for cryptocurrencies at exchanges or fiat on-ramp platforms. Fiat on/off-ramps are widely popular and in demand because the alternative- centralized exchanges- will keep custody of users’ assets. Which means, the user will never actually own the tokens/coins, these exchanges will hold the coins on their behalf, which limits the use cases of these coins to only trading. Also, creating value as opposed to transferring value is not as efficient (although necessary) because most of us already have some value locked up in real world in the form of “money in the bank” in its most literal sense. So users want to be able to exchange their fiat to crypto and access their favourite decentralize applications, and the best known way to do it is with fiat on-ramps, which is a platform where an user can buy crypto currencies and deposit it to their own privately held wallets. From there, the users are free to do what ever they want with their crypto assets. The Broader Problem Why are crypto currencies better than fiat currencies? Why global economies are better than tribal economies? Why are decentralisation & transparency better than centralisation and opacity in organisations? I think these questions need to be discussed more in the community so that our roadmap is grounded in well-founded ethos. We also have to educate people and build incentive structures for new users to participate and make the process as seamless as possible. Investing is the most popular incentive based use cases in crypto; we have seen it with the NFT boom. Other current use cases are access to gated communities, defining ownership and play-to-earn(p2e) gaming. The Specific Problem If you want to play a play-to-earn game, you should not go through a process of buying some a native token on an exchange (like 0x, 1inch, Uniswap, etc), creating a wallet, and then transferring these coins to the wallet and then go to another decentralised exchange to swap the native token for the Dapp token. This process has a lot of friction and is tedious for an average user to come and reach a desired outcome. This is where fiat on-ramp platforms like Onmeta or Moonpay that plug in with Dapps come to use. A user can directly go to the Dapp landing page and pay with fiat(INR/USD/EUR) to get the token to start interacting with the Dapp. We will surely go through a lot of user onboarding experiments in terms of UX and the general upsides of getting into web3 in the coming years. It is therefore important for the whole ecosystem to acknowledge the problem and be supportive of anyone working on its solutions. If you want to improve your sales experience which will let your users buy cryptocurrency without leaving the platform, allow us to serve you. Book a call with Onmeta now!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474445.77/warc/CC-MAIN-20240223185223-20240223215223-00179.warc.gz
CC-MAIN-2024-10
3,328
15
https://geektech.me/tweak-package-count-displays-the-number-of-installed-tweaks/
code
Some users prefer not to download many tweaks to their devices, while others like New free jailbreak tweak Package Count may be useful for both first and second users. Tweak displays the number of tweaks that youinstalled from cydia. The number is displayed for each repository on the Cydia source page, i.e. it becomes easy to understand exactly how many tweaks you have installed from different repositories. Tweak Package Count will help you understand which of your favorite repositories, and remove those that you almost never use. It does not contain any options and takes effect immediately after installation. If you want to install the Package Count tweak, you can download it for free from the Bigboss repository. It is supported by all devices with jailbreak iOS 11 and iOS 12.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500095.4/warc/CC-MAIN-20230204075436-20230204105436-00628.warc.gz
CC-MAIN-2023-06
788
5
http://androidweekly.net/jobs
code
Submit a job post and reach more than 53000 Android developers around the world! Android Engineer @ Scalable Capital ( Munich ) Scalable Capital is a FinTech Start Up with offices in Munich and London and a strong focus on technology and quantitative analysis. We aim to revolutionize investment management and are looking for talented new team members! Join us as an Android Engineer and own the complete App life cycle. Software Development Engineer – Mobile ( Boston, MA / Seattle, WA / Santa Barbara, CA ) If you love music, solving challenging software problems, and doing things the right way every time, we’d like to talk to you. When you join one of our teams, you will be responsible for improving the Sonos applications to seamlessly play what listeners want to hear where they want to hear it. Senior Android Developer @ Clue ( Berlin ) Want to apply your Android Development skills to empower millions of users and help us scale the role of Technology in female health? Join us at Clue, the world’s fastest growing period tracking and fertility app. We are a 45-person, VC-backed startup based in Berlin. Life is Short. Love your Job @WillowTree ( Charlottesville, VA OR Durham, NC ) Do writing and reading great code make you smile? Do you want to develop best-of-class Android applications alongside some of the industry's best designers and developers? If you've answered "yes" , this is the place for you. Senior Mobile Developer - Android ( Raritan, New Jersey ) Johnson & Johnson is currently recruiting for a Senior Mobile Developer - Android to be part of a fast-paced, innovative, and highly visible teams building web and mobile software for our commercial and R&D lines of business. Johnson & Johnson is proud to be an equal opportunity employer.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189083.86/warc/CC-MAIN-20170322212949-00355-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,775
12