url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.acromag.com/forum/topic/vme-sbc-xvme6200-xembedded-linux-bsp-tundra-universeii
code
So I am working iwth an interesting problem with the Xembedded Linux BSP for Tundra UniverseII , version 2.0.4, which uses the VME_UNIVERSE module/library. I have a process that access a device in a specific slot, which is specified at launch time. When the configured slot contains a device, everything is great. However, if the slot is empty, the entire VME bus appears to hang which freezes the SBC. In going through the documentation for the VME_UNIVERSE library, it indicates that we should be able to detect an empty slot after getting an address returned by the call to vme_master_window_map(...) and examining the data from that pointer. If all of the data is 0xFF, then the slot is likely empty. Another way is to try to access the data an see if a SIGBUS event is raised from the VME controller/arbiter. However, none of these solutions seem to work for us. With the target slot empty, everything hangs immediately as soon as we try to read the first byte (offset 0) from the returned pointer. The read never completes and the signal handler never gets invoked. Since these are the methods mentioned in the VME_UINIVERSE documentation for detecting an unpopulated slot, I believe something is buggy. We cannot be the first people to every try to use a VME chassis partially-populated with this BSP, so what is the correct way to detect an empty slot with an xEmbedded VME SBC using the supplied/supported BSP? Nothing in the Linux_BSP_Notes.txt has anything that helps. I even tried the acpi=noirq kernel parameter to no avail. (I get a message about an ignored IRQ 9 and a stack trace at boot, but that is all.) Is an updated BSP available that fixes this problem, or is there a workaround that we should try?
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257767.49/warc/CC-MAIN-20190524204559-20190524230559-00292.warc.gz
CC-MAIN-2019-22
1,720
6
https://www.programmableweb.com/api/photodeck
code
- SDKs (0) - Articles (1) - How To (0) - Sample Source Code (1) - Libraries (0) - Developers (0) - Followers (5) - Changelog (1) HTTP Basic Auth Single purpose API URI Query String/CRUD Sorry, no developers found for this API. API Mashups (0) Sorry, no mashups for this API. Related Articles (1 ) Ten APIs have been added to the ProgrammableWeb directory in categories including Documents, Gambling, and Sentiment. Today's highlights include an API for automating forms in applications, and an API for adding digital waiver functions to apps. Here's a rundown of the latest additions. RELATED APIs (1916) | Ingram Micro||The Ingram Micro API enables product price data, and the available inventory associated with it. Additionally, this platform can be utilized to create orders, and to validate addresses. The API...||eCommerce||09.04.2019| | Expedia Partner Solutions Rapid Shopping||The Expedia Partner Solutions Rapid Shopping API gives developers programmatic access to live booking rates and availability for more than 500,000 properties around the world. This API provides rate...||Hotels||08.30.2019| | ABN-AMRO Tikkie Fast Checkout ||The ABN-AMRO Tikkie Fast Checkout API enables customers to checkout in seconds, aiming to boost the conversion rate of a webshop. Methods are available to manage orders, shipping costs, currencies,...||Financial||08.27.2019| | International Bridge Shipping Labels Sandbox||International Bridge Shipping Labels API - Sandbox is testing environment that allows developers to integrate shipping labels and fulfillment within their e-commerce businesses and online...||Shipping||08.26.2019| | GroupDocs Documents Watermarking||This is indirect access to this service. Please refer to the corresponding SDK below. GroupDocs.Watermark is a .NET API to digitally add text and image watermarks on most common and popular document...||Documents||08.20.2019|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575751.84/warc/CC-MAIN-20190922221623-20190923003623-00180.warc.gz
CC-MAIN-2019-39
1,891
22
https://pasvpnfwwh.netlify.app/bubert2520xu/internet-connection-blocked-198.html
code
Dec 05, 2018 · Internet Access Blocked I can view the server (which is running on my laptop) when I go to 127.0.0.1 but if I try and go to the full private ip address I get this message. I even tried turning Windows firewall completely off and I still get that message. 12 Tips to Troubleshoot Your Internet Connection | PCMag 2020-3-17 · 12 Tips to Troubleshoot Your Internet Connection. Have a full house of social distancers working, gaming, streaming, and news binging, all at the same time? Help & Support | Can't login - blocked | Absolute-Email If we blocked your email address itself this would also stop you (the real user) accessing your own account, so blocking the internet connection where the failed logins come from stops any attack but doesn't prevent you from logging in. It also stops attacks on multiple addresses from the same connection. c# - Internet connection blocked after install (Win10 2020-2-2 · When i do a restart of the machine, and restart launch.exe (and this again starts app.exe) they both are able to connect to the internet. I also tried to inspect the traffic with Fiddler using Fiddler as the proxy-server (127.0.0.1:8888). When i use Fiddler, the connection suddenly isn't blocked anymore. Your Internet access is blocked Firewall or antivirus software may have blocked the connection. 0 Recommended Answers 14 Replies 670 Upvotes I have looked through all articles that have been posted on the forum and nothing has worked. Check your Internet connection. Check any cables and reboot any routers, modems, or other network devices How to Fix Xbox App Server Connectivity Blocked on … 2020-1-23 · Incorrect network adapter: If your computer is using the Internet connection trough Wi-Fi and Ethernet at the same time, the Xbox connection may become unstable. Antivirus programs : If your antivirus program settings are configured improperly, you may also encounter the Server connectivity blocked Xbox app issue. PT Internet – Internet connectivity, ISP, reliability 2016-1-29 · 解决:Host xxx.xxx.xxx.xxx is blocked because of many connection errors. Host "xxx.xxx.xxx.xxx" is blocked because of many connection errors 1.原因:当使用错误的密码连接mysql时,超过设定的次数 IP或主机名就会被mysqld阻塞访问. ①中文 ② 2020-5-8 · The Microsoft Xbox 360 game console can connect to the Xbox Live service using Wi-Fi for online gaming, video streaming, and other internet features.If you have trouble connecting to Xbox Live, here's how to fix the most common wireless connection problems on the Xbox 360. TotalAV - Firewall blocked a connection 2020-7-5 · Firewall blocked a connection In the event that you are seeing the notification 'Firewall blocked a connection,' it is likely that you have your 'Outbound Traffic' setting as OFF. Within your TotalAV application you have a section dedicated to Firewall settings.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588526.57/warc/CC-MAIN-20211028193601-20211028223601-00717.warc.gz
CC-MAIN-2021-43
2,896
6
https://www.thefoxyshopper.com/products/chloe-paraty-python-dove-shoulder-bag
code
approx measurements: 11”H x 14”L accessories: dust bag condition: 4.5/5 stars lightly preowned light wear at base *please note Python scales may lift naturally over time estimated retail price: $3,800 * hologram sticker has fallen off. will be sold with certificate of authenticity.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500758.20/warc/CC-MAIN-20230208092053-20230208122053-00595.warc.gz
CC-MAIN-2023-06
286
7
https://www.iis.sinica.edu.tw/en/page/Events/data/DJ110215.html
code
Classification is an important problem in machine learning. It can be used in a variety of applications, such as separating apples, oranges, and bananas automatically. Traditionally, the regular classification setup aims at minimizing the number of future mis-prediction errors. Nevertheless, in some applications, it is needed to treat different types of mis-prediction errors differently. For instance, a false-negative prediction for a spam classification system only takes the user an extra second to delete the email, while a false-positive prediction can mean a huge loss when the email actually carries important information. When recommending movies to a subscriber with preference ``romance over action over horror'', the cost of mis-predicting a romance movie as a horror one should be significantly higher than the cost of mis-predicting the movie as an action one. Such needs can be formalized as the cost-sensitive classification setup, which is drawing much research attention because of its many potential applications, including targeted marketing, fraud detection and web analysis. Because regular classification is a well-studied setup, there are many good regular classification algorithms. In this talk, we first present a tool that systematically extend those algorithms to deal with cost-sensitive classification problems. Then, by coupling the tool with the popular one-versus-one regular classification algorithm, we propose a simple and novel cost-sensitive classification method. Finally, we demonstrate some strong theoretical guarantees and some promising experimental results that come with our proposed method. The talk is self-contained and assumes no prior knowledge in machine learning.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178376144.64/warc/CC-MAIN-20210307044328-20210307074328-00109.warc.gz
CC-MAIN-2021-10
1,719
1
https://claz.org/phoenix/catering-services/tend-premium-event-staffing-1jw8bl5fyj3.html
code
Tend- Premium Event Staffing Tend is an on-demand digital staffing company. We combine our technology with our network of bartenders and servers to provide affordable staffing for all events. You can download our app or book on our website:https://tend.la/. We look forward to staffing your next event! Updated over a month ago
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988828.76/warc/CC-MAIN-20210507211141-20210508001141-00082.warc.gz
CC-MAIN-2021-21
327
3
https://www.cocoroselondon.com/stratford-black-and-silver-snake.html
code
FREE UK DELIVERY OVER £50 | WE SHIP INTERNATIONALLY Sleek fashion sneakers with a laid back, sports-luxe appeal, these trainers are made using shimmering black and silver snake print leather and finished with black grosgrain ribbon laces. - Fusing premium leather and textile and individually hand-crafted - Extremely soft, supple and flexible, these foldable trainers are the ultimate in everyday wear comfort and style - Luxuriously double cushioned insoles and padded Achilles heels provide superior comfort - Fully flexible, foldable and durable rubber soles with 8mm heel height - Each pair is gifted with our signature travel purse - Beautifully packaged for you in our luxurious black and gold presentation box Considerately Designed for Smart Lifestyles. For delivery information, click here!
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890874.84/warc/CC-MAIN-20180121195145-20180121215145-00113.warc.gz
CC-MAIN-2018-05
801
10
https://brainmass.com/physics/coulombs-law/coulomb-s-law-2-small-charged-spheres-95397
code
2 small spheres with mass m = 15.1 g are hung by silk threads of length L = 1.21 m from a common point. When the spheres are given equal charges, so that q_1 = q_2 = q, each thread hangs at an angle theta = 26 degrees from the vertical. Find the magnitude q. Please see the solution to your problem in the attached word file Its a very simple problem. I have given one additional case, where ... The solution calculates the magnitude of charges of two balls hanging from non-conducting threads.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866201.72/warc/CC-MAIN-20180524092814-20180524112814-00161.warc.gz
CC-MAIN-2018-22
494
4
https://www.moddb.com/news/mod-startup-arachnid-blender-model-wanted
code
Ill be uploading new material as frequently as possible; right now I've got the SICON units pretty well planned out, and most of the campaign missions exist in my brain if not ingame. What I am in need of, is a good low-poly .OBJ file of a Starship Troopers Arachnid. I've got Blender, but can't make heads or tails out of how to model with it. I'll keep trying, and if no model is available I'll try to make my own. It just may delay mod release a bit. Mod Startup! (Arachnid Blender Model wanted!) Moddb page started! Looking for possible Modeling assistance. Posted by Wordsarecool on
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00559.warc.gz
CC-MAIN-2023-40
587
4
http://legacy.onchainfx.com/sector/gambling
code
Bletchley provides a number of indexes which we feel are consistent and well-constructed. We list three Bletchley indexes today: the daily versions of the Bletchley 10, Bletchley 20, and Bletchley 40. These indexes track large-cap, mid-cap, and small-cap cryptoassets, respectively. These indexes together provide easy to understand insight into the day's cryptoasset price movements: The Bletchley 10 is composed of 10 of the largest cryptoassets, weighted by marketcap. As such, it tends to track the 'large-caps'. The Bletchley 20 is composed of 20 medium-capitalization cryptoassets. The Bletchley 40 is composed of 40 small-capitalization cryptoassets. Together, these indexes give good at-a-glance understanding of how large-caps are performing relative to medium/small-caps over the past 24 hours. For further detail on Bletchley index construction, asset eligibility, rebalancing, and weightings, see the Bletchley Indexes methodology detail page
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243990449.41/warc/CC-MAIN-20210514091252-20210514121252-00018.warc.gz
CC-MAIN-2021-21
954
6
https://community.sonarsource.com/t/issues-integrating-bitbucket-pr-annotation/41432
code
I’m attempting to integrate our Sonarqube analysis into Bitbucket so that any identified issues are annotated on the PR. I’m triggering Sonarqube analysis via a jenkins pipeline, using the SonarScanner jenkins plugin. I have the SonarScanner plugin configured to point to my instance, and I’m additionally passing values for the following variables to the execution as they appear to be required for PR analysis but not automatically set up by the SonarScanner plugin: Analysis runs as expected and appears on my Sonarqube server. However! The annotation never makes it to my pull request For example, trying to perform analysis on a merge from branch DEV to branch MASTER gave me the following error on Sonarqube: Failed to create Bitbucket Server Quality Report for commit SHA ‘a7589f8cdedb41ab52fe6d2f9b44d0762041553f’ Which indicates that sonarsource is attempting to annotate a PR for that commit over in Bitbucket. However, when Jenkins does a PR build, it merges the destination branch onto the current branch and runs the build on that result, to ensure that the builds would pass after the merge is complete. In my case, it merged the MASTER branch onto my DEV branch, producing commit ‘a7589f8cdedb41ab52fe6d2f9b44d0762041553f’. That commit doesn’t actually exist in Bitbucket though, it’s just created in the context of my build. How do I get Sonarqube’s analysis to be associated with the correct commit, so that it can be annotated on a PR appropriately?
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488259200.84/warc/CC-MAIN-20210620235118-20210621025118-00519.warc.gz
CC-MAIN-2021-25
1,487
6
https://mail.python.org/pipermail/python-list/2005-December/331763.html
code
Another newbie question aleax at mail.comcast.net Sun Dec 11 04:20:39 CET 2005 Paul Rubin <http://[email protected]> wrote: > Right, you could use properties to make point.x get the real part of > an internal complex number. But now you're back to point.x being an > accessor function; you've just set things up so you can call it > without parentheses, like in Perl. E.g. > a = point.x > b = point.x > assert (a is b) # can fail Sure -- there's no assurance of 'is' (although the straightforward implementation in today's CPython would happen to satisfy the assert). But similarly, nowhere in the Python specs is there any guarantee that for any complex number c, c.real is c.real (although &c same as above). So what? 'is', for immutables like floats, is pretty useless anyway. > for that matter > assert (point.x is point.x) > can fail. These attributes aren't "member variables" any more. They are *syntactically*, just like c.real for a complex number c: no more, no less. I'm not sure why you're so focused on 'is', here. But the point is, you could, if you wished, enable "point.x=23" even if point held its x/y values as a complex -- just, e.g., def setX(self, x): x.c = complex(x, self.y) [[or use x.c.imag as the second argument if you prefer, just a style More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524502.23/warc/CC-MAIN-20190716035206-20190716061206-00060.warc.gz
CC-MAIN-2019-30
1,309
27
https://www.programmableweb.com/sdk/lunanode-go-sdk
code
February 27, 2019 Sorry, No followers View all 604 Related Articles Related Articles (604) In a move that extends the scope of its cloud services to include two-factor authentication, Twilio today announced the acquisition of Authy. Need to make sure your cloud is up and running? If you like pretty charts of that uptime, Nimsoft has got you covered. The company also has a not quite as pretty Nimsoft Cloud Monitor API that allows developers to integrate the tools for monitoring cloud performance into their applications.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056902.22/warc/CC-MAIN-20210919220343-20210920010343-00013.warc.gz
CC-MAIN-2021-39
524
6
https://www.coe.int/en/web/cybercrime/workshop-cybercrime-offenders
code
Cybercrime perpetrators are as diverse and complex as the cybercrime that they commit. For example, they come from different backgrounds and have different (egotistical, technical, monetary, ideological, political, professional, vengeful, sexual or other) motivations. They may or may not be professional criminals, and individuals or part of organised groups or networks (example of Advanced Persistent Threats). Some may commit crime on their own account or make their services available to others, and some may be supported by or be state actors. A better understanding of the types of perpetrators and their motivations and techniques can be instrumental for the prevention of cybercrime and for a more effective criminal justice response. The aim of this workshop is to contribute to such a better understanding and to initiate steps towards a typology of offenders.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711336.41/warc/CC-MAIN-20221208114402-20221208144402-00811.warc.gz
CC-MAIN-2022-49
871
1
https://forums.veeam.com/veeam-backup-replication-f2/moving-files-on-scale-out-repository-t38251.html
code
I already have an Scale Out Repository, but I want to change the policy from "Data Locality" to "Performance". There is a way so I can rearrange the files manually, without the need of make a new full backup? I dont have spare space to put all together manually on a new repository, and add that repository to the scale out and after that, using the "evacuate" function. Thanks in advance! (sorry, my english sucks, I know)
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891539.71/warc/CC-MAIN-20180122193259-20180122213259-00676.warc.gz
CC-MAIN-2018-05
423
5
https://github.oldjpg.com/repository/99143276
code
Kubermatic KubeOne automate cluster operations on all your cloud, on-prem, edge, and IoT environments. Aggregator for issues filed against kubeadm Form your :boat: Kubernetes :anchor: cluster anywhere using CoreOS, Terraform and Ansible Production-Grade Container Scheduling and Management CoreOS Container Linux+Kubernetes documentation & Vagrant installers Kubernetes powered PaaS that runs in your own cloud. Kubernetes spawner for JupyterHub Zenko is the open source multi-cloud data controller: own and keep control of your data on any cloud. Kubernetes Node Autoscaling: built for flexibility, performance, and simplicity. https://karpenter.sh
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573623.4/warc/CC-MAIN-20220819035957-20220819065957-00063.warc.gz
CC-MAIN-2022-33
649
9
https://www.theladders.com/job/software-developer-senior-keywcorp-hanover-md_39249407
code
Industry: Aerospace & Defense• Not Specified years Posted 42 days ago Provides expertise and direction in the development and/or modification of computer-basedscientific, technical, and business software systems. Uses expertise to design develop, code, test, and debug software. May work in one or several areas, such as equipment or software design, engineering evaluation or test, configuration management procedures, statistical analysis and modeling. Works with users to define existing or new system scope and objectives. Provides analytical support and technical advice during the conceptualization, development, and implementation phases. Plans and schedules new applications systems projects with user, systems software, and computer center operations personnel, including the identification of objectives, time frames, costs, and manpower requirements. Performs tasks necessary to ensure the identification and documentation of hazards within software systems using various analysis tools and techniques. Reviews and evaluates systems and software for adherence to government or commercial directives, standards, guidelines, and criteria concerning software safety and systems safety. Confirms design mitigations are captured in the design and its documentation and verifies implementation. May perform as a project lead with theresponsibility for the instruction, assigning, direction, and monitoring of the performance ofassigned systems developers/analyst working on a specific project. • Unix/Linux development experience • Windows development experience (Visual Studio) • Strong C programming skills • Python development experience • CNO background • Software Analysis/Reverse Engineering experience • Embedded systems development experience • Understand assembly programming concepts (PowerPc preferred, but x86 accepted) Clearance: Positions require a Top Secret security clearance, based on current background investigation (SBI), as well as the favorable completion of polygraph. Clearance and polygraph processing will be completed by the U.S. Government. KeyW EEO Statement KeyW, together with its direct and indirect subsidiaries, encourages and actively supports a policy ofEqual Employment Opportunity and commits to provide equal opportunity to each individual, regardless of race, color, religion, gender, sexual orientation, age, national origin or ancestry, marital status, veteran status, disability or any other classifications protected by Federal, State or local law. In fact, we foster an environment that promotes diversity, balance and fun—because we believe in theimportance of having a workplace as unique as the challenges we solve. About the Organization KeyW is a pure-play national security solutions provider for the Intelligence, Cyber and Counterterrorism Communities' toughest challenges. We support the collection, processing, analysis and dissemination ofinformation across the full spectrum of their missions. We employ and challenge more than 2,000 of themost talented professionals in the industry with solving such complex problems as preventing cyberthreats, transforming data into intelligence and combating global terrorism.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257660.45/warc/CC-MAIN-20190524144504-20190524170504-00190.warc.gz
CC-MAIN-2019-22
3,197
17
http://osgeo-org.1560.x6.nabble.com/importing-from-Atlas-GIS-td3991387.html
code
A friend asked if it was possible (ie. done already) to import data from Atlas GIS (AutoCAD?)?? thanks in advance! California Department of Pesticide Regulation Environmental Monitoring and Pest Management 1220 "N" Street, Room A-149 Sacramento, CA 95814 [hidden email] == usual disclaimers == I've been successful importing any kind of data from Autocad. You must create a .DXF file format (a sort of ascii file) in the Cad enviromment (use the comand dxfout). To import it into the Grass you must use the You can use v.in.dxf just to import data as lines and areas. If you need to import sites files as well, you must generate an ascii file just if the data (without any header) and follow the format described in the manual (the Grass command to import site files is s.in.ascii). Roberto de Souza Milton keynes - England
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671363.79/warc/CC-MAIN-20191122143547-20191122172547-00097.warc.gz
CC-MAIN-2019-47
823
17
http://www.john-knight.com/
code
Service Designer with a focus on designing for engagement in the context of digital transformation. Maker of UX Design Games for the FLEX™ Service Design Methodology at Aalto University of Arts, Design and Architecture. I studied Fine Art at Newport, then run my Roy Ascott. Then after some time trying to change the world I progressively worked my way through the media industry. I ended up somehow responsible for IT which led me to study Human-Computer Interaction. I was fortunate to run the world’s first usability lab in a Design Institute and worked all areas of user experience, becoming a skilled UX researcher and designer. Moving between client, agency and consulting I decided to distill my learnings through a Phd in Service Design and am now forming the FLEX™ methodology.
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927824.26/warc/CC-MAIN-20150521113207-00216-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
792
2
https://fm-cab.blogspot.com/2015/05/news-launch-of-eu-border-deaths-database.html
code
HCBC) is a research project based at VU University in Amsterdam. One of its aims is to investigate the relationship between migrant mortality and European border policies. The first stage of this effort involved collecting data from official sources (such as death certificates) from Spain, Gibraltar, Italy, Malta and Greece. (Other projects that track migrant deaths have primarily relied on media reports for their data sources.) These data were then input into the Deaths at the Borders Database for the Southern EU which was made available for public use today. A more simplified visualization version was also developed. Visit the project site for more information, and read the preliminary findings and policy conclusions for analysis of the data. Highlights of the research are reported in this Reuters article. - Regional Focus: Mediterranean Refugee Crisis (28 April 2015) Tagged Publications and Web Sites/Tools.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218195419.89/warc/CC-MAIN-20170322212955-00659-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
923
4
https://wiki.yona.nu/display/DEV/Architecture
code
This page describes the architecture of Yona. High level overview On network level, this is how it looks like: Initial support is limited to mobile devices. These devices will access the internet through a VPN tunnel that is terminated on the web traffic classification server (SmoothWall). The server will not filter, in the sense of blocking sites, but just classify the sites. This classification will happen for HTTP and HTTPS traffic, see this page. The requests will be passed on to the target web server. For requests that in categories of interest to Yona, the classification server will post a message on a queue to the Yona server. The Yona server is responsible for maintaining the user and buddy administration and to inform users about events that conflict the goals defined by the users. The Yona app on the device interacts with the Yona server to see buddy events and everything supported by Yona. Subsequent sections zoom in on the app, the web traffic classification server and the Yona server. The mobile app is the only user interface provided for Yona. There are no plans to provide a web site. The mobile app has the following high level responsibilities: - Provide the user interface for all features provided to Yona users - Configure the VPN connection - Reconnect the VPN in case it disconnects - Send a request to the Yona server to inform the buddy in case: - The user uninstalls - The user disables the app - The user disables or otherwise hampers the VPN connection The app generates and stores a key in the secret storage of the app, that is required for all interactions with the server. Web traffic classification server The heart of this server is SmoothWall. This product is commonly used for web filtering. For Yona, it will be deployed as a classification server. The SmoothWall server provides us with the following features: - VPN server - Classification engine - Man-in-the-middle proxy for HTTPS servers. See this page. Every request passed through the filter engine is logged in the DansGuardian log. Given the constraints of the Linux OS of the SmoothWall server, we will use a Perl script to filter the events that are of relevance to Yona and post these on the queue to the Yona server. The log file ( access.log) is normally written in a file. Instead of the file, we will create a named pipe and have the Perl script read from it. See an example log file parser here. The named pipe approach is chosen for two reasons: it is a very efficient mechanism that does not required disk reads/writes and it prevents from storing sensitive data. The Perl script will read all SmoothWall log events and match them with a list of Yona-relevant web site categories. If the category is relevant, a message with the relevant data is posted on the queue to the Yona server. Otherwise, the message is discarded. The Yona server is responsible for: - Providing the web services that back the mobile app - Administration of users and buddy relationship - Producing notifications in case users access websites that conflict their objectives Given the objective of Yona to help people that "do the very thing they hate" (Romans 7:15), the system by nature stores sensitive information, so security is a prime concern. For an overview of the various design alternatives considered, consult the page Flow - Register a goal conflict. These are the design goals: - Private information about a user (buddies, goals, devices, messages from buddies, messages about goal conflicts, etc.) should be inaccessible to everyone, including those that have administrative access to the systems - It should be impossible to build a quantitative understanding of how well a user acts against his own goals, even when having administrative access to the systems The server design uses a combination of public-key encryption and symmetric-key encryption to accomplish these goals. Symmetric-key encryption is used to encrypt all private information of the user: buddies, goals, devices, etc. Public-key encryption is used to implement a secure messaging system to deliver messages from buddies and messages from the web traffic classification. Every user has two "message boxes", comparable to a classic mailbox with lock: Everyone can drop a message in the box, but you need the key to take a message out of it. Every user has two of these. One is publicly linked to the user account, so it's technically possible to send a message to a user if their identity is known. The other message box is linked indirectly and used for messages related to web traffic. When a user is provisioned, a VPN account is created for them. The user name of this VPN account is a UUID (named accessor ID) that cannot be linked to a user, Through their private key, the user knows what their accessor ID. but without that private key, that link cannot be established. This can be depicted as follows: The server maintains a little bit of unencrypted user information: their name, mobile number and a reference to their public message box. The other information is encrypted with the key that is stored on in the secure storage of the device (e.g. Android non-exported content provider). This encrypted data includes the buddy relationships, the defined goals and two private keys to access the two message boxes. Writing into the message boxes can be done through the public key (not depicted, to prevent confusion). For reading, the private key is required, which is part of the encrypted data of the user. The message box for direct messages is linked from the public data of the user, so given a user, it is possible to find the direct message box. The sole purpose of the direct message box is to be able to send an buddy connect request to a user. The anonymous message box is linked from the private data of the user, so only the user "knows" their anonymous message box. Besides this, the anonymous message box is also linked to the so-called user-anonymized entity, which carries the same ID as the VPN user name. Thus the analysis engine (see below) knows where to post messages when a goal conflict is detected for a given VPN account. Once the buddy relationship is established, all inter-buddy messages go through the anonymous message box. See Encryption approach for a more indepth description. The Yona server has a simple layered architecture: - REST. This layer exposes the RESTful API used by the mobile app. Follows HATEOAS and HAL (see primer here) to provide an efficient and convenient RESTful API. This layer is implemented through Spring HATEOAS. - Services. The services are independent of the access technology (today REST, yesterday SOAP) and enable creating users, finding goals, etc. Services define the transaction boundaries and can depend on one another to fulfill their task. The services layer take Data Transfer Objects (DTOs) as inputs and outputs. These DTOs are annotated with Jackson annotations, so the REST layer can directly return the DTOs. The services layer is implemented with the Spring Framework. - Entities. The entities layer hosts the domain model and the repositories. The implementation technology is JPA and Spring Data. To make the domain model somewhat comprehensible, it is described based on multiple class diagrams that cover subsets of the model. All diagrams use the same graphical convention: - Orange: encrypted with the Yona password stored on the device - Magenta: encrypted through public/private key encryption - Black: not encrypted. This holds anonymous information that cannot be related to identified users, but users can find the data that belongs to them, by decrypting the associations. The exception to this is the Userentity. That is not encrypted but contains identifieable information: the user name and the e-mail address. This is not encrypted because users need to be able to send a buddy connect request to other users. This information is not exposed through the web APIs. If the system gets hacked, an intruder would be able to fetch a list of names and phone numbers. This is not considered sensitive, as that is also available from public directories. User with buddies and goals The below diagram shows the heart of the domain model: users with buddies and goals. The orange texts and associations represent data that is encrypted with the key stored inside the app. The magenta texts and associations represent message related data that is encrypted through the private key of the message box containing them. Here is a short description of every class, in a somewhat logical order: User. This is the heart of the domain model. It contains the so-called public information of the user. It's called public because it can be accessed without the key of that user. The linked MessageDestinationrepresents the user's direct message box. The user owns a UserPrivateinstance containing the private user data. This is optional. In case a user sends a buddy request to a person that is not known in the system yet, then only the Userobject will already be created, so the connect request message can be stored for that user and the buddy-to-be can be linked to the requesting user. UserPrivate. This is the second piece of user data. Everything in this object is encrypted with the password/key stored in the app. It compositely owns the two message boxes, the buddies of this user and the anonymized user data. UserAnonymized. This is the third piece of user data. This information is not encrypted and thus accessible to the analysis engine. The information in this object and the ones associated with it cannot be related to a user without the password/key stored in the app. The ID of this object is also the login ID of the user on the VPN. It maintains associations with: the anonymous destination of this user, their anonymized buddy information and their goals. Buddy. An object of this class represents another user as buddy for the user owning this instance. I.e. if Richard Quinn requests Bob Dunn to become his buddy, then Richard will own a Buddyinstance representing Bob to him. If Bob accepts that request, then he will own another Buddyobject representing Richard to him. Richard's Buddyinstance, actually the BuddyAnonymizedobject owned by it, (representing Bob) will have the NotRequested. On Bob's side, the sending and receiving status are reversed. This implies that Bob will receive messages when Richard does things conflicting with his goals, while Richard does not receive such messages for Bob. In general usage patterns, the buddy relationship is symmetrical, but that that is implemented in the app: that will automatically request the revers relationship when a user accepts a buddy request. The Buddyobject has associations with: the Userof the buddy and their goals. Besides this, it compositely owns a BuddyAnonymized. This is the other half of buddy information. This information is not encypted and thus accessible to the analysis engine. The information in this object and the ones associated with it cannot be related to a user without the password/key stored in the app. It contains the status (whether information is to be sent to/received from) this buddy and it maintains an association with the anonymized user. ActivityCategory. A type of activity (e.g. Multimedia, Gaming, Adult content) for which the user can define a goal. Goal. A goal defined by the user, specialized as: BudgetGoal. the user has assigned themselves a certain amount of time for this activity category. TimeZoneGoal. The user has defined one or more blocks of time in which the want to do this category of activities. MessageSource. The message box mentioned in the text above is implemented in two classes: MessageSourceallows fetching messages while decrypting them with the embedded private key. It holds a MessageDestinationallows sending message to that message box, while encrypting them with the embedded public key. It holds a collection of Message. This is the base class for all messages. It holds an (encrypted) association with the related anonymized user and provides the encryption API. NewDeviceRequest. An instance of this type is created when the user wants to add another device to their account. This object temporarily holds the Yona password of the user (which is normally never stored on the server), encrypted with a temporary password. ConfirmationCode. Several user actions require a confirmation code, sent by SMS. IntervalActivity. Base type for day and week activities. See below for more information. Users with buddies and buddy messages The domain model contains a considerable set of different message types: GoalConflictMessage. The analysis engine issues a message of this type when it detects that a user visited a web site that conflicts with the goals set for that user. This message has an association with the conflicted goal. BuddyMessage. Base type for all messages sent by a buddy. It contains an association to the user sending the message, a textual message (currently not used by the app) and the nickname of the user sending the message. DisclosureRequestMessage. Sent when a buddy requests disclosure of the URL causing a goal conflict message. DisclosureResponseMessage. Sent as response to the disclosure request message, indicating whether or not the buddy is allowed to see the URL. BuddyDisconnectMessage. Sent when a user wants to break the buddy relationship. The reason to break the relationship (disconnect or remove user account) is part of the message. BuddyConnectMessage. This is the base class for the buddy connect request and response messages. It holds an association to the involved buddy object. BuddyConnectRequestMessage. If a user requests someone to become their buddy, this message is added to the direct messages of that user. It contains a set of data that is private to the requesting user, which is now shared to the buddy-to-be. The data in the base class currently suffices. BuddyConnectResponseMessage. If the user accepts a buddy request, a message of this type is returned to the requestor. It carries information that is private to the new buddy, as well as information that is required to process the connect response correctly. The data in the base class currently suffices. BuddyInfoChangeMessage. Sent to all buddies when a user changes their personal data. The new nickname is carried inside the message. The other information is already available to the user. GoalChangeMessage. Sent to all buddies when a user changes their goals (add new one, or change or delete existing one). It references the activity category of the goal being added/changed/deleted. ActivityCommentMessage. Users can comment on the activities of their buddies (see next section). User with buddies and activities A key objective of the Yona application is to keep track of the time users spend on various activities. The below diagram focuses on that. IntervalActivity. The base type for activities aggregated by day or week. WeekActivity. Activities aggregated by week. The values in the base type apply to the entire week. This class acts as composite parent for the day activities. DayActivity. Activities aggregated by day. The values in the base type apply to this particular day. This class acts as composite parent for the individual activities. Activity. An instance of this class denotes a particular activity (e.g. YouTube from 14:05 till 14:37). These classes capture the information that is returned through the activity reports. More on that is available on the page Design change to capture app activity. That page also provides background information on the evolution of the design. Various entities carry type stamps. A goal for instance has a creation time and an optional end time, an activity has a start and end time, etc. The convention is that all times are in UTC, except for activities. The design aims to support users that travel through different time zones. To enable that, the entities Activity carry a time zone. The start and end of day or week is thus time zone specific. Yona consists of 4 different services with different purposes: - App service – This is the sole point of contact for the app, providing all backing functions for it. - Analysis service – This service analyses the activities of the user and depending on the activity and the goals of the user creates entries in the activity log and/or sends messages to the user and their buddies. These activities are passed on to this service by either the Perl script on the Smoothwall server (in case of network activities) or the app service (in case of app activities) - Batch service – Runs scheduled tasks and longer running tasks. Longer running tasks can be triggered by the app service and the admin service. - Admin service – This is the point of contact for administrative access to Yona. This service exposes a rudimentary web UI. The relationships between the services can be depicted as follows: All Yona services use the same database schema and they share a cache, synchronized through Hazelcast. Communication between the services (e.g. from the app service to the analysis service or the batch service) is always through HTTP. To prevent concurrency issues, the requests of a single user cannot be spread over multiple instances of the analysis service. In case of a multinode cluster, we will need to have a load balancer in front of all services (to take care of load balancing and fail over) and in case of the analysis service, sticky sessions are needed. This is visualized in the below diagram: Note that the admin service talks to the batch service, so that should also be linked to the middle load balancer, but that's omitted from the diagram to prevent too much clutter.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107897022.61/warc/CC-MAIN-20201028073614-20201028103614-00363.warc.gz
CC-MAIN-2020-45
17,740
104
https://www.blog.blockscout.com/blockscout-presto-raas/
code
What if deploying a new zk-rollup was as simple as clicking a button? With a few clicks you'd not only have an instant zk-rollup, but also essential tools like a bridge for moving assets and a full-featured Blockscout block explorer for viewing transactions and interacting with smart contracts. This type of deployment process would be a game-changer for projects that want a blockchain but don't know where or how to start. Rollup-as-a-Service (RaaS) for anyone Presto is a new rollup-as-a-service (RaaS) from Gateway.fm. Their RaaS offering greatly simplifies the deployment process for blockchain projects. Rather than struggling through a long setup process, anyone can simply enter a few parameters, click a button, and in ~6 minutes access and use a brand new rollup along with a dedicated Blockscout explorer instance. Every chain or rollup needs a companion explorer, and Blockscout delivers ease, comprehensive views, and a consistent experience for Presto's zk-rollup users. Blockscout is deployed behind the scenes; once the chain is ready the explorer is also ready and users can inspect transactions, developers can deploy and verify contracts, and anyone can interact and use the new rollup. From the Presto dashboard, details about the instance are front and center. It's easy to use a built-in faucet (on the dev instance), access the RPC, and of course visit and interact with Blockscout. Blockscout starts from the genesis block, and any transactions, blocks, etc can be viewed as they are processed in real time. Example deployment from a mobile This quick video shows a rollup deployment on the go from a mobile device! More features coming soon Presto just announced their launch, and they will continue adding features over the coming months. These include an easy wallet integration, private-rollups, and analytics. In addition, Presto plans to integrate the new Blockscout UI, giving rollup users more explorer features along with a beautiful interface designed to function as a portal to all chain-related activities. In the first week alone, over 50 rollups were launched by independent users on the Sepolia devnet. We look forward to helping many more projects launch in production as this collaboration unfolds!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818081.81/warc/CC-MAIN-20240422051258-20240422081258-00650.warc.gz
CC-MAIN-2024-18
2,240
10
https://gmplib.org/list-archives/gmp-discuss/2003-September/000770.html
code
complex class for GMP? Felix E. Klee Mon, 8 Sep 2003 00:19:22 +0200 I'm doing a lot of complex number arithmetics with high precision floats (the highest precision I've used so far was around 27000 bits). Now, I wonder whether the complex class provided in the standard library is well suited for that task. There are two issues that make me doubt it 1. It doesn't use references in most of its interface and I'm worried that this lowers the performance. I'm also worried that the implementation of most libraries isn't optimized for types that use 2. Since it doesn't use references in its interface there seems to be no way to change the precision of a variable after it has been created. For example real(a).set_prec(512) can't work. So I have to set the precision always during initialization (which is often problematic to achieve without using ugly pointers). Can someone recommend an alternative complex number library that plays nicely with GMP? BTW, I'm using gcc 3.3 and icc 7.1 (uses the Dinkum standard library) under SuSE LINUX 8.2. To contact me off list don't reply but send mail to felix DOT klee AT inka DOT de Otherwise your email to me might get automatically deleted!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00382.warc.gz
CC-MAIN-2023-23
1,187
22
https://streemie.com/watch/8l4b4KvPMFkecnX
code
Extremely Annoyed Cat - Funny Video 0.343 STRM MINED what does this mean? 18 Sep 2020 The Cat is really irritated by the baby... If you liked it, like and subscribe! I like this video platform because it revolutionizes the industry. Great idea and I hope Streemie keeps growing and improving! Signin Now ! Earn Streem (STRM) on this video!
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00083.warc.gz
CC-MAIN-2022-33
339
8
https://www.rapitasystems.com/products/features/remove-coverage-reports
code
If you're analyzing coverage of code under constant development, you'll need to regularly update tests of the new code and run these to update your coverage metrics. RapiCover supports this by letting you remove coverage from selected functions, files and folders in your report. After manual review, you can remove coverage from the functions affected by changes to your source code, then run just the tests needed to test those functions again. After merging results from the original report (with coverage removed) and the new one, you can produce an updated report much more easily. Feature applies to:
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476464.74/warc/CC-MAIN-20240304165127-20240304195127-00524.warc.gz
CC-MAIN-2024-10
606
5
https://cacm.acm.org/author/michael-a-cusumano/
code
Tracing the trajectory of management and engineering decisions resulting in systemic catastrophe. Seeking the answer to the elusive question, 'Are we there yet'? Transaction platforms link third-party applications and services providers with users. How cloud computing became a platform. Shape the Future of Computing ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.Get Involved
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00208.warc.gz
CC-MAIN-2024-18
467
6
https://www.pokertracker.com/forums/viewtopic.php?f=61&p=360051
code
I'm trying to get in a report the number of spins of a specific multiplier for a session. I can get the multiplier as a selector adding the following stat in the report: - Code: Select all amt_prize_pool / amt_buyin_fee But what i whant to get is the number of x2, x3, x5, and so on for a specific date. Any idea on how to tackle that ?
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141652107.52/warc/CC-MAIN-20201201043603-20201201073603-00622.warc.gz
CC-MAIN-2020-50
336
6
https://www.osnews.com/story/16378/microsoft-novell-ink-linux-deal/
code
At a press conference in San Francisco, Microsoft CEO Steve Ballmer is expected to announce a new partnership between Microsoft and Novell. The unprecedented deal will have Microsoft offering a degree of sales support for Novell’s SUSE Linux while both companies work towards better interoperability between their respective operating systems. As part of the agreement, Microsoft also promises not to wield its patent portfolio against SUSE Linux. More here. You can follow the live webcast announcement, by Steve Ballmer, here. Update: Novell has put up a detailed FAQ about this deal.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103810.88/warc/CC-MAIN-20231211080606-20231211110606-00717.warc.gz
CC-MAIN-2023-50
588
1
https://www.easterseals.org/telethon/
code
Easter Seals Telethon Sunday, April 10, 2022 Easter Seals Ontario Telethons Across Ontario Throughout that month of April, Easter Seals Telethons are happening across Ontario. Find details on the Easter Seals Telethon in your area. Daily April 4 -17, 2022 at 7:00 p.m to 8:00 p.m. – CH10 and Blue Curve 105 Sunday, April 10, 2022 – EastLink TV – Channel 10/HD 610 (Sudbury) Sunday, April 10, 2022 |10 a.m. – 4 p.m. broadcasting on YourTV and Global Peterborough. Support the Telethon Make a donation to support the Easter Seals Telethon in your area today.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00126.warc.gz
CC-MAIN-2022-33
564
9
https://community.deeplearning.ai/t/reading-research-papers/3540
code
I am beginning to attempt to read and comprehend research papers, and eventually hope to implement new ones I read. Whenever I give it a shot though, I come across so many terms I haven’t heard of before which I google, which leads me into a spiral of information and the cycle repeats and I make progress very slowly. Does anyone have any pointers, or is there a tutorial out there that walks through a paper explaining each word? I find it easy to understand the general gist, but since I plan to write my own in the future(taking baby steps for now of course), I need to understand the terms used in literature. Any other advice for a person planning to pursue research in this field would also be highly appreciated. Thanks! Reading research papers takes lots of practice until you learn to filter out jargon from actual message. I find it useful to try to structure the papers in the following way: abstract, Intro, Methods, Results/discussion, conclusions. Actual papers might vary but they all follow that overall structure. Always try to go from a high-level understanding to the nitty details, not the other way around! - start from the abstract, a one paragraph summary of the key new stuff and results. Try to put into your own words what the paper is about (e.g. a novel insight/model is presented that performs X% better on some benchmark dataset, OR a novel application of an existing model, etc.) - skim through the intro. Here’s were the state of the art is presented and credit is given to people who have thought about the problem before - methods: This is probably the most technical section, feel free to skip in a fist read. Sometimes the data sample, how it was collected/annotated etc. is presented here. - results & discussion: here’s where the meat of the paper is, what are the novel results? why are they relevant? what are the limitations? what’s the scope for the future, etc? - conclusion: this is usually a recap of the paper “In this paper we’ve presented a … that leads to …”, like an extended version of the abstract. Future scope can be also presented here. You can hear Prof Ng give his advice on how to read research papers in this video from his CS230 Stanford course. That course could be considered as an extension to this specialization. All of the videos are worth watching @ngbusca @GordonRobinson Thank you both of you for some excellent suggestions and resources, I genuinely really appreciate it!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818835.29/warc/CC-MAIN-20240423223805-20240424013805-00668.warc.gz
CC-MAIN-2024-18
2,460
12
http://www.artificial.com/jon/
code
Hi, I’m Jon Klein, a Boston-area software engineer with a focus on iOS and web development. I’m currently working as the Director of Engineering at Drync. Previously, I worked as the Ad Products Engineering Lead at Tapjoy. I’m also the creator of CourseNotes, a set of note-taking apps for iOS and Mac with an educational focus. Before any of that, I worked with research in a number of areas related to artificial intelligence, evolutionary computation and simulation. Here’s a list of publications on research I’ve been involved in. I’m also a father of two, an avid adult-onset runner (PRs – marathon, 2:59; 5k, 17:51), and a lover of craft beer.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398460942.79/warc/CC-MAIN-20151124205420-00278-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
663
3
https://www.odesk.com/o/profiles/browse/c/web-mobile-software-dev/skill/soap/?page=27
code
Get Your SOAP Project Started Today! Post your SOAP development project on oDesk, the world’s largest online workplace, and find freelance SOAP experts and web developers to configure or integrate new web service methods with your website or web application via the SOAP protocol. With deep knowledge of XML, SOAP requests handling, web services and API integration, as well as experience in PHP and Java web services programming using WSDL and SOAP, these programmers can write PHP SOAP servers and clients, use Java to implement SOAP web services or install a SOAP client library for your Python project. Simple Object Access Protocol (SOAP) is a lightweight XML-based protocol for exchange of information in a distributed environment, which enhances web services implementation, interoperability across all platforms and languages, and compatibility with all transport protocols (like HTTP or SMTP). SOAP is often used along with WSDL (Web Services Description Language) to provide web services over networks. SOAP Job Cost Overview Typical total cost of oDesk SOAP projects based on completed and fixed-price jobs. oDesk SOAP Jobs Completed Quarterly On average, 30 SOAP projects are completed every quarter on oDesk. Time to Complete oDesk SOAP Jobs Time needed to complete a SOAP project on oDesk. Average SOAP Freelancer Feedback Score SOAP oDesk freelancers typically receive a client rating of 4.80. I'm very experienced working in Telecommute mode / Remote projects. High professional skills working on a team environment. I have worked in several projects holding the Application Architect (e-commerce, web applications, desktop applications) post and also as Java Developer, Product Developer and System Analyst. I have an autodidact profile, which allows me to be always learning new things and solving problems fast. Also I have focus on delivering quality in every project I work for. Also I have good database skills as well as on building desktop applications with Java's Swing framework. Over last 5 years I have been working as a developer. I have professional expirience of creating applications for mobile phones - using webworks and HTML5. I have created several applications using mobile-jquery. During the last six months I have been working on different online shops or CMS systems for small and large business. I have been using PHP,MYSQL,HTML,DHTML,Ajax,Smarty, jQuery,MooTools. I have started using HTML, DHTML simple websites. I have been working as Flash developer creating different desktop or web applications. In highschool I have been working on European projects and I have been adminstrator and creator of the websites. I have experience in testing systems - QA. At university I am studying Informatics and also I am one of the organizators of IT competitions(the past two years I have been in the jury). Several years of professional experience. I am seeking opportunities to build websites and confirm the quote "Practice makes perfect." I have been a webdeveloper for over 6 years and some of my recent work has been done in either Wordpress,Php ,MySQL,Jquery,Ajax and also have experience plugin development in wordpress and mvc framework CakePhp and Codeigniter Designing using Photoshop TwitterBootstrap,Html5 and Css3 Experience in Woocommerce and Buddypress plugin Payment integration Extensive experience in E commerce websites using Magento and joomla .Accepting challenges is the foundation of my life experiences and something I do with confidence. You will find me a totally committed individual with pride in being direct, spontaneous and communicative. I will work diligently to exceed your goals for your website. Motivated to meet best-practice standards, dedicated, enthusiastic. My goal is to work in a professional, prompt and effective way to achieve client satisfaction My name is khan Muhammad I have 7 year web development experience .I am a highly skilled software developer and entrepreneur with extensive experience in cutting edge web technologies. I've worked closely with business owners in the past as they try to satisfy their business's IT needs, and I know that many business owners don't know what they need to know or ask to get the right person for an IT job. If this sounds like you, here's what you should be looking for: 1) Business Point You don't just want a code monkey to write whatever you think of. You need someone who can help you refine raw ideas into mature results. 2) Not just a slicer There are two types of PHP developers. So called "slicers", which are good at coding themes, and real application developers. For a very simple static site you only need a slicer; but, if you want that site to do anything (eCommerce, Facebook or Twitter integration, mobile, chat, customer support, content management, forums,Application Site,) you need an application developer. 3)Know the state of the art If your web project depends on technology, you need someone you can trust to follow the technical landscape and make sure you keep up. 4) Security Ask your developer (or slicer) how to hack a site. If they don't have a detailed answer, they're leaving your site vulnerable to the attackers who do. You need a developer who knows how to make sure that your site is safe. 5) Speed is relative Not all developers work at the same speed. Some developers can do in a day what another developer would do in a week. I'm more expensive, but I'm fast. fast development technique. 6) Build it for the future Most developers can write code that will get the job done for you today, but sometimes that code is so messy that when you want to expand it in a couple of months it is literally better to trash the whole thing and start over. A good developer will write clean maintainable code, and they'll watch where the product is headed to ensure that you're set up for the changes you'll need later. 7) SEO Most developer don’t care for Seo of site . For any website Seo is most impotent factor to increase number of user. I have 8+ of professional experience, 2+ of Java and Oracle DB. 1. Languages: Java SE&EE, pl/sql (main), php, c#, c++ (additional) 2. Frameworks, technologies: ADF, JSF, JSP Spring, Hibernare, SWT XML, Web-services (SOAP, REST), EJB 3.Databases: Oracle Database, Microsoft SQL, mySQL 4.Web-servers: Weblogic, TomCat, JBoss, Apache http-server. 5. Other Git, Svn, Jira, Confluence.
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430448957444.39/warc/CC-MAIN-20150501025557-00017-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
6,377
16
https://forums.joeuser.com/406250/Aint-got-the-time
code
I've begun to believe that my current lifestyle is not cohesive with a regular schedule. This makes it nearly impossible to set a consistent work time thus making it this section of the experiment impractical. With that said, For me, schedule writing is a bad system to counter act writers block. Even if I pretended that I had a normal day, coming home from work, having dinner then sitting at a desk to write, I still don't think its a good system. The time that life interrupts this schedule I'd become angry and resentful of the who or why. The time that I might be distract I'd feel like I wasted my time. And just because you sit at a desk at the same time everyday doesn't mean you'll know what to type or have any ideas. At the very best it's a good psychological way to trick your brain into thinking. The thing for me is that I never have a problem thinking about new things, theorizing and coming up with project. I have ideas that I'll never see done because I have too many ideas. But fear not, this project goes on. I'm skipping to the next one on the list: Exercise. This system is based on the theory that increased blood flow to the brain will get you thinking. Hopefully you've caught the fault (see above). I was just saying that I have no shortage of thought. Despite that I think this one might have some credibility. It doesn't, however, have anything to do with blood flow. I think that a brief exercise will help shut off the brain allowing you subconscious to go to work. A large problem with writing and writer's block is over thinking. Worrying about and focusing too much on something that is not a big deal and can be fixed later. For this experiment I will do 50 jumping jacks ever 15 minutes. I should note now that I have to reduce the experiment time to 2 hours due to lack of time in the day. Since in the control I hadn't exceeded that 2 hour mark the numbers should be okay. Though, you might argue that psychologically 3 hours might have made a difference. So I'll repeat the control at the end. P.s. If you're wondering why theirs a delays between these project post it's because I have writer's block! P.P.S In case you didn't do the math that's 400 jumping jacks.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889736.54/warc/CC-MAIN-20180120221621-20180121001621-00298.warc.gz
CC-MAIN-2018-05
2,203
6
https://www.beyondtrust.com/docs/privileged-remote-access/how-to/sslcertificates/create-self-signed.htm
code
Create a Self-Signed Certificate for Your BeyondTrust Appliance B Series A self-signed certificate may be necessary on a temporary basis for testing or installing a BeyondTrust Appliance B Series. For long-term use, a certificate from a public certificate authority (CA) should be used instead. For more information, please see Create a Certificate Signed by a Certificate Authority for Your BeyondTrust Appliance B Series. Self-signed certificates are created in the BeyondTrust /appliance web interface. Once created, the BeyondTrust software should be updated. Create the Certificate Customers with a cloud site environment cannot create a self-signed certificate. Certificates consist of a friendly name, key, subject name, and one or more subject alternative names. You must enter this information in the BeyondTrust /appliance web interface to create a self-signed certificate. - Log into the /appliance web interface of your B Series Appliance and go to Security > Certificates. - Create a descriptive title for Certificate Friendly Name. Examples could include your primary DNS name or the current month and year. This name helps you identify your certificate request on your B Series Appliance Security > Certificates page. - Choose a key size from the Key dropdown. Verify with your certificate authority which key strengths they support. Larger key sizes normally require more processing overhead and may not be supported by older systems. However, smaller key sizes are likely to become obsolete or insecure sooner than larger ones. - The Subject Name consists of the contact information for the organization and department creating the certificate along with the name of the certificate. - Enter your organization's two-character Country code. If you are unsure of your country code, please visit www.iso.org/iso-3166-country-codes.html. - Enter your State/Province name if applicable. Enter the full state name. - Enter your City (Locality). - In Organization, provide the name of your company. - Organizational Unit is normally the group or department within the organization managing the certificate and/or the BeyondTrust deployment for the organization. - For Name (Common Name), enter a title for your certificate. In many cases, this should be a human-readable label. It is not recommended that you use your DNS name as the common name. This name must be unique to differentiate the certificate from others on the network. Be aware that this network could include the public internet. In Subject Alternative Names, list the fully qualified domain name for each DNS A-record which resolves to your B Series Appliance (e.g., access.example.com). After entering each subject alternative name (SAN), click the Add button. A SAN lets you protect multiple hostnames with a single SSL certificate. A DNS address could be a fully qualified domain name, such as access.example.com, or it could be a wildcard domain name, such as *.example.com. A wildcard domain name covers multiple subdomains, such as access.example.com, remote.example.com, and so forth. If you are going to use multiple hostnames for your site that are not covered by a wildcard certificate, be sure to define those as additional SANs. If you entered the fully qualified domain name as your subject's common name, you must re-enter this as the first SAN entry. If you wish to use IP addresses instead of DNS names, contact BeyondTrust Technical Support first. If you plan to use multiple B Series Appliances in an Atlas setup, it is recommended that you use a wildcard certificate that covers both your BeyondTrust site hostname and each traffic node hostname. If you do not use a wildcard certificate, adding traffic nodes that use different certificates will require a rebuild of the BeyondTrust software. - Click Create Self-Signed Certificate and wait for the page to refresh. The new certificate should now appear in the Security :: Certificates section. Update the BeyondTrust Appliance B Series To insure the reliability of your client software, BeyondTrust Technical Support builds a copy of your certificate into your software. Therefore, when you create a new certificate, you must send to BeyondTrust Technical Support a copy of your certificate and also a screenshot of your Status > Basics page to identify the B Series Appliance being updated. - Go to /appliance > Security > Certificates and export a copy of your new certificate. - Check the box next to the new certificate in the Security :: Certitle="Configure Primary Networking" alt="Configure Primary Networking"tificates table. - From the Select Action dropdown menu above the table, select Export. Then click Apply. - Uncheck Include Private Key, click Export, and save the file to a convenient location. Do NOT send your private key file (which ends in .p12) to BeyondTrust Technical Support. When exporting your certificate, you have the option to Include Private Key. If a certificate is being exported to be sent to BeyondTrust Technical Support, you should NOT check Include Private Key. This key is private because it allows the owner to authenticate your B Series Appliance's identity. Ensure that the private key and its passphrase are kept in a secure, well-documented location on your private network. If this key is ever exposed to the public (via email, for instance), the security of your B Series Appliance is compromised. Never export your private key when requesting software updates from BeyondTrust. A certificate without the private key usually exports as a file with the .cer, .crt, .pem, or .p7b extension. These files are safe to send by email and to share publicly. Exporting certificates does not remove them from the B Series Appliance. - Go to /appliance > Status > Basics and take a screenshot of the page. - Add the saved screenshot and the exported certificate to a .zip archive. - Compose an email to BeyondTrust Technical Support requesting a software update. Attach the .zip archive containing the certificate and screenshot. If you have an open incident with Support, include your incident number in the email. Send the email. - Once BeyondTrust Technical Support has built your new software package, they will email you instructions for how to install it. Update your software following the emailed instructions. After these steps are complete, it is advisable to wait 24-48 hours before proceeding further. This allows time for your BeyondTrust client software (especially Jump Clients) to update themselves with the new certificate which BeyondTrust Technical Support included in your recent software update. SSL Certificate Auto-Selection Through the utilization of Server Name Indication (SNI), an extension to the TLS networking protocol, any SSL certificate stored on the B Series Appliance is a candidate to be served to any client. Because most TLS clients send Server Name Indication (SNI) information at the start of the handshaking process, this enables the B Series Appliance to determine which SSL certificate to send back to a client that requests a connection. You may choose a default certificate to serve to clients who do not send SNI information with their request, or to clients who do send SNI information, but which does not match anything in the B Series Appliance database. - Go to /appliance > Security > Certificates. - In the Default column, select the radio button for the certificate you wish to make default. At this point, the B Series Appliance should be fully operational and ready for production. To learn more about how to manage and use BeyondTrust, please refer to www.beyondtrust.com/docs.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710690.85/warc/CC-MAIN-20221129064123-20221129094123-00585.warc.gz
CC-MAIN-2022-49
7,615
40
https://subdict.org/Dictionary/meat?movieId=3795
code
Basic conservation is still the 'meat and potatoes' of their environmental plan. The real 'meat of' the book is found in its discussion of his economic plan. The scouting camp is a 'meat market' for pro football candidates. (..) - You ready? - Yeah. Alright. Let's play some hockey. - Alright, Anger. Take over. - Give us that puck or you're dead meat! On her left. On her left! Let's just try not to get all smelly this time. Oh. Mom and Dad (..)2015 Inside Out
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644506.21/warc/CC-MAIN-20230528182446-20230528212446-00544.warc.gz
CC-MAIN-2023-23
462
4
https://www.solutioninn.com/study-help/sustainable-engineering/process-1-produces-p-q-and-r-the-masses-of-1120744
code
Process 1 produces P, Q, and R. The masses of P, Q, and R are 100 kg, 20 kg, and Process 1 produces P, Q, and R. The masses of P, Q, and R are 100 kg, 20 kg, and 5 kg, respectively, and their monetary values are $1000, $100, and $20. This process emits 500 kg of CO2. Process 2 produces P and S with masses of 100 kg and 5 kg and monetary values of $1000 and $0. This process emits 1000 kg CO2. Process 3 produces 1 kg of S with CO2 emission of 0.8 kg. Choose the process for producing P that has the lowest CO2 emission by using 1. Mass-based allocation 2. Monetary allocation 3. Displacement and mass-based allocation 4. Displacement and monetary allocation This problem has been solved! Step by Step Answer:
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00227.warc.gz
CC-MAIN-2023-50
710
8
https://www.dynamicsuser.net/t/create-new-user-using-sign-up-form-under-customer-self-service-option/33885
code
I have implemented the EP for AX 2009. Now i wanted to use the Customer Self-Service(CSS) functionality. I have setted up all the Email parameters and also getting the activation link email successfully. After this step my sign up request is going into the ‘Verified by user’ list, then i am clicking on ‘Approve’ button so the signup request entry goes into the ‘Approved’ list. But now i am not able to proceed further. The ‘Create’ button shown Disabled. How can i create a new user so that the user will receive the final login details after approving his signup request. Any help will greatly appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100593.71/warc/CC-MAIN-20231206095331-20231206125331-00347.warc.gz
CC-MAIN-2023-50
626
4
https://indiagoes.online/best-robot-software/
code
1st Place! Best Binary Broker 2020! Best Choice for Beginners — Free Education + Free Demo Acc! Sign-up and Get Big Bonus: 2nd place! Good choice! One more step Please complete the security check to access www.g2.com Why do I have to complete a CAPTCHA? Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 57e16cce58935e26 • Your IP : 188.8.131.52 • Performance & security by Cloudflare 20 Best RPA (Robotics Process Automation) Tools in 2020 Robotic process tools are indispensable for automation of the repetitive back-office processes. There are numerous RPA tools available in the market and choosing one could be a challenge. Following is a curated list of top 20 handpicked RPA software with popular features and latest download links 1) Another Monday Another Monday offers a complete automation Ensemble that covers the automation journey from end to end.The automatic process analysis via their new tool AM Muse can easily be exported to the AM Composer with its intuitive Drag&Drop implementation interface. Unique Split & Pull architecture for maximum efficiency and scalability. Straightforward and centralized administration through AM Console. - Automatic documentation of process logic with AM Muse - Drag & Drop workflow configuration: no developer knowledge needed - Quick scaling: Unique ability to pull tasks from database, task transparency due to data collection. Operation at full capacity – little to no idle times Download link: anothermonday.com Linx is a no-code RPA platform that enables the rapid development and deployment of automated processes and tasks. Linx offers a no-code IDE designer that significantly speeds up development and a hosted server – for fast, no fuss, 1-click deployment. 1st Place! Best Binary Broker 2020! Best Choice for Beginners — Free Education + Free Demo Acc! Sign-up and Get Big Bonus: 2nd place! Good choice! - Easy-to-use, drag-and-drop IDE designer - Hosted cloud service for hassle free deployment - 100+ Prebuilt components for services, programming functions, actions & automations - Easily Integrate with SaaS tools, legacy systems and any ODBC, OLE DB and NoSQL databases - Create, host or consume REST or SOAP APIs - Trigger automations with timers, incoming API calls and message queues - Typically 5x faster to automate a task than traditional software development Download link: linx.software WinAutomation provided by Softomotive is the world’s best, and longest standing, desktop automation tool, bringing the benefits of Robotic Process Automation to your desktop. - Easy to use automation development environment offers an intuitive user-interface with drag & drop functionality and Macro or Web Recorders for building new automations quickly. - Over 300+ pre-build actions for automating any task on any desktop or web-based application. - Web Automation supporting web testing, and data extraction across 3 major browsers (IE, Firefox, Chrome). - Desktop RPA, installed directly on employee workstations avoids server installation or any other significant, hidden costs. Download link: winautomation.com Automate, by HelpSystems, is a comprehensive RPA platform designed to automate repetitive and manual processes across your organization. Automate provides 5x the value of other solutions through its ease of use, stable and robust functionality, and ability to scale your automation strategy. - Over 600 prebuilt automation building blocks - Graphical workflow design brings IT and business teams together - Ability to integrate with an extensive list of applications - Intelligent automation capabilities with advanced conditions and trigger scenarios - Industry leading security, auditing, and integration capabilities - Centralized visibility, management, and reporting and analytics within distributed networks Download link: helpsystems.com Use Automai RPA to streamline your business processes, reduce time and eliminate errors. Part of our Robotic Automation Platform which allows you to use the same automation scenarios for the lifecycle of all the applications used for your business processes. Experience the benefits of a single platform for automated robotic testing, robotic monitoring, and robotic virtual workforce. - Completely Code-less – extremely intuitive scenario builder using recorder and user actions. - Guaranteed to work with all the environments in your business: from Citrix, to fat client, to web applications. - One platform to serve the automation needs of your Business, development, and operations teams - Save on training and implementation costs. Download link: automai.com 6) Automation Anywhere Automation Anywhere RPA tool combines conventional RPA with intellectual elements like language understanding and reading any unstructured data. - Intelligent automation for business and IT operations - Uses SMART Automation Technology - Rapidly Automates complex and complicated tasks - Distribute tasks to multiple computers - offers scriptless automation UiPath is a highly extensible Robotic Process Automation(RPA) tool for automating any desktop or web apps. It allows global enterprises to design, deploy a robotic workforce for their organization. - Uipath can be hosted in virtual terminals or cloud environments - Provide support for a high range of applications to work with, which includes web and desktop applications - Auto-login features to run the bots. - Scraping solution which works with.Net, Java, Flash, PDF, Legacy, SAP, with absolute accuracy Blue Prism RPA tools help business operation to be agile and cost effective by automating, manual, rule-based back repetitive office processes. The tool provides a flow chart like a designer with drag and drops feature to automate various business processes. - Easily implemented in the short time span of 4 to 6 weeks - Robust and feature-rich analytics suite - The tool doesn’t require programming skills to implement - Build highly efficient and automated end-to-end business processes - Improved Control Room to offer real-time feedback Pegasystems automation tool supports all usage scenarios. Pega unifies architecture based on a business rule management system and predictive analytics decision management mechanism. - Open APIs that quickly connect to your existing services - Actionable intelligence helps you to automatically finds processes to optimize - The adaptive intelligence that learns on the fly - Captures insights at the desktop. It gets complete details of how work gets done. OpenConnect automatically discovers, automate, and improve service processes and optimize workforce productivity. The tool helps you to address all types of operational and competitive challenges. - Entirely server-based architecture - Dashboard views with real-time status - Centralized governance - Highly secure, encrypted data. - Advanced connectivity capabilities 11) KOFAX from Lexmark Kofax RPA is one of the most efficient way to acquire, enhance and deliver information from any application or data source. This includes a website, portals, desktop applications and enterprise systems without any coding. - Helps you to remove errors by Automating Data Gathering and Input - Increase Operational Efficiency with Intelligent Software Robots - Monitor and Optimize Processes with Robotic Process Intelligence - Deploy, manage and execute robots from a centralized server - Built-In Analytics and Process Intelligence Gian is a software platform for humans to deploy advanced skill robots in their workplace. - Boost Efficiency of your organization - Precisely measure all the activities performed by the Robot which allows you to analyze each automated process. - Giant helps you to standardize your business process. - Employees can put their focus on more creative processes and spend more time in the creative processes. Download link: http://g1ant.com/ WorkFusion is a (SaaS) crowd computing platform. This RPA software automates the process of monitoring of data feed and helps you to manages crowd-sourced workers from global talent markets. - Automate tasks by just press of a button - Deploy bots as you need, to operate simultaneously for enterprise-scale automation - Collaborate with multiple users across different workstations - Automate across your team Contextor is robotic process automation solution offers complete customer view, online help, and shares data between two or more applications. - Automate tasks in real-time - Ensure the proper sequencing of tasks - Gather and maintain a contextual data collection - Provide a contextual assistant/help - The tool can n monitor the processes executed on the workstation. Jacada RPA is a robust RPA tool that helps in Desktop Automation. It allows companies by automating time-consuming and error-prone, repetitive tasks. - Automated processes conducted with the highest possible accuracy and unbeaten level of consistency - Reduced Average Handling Time of your organization - Helps you to increased first call resolution Kryon Robotics process automation tool. It works on the cutting edge of RPA technology, driving innovation in the discovery of suitable automated processes. - Helps you to Identify all of your processes that should be automated for time and cost savings - Empower companies to accomplish their tasks with greater speed, accuracy, and efficiency - Helps you to automate all your repetitive and time-consuming business processes - Enhances productivity at every stage of your business processes 17) NICE Systems NICE is a cloud and on-premises enterprise software solutions. This RPA tool helps any organizations to take firm and accurate decisions based on advanced analytics of structured and unstructured data. - Increased Customer Satisfaction - Improved productivity - Better resource utilization - Allows your employees are free to focus on high-value activities Automata RPA solution can capture and process repetitive actions such as filling out online forms, communicating with other systems, and adapting to change or new situations. - Automata can quickly assist with large volumes of business or customer transactions - Robotic Transaction Processing - Automated Desktop Transaction Recording and Monitoring 19) Redwood Software Redwood RPA tool offers unattended robotic processes that are easy to create, simple to scale and fast to deploy. It provides many plug-and-play robots which provide instant connections to most standard applications. - Automate simple and complex tasks - Offer a unique network of services which can be used to robotize any process quickly. - Three-tier landscape with automated promotion and audit trail - All robotic and human interactions are stored automatically, which offers complete insight of all process activity. - Allows you to Run, clone and edit bots AutomationEdge RPA tool offers many essential technologies for automation of front office, middle office, back office and IT operations. - Allows you to automate Excel spreadsheet procedures and activities - Chabot is capable of interacting with customers and fulfills requests using Artificial Intelligence. - Front, middle and back office automation Foxtrot By Enable Soft is the faster way to create and run automated tasks for your organization. It offers many easy to use tools which automate tasks in hours and days rather than weeks and months. - Designed for business users instead of technical experts - Extensive library of actions helps you to create your automation. - An easy method to create and run automated tasks for your organization Verint is a Robotic Process Automation which automates all kinds of repetitive, time-consuming tasks. This solution offers software robots that can completely replace the need for manual processing. - Helps you to reduce compliance risk by eliminating human error - Increase processing capacity and speed - Allows your employees to conduct quality works - Helping reduce the errors which occur when employees manually complete difficult processes 23) Visual Cron VisualCron is an automation, integration and task scheduling tool for Windows. - Decreased cycle times and improved throughput - Reduce errors while significantly increasing efficiency - Offers great flexibility and scalability to your organization - Round-the-clock availability Latest Blog Post What is the Best Programming Language for Robotics? Need to program your robot but don’t know which language to choose? Don’t know what languages are available? There’s no simple answer, but here are the top 10 most popular programming languages for robotics. Which is the best programming language? It’s a question that a lot of new roboticists will ask at least once in their career, but there’s no simple answer. But, it’s a very reasonable question. After all, what’s the point of investing a lot of time and effort in learning a new programming language if it turns out you’re never going to use it? If you’re new to robotics, you want to learn the programming languages which are actually going to be useful for your career. Why you’ll never get a simple answer from roboticists When I published the first version of this article in 2020, I knew it was going to be a controversial one. Since then, the huge number of comments below and many copycat articles published elsewhere on the web suggest that I was right… … many people disagree as to what is “the best programming language for robotics.” Unfortunately, you will never get a simple answer if you ask “What’s the best programming language for robotics?” to a whole roomful of robotics professionals (or on forums like Stack Overflow, Quora, Trossen, Reddit or Research Gate). Electronic engineers will give a different answer from industrial robotic technicians. Computer vision programmers will give a different answer from cognitive roboticists. In the end, the answer which most intelligent people agree on is “it depends.” This is the most realistic answer. It depends on what type of application you want to develop. It depends on what system you are using. It depends on your personal preferences. But, it is also a pretty useless answer for the new roboticist who is trying to decide which language to learn first. You’re probably reading this article because you want to start programming robots and don’t know which language to choose. Which programming language should I learn first? My advice is not to ask which programming language is the “best”. A better question to ask is: Which programming language should I start learning now? You will still get differing opinions, but a lot of roboticists can agree on the key languages. But first, be clear on your justification for wanting to learn robot programming: 1. If you just want to get one robot up and running If you’re only using a single robot for your business, the best language to learn is the one that will get you up and running as soon as possible. In this case, you might not even need to learn a programming language. For example, with hand guiding technology you can move a collaborative robot around manually. No text-based programming required. 2. If you want to start a career in robotics The most important thing for career roboticists is to develop “The Programming Mindset” rather than to be proficient in one specific language, as I explained in the article about essential robotic skills. In many ways, it doesn’t really matter which programming language you learn first. Each language that you learn develops your proficiency with the programming mindset and makes it easier to learn any new language whenever it’s required. In this case, learn whichever language makes the most sense for your next project. How I drew conclusions for this article The original version of this article — one of our most popular articles ever — was based on both my experiences in robotics and those of my colleagues combined with many opinions that I had found in online forums. For this updated version of the article, I’ve brought in some more objective data about the most popular programming languages among engineers and the most common programming languages at the time of writing. I’ve also researched the newer languages that have been popping up since the first version of this article. This new data has changed some of the items on the list, but not much. The same programming languages remain as popular as they were when I wrote the first version. Top 10 Popular Programming Languages in Robotics There are over 1500 programming languages in the world, which is far too many to learn. Here are the ten most popular programming languages in robotics at the moment. If your favorite language isn’t on the list, please tell everyone about it in the comments! Each language has different advantages for robotics. The way I have ordered them is roughly in order of importance from least to most valuable. Pascal was one of the first programming languages that I ever learned. However, that’s not why I’ve included it here. It is the basis for several of the industrial robot languages (see number 8 below). As a result, it’s still quite a good starting point if you are going to be programming industrial robots. Pascal is a basic language (literally based on the language BASIC) and was designed to encourage good programming practices. These days, Pascal is too outdated to be good for everyday use. However, it can be useful if you want to become familiar with other industrial robot languages without becoming tied to one particular robot brand. A brand new entry to this list, Scratch is used by thousands of budding roboticists around the world every year. This visual programming language is specially designed for new programmers — targeted at users aged 8 to 16 — and is often the language of choice in school technology classes and robotics clubs. Although you’re probably not going to write any industrial robot programs in Scratch, it’s an incredibly good and popular language for complete beginners and is paving the way for many of our future robotics engineers. 8. Industrial Robot Languages Almost every robot manufacturer has developed their own proprietary robot programming language, which has long been one of the problems in industrial robotics. You can become familiar with several of them by learning Pascal. However, you are still going to have to learn a new language every time you start using a new robot brand. ABB has its RAPID programming language. Kuka has KRL (Kuka Robot Language). Comau uses PDL2, Yaskawa uses INFORM and Kawasaki uses AS. Then, Fanuc robots use Karel, Stäubli robots use VAL3 and Universal Robots use URScript. In recent years, more general-purpose programming options like ROS Industrial, manufacturer agnostic offline programming, and hand guiding have started to provide more standardized options for programmers. However, if you are a technician, you are still more likely to have to use the manufacturer’s language. 7. LISP and Prolog Artificial Intelligence (AI) has really been gaining in popularity recently. This means that AI programming languages like LISP and Prolog are starting to make their way back into people’s programming toolkits. LISP is the world’s second oldest programming language (FORTRAN is older, but only by one year). Parts of ROS (the Robot Operating System) are written in LISP, although you don’t need to know it to use ROS. Prolog is a logic programming language and allows programmers to represent “knowledge” in a form that an AI algorithm can understand. Prolog was used as part of the programming in IBM’s Watson AI. It is also possible to program artificial intelligence using some of the other languages on this list and more that are not listed. However, LISP and Prolog remain at the core of some AI implementations and certainly deserve their place on this list. It’s also worth remembering that robotics and AI are not the same thing. 6. Hardware Description Languages (HDLs) Hardware Description Languages are basically a programming way of describing electronics. These languages will be very familiar to electronic engineers who create the low-level electronics of robots. HDLs are commonly used to program Field Programmable Gate Arrays (FPGAs). These devices allow you to develop electronic hardware without having to actually produce a silicon chip, which makes them a quicker and easier option for some development tasks. If you don’t create prototypes of robotic electronics in your job, you may never use HDLs. Even so, it is important to know that they exist as they are quite different from other programming languages. For one thing, all operations are carried out in parallel, rather than sequentially as with processor-based languages. MATLAB (and its open-source relatives like Octave) is very popular with some robotic engineers for analyzing data and developing control systems. It is used extensively in research and data processing. It’s also used extensively in some university courses. For robotics, there is also a very popular Robotics Toolbox for MATLAB. I know people who have developed entire robotics systems using MATLAB alone. If you want to analyze data, produce advanced graphs or implement control systems, you will probably want to learn MATLAB. C# is a proprietary programming language provided by Microsoft. I include C#/.NET here for two reasons: - It is the primary language of the Microsoft Robotics Developer Studio. If you are going to use this system, you’re probably going to have to use C#. - It is used as the basis for some Virtual Reality engines, like Unity, which are growing in popularity right now. C# is not the easiest option to learn first as it is a complex language. I would usually recommend learning C/C++ first. However, it is certainly necessary in some areas of robotics. If you come to robotics from a computer science background (and many people do) you will probably already have learned Java first. As an electronics engineer, I have never understood Java. I’ve always preferred languages that allowed for lower-level programming and more control, like C. This is a good example of how people from different disciplines within robotics have different programming preferences — just because I don’t like it doesn’t mean you shouldn’t. Like C# and MATLAB, Java is an interpretive language, which means that it is not compiled into machine code. Rather, the Java Virtual Machine interprets the instructions at runtime, allowing you to use the same code on many different machines. Java is quite popular in some parts of robotics. It’s apparently one of the core languages of several modern AIs, including IBM’s Watson and AlphaGo. Python is on a roll at the moment. According to statistics it is has grown rapidly to become one of the top languages. One of the reasons for its popularity in robotics is probably that Python (and C++) are the two main programming languages found in ROS. The prime focus of the language is ease-of-use. Many people agree that it achieves this very well. Python dispenses with a lot of the usual things which take up time in programming, such as defining and casting variable types. Like Java, it is an interpreted language. There are also a huge number of free libraries for Python which means you don’t have to “reinvent the wheel” when you need to implement some basic functionality. And since it allows simple bindings with C/C++ code, the performance-heavy parts of the code can be implemented in these languages to avoid performance loss. With more and more robotics-friendly electronics now supporting Python “out-of-the-box” (e.g. Raspberry Pi), we are likely to continue to see a lot more Python in robotics. Finally, we reach the Number 1 programming language in robotics! Many people agree that C and C++ are required languages in robotics. Why? Because a lot of hardware libraries used in robotics use one of these languages. These libraries allow interaction with low-level hardware, allow for real-time performance and are very mature programming languages. These days, you’ll probably use C++ more than C, although C remains one of the most efficient programming languages available. C/C++ are not as simple to use as, say, Python or MATLAB. It can take quite a lot longer to implement the same functionality using C and it will require many more lines of code. However, as robotics is very dependent on real-time performance, C and C++ are probably the closest thing that we roboticists have to “a standard language”. This is true even despite the growing popularity of Python. If you take away just one thing from this article… Many people have used this article to say that they should learn C/C++ or Python first. This conclusion may be true… … however, let me give you just one piece of advice: Learn whichever programming language makes the most sense for you right now. The most important thing is to develop your “Programming Mindset”. Learn as many programming languages as you can. The more you learn, the better you will be at programming. Just because I’ve listed these ten languages doesn’t mean that you have to learn all of them, or indeed any of them. The most important thing is to find a language that feels natural for you and fits with your robotic hardware. And if you really want a recommendation… If you must push me for a recommendation, I would suggest that you want a language that allows you to develop programs quickly and easily, so that you can focus more on developing functionality. For this reason, I would recommend learning Python first. This is just my own personal opinion. If another language makes more sense for you, then learn that instead. However, Python is an amazingly straightforward language to learn and hugely powerful thanks to the many, easily-accessible libraries. I have heard many accounts from (already experienced) programmers who learned Python in a couple of days and were immediately converted to it for almost all of their programming needs. As one guy said, “I can produce usable code in Python as fast as I can type.” After you’ve gotten reasonably proficient using Python, I would personally recommend learning C, followed by C++. You will need it to interface with a huge majority of robotic hardware drivers. And if you’re under 16 years old and/or have never programmed before… learn Scratch first. It’s great! Have we left out your favorite programming language? Which programming language did you learn first? Which do you use most often when programming robots? Tell us in the comments below or join the discussion on LinkedIn, Twitter or Facebook. 7 Binary Options One of the latest popular trends when it comes to binary option trading is the use of auto trading robots. These are software programs that automatically place trades for the investor based on parameters they program into the software. They are programmed to automatically trade such assets as currency pairs and indices. They can be used on several different binary option brokers like Banc de Binary. Why is binary option trading getting so popular? It is becoming used more often to do market trades because of its versatility and the ability of the trader to minimize risk. It is also traded on shorter time frames than most market trades, so the investor sees the results of their trading much faster. There either win or lose, easy to understand scenario of the trade is also very appealing to investors. Auto trading robots only expand upon the convenience of trading binary options. They have made it easier for people to still include trading in their busy lives and made their trades more profitable even though they are spending less time researching and analyzing. Even the most veteran traders can use a little help from time to time and auto trading software such as the Binary Option Robot can easily provide that help. How does the Binary Option Robot work? Most traders know what assets they like to trade and the characteristics they like to trade them on. They simply input this information in the Binary Option robot software and when the robot identifies a scenario where the input information matches, it will then automatically make the trade. The software contains three popular trading systems it can use to automatically place trades. The Classic System with its preset trading amount or the systems that trade variable amounts, which are the Fibonacci Retracement and the Martingale System (Fibonacci increases trading amounts after losses and decreases trading amounts after winnings; Martingale does exactly the opposite). The Binary option Robot works on both Mac and Windows driven PC’s and will also work on most mobile devices and tablets. Have you tried automated trading yet? Other recommended auto trading robots: There’s a lot of talk about the rise of robots in the workplace lately. No, you haven’t stepped into a sci fi flick and your new co-worker isn’t going to look like C-3PO. The robots that are making waves in the business world are software robots built using a robotic process automation solution. What is a Software Robot? The truth is that this kind of “robot” is just a new name for a familiar concept. Software robots, or bots, usually refer to what most people know as agents—individual devices running the automation solution. A robot can be installed on a PC, a physical server, or a virtual machine. Bots are great employees. They don’t make mistakes, they don’t need to go home at night, and they don’t take vacation days. Handling the “robotic” tasks your skilled human employees hate doesn’t bother them. When you need more help, new robots can be added (or existing robots configured in a digital workforce to streamline new tasks) within minutes. If you need to scale back in the off-season, you can retire a few robots without needing to lay off any human workers. Now that software robots are becoming more popular, you might hear some fearmongering about robots coming for your job. In reality, robotic process automation provides better opportunities for human employees by taking over tedious, manual, tasks and freeing up time for more strategic work that adds value to the business. What Processes Can Software Robots Automate? A key benefit of robotic process automation is its flexibility. If you have a repeated process—even if it spans multiple systems or requires if/then logic—your digital workforce of software bots can easily take care of it. In some cases, it’s best to automate a process end-to-end. In other situations, your bots can work alongside the human workforce. While RPA can be used in almost any part of the business, there are a few areas where software robots are known for making a big difference in operations. Here are the top seven software robots to consider for your business: 1. Website Interaction Bot The internet is supposed to make our lives easier, but sometimes it can create a lot of work. If you have human employees (or risky custom scripts) handling repeated web tasks like logging into a website to upload files or collecting daily data from multiple sites, get some help from a robot. Before RPA Every day an employee logs into a trading partner’s website, navigates through several pages, enters credentials, and downloads files. After RPA Every day a robot logs into the website, navigates through several pages, enters credentials, downloads files, and notifies the human employee that they are ready. 2. Data Management Bot Data is critical to running any modern business, but most organizations still struggle with the manual work involved in managing the data they collect. A data management robot can extract, manipulate, and utilize data from a variety of sources. Get assistance from a digital employee for tasks like entering data into multiple reports or scraping PDF information. Before RPA Every day an employee logs into a website, copies financial data from the site and pastes it into an Excel report. Then the employee uploads the report to SharePoint. After RPA Every day a robot logs into a website, copies financial data from the site and pastes it into an Excel report. Then the robot uploads the report to SharePoint. 3. IT Services Bot IT services needs human employees for their problem solving abilities and communication skills. Software robots prevent them from getting bogged down in high-volume tasks that are simple, but repetitive. Before RPA A request comes in for a password reset. Between more urgent tasks, an employee finds time to complete the request. After RPA A request comes in for a password reset. A robot intercepts the request, recognizing it as an easy, rules-based task, and resets the password. 4. Human Resources Bot Human resources employees should be all about people—recruiting them, training them, and them be successful at your company. Unfortunately, skilled HR staff often spend their days bogged down in paper processes instead. Software robots can give HR an assist throughout the entire employee lifecycle, freeing the HR team up to do what they do best—work with people. Before RPA A new employee joins the company. He fills out a variety of forms, often asking for redundant information. An HR employee uses this information to create an IT support ticket. IT provisions the new user in Active Directory and VMWare and completes the ticket. HR emails the employee’s new manager that the employee has been successfully onboarded. After RPA A new employee joins the company. He fills out a form which is automatically synced with other forms asking for the same information. A software robot reads the information on the form and uses it to provision the employee in Active Directory and VMWare and email the employee’s manager. 5. Claims Processing Bot Claims processing involves a high volume of paperwork and complicated workflows. Let your software robots streamline each step in your existing process—processing incoming forms, validating eligibility, notification, payment, and more. Before RPA An employee logs into a claims processing system and checks for new claims. The employee downloads the claims, verifies them, and loads them into an EDI system. Then the employee coordinates the benefits. If there is any exception or problem, it is set aside for another employee to handle later. The first employee calculates payments and finalizes the claim. After RPA A robot logs into a claims processing system, downloads and verifies any new claims, and loads them into an EDI system. Then the robot coordinates the benefits. If there is any exception or problem, the claim is sent to the human employee to look at. The robot takes care of the rest. 6. Accounts Payable Bot Almost all businesses deal with sending and receiving invoices. Software robots can be configured to automatically process invoices upon arrival, whether they arrive electronically or on paper. The robots won’t ever lose track of a form or make a calculation error. Before RPA An invoice arrives from a vendor by email. An employee downloads the attachment, matches the invoice against a purchase order in the ERP system, and puts the invoice into the proper queue for processing. After RPA An invoice arrives from a vendor by email. A robot uses OCR to read the invoice, match it to the purchase order, and route it to the proper queue for processing. 7. Call Center Bot The best call center customer service will always be provided by human employees. But call center staff often struggle to quickly access customer and order information in multiple systems and update records on the fly. A digital workforce of RPA bots accessing and updating information helps your human workforce provide the best possible service. Before RPA A customer calls to ask about a problem with her order. The human customer service representative talks to the customer while simultaneously clicking through multiple systems to find the customer’s information, the status of the order, and her order history. The customer is forced to wait for the representative to find each piece of data. After the call, the representative takes the time to add new information acquired on the call to the database. After RPA A customer calls to ask about a problem with her order. The robot presents the representative with all the data he needs to provide quick and friendly service. The representative then moves on to another call while the robot updates the database. 1st Place! Best Binary Broker 2020! Best Choice for Beginners — Free Education + Free Demo Acc! Sign-up and Get Big Bonus: 2nd place! Good choice!
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703511903.11/warc/CC-MAIN-20210117081748-20210117111748-00231.warc.gz
CC-MAIN-2021-04
37,295
289
https://fixsmokvape.com/convincing-my-mother-to-stop-cigarettes-with-the/
code
This channel is supposed for grown ups Hyperlink to furthermore pods! Use code MattySmokes for the juicy discount Yo what’s likely on everybody I know this is a re-upload but I believe this was a very good concept to have on my YouTube channel and I wished to hold it up! For solution critiques [email protected]
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816024.45/warc/CC-MAIN-20240412132154-20240412162154-00351.warc.gz
CC-MAIN-2024-18
314
4
https://electronics.stackexchange.com/questions/23424/good-explanations-of-audio-piezo-element-behavior
code
Is there any description anywhere of how voltage, current, mass, momentum, and air interact in a typical audio piezo, and what sort of signal should be expected on the third pin of a three-terminal device (phase relationship with regard to drive, etc.) I'd like to drive a piezo as loudly and as efficiently as possible from a small battery; presumably that would imply trying to maximally exploit its resonant behavior. The normal circuit given for driving 3-wire piezos looks inefficient to my eye (similar to a class A amplifier), though perhaps there's something about the way piezos behave electrically which would cause the resistors to spend most of their time sitting with very low voltage across them. I've google searched for audio piezo electrical behavior, and didn't find anything useful; I did find some explanation of how crystals work, but I would think the diaphragm coupling piezo-element vibrations to the air would substantially affect the behavior. I understand pretty well how motors work: an ideal motor can be modeled as a black box such that the voltage across the motor leads at any given time will be some constant number of volts per (revolution per second), and the current through the motor will be some constant number of amps per ounce inch of applied torque, and most practical motors can be modeled as an ideal motor in series with a resistor and inductor. What I'd like would be a similar understanding for piezos. The voltage across a piezo doesn't seem to represent its absolute position, nor its velocity, nor acceleration. What would the voltage on an "ideal" piezo represent, and what must be added to the model of an ideal piezo to make it reasonably match real-world behavior?
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304760.30/warc/CC-MAIN-20220125035839-20220125065839-00581.warc.gz
CC-MAIN-2022-05
1,718
4
https://www.ferroequinologist.de/en/blog/2008/1/Apple+Keynote+Notes+For+N00bs
code
Apple Keynote Notes For N00bs There are some people who are comparatively new to the Mac community I know, who may not be aware of all the customs that accompany a [Stevenote](http://en.wikipedia.org/wiki/Stevenote). Who would be better than me to introduce them to the customs? Everyone else, that’s who, but since they’re not around, I’ll do it. Even if you think you already know it all, read this to either find out new things or prove me wrong. The Stevenote, as it’s called, is the time when Our Dear Leader™ Steve Jobs gives us a presentation and tells us the new things Apple is introducing. The two main fixed ones are the keynote for the Macworld Conference and Exhibition in San Francisco near the beginning of the year, and the keynote for the Apple Worldwide Developers Conference in San Francisco in the middle of the year. Further announcements take place all throughout the rest of the year, with approximately one or two weeks warning each. The next one will be January 15th at 18:00 CET, i.e very very soon, which is why I’m posting this. As most of them happen at 10 o’clock US West Coast time, they are in the perfect spot to watch after work here in Europe. The average time you should plan for it is about two hours, although back in the day, shorter ones were more common. If you really want to feel the joy of the keynote, I guess you have to be there. This is not a realistic option for most Mac fans, of course, so there is a need for alternatives. Back in the day, before the iPod brought all the Windows-loving kiddies in, there was a webcast where you could view the keynote live. Hackers could also tune in their satellite dishes to a certain frequency and recieve the keynote or destroy an alien space station in the orbit of Saturn. However, both of these are no longer an option. The video of the keynote is still produced however, and available for watching later. If you want to watch the keynote without knowing what is released, then watch [MacRumors](http://www.macrumors.com/). They always make a non-spoiler post you can bookmark, which will be updated as soon as the video is available and links to it. The other option, which I plan to use, is a text feed. Text feed means people sitting in the crowd watching the keynote post what happens, plus sometimes images and their own thoughts. In the old days, the big rumor sites switched to a high-load mode with drastically reduced features. MacRumors, for example, had a hilarious yellow-on-blue design for keynotes. But hey, it worked. German site [MacNews](http://www.macnews.de/) still operates that way. The modern thing to do is to either have a normal blog/news post that gets updated, or a dedicated site that uses Science™ to update itself “ottomatically”. The most notable example of the second type is [MacRumorsLive](http://www.macrumorslive.com/), child of MacRumors. It failed horribly on it’s first try, but has since become very stable and reliable. Of the other kind, I’d recommend [Ars Technica](http://arstechnica.com/index.ars) for text-only, and [Engadget](http://www.engadget.com/2008/01/15/live-from-macworld-2008-steve-jobs-keynote/) and [Gizmodo](http://www.gizmodo.com) both provide images as well. If they cover this keynote, that is. I’ve not been able to find out whether Gizmodo plans to do so. And before you ask: No, you don’t get to choose between the sites. Have all of them open and compare what they say, because some are faster for some items, and you can bet that someone will mess something up on his particular site. Now, the second part is the live commentary. As stuff gets announced, you’ll need someone to talk with or hear opinions or mock things. The best way of doing that is, of course, with a live Mac fan on some connection. Many sites offer IRC channels that will be full of people discussing what happens. Also, some sites offer live commentary. Of those, the ones I’d recommend most are [Crazy Apple Rumors Site](http://www.crazyapplerumors.com/) and [Fake Steve Jobs](http://fakesteve.blogspot.com/). I have no idea whether CARS (as it’s known for short) will actually post, but this time not of laziness: They simply haven’t said whether they will or not yet. If they do, it’s guaranteed to be hilarious. FSJ, on the other hand, has never done that before as far as I know, so I can’t vouch for quality. However, for him I know he’s going to post something, and what he posts when it’s not keynote is always great anyway. Notice that for both it’s a very realistic chance that they post something not suitable for work, small children or pregnant men. Or women. Finally, you mustn’t miss [Keynote Bingo](http://arstechnica.com/staff/fatbits.ars/2008/01/06/mwsf-2008-keynote-bingo). A tradition started by Ars Technica’s John Siracusa, it should explain itself pretty much. There are automated bingo card generators out there if you Google for it, but the one and only real Bingo card is this one. As this is aimed at n00bs instead of Mac Pros (pun intended), let me just explain that the PDA shown there is actually the Apple Newton, a PDA Apple used to produce until 1997 (or was it 1998? Not sure), which was far ahead of it’s time but a financial failure. Mac fans have cried for it’s reintroduction ever since it was cancelled. I think that’s the most important points. Have fun! Written on January 13th, 2008 at 12:05 am
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474659.73/warc/CC-MAIN-20240226094435-20240226124435-00732.warc.gz
CC-MAIN-2024-10
5,424
11
http://inertialvisionandbalancephua60140.blogspot.com/2015/05/
code
Here is a video explaining how to calibrate the FANUC robot that is on LAR. Basically you just need to calibrate the joint position to Zero, the world coordinates will be calibrated depending on your joint coordinates. Good luck. Here is a piece of advice. If you want to change the batteries from the robot. Do it while the console is on. This way you wont need to recalibrate the FANUC. If you have any questions, please feel free to ask. Here it is guys. These videos will explain what I've been doing lately. These explain which data I got from the sensors in the various tests I made, what they mean and which conclusion (right or wrong) that I took for myself. They'll also explain an idea that I had and what is the test that I'll do in order to validate it. Hope you guys enjoy it!
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864039.24/warc/CC-MAIN-20180621055646-20180621075646-00454.warc.gz
CC-MAIN-2018-26
789
5
https://officialfamemagazine.com/2019/09/27/kings-of-pain-star-adam-thorn-lets-python-bite-bloody-his-arm/
code
“Kings of Pain” star Adam Thorn served up his arm as a snack for a massive python … all in the name of measuring pain. Adam — a wildlife biologist and cohost of the new series on the History channel — was extremely apprehensive about the ordeal … as he and his cohost, professional animal handler Rob “Caveman” Alleva, traveled to a jungle and volunteered to get bitten by a 16-foot reticulated python. How apprehensive were they? The duo brought out protective cups and face shields. Gotta protect the family jewels and faces that feed the fams. Anyway, watch the python lock on to Adam’s arm. Warning: this is NOT for the squeamish. The snake’s teeth got stuck in Adam’s arm and the bite created an absolute bloody mess. Obvious question … WHY?!? The guys say they’re following in the footsteps of Dr. Justin Schmidt — an entomologist (insect scientist) who, in the ’80s, put himself in harm’s way to create a sting pain index. Adam and Rob wanna do the same but aim to take it beyond insects. Their 30-point pain scale will measure intensity, duration and damage — thereby informing viewers which creatures to avoid, and if ya can’t … how to treat a bite or sting. As for the python bites … Adam needed stitches to close his wound. Rob, whose bite you’ll have to see on the show, got the worst of it. Doctors had to squeeze a hematoma out of his arm, twice!!! The show premieres November 12 and, arguably, the python is their easiest foe since it’s not poisonous. The guys will also endure a Nile monitor lizard, fire urchin, lionfish, giant Asian centipede, piranha and a wasp so enormous … it’s called the tarantula hawk!!! Fun fact (for you, not them): Adam and Rob endured 22 bites or stings during the 8-episode run.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818067.32/warc/CC-MAIN-20240421225303-20240422015303-00897.warc.gz
CC-MAIN-2024-18
1,772
8
http://tsumea.com/tags/build-test-engineer
code
League of Geeks is regarded as an industry leader in games-as-a-service development, but we feel we're only just getting started. So we’re looking for you, an enthusiastic engineer looking to dedicate your passion for game development to improving our games-as-a-service methodology, pipelines and player experiences. As LoG continues to grow and expand, you will drive our development across build infrastructures and testing pipelines - optimising the way we work, not only across platforms but as a team. Build / Test Engineer Wargaming Sydney is looking for a Build Automation Engineer to join our DevOps team. We are a friendly team that likes to work closely with developers to make great games and tech. Our team likes to share knowledge, so you can expect to be able to learn from us and teach us something too. Join the Game! This position has been filled. At League of Geeks (LoG) we’re known for the incredibly high level of quality found in everything we touch, but we know we can always do better. So we’re looking for you, an enthusiastic engineer who can dedicate your passion for game development to improving our games-as-a-service products. Programmer required to implement Ad networks & In App Purchases in upcoming iOS / Android game title - Contract based role. - Must be based in Australia. - Must have experience implementing Ad Networks / In App Purchases in 10+ game / app titles. (No Newbies , Sorry) - Experience working with AdMob, RevMob, iAd, ChartBoost, Playhaven. - Reference check and Portfolio is essential. - Possibly more work for the successful applicant.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525587.2/warc/CC-MAIN-20190718083839-20190718105839-00157.warc.gz
CC-MAIN-2019-30
1,598
13
https://thecreativechase.libsyn.com/episode-029
code
Nov 8, 2020 We live in a day and age where self care is heavily suggested and promoted. Trust us, we are allll for self care, but when does it become self obsession? Where do we draw the line between taking time for ourselves in a healthy way versus a little too much time? Grab a cup of tea because we are getting into the details of this topic on todays episode!
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487649731.59/warc/CC-MAIN-20210619203250-20210619233250-00156.warc.gz
CC-MAIN-2021-25
364
2
https://forum.arduino.cc/t/yun-wifi-com-port-not-found/206621
code
I have just started to "play" with the YUN, following the guide instruction of the relevant section of Arduino site. Eveything was fine and Iwas able to see the YUN via the browser in my PC (ubuntu 13.xx based). The issue start when I try to program the 32u4 over wifi becouse in the Arduino IDE, under the Tools > Port menu, I do not see an entry that lists my Yún's name and its IP addres. Moreover under the Board menu, there is not the Arduino Yún. Someone has already faced the problem and has some suggestion? Thank You in advance Is it just a problem on the ide release l'm using? i have the some problem. Can someone help us? You should use Arduino IDE 1.5.4 or higher for Yun to be shown under board menu
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587659.72/warc/CC-MAIN-20211025092203-20211025122203-00046.warc.gz
CC-MAIN-2021-43
715
5
https://www.npmjs.com/package/rules
code
Validate objects against predefined rules (node.js). A tiny rules framework that can be used to validate any value, either by you creating a rules/schema object or applying validations to a single value. In both cases a fluent interface is used. You create an object to declare the rules/invariants you want to apply (something akin to a schema). A fluent interface makes it easy to specify the invariants for each property: var nameRules =first : mustBepopulatedstring minLength: 5 maxLength: 20 1second : mustBepopulatedstring minLength: 5 maxLength: 20var personRules =name: nameRulesweight: mustBepopulatednumericmin : 0 max: 130thispopulateddate before: nowsubtract"years" 1 ;2 As shown you can access this fluent interface using two approaches: The function based approach is designed primarily for use with CoffeeScript: # This schema is not showing how to validate a real address, it just shows a few validatorsaddressRules =streetOne: mustBepopulated: -> @populatedstring minLength: 10maxLength : 50: -> @populatedstring minLength : 10maxLength: 50: -> @populated: -> @populatedmatchFor/.../ The same validators are available for use validating individual values: You trigger validation using: result = rules.apply(person, personRules) The returned object has the per-property details of any validation failures, e.g.: name:first:message: 'The value must be populated.'type: 'not_populated'value: ''second:message: 'The value must be populated.'type: 'not_populated'value: undefinedweight:message: 'The value must be populated.'type: 'not_populated'value: undefined Note in this case both the first name (e.g. person.name.first) and second name (person.name.second) needed to be populated, along with the weight. The framework comes with several validators, to understand them further you may want to run the examples. populated- Checks the value is not "", or an empty array. numeric- Optionally you can also pass in object with matchFor- You can pass in an object with flags, alternatively you can pass in the RegExpobject to use. date- Optionally you can specify that the date must be afterspecified dates. To make this easier you use now.subtractto specify the dates to use for string- Optionally you can pass in The project comes with examples in the examples directory. mocha -R spec spec/testFixture spec/ --recursive
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049276780.5/warc/CC-MAIN-20160524002116-00015-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
2,333
26
http://dba.stackexchange.com/questions/tagged/amazonrds+locking
code
Database Administrators Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Cannot write to mysql database while select query in process Running Mysql 5.1.57 on InnoDB, and have a database locking issue. I have two separate sessions connected to a single database MySQL. On the first session, I run a long SELECT query (technically a ... 14 revs, 4 users 50% newest amazonrds locking questions feed Hot Network Questions My authority over airspace above my land Generate random numbers without repetitions What are some problems with running a heating element in PWM mode? BrainF***edBotsForBattling - A Brainf*** Tournament Can metamagic be acquired at first level? How to respond to manager's demand to remove CV from Job site? How to review a major revision of a paper? What is the >>>= operator in C? Is this definition of "preshipped" incorrect? Circled equal with same size than `$\oplus$`, `$\otimes$` with pdflatex Is there any difference at all between NUMERIC and DECIMAL? mastermind horse battery staple Flappy Bird game clone for a beginners' programming class Idiom for "just because you give something a different name, it doesn't change what it is" Speed up Schwarz-Christoffel mapping Prior art for US patent application 20140196008 'IMMUTABLE OBJECT TYPES ' Why should I sign data that's already encrypted? Is the Complex Conjugate the Only Way to Get a Real Number? Person who fills out a form - single word Avoiding DC voltage drop over long distances Implement an 8 bit adder If a program terminates and there is no one to see it, does it halt? After removing the latest kernel, how can I be notified of kernel updates again? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500835488.52/warc/CC-MAIN-20140820021355-00335-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
2,236
52
https://discourse.slicer.org/t/how-to-find-out-if-a-point-is-inside-or-outside-a-3d-model/22003
code
how to find out if a point is inside or outside 3d model? I found on the Internet that there is a use of raycasting to judge the odd and even numbers of the intersection points… but I want to know are there some special methods in Slicer? The simplest is to use vtkImplicitPolyDataDistance, as it is shown in this example. It may struggle (can be slow and unreliable) if the mesh is complex or has errors. The fastest and most robust method is to convert the model to a labelmap (by importing to segmentation and exporting to labelmap) and then check if the voxel corresponding to the probed position is inside the volume and has non-zero label value. 谢谢老师, 我也是这么想的, 就是通过segmentation染色model, 然后通过位置点的颜色判断这个点是否为model的一部分,老师有没有script的示例呢? Thank you, teacher, I think so too, that is to dye the model through segmentation, and then judge whether the point is part of the model by the color of the position point. Does the teacher have an example of script? Probably the simplest is to ask the displayable managers, for example this example script shows how to check if a position is inside a segment. 但是, 我想问的问题是"内"和"外",如果model内部有空隙, 而这个点正好位于其中,用这个方法会判断为"外"… However, the question I want to ask is “inside” and “outside”. If there is a gap inside the model, and this point is located in it, it will be judged as “outside” by this method… You can fill internal holes in a segmentation using SurfaceWrapSolidify extension. Open the “Segmentations” module and go down the “Export/import mdels and labelmaps” section. Choose “Import” and “Models”, and select the model you want to convert as the “Input node”. Then press the “Import” button. This will create a new segment in the segmentation corresponding to the interior of your model. You can then export that to a new labelmap by using the same section of the Segmentations module; just choose “Export” and “Labelmap” instead of import and models, and then click the “Export” button (leaving “Export to new labelmap” selected as the “Output node”).
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711017.45/warc/CC-MAIN-20221205132617-20221205162617-00757.warc.gz
CC-MAIN-2022-49
2,231
13
http://www.chiefsplanet.com/BB/showpost.php?p=9390483&postcount=4296
code
Originally Posted by KC_Connection They shot better than the team they played in a tough road environment (this suggests they were the better team). They also got to the line more than OU in a tough road environment (this suggest they were the better team). What cost them greatly was going 11 for 20 on FTs (which isn't expected for that group) and having low percentage shooters hit some big shots down the stretch (which can't be controlled). I'm not quite understanding what's difficult ? You just watched a game we led about 20 seconds, and you deduced that we were actually better. You can't be serious.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122933.39/warc/CC-MAIN-20170423031202-00639-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
609
3
https://ellenmillion.livejournal.com/1141059.html
code
So, I have to run and do those things now. It's driving me nuts how fast this month is disappearing!! Here's a link for those of you who are curious about what winter solstice looks like in Fairbanks. We do get some sun. Very little. This much: http://www.youtube.com/watch?v=jb6kG5oXTRU (Time-lapse video taken from the university, looking over the west end of town: It's short, and the music is a bit loud, but worth watching.)
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358443.87/warc/CC-MAIN-20211128013650-20211128043650-00051.warc.gz
CC-MAIN-2021-49
429
2
https://forum.uipath.com/t/how-to-write-data-into-excel-without-overwrite/173021
code
How to write data into excel with out overwrite. For example: (1) I was extracting data from data table and writing into an excel. (2) Data stored in an output excel from 1 to 10th row, (2) After searching a result in the loop, i was extracting again a data from data table. How can i add this data from the 11th row in output excel? have a look on this activity: for the second or further appending take care about the addHeader flag Here is an activity to find last row and last column of the excel sheet. You can download package in thread .It has been uploaded into the UiPath Go ! waiting for the publishing. I have developed 2 new activities. Find LastColumn that to find the last column Index and Column Name of the sheet . Find LastRow that to find the last row of the sheet and it returns the row index. Find LastColumn’s Properties : Find LastRow Properties : If the sheet name is empty , It will take the first sheet name . Here is the video demonstration. [UiPath excel Extract Graph as Image | find last column Index| find last Row No… Package attachment : I have developed some activities to make easy excel automation. Package manage Search keyword: Balareva.easyexcel An activity library that makes Excel automation very easy This package contains activities that will help automate your work with Excel. The below activities are available: ExtractGraphImage - Extracts graphs available in a specific Excel and converts these into images. ExtractHyperLinks - Extracts hyperlinks from a specific cell range within a given Excel sheet.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711637.64/warc/CC-MAIN-20221210005738-20221210035738-00765.warc.gz
CC-MAIN-2022-49
1,553
23
https://community.jivesoftware.com/thread/312675
code
Would it be possible for you to check, if the following e-mail addresses are in bounce list, and remove them, if necessary? The e-mails are: [email protected] I'd really appreciate your help. If you need any additional information, feel free to contact me. When is the email notifications going to be fixed?
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578633464.75/warc/CC-MAIN-20190424054536-20190424080536-00323.warc.gz
CC-MAIN-2019-18
307
4
https://lists.debian.org/debian-devel/2005/12/msg00648.html
code
Re: congratulations to our ftp-master team I think that both sides are right: 1) people who express kudos to FTP-masters for express accepting new packages due to the C++ name transitions 2) Anand Kumria and Thaddeus Black criticizing FTP-masters for never addressing 'mplayer' 'xvidcap' 'rte' and such I can understand why nobody in the ftp team addresses 'mplayer' 'xvidcap' 'rte' : suppose you are a ftp-master and have 15minutes spare: you check into the NEW queue, spot some transitional packages, run a quick script to check that they were renamed accordingly, and give green To address 'mplayer', it would take more than 15 minutes; and it would mean reading a lot of code and debian-legal discussion, and taking sides and expressing an important opinion..... hey that is a lot of work .... so 'mplayer' is always delayed. So , ftp-master team is not doing a _fantastic_ job, (as Jay thinks), they are doing the _most convenient_ job. The _fantastic_ job was the job of people who discussed mplayer on d-devel and d-legal, and reached an agreement that 'mplayer' may enter into Debian, (maybe w/o MPEG2 encoding ). That work is currently completely disregarded by the ftp team. Running a script to check that /libblah1c2/ has been properly renamed to /libblah1c2a/ is not that _fantastic_. Solving an outstanding problem The paradox is that, if you sum up 15minutes for each package in the NEW queue, you easily total many many hours of work.... more than enough to address 'mplayer' 'xvidcap' 'rte'. In my opinion, considering that the release of etch is 15 months away, there is no need today to concentrate only on accepting transitional new package; it would be instead nice to use these 15months to solve the mplayer stalemate (that has been waiting more than 876 days). indeed, when was written, sarge's release was near, and 'mplayer' was not top priority; now the situation is quite different; there is need to consider 'mplayer' low priority forever; if the ftp team does care a little bit, then this is a good timeframe. BTW: I know that 'mplayer' has always been fishy business in Debian.... but what did 'xvidcap' ever do wrong? AFAICT the only problem may be that 'xvidcap' contains FFMPEG code ; but FFMPEG has been in Debian for quite long now, so I do not really understand what is going on here.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257649095.35/warc/CC-MAIN-20180323220107-20180324000107-00270.warc.gz
CC-MAIN-2018-13
2,320
37
http://plslala.blogspot.com/2009/05/invasion-35-on-road-with-yonic-clonic.html
code
I had a date like this once. She was something like a devil. My roommate didn't enjoy his night when he almost go arrested by a cop with the same attitude. hey dude. yonic clonic is totally badical, especially pale lime! i love your drawins and your comix and how you don't use any panel borders and how everything still flows despite that! heck yeah. aight, i'll quit the geekery now... hehehe. i'm very inspired thanks to you :)
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589726.60/warc/CC-MAIN-20180717125344-20180717145344-00051.warc.gz
CC-MAIN-2018-30
430
3
https://resideinsummit.com/water-house-on-main-street/
code
Water House on Main Street - Breckenridge Colorado Real Estate Water House on Main Street are newer Breckenridge CO condos on the south end of Main Street in Breckenridge Real Estate. Built in 2008 there are 26 units in the first of two buildings at Water House on Main Street. The makeup of the 26 condos is 2 one bedrooms, 15 two bedrooms and 7 three bedrooms. The Breckenridge condos range in size from 755 – 1,847 square feet. Each unit is tastefully finished with wood floors, stainless steel appliances, slab granite counters and stone fireplaces. Located just beyond Main Street Station makes for a short walk to both Main Street and the Quicksilver Lift at the base of Peak 9 of the Breckenridge Ski Resort. Many Breckenridge condos for sale at Water House on Main Street are adjacent to the babbling Illinois Creek. Sitting out on your spacious deck you may have views of Maggie Pond, the Ten Mile Range which includes the Breckenridge Ski Resort or Baldy Mountain. Individual ski lockers can be found on the first floor of Water House while the majority of the other amenities can be found at Main Street Station. These amenities include an outdoor pool, several hot tubs, fitness room, steam room, sauna, movie viewing rooms and more. There is also underground heated parking. Water House on Main Street are superb Breckenridge condos in an ideal location steps to skiing and Main Street for shopping and dining. Arrange a time to view condos for sale in Breckenridge Colorado Real Estate today. MLS # S1011999 City: Breckenridge, State: CO Price: $1159500SLOPESIDE, STREAMSIDE, DOWNTOWN MAIN ST. LOCATION! Luxury living Downtown! Stunning Mtn. modern building with upscale finishes, gourmet kitchen, rich wood floors, stone fireplace and spa style baths. Walk to slopes, downtown, Maggie Pond and the Blue River. Enjoy overlooking enchanting stream, viewing towards Pond and Ski Slopes beyond. First class resort amenities; ski valet and ski locker, Olympic Pool, Multiple Hot Tubs, Fitness Gym, Theater Room, On Call In-town Shuttle, Pioneer Club. 5c4fac2134e2b56d5f556022 0.00 1004703 Clubhouse/Rec Room Exercise Room Pool Sauna/Steam Spa/Hot Tub Storage Area Breckenridge 0 0 2 2 2 1147 Breckenridge Listing Metal Summit Main Street to Broken Lance. West on Broken Lance to Columbine. Right on Columbine to building on the right. Elevator 600 Columbine ROAD 5307 summit 1 5c4fabe734e2b56d0841ca32 1 1 1548721579 1548633600 1159500 Rob Neyland 6088573 Active Alpine Ski in Alpine Ski Out Bus Route In Town Lake View Walk to Slopes S1011999 1003236 600 Columbine ROAD, BRECKENRIDGE, Colorado 80424 1548872840 Breckenridge Associates R.E. 1 32 1010 Condominium Residential SLOPESIDE, STREAMSIDE, DOWNTOWN MAIN ST. LOCATION! Luxury living Downtown! Stunning Mtn. modern building with upscale finishes, gourmet kitchen, rich wood floors, stone fireplace and spa style baths. Walk to slopes, downtown, Maggie Pond and the Blue River. Enjoy overlooking enchanting stream, viewing towards Pond and Ski Slopes beyond. First class resort amenities; ski valet and ski locker, Olympic Pool, Multiple Hot Tubs, Fitness Gym, Theater Room, On Call In-town Shuttle, Pioneer Club. CO Columbine 600 Water House On Main Street Condos 5307 1548876781 Lake/River/Creek/Stream Ski Slopes Mountains 2008 80424 ListPrice 1159500 1548725281 1159500 ListingStatus Active 1548725281 Active Point -106.044891 39.4754433 ROOFTOP https://s3-us-west-2.amazonaws.com/apiv1.photos.master/2d95-6088573-0-summit.jpg 0 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/7e36-6088573-1-summit.jpg 1 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/1179-6088573-2-summit.jpg 2 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/5710-6088573-3-summit.jpg 3 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/ef56-6088573-4-summit.jpg 4 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/f201-6088573-5-summit.jpg 5 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/0695-6088573-6-summit.jpg 6 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/caf8-6088573-7-summit.jpg 7 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/fc8d-6088573-8-summit.jpg 8 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/f79e-6088573-9-summit.jpg 9 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/46b6-6088573-10-summit.jpg 10 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/aea8-6088573-11-summit.jpg 11 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/913c-6088573-12-summit.jpg 12 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/1789-6088573-13-summit.jpg 13 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/936a-6088573-14-summit.jpg 14 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/20d8-6088573-15-summit.jpg 15 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/d95a-6088573-16-summit.jpg 16 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/5c16-6088573-17-summit.jpg 17 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/0fb4-6088573-18-summit.jpg 18 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/02ad-6088573-19-summit.jpg 19 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/34bc-6088573-20-summit.jpg 20 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/466c-6088573-21-summit.jpg 21 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/d49d-6088573-22-summit.jpg 22 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/6432-6088573-23-summit.jpg 23 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/ab6e-6088573-24-summit.jpg 24 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/7238-6088573-25-summit.jpg 25 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/f1d9-6088573-26-summit.jpg 26 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/ccb4-6088573-27-summit.jpg 27 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/83ca-6088573-28-summit.jpg 28 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/136d-6088573-29-summit.jpg 29 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/995e-6088573-30-summit.jpg 30 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/7d44-6088573-31-summit.jpg 31 1548725522 https://s3-us-west-2.amazonaws.com/apiv1.photos.master/92be-6088573-32-summit.jpg 32 1548725522 1548725522 1548725580
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247488490.40/warc/CC-MAIN-20190218220415-20190219002415-00307.warc.gz
CC-MAIN-2019-09
6,586
6
https://framework.zend.com/issues/browse/ZF-6813
code
Issue Type: New Feature Created: 2009-05-26T15:26:47.000+0000 Last Updated: 2009-08-07T12:14:07.000+0000 Status: Resolved Fix version(s): - 1.9.1 (11/Aug/09) Reporter: Sébastien Cramatte (scramatte) Assignee: Stefan Gehrig (sgehrig) Tags: - Zend_Auth_Adapter_Ldap Related issues: Attachments: Zend_Auth_Adapter_Ldap should support setIdentity, setCredentials methods as Zend_Auth_Db_Adapter. In reality all the auth adapters should setup in the same way. What is the getResultRowObject method equivalent in Zend_Auth_Ldap ? Posted by Stefan Gehrig (sgehrig) on 2009-08-07T12:14:04.000+0000 Closed with SVN rev. 17434 in trunk. Added Zend_Ldap_Auth_Adapter_Ldap::setIdentity() as a proxy to Zend_Ldap_Auth_Adapter_Ldap::setUsername() Added Zend_Ldap_Auth_Adapter_Ldap::setCredential() as a proxy to Zend_Ldap_Auth_Adapter_Ldap::setPassword() Added Zend_Ldap_Auth_Adapter_Ldap::getAccountObject() to retrieve the account data for an authenticated user (resembles Zend_Ldap_Auth_Adapter_DbTable::getResultRowObject()) Have you found an issue? See the Overview section for more details.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863949.27/warc/CC-MAIN-20180521043741-20180521063741-00378.warc.gz
CC-MAIN-2018-22
1,083
11
http://jolley-mitchell.com/teachRDE/C10/C10KeyIssues.html
code
1. What three criteria must be met to establish that one factor causes a certain effect? 2. How does the simple experiment establish internal validity? 3. What are the two errors that can result from a statistical test? 4. How do statistical considerations affect the design of the simple experiment? That is, how do statistical considerations affect: a. The way participants are assigned to group b. The degree to which participants are allowed to interact c. Whether all the control group participants are run as a group d. Whether all the experimental group participants are run as a group e. The number of participants in the study f. The strength of the manipulation g. The measure used? 5. How might statistical considerations conflict with other considerations, such as construct validity, external validity, and ethical considerations? 6. What is the logic behind the t test? 7. What questions are raised by null results? 8. What questions should be asked about significant results from a simple experiment? Back to Chapter 10 Main Menu
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506121.24/warc/CC-MAIN-20200401192839-20200401222839-00501.warc.gz
CC-MAIN-2020-16
1,044
16
http://office.microsoft.com/en-us/word-help/change-an-inline-picture-to-a-floating-picture-and-vice-versa-HP005190262.aspx?CTT=3
code
Skip to main content Search all of Office.com Warning: This site requires the use of scripts, which your browser does not currently allow. See how to enable scripts. Change an inline picture to a floating picture, and vice versa If the picture is not on a (drawing canvas: An area on which you can draw multiple shapes. Because the shapes are contained within the drawing canvas, they can be moved and resized as a unit.) , select the picture. If the picture is on a drawing canvas, select the canvas. , and then click the Do one of the following: To change an (inline object: A graphic or other object that is positioned directly in the text of a Microsoft Word document at the insertion point.) picture to a (floating object: A graphic or other object that is inserted in the drawing layer so that you can position it precisely on the page or in front of or behind text or other objects.) picture, select the wrapping style you want. To change a floating picture to an inline picture, choose In line with text
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663372.35/warc/CC-MAIN-20140930004103-00361-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
1,011
17
https://soek.be/Harvey-Kurtzman:/article_27894.asp
code
MAD Magazine #502 Eng | RS & Hotfile | CBR | EC Publications (DC Comics) | Nov 18 2009 | 51 Pages | 41.7 MB + MAD Magazine Issues #500 -501 MAD Magazine launched in 1952, founded by legendary EC Comics Publisher William Gaines and Editor Harvey Kurtzman, and has satirized, parodied and just made fun of American life, culture and public figures ever since. Many comedians and writers – from Joyce Carol Oates to Monty Python’s Terry Gilliam and thousands in between – cite it as a seminal influence in their earlier years. While it was the home to legendary comedians and cartoonists such as Kurtzman, Mort Drucker, Don Martin, Jack Davis, Wally Wood, and John Sevrin in its early years, it has seen a new generation embrace its pages in recent years and has featured work from Peter Kuper, Hermann Mejia, Drew Friedman and Ted Rall.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541692.55/warc/CC-MAIN-20161202170901-00104-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
840
4
https://github.com/oasis-tcs/oc2arch
code
Members of the OASIS Open Command and Control (OpenC2) TC create and manage technical content in this TC GitHub repository (https://github.com/oasis-tcs/oc2arch/) as part of the TC's chartered work (the program of work and deliverables described in its charter. OASIS TC GitHub repositories, as described in GitHub Repositories for OASIS TC Members' Chartered Work, are governed by the OASIS TC Process, IPR Policy, and other policies. While they make use of public GitHub repositories, these repositories are distinct from OASIS Open Repositories, which are used for development of open source licensed content. All OpenC2 Profiles work within an implied architecture as well as a in a common language. The purpose of this repository is to develop a specification of the standard architecture to guide all developers of Profiles. The OpenC2 Language Subcommittee is responsible for this specification. As stated in this repository's CONTRIBUTING file, contributors to this repository must be Members of the OASIS OpenC2 TC for any substantive contributions or change requests. Anyone wishing to contribute to this GitHub project and participate in the TC's technical activity is invited to join as an OASIS TC Member. Public feedback is also accepted, subject to the terms of the OASIS Feedback License. Please see the LICENSE file for description of the license terms and OASIS policies applicable to the TC's work in this GitHub project. Content in this repository is intended to be part of the OpenC2 TC's permanent record of activity, visible and freely available for all to use, subject to applicable OASIS policies, as presented in the repository LICENSE. Further Description of this Repository Any narrative content may be provided here by the TC, for example, if the Members wish to provide an extended statement of purpose. Please send questions or comments about OASIS TC GitHub repositories to the OASIS TC Administrator. For questions about content in this repository, please contact the TC Chair or Co-Chairs as listed on the the OpenC2 TC's home page.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251690095.81/warc/CC-MAIN-20200126165718-20200126195718-00286.warc.gz
CC-MAIN-2020-05
2,066
8
https://www.aheil.de/category/web/
code
I started to learn a bit about Google Webmaster Tools and how to increase the findability of one’s website. First of all, I was looking for a flexible sitemap generator for WordPress where I ended up with Google XML Sitemaps. This plugin generates a sitemap file which can be consumed by search engines like Google or Bing. To do so, you have to verify your website with the various providers. Usually, this is done by adding some meta tags to your HTML pages to prove you have full control over the server. Currently, this can be achieved by WordPress’ Jetpack. That way you don’t have to fiddle with the header.php file of your WordPress installation. You don’t have to, but you can sign into the Google Webmaster Tools to check the verification status of your site. Also Bing Webmaster Center will provide you a Meta tag you can provide Jetpack to verify your site and to improve the discoverability of your site. While I was annoyed in the very first moment, I had to think through various perspectives, not just coming up with yet another rant post about Google’s attitudes. The Business Point of View Google is not doing anything wrong (I guess) from a business point of view. They simply cut down projects, teams or cost centers with no or little revenue. I have seen this several times during my time at Microsoft where teams or studios where shut down due to a revenue not meeting the expectations. Larry Page wanted to focus on core products and less speculative projects which does make sense considering the shareholders beyond Google. Consequently, cutting down free services not being paid for, requiring manpower for development an maintenance and (not to underestimate) bare metal down in Google’s data centers is a plan to increase revenues, cut down losses and save not to spend money. The User ‘s Point of View As a user, you might rely on these services. Maybe you build up your website based on various Google APIs (as they have been free), you maintained you RSS feed in Google Reader and so on. Even with several weeks of notice, you need to change technologies, maybe rebuild or recode you page, and even worse to change habits. At some point in time, after this happened one, two or three times (depending on your very personal potential to suffer). The Developer’s Point of View There arequite many apps, tools and pages out there heavily depending or based on Google’s API including Google Reader. Not only their apps and tools stop working, also users who bought these products will be forced to stop using these tools. With feedly, there is timely an alternative Reader and with Normandy developers get an API they might use for their products. However, Nick Bradbury already announced to stop working on the Windows client FeedDemon which heavily depends on the Google API for synchronization.More will definitely follow… The Consequences As developer, I was affected once before, as user I am affected the second time by now. By cutting down both services I am left with Google Calendar. While Google might or might not continue this service in the future, one might rethink if using it is a good choice. Keep in mind, we do not pay for it as users and the Google App Sync meanwhile is only available for business users (probably paying for it). Google Calendar Sync was a great tool to sync between Outlook and Google Calendar. I fought my way through the setup using Windows 7 three years ago right after they stopped development for it. The Business Point of View Revisited I wonder if Google thought of charging for these services. I wonder if one (e.g. I) would pay for such a service. It definitely would depend on the amount they would charge. A few bucks a year won’t hurt and with a few ten thousands of users they might pay the bills for this service one might think. On the other hand, a company like Google might not be interested in any service with less than ten million $$$ of revenue (please put in whatever amount you think is suitable) or a million of users… A few days ago, Radu Drăgușin discovered a data leak at the IEEE servers, enabling him to download about 100.000 plain text keywords (probably mine as well). On the one hand it shows how critical it is to consider the security off your system, nevertheless if you are a small company or a worldwide organization such as the IEEE. On the other hand it showed that even large organizations you never thought of this might face such fatal security leaks. However, Radu went ahead and (a) decided not to share the information he gained through this security leak with public (big kudos for this decision), (b) to prepare various statistics on ieeelog.com based on the information (which are indeed interesting without revealing traceable information about individuals) and (c) to inform IEEE about the leak (also kudos for this). As a result you can say, he was quite responsible with the data he received and at least e followed some of the principles, provided by the IEEE Computer Society Code of Ethics. One result of his analysis is the fact, that about almost 300 users are using the password 123456, reminding me Mel Brooks epic Star Wars parody Spaceballs, Dark Helmet saying “So the combination is… one, two, three, four, five? That’s the stupidest combination I’ve ever heard in my life! That’s the kind of thing an idiot would have on his luggage!” As a result, I went straight to my IEEE account and changed the password. Luckily, it was a password not used for any other site beside the IEEE. Said that, if you have an IEEE account, it probably is a good thing to go there directly changing yours as well if not already done. And Radu, whenever you ever read this post, if have the chance please have a look into the log files and let me know if the user aheil is listed there as well. Digging through the resources on the Web, you might figure out that there are various approaches. I decided against any server-side processing of the request as I did not want to make an extra call to the my server. Also any jQuery plugin related approach would not work at the moment due to recent unavailability of jQuery plugins. Once you got your API key which is based on the domain you want to call the API from, you can immediately start using it. The key is valid for all pages within this domain. Usage of the API includes adding the script your head of the HTML, loading the API using Google Loader’sload()call and finally hooking up your code as call-back in the setOnLoadCallback function. The feed is then provided either as JSON or as XML by the Google Feed API and can be easily used within you code without any cross-domain restrictions. Google has replaced the + (plus) operator for their search. While looking for a certain expression (using the plus operator) Google tells that from now an double quotation marks are necessary to find an exact expression. Not sure if I like this, however, it looks like there are not many options to ignore this change. This probably has to do with all the G+ notation. It feels to me as bad as product and event names like .net or build which in combination with the new double quotation mark operator find some 2,490,000,000 results not relevant at all. Over the last couple of years, I run my blog using the dasBlog engine. As I started hosting the blog in 2004 on my own server, I choose dasBlog as it did not need any database on the backend, saved everything in XML and did a great job on the full text search over the XML content. Beside that, a blog engine running on ASP.NET seemed the right choice being familiar with the technology. Eventually, I did several fixes and hacks on my installation over the last few years. Unfortunately, there was no new release since March 2009. As I like playing with alternative technologies from time to time and WordPress comes with a rich set of features I miss at dasBlog, I decided to migrate to WordPress. In this article I will describe the steps moving forward to WordPress hosted on a Windows Server 2008. Moving forward to the new platform includes several steps. First of all the server has to be prepared to host the new platform. After the new blog engine is set up, the content needs to be migrated. Finally, the old engine needs to be shut down and the server needs to be set up to forward requests to the old engine to the new one. Installing WordPress should be relatively easy as it is available through the Microsoft Web Platform Installer 2.0. However, you might encounter issues during the process on machines running IIS 7 as the required Windows Update KB980363 causes the installation process to hang. The update process only hangs when started from within the Web Platform Installer, so pick it from the Microsoft Download Page and install the hotfix beforehand. Before installing WordPress you need to install PHP on the server. In addition to the instructions how to configure PHP on IIS 7, Ruslan Yakushev provides a very good tutorial how to set up FastCGI on Windows Server 2008. Migrating from dasBlog to WordPress Originally, I planned to use BlogML to migrate the content from dasBlog to Worpress. Instead I found dasBLogML which is a simple GUI wrapper around the original BLogML. First you download the content of the old blog to your local machine. To import the BlogML data, you might want to follow Edgardo Vega’s article. In order to avoid potential problems during the import, also have a look at Daniel Kirstenpfad’s tip about replacing all occurrences in the XML file. Using the BLogML Importer plug-in you can finally import the previously exported XML file. In the final step I had to redirect the requests from the old blog to the new one. There are several issues to think about: First of all, all binaries are still referred from the old blog. Consequently it is not possible to just shut it down. Furthermore, there are many entries that are linked from several places all over the web. My solution is to create a IIS module using managed code, and the ASP.NET server extensibility APIs. First of all I had a look at the schemes of the permalinks or URIs I have chosen for the old blog and the new one Consequently the HTTP module has to perform several steps: Replace the domains, remove the technology specific information in form of the .aspx file extension (technology specific information isn’t good practice anyway based on Tim Berner-Lee’s article about cool URIs) and finally add some hyphens. While the later is an somehow impossible task, there is an easy workaround. The scheme for permalinks I have chosen in WordPress will list all articles on a given day if you omit the article title in the URI. Consequently, the requested URI will be rewritten by the module to and sent back in the response with HTTP status code 301 (moved permanently) base on RFC 2616: “The requested resource has been assigned a new permanent URI and any future references to this resource SHOULD use one of the returned URIs. Clients with link editing capabilities ought to automatically re-link references to the Request-URI to one or more of the new references returned by the server, where possible. This response is cacheable unless indicated otherwise. The new permanent URI SHOULD be given by the Location field in the response. Unless the request method was HEAD, the entity of the response SHOULD contain a short hypertext note with a hyperlink to the new URI(s).“ Additional URIs that need to be processed are in the form of To create the redirect locations I use a set of Regex objects that cover the most important URI types. = new Regex("http://" + OLD_DOMAIN = new Regex("http://" + OLD_DOMAIN = new Regex("http://" + OLD_DOMAIN Now everything beside the content can be deleted from the old dasBlog installation. In order to avoid any requests not covered by the previously deployed module, the custom error page for status code 404 is set to the corresponding URI on the news blog. After deploying the module (into the bin folder of the dasBlog installation) it needs to be added to the web.config. Therefore you just have to add it to the httpModules section. If the application pool is running in Classic mode, the custom error pages do not cover any ASP.NET content. Therefore add the customError section into to web.config file. Now all requests that do not request any content from the old blog or which a are not redirected by your module are covered by the new WordPress blog. Now the content from the old dasBlog instance are displayed on the new WordPress blog, the most important links to your old dasBlog pages are covered by the URI redirection to the new blog and all the rest is caught by the WordPress blog as well. You might want to extend the redirect module with further regular expressions (e.g. to cover CommentView.aspx or other dasBlog pages). Windows Live becomes more open to other Web-based platforms. Maybe this was there already before, however, I haven’t seen it, yet. Windows Live is able to consume further events from platforms. Among the supported ones you will find TripIt, Flickr, Twitter and others. Adding the applications is quite easy. Sometimes (e.g. for TripIt) you have to sign in and to confirm. Looking forward to find even more supported activities in the future. It looks definitely like a step towards the right direction. I did a third Synth, this time I got it 100% synthy. In this try, I used about 30 images of Karlsruhe, I did during a night session. I also used a panorama, I created out of a few of this images. This seems to be a quite good approach to help Photosynth to create the good Synth. I’ve also used the first time the map feature you can find at your Synth’s page. You simply select the place, where your Synth belongs to and save it along with it.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530253.25/warc/CC-MAIN-20190421060341-20190421082341-00258.warc.gz
CC-MAIN-2019-18
13,821
50
http://teng-quora-k.herokuapp.com/questions/42
code
You can't override the circuit without hacking the back-end SMTP driver. Try to parse the CSS panel, maybe it will copy the primary transmitter. You can't calculate the alarm without calculating the online SSL microchip. Post your answer Keara Tillman DDS, National Optimization Designer, Integrate cross-media users 3 questions asked • 4 questions answered Try to program the SSL card, maybe it will hack the wireless monitor. You can't override the hard drive without programming the open-source HDD card. We need to calculate the mobile SQL monitor. I'll reboot the neural SSL protocol, that should microchip the XSS card. If we override the capacitor, we can get to the AGP bus through the 1080p RAM panel. Updated 240 weeks ago
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897844.44/warc/CC-MAIN-20200709002952-20200709032952-00255.warc.gz
CC-MAIN-2020-29
734
6
http://www.poriruachurch.com/mormonism.php
code
Is Mormonism Really from God? Have you ever considered this question and its implications? Join Nathan as he explores the truth through history, archaeology, literature and the Bible. Avoid misunderstandings by learning more about Mormonism. Speaker: Nathan Franson Nathan grew up in Salt Lake City, Utah, and spent 20 years in the Mormon Church before studying his way out of it. He has taught and written much about their religion since, and he now preaches the gospel in Kissimmee, Florida, USA.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863886.72/warc/CC-MAIN-20180620202232-20180620222232-00092.warc.gz
CC-MAIN-2018-26
498
4
http://www.ifixit.com/Answers/View/96037/Why+don't+volume+or+vibrate+buttons+work+after+replacing+screen
code
Why don't volume or vibrate buttons work after replacing screen? This question is archived. No new answers are allowed, and only the question's owner may edit it. Just replaced the screen for an iPhon4 for AT&T, everything works fine except for the vibrate switch (no vibrations at all), and the volume up/down buttons don't do anything. Took it apart again to check, the cables seem fine, the vibrator motor pins are making good conneciton..any ideas? When i flick the vibrate switch on, the OS does go into mute mode, just there's no vibrations anymore. Help.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163052970/warc/CC-MAIN-20131204131732-00033-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
561
3
https://roman-gardens.github.io/province/italia/pompeii/region_i/i.ii.10/
code
I.2.10 House of L. Vousius Faustus and M. Volusius Faustus An ancient city of Campania destroyed by the volcanic eruption of Mt. Vesuvius in A.D. 79, Pompeii was named as a UNESCO World Heritage Site in 1997. Garden at the rear of the House of L. Vousius Faustus and M. Volusius Faustus. The garden at the rear of the house, excavated in 1873, is almost totally destroyed. According to Mau, most of the garden was occupied by a large pool (5m X 2.90m) which was sloped toward the west from where it drained into the street through a pipe. The pool was surrounded by a low wall about 0.55m high leaving only a narrow space between the pool and the walls. In the northwest corner were the two beds of a masonry biclinium which sloped toward the wall, as was customary. Rainwater falling on them was carried away by a terracotta drain which emptied into the pool. A square niche under the north couch provided a storage space. On the wall above this couch was a rectangular niche lararium with a roughly made aedicules facade. At the east end of this couch was a masonry table. Fiorelli reports a planting bed attached to the rear (east) wall. There was a view from the triclinium through the large window in the east wall, across the pool to the garden painting on the rear wall. When this garden was excavated in 1873, the excavators reported three panels on the east wall with garden paintings. The center panel had a body of water with swimming fish with assorted animals in the background that included a grazing deer and a springing leopard. The two panels on either side each had a large crater-shaped fountain surrounded by thick growth. Large red flowers and yellow apples could be identified to the left of each fountain and the right, pomegranates (Punica granatum L.) Jashemski examined this painting in 1964 to find it had been covered by a growth of ivy which had destroyed most of the painting. A section of a large pomegranate bush was all that was left intact at the time. She describes the leaves, painted in blue-green with darker shading and a few yellow leaves and the fruit, deep yellow with reddish-orange shading, as being rendered in an impressionistic manner. At the right of the entrance to the garden area was a cistern opening. - Boyce, G.K. 1937. Corpus of the Lararia of Pompeii, p. 22 - Fiorelli, G. 1875. Descrizione di Pompei, p. 42 (worldcat) - Jashemski, W.F. 1979, Garden of Pompeii: Herculaneum and the villas destroyed by Vesuvius, pp. 110-111 (worldcat) - Jashemski, W.F. 1993, Gardens of Pompeii: Herculaneum and the villas destroyed by Vesuvius. Vol. II, Appendices, p. 22, 313 (worldcat) - Niccolini, F. Le case ed i monumenti di Pompeii, Naples, Vol. II, p. 76 - Schefold, K. and Dräyer, W. 1956. Pompeji, p. 9 (describes this painting as a paradeisos, with sea, deer, panther, and a nymphaeum) - Sogliano, A. 1879. Le pitture murali campane scoverte negli anni 1867-79, p. 224, no.694 Viola, L. 1879. Gli scavi di Pompei dal 1873 al 1878, p. 11 Excavated 1873. Bombed in 1943. Wilhelmina Jashemski (https://lib.guides.umd.edu/c.php?g=326514&p=2193250) 21 Apr 2021
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00380.warc.gz
CC-MAIN-2023-23
3,106
16
http://www.trainsim.com/vbts/showthread.php?266974-TUTORIAL-Reskinning
code
Thought I'd transfer this over from UKTS as I'm in no doubt that people will want to start reskinning the second they get their hands on RS! Apologies for the choice of locomotive, if I could have localised this tutorial then I would have done! Just to cover myself, I understand some of the railroad companies over in the US are a bit more sensitive about seeing their liveries in virtual form than our operating companies are over here, so make sure you have the appropriate permission if it's required... First thing to note, is that Mike's RS_Tools_TMB can be used to manipulate config (.bin) and - I think - texture (.GeoPcDx) files, so you don't necessarily need to download the RSBinTool mentioned in the tutorial. Other than that, if you have any questions just ask! Here goes... I'll write a quick tutorial on how to reskin the Intercity Swallow Class 47 as a separate locomotive (rather than overwriting the original). If you want to use a "Default" asset as a base to start from then please see the end of this first post, which details the additional steps required. I'll make sure it's easy to follow for the less computer-savvy among us and I hope those with more of a technical background don't feel too patronised by my wording This is actually very easy to carry out and simply requires a long-winded explanation, so don't be too daunted by the masses of text you'll see below! First off, you'll need three things: 1) RSBinTool - download and install this to a location of your choice. Again, you can also use Mike's RS_Tools_TMB utility instead if you want to. 2) A graphics package such as Photoshop or Paintshop Pro. Alternatively there are some very good free packages such as The GIMP or Paint.NET 3) Patience. If you have not reskinned before you will need to learn to use the various features your graphics package has on offer. For this there are plenty of tutorials available on the net if you search about. If you have, then there are still .bin files to get to grips with. Once you know how it's easy though. Now for the gritty stuff - To start with, you'll need to make a copy of the folder containing the locomotive, carriage, wagon or object you want to reskin. These can all be found under Rail Simulator\Assets\Kuju\RailSimulator - Railway vehicles are contained within the aptly-named "RailVehicles" folder, which is itself subcategorised into Diesel, Electric, Steam etc... In this case I need to go into "Diesel\Class47 and select the folder "ICS". Make a copy of the folder and rename it to whatever you want, in this case I'll name it IC_Exec, since I'm reskinning the loco into Intercity Executive livery. Now, before you start to reskin you will need to alter the name of the locomotive. To do this you need to find the .bin file located within the "Engine" subfolder, which in this case is called "class47_ICS.bin". No need to rename it, simply copy it and then paste it into your main Rail Simulator directory. Now, in your Rail Simulator directory, locate the file serz.exe and drag the .bin file onto it. This will convert the .bin file to a .xml which we will then be able to edit using RSBinTool. A black DOS box will pop up for a second, after which you should see a new file in the folder called - in this case - class47_ICS.xml. If you want you can now delete class47_ICS.bin. If you need it again you'll still have a copy in the IC_Exec folder you just created. Now you are ready to launch RSBinTool. If it's the first time you've used it, you'll need to tell it where your main Rail Simulator directory is. Once you've done that you're ready to start. Go to File>Open>XML File and select your newly-created .xml file. To many, this will look like a pile of gobbledegook. It is, essentially. But thankfully the bits we need to change are in plain English. The first part is the "Name" section. This can be whatever you like, but should not be changed once you have started distributing the asset or using it in scenarios, as changing it is likely to cause "scenario failed to load" errors since the sim will no longer be able to find the asset. The second part is the "DisplayName" section. Again this can be whatever you like, but in contrast to the "name" section can be changed by the user to suit their tastes. For example I have renamed all my Class 47s to be listed as "Class 47 - Operator - Livery". Choose carefully as this is the name that will be displayed within the sim, for example in the editor's rolling stock list. You will then need to find the following two lines (which are found together a bit further down) and edit them to reflect the new folder name. In this case, ...would need to be changed to Once you're done, go to File>Save and select "yes" when asked to overwrite. You will now need to go back to your main Rail Simulator folder and drag the .xml file (not the .bin file) onto serz.exe. This will reverse the process and convert the .xml to a .bin file. If you didn't delete the original .bin file, it will simply be overwritten. Once that's done, copy or drag the new .bin file to your IC_Exec\Engine folder, and overwrite the old one. Your locomotive now has a new name. If you want to check it in the editor, simply delete the blueprints.pak file from Rail Simulator\Assets\Kuju\RailSimulator and launch the sim Using a "Default" asset as a base, rather than an existing reskin. If you want to use a "default" asset as a base to work off rather than one of the built-in reskins (as in some cases that's all you get, the BR van being one example) then it's slightly different. I've just tested this out by making a fictional BR Blue version of the Standard Van and it turns out all you need to do is make a copy of the folder and then edit the .bin file (see my first post) to change each occurence of the file path from \RailVehicles\Freight\StandardVan\Default to \RailVehicles\Freight\StandardVan\NameOfNewFolder. Takes a bit more time, but it works.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702019913/warc/CC-MAIN-20130516110019-00013-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
5,935
22
https://discourse.elm-lang.org/t/behaviour-of-input-fields/1359
code
@eelcoh I believe in this case Element.Input.textKey is actually what you need to use. Quoting the docs (emphasis original): Style Elements renders a text input using defaultValue, but if the value changes in your model, but not as a result of the input onChange event, then your input and model will get out of sync. So, if you manually change the value of a text input in your model, you need to ensure this key changes. A common way to do this is to maintain increment a counter whenever you manually change the text. This option will be removed as soon as this bug is addressed farther upstream. So if it feels awkward and like a hack, it’s because it is. In particular, I’d strongly advise considering migration to the same author’s stylish-elephants library, as it seems to have this bug/hack fixed — at least for me it worked OK out of the box, while I had to use textKey previously.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867055.95/warc/CC-MAIN-20180624195735-20180624215735-00381.warc.gz
CC-MAIN-2018-26
898
7
https://github.com/sarenji/beantest
code
Beantest tests your specs every time you save. If your machine has growl (Mac OS X) or notify-send (Ubuntu), beantest will also send an alert on test complete containing the tests passed, the tests total, and if any tests failed. Beantest assumes you are using jasmine-node for your tests. How to use $ npm install -g beantest $ cd your_repo/ $ beantest How it works beantest on the command-line, and it will search for a folder called spec on the current directory. It will run jasmine-node on the contents of that folder. .coffee file in your project is modified, the tests will re-run. .js files will not trigger if there is a .coffee version of that file.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512501.27/warc/CC-MAIN-20181020013721-20181020035221-00350.warc.gz
CC-MAIN-2018-43
659
10
https://forums.tomshardware.com/threads/low-gpu-usage.3773737/#post-22770130
code
I have an i5-9600kf clocked at 4.3GHz and rtx 3060 boosting over 2000MHz and it stays below 50% usage when playing battlefield. I have changed all my settings to max performance and have updated all drivers. Any help is appreciated thanks. CPU figures out what needs to be in a given frame (imagine a rough sketch) based on user and game world input. Issues draw call to GPU to tell it what to render. Think of this as positional tracking. How many things are moving (or have the potential to) from one frame to the next. GPU receives draw call and makes a pretty picture. Sends to monitor when complete. This is detail. Object is now in new position, how has lighting/shading/etc changed. Re-draw object per game/quality rules. The GPU can't do any work until the CPU tells it what to draw. Raising graphics settings and/or resolution increases the complexity of the GPU's job, making it take longer to render each frame. Lowering settings decreases the complexity of the GPUs job making it take less time to render each frame. If the GPU finishes rendering a frame before the CPU has finished figuring out what the next frame should contain, the GPU has to wait (<100% GPU usage). Based on #3 & #4, you should be able to optimize for 90% or greater GPU usage (depending on a game's CPU stress and the CPU/GPU balance of a system) Generally, the more unique reactions that can take place in a game, the more stressful it is on a CPU. This may include online gameplay where each players' actions need to be tracked, or it may be a lot of AI/NPC characters/units on screen, or even destructible environments. Conversely, if the graphical complexity of the game art is simple (ie CS:GO) the GPU may be able to crank out frames at such an incredible rate that the CPU becomes the limitation. I do not have a frame limiter set. I am on medium graphics, I have all my Nvidia control panel and system setting on max performance, low latency modes enabled stuff like that I've done all of it I think and I am not getting anywhere near the fps other people are posting on the game. The system is quite fresh btw and I have not really had issues most of the time but occasionally in some games it just doesn't go above 50, just then I got it to 70% in loading screen and when i spawned straight back to 30%. it's on an SSD, I have 32gb 4200mhz ram, I have a high end 3060 and the cpu is boosted, same game reso and settings and my internet speed is about 700mbps. Nothing should be an issue, this guy was getting over 144fps whilst Im getting below 100 with stuttering. I have tested offline and online at all qualities, similar fps with all and stuttering, 30-40% usage on all aswell. ram is running at 4200 2x16. yes the video is different but I should be seeing better results either way. Yes I ran the same game in the same system and it was smooth sailing off the bat.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334992.20/warc/CC-MAIN-20220927064738-20220927094738-00016.warc.gz
CC-MAIN-2022-40
2,864
12
https://blog.xibo.org.uk/xibo-for-windows-v2-r201/
code
Xibo are pleased to announce Xibo for Windows v2 R201. This release works with Xibo CMS version 2 and has legacy mode for version 1.8. Features and Issues resolved in this release: - A new version of the Watchdog is included with support for hardware monitoring. thanks to @ZoranIT - Support for turning Proof of Play statistics on/off on (v2 feature) - Use TLS 1.2 connections by default - Skip Layouts which have all Widgets expired - Report the device name independently of storage stats - Support for forcing HTTPS (v2 feature) - Support for moving CMS (v2 feature) Instructions for upgrading from an earlier release can be found in the FAQ. If you have a white label build of the application, the upgrade is available in your Xibo customer portal account.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662520817.27/warc/CC-MAIN-20220517194243-20220517224243-00447.warc.gz
CC-MAIN-2022-21
760
11
https://www.exceltip.com/date-time-in-vba/identifying-duplicate-time-frames.html
code
If you want to find out the duplicate row having multiple entries for same person & you want to find out duplicate entries, then you should not miss this article. We will provide a macro code to help you identifying the duplicate rows. In this article, we will learn how to find duplicated rows based on particular column. Question: I have a spreadsheet with multiple time stamped entries for people. These people can clock in or out in several places at the same time. Trying to write a formula or macro (not sure which achieves the aim best in this case) that will search the data and highlight in red lines with times that overlap for a specific person. Is this possible and is it something somebody could help with please? Many thanks. The original question can be found here Following is the snapshot of before sheet: Following is the snapshot of after sheet: To get the code; we need to follow the below steps to launch Visual Basic editor screen Sub FindOverlapTime() Dim rng As Range, cell As Range, trng As Range, tcell As Range Dim lr As Long lr = Cells(Rows.Count, "A").End(xlUp).Row Range("A2:H" & lr).Interior.ColorIndex = xlNone Set rng = Range("C2:C" & lr) For Each cell In rng If Application.CountIf(Range("C2", cell), cell.Value) > 1 Then Set trng = Range("F2:F" & cell.Row - 1) For Each tcell In trng If tcell.Offset(0, -3) = cell Then If (cell.Offset(0, 3) >= tcell And cell.Offset(0, 3) <= tcell.Offset(0, 1)) _ Or (cell.Offset(0, 4) >= tcell And cell.Offset(0, 4) <= tcell.Offset(0, 1)) Then Range("A" & cell.Row & ":H" & cell.Row).Interior.ColorIndex = 3 End If End If Next tcell End If Next cell End Sub Conclusion: In this way, we can find duplicate values using macro code and can remove them later. If you liked our blogs, share it with your friends on Facebook. And also you can follow us on Twitter and Facebook. We would love to hear from you, do let us know how we can improve, complement or innovate our work and make it better for you. Write us at [email protected] The applications/code on this site are distributed as is and without warranties or liability. In no event shall the owner of the copyrights, or the authors of the applications/code be liable for any loss of profit, any problems or any damage resulting from the use or evaluation of the applications/code.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103915196.47/warc/CC-MAIN-20220630213820-20220701003820-00540.warc.gz
CC-MAIN-2022-27
2,315
11
https://git.jeyserver.com/explore/projects?non_archived=true&page=2&sort=latest_activity_desc
code
For SMS package based on Jalno Watch and Analyze Nginx access logs to block bad bots and crawlers. forked from paquettg/php-html-parser forked from paquettg/string-encoder REST client for the OSRM server API QR Code Generator for Jalno Jalno enum implementation for classic PHP SDKs. An easy-to-use Jalno ACME v2 client library, designed to be used with LetsEncrypt. Forked from yourivw/LEClient Jalno SDK for PayPal RESTful APIs. PHP SDK for integrating with PayPal's Express Checkout / MassPay / Web Payments Pro APIs PHPOffice/PhpSpreadsheet for Jalno Telgram-bot API for webuilder requested project for show tree-structured bloodline Created by Codova Autoloader Generator: Find classes and interfaces in a tree and generate autoloader for webuilder Tool to find and possibly fix backward incompatible changes in your existing codebase when upgrading to or preparing for PHP7.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00827.warc.gz
CC-MAIN-2023-50
880
18
http://chandpriyankara.blogspot.com/2010/08/
code
DWR is Easy Ajax for Java With Reverse Ajax, DWR allows Java code running on a server to use client side APIs to publish updates to arbitrary groups of browsers. This allows interaction 2 ways - browser calling server and server calling browser. DWR supports Comet, Polling and Piggyback (sending data in with normal requests) as ways to publish to browsers. DWR provides integration with Dojo, TIBCO GI, Scriptaculous in the browser, and with Spring, Struts, Guice, Hibernate and others on the serve
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583792338.50/warc/CC-MAIN-20190121111139-20190121133139-00324.warc.gz
CC-MAIN-2019-04
500
3
https://dansis.dk/seminar/2024-fluid-structure-interaction/
code
Fluid structure interaction is part of many applications and plays an important role in performance and durability of many product. Computation of Fluid Structure Interaction is far from trivial and requires stable nummerical models of both the fluid and structural part of the problem as well as suitable coupling algoritms. In this seminar we will gain insights from some of the expects within the field from academia and industry in Denmark and abroad. After the seminar (around 16:10) we will have this years general assembly. Please note that the general assembly will be in Danish. |9:00||Registration and Coffee| |9:30||Welcome||Damien Grevain, HOFOR, Denmark| |9:45||Introduction to FSI||Hua-Dong Yao, Chalmers University of Technology, Sweden| |11:00||Dynamic Fluid Structure Interaction of Racing Sail Boats||Stig Staghøj Knudsen, Staghoj, Denmark| |11:30||FSI og Fishing net||Joakim Hagglund, OneSubsea, Sweden| |12:00||Lunch and lab tour| |13:30||FSI modelling on soft kites, measurements and validation||Jelle Poland and Oriol Cayon, Delft University of Technology, Netherlands| |14:00||Hydro-Elastic Analysis of Oscillating Plates in Normal Flow||Jacob Andersen, Aalborg University, AAU Build, Denmerk| |15:00||FSI capabilites at Tetra Pak||Andreas Lindahl, Tetra Pak, Sweden| |15:30||FSI on cars||Andy Lewis, Aerotak, Denmark| |16:00||Closing remarks||Knud Erik Meyer, DTU Construct, Denmark|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00535.warc.gz
CC-MAIN-2023-50
1,408
13
http://www.knittinghelp.com/forum/showthread.php?t=92203
code
Originally Posted by MGM I am just imagining the interesting sunburn marks this hat would leave though! Don't forget the sunscreen! Thanks a lot))) Well my daughter wore this hat in such a heat but nothing happen She has much hair on her head))) But I like the way you imagine, it is funny to have such sunburn
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982937576.65/warc/CC-MAIN-20160823200857-00212-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
310
6
https://trilinos.org/mailman/archives/trilinos-users_trilinos.org/2015-July/005060.html
code
ljchang94 at kaist.ac.kr Wed Jul 15 01:52:03 EDT 2015 Dear Trilinos developers and users, I'm using Anasazi package to diagonalize matrices with Epetra_CrsMatrix.(Eigensolver is BlockDavidson) My problem is that diagonalization sometimes not converged. The characteristics of the matrix that i want to diagonalize are 1. diagonal dominent 3. almost 80~90% of entries are zero 4. i want to know a few lowest eigenvalues Are there any options which are efficient for diagonalizing these kinds of matrices ? or any comment to set parameters such as numblocks, maxiteration, number of blocks and etc? -------------- next part -------------- An HTML attachment was scrubbed... More information about the Trilinos-Users
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662584398.89/warc/CC-MAIN-20220525085552-20220525115552-00336.warc.gz
CC-MAIN-2022-21
713
14
https://argumentativeessaypapers.com/2020/09/26/what-is-a-lab-write-up_yx/
code
You probably know a mla works cited page alphabetical order bit, and you will learn more in this course, about the technological, political, and health impacts what is a lab write up of radioactivity. the information what is the purpose of a research proposal scoring rubrics for essay writing provided in a lab report is specific branding dissertation topics enough that the reader what is a lab write up gets a clear picture of the experiment carried out by tuition assignments east the researcher. essay: restate the purpose or the problem. it should contain your hypothesis and a brief justification, a summary what is a lab write up of your findings, and a. explain the setup of the lab, control/variable, etc. mole percent oxygen in air lab write up: i hoped to accomplish that engel problem solving strategies i would have a clear understanding of diffusion and osmosis. abstract: martin luther king jr writing paper safety equipment (googles, latex gloves, and safety aprons) are equipped. throughout the semester, you event management dissertation topics will be collecting data and reporting that data in 5 micro-reports your formal lab write-up must have the following, clearly sectioned on your paper: step 1:.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703499999.6/warc/CC-MAIN-20210116014637-20210116044637-00040.warc.gz
CC-MAIN-2021-04
1,222
1
http://allgovernmentjobs.co.in/jr-research-fellow-notification-in-iit-delhi/
code
Junior Research Fellow Job applications are invited from Indian Institute of Technology Delhi for the Indian citizens under the Industrial Research & Development Unit. These government jobs are purely on temporary basis for a period of one year. The complete details of this job notification are given below. So apply to this job if you are interested. Jr. Research Fellow No. of vacancies: 1 Jobs Pay scale: Rs. 16,000/- per month plus HRA @30% (as per rules) Department: Industrial Research & Development Unit M. Sc in organic chemistry with valid GATE or 1st class M. Tech In science biotechnology and must be leading to Ph.D Job type: Contract basis. Job posting: Indian Institute of Technology Delhi. Candidates have to apply this job by post, for details check the notification. Opening date: 02-01-2013 Closing date: 16-01-2013 Official website: http://ird.iitd.ac.in
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701508530/warc/CC-MAIN-20130516105148-00040-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
874
12
https://www.indiedb.com/downloads/cetetorius-v020-pre-alpha
code
Update v0.2.0 Pre-Alpha Changes list in full descrition! Update v0.2.0 Pre-Alpha: - Added tavern to Woodenhill - Changed Interface - Changed main menu - Added "News" window to main menu - Added compass and quests navigation - New torchlights - "Delete Character" button now have submenu - Added new music - New game icon - New model for NPC "Lorian" - Added sounds to interface buttons - Deleted "Food Basket" in hands - Fixed interface bugs
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710898.93/warc/CC-MAIN-20221202050510-20221202080510-00363.warc.gz
CC-MAIN-2022-49
441
15
http://mathhelpforum.com/algebra/214361-basic-arithmetic-surds.html
code
Express (2root5 - 3root10)^2 in the form a+broot2 and hence find the values of a and b. If you can please help and explain the method and how to solve equations similar to this. Thanks Follow Math Help Forum on Facebook and Google+ That is not an equation. Anyway: , so: a = 50, b = -60 Last edited by veileen; Mar 6th 2013 at 09:50 PM. show us some of your work...apply the well known identity (a-b)^2 =a^2+b^2-2ab....where a and b could be anything...in your case 2root5 or 2root10......try it View Tag Cloud
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120001.0/warc/CC-MAIN-20170423031200-00411-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
510
7
https://subreply.com/lucian/ko9
code
i often either feel im not programming enough, or, not reading enough. have yet to find a middle ground i like Programming turns thoughts into money. Absolutely, but my personal constraint is that I'm not satisfied understanding a lot about one, or mostly one, thing. Moreover, if the quality of thought at all reflects in the amount of money returned, it seems imperative, to me, that I should improve the quality of my thoughts by reading. Ouroboros all the way down. Read more, let the programming come to you. Reading is always good
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360107.7/warc/CC-MAIN-20210228024418-20210228054418-00036.warc.gz
CC-MAIN-2021-10
536
4
https://www.mail-archive.com/[email protected]/msg256960.html
code
* Bruce Momjian ([email protected]) wrote: > On Wed, Mar 4, 2015 at 10:52:30AM -0500, Stephen Frost wrote: > > The first is a "don't break anything" approach which would move the > > needle between "network data sensitivity" and "on-disk data sensitivity" > > a bit back in the direction of making the network data more sensitive. > > > > this approach looks like this: pre-determine and store the values (on a > > per-user basis, so a new field in pg_authid or some hack on the existing > > field) which will be sent to the client in the AuthenticationMD5Password > > message. Further, calculate a random salt to be used when storing data > > in pg_authid. Then, for however many variations we feel are necessary, > > calculate and store, for each AuthenticationMD5Password value: > > > > md5_challenge, hash(salt || response) > > > > We wouldn't store 4 billion of these, of course, which means that the > > challenge / response system becomes less effective on a per-user basis. > > We could, however, store X number of these and provide a lock-out > > mechanism (something users have asked after for a long time..) which > > would make it likely that the account would be locked before the > > attacker was able to gain access. Further, an attacker with access to > > the backend still wouldn't see the user's cleartext password, nor would > > we store the cleartext password or a token in pg_authid which could be > > directly used for authentication, and we don't break the wireline > > protocol or existing installations (since we could detect that the > > pg_authid entry has the old-style and simply 'upgrade' it). > > What does storing multiple hash(password || stoarage_salt) values do for > us that session_salt doesn't already do? By storing a hash of the result of the challenge/response, we wouldn't be susceptible to attacks where the user has gained access to the contents of pg_authid because the values there would not be (directly) useful for authentication. Today, an attacker can take what's in pg_authid and directly use it to authenticate (which is what the interwebs are complaining about). We wouldn't want to do that for just a single value though because then there wouldn't be any value to the challenge/response system (which is intended to prevent replay attacks where the attacker has sniffed a value from the network and then uses that value to authenticate themselves). The only way we can keep the session salt random without breaking the wireline protocol is to keep the raw data necessary for authentication in pg_authid (as we do now) since we'd need that information to recreate the results of the random session salt+user-hash for comparison. This is essentially a middle ground which maintains the existing wireline protocol while changing what is in pg_authid to be something that an attacker can't trivially use to authenticate. It is not a proper solution as that requires changing the wireline protocol (or, really, extending it with another auth method that's better). Thanks, Stephen Description: Digital signature
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00643.warc.gz
CC-MAIN-2022-40
3,060
3
https://www.oreilly.com/library/view/microsoft-sql-servertm/0672324687/0672324687_ch05lev1sec2.html
code
Before installing SQL Server, make sure that you have read the documentation regarding installation that ships with SQL Server 2000. Also, make sure that your system meets the minimum requirements. To help you with your installation, use the following worksheet. Before you can install SQL Server 2000, you must install IE 5.0. IE 5.0 is located on the SQL Server CD; select SQL Server Prerequisites from the startup screen from the SQL Server 2000 installation program. Check off the following items as you complete or verify them: Hardware and PC Setup: Computer is Intel (32-bit x86) Pentium 166 MHz or higher and is on the Windows NT Hardware Compatibility list. Memory: 64M (32M on Windows ...
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528220.95/warc/CC-MAIN-20190722201122-20190722223122-00186.warc.gz
CC-MAIN-2019-30
698
6
http://www.tipidpc.com/viewtopic.php?tid=175234
code
migsvill Send Message View User Items on April 16, 2014 02:49 PM Here is a sample vba code. What this code does is open every excel file in a given directory and copy the sheet2 of main.xlsm (your main excel file that will contain this macro). Again sheet2 of this file will replace sheet2 of 100 files in your folder. The code below will open one of 100 files one by one and will delete sheet2, excel will prompt you if you really delete the sheet2, then activate the main excel file then copy the sheet2 of this file to one of the 100 files just opened. After copying the sheet2, this file will be closed. Then another file will be opened. 1. Create main.xlsm 2. Make sheet2 of this file as the one that will replace the sheet2 of the 100 excel files 3. Copy the 2 macro below into the module of main.xlsm Dim file_name As String Dim Folder As String Dim File As String Folder = "c:\tpc\project 1" File = Dir(Folder & "\*.xlsx") 'Counter how many files are opened and processed numberOfFiles = 0 Do While File <> "" file_name = Folder & "\" & File MsgBox "name of file to be revised is " & File 'Replace sheet2 of the file just opened numberOfFiles = numberOfFiles + 1 'Save the file before closing File = Dir MsgBox "done, there are " & numberOfFiles & " files processed!!" Sub ReplaceSheetOf(fileNameTo As String) 'Delete sheet2 of this file 'Activate the main file and copy its sheet2 to filenameTo MsgBox "sheet2 of main.xlsm was copied to " & fileNameTo 4. In the example macro above, You should put your 100 files in directory c:\tpc\project 1, I repeat, project 1 is a sub-directory of the tpc directory under c drive, or revise the macro depending on the current directory of your 100 files. 1. Before running the macro with your real files, it is better to run some sample files say 5 files first to familiarize with this macro. 2. I provide some msgbox along the code so, it is better to comment this out if you will be running your real 100 files, as otherwise you will be pressing these boxes num_file times. 3. Always make a backup of your original files. 4. There are comment in the code, have a look on it. 5. Do not put other excel files in the directory, because it will be opened get processed. Only those 100 files will be in that directory. 6. If you run a sample run just put 5 files in that directory. 7. A msgbox will display how many files are processed after the run. 8. I have tried this code for 3 files and it worked. 9. Do not include your main.xlsm in the the directory of your 100 files. Save it somewhere. -- edited by ram2010 on Apr 16 2014, 10:41 PM
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223203422.8/warc/CC-MAIN-20140423032003-00656-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
2,585
42
https://it.toolbox.com/blogs/stefanfrost/part-3-modeling-one-model-for-persistence-and-access-using-3rd-normal-form-031211
code
The example for this discussion will be a simplified sales receipt in a Business to Consumer industry. The example follows the previous posts on the same topic. Ok, so let’s look at the 3 rd normal form data model and how it supports my master data definition on data behaviour and what implications might exist… The 3rd Normal Form; As the 3 rd normal form really do not classify types of data to different table formats, the same constraint relate to transaction data as for master data and reference structures. Relations that are embedded within one table that refer to another table, either in 0 or 1 to many or 0 or 1 to 1, could cause a reengineering requirement down the line, either at a grain shift or as new relationships are discovered. Another issue relate to history; how can we track history and maintain historical relationships? One way might be to create surrogate keys for any period and key combination, but what happens if foreign keys are implemented this way? Well, we end up creating historical posts on relating objects even though that object hasn’t really changed. This eventually ties a knot on any model, preventing effective, parallel data integration processes and it will also limits our possibility to add historical additions to our current model. OK, so this is not best practice, I know this. Instead we build any historical relationships, into separate relationship tables…. So we can either build the relationship on surrogate keys / versioning keys or on the natural key with disregard to history. The latest is common practice and what happens is that grain is collapsed and the historical relationship becomes untied, which is good from a model lifecycle perspective, but increases complexity from a data access perspective. Each relationship must filter each joined table with some sort of date constraint. Another possibility (for good and bad) with untied history is that we allow us to filter and mix any time perspective on any joined table. Each problem identified in the section above relate to keeping historical attributes within a table for a specific object, and it could be debateable wither to actually store history in our “common” model or to move any history into separate history tables… But what happens then? Complexity is created for the historical perspective but simplifies thing for the current value perspective, and for the combination - doubles the effort. Implementing history tables is a small step towards data vault modelling and some other methods so the following debate becomes what purpose the attributes in the “common” model has, perhaps they all could be moved to separate tables? Voila… what do we have now? This is an image representing a time versioning surrogate key and relationships based on that versioning key. It really illustrates a bad example but an actual model implementation I’ve seen! So, what about transactional data… The 3rd Normal Form is in all it’s glory a model optimized for most RDBMS but also a modelling method were we have many-many modelling options for any scenario. This particulate example is not a state of the art 3 rd normal form representative, but it proves a point. It shows embedded relationships in entities/tables which lead to dependencies. Dependencies that limit our ability to either build parallel loads or to have referential integrity control. Each shift of grain within an embedded relationship leads to re-engineering and data migration. Each additional attribute on an existing object leads to re-engineering and in some cases were we load historical attributes on historical object, each and every relationship might need to be reloaded! In some cases the entire model. Ok, nobody actually implements the relationship in that way, we just relate the keys and use dates for filtering appropriate or implement a surrogate key for each version of the natural key. So what happens in these scenarios is just that we don’t do historical additions! It’s just too expensive, so we leave the historical perspective on the new attribute with null or defaults. The bottom line regarding the 3 rd normal form as a method for rapid development, flexible data modelling, ease of use, high performance analytical access, and as a baseline for a EDW 10+ years lifecycle implementation is the following; - Rapid development; until we build table dependencies a model can be produced and loaded with great pace. But as soon as dependencies and model alterations are needed the price tag for any implementation accelerates. - Flexible data modelling; 3rd normal form can be quite flexible when used carefully. Loosing up dependencies and implementing changes with model additions instead of alterations can keep the model flexible. However when modelling strict according to 3rd normal form rules this is rarely the case. - Ease of use; one could claim that 3rd normal form represents how information relates in a nice manner and therefore is easy to use. But really how many business users have you worked with that can actually read and understand a 3rdnormal form data model? - High performance analytical access; some databases (and leading dw-databases) claim it is the optimal data model for storage AND access, however some analysis will result in join overhead so depending on your technology this might be right and wrong. - Baseline for an EDW 10+ year’s lifecycle implementation: in similarity to dimensional models this approach is also valid as an EDW baseline. As with dimensional modelling any “equal” requirement will cost more to implement 3 iterations down in the lifecycle, but most likely this “baggage” is less than for dimensional modelling. I personally think that 3rd normal form implementations tie a knot on itself after a number of iterations and if we try to loosen these knots we either reduce access performance and/or make data harder to use. Next post will be out in one week and the same approach / discussion will go trough the data vault as a baseline for a One Model fits all EDW implementation!
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948126.97/warc/CC-MAIN-20180426105552-20180426125552-00090.warc.gz
CC-MAIN-2018-17
6,083
16
http://bilingua-solutions.co.uk/french-interpreter-nottinghamshire.php
code
I obey a strict Code of Conduct – impartiality, confidentiality and professionalism being the key aspects of that Code. I am a professional who knows that accuracy and adaptability matter in all circumstances. Interpreting in a legal or medical environment. Business meetings/discussions, simultaneous or consecutive interpreting, conference interpreting, sight-translations, phone interpreting, voice-over, sub-titling... I can help. Fees are based upon the assignment and the length of the booking, just give me a call (or email me) and tell me what are your requirements and I shall tell you promptly whether I can help you. Website design Nottingham by WOW Design Solutions
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00830.warc.gz
CC-MAIN-2024-10
679
5
http://www.ghostvillage.com/ghostcommunity/index.php?s=78578301686b56adfa1662efa91e0381&showtopic=24697&page=1
code
The 'Would you ever...' or 'what would you do if....' game. So basic rules are just ask "Would you ever.....?" or, you guessed it, 'what woud you do if....?' Then the next person answers and adds their own 'Would you ever' or 'what would you do if' question. They can be as silly as you want or as serious as you want. To start off heres my example. Would you ever bungee jump? Edited by leonie, 04 August 2008 - 02:42 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518337.65/warc/CC-MAIN-20191209065626-20191209093626-00039.warc.gz
CC-MAIN-2019-51
422
6
https://books.google.bg/books?id=vtNWAAAAMAAJ&hl=bg&source=gbs_navlinks_s
code
Какво казват хората - Напишете рецензия Не намерихме рецензии на обичайните места. A Complexity Measure The Structured Testing Technique 7 други раздела не са показани ACES algorithm analysis anomalous modules baseline path Blackjack calculation circuits complexity measure complexity metrics computer program constructs control flow control graph control paths correlation cyclomatic complexity cyclomatic number DEALER Debugging decision defined directed graph edge entry essential complexity example exit nodes Experiment factors Fortran FORTRAN program functional GOTO gram graph theory Halstead's identify IEEE TRANSACTIONS implementation independent circuits independent paths information flow complexity logic loop maintenance mathematical McCabe McCabe's metric McCabe's V(G ment method modification NEXTCARD710 number of errors number of knots number of paths percent performance phase PLAYER plexity problem procedure program complexity reachability regression testing relationship Section shown software development software engineering software errors software maintenance software metrics software system specification stage struc structured programming sub-systems subroutines Table test paths test set testing methodology testing process Theorem tion TRANSACTIONS ON SOFTWARE unstructured valid paths validation values variables verification
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986660231.30/warc/CC-MAIN-20191015182235-20191015205735-00509.warc.gz
CC-MAIN-2019-43
1,449
6
http://www.coderanch.com/t/235/ol/PSP-JRun
code
File APIs for Java Developers Manipulate DOC, XLS, PPT, PDF and many others from your application. A friendly place for programming greenhorns! Big Moose Saloon Register / Login Win a copy of Getting MEAN with Mongo, Express, Angular, and Node this week in the PSP in JRun4 Joined: Jul 26, 2006 Oct 07, 2006 23:57:00 Can anybody tell me how to deploy Python Server Pages in JRun4. Thanks in Advance. With a little knowledge, a cast iron skillet is non-stick and lasts a lifetime. subject: PSP in JRun4 Struts in Jrun4 JBoss with Axis How to Connect JRUN4 in Eclipse 3.2 ?? Error in jsp when making jstl change All times are in JavaRanch time: GMT-6 in summer, GMT-7 in winter | Powered by Copyright © 1998-2015
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430456360595.57/warc/CC-MAIN-20150501045920-00028-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
711
24
https://mail.python.org/pipermail/python-dev/2011-June/112081.html
code
[Python-Dev] Issue10403 - using 'attributes' instead of members in documentation fuzzyman at voidspace.org.uk Tue Jun 28 15:25:13 CEST 2011 On 28/06/2011 13:56, Michael Foord wrote: > On 28/06/2011 13:31, Nick Coghlan wrote: >> On Tue, Jun 28, 2011 at 8:54 PM, Michael Foord >> <fuzzyman at voidspace.org.uk> wrote: >>> The problem with "data attributes" is that it doesn't mean >>> *anything*, which >>> I suppose is useful for invented terminology, but it means it >>> doesn't convey >>> anything precise to those who haven't heard the term before. If it >>> widely used then that changes I guess. I'd still normally just use >>> "attributes" though... >> In this context, precision is an illusion. There is *no* precise > "instance members" is precise, (whether or not an attribute is fetched > "from the instance" is one thing that is clear in the python data > model - there are just lots of other ways of fetching attributes too). > "instance members" just doesn't cover all the cases where you may want > to group attributes together though. > However, providing "__getattr__" and "__getattribute__" is not the > common case and even properties are *usually* backed by a real > instance attribute. So "instance attributes" as opposed to other types > of attributes is *often* a useful distinction. > I don't think "data attributes" is clear or precise. Although to be fair "data attributes" mirrors the terminology for descriptors where we have "data descriptors" (which have both __set__ and __get__) and "non data descriptors" (__get__ only). Unfortunately there are also non-non-data decriptors too (only __set__ and / or __delete__) so that terminology is at least slightly confusing / imprecise ... There was a genuine Python "bug" caused by that confusion at one point (unfortunately I forget what it was). All the best, From: http://users.rcn.com/python/download/Descriptor.htm If an object defines both __get__ and __set__, it is considered a data descriptor. Descriptors that only define __get__ are called non-data descriptors (they are typically used for methods but other uses > Is a property a data attribute (well it depends how it is implemented > and what it does), is a staticmethod a data attribute (no - but then > Tres' question - it isn't a normal method either so if you define data > attribute to mean "all non method attributes" then its potentially an > open question). > All the best, > Michael Foord >> not only because Python blurs the boundaries by design in >> many respects (callable or not, method or not, attribute or not, etc), >> but also because *people* use the same words to mean slightly >> different things. >> The best we can hope for is to encourage the right way of thinking >> about the situation, and in that regard you have the complete set of >> attributes accessible via an object (i.e. via __getattribute__), some >> of which are callables (and may or may not act like instance methods) >> and the remainder of which are data attributes (some of which may >> incidentally be callable, even if they aren't used that way). How a >> *particular* attribute is classified is not an inherent property of >> the attribute, but also an artifact of the way it is used by the May you do good and not evil May you find forgiveness for yourself and forgive others May you share freely, never taking more than you give. -- the sqlite blessing http://www.sqlite.org/different.html More information about the Python-Dev
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583700734.43/warc/CC-MAIN-20190120062400-20190120084400-00163.warc.gz
CC-MAIN-2019-04
3,461
61
https://mail.python.org/pipermail/python-list/2009-August/547120.html
code
nipunreddevil at gmail.com Sun Aug 9 13:03:04 CEST 2009 I will be receiving data serially from another pc,.i can use any sort of marker between two packets,i will be the person sending data as well after reading it from some devices.But packet length is not constant. each packet has this format: another packet could be : What i need is a program to store variables such as:var_a has value 4,var_b has value 5,for second string. I have to read and write data continuosly using serial port. -------------- next part -------------- An HTML attachment was scrubbed... More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866926.96/warc/CC-MAIN-20180624083011-20180624103011-00498.warc.gz
CC-MAIN-2018-26
604
13
https://www.statix.ai/ajax/works/Multitube.html
code
Client: Multitubes B.V. Task: Automate the production registration process and an intelligent planning Due to a sudden growth Multitubes B.V. was in need of a automated production and Machine Failure registration system. We designed an IOT based touch screen solution that catered to all work floor needs, the touch screens are not only interactive but for some inline machines we built a solution so that the two related apps could directly communicate with each other. Production planning was the first step and an integral part, we built a planning which could suggest machine conversions in accordance to product specification and also could plan orders in accordance to urgency all by itself using Machine learning.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057447.52/warc/CC-MAIN-20210923195546-20210923225546-00021.warc.gz
CC-MAIN-2021-39
720
5
https://www.ratemyteachers.com/simoff/335220-t
code
I apparently was the only one who got on her good side. The worksheets were redundant though and most of the stuff we did was worthless busy work. But, I survived. she yells at u for asking questions. she never answers you questions and gives u homework for things she dont teach! Matt Grego This is the dumbest class ever...and gee...do you think that you could smile a bit, your some evil person, that thinks that we know everything. You seem to not like kids...and you never smile. It was a real pain in the side getting through ur class I HATE HER she tried to give me detention for printing wrong... how in the world do you print wrong? and she gave a kid detention for sneezing.. yeah thats cool Geez, it's not quite fair to give a detention to someone who asks to go to the restroom. It's almost painful hearing her threaten every person with detention. xX She has issues with giving people detention. And you people better pay attention, see? Aww i am happy that i am out of that class. i hate her with a passion and it was really funny when she gave mike detention cuz he rasied his hand! hahaha pointless class that everyone hates...need i say more?!
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806832.87/warc/CC-MAIN-20171123123458-20171123143458-00193.warc.gz
CC-MAIN-2017-47
1,160
9
http://www.meetup.com/Lean-Startup-Seattle/members/12771902/?memberId=12771902&op=
code
Seattle, WAUSA 98109 October 14, 2011 Co-Founder & CEO of Meevine, author of OneBusAway for Android. I like wearing different hats. Meevine makes Gatherball, a social activity planner to do more with your friends. We've been adding Lean principles over the past few months, and always have more to learn! PivotalTracker has been one of the most effective tools for making sure we're iterating well. We're now experimenting with tracking non-product stories/experiments with it. IDK if Lorraine knows that you make OneBusAway, or her message would have had more squee in it ;-) I am personally really excited about meeting you in person. I just used OBA to get to the symphony where I am working a bit before Rachmaninov starts, and just saw that you're coming to our meetup.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698693943/warc/CC-MAIN-20130516100453-00076-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
774
6
https://kimballrexford.com/controlled-user-submitted-content/
code
Two clients recently wanted forms for accepting user input. When submitted the input is rolled up into a standard WP Post. But we want to prompt the user for certain types of information in order to generate consistently structured and organized posts. To make this happen I started with a free WP plugin that accepts user input. Then I built a custom input form that prompts the user for separate chunks of content. On submit the system validates the inputs, merges the chunks, and formats a consistently structured WP Post. Some fields get merged to generate the post title. All of the fields get merged together to generate consistently structured body content. In the body content some of the fields will get titles added to them. But we never show the title for a section that the user did not provide.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00885.warc.gz
CC-MAIN-2023-50
807
2
http://www.montana.edu/uit/lists/listowner.html
code
Sympa Email Commands for List Owners List owners can manage their lists by emailing commands to the list server (Sympa) or via the web interface. See Sympa's Web Interface:A Short Guide for Listowners for information and instructions on using Sympa's web interface. Send commands to [email protected] in plain text format. Several commands can be sent in a single message but only one command can be entered on a line. - Add subscriber to list: ADD listname [email protected] John Doe - Add without notificationQUIET ADD listname [email protected] Doe, John - Remove a subscriberDEL listname [email protected] J. Doe - Remove without notification QUIET DEL listname [email protected] John Doe - Review the subscriber listREVIEW listname - Indicate the end of commandsQUIT Email message with multiple commands |ADD||Add a member to the list| |DEL||Remove a member from list| |QUIET||Enter quiet before add or del command to prevent a notification message from being sent to the person being added or deleted.| |Add without notification Remove without notification |REVIEW||Use to get a review of list members| |QUIT||Use as the final command so email signature will be ignored| Please contact MSU List Help ([email protected]) for additional assistance.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514571027.62/warc/CC-MAIN-20190915093509-20190915115509-00160.warc.gz
CC-MAIN-2019-39
1,291
18
http://scriptoriusrex.blogspot.com/2008/11/two-little-known-laws-of-thanksgiving.html
code
1. The Seattle Seahawks cannot play any better no matter how much national attention is brought upon them. 2. Laying on a couch in a semi-conscious state is open invitation for any child under 13 to leap up and bring down all their weight on your unsuspecting body. Twice.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190181.34/warc/CC-MAIN-20170322212950-00360-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
272
2
https://lists.osgeo.org/pipermail/grass-dev/2007-April/030462.html
code
[GRASS-dev] Unused files glynn at gclements.plus.com Tue Apr 17 12:00:06 EDT 2007 Moritz Lennert wrote: > >>> lib/db/dbmi_client/c_add_col.c | db_add_column > >>> lib/db/dbmi_client/c_bindupdate.c | db_bind_update > >>> lib/db/dbmi_client/c_createdb.c | db_create_database > >>> lib/db/dbmi_client/c_delete.c | db_delete > >>> lib/db/dbmi_client/c_deletedb.c | db_delete_database > >>> lib/db/dbmi_client/c_drop_col.c | db_drop_column > >>> lib/db/dbmi_client/c_drop_index.c | db_drop_index > >>> lib/db/dbmi_client/c_drop_tab.c | db_drop_table > >>> lib/db/dbmi_client/c_finddb.c | db_find_database > >>> lib/db/dbmi_client/c_insert.c | db_insert > >>> lib/db/dbmi_client/c_list_idx.c | db_list_indexes > >>> lib/db/dbmi_client/c_listdb.c | db_list_databases > >>> lib/db/dbmi_client/c_openinsert.c | db_open_insert_cursor > >>> lib/db/dbmi_client/c_openupdate.c | db_open_update_cursor > >>> lib/db/dbmi_client/c_update.c | db_update > >>> lib/db/dbmi_client/c_version.c | db_gversion > >>> lib/db/dbmi_client/printtab.c | db_print_column_definition > >>> lib/db/dbmi_client/printtab.c | db_print_table_definition > >>> lib/db/dbmi_driver/d_mkdir.c | db_driver_mkdir > >> Aren't these template functions and files to develop new drivers? > > No; they are the actual client-side DBMI interface. > > I was surprised to find so many of them unused. > On 16/04/07 23:19, Markus Neteler wrote: > > [ ... dbmi ...] > > I feel that DBMI was left in the middle of its development, > > in particular Radim was digging through and making it > > functional (the needed parts). I have no idea which parts > > can be savely abandoned. > If they have useful code in them and could be potentially > used, why not keep them and hope than someone picks things up ? Unless > we decide either > - that implementing these functionalities as scripts as we are doing now > is better or at least just as good (e.g. the v.db.* scripts), or > - that database management should be done via relevant db client > programs (independent of GRASS) or db.execute. FWIW, I wasn't looking to remove the DBMI functions; I just posted the unabridged list of unused library functions. BTW, I suspect that some of the unused dbmi_client functions are due to this in db/base/Makefile: #not used: db.createdb db.dropdb db.databases db.droptable PROGRAMS = db.columns db.copy db.describe db.drivers db.execute db.select db.tables db.connect Also, some of the dbmi_base functions might only be used by the MySQL or SQLite drivers, which I haven't compiled. However, I did remove the unused display and imagery functions. The display functions would never have been used, and the imagery code is in dire need of cleaning up. Removing unused code from lib/imagery required 3 or 4 iterations; every time I removed the unused functions, a new batch of functions would become unused. As to what's left, roughly half of the imagery library is the I_cluster_* functions, which are only used by i.cluster. I'm wondering whether they should be moved to their own library, or even into Glynn Clements <glynn at gclements.plus.com> More information about the grass-dev
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334942.88/warc/CC-MAIN-20220926211042-20220927001042-00415.warc.gz
CC-MAIN-2022-40
3,117
58
https://ujober.com/new/services/i-will-do-keyword-research/
code
Are you looking for affordable keyword research? If so you’re in the right place. Right now you can get the best keyword research done to help you pick which keywords you should go after for your website. This is for a single page of your website i.e. your home page or a product or service page. What I will need is the URL of the page and from there I will deliver a report with keywords you should target along with metrics listing how much is the CPC, how difficult it is to rank for the keyword, and search volume. The number of keywords I deliver will vary as there are a number of determining factors that will come into play with each order. Every order is unique. Keyword research is done in the Google United States search engine. Report will be delivered in an excel spreadsheet which can be opened with Microsoft Excel or Google sheets if you don’t own Microsoft. To order I will need your URL. When you order please message me your URL and I will get to work.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950528.96/warc/CC-MAIN-20230402105054-20230402135054-00122.warc.gz
CC-MAIN-2023-14
976
4