url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
http://msgroups.net/microsoft.public.excel.newusers/how-to-unrestrict-access-to-a/28564
|
code
|
Using Access Queries in Excel
I have a lot of data in access, and I have built a sample query to get the
data summary that I want.
I also have a chart in Excel that charts the data.
What I would like to do, is allow the user to select a data range, for
example and have the query be changed to select the dates chosen.
How do I do that from Excel? Can someone point me to information on this?
Why not do the charting in Access?
It's much simpler to do all the work in one application.
"Give someone a fish and they eat for a day; teach someone to fish and they
eat f...How can I push Access Data into Excel from Access 2007?
I have written macros in Access and Excel to extract data from multiple
spreadsheets, manipulate the data, then import it into tables in Access 2007
to run reports, etc. The data is replaced on a monthly basis. This part
Now I would like to take this data from Access, run queries and push the
data back into an Excel template with 101 worksheets, the first sheet being
a summary, the rest numbered from 001 to 100.
I would like to control this from Access, even if it means running Excel VBA
code from Access (which I do for the importing).
I tried one example that ...Formatting Combined Cells
Below is what I have in Cells A1 thru A3. I can't seem to get cell A3 to
give me AMKD000415. Instead I keep getting AMKD415. I've tried various
cell formatting with no luck. I would really appreciate any suggestions you
may have. Thanks!
Please keep all correspondence within the Group, so all may benefit!
"Betty Csehi" <[email protected]> wrote in message
news:uA...VLOOKUP formula displays in cell, will not return data
I had an older version of Excel (97 maybe?) and our office updated to 2007.
Now my vlookup will not return data. The vlookup formula appears in the
cell or I get the NA#. I've formatted my lookup cells and table to General
but still get the same result.
After formatting the cell as General, re-enter it (F2/Enter) - if you're
still seeing the formula, press Ctrl/~ -- you're looking at the formula layer
instead of the value layer.
> I had an older version of Excel (97 maybe?) and our office updated to 2007.
> Now my vloo...Access 2003 in access 2007
I have an application in access 2003, and it inports and exports the data to
excel 2003. Now users are switching to the windows 2007 and office 2007. My
app can be opened in access 2007, but when I start my macros for export, it
reports a problem, something with formats. More and more users are using
office 2007, and my app is becoming unusable. Please help!
Message posted via AccessMonster.com
if you post here details of your code of macro and error message you get -
then we can try to hel...Access 2003 OLE communication error
MS Access is totally broken on my machine, whenever I attempt to open an
existing database or just open the bare program I always get the error
"A problem occurred while MS Office Access was communicating with the OLE
server or ActiveX control"
It is impossible to regain control of Access, whenever we close the message
box, it just immediately reopens again, and we cannot do anything at all in
including closing down the program. We have to kill it in Task manager.
We have tried repairing Office, we have totally uninstalled Office and
reinstalled it, we hav...Highlighting cells
When I select cells to copy or paste I can't really see which cells are
highlighted because I probably have something set wrong. I would like the
cells I highlight to have a light background color so I can see what is
Any help would be appreciated!!
In MacXL, the highlight color is set in system preferences. Choose
System Preferences/Appearance pane, and change the highlight color to
something more contrasting.
Otherwise, you'll need to use VBA, e.g.:
Though a better way is via Chip Pearson...Problem with copied report in Access 2007
I need to create several reports that are exactly the same but get info from
different queries. I can do this with no problem ... just change the source
for the report ... but the copied report still shows the original report name
in the tab when opened. How do I get it to reflect the new report name
Example - the original report is Employees at CC. I copy/paste and name the
copy Employees at NEC. I then open the report in design view and change the
source and the report displays the correct information. But the tab is still
titled Employees at CC. This will be a problem...Access denied error
We have a series of Word 2003 templates. These templates sit on a network
folder with security permissions of Read & Execute, List Folder Contents,
Read, and Write. Not Modify. A user can open these templates, make a change
and save the changes using Word 2003. The same user using an Office 2007
installation receives an error message of "Access denied. Contact your
administrator". Does anyone know why?
...How do I unrestrict access to files Information Rights Mgmnt?
Yesterday I was working on an excel spreadsheet and could not do "print
preview" without being questioned about Information rights Management in MS
I could not get past this so I went ahead and set up a couple email
addresses of people who could access this file.
Now the software will not properly authorize my opening this file as it
cannot verify my email address. I do not know how to unrestrict the file so
that I can continue working on it.
...How to change color of cell B1 based on value in cell A1
How do I get the background color of cell B1 to change when a value i
entered into cell A1? I'd like for the color of the background to var
depending on the value. Any ideas
dougmcc1's Profile: http://www.excelforum.com/member.php?action=getinfo&userid=8
View this thread: http://www.excelforum.com/showthread.php?threadid=48441
This will help.
With A1 the active cell (and red fill color), select Format>Conditiona
Set Condition 1 to 'Cell Value Is' Greater Than B1 cl...Help
When I open or create a database the only menu option avaialbe is help. The
others are greyed out. How can I resolve. thanks for any input.
If you post your question in one of the Access newsgroups, someone may
be able to help you. This newsgroup is for Excel questions.
> When I open or create a database the only menu option avaialbe is help. The
> others are greyed out. How can I resolve. thanks for any input.
Excel FAQ, Tips & Book List
..."Error Access SQL Data" When Printing Invoice
When I go to try and print an Invoice from Inquiry->Sales->Transaction By
Customer->Selecting the Customer and Selecting the Invoice, then clicking on
the Printer icon in the upper right corner of the window, and sending to
either the screen or printer, I get a box with the message "Error Accessing
SQL Data" in it.
Any ideas on how to fix it?
Can't fix if you can't tell what's happening. First some troubleshooting:
1) Exit GP
2) Open Windows Explorer and locate the DEX.INI file. It will be under your
GP installation f...Access 97 to Access 2000 string functions
I'm having problems converting my Access 97 programs to
Access 2000. String functions such as right(), date(), and
chr(13)&chr(10)used in queries won't convert. I get a
message undefined function. Is there a defect in my
installation? If not, can I define the function or what
is the workaround?
Not a problem with your installation, but likely with the References in your
References problems can be caused by differences in either the location or
file version of certain files between the machine where the application was
developed, and where it's being run (or...Access 97 Gurus?
Anyone have a good grasp of a 15 year old program?
One of my customers is having an issue with Access 97.
4 different mdf files live on Server 2003, which is also a TS.
All 4 are opened and used directly on the TS by RDP clients, over the LAN
and over VPN from remote locations.
All are opened and used by same or different workstations on the LAN over
the wire in the traditional way without RDP.
Some Access is 97 SR1
Some Access is 97 SR2
Some databases seem OK
Some throw errors from SR2 but not SR1 versions.
Originally, It was only one database that had...Read Korean in Access
How do I enable the Korean characters to show up MS Access?
...deny access to public folders
i'm kind of confused as to wear all these would be located on my server and
how to deny some users to there access? please help
On Tue, 20 Mar 2007 11:44:08 -0700, tmolaee
>i'm kind of confused as to wear all these would be located on my server and
>how to deny some users to there access? please help
Can you define the goal? Are you trying to deny access to all the
public folders or just a few?
i'm trying deny access to some of them not all but it would be useful to know
how to deny all as well for the future
"And...Show header in cell
I want to be able to show my header in a cell of the associated spreadsheet?
How about turning things around and having a value in a cell (or cells)
on your worksheet that then forms the header for your report.
I'm not sure myself but this thread seemed to work OK for someone else
Hope this helps
tonywig's Profile: http://www.excelforum.com/member.php?action=getinfo&userid=18985
...OUTLOOK WEB ACCESS #17
I recently applied the most current patches and fixes to
my Exchange 2000 server. Since then, some of the users
are getting attachments in only HTML format when accessing
the server from off site through OUTLOOK WEB ACCESS. They
need to be able to open them in word or at least notepad.
What made the change and how do I get it back?
...Delete all cell comments in workbook
We are a small cpa firm, it is tax season... We frequently copy last
year's workbook to set-up the current year. I'm trying to select and
delete all cell comments as part of this set-up process.
I've tried goto special and the comments section of the Review ribbon,
but I seemed to be stumped in trying to select all cells in the
workbook that contain a comment and then to delete these comments
without cycling through the next comment for each comment on the
As always, help is much appreciated,
I had no problem selecti...Formula cell references
When you double click on a formula that references other cells you usually
see the referenced cells outlined in a color with reference to that same
color in the formula. What is this called and is this something you can
turn on and off? Where?
It's called "Edit In Cell".
You get exactly the same results when you click in the formula bar.
If you turn this off, double clicking in a cell containing a formula will
then make the focus move to the cell(s) referenced in the formula.
<Tools> <Options> <Edit> tab,
Check or uncheck "Edit Directly I...Cell filter deletion
I have about 1400 cells that i need to delete the information AFTER a certain
word. My issue is anything after, in the cell, X400 needs to get deleted. For
example, i have a cell that says X400:c=us\;a= \;p=First
Organizati\;o=Exchange\;s=Little\;g=Cindy\; but in 1400 cells and its every
cell is different. Any suggestions?
please provide an example
before it looks like..........?
After you want it to look like......?
> I have about 1400 cells that i need to delete the information AFTER a certain
> word. My issue is anything after, in the cell, X400 need...Excell Cells: Auto Formatting
I have protected a workesheet and unfortunately when the people submit
information on the cells and it is too long than the actual height of the row
and it wont extend. What can I do?
When protecting the sheet allow users to format cells and rows.
Gord Dibben MS Excel MVP
On Tue, 9 Feb 2010 13:14:01 -0800, Sophie <[email protected]>
>I have protected a workesheet and unfortunately when the people submit
>information on the cells and it is too long than the actual height of the row
> and it wont extend. What can I do?
How do I jus...Internal VS External Access to Exchange Server
Internal Domain Name of domain.local
External Domain Name of domain.com
Exchange server named server.domain.local
and RPC port published on mail.domain.com
How do you publish DNS data for laptop users who wish to move seamlessly
between internal connectitivy to the server.domain.local and external
connectivity to the published RPC port on mail.domain.com???
(Pls without using hosts file as this is a bit of an issue with senior
On Thu, 12 May 2005 13:13:23 +0100, "Jason Fitzpatrick"
<[email protected]> wrote...How to set a range of cells
I recorded a macro and changed it as follow:
If I want to set a range from the last selected cell to B4, how should I go
on with the above?
G Lam <[email protected]> wrote in message
> I recorded a macro and changed it as follow:
> Selection.End(xlDown).Offset(0, 1).Select
> If I want to set a range from the last selecte...
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398449258.99/warc/CC-MAIN-20151124205409-00071-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 12,746 | 215 |
https://escience.washington.edu/using-data-science/hackweeks/planning/hackweek-roles/project-consultant/
|
code
|
The project consultant has a big-picture view of the possible scope of projects for the hackweek community, and helps participants get clear on project ideas and objectives.
- Communicating the purpose and approach of small group collaborations.
- Shaping community ideas into well-defined and realistic project designs.
- Creating a welcoming space for participants to engage in project ideation and completion.
- Post information on Slack to participants about the structure and purpose of hackweek projects.
- Encourage participants to pitch project ideas before the hackweek.
- Assemble and make sense of project ideas.
- Guide the formation of project teams on the first day of the hackweek.
- Facilitate small group collaborations during the hackweek.
- Assist teams in setting goals and sharing results.
- Provide guidance to teams who wish to remain connected after the hackweek.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647525.11/warc/CC-MAIN-20230601010402-20230601040402-00106.warc.gz
|
CC-MAIN-2023-23
| 887 | 11 |
https://community.sensenet.com/blog/
|
code
|
Subscribe to the RSS feed
Our consumer habits and everyday way of life went through significant changes during the last several decades. The most prominent development happened in the field of IT. Services provided by the industry no longer influence only free time activities. Different software, enabling work on-the-go developed for end users are widely used by multinational corporations and small businesses as well.
CI means you have to merge small changes continuously instead of working with large diffs at the end of the development cycle. If you want to be sure that your merge won’t be causing any trouble there are several tasks to do - like creating a sandbox, building and testing on multiple environments, comparing code coverage results, etc… That’s a soul grinding work for a developer - and should be automatized.
Digital workplace (the modern intranet) is a phenomenon that has been lingering around for some time, yet many enterprises are still hesitant to move to digital – especially if the main focus is on the financial aspect. Although IT personnel might be convinced of the necessity to keep up with technology and embrace the 21st Century, C-level decision makers might not always share their view and might be reluctant to vote for a costly change. To tell the truth, there are a number of other factors that cannot be expressed in sheer numbers that would bring invaluable benefit to board, investors, staff and clients as well.
It’s been a long one year, but we’re nearing the end of the componentization project for sensenet ECM. If you tried to keep up with the progress, what you could see, was a bunch of git repositories, NuGet and npm packages popping up now and again, but you may not be sure what each of them really does. You might be thinking “Okay, you tore the whole thing to pieces, but how the hell does it all fit together?” Fear not.
As you may already know sensenet ECM’s UI is being fully rebuilt on a new stack including Redux. Since sensenet is also a development platform with the possibility of building your own app upon its Redux store and actions, let me guide you through the current version of the state tree showing you how we organized data so far.
Six months have passed since we started our very own ‘Sense/Net 10%’ program, where any employee could assemble a team and work on a precious side-project in 10 percent of their time. We had our project closing TGIF presentation last Friday where every team talked about their experiences - and you wouldn’t believe what happened next!
It’s a quite challengeing task to choose a front-end toolset nowadays, especially for a development platform. Our concept with sensenet ECM 7+ is to support a wide range of front-end developers as far as possible with our sn-client-js package that can be integrated into almost every NPM development pipeline. So far so good. But when it comes to build our new UI components we really had to choose between the modern libraries and frameworks. At this point we’ve decided to build on two of them for SPA development. I will explain why we’ve chosen Aurelia besides React.
By the second half of 2017 an enterprise that predestinates itself to be successful shall pay a growing attention not only to making profit, but also to the changing needs of their stakeholders, including their employees. The concept of a digital workplace is not only about a new ergonomic working environment, but it also encompasses a new way of thinking – both of which are, by themselves, beneficial not only to the enterprise, but also to its stakeholders.
Why is it important to document information? The answer is fairly simple: documented company knowledge is easily transmitted, multiplied or updated, and it can be stored securely. Yet, many people still think that the constant documenting slows down creative work, thus decreases productivity. This is however a mistaken thought and as such it does not show forward thinking.
A way to make users prove their identity is an inevitable task for everyone who gets his head around making a content managements system. Sensenet ECM offers a new method for you to achieve this, that uses tokens, namely JWTs.
One of the key points of developing sensenet ECM 7+ was how can we provide nicer ui for our end-users and a more accessible dev platform for the front-end developers at the same time. We could stay with the old asp.net solution or create a custom no-framework one but we ended-up using React and Aurelia. In the following post I try to sum up the whys and hows behind choosing React.
The term of Digital Workplace is not a new expression but still many people use it differently. I like the definition of Gartner the most: “The Digital Workplace enables new, more effective ways of working; raises employee engagement and agility; and exploits consumer-oriented styles and technologies.” Anyway if a company starts to support their employees with more and more connected productivity tools that leads to a Digital Workplace project. However, employees may find the process a bit embarrassing, and they might feel frustrated by the need to change their work environment. This is why project leaders (together with supportive vendors) have to introduce the digital workplace concept in such a way that helps them understand how beneficial this transition could be to them. That is why employees shall understand the many benefits they will gain by embracing the changes.
Dynamic Content Type system sounds amazing, but what does it actually mean? This post tries to clarify the basics and show you how can you take advantage of sensenet ECM’s Content Repository as the new home of your custom company data.
The foundation of sensenet ECM is the Content Repository, where documents, tasks, users, projects – everything is a Content. It is the fundamental building block of the system that makes content management easy and powerful at the same time.
The term ‘headless cms’ has been rising in popularity for a while now. But why the hype and what is it all about?
In their 2004 IPO letter, founders Larry Page and Sergey Brin highlighted their idea of the famous “Google 20%”. A lot of time has passed since then and the legend faded too: is it really 20% of their time, or is it more like “Google 120%”?
One of the most important aspects of a modern software is how to get it into the hands of customers. Especially developers, because they are the ones who will spend most of their time working with our libraries and components.
Us, too. In fact we need better goals, than “making more money” or “creating better stuff”. So last year we decided to be SMART about it and set high-level product goals for ourselves and for our community. After all, we want to be the best ECM development platform for a large community of developers. But how do we get there?
We moved. To Github, with our code and management tools… and our documentation and this blog(!); and to Stack Overflow with your questions and our answers.
We’ve been working on restructuring SenseNet ECMS as a product for a while; now it’s time to change the way we connect with people. The next milestone on our roadmap is to redesign our website in order to make it more streamlined and transparent for you. Our most important aim with the redesign is to provide you all the information you might need when looking for the open source, .NET based ecms that would fit your business needs and still provide a pleasant user experience.
Have you ever wanted to know the permissions of a certain user, not just for a single content but in the whole system? We had a permission setting page for a long time but that did not give administrators the full picture
To fulfill an important need of Sense/Net users that were reported towards us several times recently, we have been developing a brand new, nice and easy-to-use feature in the Product. This is a Survey-editor application, which is being built to be fully customizable and extendable via the templated structure.
Thank you guys for taking your time and completing our test! The result was quite instructive for us. It provided us a solid starting point for us to design the new architecture of the portlet system in SN7.
A new public Community Edition is available for Sense/Net ECM! As always, we offer new features and many bug fixes
As the part of rebuilding the information architecture in SN7 we were highly motivated to redress the Portlet-structure to make its usage more handy
Sense/Net has always been an innovative and open-minded company, with focus on the latest-greatest things. That’s why we decided to start working on a mobile app which makes our users’ life easier.
Based on our former experience with the pickers in Sense/Net and on our UX researches, it was clear that the picker should be revamped in terms of both usability and customizability, to give developers a configurable and maintainable tool.
As the result of the competitor analysis we prepared the redesign of the new, skinnable Picker for SN7. We understood a lot of conceptual expectations from users by looking at our competitors’ solutions. These were all taken into consideration when developing custom solutions for individual picker-types in SN7.
In Sense/Net ECM we rely heavily on our Lucene indexing and search engine: every content modification involves re-indexing the data. This means our indexing subsystem sometimes must handle a really heavy load when many users create or modify content at the same time. In an environment where there are multiple web servers (both generating new indexing activities as users work) things tend to get more complicated and vulnerable to concurrency errors. Indeed we found out that there was a possibility of executing indexing activities in a reversed order.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826114.69/warc/CC-MAIN-20171023145244-20171023165244-00617.warc.gz
|
CC-MAIN-2017-43
| 9,858 | 30 |
https://www.javascripting.com/?p=14
|
code
|
Automatically add a progress bar to your site. #hubspot-open-source
Make your Backbone.js apps dance with a composite application architecture!
An extendable JSON database for Node and the browser powered by lodash
Delightful, performance-focused pure css loading animations.
Next-gen, highly customizable content editor for the browser - based on React and Redux. WYSIWYG on steroids.
Reveal CSS animation as you scroll down a page
Drag and drop, resizing and multi-touch gestures with inertia and snapping for modern browsers (and also IE8+)
:computer: :iphone: A reactive Database for Progressive Web Apps and more
A positioning engine to make overlays, tooltips and dropdowns better #hubspot-open-source
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628000175.78/warc/CC-MAIN-20190626053719-20190626075719-00385.warc.gz
|
CC-MAIN-2019-26
| 707 | 9 |
https://zeldor.biz/tag/spam/
|
code
|
This is a onboard exim possibility to blacklist special addresses, its only a optional file which contains a list of envelope senders whose messages will be denied;
550-sender envelope address [email protected] is locally blacklisted here
Example of content:
1 2 3
cat /etc/exim4/local_sender_blacklist [email protected] [email protected]
Restart or reload of exim is not required.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818293.64/warc/CC-MAIN-20240422113340-20240422143340-00405.warc.gz
|
CC-MAIN-2024-18
| 394 | 6 |
https://www.ibm.com/docs/en/db2-big-sql/7.1?topic=functions-examples-mqpublish-mqsubscribe
|
code
|
Examples of MQPUBLISH and MQSUBSCRIBE
If you need more control over which services can receive any particular message, then you need to use the publish and subscribe functions.
An example of simple data publication is when one application notifies other applications about events of interest. The application does this by sending a message to a queue that is monitored by another application. The contents of the message might be either a user-defined string, composed from database columns, or a string-valued function call, or any valid expression that yields a string of the correct type.
Many subscribers can register to receive messages from multiple publishers. You can specify a topic that you can associate with your message. For example, a DB2® application can publish a message to the service point Weather. The message is Sleet, and the topic is Austin.
This notifies the interested subscribers that the weather in Austin is sleet. Subscribers register an interest in receiving this kind of information with the following statement:
values DB2MQ1C.MQPublish ('Weather Bulletins','Sleet','Austin')
When the subscriber is no longer interested in subscribing to a particular topic, that subscriber must explicitly unsubscribe by using a statement such as:
values DB2MQ1C.MQSUBSCRIBE('aSubscriber', 'Austin')
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649193.79/warc/CC-MAIN-20230603101032-20230603131032-00781.warc.gz
|
CC-MAIN-2023-23
| 1,316 | 8 |
https://atmosjobs.com/job/ba43c84e43c313ac8652ed50ad8b27e479ba19b441
|
code
|
We believe everyone deserves access to affordable and simple legal services.
Founded in 2008, Rocket Lawyer is the largest and most widely used online legal service platform in the world. With offices in North America and Europe, Rocket Lawyer has helped over 25 million people create over 50 million legal documents, and get their legal questions answered.
We are in a unique position to enhance and expand the Rocket Lawyer platform to a scale never seen before in the company’s history, to capture audiences worldwide. We are expanding our team to take on this challenge!
About the Position
You’ll bring to the role a passion for building secure, robust, and high performance distributed systems. The ideal candidate will be a top-notch Linux expert with a DevOps focus and experience in fast-paced, dynamic environments. In addition to participating in the ongoing evolution of our server and network environments you will be part of our Tier 1 site support staff.
We are looking to hire two (2) DevOps Engineers.
A Day in the Life
Participate in the adoption of public cloud technologies, including migration of existing workloads and optimizing our architecture and practices to make best use of cloud technologies and patterns
Participate in evolving our build, deployment, and release management practices towards a continuous integration/continuous deployment model
Architect infrastructure and application monitoring and log analysis frameworks to provide deep visibility into our Java-based application stack
Develop tools and processes for managing JVMs and applications in a container-based cloud deployment model
Part of the distributed on-call team responsible for the health of a 24/7 production hosted environment
Management of production web services (Apache, Tomcat, etc.) Systems automation
General systems administration (RHEL/CentOS)
Troubleshooting and problem resolution
Skills & Experience
Minimum of 3 years of experience
Computer science degree or related technical experience preferred
Ability to automate system configuration and management using scripts (shell, ruby, python, etc.) and configuration management tools (preferably terraform and/or chef)
Experience with public cloud technologies (preferably GCP)
RedHat Linux/CentOS administration and management
Ideal candidate will also have
Experience with managing highly available production-facing e-commerce web sites
Experience with release management
Experience with build automation (jenkins, go, cruisecontrol, etc.)
Ability to diagnose and manage Java applications and JVMs
Knowledge of monitoring systems and frameworks (nagios, sensu, graphite, etc.)
Understanding of virtualization and containers
Experience with system and network security (IPS/IDS, firewalls, user management)
Benefits & Perks
Annual salary increase
Generous PTO accommodations including 30 days of paid vacation for every 12 months of service and 15 days of paid sick leave
Mandatory Bonuses: Christmas, Vacation, and Profit and Results Sharing Program
Public transportation voucher
Financial support with those who have children with special needs and disabilities
Meal/ Food voucher
Private Health Insurance
Free Rocket Lawyer account with online access to an extensive legal documents library and brilliant licensed attorneys at discounted rates
AtmosJobs is a community-run job platform developed by SaaS professionals. Our unique approach of focusing strictly on Cloud positions allows us to personalize the user experience.
1765 Greensboro Station Pl. Suite 900 Tysons Corner Va 22102
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499919.70/warc/CC-MAIN-20230201081311-20230201111311-00479.warc.gz
|
CC-MAIN-2023-06
| 3,557 | 40 |
https://hammadaslam.com/2018/11/04/az-102-my-notes-about-azures-transition-exam-for-70-533/
|
code
|
Coming from Ignite this year, Microsoft made it clear that it was moving from the old MCP, MCSA and MCSE model for Azure and instead creating a role based certification paths for Azure. Take a look at the image below, it will show you how you need to take two exams to be get certified for each specific role.
Seeing as I already had the 70-533: Implementing Microsoft Azure Infrastructure Solutions, I planned to take the AZ-102 transition exam to get certified as an Azure Administrator. There is a transition exam for each role.
I was eager to take that exam since it was already out of BETA (no need to wait weeks for the results) and I wanted to make sure my Azure skills are still up to date.
Booking the Exam:
Booking the exam was a pleasant surprise for me. The exam was only for 99 US$ and since I already had a Microsoft certificate, there was a 15 % discount. But the most interesting part was that for a limited, there is an offer where you will also get a practice test exam for free from Microsoft (from mindhub) if you register for any of the Azure administrator exams.
Preparing for this exam was quite fun. Unlike 70-533, this transition exam was very specific and focus on certain areas. As you can see from the objectives, the exam is mostly focused on Azure migration and Azure identity. There were a few additional questions about items such as Azure file share, Azure VNET but the majority was migration and Azure AD. Below is a link from Pixel Robots, who did a great job breaking those objectives and providing you with the link to the Microsoft documentation to help you understand.
I highly recommend you to go through all the links in the above post and also to get a proper understanding of Azure AD, I would recommend you to build your own On-premise Domain Controller and through your Azure account, setup AD connect and set up most of the features such as password write-back, etc.. This will surely take some time but it will give you some valuable experience with Azure AD that is now becoming a very high in demand skill for all major enterprises.
This exam, I must say was the most fun exam I ever took. Please note that there are some scenario based questions in this exam and they are quite fun. I found that doing the following was more than enough for me to successfully pass the exam with a score of 820:
- Go through the objectives and use the pixelrobot blog to read about each objective in detail.
- Build my own Domain Controller and set up Azure AD connect.
- Go through the practice test provided by Microsoft several times and carefully reading the explanations for the ones I got wrong.
Please note that I do work with Azure on a daily basis from an IaaS perspective, if you are quite new to Azure your experience might be a bit different. This exam is not for people trying to get into Azure since you already need to have the 70-533 to be able to take this transition exam.
I highly recommend all the current 70-533 holders to take this exam since 70-533 is going to be retired soon. it is a fun and very useful exam.
I wish you all the best of luck.
Leave a Reply
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946637.95/warc/CC-MAIN-20230327025922-20230327055922-00750.warc.gz
|
CC-MAIN-2023-14
| 3,114 | 15 |
https://theautomationguy.blog/2016/11/12/automatically-adding-the-customer-company-ci-when-an-incident-is-created-workflow-authoring-part-2-setting-authoring-the-workflow/
|
code
|
Automatically Adding the Customer Company CI When an Incident is Created – Workflow Authoring – Part 1 Constructing the PowerShell Script
Automatically Adding the Customer Company CI When an Incident is Created – Workflow Authoring – Part 2 Authoring the Workflow
In part 1 we defined a PowerShell script for automatically obtaining the IR and the Customer Organisation CI based on the Company property of the Affected User. In part 2 we will plug that script into a workflow.
Creating the Workflow
First thing you need to do is create a new management pack to contain your workflow. I’m a big fan of separating out Classes, Forms, and Workflows into separate management packs, and group them together. Indeed it is best practice to place your forms into separate management packs from your classes. This approach can make it easier to decommissioned a feature at a later date, as importing an updated MP that has had a class, form, or workflow deleted from it is not supported.
Now Create a new Workflow called something like “UpdateIRwithCustomerOrganisation”
Give it a name and a description:
Set the condition. In this case we need it to run on an ‘as required’ basis.
Finally select the class and criteria. We want our workflow to trigger when an Incident is created.
You should finish up with an empty workflow in your Management Pack.
Next you’ll need to drag out a PowerShell script activity from the Toolbox. For this demo we only need one script activity. Give the script activity a more user friendly name. In this case I’ve used “PowerShellUpdateIRwCustOrg”. You can’t add spaces in the activity name using the Authoring Tool, usually I would edit the XML to do this, but for the purposes of this post I’ve left it as is.
Now we need to configure the parameters and body of the script. To do this click on the radial button next to “Script Body”.
First lets setup a variable for the IR. Give it a name without using the $ character. In this case I’m using IRID. Then select the ID property of the Incident class using the radial button. When you’ve finished it should look like this:
Now onto the PowerShell script itself. This is a simple case of writing or pasting in your script into the Script Body of the PowerShell Activity.
N.B. You can see that the first line of the script in the body is to load the SCSM PowerShell cmdlets. Some of you may be asking why I’m not specifying it in Script Properties of the PowerShell Activity – simply because it’s not supported for this module.
You’re All Set!
Now all you need to do is seal your workflow Management Pack and import it (including the Customer Organisation if you’ve been following along).
When your Incidents are created the Customer Organisation CI relationship will automatically be populated! Happy automating!
One Reply to “Automatically Adding the Customer Company CI When an Incident is Created – Workflow Authoring – Part 2 Authoring the Workflow”
Comments are closed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00009.warc.gz
|
CC-MAIN-2023-14
| 3,002 | 20 |
https://forums.wz2100.net/viewtopic.php?f=3&t=8044&p=83303&sid=128b285aa8e616b1d458fcb432e55da5
|
code
|
The page seen in the video is this page:macuser wrote:I run the absolute bleeding edge of all browsers on one of my machines and NO the back-face culling bug is not fixed (I have a webpage I wrote that makes use of it)
http://www.youtube.com/watch?v=0X0_LGW54-A This page seen in the video still does this on chrome but not webkit nightly.
http://www.webkit.org/blog-files/3d-tra ... cubes.html
Which, by the way, neither you nor that YouTube page links to.
It works fine in Chrome 13.0.782.13 dev, which is what I'm using. Here's a screenshot as proof: http://d.pr/pJZB
My guess is that you're either using an old version of Chrome, or you forgot to uncheck "Backfaces visible"
Yeah, that's talking about a different API layer to WebKit. The rendering engine part is still the same.macuser wrote:About chrome and safari using different versions of webkit: http://trac.webkit.org/wiki/WebKit2
This page talks about:
webkit1 - no sandboxing
webkit2 - native sandboxing
Chrome webkit - they modified it to use a custom sanboxing model
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039554437.90/warc/CC-MAIN-20210421222632-20210422012632-00594.warc.gz
|
CC-MAIN-2021-17
| 1,032 | 11 |
http://whitakerinstitute.ie/project/an-experimental-assessment-of-learning-and-peer-effects-in-adoption-choices/
|
code
|
This research project aims to explore the linkages between learning ability, responsiveness to advice and peer effects and examine their role in adoption choices. In the agricultural sector, the adoption of new technologies and production methods by farmers is pivotal for stimulating sustainable agricultural production, but farmers are often slow to adopt new technologies or farming methods. In order to adopt new technologies, learning and advice are important as innovations are often imperfectly known and farmers require information before deciding whether or not to adopt. Farmers generally learn or receive information from a number of sources, for example from extension services, learning by doing or their peers, which makes their adoption process complex and difficult to examine using field data. This project is using laboratory experiments to measure individuals’ learning ability and their responsiveness to formal as well as peer advice and is linking these measures to adoption choices. In February 2017, the research team held a number of experimental sessions at the Carines Computer Suite, NUI Galway, where they completed the data collection phase of the project. The outcomes from the project are expected to provide solutions for optimal learning support and information provision to farmers in order to better foster the uptake of new technologies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654097.42/warc/CC-MAIN-20230608035801-20230608065801-00695.warc.gz
|
CC-MAIN-2023-23
| 1,376 | 1 |
https://tele.me/telegram/messages/MainframeCommunity/1560332916736
|
code
|
This is our 1st Mainframe Telegram group. We also have Announcements, a 2nd English group, a Chinese group, and a Korean group. https://t.me/mainframehq https://t.me/mainframecommunity2 https://t.me/MainframeChina https://t.me/MainframeKorea
Binance.com Exchange The World Binance Official English Group @binanceexchange Binance English Announcements @binance_announcements
✔Peur marketplace, payment solution & payroll integration. ✔Trust Reputation and Keeping Performance based on Blockchain Website: https://peur.io 💈 ICO 💈 ⏰ April 24th - May 28th Accepted currencies: BTC, ETH, LTC and DASH
Official Telegram Group for Oneledger.io
BatMine is a cryptocurrency mine with the option to switch between currencies, using predominantly green energy, fluid cooling mechanisms, BTC miners with up to 55 TH/s, Legal 30% Profit Sharing. BatMine will lower the carbon footprint of mining by 95%.
Safely and economically B2B arbitrage ecosystem, specialized between purchasing and selling traffic in cryptocurrency for startups with Initial Coin Offering. Compensation Methods: PPC, PPS and PPL. Website: https://unicads.net/
Follow us on: https://facebook.com/BinanceIndia/
Group discussion for Carry Protocol
We are business integration specialists, now offering Unibright – the unified framework for blockchain based business integration.
⚠️copyright-ios: This channel is unavailable due to copyright infringement.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574532.44/warc/CC-MAIN-20190921145904-20190921171904-00302.warc.gz
|
CC-MAIN-2019-39
| 1,429 | 10 |
https://community.atlassian.com/t5/Sourcetree-questions/retrieve-files-from-a-specific-commit/qaq-p/425434
|
code
|
Can I retrieve / download files from a specific commit?
I don't want to set the commit in question as current version.
If I select all the files I want, the only option on right-click is "Open Current Version".
If I select one file - which would be a pain - I have "Open Selected Version" on right-click - but nothing happens.
There is a clean and easy way to do this in Sourcetree without checking out:
Why would you deny to checkout the commit as current version?
That's one of the main purposes of a VCS: Switch the version simply and fast ....
Just as a recipe for simple getting the desired version of your files:
Thanks for (an extremely) quick reply..
Perhaps I am misunderstanding, but this particular version is not the current version, and would not work, and if any other user would "pull" he would get an obsolete version.
I am tracing changes for some historic documentation - so I don't want to see this in the history or trouble other users.
Just moved to Git from SubVersion, there I could, using Tortoise, easily select a specific commit and download.. is this really not possible?
Using SourceTree, not command line..
I don't understand your question ...
Maybe you have not fully understood the concepts of a distributed VCS or you choose a wrong/misleading wording: @Valgardur Gudjonsson wrote: "easily select a specific commit and download.".
So the way to go is:
So you don't "download a commit of a single file": 1.) pull gets ("downloads") the complete repository, 2.) checking out a commit reconstructs the file constellation/versions of all files at the time of the commit.
I tried to describe the following in my answer:
Thanks for a detailed reply, but I guess I did not explain my problem well enough or perhaps I used misleading words..
I do understand how git works, this was just an apparent bug in SourceTree, and perhaps a feature request/suggestion as well.
I installed a different tool (instead of SourceTree) and my problem was solved.
Anyway, thanks for your reply.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338244.64/warc/CC-MAIN-20221007175237-20221007205237-00409.warc.gz
|
CC-MAIN-2022-40
| 2,002 | 22 |
https://www.thethingsnetwork.org/forum/t/ttn-to-google-sheets/33790
|
code
|
I’m recently working on a project, which has the goal to show data (as diagramm) in the companys intranet.
Im using a Heltec ESP32 to receive the data. At the moment im using the Tago.io integration to visualize it.
But now i want to integrate google sheets to display a diagramm on the website.
Has anyone an idea how i can transfer my data from TTN to Google App Scripts as easy as possible?
I tried many scripts, but none of them ist working.
If you have an completly different idea without Google Sheets, tell me
Thanks for helping me
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143695.67/warc/CC-MAIN-20200218120100-20200218150100-00007.warc.gz
|
CC-MAIN-2020-10
| 540 | 7 |
https://archived.forum.manjaro.org/t/bcm43142-not-connecting-to-wifi/71980
|
code
|
Hello everyone, first time Manjaro user here. I really want to switch to it, but given the problems I had in the past with this horrible BCM43142 I just made a small test partition next to my usual Ubuntu partition.
When I try to connect to any wireless network with the auto-installed
broadcom-wl driver or with
broadcom-wl-dkms, either it tries to connect to the network several times asking for the password before giving up, or it straight up gives up after about 20 seconds stuck on Setting network address.
I tried a lot of the solutions I found here and on the Arch wiki, but none of them worked and none of them seemed to describe the exact problem I had, I even tried different kernels.
lspci -k output for the network controller:
08:00.0 Network controller: Broadcom Inc. and subsidiaries BCM43142 802.11b/g/n (rev 01) DeviceName: Broadcom BCM43142 802.11bgn 1x1 WiFi Adapter + BT 4.0 combo adapter Subsystem: Hewlett-Packard Company BCM43142 802.11b/g/n Kernel driver in use: wl Kernel modules: wl
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178351134.11/warc/CC-MAIN-20210225124124-20210225154124-00334.warc.gz
|
CC-MAIN-2021-10
| 1,008 | 7 |
https://home.anandtech.com/Show/Index/5145?cPage=3&all=False&sort=0&page=1&slug=windows-8-to-feature-streamlined-downloadable-installer
|
code
|
Windows 8 to Feature Streamlined Downloadable Installerby Andrew Cunningham on November 22, 2011 11:00 AM EST
As with every new Windows version, Microsoft is streamlining the Windows setup process, writes Christa St. Pierre on the Building Windows 8 Blog. The biggest change is the new online installer for Windows 8, which can download the installation media directly from Microsoft's servers and install the operating system without so much as bothering the user for a product key (for upgrade installs). Those wanting to do clean or advanced installs will be given the option to copy the installation files to a DVD or USB drive.
Windows 8 will further streamline the upgrade process by folding both Windows Upgrade Advisor, which scans your computer for hardware and software and checks its compatibility with Windows 8, and Windows Easy Transfer, which allows easy and granular controls for backing up and restoring files and settings, into the Windows installer rather than keeping them as separate applications. The new installer will be able to upgrade OSes as old as Windows XP (which will preserve only user data), though users upgrading from Windows Vista or Windows 7 will also be given the option to preserve Windows settings and applications, respectively.
Lastly, Microsoft has made changes to how the upgrade install works with user files to reduce the amount of time taken. Previous installers would move user files to a temporary location, install the OS, and then move them back. The Windows 8 installer reduces the number of file moves, and uses "hard links" to files to change their location in the file structure without physically moving the data around. Microsoft's graph below shows a drastic reduction in time for an upgrade install under Windows 8.
For those of you who prefer boxed software, Microsoft will continue to sell boxed copies of Windows on DVD. Users who initiate the install by booting from a DVD or USB drive will continue to see more advanced options for performing clean installs and partitioning disks. Enterprise administrators and power users who need more customization options can continue to use Microsoft suite of deployment tools (now called the Windows Assessment and Deployment Kit, or ADK).
For more details, check out the post at the Building Windows 8 Blog.
Source: Building Windows 8 Blog
Post Your CommentPlease log in or sign up to comment.
View All Comments
Andrew.a.cunningham - Tuesday, November 22, 2011 - linkMicrosoft doesn't make the hardware that runs Windows - ultrabooks are Intel/ASUS/Acer/Toshiba/etc.'s baby, not Microsoft's.
mckirkus - Tuesday, November 22, 2011 - linkCan we stop this battle now so some relevant comments actually see the light of day?
sprockkets - Tuesday, November 22, 2011 - linkUh, yeah, who had an integrated installer system for programs, and who could install over the internet, exactly has mentioned here?
sgtrock1us - Monday, November 28, 2011 - linkDon't forget the *BSDs.
Taft12 - Tuesday, November 22, 2011 - link"The Windows 8 installer ... uses "hard links" to files to change their location in the file structure without physically moving the data around"
Whaddaya know, UNIX really *IS* "the one true way"!
ananduser - Tuesday, November 22, 2011 - linkTaft12 and FATCamaro
richardostallmano - Wednesday, November 23, 2011 - linkSorry, you will probably all hate me for asking such a question. Do any of you have any idea as to when Windows 8 may be released? Based on personal thoughts or "leaks"? I had a look at the key dates for previous Microsoft Windows operating systems but I'm struggling to see a pattern. Any help or does everybody else have just as much knowledge on the subject as I do?
Fritzr - Wednesday, November 30, 2011 - linkNormal release pattern is roughly 3 year intervals. WinXP->Vista being the major exception due to development problems
Expect Win8 RTM in 12 to 15 months if all goes well. I am probably off, but that estimate should be pretty close :)
To check times on past releases, look at the initial Beta test vs RTM. Vista is an exception as there was an abandoned Longhorn version involved in that process.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949533.16/warc/CC-MAIN-20230331020535-20230331050535-00683.warc.gz
|
CC-MAIN-2023-14
| 4,145 | 20 |
http://docs.bacula-web.org/en/latest/02_install/index.html
|
code
|
This section all the information you’ll need in order to install, configure, test and upgrade Bacula-Web on your system.
Bacula-Web is a web application written in PHP and should be run on Apache httpd server (Nginx works fine too).
Before starting the installation of Bacula-Web on your server, please make sure you have access to through ssh or console.
Ability to run shell commands as root or using sudo is also a requirement.
Bacula-Web installation consists only in few steps (see below)
|Requirements||Ensure your server met all Requirements|
|Web server setup||Web server installation and Web server configuration your web server|
|Download||Download Bacula-Web pre-built package|
|Install dependencies||Install Bacula-Web dependencies|
|Configure||Configure Bacula-Web for your environment|
|Check your setup||Test Bacula-Web and make sure your setup is ok|
Installation / upgrade instructions¶
- Web server installation
- Web server configuration
- Install Bacula-Web dependencies
- Configure Bacula-Web
- Test Bacula-Web
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890874.84/warc/CC-MAIN-20180121195145-20180121215145-00492.warc.gz
|
CC-MAIN-2018-05
| 1,034 | 17 |
https://robertopregadioblog.wordpress.com/
|
code
|
I am half Japanese, half Italian, and I spent my childhood growing up in four different countries. Now, I live on the Santa Barbara beach with 16 college fraternity brothers. I enjoy the sun, good food, and my friends.
During my time in college, I realized the importance of personal branding as a tool for distinguishing yourself among others. Therefore, I’ve created this website to establish the online presence that I would like to maintain as I become a professional. This personal brand will evolve with me as I develop my career.
In this website, I present various samples of work to showcase my professional writing ability and creative skills. Please refer to the menu to view my résumé, LinkedIn, and digital portfolio.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805687.20/warc/CC-MAIN-20171119153219-20171119173219-00069.warc.gz
|
CC-MAIN-2017-47
| 733 | 3 |
https://help.webtrends.com/optimize/managing-audiences/when-creating-project-in-ve/
|
code
|
Create a Segment within Visual Editor
Once you have created at least one variation in your new project and saved it, you will be given the option to add segmentation. By default, the Audience for your project will be set to ‘All visitors’, but if you click on the arrow next to this option you will have the possibility to either use an existing segment from the list that shows there or create a new segment by clicking the ‘New Segment’ button.
If you click the ‘New Segment’ button, you will then see the same segment builder that can be found in the Segment Library, allowing you to build your own segment by dragging and dropping items from the left-hand column to the main builder screen:
You can add as many different attributes as you need, but do keep in mind the overall selection criteria that references them. In the example below showing a multiple browser segment, unless you select the ‘Match Any’ option, your segment would not work (as any given user can only be viewing the project in one browser at a time):
When you select different types of attributes (e.g.: ‘Browser’ and ‘IP address’), you will also have ‘And’/’Or’ criteria to take into account. These are very important as they are often the reason why segments malfunction if they are incorrectly set.
Once you are done with adding the necessary attributes to your segment, simply save it with a name that describes what the segment contains (e.g.: Desktop browsers).
Watch the video “creating an audience segment” here
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497171.9/warc/CC-MAIN-20200330150913-20200330180913-00037.warc.gz
|
CC-MAIN-2020-16
| 1,531 | 7 |
https://success.mitratech.com/TeamConnect/Enterprise_User_Guide/Getting_Started/03_Logging_Out
|
code
|
To log out from
On the global toolbar, click the Log Out link.
- If all records that you worked on are saved, you are immediately logged out.
- If any records that you have worked with are not saved, the Unsaved Items screen appears.
From TCE 7.1 onwards, the user unsaved items page looks as below:
Perform one of the following options:
- If there are any records in the displayed list that you want to save, select the check-box next to them and click OK to go back and save the records.
- If you do not want to save any records, click OK.
- If you do not want to log out, and want to continue working with the records, click Cancel.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817103.42/warc/CC-MAIN-20240416155952-20240416185952-00580.warc.gz
|
CC-MAIN-2024-18
| 635 | 9 |
http://tech.unruly.co/q-4640.html
|
code
|
The retail bundle offers a 67W power adapter, a 6A-rated USB cable, and a transparent protective case. There is no depth sensor here, while the macro camera has been downgraded to a cheap 2MP shooter with a fixed focus. We may get a commission from qualifying sales.Next
And it seems to be packing the same rear camera setup, too, with a 108MP primary shooter, an 8MP ultrawide, a 2MP macro, and a 2MP depth sensor.
The new Redmi Note 11 Pro 5G runs on the newer Snapdragon 695 5G chipset, which has a more powerful processor and a 5G modem. It seems like a weaker SoC compared to the Note 10 Pro's Snapdragon 732G chip, and furthermore, it's not capable of 4K video capturing. The last two years have been tough for the industry, and the next months are looking even grimmer.Next
We already reviewed the Redmi Note 11 Pro 5G, which has a different, 5G-capable chipset, but other than that, everything else stays the same.
It has the same 108MP primary, and the same 8MP ultrawide camera. Oops, correction, it seems the macro has been demoted from a premium 5MP AF telemacro to a basic 2MP with a fixed focus. It is based on the older Android 11 OS, meaning not all cool features will be available right away.Next
It's always good to have basic protection out of the box, but given how challenging it sometimes is to apply these flawlessly by yourself, we would have preferred this to have been done in the factory.
And while the battery capacity stays the same at 5,000mAh, the new Note offers a 67W fast charging, up from 33W on the Note 10 Pro. Despite these omissions, the Redmi Note 11 Pro 5G is shaping as one solid smartphone, and we cannot wait to put it through our tests. And now, let's take a quick scroll through the specs.Next
Released 2021, November 01 Body 163.
With that being said, let's go and unpack this thing and put it through its paces. Unboxing the Xiaomi Redmi Note 11 Pro 5G The Redmi Note 11 Pro 5G arrives in a white paper box along with a 67W power adapter, and a 6A-rated USB cable.Next
Like most of the Notes, this one is also powered by a large 5,000mAh battery, and its charging has been improved from 33W on the Note 10 Pro to 67W on this new Note 11 Pro.
In a typical Xiaomi fashion, the Redmi Note 11 Pro 5G we have today for review is the global model with NFC support.
Up to tri-band: GLONASS 1 , BDS 3 , GALILEO 2 , QZSS 2 , NavIC Yes Yes Unspecified USB Type-C 2.
We may get a commission from qualifying sales.Next
Here's to compare the three.
So, without further ado, here is the Redmi Note 11 Pro 5G. Up to tri-band: GLONASS 1 , BDS 3 , GALILEO 2 , QZSS 2 , NavIC Yes, with A-GPS. These are the best offers from our affiliate partners.Next
Up to tri-band: GLONASS 1 , BDS 3 , GALILEO 2 , QZSS 2 , NavIC Yes Yes No USB Type-C 2.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663016373.86/warc/CC-MAIN-20220528093113-20220528123113-00794.warc.gz
|
CC-MAIN-2022-21
| 2,769 | 16 |
https://www.vn.freelancer.com/projects/website-design/azure-development-quote-tour-management/
|
code
|
We are looking for experience Azure developer to develop a product to be used by our clients and internal employees.
The product needs to be secure and leverage the products provided by Azure such as Functions App, CosmosDB. This is not just a pure development, the winner will be responsible to provide guidance what is the best way of using Azure / implementing things as well as help deploying and rolling out the solution. Time for Knowledge transfer to walk through how things are going to be developed and how to deploy are a must. Documentation of the solution must be provided for technical and for training purpose.
The final solution needs to be simple to be maintained and improved. The future goal is to potentially build mobile apps connected to this platform. If you win this bid, there is potential for more work later.
This is a mobile first application with responsive design to work on phone, tablet and desktop computer.
The goal is to be able to continue developing and improving the application using web-online tools rather than complicated development environment.
The winner is responsible to provide the design of the screens based on best UX practices. UX design must be submitted for approval prior the development starts. It can have multiple interactions before it gets finalized. UI/UX needs to match our current UI pattern - screenshots provided as attachment.
Winner must provide quote for future maintenance/support if needed.
The application will need to be deployed in a test / training environment as well as production. Winner developer will provide documentation and support on the deployment phase for the two environments which will be hosted with Azure.
High-level backlog/features is attachment as well as wireframes which are provided for guide and requirements clarification. Development company must check with us if any questions on the backlog before bidding or during the development of this project.
Application needs to be fully test automated I.e. self-tested. Developed azure functions needs to have fully coverage using azure. Solution must be provided based on Microsoft recommendation: [login to view URL]
Developer will be responsible for integrating this new module to the existing module and also re-write the existing module to from ASP.NET C# to Azure Functions C# following the specifications below:
Responsive HTML5/CSS, jQuery, Bootstrap, Webpack, HTTP-JSON to connect to backend.
Front-end will be stored potentially using Storage blob type on Azure. No application server will be needed for the front-end.
CosmoDB, Azure Functions App (C#) connecting through HTTP trigger / JSON with the front-end.
Azure Functions Proxies: Manage the end-points, development vs production, individual modules calls.
Development life cycle using Azure Functions Slots to divide between development and production.
Static Files mainly used by the front-end may be stored using simple Azure Storage container using blog containers.
Code Control and Deployment fully done through: [login to view URL]
Development company must have experience on the following but not limited to, so it can support future development of this product:
Microsoft Active Directory for client B2C and B2B
Single sign-on with Office 365 for employees
Instructions to add internal app to office 365 start menu
Advise and leverage Microsoft 365 and Azure cloud technology upon mutual agreement with us.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250592565.2/warc/CC-MAIN-20200118110141-20200118134141-00284.warc.gz
|
CC-MAIN-2020-05
| 3,422 | 23 |
https://lists.debian.org/debian-user/2014/12/msg00233.html
|
code
|
Re: Skipping fsck during boot with systemd?
The Wanderer <[email protected]> writes:
> On 12/06/2014 at 12:27 AM, Ric Moore wrote:
>> On 12/05/2014 05:06 PM, Renaud (Ron) OLGIATI wrote:
>>> On Fri, 5 Dec 2014 20:59:25 +0000 Brian <[email protected]>
>>>> But remember our current slogan "Linux is all about choice". One
>>>> can choose to boot with or without "fsck.mode=skip".
>>> What about the choice to stop fsck it if it has started at an
>>> inconvenient moment ?
>> What is wrong with an fsck?? You've never had an fsck happen without
>> your permission before at boot time?? Isn't it a good thing to have
>> happen once in a blue moon??
> The problem is not an fsck, but having a fsck happen _right then_, when
> you need the computer for something else. Schedules and deadlines are a
(all instances of 'you' and 'your' are meant generically)
Well, it is not as if fscks happen out of the blue. Either you weren't
paying attention and you were hit with the periodic fsck, or you make a
habit of doing dirty shutdowns, and you know the fsck is going to happen
Yes, if you were not paying attention, it may feel as a surprise. And if
you are used to the bad habit of interrupting fsck, then not being able
to may feel as a bad surprise, but the problem is still *your* bad
Mistakes happen, we're all human. Blaming your tools for your own
mistakes is another bad habit though.
Imagine his file system was corrupted. Interrupting fsck wouldn't have
helped, his computer would have been unavailable anyway.
"We will need a longer wall when the revolution comes."
--- AJS, quoting an uncertain source.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988882.7/warc/CC-MAIN-20210508121446-20210508151446-00193.warc.gz
|
CC-MAIN-2021-21
| 1,617 | 27 |
https://www.ultimatemetal.com/forum/threads/vessel-my-solo-project-featuring-blaze-bayley.845428/
|
code
|
Hey guys, I have been working on this release for around a year now, and finally, FINALLY, it is ready to share with the world. I have always wanted to start a solo band/project where I retain complete control, but utilise the talents of other to realise my ideas, and around this time last year I decided to finally record some of my songs that have no other outlet, and see what happens. The opportunity came up to have Blaze record some vocals for the project, and I ended up getting him to do about as much as I could, as I knew it would be an amazing experience. It has been. Anyway, enough talk. I will be selling the cd through Bandcamp before Christmas. Until then, the facebook profile can be found here: http://www.facebook.com/thevesselproject And the debut track, the first song off the cd, can be found here: http://youtu.be/2siFZpapuY8 I hope you enjoy and can chuck a like on my FB and video. As I said, there is more Blaze material to come, so stay tuned for details on the cd in the coming weeks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738727.76/warc/CC-MAIN-20200811025355-20200811055355-00114.warc.gz
|
CC-MAIN-2020-34
| 1,013 | 1 |
https://www.scalingpostgres.com/episodes/29-parallel-indexing-sql-vs-orm-logical-replication-upgrades/
|
code
|
Scaling Postgres Episode 29 | Parallel Indexing | SQL vs. ORM | Logical Replication Upgrades
Get New Episodes Weekly!
In this episode of Scaling Postgres, we review articles covering parallel indexing, SQL vs. ORM, logical replication upgrades and development DBs.
- PostgreSQL: Parallel CREATE INDEX for better performance
- I don't want to learn your garbage query language
- Upgrading to PostgreSQL 11 with Logical Replication
- 12 Factor: Dev/prod parity for your database
- Why do we install as root?
- CHAR: What is it good for?
- Tuning PostgreSQL Database Parameters to Optimize Performance
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499842.81/warc/CC-MAIN-20230131023947-20230131053947-00568.warc.gz
|
CC-MAIN-2023-06
| 598 | 10 |
http://www.chokanji.com/en/ckk/ios/manual/primer.html
|
code
|
Installing Super Kanji Search
Access "Super Kanji Search Pro" page on App Store, and install the app by following the procedure.
After the installation is finished, select "Done" to close the window.
Starting the App
- Tap the launcher icon of Super Kanji Search on Home screen or Apps list.
- Super Kanji Search starts.
Finishing the App
- Press Home button of your terminal.
† If you Press Home button, you can go back to Home screen while the screen status is recorded.
The character list uses different colors for each character type. The following table represents the relation between Character Color and Character Type.
|Character Color||Character Type|
† Regarding the unified kanji characters (Japanese, Chinese and Korean kanji) by CJK Unified Ideographs of Unicode, their character shapes and character info cannot be displayed separately.
If you touch and hold the character, [Character Manipulation] dialog appears.
- Copy character
- You can copy the selected character to the pasteboard.
- Copy image
- You can copy the selected character to the pasteboard as an image.
- Save image
- You can save the selected character as an image.
- Search by Web
- By sending the selected character to an online dictionary on the Internet, you can check the search result in an online dictionary.
※ The menu appears only when you select the Unicode character.
※ If you tap icon at Character Info Screen, the last accessed online dictionary searches the original character.
※ You can call up the following online dictionaries directly from the menu.
- Unihan Database (The Unicode Consortium) http://www.unicode.org/
- kotobank http://kotobank.jp/
- goo dictionary http://dictionary.goo.ne.jp/
- excite dictionary http://www.excite.co.jp/dictionary/
- Yahoo! dictionary http://dic.yahoo.co.jp/
- Wiktionary (Japanese, English, Chinese, Korean) http://en.wiktionary.org/wiki/Wiktionary:Main_Page
- Wikipedia (Japanese, English, Chinese, Korean) http://en.wikipedia.org/wiki/Main_Page
When Kanji Search Screen is displayed, you can change settings by pressing Menu button .
Super Kanji Search Pro
You can specify the range of kanji for search.
Tap the check box to select the character type you want to search.
You can specify the number of characters displayed in the search result screen, the font size, the font family, etc.
- Font size
- You can select the font size for the list from Small, Medium,Large or Extra Large.
- Font family
- You can select the available font family from the list.
※ The available font family depends on a character set. Mincho, Gothic, Textbook and Round gothic are applied to kanji in JIS level 1 and 2. GT, T-Mincho, T-Gothic and T-Kaisho are applied to JIS kanji and GT font. To learn more about the type of character set, please refer to Searchable Character Type.
- Font quality
- You can select the character's font quality for the list from Low, Normal or High.
The lower quality you select, the shorter time for displaying the search result.
- Romanized search
- You can input Romaji as the reading of kanji (the search key), instead of Hiragana.
Enabled:You can use Romaji as the reading of kanji, the search key. Both Capital letter (upper-case letter) and Small letter (lower-case letter) are accepted.
Disabled:Super Kanji Search does not recognize Romaji as the reading of kanji, if you input Romaji to the search key field.
- Maximum chars displayed
- You can specify the maximum number of characters in Search Result Screen.
You can specify the number of characters from 50 to 2000.
※ In general, the required time for the search result increases with the number of characters.
- Only Unicode results
- When this setting is enabled, only characters in Unicode are displayed as the search result.
※ When "Only Unicode results" is enabled, you may find the difference between the number of kanji in the list of Kanji Search Screen and the number of the search result.
- Use internal font
- When this setting is enabled, characters in Unicode are displayed by the internal font of iOS.
※ When the internal font is used, the setting of "Font family" is not applied to characters in Unicode.
If you want to make Super Kanji Search run faster for the situation of a slow Internet connection, enable this setting.
- Server name
- You can see the server name to connect.
※ You don't have to change this setting.
- Port number
- You can see the port number.
※ You don't have to change this setting.
You can see the Online help for Super Kanji Search (starting web browser).
You can see the product info on "Super Kanji Search for Windows" (starting web browser).
You can find Personal Media Corporation's Kanji contents and Super Kanji-related software (starting web browser). Please note that most pages are written in Japanese as of February 2014.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527148.46/warc/CC-MAIN-20190419061412-20190419083412-00554.warc.gz
|
CC-MAIN-2019-18
| 4,813 | 68 |
https://mail.python.org/pipermail/python-list/2001-November/086635.html
|
code
|
Which Version for Absolut Beginner?
Erik Max Francis
max at alcyone.com
Sun Nov 25 20:14:49 CET 2001
Fred Flintsone wrote:
> Hi. I went to the Python.org page to pick up a copy of Python, and
> was faced with a choice of which version I want to d/l. As a rank
> beginner, does it matter? I'll be working on a Windows ME machine.
In most cases when looking at fiddling with software for the first time,
you want the latest stable release. Often software is maintained in two
branches: a stable release and a development release. For Python the
latest stable release is 2.1.1.
> Between the O'Reilly book I just bought, and all those great looking
> tutorials, I'm anxious to dig in.
The tutorials on python.org are very good, but which O'Reilly book did
you get? I have _Programming Python_ and don't think too highly of it.
The other, _Learning Python_, is by comparison much better.
Erik Max Francis / max at alcyone.com / http://www.alcyone.com/max/
__ San Jose, CA, US / 37 20 N 121 53 W / ICQ16063900 / &tSftDotIotE
/ \ Laws are silent in time of war.
Esperanto reference / http://www.alcyone.com/max/lang/esperanto/
An Esperanto reference for English speakers.
More information about the Python-list
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863259.12/warc/CC-MAIN-20180619232009-20180620012009-00150.warc.gz
|
CC-MAIN-2018-26
| 1,204 | 23 |
http://forums.epicgames.com/threads/428455-help-critical-error
|
code
|
help, critical error
in unrealed every time i try to add a terrain i get this error:
OS: Windows XP 5.1 (Build: 2600)
CPU: GenuineIntel PentiumPro-class processor @ 1696 MHz with 1023MB RAM
Video: NVIDIA GeForce FX Go5200 (4586)
General protection fault!
History: WPageToolsTerrains::OnNewTerrain <- WButton::InterceptControlCommand <- WWindow::WndProc <- WWindow::StaticProc <- WWindow::WndProc <- WWindow::StaticProc <- MessagePump <- MainLoop
How do I fix this because currently I can't really build any maps.
Could you be a little more specific as to when does the error actually happen (is it when you click the terrain tool, is it when you select the terrain properties, is it when you select a texture...)
ZoneInfo Properties->ZoneInfo->TerrainZone ->True?
goten i ve got the exact same problem. i duuno y it happens. happens for me when i click build all. that's y i can no longer map
I certainly am not sure with all the gumph that come up with GPFs but I noticed your graphics processor was an NVIDIA GeForce FX Go5200, isn't that a bit too weedy for all that texturing? Could turning down all your graphic settings help?
Just an idea
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00000-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,144 | 13 |
https://forexsb.com/forum/topic/9533/i-cannot-open-the-data-file-to-view-my-brokers-data/
|
code
|
Topic: I cannot open the data file to view my brokers data
I am logged into EA Studio, but all I can select as a data source is premium data and Meta-Trader demo. I have imported data from my broker but I cannot open the data file to view my brokers data nor can I select my broker from the Data Source drop down box when trying to set up to create new strategies. WHAT HAPPENED!!!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817073.16/warc/CC-MAIN-20240416062523-20240416092523-00482.warc.gz
|
CC-MAIN-2024-18
| 381 | 2 |
https://discuss.atom.io/t/vs-code-editor-appears-to-have-much-better-performance-compared-to-atom/23986
|
code
|
I already created an issue regarding this on Github: https://github.com/atom/atom/issues/10188
But to give you a quick sum up: I tested VS Code and a clean install of Atom (no extra packages), I was using the Find command on a large file, looking for words that appear often in it.
Atom - search takes between 1s and 1.5s
VS Code - is almost instant, and can also live-update the search results as I am typing
Since both projects are based on Electron - I think it is worth looking into their implementation of the editor: https://github.com/Microsoft/vscode/tree/master/src/vs/editor
I am also wondering whether the Atom team will be willing to make any major changes to the current implementation if that could get us the same performance as VS Code?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247492825.22/warc/CC-MAIN-20190219203410-20190219225410-00451.warc.gz
|
CC-MAIN-2019-09
| 752 | 6 |
https://forum.hvdc.ca/2169234/Linear-Analysis
|
code
|
I was wondering whether PSCAD provides linear analysis tools. For dynamic analysis of my system, I'd need frequency analysis tools for transfer function and such. I thought about a workaround with white noise/ chirp signals and the FFT block to achieve transfer function plots (like in real life). Is there a library or has anyone done this before?
Add New Comment
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647614.56/warc/CC-MAIN-20230601042457-20230601072457-00505.warc.gz
|
CC-MAIN-2023-23
| 364 | 2 |
https://science.nu/community/this-ones-important-bayesian-workflow-for-disease-transmission-modeling-in-stan/
|
code
|
Léo Grinsztajn, Elizaveta Semenova, Charles Margossian, and Julien Riou write:
This tutorial shows how to build, fit, and criticize disease transmission models in Stan, and should be useful to researchers interested in modeling the COVID-19 outbreak and doing Bayesian inference. Bayesian modeling provides a principled way to quantify uncertainty and incorporate prior knowledge into the model. What is more, Stan’s main inference engine, Hamiltonian Monte Carlo sampling, is amiable to diagnostics, which means we can verify whether our inference is reliable. Stan is an expressive probabilistic programing language that abstracts the inference and allows users to focus on the modeling. The resulting code is readable and easily extensible, which makes the modeler’s work more transparent and flexible. In this tutorial, we demonstrate with a simple Susceptible-Infected-Recovered (SIR) model how to formulate, fit, and diagnose a compartmental model in Stan. We also introduce more advanced topics which can help practitioners fit sophisticated models; notably, how to use simulations to probe our model and our priors, and computational techniques to scale ODE-based models.
Mathematical models of epidemic spread are affecting policy, and rightly so.
It’s fine to say that policy should be based only on data, not on models, but models are necessary to interpret data. To paraphrase Bill James, the alternative to a good model is not “no model,” it’s a bad model. Tell it to the A/Chairman.
But some influential models have had problems. And there are different models to choose from.
One useful step is to write these models in a common language. We have such a language: it’s called mathematics, and it’s really useful. But there are lots of steps between the mathematical model and the fit to data, and that’s where things often break down. The mathematical models have parameters, sometimes the parameters need constraints, and sometimes when you try to read a paper you get lost in the details of the fitting.
Bayesian inference and Stan are not the only ways of fitting SIR models, but they give us a common language, and they also give flexibility: Once you’ve fit a model, it’s not hard to expand it. That’s important, because model expansion is often a good way to react to criticism.
The above-linked paper by Léo, Liza, Charles, and Julien should be useful for three audiences:
– People who want to fit SIR models and their extensions, and would like to focus on the science and the data analysis rather than have computing and programming be a limiting factor.
– People who have already fit SIR models and their extensions but not in Stan, and who’d like to be able to communicate their models more easily and who’d like to be able to extend their models, adding hierarchical components, etc.
– People who are unfamiliar with these models and would like to learn about them from scratch.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00760.warc.gz
|
CC-MAIN-2022-33
| 2,941 | 11 |
https://gizmo.imperialdyson.uk/en/latest/raspberrypi/assembly.html
|
code
|
1. Assembling Pi workstation¶
The goal of this section is to set up the physical components to the Raspberry Pi. Later on we will look at how we might run a Pi ‘headless’. This means we can control the Pi remotely without the need for a screen, keyboard, mouse, or any other peripherals directly connected to the Pi itself.
To do this, we will be using SSH protocol. SSH will remotely connect you to a Pi over a local or global network. For this, you need to complete the Networks section before you can move onto the Connecting Remotely section.
When using the Pi in this advanced format, we will be using the ‘Terminal’ a lot. If you are new to the terminal can be a bit overwhelming at first, don’t panic and just follow the steps carefully! There are many great resources on the internet to help you understand how to use a terminal, including this website.
1.1. Getting going¶
At first we will setup the Pi using peripherals. Each team should get the following equipment:
- 1 Touchscreen
- 1 Raspberry to touchscreen HDMI-HDMI plug
- 1 Touchscreen pen
- 1 Raspberry Pi Power Supply
- 1 Raspberry Pi
- 1 Keyboard
- 1 SD Card
- 1 Wooden plate
- 8 M2.5 Bolts
- 4 M2.5 Standoffs
- 3 M3 Bolts
- 4 M3 Spacers
- 4 M3 Nuts
- 1 Breadboard
- 1 Arduino
- 1 USB A to USB B Cable
- 1 Screwdriver
- 1 Pair of Pliers
- Attach the Raspberry Pi to the wooden plate, first bolt the 4 M2.5 Standoffs to the plate and then attach the RPi to the plate with 4 more bolts (don’t tighten them too much):
- Repeat the same operation with the Arduino using the M3 spacers, nuts and bolts. You will be able only to secure it with three bolts, remember not to tighten them too much:
- To attach the breadboard to the wooden plate, peel off the back of it to expose the adhesive strip and glue it to the wooden plate:
- Insert the micro-SD card in the back of the Pi, like so:
- Connect the touchscreen to the Pi, connecting it to the pins and with the HDMI plug, like so:
- Connect the keyboard with the USB.
- Using the power cable, power up the Pi and the screen:
- The Pi will start the setup, if the screen doesn’t illuminate check that it is on.
Go to the next section to find out more about the SD card we have provided.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662564830.55/warc/CC-MAIN-20220524045003-20220524075003-00220.warc.gz
|
CC-MAIN-2022-21
| 2,219 | 33 |
https://reptilelink.com/what-reptiles-did-birds-evolve-from/
|
code
|
Although the living reptiles birds are most closely related to are crocodilians (archosaurs), when it comes to their relation to dinosaurs, birds evolved from theropod dinosaurs. These theropods share over 100 traits with modern birds.
What Group Of Reptiles Led To The Evolution Of Birds?
1) Birds evolved directly from Thecodont reptiles. – Diapsids had 2 major evolutionary lineages, the Lepidosauromorpha (with snakes and lizards) and the Archosauromorpha.
Which Fossil First Link The Evolution Of Birds From Reptiles?
Paleontologists view Archaeopteryx as a transitional fossil between dinosaurs and modern birds. With its blend of avian and reptilian features, it was long viewed as the earliest known bird.
Are Birds Descendants From Reptiles?
Technically, birds are indeed reptiles.
Birds descended from the very first reptile. Birds are also dinosaurs because they descended from a dinosaur.
What Other Reptiles Can Live With Bearded Dragon
Certain lizards (bearded dragons, anoles, geckos) and chelonians (turtles and tortoises) can live successfully together when set up properly in same-species tanks.Jan 22, 2017
What Reptiles Are Good With Bearded Dragons?
Dry-climate species such as leopard tortoises (Geochelone pardalis) and spurred tortoises (Geochelone sulcata) are good choices. The Lincoln Park Zoo keeps Russian tortoises (Testudo horsfieldii) with bearded dragons, and reports good results from the arrangement.
Can Bearded Dragons Get Along With Other Pets?
Yes, bearded dragons can get along quite well with other household pets such as cats and dogs. They are usually quite placid and often show signs of affection towards both humans and other animals.
Can Geckos Live With Bearded Dragons?
Leopard geckos and bearded dragons can’t live together. This is because both these reptiles are territorial and are willing to fight others invading their space. And since bearded dragons are bigger than leopard geckos, they are likely to try to dominate the latter or even eat them.
Can A Bearded Dragon Have A Companion?
Never keep a pair of two male bearded dragons in the same enclosure. A pair of two females might work, however. A male and a female together might work, too, but it’s important to be aware of the likely possibility of reproduction.
Worldwide, There Are About How Many Species Of Reptiles.
Currently there are more than 10,000 species and an additional 2,700 subspecies. This is making reptiles the largest vertebrate group after fish (~25,000 species) and birds (~10,000 species), and significantly larger than mammals (~5,000 species) or amphibians (~6,000 species).
How Many Species Of Reptiles Are There In The World 2022?
Number of genera: As of March 2022 there are 1226 genera of reptiles.
What Are The 4 Main Types Of Reptiles?
The major groups of living reptiles—the turtles (order Testudines), tuatara (order Rhynchocephalia [Sphenodontida]), lizards and snakes (order Squamata), and crocodiles (order Crocodylia, or Crocodilia)—account for over 8,700 species.
How Much Blood Does A Reptiles Heart Pupmp
reptile – Circulatory and respiratory system | Britannicawww.britannica.com › animal › reptile › Circulatory-system
How Do Reptiles Pump Blood?
The blood is pumped from a three-chambered heart with two atria and a single ventricle. (c) Reptiles also have two circulatory routes; however, blood is only oxygenated through the lungs.Jun 8, 2022
How Do Reptile Hearts Work?
Most reptiles have three chambered hearts with two atria and one common ventricle. The right atrium receives blood returning from the systemic circulation via the sinus venosus, which is formed by the confluence of the right and left precaval veins and the single postcaval vein.Oct 31, 2010
Why Do Reptiles Have 2 Aortas?
In crocodilians and reptiles the right aorta pumps oxygen-rich blood from the lungs to the body. Meanwhile, the left aorta exits the heart separately, alongside the pulmonary artery.
Do Reptiles Have Blood Circulation?
The reptilian circulatory system is a closed circulatory system, meaning that blood is always contained within vessels. In contrast, animals that have open circulatory systems, like many mollusks and arthropods, do not always have their blood contained in vessels.
Why Are Reptiles More Active When They Are Warmer
Reptiles and Climate Change – Forest Servicewww.fs.usda.gov › ccrc › topics › reptiles-and-climate-change
Why Are Lizards More Active In Warm Weather?
Lizards bask in the morning sun to raise their internal body temperature and stimulate their metabolism. They position their body to soak up maximum sunlight, spreading themselves to create more surface area.
Why Do Reptiles Prefer Warm Climates?
Reptiles are cold-blooded, or ectothermic, animals. This means that they cannot produce heat in their own bodies, and have to rely on their surroundings to keep warm. This is why most reptiles are found in hot or warm climates. Reptiles often bask in the sun to get warm.
What Happens To A Reptile When Its Surrounding Temperature Increases?
The Ectothermic Reptile
The reptile’s body temperature rises when the external temperature rises. When the temperature drops, so does his body temperature. If a reptile feels cold because the external temperatures have made his blood cold, he’ll lie in the sun to warm up.
Why Do Reptiles Move More Sluggish In Cold Weather?
So when a lizard is moving slowly in the cold, it is due to its muscle cells being unable to work faster. Reptiles, such as this lizard, are ‘cold-blooded’ and cannot create their own body heat. Movement is not the only body function that can change with the temperature. Digestion is another good example.
How Many Reptiles Are Imported Into The Us Each Year
Each year the United States imports nearly two million live reptiles and exports about nine million. This poorly regulated trade harms wild populations and their habitats.
What Reptiles Are In Demand?
The reptiles that survey participants considered the most popular were ball pythons (86.8%), bearded dragons (80.2%), and leopard geckos (74.7%), followed by corn snakes (50.5%) and crested geckos (37.4%) (Figure 1).Mar 3, 2021
How Many Reptiles Are In The Us?
A total of 545 species of amphibians and reptiles are known from the United States(Collins 1997, Standard Common and Current Scientific Names).
Which Us State Has The Most Reptiles?
Florida has the biggest number of invasive amphibians and reptiles of any location in the world, according to a 20-year study by the University of Florida at Gainesville.
What Reptiles Can Live Outside In San Diego
Reptiles and Amphibians of Coastal Southern Californiacaliforniaherps.com › identification › socalherps
Can Reptiles Be Kept Outside?
Reptiles and amphibians can do well in an outdoor terrarium, and you can get to observe them closely in a habitat that’s more natural than life indoors. But to succeed you have to use special care in creating a safe and healthy environment for your pet.
What Type Of Lizards Live In San Diego?
The species in order of decreasing abundance (U C San Diego reptile survey) are Western fence lizard, orange-throated whiptail, side-blotched lizard, Southern alligator lizard, Western skink, coast horned lizard, coastal Western whiptail, and Calif. legless lizard.
What Reptiles Are Illegal To Own In California?
(1) Blunt-nosed leopard lizard (Crotaphytus wislizenii silus). (2) San Francisco garter snake (Thamnophis sirtalis tetrataenia). (3) Santa Cruz long-toed salamander (Ambystoma macrodactylum croceum). (4) Limestone salamander (Hydromantes brunus).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945381.91/warc/CC-MAIN-20230326013652-20230326043652-00057.warc.gz
|
CC-MAIN-2023-14
| 7,595 | 61 |
https://allnurses.com/profile/909466-acub/
|
code
|
I have got an interview next week for a practice facilitator job. Which I am very excited about. Part of the interview requires giving a presentation. The total I have been given is
"How your role will support the ward manager in the delivery of safe and high quality care"
I would be great full for any tips anybody has to offer on how to go about presenting this.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413624.48/warc/CC-MAIN-20200531182830-20200531212830-00296.warc.gz
|
CC-MAIN-2020-24
| 365 | 3 |
https://www.truegossiper.com/best-arduino-simulators-for-windows-pc/
|
code
|
Arduino simulators are the best platforms for amateur and professional programmers. It is also interesting for circuit designers because they can learn to design circuits on Arduino simulators.
In addition, they can program and test their ideas without worrying about their time and money. There is no chance of damaging your card and your design equipment.
Circuit design students do not need to purchase electrical equipment if they have an Arduino simulator. Arduino simulators have many forms and are therefore compatible with many operating systems. This article provides a list of the best Arduino simulators compatible with Windows PCs.
Best Arduino simulators for PC
1. Autodesk Eagle (recommended)
It is an easy-to-use Arduino emulator, which comes in two versions. The Eagle Standart and Eagle Pro versions can be downloaded from the official Autodesk website. Some important features of this Arduino simulator are as follows.
- Autodesk Eagle easily organizes designs with the “Multi-sheet diagrams” feature. “
- It has modular design blocks. This therefore allows you to reuse existing circuit blocks.
- You get confidence in the schematic design, because it has an electrical rules checking functionality
- With real-time design synchronization, you can stay synchronized between the diagram and the layout of the circuit board.
- A schema editor is available.
2. Proteus Arduino Simulator
Proteus is one of the simplest and simplest Arduino simulators. From education to the automotive industry to IoT, Proteus has proven to be a very useful Arduino simulator. It is compatible with Linux and Windows. Proteus simulates the interaction between a microcontroller and any digital / analog electronics connected to it.
Among the very important tools of this Arduino simulator are the oscilloscope, the logic analyzer, the function generator and the pattern generator. Proteus allows you to get your communications software properly before hardware prototyping. Proteus performs simulations in step-by-step mode.
3. Autodesk Tours
This Arduino simulator comes with amazing tools and these tools are easy to use. The simulator allows you to design and prototype before building a circuit. You can also invite others to collaborate on your designs in real time. Some other amazing features of this Arduino emulator are provided below.
- It provides free tools, including resistors, capacitors and potentiometers.
- The simulator provides an equal platform for beginners and professionals. Beginners can experiment in Circuit Scribe or in the electronic laboratory. So that professionals can use PCB design.
- You can work and develop your design skills from the Autodesk Circuit developer community.
- Tours can be designed and simulated, and models can also be printed and shared.
4. Virtronics Arduino Simulator
This Arduino simulator can teach the inner workings of an Arduino sketch. Even before purchasing the equipment, you can test a sketch. You can demonstrate a project to potential customers. The simulator comes with a free version and a paid Pro version. You can view the variables in real time.
Sketches can be edited or opened in Arduino IDE. In addition, it advances line by line in the program. Features include If, while, pour, switch, do while loop. The software performs digital writing, digital reading and PinMode for pins 0-53. Some other important features include.
- The software is designed for Arduino Mega, Uno and more Arduino standard boards.
- Analog reading for pins is 0-16 and analog writing for digital pins is 0-53
- Serial emulators, LCD output, Ethernet, Servo, SD card, EEPROM, SoftSerial, SPI, Wire.
5. Electronify Arduino Simulator
Electronify helps you learn basic electronics in different hardware-level languages. this is useful for those who do not know much about electronics and those who want to know more about hardware systems. So, if you are interested in the field of electronic communications and embedded systems, you should download this Arduino emulator.
You can learn the basics of this field. Later, you can move to the advanced level of learning. Learning about Electronify is simple and easy. This can make you a professional in this field.
6. Fritzing Arduino simulators
Fritzing allows you to document your prototypes, share the prototype, make electronic components for professional printed circuits and teach them to others. This is an inexpensive Arduino simulator, and it has made electronics accessible to everyone.
Some of the most attractive features for the Fritzing user community include creating a circuit, using a strip table, using SMD components, creating paper templates, curved wires and flexible legs. So this Arduino simulator is a paradise for those who are interested in the subject.
I hope you like my provided list of Arduino simulators. And, with this list, you can learn how to design and program circuits.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649302.35/warc/CC-MAIN-20230603165228-20230603195228-00787.warc.gz
|
CC-MAIN-2023-23
| 4,905 | 33 |
https://community.filemaker.com/thread/86456
|
code
|
"Close Window has been cancelled" script pop. Need help
In my modal window I have a script with a field inside that is required to have data. If there is no data a pop up appears asking user to input the data, which is what I want, but when you click ok on that another pop up appears with, "Close Window has been cancelled. Do you still want to continue with this script?" If the user clicks Cancel they have to fill in the empty field. If they click Continue it takes them out of that modal window and the field that is required to have data is skipped. I don't want the, "Close Window has been cancelled..." pop up to appear. Here is what the script for this modal window looks like...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592861.86/warc/CC-MAIN-20180721223206-20180722003206-00507.warc.gz
|
CC-MAIN-2018-30
| 688 | 2 |
https://www.javapedia.net/Spring-Security/3481
|
code
|
Spring / Spring Security
What is DelegatingFilterProxy in Spring Security?
DelegatingFilterProxy is the entry point of Spring Security in a Java web application. It is a generic bean that provides a link between web.xml and application-Context.xml. Spring security uses filters to implement cross-cutting concerns like authentication and authorization.
In Spring security, these filters are also Spring bean so that they can take advantage of Spring's dependency injection features, hence they are declared inside the Spring configuration file and a delegating filter proxy (DelegatingFilterProxy) is declared on their behalf on web.xml as filter as shown below:
<filter> <filter-name>springSecurityFilterChain</filter-name> <filter-class> org.springframework.web.filter.DelegatingFilterProxy </filter-class> </filter> <filter-mapping> <filter-name>springSecurityFilterChain</filter-name> <url-pattern>/*</url-pattern> </filter-mapping>
At runtime, delegating filter proxy delegates HTTP requests to a bean class for filtering.
Dogecoin! Earn free bitcoins up to $250 now by signing up.
Earn bitcoins upto $250 (free), invest in other Cryptocurrencies when you signup with blockfi. Use the referral link: Signup now and earn!
Using BlockFi, don't just buy crypto - start earning on it. Open an interest account with up to 8.6% APY, trade currencies, or borrow money without selling your assets.
CoinBase! We'll both receive $10 in free Bitcoin when they buy or sell their first $100 on Coinbase! Available in India also.
Use the referral Join coinbase!
Invest now!!! Get Free equity stock (US, UK only)!
Use Robinhood app to invest in stocks. It is safe and secure. Use the Referral link to claim your free stock when you sign up!.
The Robinhood app makes it easy to trade stocks, crypto and more.
Webull! Receive free stock by signing up using the link: Webull signup.
More Related questions...
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00043.warc.gz
|
CC-MAIN-2023-23
| 1,895 | 16 |
http://www.greymatter.com/product/X-Ways-AG/X-Ways-Trace/280746
|
code
|
X-Ways Trace is a computer forensics tool that allows to track and examine web browsing activity and deletion of files through the Windows recycle bin that took place on a certain computer. Deciphers Internet Explorer's ever-growing internal history/cache file index.dat. Displays complete URLs, date and time of the last visit, user names, file sizes, filename extensions, and more. Allows to sort by any criterion. Reads from one more more files you specify, or searches complete folders and subfolders, or even entire hard disks (or raw images of hard disks) in allocated space, free space, and slack space, for traces of someone having surfed the Internet. Occassionally, accesses to local files are logged, too. You may search for specific domain, file, and user names. Also deciphers the browser history file 'history.dat' produced by Mozilla/Firefox and the browser cache file 'dcache4.url' created by the Opera browser.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945660.53/warc/CC-MAIN-20180422212935-20180422232935-00228.warc.gz
|
CC-MAIN-2018-17
| 927 | 1 |
https://www.tu.berlin/en/snet/about-us/team-and-persons/kaustabh-barman
|
code
|
Kaustabh completed his Master's degree in Information Systems Management at TU Berlin in November 2022. He wrote his thesis at T-Systems International on the topic of "Higher Education Diploma Certificates using Self-Sovereign Identity", where he worked on the evaluation of EBSI- and SSI-based diploma Verifiable Credentials. Previously, Kaustabh gained experience as a web and backend developer. He was a student assistant at the Zuse Institute Berlin (ZIB) and worked on the backend development of the open source project OPUS4 and has two years of professional experience in web development.
During his PhD, Kaustabh wants to explore the possibilities of using distributed ledger technologies in different domains and industries such as identity management, supply chain management and IOTs. His desire is to solve some real-world challenges with innovations in the Web 3.0 space.
Barman, K. (2022) Managing Higher Education Certificates using Self-Sovereign Identity Paradigm, Master Thesis. Technische Universität Berlin
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474670.19/warc/CC-MAIN-20240227021813-20240227051813-00501.warc.gz
|
CC-MAIN-2024-10
| 1,027 | 3 |
https://docs.appflowy.io/docs/documentation/appflowy-editor/licenses
|
code
|
Q1: What is the Mozilla Public License (the MPL)?
A: “The MPL is a simple copyleft license. The MPL’s “file-level” copyleft is designed to encourage contributors to share modifications they make to your code while still allowing them to combine your code with code under other licenses (open or proprietary) with minimal restrictions.”
Q2: How ‘viral’ is the MPL? If I use MPL-licensed code in my proprietary application, will I have to give all the source code away?
A: No. As long as MPL-licensed code is in a separate file from your proprietary code, you do not need to open-source your proprietary code.
Q3: How does the scope of the MPL’s copyleft compare with the LGPL and GPL’s copyleft?
A: MPL is less restrictive than LGPL and GPL. MPL’s copyleft applies to any files containing MPLed code. LGPL’s copyleft applies to any library based on LGPLed code. GPL’s copyleft applies to all software based on GPLed code. To better understand how the LGPL and GPL define “based on,” please read the licences and consult with your legal. Here is an article that explains the differences between these weak copyleft licenses.
Q4: I want to use appflowy_editor, which is under the MPL. What do I have to do?
A: “Nothing. Like all other free and open source software, software available under the MPL is available for anyone (including individuals and companies) to use for any purpose. The MPL only creates obligations for you if you want to distribute the software outside of your organization.”
Q5: I want to distribute appflowy_editor, which is available under the MPL, either changed or unchanged, within my organization. What do I have to do?
A: “Nothing. The right to private modification and distribution (and inside a company or organization counts as ‘private’) is another right guaranteed by free and open-source software licenses, including the MPL.”
Q6: I want to distribute (outside my organization) a version of appflowy_editor that I have modified. What do I have to do?
A: “To see the complete set of requirements, read the license. However, generally:
You must inform the recipients that the source code is made available to them under the terms of the MPL (Section 3.1), including any Modifications (as defined in Section 1.10) that you have created.
You must make the grants described in Section 2 of the license.
You must respect the restrictions on removing or altering notices in the source code (Section 3.4).”
Q7: I want to distribute (outside my organization) an executable program based on appflowy_editor that I have modified. What do I have to do?
A: “You must make available the MPL-licensed portions of the source code as described in the previous question and inform the recipients how they can obtain such source code (Section 3.2).”
Q8: I want to use appflowy_editor in a commercial application. May I do that?
A: Yes, appflowy_editor, which is available under the MPL, can be included in software that is sold commercially
This FAQ is mostly based on MPL 2.0 FAQ
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819067.85/warc/CC-MAIN-20240424045636-20240424075636-00470.warc.gz
|
CC-MAIN-2024-18
| 3,040 | 20 |
https://forum.justgetflux.com/topic/2649/works-fine-with-rooted-huawei-mate-8-al-10-chinese
|
code
|
Works fine with rooted Huawei Mate 8 [AL-10; chinese]
as it's more common to flood forums with "not working" threads I just want to say THANK YOU to the development team.
I'm using flux on PC for more over a year now and it just feels good.
I really have no idea if my sleep got better or so but it's much easier for my eyes.
Yesterday I found out by a fluke there is an Android version out there... WOOHOOO!
Installed it, works pretty nice for me.
It would like be a bit easier to have a better "proof" for my location. I'm not sure if it found it or not...
Another thing is a screen dim function. Most phones have a photometer (if this is the right translation for it; I'm not native English), so when the light is 0 lx the dim function could make the screen a bit darker.
But anyway, nice app. Well done!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499816.79/warc/CC-MAIN-20230130101912-20230130131912-00109.warc.gz
|
CC-MAIN-2023-06
| 807 | 9 |
https://answers.sap.com/questions/9123067/jdbc-sender-error.html
|
code
|
I configured a interface jdbc-PI-RFC
when i start the Communication Channel i have the follow error:
The JDBC driver returned the following error message: 'java.sql.SQLException: [Microsoft][SQLServer 2000 Driver for JDBC][SQLServer]Invalid column name '0'.'. For details, contact your database server vendor.
maybe the problem is in drivers? the DB is SQL server 2005 but drivers are for 2000.
It's strange because i have some channells writing in same DB without problem.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949331.26/warc/CC-MAIN-20230330132508-20230330162508-00083.warc.gz
|
CC-MAIN-2023-14
| 473 | 5 |
https://video.stackexchange.com/questions/29651/automating-adobe-premiere-pro-for-trimming-videos-based-on-volume-level
|
code
|
I have been recording screen-captured videos from my iPad explaining Math concepts (it's a Khan Academy style personal project). After I record it, I trim out the parts in which I'm in silence, either because I am making a diagram, or because I am thinking about what I will say.
I have a question related to automating Adobe Premiere Pro: can I automatically trim out those parts? Is there a solution out there that addresses that? Is it possible to build some code in the software where it trims out "anything below volume X"?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510149.21/warc/CC-MAIN-20230926043538-20230926073538-00354.warc.gz
|
CC-MAIN-2023-40
| 528 | 2 |
https://www.informit.com/articles/article.aspx?p=1180417&seqNum=2
|
code
|
- Crowded Data Centers and Service-Rich Software
- Virtualization: The "New" Kid on the Block
- Step 1: Download a Virtual Image of Your Required Operating System
- Step 2: Download and Install VMware Player
- Step 3: Run the Operating System Image
- Step 4: Shut Down the Operating System Image
- Step 5: Configure the Virtual Image for Networking
Virtualization: The "New" Kid on the Block
The typical data center hosts a large number of servers. In these security-conscious days, the data center is typically the preferred location for enterprise-critical machines, data, and server software. The problem is that many data centers are running out of both power and physical space. Virtualization provides a neat solution because it allows you to host more than one given operating system instance on one physical machine. Figure 1 illustrates the basic idea.
Figure 1 Virtualized Linux servers.
Figure 1 show two Linux servers being hosted on a single platform. The latter contains two Linux virtual machines, each of which continues to offer services to its user population. So virtualization allows you to consolidate the number of servers in your network. Provided that the virtual machine host has sufficient power, the users of the virtual machines should see no substantial drop in quality of service. However, the data center savings can be substantial.
Okay, that’s some background out of the way. Now let’s get started on learning about virtualization, using the excellent products available from VMware.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650409.64/warc/CC-MAIN-20230604225057-20230605015057-00137.warc.gz
|
CC-MAIN-2023-23
| 1,520 | 12 |
https://theqalead.com/tools/best-security-testing-tools/
|
code
|
There are so many different security testing tools so making a shortlist of the best can be tricky. You want to evaluate and improve the security of your software systems, networks, and applications - and need the right tool for your projects and team. I've got you covered! In this post I share from my personal experience using dozens of different security testing software with various teams and share my picks of the best security testing tools.
What Are Security Testing Tools?
Security testing tools are software used to assess and improve the security of computer systems, networks, and applications. These tools perform various tasks such as identifying vulnerabilities, simulating cyber-attacks, analyzing code for security flaws, and ensuring compliance with security standards. They play a crucial role in the proactive detection and mitigation of potential security threats.
The benefits and uses of security testing tools include enhancing the overall security posture of digital environments, protecting against unauthorized access and data breaches. They help in identifying and addressing security vulnerabilities early, reducing the risk of cyber-attacks. By ensuring compliance with security regulations, these tools build trust and credibility among users and stakeholders. They are essential in today’s digital landscape, where maintaining robust security practices is vital for protecting sensitive information and systems.
SQLMap is a python-based penetration testing tool that automates the detection and exploitation of SQL injection flaws and database takeovers. Penetration testers can utilize five SQL injection techniques: boolean-based blind, time-based blind, error-based, UNION query, and stacked queries. The system supports MySQL, Oracle, PostgreSQL, IBM DB2, and various other database management systems.
Once SQLMap detects SQL injection bugs in an application, testers can perform extensive database fingerprinting and execute various attacks. Supported attacks include brute-forcing table and column names, dumping database schemas, and enumerating users, privileges, and password hashes.
Penetration testers can integrate SQLMap with Burp Suite, an application testing tool, by utilizing PortSwigger’s SQLiPy extension.
SQLMap is free and open source.
The ImmuniWeb AI Platform offers a variety of SaaS products for asset discovery, penetration testing, and continuous web and mobile application monitoring. Security teams can monitor OWASP Top 10 and SANS Top 25 security vulnerabilities. Immuniweb offers a money-back guarantee if you find any false positives in your vulnerability reports.
ImmuniWeb On-Demand is a great tool to help businesses meet regulatory and compliance requirements in a simple, cost-effective way. It works by regularly performing a penetration test on systems that store or process personal data and identifying privacy misconfigurations that may violate compliance requirements. The platform covers a range of regulations, including HIPPA, California CCPA, CPRA, PCI DSS, Hong Kong PDPO, and EU and UK GDPR.
Users can easily integrate ImmuniWeb products with their existing development, web application firewall, and SIEM tools, including Bugzilla, Azure DevOps, Qualys WAF, and Splunk.
Pricing starts at $499/month. ImmuniWeb community edition offers a variety of free security tests for cloud systems, dark web exposure, and mobile and web applications.
OWASP ZAP is a free, open-source penetration testing tool for web applications. The system supports automated and manual penetration testing. ZAP’s ease of use makes the tool accessible to users of all skill levels, from developers to security experts. Testers can utilize ZAP as a stand-alone application or daemon process. Versions of Zap are available for major operating systems and Docker.
Many web application security testing tools aren’t user-friendly; however, ZAP simplifies penetration testing with its intuitive heads up display (HUD). The HUD is a user interface overlaid on a target application, enabling you to access ZAP functionality from any modern browser. This feature is handy for developers, who can efficiently conduct testing on custom build scripts by connecting them to the HUD.
SonarQube continuously inspects code quality utilizing static code analysis. The platform generates detailed reports on bugs, code smells, vulnerabilities, and code duplications, enabling software teams to detect security issues early in development. The program supports over 25 programming languages, including Python, Java, C#, and VB.NET.
Developers can ensure their code is ready for release with SonarQube’s Quality Gates, which enforce your organization’s quality policy. Developers can define a set of conditions a project must meet, and SonarQube will indicate whether your code has passed or failed. SonarQube recommends utilizing their default “Sonar way” Quality Gate, which focuses on keeping new code clean and spending less effort remediating old code.
SonarQube integrates with Jenkins, Azure DevOps, BitBucket, GitHub, and many other DevOps platforms.
Pricing for SonarQube’s Developer plan starts at $150/year based on usage. The Enterprise edition starts at $20,000/year. A free, open-source solution is also available.
Vega is a Java based security testing tool that helps you identify vulnerabilities in your applications by finding and validating SQL injection, cross-site scripting and inadvertently disclosed sensitive information. The tool runs on Linux, Mac and Windows, and provides an automated scanner for quick tests and intercepting proxy. Vega is GUI based and is extensible, allowing you to create new attack modules using the API exposed by the app. Vega offers features whereby it can automatically log into sites when supplied with user credentials, and also provides a crawler that powers its automated scanner. The tool also probes for TLS/SSL security settings, allowing you to identify opportunities for improving the security of your TLS servers. Lastly, you can configure Vega’s proxy to run attack modules while you are browsing the target site through it. Vega is fully open source and free to use.
Google Nogotofail is a network traffic security testing tool that helps developers and security teams monitor their HTTPS connections for common misconfigurations and known bugs. The software can detect various security weaknesses, including SSL certificate verification issues, MiTM attacks, and HTTPS and TLS/SSL library bugs.
Nogotofail supports Android, iOS, Linux, Windows, Chrome OS, and any other application or device you can connect to the internet. Users can deploy Nogotofail as a router, VPN server, or proxy. The system’s only dependencies are Python 2.7 and pyOpenSSL>=0.13
Nogotofail is open source and available for download on GitHub.
Invicti is an enterprise black-box security scanner for identifying vulnerabilities in web applications, websites, and web services. The platform combines dynamic (DAST) and true interactive (IAST) scanning to provide extensive vulnerability coverage and precise threat detection. After vulnerabilities are found, your team can utilize Invicti’s integrations with issue tracking systems to assign them for remediation.
Invicti produces detailed scan reports that enable developers to fix vulnerabilities quickly. Scan reports include various details about each security vulnerability, including its type, variant, classification (i.e., OWASP), location, and potential impact. Reports also include immediate actions developers can take to fix vulnerabilities.
The platform offers over 50 integrations, with support available for GitHub, Jenkins, and Jira.
Pricing is available upon request.
Sonatype offers a suite of products that enable secure software supply chain management. Products include firewalls, application lifecycle management, auditing solutions, repository management, and security tools. Nexus Lifecycle is one of Sonatype’s security tools that helps developers protect their open-source dependencies. The tool automatically identifies and remediates open-source vulnerabilities, allowing enterprise developers to scale open source monitoring across their software supply chain.
Nexus Lifecycle provides a flexible policy engine that gives application security teams complete control of their software. AppSec teams can create custom policies based on app type and organization. Users can also configure policies to report risks to stakeholders or fail software builds based on the severity of policy violations.
Sonatype’s products integrate with popular development tools, including Docker, OpenShift, and Azure DevOps.
Pricing is based on the number of developers on your team, with Nexus Lifecycle starting at $135/month for 25 developers.
Developers can implement real-time semantic code analysis into development with Snyk’s static application security testing platform, Snyk Code. Powered by machine learning, Snyk Code utilizes logic programming rules to identify security issues as code is written. The system is trained on Snyk’s Vulnerability Database, resulting in fewer false positives.
Snyk integrates with leading DevOps tools, including Microsoft Visual Studio, GitHub, CircleCI, and Jira.
A free forever plan with limited testing is available for individual developers. Subscriptions for teams start at $98/developer/month.
Intruder is a cloud-based vulnerability scanner that identifies weak points in public and private servers, cloud systems, websites, and endpoint devices. The platform’s robust scanning engines can uncover application bugs, like SQL injections and cross-site scripting, missing security patches, and encryption weaknesses. Intruder automatically prioritizes security issues that leave your infrastructure the most vulnerable, making it easy to minimize your attack surface.
Software teams can continuously monitor their AWS, Google, and Azure cloud environments with Intruder’s CloudBot. The tool performs hourly checks on your cloud accounts and automatically adds new external IP addresses and hostnames to Intruder for vulnerability scanning. Intruder’s Cloud Connectors also remove any IP addresses no longer in use.
Intruder supports integrations with development tools, such as Jira and Github, to help software teams triage issues for remediation and receive helpful notifications.
Pricing for Intruder Pro and Intruder Essential is based on the number of assets you need to scan. Software teams can try Intruder Pro free for 30 days.
- BeEF (Browser Exploitation Framework)
Pen testing software for web browsers
Open-source black-box security scanner
- New Relic
Best QA security testing with real-time performance insights
Offers comprehensive suite of tools for application, network, data, and cloud-native security
Attack surface management solution with multi-factor vulnerability assessment engine
Developer-friendly web application and API vulnerability scanner
- Burp Suite
Web security platform with automated and manual pen testing tools
Provides framework to automate security scanning and penetration testing for Python-based web applications
Risk-based vulnerability management solution with threat prediction capability
All-in-one solution for automated application security, detection, and response
These criteria will help you evaluate the top security testing tools on the market.
- User Interface (UI): An easy-to-use interface leads to faster adoption of new security testing tools.
- Usability: Developers are increasingly prioritizing security, meaning your testing tools need to be accessible to stakeholders outside the security team.
- Integrations: A security testing tool that supports your existing SIEM and DevOps tools won’t disrupt productivity.
- Value for $: Ensure the cost of your security tool is aligned with the value it provides to keep your IT infrastructure safe.
Security Testing Tools: Key Features
- Asset detection: Automated asset detection ensures your entire IT environment is monitored for critical vulnerabilities.
- Static application security testing (SAST): SAST tools help developers implement security operations earlier in the software development lifecycle.
- Policy management: A flexible policy management system enables DevSecOps teams to enforce software quality standards during each stage of development.
- Threat prioritization: With automated threat prioritization, teams can focus on remediating issues that leave their systems the most vulnerable.
What do you think about this list?
List of Related Tools:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473558.16/warc/CC-MAIN-20240221202132-20240221232132-00448.warc.gz
|
CC-MAIN-2024-10
| 12,598 | 62 |
http://nlblogroll.blogspot.com/2012/04/surprise-spring-cleaning.html
|
code
|
What started as an attempt to add newly collected blog's, ended up being a full blown spring cleaning session. This was not something that I had in mind to do, but unfortunate circumstances forced the extra work upon me. In the end though, I think what resulted from the unfortunate times was a revitalized hub, making the work all the worthwhile.
It all began when I went to add newbies to the main list and the system wouldn't let me. I tried many things to rectify the situation up to and including a restart from scratch of a whole new list. It wasn't until I added about 180 blog's to that new list, that I realized the issue was the number of blog's being added. Apparently, the system now doesn't like lists that large (and we do have a large list). So with that, I got back to the drawing board on some new design and organizational ideas. What I've come up with is what you now see on the main hub. I've essentially split the list up into many different rolls, 3 of which are dedicated to frequency of posting; the most frequent updater's, the semi frequent updater's, and a list for the the not-been-updated-in-a-while folk. There is also a 4th list which is dedicated to the newest of the new to be added here. These few lists will be in constant flux I figure, as I move things around accordingly. You can check all those out in the right sidebar and while you're at it, check out the category lists which I've moved to the left hand side of the page.
I should also note that I've trimmed the list slightly as well. There were a small number of blog's which would not load anymore or were indicated as deleted. Those are no longer here, but we still have a total of 375 and that is absolutely awesome. That number does include a big bunch of newbies as well and I'll be posting more about that soon...
In the meantime, have a look around!
Newfoundland, Labrador, Newfoundland and Labrador, Canada, BlogRoll
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123560.51/warc/CC-MAIN-20170423031203-00487-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,918 | 5 |
http://3awini.info/about
|
code
|
3awini is a social network for university documents sharing. the main objective of 3awini is to connect university students, and help them to share their documents in a organized manner. Besides that, 3awini frequently publish scholarship offers along with videos explaining the application steps.
3awini will enable you to do the following things:
- Read thousands of documents
- Upload documents
- Save documents to view them later
- Share documnets in Facebook and other social media
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400202686.56/warc/CC-MAIN-20200922000730-20200922030730-00622.warc.gz
|
CC-MAIN-2020-40
| 486 | 6 |
https://www.redmine.org/boards/4/topics/52831?r=53296
|
code
|
How to update journal by using Rest Api
As mentioned in this issue #25793
I wonder how I can use Rest Api to update a journal.
curl -v http://server/pm/journals/327.json -H "Content-Type: application/json" -H "X-Redmine-API-Key: <my key>" -X PUT --data-binary "@put.note.json"
and it returns Not Authorized.
As Toshi MARUYAMA wrote in the aforementioned issue, I can update it by issue Api, but I don't find the wiki page about that. What I found is how to get journals with issue api. Can anybody point me to how to update a journal?
RE: How to update journal by using Rest Api - Added by Guillermo ML 12 months ago
AFAIK you can't edit a journal using REST Api, you can add a journal to an issue or obtain the issue's journal list.
The library Python Redmine have a very good documentation about it
The docs are about the library, but as it says that supports 100% of Redmine API it's a useful resource about what you can or can't do using the REST Api.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593302.74/warc/CC-MAIN-20180722135607-20180722155607-00374.warc.gz
|
CC-MAIN-2018-30
| 955 | 10 |
https://www.blackhatworld.com/seo/questions-about-ahrefs.568959/
|
code
|
I were wondering how Ahrefs shows social shares. I'll explain it better: You see there's twitter/google +/fb shares/facebook likes? then: How to "Like" a website? If I share a website on facebook, he'll get another facebook shares count or I've to do that trought some feed? also, How to "like" a youtube video? I checked few youtube videos got likes on Ahrefs. I know shares and so are given by "Share" section under any vid of youtube, but the likes? Thanks for the time, hope to see some answers!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864572.13/warc/CC-MAIN-20180521235548-20180522015548-00449.warc.gz
|
CC-MAIN-2018-22
| 499 | 1 |
https://root-forum.cern.ch/t/jsroot-how-to-change-the-path-of-root-files/29091
|
code
|
I would like to specify an other path to load my .root files in the JSRoot which I included in my web site by using a iframe src="…jsroot…"
That iframe shows a canva which contains the root content loaded and a select which loads files from “…/files/examples.root”, How can I change the default path “…/files/” from this select ?
Hope there are JSRoot users here, thank you.
You can use “path” parameter in URL string:
It only makes sense, when you want to load many files at the same time. Like in this example:
Thanks good to know, I also change the path="" attribut in the main page index.htm and it seems to be the default path now.
This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103269583.13/warc/CC-MAIN-20220626131545-20220626161545-00117.warc.gz
|
CC-MAIN-2022-27
| 757 | 7 |
https://support.asperasoft.com/hc/en-us/articles/216129198-How-to-purge-transfer-data-in-v-3-2-2-Aspera-Platform-On-Demand-APOD-and-Shares-On-Demand-SHOD-
|
code
|
To avoid running out of disk space on your server, we highly recommend you to periodically prune your transfer data in the Aspera Console database. This article shows customers how to purge Console data in v.3.2.2 Aspera Platform On Demand (APOD) and Shares On Demand (SHOD).
This article assumes the following:
- You have purchased and booted up v.3.2.2 APOD or SHOD
- You have administrative log in to the server and Aspera Console Web UI.
- You can SSH as root to your Aspera On Demand Instance. If you don't know how, please see this article.
You can backup or archive/purge the Console database from the Database Maintenance page. To access the Database Maintenance page, log in to Console Web UI as admin, go to.
To archive and purge data, click the Purge... button and complete the form fields. Form fields exist as follows:
- Select Run now to backup the database immediately, or Run later to specify a time in the future or to configure a repeating purge operation.
- For Select time frame, choose Data older than... to delete data that is older than specified time frame.
- For Data to purge, check the type of transfer data that you wish to purge.
- If you would like to save the data being purged (i.e., archiving), enable the corresponding checkbox.
- If the Save data being purged checkbox is enabled, enter the desired absolute path into the Save to field (e.g. /tmp/data or D:\data\). The purged data will then be stored in the file purged_data.sql within the [absolute path]/console_purge_YYYY-MM-DD_hhmmss/.
When finished, click the Purge Data button.
To schedule a purge, select Run later, complete the form fields and click Schedule Purge.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578531994.14/warc/CC-MAIN-20190421160020-20190421182020-00507.warc.gz
|
CC-MAIN-2019-18
| 1,659 | 14 |
https://www.girlscoutsofmaine.org/en/sf-events-repository/2022/let-s-plan--events-q-a---virtual---01-25-2022.html
|
code
|
Let's Plan: Events Q&A - Virtual - 01.25.2022
If you are interested in planning a Girl Scout event, you've come to the right place! This Let's Plan: Events Q&A is designed to follow the video you'll find in gsLearn along with the Let's Plan: Events Toolkit.
In this session you'll share the beginnings of an event you would like to plan with your committee, and we'll discuss how you see planning, designing, delivering, and evaluating that event.
Please come prepared to discuss and engage!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300616.11/warc/CC-MAIN-20220117182124-20220117212124-00612.warc.gz
|
CC-MAIN-2022-05
| 491 | 4 |
https://www.opengl.org/news/archives/www.khronos.org/devu/opengles_challenge/P2505/
|
code
|
OpenGL News Archives
Slut is a programming framework for 3D graphics and networking applications that integrates the OpenGL, SDL, and Twisted networking APIs with a coherent interface to them using a Python wrapper. It fuses the libraries’ event loops which sufficiently reduces the complexities that are common to concurrency-critical frameworks. Networking and interactive computer graphics can be lerveraged from within one thread-less process.
This talk form GDC 2005 covered techniques developed in the research community to augment ragdoll systems with more interesting behaviors as well as techniques to integrate simulation with traditional character animation. The demo uses the OpenGL API, GLUT and the ODE free library for rigid body dynamic to simulate a ragdoll character augmented with a simple pose controller.
The Lightweight Java Game Library (LWJGL) is a solution for commercial quality games to be written in Java. It supports the OpenGL and OpenAL APIs, as well as access to controllers such as gamepads and joysticks. The OpenGL API is integrated via Java that specifies the interface to C code which in turn calls the appropriate OpenGL method. The new v0.96 adds AWT support and expanded DevIL and FMOD support.
This sample demonstrates how to perform alpha blending using the alpha channel of a standard .tga texture. For proper alpha blending, the sample uses a cull-mode sorting trick to ensure the sides of the textured cube get rendered in back-to-front order.
GLStereoPlayer is an OpenGL API-based stereoscopic movie and image viewer application. It supports various input file formats via DirectShow and DevIL libraries, and popular stereo rendering types including anaglyph, horizontal and vertical split, interlaced, Sharp3D and quad buffer. The software consists of 3 components: an easy to use standalone application, an ActiveX control to embed stereoscopic contents in other applications, and a GLUT based simple viewer application for reusability. Its source code is be a good example of implementing a movie texture in OpenGL API-based software. For Win32, written in C++, under LGPL.
SARGE is an animation SDK that helps you to import object and character animations from 3D modelling software into your own OpenGL API-based application or game engine. It supports import and play of animations with bones using an object’s weightmaps to determine influence of each bone on the animated object, ragdoll physics, child parent hierarchies, interpolation, shaders, and fast object swapping. The downloadable demo is an OpenGL API-based example.
IRIS Explorer V5.2 visual programming environment for OpenGL API accelerated scientific visualizatio
IRIS Explorer is a scientific OpenGL API-accelerated data visualization system that features a visual programming interface to you to develop, prototype and build visualization applications quickly and easily. Visualization techniques range from simple graphs to multidimensional animation.The new V5.2 is available for Linux and Mac OS X running X11 (and also Windows, SGI, Sun, HP and IBM systems)
This demo with source shows how to create a motion blur effect using the OpenGL API without the accumulation buffer. By rendering the object into a texture you can access the precedent frame, and render it with a lower alpha value. Doing this in a recurrent mode we get a motion blur effect.
The GO Screen Saver V3.0 uses the OpenGL API to play GO games in 2D and 3D. Features include camera movements, board tags, board in 2D and 3D, and 3D markers. The GL_ARB_vertex_buffer_objects is used to display stones on the 3D board. This feature can be disabled/enabled in real time. The software also include an OpenGL analyser of OpenGL extension support form your video card.
This demo with source, uses the OpenGL Shading Language to create a video mixer where you can blend two video sources together. It requires an NVIDIA FX 5200+ or ATI Radeon 9500+.
OpenGLEAN is an evolution of GLUT based on OpenGLUT and freeglut. It provides an OpenGL API 3D graphics rendering context attached to windows. (The name is supposed to suggest “lean”, in contrast to “glut”). The new v0.2 adds support for Win32 using C and .Net. It also adds support for OpenGL auxiliary buffers (a possible first for GLUT-like programs)
sdljava is a java binding to the SDL library with support for access to the audio, keyboard, mouse, joystick, 2D framebuffer and OpenGL API-accelerated 3D hardware. This latest release adds GLU support to the gljava OpenGL API bindings.
The open source Tao Framework is a complete framework to develop OpenGL API-based applications in .NET enviroments, including cutting-edge games, a graphics demo, a data visualization application, or an audio application. It is cross platform using the Mono plaform and supports Cg, DevIL, FreeGLUT, ODE, OpenAL, OpenGL, and SDL APIs.
NOC is a free program for protein structure model-building, visualization, validation and analysis. It supports hardware 3D-stereo views using OpenGL API quad-buffer, OpenGL API-based vivid rendering, line-smoothing, fogging, lighting, and 3D text-generation for labeling.
This article begins with a discussion of general optimization concepts, such as usign GLfloats, minimizing state changes, using threads etc. Feature topics include drawing with vertex data, handling static vertex data, handling dynamic vertex data and handling mixed data. Pseudo code is offered. The general concepts are applicable to all OpenGL API coders: Don’t do any work you don’t have to do; take maximum advantage of the available CPU and GPU hardware; and let your hardware resources work as independently as possible
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865438.16/warc/CC-MAIN-20180623225824-20180624005824-00499.warc.gz
|
CC-MAIN-2018-26
| 5,676 | 17 |
https://www.bleepingcomputer.com/forums/t/378939/postgresql-causing-pc-to-freeze/
|
code
|
Jump to content
Posted 11 February 2011 - 09:18 AM
Posted 11 February 2011 - 09:51 AM
Posted 11 February 2011 - 09:54 AM
Posted 11 February 2011 - 10:58 AM
Posted 11 February 2011 - 02:57 PM
Well...my general experience is that warnings in Event Viewer are to be ignored, they are not errors that the system has noted, but more in the nature of administrative comments.
So, I generally ignore all warnings, while paying attention to errors noted in Event Viewer.
I guess that I'm curious as to how you determined that this database program...is responsible for your freezing. I would be looking for a better candidate, amongst the errors reflected in Event Viewer. Or examing the possibility of system overheating. Or any number of other likely causes.
Do you have any actual errors that appear in Event Viewer...that approximate your freezes?
Have you looked at the Application tab in Event Viewer for errors?
Let's see what others think .
Posted 11 February 2011 - 03:29 PM
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509170.2/warc/CC-MAIN-20181015100606-20181015122106-00138.warc.gz
|
CC-MAIN-2018-43
| 1,014 | 14 |
https://forum.arduino.cc/t/what-causes-error-downloading-https-downloads-arduino-cc-libraries-library-index-json/927394
|
code
|
I have two portable "installations" of the Arduino-IDE on my laptop
Arduino 1.8.13 and 1.8.16
the 1.8.16 shows an error-message
error downloading https://downloads.arduino.cc/library_index.json
thank you J-M-L the correct URL is
while the 1.8.13-version can download it.
I'm not aware of having changed something in my 1.8.16-version.
what can cause this error ? What do I have to check to fix it?
best regards Stefan
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358469.34/warc/CC-MAIN-20211128043743-20211128073743-00523.warc.gz
|
CC-MAIN-2021-49
| 417 | 9 |
https://blog.fyber.com/fyber-sdk-user-segmentation/
|
code
|
Lately, developers have been asking us how we can support their user segmentation efforts. We know that user segmentation is crucial for developers who want to apply different monetization strategies to different groups of users. We’ve been considering these questions and would like to shed light on the capabilities of our SDK to support user segmentation rules for ad serving.
We’re happy to report that our SDK offers full compatibility with your pre-existing user segmentation rules, and even beyond that, we’re building more advanced tools to be rolled out this summer. By using our SDK in conjunction with the user segmentation rules you have put in place, you can serve ads to select groups of users.
Most commonly, we see developers separating their user pool into paying users vs. non-paying users, or new users vs. returning users. These user segments are often a core component of developers’ ad monetization strategies, influencing ad serving and targeting.
If you want to segment your users so that only non-paying users see ads, or so that paying users only see ads after a certain level, it’s simple to implement. By adding just a snippet of code, you can ensure that our SDK is only called to serve an ad when specific user segments encounter your ad placements.
Our developer portal contains a step-by-step guide to help you leverage our SDK capabilities for user segmentation rules.
Senior Product Manager
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00395.warc.gz
|
CC-MAIN-2022-33
| 1,434 | 6 |
https://www.minecraftforum.net/members/Blackops4513/reputation
|
code
|
Hey, i'll give you an answer to number 1 and 2.
1.) There is a purpose to leveling up. With leveling up, you can use the points to rename your items(with an anvil), enchant items, and alot more. Not just that but some servers for MC, have markets that you have to use the points for the items you want.
2.) Yes your levels drop to 0 when you die. If you can get back to the spot where you died, you might be able to retrieve some of the points(if not all), along with the items you had in your inventory.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487608702.10/warc/CC-MAIN-20210613100830-20210613130830-00279.warc.gz
|
CC-MAIN-2021-25
| 504 | 3 |
http://www.1-script.com/forums/php/help-parsing-linefeeds-79715-.htm
|
code
|
Do you have a question? Post it now! No Registration Necessary. Now with pictures!
July 12, 2007, 9:14 pm
rate this thread
preserve all periods and linefeeds too, so I can't simply use strtok
or explode (both of which don't tell you where or which (period of lf)
delimiter was found). So, I've written a function that tells me where
the periods and linefeeds are. The problem is, I am having trouble
figuring out what the character values are for the linefeed.
For example, suppose I have this string:
"This is a sentence. I need to find linefeeds and periods.
Sometimes a sentence will end in a period. Sometimes not
I need to capture them all";
So, basically, I need to grab all of the sentences, AND preserve the
knowledge of where all the periods and line feeds are. But, it looks
like I'm encountering multiple characters for a hard return. Which is
strange, because simply comparing a character to "\n" is finding the
locations of the hard returns fine. So two questions-
1) Is there a way to display the ASCII value of a char in PHP?
2) Is there an easy way to find and save the location of all of the
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719192.24/warc/CC-MAIN-20161020183839-00135-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,108 | 19 |
https://www.lynda.com/Symfony-tutorials/Creating-editing-debugging-entities/160060/186896-4.html
|
code
|
Join Jon Peck for an in-depth discussion in this video Creating, editing, and debugging entities, part of Up and Running with Symfony2 for PHP (2014).
Let's switch to a browser so we can start using…the newly created code.…Navigate to sandbox dot dev port EDA…slash symphony web app dev, but this time…pass it slash publication as the path.…Fantastic, we've got a simple list.…Nothing that I'd show to an end client,…but it's functional.…There's just one link here,…create a new entry,…so let's click it.…Well, this is a bare bones form,…but it's functional enough.…
Let's specify sandy sure, s-u-r-e for the name,…which is an intentional mistake.…It'll actually be sandy shore.…Click create.…No confirmation is shown,…but there's a very simple view,…a publication ID 1 with a name.…Let's edit it and make sure that it works…by clicking the edit link.…Update the name to sandy shore,…and click update.…Clicking update looks like it does nothing,…but at the bottom of the screen,…the debug component tells a different story.…
Click on the database icon over on the right.…This will show details from the profiler.…Looks like only one query took place, a select.…Wait a second.…Didn't we make a change?…
- Installing Symfony
- Creating a bundle from the console
- Customizing and generating database tables
- Generating controllers
- Creating, editing, and debugging entities
- Displaying and debugging a form
- Rendering content with templates
Skill Level Intermediate
Q: When trying to access the application, I receive an error stating "This script is only accessible from localhost." How can I get around this restriction?
A: The development front controller and configuration scripts are protected by default to only allow access from the localhost. Refer to the video titled “Exploring the Symfony layout” to see how to disable this security.
Q: I specified the wrong database credentials and got an "Access denied for user" error from doctrine. How can I fix the database configuration?
<div>A: The most likely cause is a typo or misconfiguration in the Symfony parameters file, which you can find at ./symfony/app/config/parameters.yml. This file is typically generated during installation using an interactive wizard.</div><div> </div><div>Symfony requires read and write access to a MySQL database, and needs to know how to connect to the database. Therefore, you'll need to specify a username, password, port (if nonstandard), host, and database name. The credentials to your individual development environment are likely different than the ones used in the course; please use your best judgment in determining the correct values. After making a change, verify the configuration by using a web browser to navigate to /symfony/web/config.php, then click “Configure your Symfony Application online” at the bottom of the page.</div>
Q: How can I configure PHP's time zone?
<div>A: You'll need to edit PHP's configuration to specify a time zone. The <em></em><a href="http://www.lynda.com/Apache-tutorials/Up-Running-Linux-PHP-Developers/158372-2.html"><em>Up and Running with Linux for PHP</em> <em>Developers</em></a> PHP configuration can be modified by editing the custom configuration:</div><div> </div><div>sudoedit /etc/php5/mods-available/custom.ini</div><div> </div><div> If you have a different development environment, determine the location of your php.ini configuration file. Specify a date.timezone, such as: </div><div> </div><div>date.timezone = America/Los_Angeles</div><div> </div><div>Then restart the server using: </div><div> </div><div>sudo service apache2 restart</div><div> </div><div>A full list of supported timezones can be found at <a target="_blank" href="http://php.net/manual/en/timezones.php">http://php.net/manual/en/timezones.php</a>.</div><div> </div>
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00359-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 3,863 | 18 |
https://www.digitalocean.com/community/questions/how-to-reduce-the-requests-on-apache2-server
|
code
|
If you have IP address of bot accessing your site, you can block it using firewall or Apache config.
A firewall blocking is easier IMO, as one command will block IP to accessing your server.
On Ubuntu, you can use
ufw which is very simply to configure and use.
Step 7 of Initial Server Set Up tutorial covers setting up a
To block IP address, you can use following command:
- sudo ufw deny from 188.8.131.52
184.108.40.206 is IP address of user/bot you want to block.
Also, you can block subnet following command:
- sudo ufw deny from 220.127.116.11/24
ufw essential tutorial should give you more insight on this topic.
Second option is to block via Apache config. This could be harder, as you have to change config and restart/reload Apache every time you do so.
Apache docs should help you around this if you’re interested in it.
Be very careful when you doing above. You can sometimes block regular users or ‘good’ bot.
For example, Google uses bots to crawl and index your web site. If you block Google bot, this will affect your rank in Google Index and position on Google Search. In case of Google, you can verify are bots accessing your site their, by following steps written on their help page. Same applies for other engines, so make sure you really ban malicious bots.
UFW (uncomplicated firewall) is a firewall configuration tool that runs on top of `iptables`, included by default within Ubuntu distributions. It provides a streamlined interface for configuring common firewall use cases via the command line.
This cheat sheet-style guide provides a quick reference to common UFW use cases and commands, including examples of how to allow and block services by port, network interface, and source IP address.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585518.54/warc/CC-MAIN-20211022181017-20211022211017-00390.warc.gz
|
CC-MAIN-2021-43
| 1,726 | 17 |
https://najibrazak.com/i-took-some-time-last-saturday-to-attend-tweet-up-kami-at-bukit-jalil/
|
code
|
I took some time last Saturday to attend Tweet-Up KAMI at Bukit Jalil stadium. It was a good chance for me to meet up with fellow Malaysians from the Twitterverse in an offline setting.
Here is the video of the event
Kuala Lumpur, 09/06/2012 – Saya hadir ke #twtupkami yang berlangsung semalam di perkarangan kompleks sukan bukit jalil.
Original post: https://www.facebook.com/157851205951/posts/419316604779266/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152144.81/warc/CC-MAIN-20210726152107-20210726182107-00118.warc.gz
|
CC-MAIN-2021-31
| 414 | 4 |
https://www.softwaretestingo.com/testing-using-soap-ui/
|
code
|
What you’ll learn: Testing Using SOAP UI
Installation of Simple Object Access Protocol User Interface (SOAP UI)
Usage of Simple Object Access Protocol User Interface (SOAP UI)
Web services Description Language (WSDL) testing in SOAP UI
Load Testing in SOAP UI
Security Testing in SOAP UI
Representational State Transfer (REST) Testing in SOAP UI
Functional Testing in SOAP UI
Testing Using SOAP UI Description
Simple Object Access Protocol User Interface (SOAP UI) is a web service testing application for service-oriented architectures (SOA) and Representational State Transfers (REST). Its functionality covers web service inspection, invoking, development, simulation and mocking, functional testing, load, and compliance testing.
In this, you can get access to the tool by installing it or downloading the binary file for practice so that if I missed something or it got updated, you can have hands-on practice.
SoapUI Core features include:
- Web services inspection
- Web services invoking
- Web services development
- Web services simulation and mocking
- Web services functional, compliance and security testing
Below are the topics covered
- Lecture – 1 Introduction on SOAP UI
- Lecture – 2 Installation instructions for SOAP UI
- Lecture – 3 Various Components and usage of SOAP UI
- Lecture – 4 WSDL Testing using SOAP UI
- Lecture – 5 Load Testing using SOAP UI
- Lecture – 6 Security Testing using SOAP UI
- Lecture – 7 REST Testing using SOAP UI
- Lecture – 8 Functional Testing using SOAP UI
- Beginner to Simple Object Access Protocol User Interface (SOAP UI)
- All audience
Manu was born in the year 1986. He completed his diploma in Electronics and Instrumentation Engineering (DEIE) in 2005 at Krishnadeveraya Government Polytechnic. He did his Bachelor of Technology (B.Tech) in Electronics and Communication Engineering in the year 2008.
He completed a Masters in Electrical Engineering in the year 2009 at the University of Bridgeport, Bridgeport, CT US. He worked for five years in Information Technology (IT) as a Systems Analyst in the United States and has one approved patent from the United States Patent and Trademark Office (USPTO) and two filed patents. He published many articles, including research, policies, reviews, mini-reviews, editorial, short communication, and letter to the editor in various journals.
He is an IEEE Member (Member No: 80399531), member of Golden Key International Honour Society (Member No: 16342916), Member of Epsilon Pi Tau (Member No: 148800), Member of Sigma Alpha Lambda (Member Id: 206804).
His areas of interest include but are not limited to, Electrical Engineering, Nanotechnology, Nanomedicine, Robotics, Quantum Physics, Physics, Electromagnetics.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088471.40/warc/CC-MAIN-20210416012946-20210416042946-00238.warc.gz
|
CC-MAIN-2021-17
| 2,737 | 32 |
https://www.deltanova.co.uk/electronics/arm/initial-research.html
|
code
|
What have I learnt from my initial research?¶
There are many development boards on the market some available for only a few pounds so getting the hardware is going to be the easy part.
Program Upload Options¶
ARM devices include in hardware a serial bootloader to upload the program. In the case of newer devices they might also include a usb bootloading capability too. The upload method is documented and people have written scripts to perform the upload via this method. Programs can also be uploaded over SWD interface.
Debugging/Testing has two interface options to consider JTAG & SWD.
JTAG (Joint Test Action Group) – An industry & IEEE standard since 1990, uses more pins, but allows for boundary scan.
SWD (Serial Wire Debug) – Lower pin count than JTAG, better performance, no boundary scan.
Black Magic Probe - https://www.blacksphere.co.nz/main/blackmagic
The blackmagic probe developed by Blacksphere Technologies acts as a GDB server. The official hardware is expensive however the firmware is available on GitHub and can be loaded onto inexpensive compatable hardware. So the hardware and GDB server are integrated resulting in a simpler debugging setup. The blackmagic probe supports JTAG & SWD on a range of Cortex-M series targets from a range of manufacturers.
https://github.com/blacksphere/blackmagic https://github.com/blacksphere/blackmagic-hardware https://esden.net/tag/black-magic-probe/ (mentions openOCD vs BMP) https://wiki.paparazziuav.org/wiki/DevGuide/GDB_OpenOCD_Debug compares usage of openOCD vs BMP in debugging.
The information available indicates that a GNU/ARM tool-chain is available for Linux. This is where things become interesting. There are a number of IDE which support the hardware. In many cases these are a customised version of Eclipse. I have never been a fan of Eclipse as too much seems to be going on in its interface. I perfer a general text editor and the command line. An IDE would have to prove useful to what I needed to do to warrant its use.
The difficult step is deciding on libraries for the hardware. There are reports of the official libraries being badly written. Some official libraries have changed over time and there are distinct versions with their own pros & cons. There are users who say they always write their own libraries from scratch. Which path to go down will eventually depend on how familiar I become with the hardware. A pre-written library will give me a head start, but that is not to say that it cannot be improved upon in some situations.
Initial Research Summary¶
So after reading many forum posts and articles here is what I have decided upon.
I have ordered 3 STM32F103C8T6 ARM Minimum System Development boards from eBay for a total of £6.81 (Jan 2016). These will plug into a breadboard and be suitable for initial development. Other boards can be made or purchased later as required.
A Python script stm32loader.py located on GitHub will allow a compiled program to be uploaded over a serial connection. I already possess a USB to serial converter so I would just need to connect this up to the board.
It should be possible to upload the Blackmagic firmware to one of the Minimum system development boards. This would give me my own blackmagic probe and allow me access to the JTAG and SWD interfaces. In addition it allows program upload via SWD.
The GNU/ARM toolchain will meet my needs. A few tutorials exisit that can point me in the right direction when it comes to setting it all up. I will document my procedure as I haven’t yet found an example that follows what I am doing.
It would seem that work is underway to add support to the Arduino environment for STM32 devices. This may be worth looking at as a intermediate option between command line and full IDE. I know I am trying to avoid the Arduino IDE but knowing it is available could be of use.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103821173.44/warc/CC-MAIN-20220630122857-20220630152857-00546.warc.gz
|
CC-MAIN-2022-27
| 3,860 | 19 |
https://themaurers.me/2015/11/04/some-autumn-fun/
|
code
|
Today I puzzled around with pictures. It is no secret, at least not anymore, that I love the colours of Autmn. So when I stumbled over a pretty neat and easy software to place objects in front of an other background, the first idea that came across my mind was use the RL pictures that I took only a couple of days ago and add some bondage or other fun to it. Ok, here we go….
04 Nov 2015 Leave a comment
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119080.24/warc/CC-MAIN-20170423031159-00342-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 406 | 2 |
http://prestacreator.com/horst-funken-dissertation-37/
|
code
|
Postdoctoral Research fellow with experience in Genomics, transcriptomics, proteomics and metabolomics. Tornadoes and tornadic storms: Mathematical modelling of biosystems and bioprocesses , Mathematical modelling Tools: The summertime low-level jet over the Gulf of California. Acoustic radiation interparticle forces in a compressible horst. Molecular microbiology , Microbiology. My main interest is to analyze the central metabolism of Bacillus subtilis using systems biology software.
Professor in biotechnology at the Dept. The Architecture of Amnesia. Easy expository essay topics for college students. Ocean-atmosphere interaction and the tropical climatology. Data analysis Mathematical modelling Bioinformatics Systems biology , dynamics of biological networks , dynamics and control of biological networks.
Vortex signature recognition by a Doppler radar. Next during my PhD work I came into Life Sciences doing data analysis on microbial batch fermentations Dissertqtion coli.
Escherichia coli physiologySystems BiologyEscherichia coliMicrobiology. I’m currently working on a dynamic model of nitrate respiration in E.
Effects of hydrostatic approximation and resolution on the simulation of convective adjustment. Precipitation over the Atlantic Ocean, S to N.
Dissertation expert interviews
Physical chemist with expertise in experimental kinetics, molecular biology, and mathematical modeling.
Goettingen, Germany, August – graduated with a grade of 2. How do you make sims do homework on sims 3. A global horst of albedo, roughness dissertation, and stomatal resistance for atmospheric general circulation models as represented by the Simple Biosphere Model Dissertatiion. Thermodynamic-Kinetic Modelingmodel reduction Tools: The dissertation atmosphere as an oscillating system.
Systematic errors in the NMC medium range forecast model during the and winter seasons.
Horst funken dissertation . Help essay
I am working with the protein KefF, a regulatory subunit of the potassium channel KefC. The research of the Systems Biology Group at the University of Luxembourg is focussed in the area of experimental and theoretical systems biology.
Systems Biologydynamics and control of biological networksData ManagementMathematical modelling. Research focuses on the analysis of the metabolism of anaerobic fermentative bacteria and archaea, especially with respect to biofuel production hydrogen, butanol.
Systems BiologyMetabolomicsTranscriptomics Tools: PhylogeneticsGenomicsBioinformatics.
Horst funken dissertation
Radiative heating of the global atmosphere. ProgrammingPhysicsMathematical modelling.
Workshop on Micrometeorology, Amer. GlycolysisLimit cycle oscillations. Data ManagementBioinformaticsFunkenn Tools: Dynamic modellingMatlabCopasiFlux balance analysis. This was born for my US Objectivity Class in september to funken movie of: Mathematical and statistical modelingbioreactor modelsdynamics of biological networksdynamics and control of biological networksparameter estimationReactor modelsMathematical modellingRissertationMolecular Biology.
The relationship between tropical cyclone motion and environmental geostrophic flows.
Sprengel Museum Hannover Sortir de sa Reserve. Project CoordinatorVice Coordinator. GCM studies of the influence of vegetation on the general circulation: Working on high throughput data analysis microarray data, next generation sequencing and data integration database management, text-mining, gene annotation via public databases Logical modellingDynamic modellingComputational Systems Biologydisserattion western blot analysisTranscriptomics.
California Institute of Technology, Energy dissertation in body-forced turbulence.
Davies, and and, A horst for estimating the synoptic meteorological controls on air and precipitation chemistry-Results from Eskdalemuir, south Scotland. Restaurant business plan exit strategy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396089.30/warc/CC-MAIN-20200528104652-20200528134652-00162.warc.gz
|
CC-MAIN-2020-24
| 3,888 | 20 |
https://powerusers.microsoft.com/t5/Using-Flows/Flow-between-flagged-messages-in-Outlook-to-create-task-in/m-p/203330
|
code
|
According to your description, I have started a flow from the template “Create planner tasks for flagged emails in Office 365” you mentioned.
However, the issue that the tasks get duplicated multiple times doesn’t occur on my side.
The flow will be triggered only one time when an email is flagged and one task will be created in Planner.
Could you try again with it?
Please feel free post back if you are still having the issue.
i got the same issue,
whenever i answer or receive a followup of the same mail conversation as the flagged e-mail, i got another task created .
seems like answering or receiving a mail with the same subject is similar as flagging a new email .
i suppose that @j0s03w8 is referring to this issue,
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204768.52/warc/CC-MAIN-20190326014605-20190326040605-00177.warc.gz
|
CC-MAIN-2019-13
| 731 | 9 |
https://handstee.com/product/good-bluey-dad-shirt
|
code
|
I have a Good Bluey Dad Shirt like that, her kids (2 boys) would terrorize any house they visited with her, take other kids’ toys, hit, scream, etc. If anyone tried to discipline (talking to them, telling them no, occasionally yelling) she would flip out start arguing and fighting with you over it and leave… this is not ok and OP did nothing wrong… if my daughter did that to my son (daughter 15 sons 17) and he hit her I’d most likely tell her she deserved it tbh…
Good Bluey Dad Shirt, Tank Top, V-neck, Sweatshirt And Hoodie
Attempting to attack a 14yo as a Good Bluey Dad Shirt grown-ass man is fathoms worse than two children of similar age regardless of sex fighting each other. Dude is a straight-up psycho. If I caught my son beating a woman, regardless of his age, that’s an ass-whooping. If he is defending himself, that’s another story. Well, that’s what happens when you throw the first punch. Based on how her parents also reacted this is very likely.
Other products: Top The Heart Nurse Eagle American Flag Shirt
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510498.88/warc/CC-MAIN-20230929054611-20230929084611-00738.warc.gz
|
CC-MAIN-2023-40
| 1,044 | 4 |
http://vibrantbootcamp.net/win2k3_notes/win2k3_812%20290.htm
|
code
|
8.1.2 Modifying Shared Folder Properties
You can modify existing shared folders properties from the Shares folder clicking the shared folder, and
then on the Action menu, click Properties. The General tab of the Properties dialog box shows you the
share name, the path to the shared folder, and any comment that has been entered. The General tab also
allows you to view and set a user limit for accessing the shared folder. The Security tab allows you to view
and change the shared folders permissions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822851.65/warc/CC-MAIN-20171018085500-20171018105500-00094.warc.gz
|
CC-MAIN-2017-43
| 502 | 6 |
https://supportforums.cisco.com/t5/ip-telephony/h-323-gw-with-fxo-cannot-see-the-incoming-number-cm-7-1-5/td-p/1545771
|
code
|
H.323 GW with FXO, cannot see the incoming number, CM 7.1.5
I am currently configured a H.323 GW which contain few FXO port. Normal PSTN line is connected to the FXO port. The PSTN number is assign to one of the IP phone.
My problem is, when i use my mobile phone to call this PSTN line, the IP phone ring, but it shows UNKNOWN NUMBER. By right it should display my mobile number as the incoming number. I tried to grab the debug info, so that i can see whether i manage to see what is the incoming number. for ISDN PRI E1, we use debug isdn q931, but for this PSTN FXO, i cannot find the command.
I'm not able to access my old voice mail messages all of a sudden. The recording says something like 'the message is currently not available'. This has never happened before in all the years I have been using this system. I have t...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813803.28/warc/CC-MAIN-20180221202619-20180221222619-00169.warc.gz
|
CC-MAIN-2018-09
| 831 | 4 |
https://pt.slideshare.net/MarkImbriaco?utm_campaign=profiletracking&utm_medium=sssite&utm_source=ssslideshowpanel
|
code
|
One fine body…
- United States
- Comercial Cloud, Engineering, DevOps
- Setor Technology / Software / Internet
- Site https://operable.io/
- Sobre I believe that software is fundamentally changing the world, and that those changes are overwhelmingly positive. My mission is to enable organizations to build and deliver that software better, faster, and safer. I have been a software developer, operations engineer, leader, executive, and founder. My recent technical interests have been focused on cloud computing, developer platforms and tools, and open source. While I love technology, I'm even more interested in the intersection between people and technology as part of a larger system. I enjoy participating in the communities around my interests through public speaking, conference program management, open source contribution.
Não está seguindo ninguém ainda
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986655554.2/warc/CC-MAIN-20191014223147-20191015010647-00463.warc.gz
|
CC-MAIN-2019-43
| 870 | 7 |
https://www.lboro.ac.uk/departments/maths/staff/diwei-zhou/
|
code
|
- February 2020 – present: Senior Lecturer in Statistics, Department of Mathematical Sciences, Loughborough University.
- February 2015 – January 2020: Lecturer in Statistics, Department of Mathematical Sciences, Loughborough University.
- August 2012 – January 2015: Lecturer/Senior Lecturer in Statistics, School of Computing, Engineering and Mathematics, University of Brighton.
- September 2009 — July 2012: Lecturer in Statistics, School of Technology, University of Wolverhampton.
- September 2006 — August 2009: PhD (funded by a Marie Curie research fellowship), School of Mathematical Sciences, University of Nottingham.
- Statistical Image and Shape Analysis
- Medical image analysis (e.g., Diffusion MRI for brains and muscles)
- Statistical Modelling and Uncertainty Quantification for data-driven engineering problems
- Bayesian statistics
- Medical statistics
- Oil Analytics, An industry sponsored pilot study, 2022, £60K.
- Development of a software tool for musculoskeletal diffusion tensor image analysis, funded by HEIF, EPSRC IAA and LU, 2019- 2021, £110K.
- Data Driven Analytic and Statistical Modelling, An industry sponsored research study, 2019- 2022, £70K.
- Development of Non-Euclidean Diffusion Tensor Image Analysis Software, funded by EPSRC IAA, 2017, £5K.
- Detection and Identification of Nanoplastics using Surface Enhanced Raman Spectroscopy, funded by EPSRC through NanoPrime scheme, 2018, £2K.
- Statistical analysis of thermal thresholds detection, funded by GB Electronics (UK), 2014, £4.5K.
- Senee Kitimoon, Multi-Output Gaussian Processes for Interpolation and Transfer Learning in Diffusion Tensor Imaging, University of Sheffield, 2022.
- Steff Farley, Characterising the Geometry of Image Space of Nanostructures for Inferential Analysis of Dewetting Processes and Computational Models, Loughborough University, 2021
- Hanaa Fathi Mahmood, Text Detection and Recognition from Natural Images, Loughborough University, 2020
- Qamar Natsheh, Securing DICOM Images through Automatic Selective Encryption, Loughborough University, 2019
- Arif Reza Anwary, Statistical Shape Analysis for the Human Back, University of Wolverhampton, 2012
- MAC170 Medical Statistics, Module leader
- Statistics advisor, Mathematics Education Centre, Loughborough University
- Committee member of the Royal Statistical Society East Midlands Group (2021-present)
- Chair of the Royal Statistical Society East Midlands Group (2019-2021)
- Member of the Royal Statistical Society
- Fellow of the Higher Education Academy (HEA UK)
- Member of the London Mathematical Society
Current PhD students:
- Gulzar Ahmad (2022-present): Statistics for medical image analysis
- Jennifer Ferris (2021-present): Statistical Models of Lower Limb Soft Tissue for Integration into Multimodal Imaging Technologies
- Stefan Calvert (Sept 2019 - present), Data-Driven Analytical and Statistical Modelling (Sept 2019 - present). Co-Supervisor. Principal supervisor: Prof. Steven Kenny.
Completed PhD projects:
- Lei Ye (Jan 2017 – June 2021). Thesis: Computational Statistics for Brain and Muscle Diffusion Tensor Image Analysis.
- Khawla Mahmood (Oct 2014 – Nov 2018). Thesis: Statistical Analysis for Decomposed Multivariate Time Series Data with an application to Water Discharge Forecasting.
- Safa Elsheikh (Oct 2013 – June 2018). Thesis: Computational Statistics for Human Brain Diffusion Tensor Image Analysis.
- Jiajia Yan (Feb 2012 – Nov 2016). Thesis: Statistical Analysis on Diffusion Tensor Estimation.
- Sobhi Berjawi (March 2022-present). Oil analytics.
- Safa Elsheikh (Oct 2019 - Nov 2020). Musculoskeletal Diffusion Magnetic Resonance Image Analysis
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00599.warc.gz
|
CC-MAIN-2022-33
| 3,687 | 39 |
https://forum.universal-robots.com/t/force-mode-freedrive/9610
|
code
|
I am testing the usage of force_mode via TCP connection using Python.
As you can see below I am sending this command to the robot with a wrench_task being a zero (1x6) vector. I would expect robot to stay stationary and behave like in a free drive mode.
The robot stays stationary for a few seconds but then very slowly starts changing its position.
Any suggestions on why such behavior takes place?
force_mode(task_frame=[0, 0, 0, 0, 0, 0], selection_vector=[1, 1, 1, 1, 1, 1], wrench=list(wrench_task), f_type=2, limits=[2, 2, 1.5, 1, 1, 1])
Please make sure the payload and center of gravity(CoG) is configured correctly. On the e-Series you should make use of the zero_ftsensor() before enabling force mode.
Thank you for your help
I am trying to implement a robot control method that uses force_mode but in real time.
I want to have a loop that calculates desired wrench with a timestep of 0.002 sec (500HZ) and to feed it into a force_mode in real time to change the position of the robot.
Can I use the force_mode command thats already implemented on the robot? or it doesnt allow for real-time update?
Thank you very much, I have implemented something similar i.e. impedance control but via RTDE.
In my example, the
robot.set_force_remote is a f
orce_mode implementation but in RTDE.
I am running a while loop and solving the impedance equation which spits out the wrench in the next time step (125hz so dt=0.008)
The issue I have is that once I run the code, the force mode uses only the wrench obtained from the first iteration and is not being updated by the new values of the wrench at the following time steps, therefore robot instead of moving to the desired location, moves like it has only one value of wrench as an input.
Do you have any ideas why that could happen?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141193221.49/warc/CC-MAIN-20201127131802-20201127161802-00358.warc.gz
|
CC-MAIN-2020-50
| 1,783 | 17 |
https://www.infiniteguitar.com/guitar-lessons?lessonid=218
|
code
|
This part has a lot of 16th note open notes on the Low E string. And mixed in between we'll have some 8th note rests and quarter note rests.
Notice how my left hand is muting the strings again during rests? Be sure to always do that.
When you play the octave chords with your index and ring fingers, make sure you mute the strings you aren't playing. In this case, every string except the A and G strings should be muted when you play the octaves. The best way to mute them is to have your index finger resting on them while playing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00547.warc.gz
|
CC-MAIN-2024-10
| 533 | 3 |
http://www.designalyze.com/?p=137
|
code
|
Welcome to Designalyze
No front page content has been created yet.
In this quick tutorial we divide a surface up into points using python.
In this tutorial we play around with the Graph Mapper component to control the shape of a simple vase.
Top Rated Tutorials
In this tutorial, we continue working on the structural frame by adding in the beams and girders.
This tutorial isn't really advanced, but then again it isn't really intro either, hence it is intermediate.
Top Rated Courses
Want to Contribute?
Want to be an author? Drop us a line here we'd love to have you.
Already have a video you'd like to post? Send us a link and we'll get you going.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649105.40/warc/CC-MAIN-20230603032950-20230603062950-00402.warc.gz
|
CC-MAIN-2023-23
| 651 | 11 |
https://theowl.zendesk.com/hc/en-gb/articles/201103936-Is-the-Micro-suitable-for-Code-for-Sustainable-Homes-CfSH-use-
|
code
|
Code for Sustainable HomesTechnical Guide Ene3
OWL Micro+ Compliance
Guidance Note V1.2
We believe that OWL Micro+ (Part Number TSE009-002) meets the requirements of Code Ene3 to qualify for either a single or two credits.
Code Ene3 contains two areas of uncertainty:-
1. “Self charging sensor”
Our understanding is that the Code assessor may determine that a battery powered transmitter with a long battery life, negates the self charging requirement.
The batteries in the OWL Micro+ Transmitter have an average lifetime of the order of 18 months, and as such the product meets this requirement.
2. “Display accurate account balance information”
Our understanding is that this requirement is satisfied providing the customer is able to input tariff data to the monitor.
OWL Micro+ meets this requirement.
OWL Micro+ fully meets all other requirements of the code.
On the basis of the above, we believe that a Code assessor may specify OWL Micro+ as qualifying under the Code:-
a) for a single credit where electricity is not the primary fuel, or
b) for two credits where electricity is the primary fuel
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347389355.2/warc/CC-MAIN-20200525192537-20200525222537-00003.warc.gz
|
CC-MAIN-2020-24
| 1,111 | 15 |
http://lists.squid-cache.org/pipermail/squid-users/2017-May/015438.html
|
code
|
[squid-users] Squid TPROXY issues with Google sites
rentorbuy at yahoo.com
Fri May 26 15:44:02 UTC 2017
I'd like to block access to Google Mail but allow it to Google Drive. I also need to intercept Google Drive traffic (https) and scan its content via c-icap modules for threats (with clamav and other tools which would block potentially harmful files).
I've failed so far.
I added mail.google.com to a custom file named "denied.domains" and loaded as denied_domains ACL in Squid. I know that in TLS traffic there are only IP addresses, so I created the "server_name" ACL as seen below.
acl denied_domains dstdomain "/usr/local/share/proxy-settings/denied.domains"
http_access deny denied_domains !allowed_groups !allowed_ips
http_access deny CONNECT denied_domains !allowed_groups !allowed_ips
reply_header_access Alternate-Protocol deny all
acl AllowTroublesome ssl::server_name .google.com .gmail.com
acl DenyTroublesome ssl::server_name mail.google.com
http_access deny DenyTroublesome
ssl_bump peek all
ssl_bump splice AllowTroublesome
ssl_bump bump all
First of all, I was expecting that if a client tried to open https://mail.google.com, the connection would be blocked by Squid (DenyTroublesome ACL). It isn't. Why?
Second, I am unable to scan content since Squid is splicing all Google traffic. However, if I "bump AllowTroublesome", I can enter my username in https://accounts.google.com, but trying to access to the next step (user password) fails with an unreported error.
More information about the squid-users
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056752.16/warc/CC-MAIN-20210919065755-20210919095755-00115.warc.gz
|
CC-MAIN-2021-39
| 1,524 | 19 |
http://graem.es/Configuring-Dynamic-DNS-for-NameCheap-with-ddclient-on-Raspberry-Pi
|
code
|
Configuring Dynamic DNS for NameCheap with ddclient on Raspberry-Pi
I’ve recently found my name server host (namecheap) supports Dynamic DNS updating of records, so I’ve added a tool called
ddclient to my Raspberry Pi
Here is how I have installed and configured this on Raspbian Jessie Lite (Nov 2017)
sudo apt install ddclient libio-socket-ssl-perl
I’m reasonably sure that the
libio-socket-ssl-perl will be installed as part of
ddclient anyway, but just in case this is added too.
When you install
ddclient you also have to follow through some text/GUI I skipped this, and typed nonsense to get past.
Creating the config file
Edit the config file as such
sudo nano /etc/ddclient.conf
Each of these lines is specific to NameCheap’s config, and we’ve added
ssl=yes to ensure the updating is over SSL, as the password NameCheap give can update any record.
protocolin this case is “namecheap”
serveris the hostname of the dynamic DNS server. The dynamic DNS servers used by namecheap are “dynamicdns.park-your-domain.com”
loginis your domain name
passwordis the string from the namecheap web interface. Leave the single quotation marks around the string.
- The last line is the
subdomainto be modified. If you wanted to update your root domain, you would put an
@symbol on this line instead
Add in the line
run_daemon=true and ensure the other two options are set to false.
We also need to ensure this is installed as a service, and restarts at bootup so
systemctl enable ddclient.service will install this as a service on Raspbian, for other O/S check the link DigitalOcean Linux Services Guide
Some content (and a lot more detail) from: Sam Hobbs
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00422.warc.gz
|
CC-MAIN-2022-33
| 1,664 | 27 |
http://breakingfreefromroutine.blogspot.com/2010/04/flowers.html
|
code
|
As I told you before, my mom bought me a beautiful bouquet of tulips on my birthday. They sat in my room for over a week, and I admired their beauty every day.
I think the reason why I love the idea of receiving flowers is the simple fact that they don't last forever. Therein lies their value. They're precious because they can only be admired so long before they fade. You need to make time to care for them, to smell their scent, take in their sweetness. They don't wait for you to do so, and if you wait too long, you've missed out.
They can't be taken for granted.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589752.56/warc/CC-MAIN-20180717144908-20180717164908-00062.warc.gz
|
CC-MAIN-2018-30
| 569 | 3 |
https://www.bram.us/2019/09/04/take-both-light-and-dark-mode-screenshots-with-puppeteer/
|
code
|
dark-mode-screenshot is a Puppeteer script to take screenshots of both the light and dark mode versions of a website.
$ npx dark-mode-screenshot --url https://googlechromelabs.github.io/dark-mode-toggle/demo/index.html --output screenshot --fullPage
Works in somewhat odd way first requiring the OS to have dark mode enabled (?), and then launch Chromium:
- Once with
- Once with Dark Mode force enabled (using
❓ New to Dark Mode? No worries, this post on CSS Color Scheme Queries has got you covered.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00110.warc.gz
|
CC-MAIN-2023-40
| 503 | 6 |
https://www.intelligent.com/best-web-development-books/
|
code
|
Disclosure: We may receive compensation if you purchase a product through one of the links below. Our editors independently selected each product featured.
Web development is the process of website building, creation, and maintenance. Employers in today’s digital age seek employees who possess web development skills. Thankfully, these skills can be self-taught and continually strengthened, whether you’re a student or a seasoned professional in your field. Here we share the best web development books for learners of all levels and types. Unlike some book lists that focus on one domain — like web development in the business world — our list features books with wide applicability. We’ve also included books written by authors from a diverse array of voices and backgrounds because web development is a skill we can all cultivate, no matter who we are.
The 20 Best Web Development Books
HTML and CSS: Design and Build Websites, 1st Edition by Jon DuckettBuy Now
Our top pick for web development books is the acclaimed HTML and CSS: Design and Build Websites by bestselling author Jon Duckett. This instructional web development book is different from many others on the market in that it’s printed in full color and designed to look like a magazine. The book is appropriate for both beginners and professionals alike. It will appeal to anyone looking for common sense and winning, established approaches to web development. Duckett has designed and delivered web and mobile projects for brands like Nike and Xerox.
CSS Secrets: Better Solutions to Everyday Web Design Problems by Lea VerouBuy Now
CSS Secrets: Better Solutions to Everyday Web Design Problems by Lea Verou is a practical guide for intermediate-to-advanced CSS developers. The book was inspired by Verou’s presentations at over 60 international web development conferences. Topics covered include
typography, user experience, structure, and layout. Verou is a researcher at the Massachusetts Institute of Technology and a member of the W3C CSS Working Group, the committee that designed the CSS language.
Don't Make Me Think, Revisited: A Common Sense Approach to Web Usability, 3rd Edition by Steve KrugBuy Now
Usability is the focus of Steve Krug’s Don’t Make Me Think, Revisited: A Common Sense Approach to Web Usability. This practical and popular book made its debut in 2000, and this edition contains fresh examples and a new chapter on mobile usability. It’s written for anyone looking for best practices in web design when it comes to intuitive navigation and user experience. Krug is an author, speaker, and usability consultant who has worked with Apple, AOL, Lexus, and other companies.
PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide by Larry UllmanBuy Now
Larry Ullman’s PHP and MySQL for Dynamic Web Sites: Visual QuickPro Guide is intended for anyone who wants to learn the PHP language and MySQL database from an experienced programmer. It contains complete scripts, expert tips, step-by-step instructions, and sample applications. Ullman was the president of the digital media technologies company Current State! and has written over 20 books on computer programming.
Designing With Web Standards by Jeffrey ZeldmanBuy Now
The importance of designing with shared standards is Jeffrey Zeldman’s focus in Designing with Web Standards. This is not a comprehensive CSS instruction book but rather a deep dive into the history, value, and current state of web standards. The book is suitable for anyone involved in the web development process, including designers, nonprogrammers, and supervisors. It’s written in simple language without a heavy emphasis on code. Zeldman is a long-time web designer who founded The Web Standards Project in 1998.
Node Cookbook by Bethany GriggsBuy Now
You Don’t Know JS Yet: Get Started by Kyle SimpsonBuy Now
A Practical Guide to Linux Commands, Editors, and Shell Programming by Mark G. SobellBuy Now
Mark G. Sobell offers a foundational Linux reference in A Practical Guide to Linux Commands, Editors, and Shell Programming. At over 1,200 pages, this book is not for those looking for a quick review of Linux. Instead, this book is for students and professionals who are seeking a comprehensive Linux reference they can keep on their desks to answer any question that pops up. The book’s 300+ page reference section covers 102 utilities, including the macOS command line (which is not typically covered in depth in Linux guides). Sobell is the president of a consulting firm that specializes in UNIX and Linux training, support, and software development.
A Smarter Way to Learn HTML & CSS by Mark MyersBuy Now
Learn-by-doing is the theme of A Smarter Way to Learn HTML & CSS by Mark Myers. The concisely written book is for beginners to HTML and CSS and comes with free interactive online exercises that illustrate the fundamentals of both languages. It’s estimated that readers spend two to three times as long practicing via these exercises than actually reading the book. Myers learned web development using the technique he now shares with others: reading, exercises, and practice.
How We Picked the Best Web Development Books
To create our list of the best web development books, we scoured the New York Times bestseller list and other online “best of” lists. The result was a collection of 98 books dedicated to the topic. We then narrowed the books down to this list of 20, basing our research on overall popularity and online materials like reviews and common recommendations. We wanted the books on this list to be practical for people interested in a web development career, so many of them include exercises and different learning formats for different kinds of learners. Additionally, because many popular web development books came up in multiple categories we researched for our “best” lists, we have done our best to prevent duplicate recommendations across our lists on Intelligent.com.
More Web Development-related Book Lists
- Best Web Design Books
- Best Coding Books
- Best Computer Science Books
- Best Cyber Security Books
- Best Data Analysis Books
- Best Information Technology Books
Best Online Web Development-related Courses for Continuing Education
- Best Online Web Development Bootcamps
- Best Online Web Design Courses
- Best Online Coding Bootcamps
- Best Free Online Python Courses and Tutorials
- Best Cloud Computing Bootcamps
- Best Online Computer Science Bootcamps
- Best Online Cybersecurity Bootcamps
- Best Online Data Analysis Bootcamps
- Best Online Software Development Bootcamps
- Best Online Information Technology Courses
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.3/warc/CC-MAIN-20230923194908-20230923224908-00385.warc.gz
|
CC-MAIN-2023-40
| 6,638 | 40 |
http://www.coderanch.com/t/382755/java/java/override
|
code
|
This week's book giveaway is in the OCAJP 8 forum. We're giving away four copies of OCA Java SE 8 Programmer I Study Guide and have Edward Finegan & Robert Liguori on-line! See this thread for details.
A method called main() could be overridden, if it was a non-final instance method. However, the static method main(), used as the entry point for Java programs launched with the "java" command, cannot be overridden, because it is static.
Betty Rubble? Well, I would go with Betty... but I'd be thinking of Wilma.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645366585.94/warc/CC-MAIN-20150827031606-00289-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 514 | 3 |
https://leigh-annegalloway.com/
|
code
|
Art as a Methodology for Security Research
Art as a methodology for security research. Art and security share a lot of commonalities. In this article I discuss my research methodology which has evolved out of art.
My journey into security has not been a conventional one. I didn’t go to university and study computer science. I think my career could have taken a different route. I considered many different professions growing up, but eventually settled on being
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652494.25/warc/CC-MAIN-20230606082037-20230606112037-00498.warc.gz
|
CC-MAIN-2023-23
| 465 | 3 |
https://forums.unrealengine.com/t/hlsl-documentaiton/254884
|
code
|
Currently there is no exposed functionality through blueprints to execute HLSL, but at the material editor you can place a node called “Custom” which enables you to write HLSL code (you can edit the code in an outside editor and paste it inside the node) or if the work you are currently doing is a lot more complex you have two choices:
- There is an Epic plugin called Lens Distortion (found alongside with engine, even the installed via Launcher) which has everything you need to understand how to use large portions of HLSL code to implement a Pixel Shader and how the work is done with UE4 library (most of it are macros to hide details).
- Check the UE4 source code to find how Compute Shaders are done, mostly you will find good code which implements the Bloom effect with Convolution Kernel (uses Fast Fourier Transform - adv math) and currently I could say it is a good reference.
HLSL is quite easy as a language, but the trickery you can do with it requires a large amount of 3D computing graphics, and depending on the level of usage you seek, even a more than average math knowledge to master it.
GL on your endeavours!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.56/warc/CC-MAIN-20211020024111-20211020054111-00176.warc.gz
|
CC-MAIN-2021-43
| 1,136 | 5 |
https://offtopic.com/threads/hard-drive-maknig-crunching-sound-after-partitioning.4124578/
|
code
|
So I just partitioned my drive to install Windows and noticed that my hard drive is now making that "crunching" sound that some hard drives make. It started during my Windows installation, and it happens regularly in Windows. I also briefly hear it while OSX is starting up, but it doesn't seem to happen much in OSX. I've launched a bunch of applications and it is still pretty much silent. Any ideas what could cause this? Could it be NTFS? I have several hard drives in my PC that don't make that sound. I am using a 17" MacBook Pro unibody with the regular 320gb 5400rpm drive that it comes with. Any and all help would be much appreciated. EDIT: So I'm not entirely sure it's the hard drive afterall. I'm installing a game right now in Windows and it is silent again. The last time it made the sound was on startup. Also, it sounded like it was coming from under the left palm rest, where the battery is. If it does it again I'll listen to see if it's coming from the hard drive area.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934809392.94/warc/CC-MAIN-20171125032456-20171125052456-00290.warc.gz
|
CC-MAIN-2017-47
| 989 | 1 |
https://www.buymeacoffee.com/mrfugudatasci
|
code
|
I will code a video for you depending on your needs and predetermined negotiations. The data can't be proprietary, you will sign indemnity file, And the video will be made public on my channel. If you want private work: consulting only, that not covered here. (depending on hrs need) price varies!
Consulting per hour
I am willing to help with coding, consulting, math but we determine prior work needed and scope. Projects are by bid and not hour, and any fees we determine before assessment. There will be an NDA and indemnity paperwork before any project and payment.
👋 Sometimes we just need a little help, education is very expensive and sometimes we just need bit size chunks, or help!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360293.33/warc/CC-MAIN-20210228054509-20210228084509-00423.warc.gz
|
CC-MAIN-2021-10
| 694 | 4 |
http://www.gamedev.net/user/159462-waaayoff/?tab=posts
|
code
|
Is there a reason why you want to code the importer yourself and not just use one of the many tools out there such as Assimp? It will save you a lot of headaches and let you focus on your game.
WaaayoffMember Since 11 Sep 2009
Offline Last Active Dec 17 2014 11:04 AM
- Group Members
- Active Posts 652
- Profile Views 6,583
- Submitted Links 0
- Member Title Member
- Age 22 years old
- Birthday November 14, 1992
Waaayoff hasn't added any contacts yet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802774718.30/warc/CC-MAIN-20141217075254-00008-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 454 | 11 |
https://vox.veritas.com/t5/NetBackup/Exclude-file-path-from-NetBackup-Policy/td-p/760420
|
code
|
I was wondering if there is a way to exclude a file path from a netbackup policy.
I want to select ALL LOCAL DRIVES in the policy and then somehow exclude 2 file paths from within the backup policy and NOT from the client properties.
Reason being is that we have a database backup policy to perfom database backups, and a unix file system backup policy to do the filesystem of the box that the database is located on.
e.g. DB backup policy - backs up database
e.g. UnixFS backup policy - backs up the file system - here we want to exclude the paths where the databases are located so we are not backing up the data twice
Media server - windows server 2008
NBU - 7.5
Any help would be greatly appreciated guys!
Thanks in advance!
There are no options to specify exclude list from the policy. Marianne example is the path to use, I use it myself and its has been working very good
I highly recommend using regular expression to exude the database areas
Contact your local UNIX admin for aid in designing a regular expression. The link Marianne provided also contain examples of regular expression excludes.
One more thing - my experience has been that Exclude Lists are only applied to Filesystem backups (Standard and/or MS-Windows).
No filesystems or paths are specified in DB backup policies.
Scripts are executed on the client that will backup database objects - not files and folders.
So, Exclude List will not be applied to Db backups.
Add Policy name just to be safe.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817081.52/warc/CC-MAIN-20240416093441-20240416123441-00168.warc.gz
|
CC-MAIN-2024-18
| 1,472 | 17 |
http://loiter.co/i/my-son-the-lady-killer-putting-out-the-gangsta-lea/
|
code
|
My son, the lady killer, putting out the gangsta lean.
No one hates their job as much as this guy
Attack Helicopter Mating Ritual.
Patiently weaving its web
comments powered by Disqus.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647706.69/warc/CC-MAIN-20180321215410-20180321235410-00610.warc.gz
|
CC-MAIN-2018-13
| 184 | 5 |
http://serverfault.com/questions/tagged/server-setup+database
|
code
|
Meta Server Fault
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Dedicated database server or local database server for performance
We have a dedicated server that contains 3 virtual server with iis 7.5 on it. There are 50 real ip addresses pointing to the server, with some of them assigned to the virtual servers. I wasn't sure ...
Mar 15 '12 at 13:29
newest server-setup database questions feed
Hot Network Questions
How to create circles and or sections of a circle when the centre is inaccessible
How can Philip J. Fry be his own grandfather if he is sterile?
How do I generate a random string?
What research was being performed on Pinky and the Brain?
Producing a sorted wordcount with Spark
What does !$ means in Bash scripting?
How effective is speeding?
How do we know that the speed of the influence of gravity is instant?
Why isn't the Cantor Set contradictory?
How to preview colors when using the color picker in Illustrator?
Is it a bad idea to express my personal feelings about the subject when writing email to a professor for PhD application?
Are pointers treated differently in AVR compared to say x86?
Did mountains used to have wings?
Write a Rectangular Program that Outputs the Number of Times it was Rotated
Screen refresh rate above 100 Hz noticeable?
Populating a Boolean Array in Java
What is the longest anime title?
Loop without 'looping'
Defining a function that takes a std::array as a parameter
Good Versus Evil
How to handle manager offering me an unwanted drink?
Replace columns using a shell
Is it ethical for a professor to get masters students to work on open source modules related to the professor's profit-making company?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776421879.69/warc/CC-MAIN-20140707234021-00044-ip-10-180-212-248.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 2,252 | 52 |
https://www.omgubuntu.co.uk/tag/ubuntu/page/3
|
code
|
Support for Ubuntu 11.04 - released 18 months ago today, on April 28, 2011 - officially ends today. Are you still using it? Will you miss it?
Ubuntu's shift onto tablets and mobiles is now afoot, as a new video demoing Ubuntu on a Nexus 7 shows.
Canonical have announced the release of Ubuntu 12.10, the latest version of their popular Linux operating system. The release follows 6 long months of development, and introduces many new features to the desktop.
Canonical have today launched a new 'contributions' page through which users can donate money to the Ubuntu project. Canonical say that the initiative will help people '..choose to financially support different aspects of Canonical's work, from gaming and app, desktop, phone and tablet, to co-ordination of upstreams or supporting Ubuntu flavours."
Join us this Today at 1800 UTC for Ubuntu on Air Last cycle we decided to just hang out after a release, and we had such a good time and learned so much from our […]
Mark Shuttleworth has spoken about the design and thought process behind the creation of Unity, and how it's impacted on Ubuntu multi-device strategy. Speaking at OSCON prior to the unveiling of Ubuntu's new integrated web apps feature, Shuttleworth ackowledged that there had been 'controversy' over Canonical's decision to pursue a "multi-device" strategy, with the switch to Unity in particular proving 'deeply unpopular' at first.
There are a myriad of ways for Ubuntu users to become involved in the wider community - but just where does one start? Enter the Ubuntu Accomplishments system, which aims to make finding, working towards and tracking opportunities within the Ubuntu community and beyond from one place.
Could you create an entirely new application for Ubuntu in just three weeks? That's the challenge being put forward by the Ubuntu Development team as they gear up to launch an application creation competition with some awesome prizes up for grabs.
In this update we reached out to Ubuntu Developer and juju Extraordinaire Clint Byrum for an interview and to see what he is working on in the 12.10 Release Cycle. Benjamin Kerensa: What are you doing […]
So many great applications are available in the Ubuntu Software Center - but many developers don't advertise this fact on their websites. To remedy this Ubuntu's Jono Bacon is encouraging users to get involved in a new ‘Download for Ubuntu’ Button Campaign. The premise is simple: the websites of apps that are available to install through the Ubuntu Software Center should display a uniform 'Download for Ubuntu' button so that visitors can clearly see they support Ubuntu.
When it comes to laptops that solely ship Ubuntu as an Operating System one of the most well known names is System76. During the Ubuntu Developer Summit in Oakland, CA a few weeks back I had an opportunity to chat over lunch with System76 CEO, Carl Richell about the exciting products they are working on at their Headquarters in Colorado. Carl invited me to check out one of their current laptop offerings the Lemur Ultra which I spent some time with here in the labs.
Last Development Update of 12.04 Today we saw the release of Ubuntu 12.04. It is the fourth release with long-term support and the 16th Ubuntu release. Lots of hard work went into this release, so […]
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735860.28/warc/CC-MAIN-20200804043709-20200804073709-00578.warc.gz
|
CC-MAIN-2020-34
| 3,304 | 12 |
http://anti-virus-rants.blogspot.com/2012/02/to-patch-or-not-to-patch-edge-case.html
|
code
|
i find myself in a rather odd predicament today. i've been using an older computer (we'll call it one of my secondary computers since it get very little use compared to the one i'm writing this with right now) and i got a pop-up notification that i was running out of space on drive C:.
now i want to put this in context; this computer sees very little use, mostly it gets turn on, has some files transferred to it or from it, and then switched off. i can't remember the last time i actually installed anything on it (for that matter, since i've switched over to using portable software, i can't recall the last time i installed anything on my primary system either) so let's say it's been a really, really long time since i touched the C: drive at all. mostly it's the larger secondary physical disk that gets used.
so you can imagine my surprise when the notification about running low on space popped up. was there something malicious going on? had the system been compromised? no, it was in the process of applying system updates. patches had actually eaten up the majority of my free space - the WINDOWS directory was taking up over 7 gigs of my 10 gig drive. i'm actually in the position where i have to uninstall software so that the patching will succeed.
now, this is an XP system so one might reasonably suggest that i upgrade to the latest version of windows so that i can avoid having all those patches on my system. unfortunately, this system is so old, i doubt it will meet the system requirements of anything newer than XP.
one might also, entirely reasonably, suggest upgrading the harddisk to something larger. memory is cheap, after all. it's a little difficult to justify upgrading the drive just to accommodate microsoft's attempts to fix their earlier mistakes, though. it's certainly not like i'm going to get any additional benefit from greater space on a drive i never make use of.
one could even go so far as to suggest upgrading all the things so that not only would i be able to move to the latest version of windows, i could have more space and a snappier system that is more amenable to being used day to day. but i already have a computer that's more amenable to being used, so really everything that was wrong with the idea of upgrading the drive is also wrong with this plan, in spades.
it's times like this that make one question things we normally take for granted, like why does it patching take so much space? is the fixed binary that much larger than the one with the error in it? no, that doesn't appear to be what's going on. it appears that windows keeps a bunch of stuff around so that you can uninstall the patch if you want to. does anyone ever actually do that? there may be a way to reclaim the space those uninstall files take up, but it's not obvious just by looking at the system, and right now simply letting the updates happen the way an ordinary user would is actually reducing the utility of the system.
thankfully the utility that's been lost wasn't really needed anymore. but what about next time? support for XP is ending, but it's not over yet, there are still more patches coming. i'm going to be facing the prospect of no longer getting patches anyway, so i might as well get used to it early - and since the system is little more than a network attached storage device that spends most of it's time powered off, i can't really see the harm.
in security, we normally think of applying patches as a no-brainer. it may present some logistical hurdles in the enterprise, but it still needs to get done. sometimes, though, there are cases where it just doesn't pay off. no practice is so universally beneficial that it should be mindlessly applied 100% of the time.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124299.47/warc/CC-MAIN-20170423031204-00076-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 3,719 | 9 |
https://arstechnica.com/information-technology/2013/08/ubuntu-joins-windows-and-centos-but-not-red-hat-on-vmware-public-cloud/
|
code
|
Ubuntu Server will be one of the first operating systems offered to customers of VMware's infrastructure-as-a-service (IaaS) cloud, with OS images that should be portable across clouds operated by VMware and rivals such as Amazon.
vCloud Hybrid Service, set to go live in September, will support all 90 or so operating systems certified to run on the vSphere virtualization platform. For most of those, customers will need to install the operating system themselves. A select few will be published by VMware on what's basically an app store, making them a bit more accessible.
VMware's pricing page currently lists just Microsoft Windows Server 2012, Windows Server 2008 R2, and CentOS. It has been reported that SUSE Linux is on its way. Ubuntu will join the party sometime in the fourth quarter, likely November.
"That's certainly what we've been working towards with VMware, that Ubuntu is available on the vCHS [vCloud Hybrid Service] and that it's an Ubuntu image that we produce," Ubuntu Server and Cloud Product Manager Mark Baker told Ars at the VMworld conference this week. "It should be fully compatible and exactly the same as the Ubuntu you'd run on Amazon or [Windows] Azure."
Red Hat Enterprise Linux (RHEL) is a standard option on Amazon, which runs the biggest IaaS cloud, but it's not clear when it might make it onto vCloud Hybrid Service.
VMware and Red Hat are increasingly becoming competitors. With VMware touting its new services and software this week at a conference attended by 22,000 people, Red Hat released a blog post arguing that its "open" approach to hybrid cloud computing is better. Publishing CentOS instead of RHEL could be a snub directed by VMware at Red Hat, as CentOS is essentially a version of Red Hat that customers can get without paying for a Red Hat subscription, compiled from the RHEL source code.
"No comment from us on this one" is the answer a Red Hat spokesperson gave Ars when asked if RHEL will be an option on vCloud Hybrid Service.
UPDATE: VMware has told Ars that it plans to add Red Hat to its catalog of OSes, but did not say when.
vCloud Hybrid Service aims to be a natural extension of VMware's virtualization platform, letting customers run applications in the cloud and in their own data centers and manage them all in the same way.
From a purely technological perspective, ignoring competitive concerns, it would make sense for RHEL to be front and center on the VMware cloud. Red Hat is far and away the most successful enterprise Linux vendor, and VMware is far and away the most successful server virtualization vendor. Although Red Hat would prefer customers to use the KVM hypervisor instead of VMware's, many businesses do run Red Hat's OS on vSphere.
Customers should still be able to use RHEL on the VMware cloud if they install it themselves. VMware has said the cloud "will support the thousands of applications and more than 90 operating systems that are certified to run on vSphere." RHEL is one of those supported operating systems.
Ubuntu users can also upload their own images instead of using the ones provided by VMware and Canonical.
"Customers who created an image on any currently supported version of Ubuntu can transfer that image to the vCloud Hybrid Service," an Ubuntu fact sheet states. "To ensure that VMware provides a safe and secure environment for critical business applications, VMware will only accept images based on versions of Ubuntu for which updates are still being produced."
There wasn't a ton of heavy lifting Canonical had to do to get Ubuntu running on vCHS, Baker said. "A lot of it is validation, testing and making sure it behaves the same way as it does on AWS [Amazon Web Services] or other platforms and that we have a nice model to be able to provide updates," he said.
Baker said Ubuntu 12.04, the Long Term Support release from April 2012, will be on vCloud Hybrid Service, along with more recent versions up through the 13.10 release scheduled for October.
Portability across clouds is a key goal for Canonical. It's inevitable that customers who are heavily dependent on VMware virtualization and management tools would find it complicated to move workloads back and forth between the VMware cloud and the Amazon cloud. But Ubuntu itself won't throw up any roadblocks.
"There's a lot of customer uncertainty about how portable are these things," Baker said. By validating and testing Ubuntu images on Amazon, Azure, and VMware, Canonical hopes to provide some certainty. If you want to move a workload from one cloud to another, "the desired goal is that you don't see any difference at all," he said. Canonical's Juju and cloud-init tools can also help customers deploy workloads to various cloud services.
vCloud Hybrid Service will charge customers by the amount of CPU, RAM, storage, and bandwidth they need. Operating system costs are in addition to that. Windows Server on vCloud Hybrid Service will cost $25 per virtual CPU per month, while CentOS is free.
Ubuntu will be a free download on vCloud Hybrid Service when it's ready in Q4 2013. Customers who pay for the Ubuntu Advantage support service can shift their licenses from on-premises deployments to the VMware cloud.
Canonical and VMware have been ramping up their partnership as of late, collaborating to bring VMware's server and network virtualization technology to OpenStack clouds. Canonical may well be making some cash from VMware, as the company generally charges cloud providers for the right to publish Ubuntu images. VMware will also get "an efficient service for ongoing image maintenance," in Canonical's words.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317847.79/warc/CC-MAIN-20190823041746-20190823063746-00505.warc.gz
|
CC-MAIN-2019-35
| 5,609 | 20 |
https://www.fi.freelancer.com/projects/php/project-related-anti-captcha-recaptcha/
|
code
|
I working with AutoIt software to create web automatization.
I use anti-captcha service to solve captchas. I get an issue on a website, the resolve service is working fine, the captcha is resolved, but don't send back the information to the google. Need to check why not and need to resolve quick as possible.
My budget is MODERATE!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645413.2/warc/CC-MAIN-20180318013134-20180318033134-00345.warc.gz
|
CC-MAIN-2018-13
| 332 | 3 |
https://serverfault.com/questions/314029/getting-xdebug-to-work-on-my-dev-server
|
code
|
I am trying to get xdebug to work on my ubuntu 11 04 server. Everything seems setup right and I do see xdebug from phpinfo(). I installed with
apt-get install php5-xdebug. The problem is that anytime I put my workstation(windows 7) ip in xdebug.ini as
zend_extension=/usr/lib/php5/20090626+lfs/xdebug.so [debug] ; Remote settings xdebug.remote_autostart=off xdebug.remote_enable=on xdebug.remote_handler=dbgp xdebug.remote_mode=req xdebug.remote_host=192.168.0.49 xdebug.remote_port=9000 xdebug.remote_log=/home/someone/xdebug.log
No webpage works. They just timeout for everyone connected to this server. If I put a coworkers ip in (he is on linux) web pages load without problem. I tought maybe my port 9000 was blocked by windows firewall but I opened the port and everything and still it hangs.
I hope I am clear. I do not see anything in xdebug.log or apaches error logs. I do restart apache after every changes to xdebug.ini. ALso as I said xdebug does load since it shows up in phpinfo().
I'll add any info you guys deeme necessary I am not sure what you need to help me. I found this question but no one helped him:(
edit: other things I have tried, disabling antivirus, starting a debug session from netbeans. Nothing works.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335350.36/warc/CC-MAIN-20220929100506-20220929130506-00290.warc.gz
|
CC-MAIN-2022-40
| 1,233 | 7 |
https://davidroskin.com/2017/07/24
|
code
|
This post is rather overdue, I’ve lived here for over 7 months now. We’ll roll with it though won’t we.
So in this ‘X a Londoner’ series I discuss my thoughts and feelings about this great city from the perspective of someone who’s only lived here for X amount of time.
Here are the first few additions:
At this point, I feel comfortable in saying London is my home. London feels more like home than anywhere else in the world does to me currently. However, at the same time I have this huge cloud above me. London isn’t my permanent home, I’ll be leaving here for a short while next year, that much is certain.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336880.89/warc/CC-MAIN-20221001163826-20221001193826-00637.warc.gz
|
CC-MAIN-2022-40
| 627 | 4 |
http://download-mirror.savannah.gnu.org/releases/swarm/docs/set/bk03apbs04.html
|
code
|
An example will help illustrate the features of type definitions supported by the defobj library. Throughout documentation of the basic Swarm libraries, a series of running examples will be based on a simple type of object belonging to sample Swarm simulations. This type of object is an agent that move around on a two-dimensional grid, always moving in a current direction that it maintains internally. This agent is like a "turtle" of the original Logo system, except that its position is constrained to discrete integer values of its X-Y coordinates, and its direction is always one of the four orthogonal directions north, east, south, or west.
Following is a complete library header file for a library which defines such an object, called GridTurtle:
/* Name: GridTurtle.h Description: object type for Swarm example programs Library: grid */ #import <defobj.h> @deftype GridTurtle <Create, Drop, CREATABLE> CREATING - (void) setXLocMax: (int)xLocMax; - (void) setYLocMax: (int)yLocMax; SETTING - (void) setXLoc: (int)xLoc; - (void) setYLoc: (int)yLoc; - (void) setXLoc: xLoc setYLoc: yLoc; - (void) setDirection: direction; USING - (int) getXLoc; - (int) getYLoc; - getDirection; - (void) move: (int)distance; - (void) turn: (int)angle; // angle measured in units of pi/2 (90 deg.) - (void) print; @end id <Symbol> North, East, South, West; #import "grid.xt"
An object type is defined by an @deftype declaration. (Note: newer libraries, including objectbase and random, now follow the library interface conventions without using this special @deftype tag. Instead they use just an ordinary @protocol declaration, but otherwise they follow all the structure explained in this document.) The syntax of such declaration is identical to that of an Objective C @protocol definition, except for the entirely uppercase keywords (CREATABLE, CREATING, SETTING, USING) appearing in the GridTurtle example above. All these modifications of Objective C syntax are accomplished by simple preprocessor macros; no extensions to the language compiler are involved.
When this library header file is processed (by a special rule in a make file), an external object id with the name GridTurtle is automatically published. The name of a defined type becomes an ordinary object that accepts specific messages defined by the defobj library. The defobj library explains the details of such messages; the only purpose here is to explain the basic sections of a deftype declaration.
deftype declarations follow the syntax as Objective C protocols for inheriting messages from each other: a list of names enclosed in angle brackets (e.g., <Create, Drop, ...> above) gives the names of other declared types containing messages to be supported by the new type as well. (These types referenced here are defined by the imported file defobj.h.) Like protocols, full multiple inheritance of types is supported. The same messages may be inherited any number of times through any path with no different effect than if inherited or declared just once, so long as no conflicts occur in any of their argument or return types.
The CREATABLE tag appearing in the inherited type list above is a special type which defines no messages of its own, but merely marks the type as one which supports direct creation of instances of the type. Without this tag, the only role of a type is to define messages for inheritance by other types. With this tag, the global type object has a particular implementation that supports object creation using standard messages defined in defobj.
The declared messages of the type may be separated into sections marked by the special uppercase tags such as CREATING, SETTING, and USING above. (Currently, these are the only such tags which may occur.) These sections each define messages belonging to a particular defined "interface" of the object type, which are further combined into distinct "phases" of an object lifecycle supported by defobj messages. Further explanation of the interfaces and phases defined by this example are provided in the Usage Guide of the defobj library.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735836.89/warc/CC-MAIN-20200803224907-20200804014907-00148.warc.gz
|
CC-MAIN-2020-34
| 4,078 | 8 |
http://www.nvnews.net/vbulletin/showpost.php?p=805447&postcount=6
|
code
|
Running into a little snaffooo.. I tried running locate and it said that i need to run Updatedb first. That gave me some kind of
fatal error: updatedb: create_db: fopen: '/var/lib/slocate/slocate.db.tmp': Read-only file system
So I tried changing permisions on my "var" directory. That didnt help any.
So I looked in the Nvidia readme and did a search (ctrl-f) and it didnt find "nvidia-bug". So i dont know where that file is. Would you mind pointing me in the right direction?
Thanks for all your help! You guys really are fast to reply! Great forum!
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928865.24/warc/CC-MAIN-20150521113208-00200-ip-10-180-206-219.ec2.internal.warc.gz
|
CC-MAIN-2015-22
| 552 | 5 |
https://help.sap.com/saphelp_nw73/helpdata/en/43/fc5e0787e1025de10000000a1553f7/content.htm?no_cache=true
|
code
|
BI documents for metadata, master data, and InfoProvider data can be integrated into the portal-based KM in various ways:
The migrated documents are not available in the BEx Analyzer. Documents that are stored in the BI system are available in the BEx Analyzer. After migration, the documents are available on the portal and can be edited using Web applications and KM iViews. The integration with KM means that all KM services are available for BI documents (such as text search, text mining, subscription, rating, personal documents, discussions).
For more information, see BI Documents in Knowledge Management.
General Practices with Migration
When you migrate documents, they are stored in a special CM repository that is used for BI documents only. After migration, you should make sure that the documents are changed in the BEx Web runtime (Java) only. Changes made to the migrated documents have no effect on the documents on the BI server; they are not visible in the BEx Web runtime (ABAP) or in the BEx Analyzer. Conversely, changes made to the documents on the server (for example, from the BEx Analyzer) have no immediate effects on the documents on the portal; they are not visible in the BEx Web runtime (Java). However, you can migrate the documents changed on the server to the portal again.
We therefore recommend the following procedure:
We recommend that you temporarily migrate the documents for master data and InfoProvider data to the portal into a CM repository especially configured for BI. A larger number of functions are then available. There is also a migration iView that can be started from the Implementation Guide (IMG). This iView server uses the BI Document Repository Manager to read the data on the BI server and copies it to the CM repository.
If the documents for metadata are to be automatically transported with the metadata, we recommend leaving them on the BI server. An automatic transport would not be possible if the documents were on the portal. Documents for BI metadata can be distributed in the KM using ICE with the content exchange service (see Content Distribution), however, not in an integrated transport: In this case two "transports" would be necessary, one in the BI system and one in the KM.
For more information, see Integration into the CM Repository Using Migration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587623.1/warc/CC-MAIN-20211025030510-20211025060510-00156.warc.gz
|
CC-MAIN-2021-43
| 2,327 | 9 |
http://spinrewriter9.com/spin7/five-things-you-probably-didn-t-know-about-spin-the-best-spinner-sign-me-up-now.html
|
code
|
Some positive aspects to writing articles and selling them on the internet is that you get to supplement your monthly income. In this rough economy who can't use a few extra bucks? Another upside is that you can build up your cache of original content and increase your reputation for writing and possibly attract some higher paying customers. Lastly, just think of the knowledge you are gaining by having to research some of the topics you write about. You are, or will soon be, a fountain of useless information.
It looks like the creators of Spin Rewriter 9 .0 have really put a lot of work into creating a piece of software that creates readable content. However, Google isn’t stupid and there are a lot of things that can go wrong when you are trying to “manipulate” Google into giving you more traffic. Google hates spam, badly written content and duplicate content. These are all things that Spin Rewriter 9 .0 is capable of creating. You simply can’t trust a piece of software to write content for you in my opinion.
The content above is 98% unique according to Spin Rewriter and I really like it. It actually seems better than the WordAI spin – only the “Standard” one however, it is no match for the “Turing”. One thing that the spinner failed to recognize is the “green eyes” phrase where it replaced it with “environment-friendly”. Yea, I laughed too. Anyway, here is the spintax for those interested in more testing:
By the way, I check all these spins and compare them using DiffChecker in order to easily see what has changed. And as you can see, the “Turing” spinner of WordAI really focuses on rewriting the structure and flow of the sentences of the content as opposed to focusing on exchanging words with synonyms, which is of course why the result content is extremely human readable.
Spin Rewriter 9.0 is available exclusively on their website from the 4th October 2018. If you test drive their software for free before the 4th Ocboter 2018 you will be testing version 8.0. Get a free consultation to see how the Spin Rewriter 9.0 can work for you. Their professionals are there to assist you with your article rewriting questions and concerns.
Hi there! SpinnerChief is the best article rewriter tool, because it can not only generate hundreds of new articles in minutes, but also it can rewrite articles to a very high level of human readability and uniqueness. By using the best Natural Language Analysis and Artificial Intelligence techniques, it can understand your articles in the same way as Google does and create content that is close to human quality.
You do not have to bring about any sort of the change in the structure of the paragraph sufficiently. It would be such an easy way out if you will be jotting down with the notes and explain out with some of the main points into the paragraph. You should be hence rewriting all by means of using the notes and not the original one. Proofreading the document as about 2-3 times definitely.
Some article spinners out there require you to enter your text with properly formatted spintax to create the end result. To create formatted spintax, you'll usually need another tool. But Article Rewriter by Small SEO Tools doesn't require that. Instead, it does all the thinking for you, from taking in the context of every phrase to creating additional textual content that is as readable and meaningful as the text you originally entered.
The most useful thing to do is always to locate a listing that perhaps not only pays you for your original post but one that additionally provides continuing residuals for every period your article gets read. The recurring might not be world-shattering but if you've got a group of articles that regularly get read afterward your fee may be worth the difficulty.
Whe i first accessed the spin rewriter tool, i had one purpose on in mind, generate endless content to drive traffic, build authority and build backlinks. This is the way i found to move forward with any online business. I use the tool for 3 different purposes, money pages, 2nd tier backlinks and 3rd tier backlinks and the settings presented in the rewriter accomodate all three options flawlessly.
I’m new on this of online business thing, and English is not my native language. In spite of that, I have written my first pages and posts by myself. I totally agree with what you say here. There is nothing more satisfactory than to produce your own content, even if it is not perfect or excellent in the beginning, but with time and practice, it will surely improve.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658702.9/warc/CC-MAIN-20190117041621-20190117063621-00150.warc.gz
|
CC-MAIN-2019-04
| 4,576 | 11 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.