url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://podcast.allabout365.com/153322/2197733-episode-37-hello-can-you-hear-me-now-using-microsoft-teams-advanced-call-quality-dashboard
|
code
|
All About 365 with Jay and Steve
Episode 37 - Hello, can you hear me now? Using Microsoft Teams Advanced Call Quality Dashboard
December 01, 2019
Steve Goodman; Jason Wynn
In episode 37, Steve and Jay get together at Microsoft Ignite to discuss the CQDv3 - the Advanced Call Quality Dashboard and why you should be using it with your Microsoft Teams deployment. In the show we ask -
- What do we mean by call quality and what does it apply to?
- If Microsoft are providing it as a service, why is it our responsibility?
- What's different about this version of CQD?
- How real-time is it?
- What reporting and drill-down does it give us?
- Everything has AI in these days - does CQD?
- What can it integrate with?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585653.49/warc/CC-MAIN-20211023064718-20211023094718-00199.warc.gz
|
CC-MAIN-2021-43
| 713 | 12 |
http://www.coderanch.com/t/398097/java/java/extracting-numeric-values-string
|
code
|
A friendly place for programming greenhorns!
Big Moose Saloon
Register / Login
extracting numeric values from string
Joined: Dec 22, 2004
Dec 25, 2004 00:00:00
I have a
program that has a string.The
contains different numers(multi digit) and characters. I want to extract these numbers into different variables.
for eg. if the string is c 32 34.
Then I want to extract c, 32 & 34.
Please help me . Thanks in advance.
Joined: Mar 13, 2004
Dec 25, 2004 06:37:00
Pick off the fields with
if a field is a number, or whatever, you can use Integer.parseInt() inside a try/catch statement.
SCJP 1.4, SCWCD in process
Joined: Jan 29, 2003
Dec 25, 2004 12:09:00
If you're in JDK 5 play with Scanner. By default it will pull tokens off a string delimited by spaces (just what you need) and convert them to various types if possible.
A good question is never answered. It is not a bolt to be tightened into place but a seed to be planted and to bear more seed toward the hope of greening the landscape of the idea. John Ciardi
subject: extracting numeric values from string
How do I print a formatted number?
MessageFormat Help ?
regular expression question
Help! Question on converting String to BigInteger
AD LDS with DIGEST-MD5 can not connect
All times are in JavaRanch time: GMT-6 in summer, GMT-7 in winter
| Powered by
Copyright © 1998-2013
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053883/warc/CC-MAIN-20131204131733-00015-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,337 | 30 |
https://cboard.cprogramming.com/cplusplus-programming/57649-function-accepting-variable-number-arguments.html
|
code
|
I'm trying to write a wrapper for the Windows API that will let me use a single function to replace code such as this:
However, the problem comes when I try to make the single function. What I would like to do is something along the lines of this:
hMenu = CreateMenu();
hSubMenu = CreatePopupMenu();
AppendMenu(hSubMenu, MF_GRAYED, ID_FILE_NEW, "&New");
AppendMenu(hSubMenu, MF_GRAYED, ID_FILE_OPEN, "&Open...");
AppendMenu(hSubMenu, MF_GRAYED, ID_FILE_SAVE, "&Save");
AppendMenu(hSubMenu, MF_GRAYED, ID_FILE_SAVEAS, "&Save As...");
AppendMenu(hSubMenu, MF_SEPARATOR, NULL, NULL);
AppendMenu(hSubMenu, MF_STRING, ID_FILE_EXIT, "E&xit");
AppendMenu(hMenu, MF_STRING | MF_POPUP, (UINT)hSubMenu, "&File");
wCreateMenu(char* poptitle, char* submenu1, char* submenu2, ... , char* submenuN) where you can add in as many sub-menus as you would like. The problem is, I don't know how to tell C++ that "I do not know how many variables will be passed, please be able to work with them."
I found a couple of tutorials, but the way they explained it made absolutely no sense whatsoever. Here's the links to those.
Help would be appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122933.39/warc/CC-MAIN-20170423031202-00222-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,129 | 14 |
https://scholarlykitchen.sspnet.org/2008/10/28/openid-goes-mainstream/
|
code
|
Image via Wikipedia
In 2005, Dick Hardt gave his famous “Identity 2.0” presentation at O’Reilly’s Open Source Convention (OSCON). The logic and examples were compelling and complete, the analogy to real-life convincing. There was really not much more to say on the topic. If you saw the presentation, you were convinced — the time had come for an open, portable online identity.
Since then, OpenID has been gaining traction in new media spaces, particularly blogs and social media sites.
Now, according to the New York Times, Microsoft has made Windows Live compatible with OpenID, recognizing it as “the de facto standard Web protocol for authentication.”
This move virtually ensures that major players from Yahoo! to Google to AOL will have to stop paying lip service to OpenID and begin to accept it as the authentication modality of the Web.
3 Thoughts on "OpenID Goes Mainstream"
I’ll be following closely how this develops. I’m concerned that with OpenID there’s significant potential for phishing. This and various user experience issues will need to be addressed before OpenID can make the leap towards mainstream adoption.
To be sure, OpenID is a great thing. The problem is that there is going to be a proliferation of OpenIDs, e.g., you will have one from Microsoft, one from Google, etc. There are two questions in particular that emerge:
(1) Which ones can be trusted?
(2) Which ones are most valuable to you?
The answer to (1) is pretty straightforward. People trusts brands. Microsoft and Google OpenIDs will be almost universally trusted. What will be more interesting is how societies can become OpenID identity providers (IdP) for their members.
My answer to (2) is slightly more involved. What is your Microsoft or Google OpenID going to give you aside from single sign-on? Not much. But what can a society’s OpenID give you? A professional identity, relevant services, and so much more.
OpenID is more than a single sign-on mechanism–it’s a calling card. Societies need to become identity providers to their members and readers and then they need to develop personalization services around the OpenIDs.
Think about it. In our space, which is more valuable: an identity with Microsoft or Google or an identity with the National Academy of Sciences? You may find that people end up trusting the latter more, too.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946637.95/warc/CC-MAIN-20230327025922-20230327055922-00484.warc.gz
|
CC-MAIN-2023-14
| 2,356 | 14 |
http://tynpnnhaf.gq/article5415-install-gnome-3-ubuntu-server.html
|
code
|
install gnome 3 ubuntu server
It is very simple to install gnome-session, and this tutorial covers the installation process involved with gnome session.News Ubuntu Linux RedHat Others. x. Add Servers. Remote Host Name/IP . Port . I have installed ubuntu server 64-bit and I want to install gnome 3 or KDE.The instructions are same as converting a normal server install to a desktop one. Gnome 3 is the default in 11.10, so you can just run the following The GNOME Desktop will welcome you afterwards. Install GNOME 3.10 in Ubuntu 13.10 without Breaking Unity. Before installin the GNOME 3.10, you should do some makeovers to GNOME work properly in Ubuntu. 3. sudo apt-get install gnome-shell. (Note: Need to input the Administrator password (such as yourCategory: How Tos, Ubuntu, Utility Software / Tags: Debian, GNOME 3, Gnome 3 Installation, Gnome 38 Windows Server 2003 Windows Server 2008 Windows Vista Windows XP Wordpress A quick tutorial to show you how to install GNOME in Ubuntu 14.04, 16.04 and other versions.
In the series to install various desktop environment other than the default Unity, we have already seen Ubuntu Servers :: Remove Gnome From Server? OpenSUSE Install :: Install Gnome After The Minimal Server ( Console Based ) Install?OpenSUSE Install :: 11.4, Gnome 3 New Install / No NTFS Partitions Detected? The following tutorial will teach you guys how to install the highly anticipated GNOME 3 desktop environment on the Ubuntu 11.04 (Natty Narwhal) operating system. Installing on Ubuntu and Linux Mint. GNOME 3.16 is currently under staging repositories for ubuntu based operating systems.But it does not provide any failover scenario. If the Master server breaks, we cannot execute queries directly on the slave server. Learn to install GNOME via Ubuntu command line.
GNOME 3.22 contains major new features, as well as many smaller improvements and bug fixes. In total, the release incorporates 22980 changes, made by approximately 775 contributors. Hi all, I am setting up a test box - is there any way to install gnome on server 12.04? Thanks, Rob.Your best bet is to install Ubuntu Desktop, which can do everything Ubuntu Server can do. Then install AMP on top of it, if you are testing web pages. This article will help you to install gnome3 on ubuntu 12.04 . people who are not interested in using unity can install gnome environment on their ubuntu machine.Gnome3 now comes with various new features .How to install LAMP server on centos 7 By krizna - September 2 2014 11:36 AM. Fortunately, installing the GNOME Desktop Environment on Ubuntu server is not difficult. The only caveat to this installation is that youre not (out of the box) really gaining anything in the way of administration tool GUIs. I want to have it, but I dont want to disturb my current setup of ubuntu 12.04. Please tell me if I can install GNOME 3.8 UI on my ubuntu 12.04 without disturbing my current OS and how?Stack Overflow. Server Fault. I have installed ubuntu server 64-bit and I want to install gnome 3 or KDE. What dependencies must be installed?Related Posts. Mysql service not starting ubuntu. How to install Varnish cache server with Nginx on Ubuntu 18.04 Bionic Beaver Linux. sudo apt install ubuntu-gnome-default-settings. The default settings package gives Gnome the stock look present on virtually all other Gnome-based Linux operating systems out there.How To Install Ghost On Ubuntu Server. Installing Gnome 3.20 in Ubuntu and Linux Mint. For you to be able to install Gnome 3.20 on Ubuntu 16.04 or its derivatives such as Linux Mint 17, you will need to add the GNOME staging repository using the commands belowPostfix Mail Server Setup Guide for Linux. sudo add-apt-repository ppa:ubuntu-desktop/gnome3-builds sudo apt-get update sudo apt-get install gnome3-session.I was able to get gnome3 installed on Ubuntu 11.4 server. How do I get the desktop to show automatically? If youre using Ubuntu 12.10 with Unity or some other desktop environment and want to switch to a complete GNOME 3 desktop experience without installing Ubuntu GNOME Remix 12.10, you can do this by simply installing a few packages. Gnome 3 has garnered a lot of attention from both Linux enthusiasts and power users. If you are not happy with unity, heres how to install Gnome 3 in Ubuntu Natty.Apache Server Guide. Hardware Buying Guide. iOS Beginner Guide. Install GNOME3 aptitude updateaptitude install-recommends install gnome-desktopreboot (Optional) Configure lightdm to allow manual logins echo greeter-show-manual-logintrue >> /usr/share/li.How to configure lightdm to allow manual logins in Ubuntu 14.04. Because all the required packages will be soon available via the GNOME Unstable PPAs, in order to properly install GNOME 3.14 on Ubuntu GNOME 14.10, we have to add all the needed PPAs to our system, update the local repository index and perform a normal system upgrade Lets see how we can install GNOME 3 in our Ubuntu 16.04. Open terminal through Ubuntu Dash or by pressing Ctrl Alt T and type in the following commandUbuntu 18.04 LTS to use Xorg as default display server. How to Install Gnome 3.20 on Ubuntu 16.04 This video show you how to install Gnome 3.20 on Ubuntu 16.04 GNOME 3.20 is the latest version of GNOME 3 and the result of six months of work in Which Ubuntu Server GUI to Install? If you are looking for the lightweight desktop environment for Linux, then go for Lubuntu or LXDE desktop. I prefer the Gnome look so I went with minimal Gnome core for my Ubuntu Server GUI install. location: linuxquestions.com - date: April 12, 2013 Published at LXer: Ubuntu 13.04 users can expect to find Gnome 3.6 as the default desktop, and not the newer 3.8.I used their frontend to install Ubuntu Server 9.04 (x86). I sshd to the server, changed the root password, added a normal user and added Installing Ubuntu GNOME Applications: Type these commands: sudo add-apt-repository ppa: gnome3-team/gnome3-staging sudo apt-get update sudo apt-get dist-upgrade sudo apt-get installUbuntu server 10.04 doesnt boot into installed Gnome desktop automaticallyMay 8. [Linux Server] Ubuntu Server: Installing on a PC | Adding GUI - GNOME 3 Desktop Environments.Instalar Interfaz Grafica (gnome) en Ubuntu Server. But we can install gnome 3 desktop on Ubuntu if you like to use gnome 3 as your desktop environment.Congratulations! You have successfully install and configured GNOME on your Ubuntu 16.04 server. Download Ubuntu 12 04 Install Gnome 3 Over Unity Fo PC Wii U PS4 PS3 Xbox One Xbox 360 With Full List Command And Cheat Files if Needed AND DOWNLOAD THIS VIDEO.[Download] How To Install Gnome GUI Desktop On Ubuntu Server. These instructions are for installing the GNOME Desktop in Ubuntu 12.04 running the Unity Desktop.Ive done this on top of a fresh install of 12.04 server. At logon, I have three options: Gnome, Gnome Classic, Gnome Classic (no effects) however, all three look and function identically. Ubuntu Server Install Gnome 3 , Here at www.imgarcade.com you will find Online Image Arcade! that are really amazing.Ubuntu Server Install Gnom How To Install GNOME 3.14 Scan your Web-Server for Malware with ISPProtect now.These shell extensions give GNOME 3 the look and feel of GNOME 2. For those who prefer GNOME 2 this tutorial shows how to install Mate from the Linux Mint repositories on Ubuntu 11.10. Processing triggers for desktop-file-utils (0.23-1ubuntu3) Setting up gnome-tweak-tool (184.108.40.206-1ubuntu1)How to install LAMP Server on Fedora 27. I have installed ubuntu server 64-bit and I want to install gnome 3 or KDE.The instructions are same as converting a normal server install to a desktop one. Gnome 3 is the default in 11.10, so you can just run the following Installing GNOME desktop on Ubuntu is faily straightforward. Most Ubuntu servers are run on CLI (Command-Line Interface) mode.Step 1. First, You just need to install a couple of Gnome apps, add the gnome3-staging prepository and do a dist-upgrade This video shows how to install a minimal lightweight Gnome desktop environment that is perfect for Ubuntu servers. Note that this is not a full-fledged I have installed ubuntu server 64-bit and I want to install gnome 3 or KDE.The instructions are same as converting a normal server install to a desktop one. Gnome 3 is the default in 11.10, so you can just run the following Ive installed Ubuntu Server Edition and setup open ssh,samba and lamp on my home desktop just to work on LAN. I also want setup a GUI on it for daily use. Ive already performed the following. Sudo apt-get install gnome-session-fallback sudo apt-get install lightdm-gtk-greeter sudo apt-get install xinit. When you install Ubuntu gnome 3, it does not remove existing default unity desktop environment.How to Install TeamViewer in Ubuntu Desktop. Install and Configure DHCP Server in Ubuntu. Install Nginx on Ubuntu Server with PHP-FPM. Released on March 23, GNOME 3.20 brings a number of welcome improvements to the GNOME experience, updates a raft of core apps and adds more polish to the GNOME Shell, er, shell. To install GNOME 3.20 on Ubuntu 16.04 you will need a couple of things Unfortunately, Ubuntu GNOME 14.10 (Utopic Unicorn) ships with GNOME 3.12 for the most part (there are even some GNOME 3.10 packages, like Gedit. How to install and connect to a desktop environment on your Linode. Launch the VNC server manually to test your connection. Untu install dekstop Gnome maupun KDe bisa beberapa cara : Alternatif Pertama : nasrulsudo apt-get install ubuntu-desktop.MELVIN on Membangangun dan Menganalisa Squid Proxy Server FreeBSD 7.1. 1. sudo add-apt-repository ppa:gnome3-team/gnome3 2. sudo apt-get install ubuntu-gnome-desktop ubuntu-gnome-default-settings 3. sudoThis page is intended to contain some notes on my server setup, technologies i use or tested and programing related stuff.Maybe this will also help some others. Installing GNOME 3 In Ubuntu. December 22, 2012 by RayCoder.Setting Up FTP Server on Ubuntu Localhost with VSFTPD. Creating Social Network on Ruby on Rails - Day 3 - Base Navigations Twitter Bootstrap Styles. We will shift our default Ubuntu desktop back to GNOME for Ubuntu 18.04 LTS. To install Gnome 3 Desktop (Gnome Shell), open terminal via CtrlAltT, when it opens, run command GNOME 3.12 was released a while back but it wasnt included by default in Ubuntu 14.04, so heres how to install GNOME 3.12 in Ubun How To Install LibreNMS Network and Server Monitoring Tool on Ubuntu 16.04BEWARE INSTALLING GNOME 3 DESKTOP IT Ubuntu 16.04)MAY BREAK UNITY: How can I remove Gnome Desktop Environment without messing Unity DE? This video shows how to install a minimal lightweight Gnome desktop environment that is perfect for Ubuntu servers.This video demonstrates how to install a minimal GNOME Desktop into an Ubuntu 10.04 LTS Server. The Ubuntu Desktop now uses GNOME instead of Unity. On supported systems, Wayland is now the default display server.The Color Emoji feature of GNOME 3.26 is not available in Ubuntu 17.10. Tracker is not installed by default.
This video shows how to install a minimal lightweight Gnome desktop environment that is perfect for Ubuntu servers.Not a fan of Ubuntu spin on Gnome 3? This is the command to turn it into "stock" Gnome 3!! sudo apt install gnome-session vanilla-gnome-desktop.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866107.79/warc/CC-MAIN-20180524073324-20180524093324-00073.warc.gz
|
CC-MAIN-2018-22
| 11,296 | 5 |
https://adoriasoft.com/php-developer/
|
code
|
We are looking to invite an experienced and proactive PHP engineer to contribute to the teamwork in our dynamic web department.Ideally you are great at:
- HTML/XML/JSON/CSS (HTML5, CSS3 - desirable)
- Working with databases (MySQL/MSSql)
- Development using IDE
- Skilled at setting and web server administration (Apache/IIS)
- Have more than 3 years of programming biography
- Possess great practical object-oriented programming skills.
- English level – pre-intermediate or above. Skills working with documentation in English required.
- Able to read others' code
- Work with popular systems of version control and bugtrackers.
- Understand pecularities of working with legacy code.
Desirable to have:
- Experience working with frameworks, like Zend, CodeIgniter, Yii, Symfony 2
- Unit testing PhpUnit
- Experience with site optimization, including high-loaded apps
- Understanding of Agile principles
- Remote collaboration on ongoing basis
- Participation in interesting modern projects
- Work in a team of professionals
- Constant skills upgrading
- Competitive compensation
- Paid vacation
- Online English classes
- Corporate celebrations and meetings
If you meet all or part of listed requirements/know technologies and this offer is of interest to you, please, send your CV to [email protected]
(indicate the position and expected level of hourly rate.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823630.63/warc/CC-MAIN-20171020025810-20171020045810-00202.warc.gz
|
CC-MAIN-2017-43
| 1,377 | 26 |
http://www.redbubble.com/people/traveller/journal/6232244-can-anyone-help
|
code
|
I have been trying to follow “Peter Hill’s” tutorial “Easy guide to creating samples of artwork on redbubble”, but it seems to me that our new look “bubble site” may have changed the way in which you go about this . When I get to the public view page and click on the “buy/preview” button, get the product options sorted out then "right click " on the image, the window that appears does not have "properties " as an option! (You will be able to tell from this that I am not very clever with dem ’putors.)
So how do I get to the “address” so that I can copy and paste it??
Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701157212.22/warc/CC-MAIN-20160205193917-00266-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 615 | 3 |
http://www.smogon.com/forums/showpost.php?p=1762638&postcount=25
|
code
|
Originally Posted by Fat tennisace
I'm a bit leery about a CAP OU. We've said we follow Smogon's tiers for bannings and unbannings, so if we don't follow that OU, we're opening up a can of worms with things like Lati@s's un-banning and Garchomp's banning. I'm not against making the list for comparison, but it shouldn't be the list we go by.
The OU list for CAP would be largely just for entertainment since every non-uber Pokemon can just be used on CAP standard ladder. You already have Garchomp etc. banned as an uber so it wouldn't make any difference if X-Act created an OU list for the curious based on usage
Last edited by Caelum; Feb 6th, 2009 at 3:28:42 PM.
Reason: I'll take that criticism to PM, this thread isn't for that
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382892/warc/CC-MAIN-20130516092622-00053-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 734 | 5 |
https://team9960.org/ball-toss-mathematical-calculations/
|
code
|
After many frustrating trial and error attempts, we finally decided to resort to mathematics as a way of determining what the requirements would need to be to shoot the particle balls into the center goal.
Projectile motion was first analyzed by Galileo in 1638. He showed that a projectile will follow a parabolic path, determined by the initial launch conditions and the acceleration of gravity, and independent of the mass of the projectile. This sketch shows the conditions for our particle launcher on the robot:
The maximum trajectory height value is important because Rule RG08 states that the particle cannot rise more than 72 inches above the floor. (It isn’t clear in the game rules what will happen if a robot exceeds this number, however. There is no specified penalty.)
Applying the above analysis, we can construct a table using Excel that explores the effect of various launch conditions:
There are several interesting conclusions we can draw from this table:
- The steeper the launch angle, the greater the possible variation in launch velocity to achieve the target.
- Launch angles of less than 58 degrees won’t work at all: a velocity large enough to reach the leading edge of the target will cause the particle to overshoot.
- Launch angles of greater than 74 degrees will violate the 72″ trajectory maximum height rule.
- So the optimum launch angle is about 70 degrees to maximize the velocity tolerance while providing some margin to avoid too high a trajectory. This will allow about a 10% variation in velocity with a maximum trajectory height of about 62″.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297284704.94/warc/CC-MAIN-20240425032156-20240425062156-00038.warc.gz
|
CC-MAIN-2024-18
| 1,590 | 9 |
https://sentrysoftware.com/support/patches/P1662/index.html
|
code
|
P1662 - VMware ESX False Fan Speed AlertsJun 19, 2015
- Connector for VMware ESX 4 or later Servers
- Connector for VMware ESX 3 Servers
Should you install this patch?
Install this patch if you are monitoring an ESX server and are getting false alerts on the fan speed.
What does it fix?
Redundant fans sometimes report a speed/speed percent reading of zero, which triggers an alert even if no thresholds are set. The patched connector disables the speed/speed percent parameters if a valid status is collected to avoid this issue while maintaining full monitoring.
How to install the patch?
- Copy the following files to the $PATROL_HOME/lib/MS_HW_hdf directory on the server where the PATROL Agent runs:
- Re-initialize Hardware Sentry for the patch to take effect. Nothing needs to be installed on Console systems.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360107.7/warc/CC-MAIN-20210228024418-20210228054418-00068.warc.gz
|
CC-MAIN-2021-10
| 817 | 10 |
http://blog.case.edu/jeremy.smith/2006/02/01/three_wanted_its_services_wiki_farm
|
code
|
The project I am involved with regarding a complete rewrite of the transfership of student identity data between the Registrar and the Identity Management system. It involves people from ITS and the Registrar. A wiki setup that only people on the Student Identity Managment Mailing List could read and write would be wonderful.
I'm on another project concerning the continual evolution of the Case Daily emails. Again, I am working with people in different departments (ITS and Marketing & Communications). I would love a wiki site that only we could access.
There's another beginning of a project regarding iTunes@Case. It would be great if we could setup a separate wiki that was world-readable but only writeable by people on the iTunes@Case mailing list.
Project and group specific wikis created on demand would be nice.
Now I know there are ways to tailor something like MediaWiki to do it. But I don't know, it just doesn't feel like the right wiki software to do it. For some reason (and this is probably because my exposure to the engine is WikiPedia and the Case Wiki), MediaWiki powered sites feel lofty, official, grandiose — places to store official stuff... like an encyclopedia... like the Case Wiki. It just doesn't feel like software I use to do one-off project documentation. Internally, we use DokuWiki, and that does feel like a place to store project documentation.
I like TiddlyWiki and its variants but navigating a TiddlyWiki is difficult for normal users. (Seriously, go find a normal user and watch them try to use TiddlyWiki... they get completely lost and confused.)
Regardless, some way to automate installs (and upgrades) of DokuWiki on a per-project or per-group basis would be wonderful. It wouldn't have to be DokuWiki, but thus far, it feels like the best to me (if only it could have database support for backups).
Automating the creation of a wiki site is one aspect. The other aspect is controlling you can read it and who can edit it. But that's the subject of my #1 most wanted ITS Service.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645248.22/warc/CC-MAIN-20180317155348-20180317175348-00546.warc.gz
|
CC-MAIN-2018-13
| 2,030 | 8 |
http://expopromoter.com/events/143294/
|
code
|
You can find other events in our calendar, or use the search:
Paris, France 6 – 7 October / 2012
Get entrance ticket to the trade show in advance. Choose the number of tickets, fill in a form and get them to your email.
|Free||− 1 +|
Unfortunately, we ran out of tickets and sincerely apologise for the inconvenience. But we have exhibitions you might like to attend.
This is a past event.
About the trade show
Pet Expo is the event dedicated to the world of pet and meets each year for 18 years more than 10,000 animals.
The program includes many niches animation, contests and conferences, and a digest of beauty and elegance presented by professionals from the world of pets.
Turtles, boas, pythons, snakes, iguanas ... are animals that require special care and sound scientific knowledge, and yet these animals are very successful with the French.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170839.31/warc/CC-MAIN-20170219104610-00343-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 855 | 10 |
https://watchmoviesforfree.ru/the-batman-why-robert-pattinson-almost-lost-the-role-movie-talk_17e36ee66.html
|
code
|
Today on Movie Talk, the panel discusses Robert Pattinson’s interview with Variety where reveals how he almost lost out on The Batman and the Joker movie receiving an 8 minute standing ovation accompanied by some online backlash for its portrayal and themes.
Collider’s John Rocha welcomes Haleigh Foutch and Coy Jandreau to discuss the biggest topics in movie news!
NEW TIME ALERT! Catch #ColliderMovieTalk live every morning at 9am pacific / 12pm eastern beginning Monday, September 16th with an earlier, bigger & better show to start your day!
Follow John Rocha: https://twitter.com/TheRochaSays
Follow Haleigh Foutch: https://twitter.com/HaleighFoutch
Follow Coy Jandreau: https://twitter.com/CoyJandreau
Subscribe to Collider Videos ► ► https://bit.ly/2n1MZb7
Breaking Entertainment News ► ► http://collider.com
More from Collider ► ►
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668618.8/warc/CC-MAIN-20191115093159-20191115121159-00392.warc.gz
|
CC-MAIN-2019-47
| 855 | 9 |
https://www.michaelmanagement.com/help/can-i-use-multiple-computers-to-access-the-systems
|
code
|
Can I use multiple computers to access the systems?
Yes, you can! You can use any computer and switch back and forth (i.e. between a work computer and a home computer) - however, please remember that you may not share your user ID with other people. Doing so is a violation of our Terms of Service.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735963.64/warc/CC-MAIN-20200805153603-20200805183603-00427.warc.gz
|
CC-MAIN-2020-34
| 298 | 2 |
https://www.uwplatt.edu/layout-examples/example-blue-headings
|
code
|
Example of Blue Headings
Grey Gradient in Side Pane
This text was added using the "Body" field. All of the blue headings in this "Body" field are formatted as "Heading 2" with the "Blue Heading" style to match the blue headings of the reusables in the right side pane.
This is a Blue Heading
The heading above and the text below were added using the "Body - Right Side" field. To make them appear like the reusables below, the heading above was styled using the "Heading 2" format and the "Blue Heading" style, and a div with the style "Gray Gradient DIV" was wrapped around these two paragraphs. The blue headings and the gray gradients for the reusables below are styled automatically—a feature of the "Reusable" functionality.
Phasellus eu sem nec erat pellentesque pulvinar. Sed ac orci tortor, non faucibus nulla. Vivamus quis ipsum vel enim porttitor consectetur. Aliquam erat volutpat. Pellentesque sed mauris quam. Morbi convallis purus ac tortor posuere nec adipiscing dui commodo. Sed lacus dui, dictum hendrerit fermentum vel, vehicula et nulla.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887077.23/warc/CC-MAIN-20180118071706-20180118091706-00755.warc.gz
|
CC-MAIN-2018-05
| 1,058 | 6 |
https://gis.stackexchange.com/questions/33624/updating-polygon-geometry-deleting-inner-rings-with-python/33631#33631
|
code
|
I've searched, but can't find clear explanations how can I simply delete inner rings from existing polygons with python or extract outter rings and overwrite the geometry. Seems GDAL/OGR should be the simplest, but still I need some help...
Simple vision of mine would be:
dataSrc=driver.Open(shp) layer=dataSrc.GetLayer() for i in xrange(layer.GetFeatureCount()): feature = layer.GetFeature(i) geometry = feature.GetGeometryRef() if geometry.GetArea()<200: layer.DeleteFeature(i) if geometry.GetGeometryCount()>1: geometry=geometry.GetGeometryRef(0) #overwrite geom, getting the first ring outer feature.SetGeometry(geometry) layer.SetFeature(feature)
This doesn't loop through, it's just how I would like to see.
As I know the first ring or the first part of the geometry should be the outer ring, so I assumed I can just ask for it like that.Suppose that's not a problem.
So, probably the question is just about Updating Geometry. I open dataset withouth specific- Reading or Writing, so I assume it should let me write in it not just read. But if I do not want to have a new dataset, can I just update write like that or i should anywhays better create a new dataset?
Or maybe there is even more simple way to solve this with python?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446709929.63/warc/CC-MAIN-20221126212945-20221127002945-00843.warc.gz
|
CC-MAIN-2022-49
| 1,237 | 7 |
http://minecraft.codeemo.com/mineoswiki/index.php?title=Addons
|
code
|
There is a lot of functionality many admins will want for their server that is not necessarily needed by all those deploying MineOS. An addon is a simple script that will download, build, and install a piece of software. Follow the complete instructions for each addon on its wiki page. Please note, these addons only work for MineOS CRUX and are provided as convenience scripts--they are not the only way to install pieces of software and other, non-CRUX variants have their own prescribed method to install software.
Updating add-on install scripts
The below addons all have shell scripts in the /usr/games/minecraft/addons which--when run as root--will download and install its respective files from the internet. The shell scripts automate some simple tasks, such as creating users and running the ports system downloader and compiles/extracts the software.
While the addon shell scripts are all-inclusive, I encourage all users to learn what the scripts are doing by reading them and even executing the lines personally, rather than automated-ly. This will give you a much more complete understanding of the tasks involved and the binaries/configurations installed.
If you would like to try out running the ports system manually, first update all the Pkgfiles. This downloads all the files to /usr/ports/mineos, which is the repository for all the MineOS-related packages.
rsync -r rsync://[email protected]/ports /usr/ports
|PhpMyAdmin||A web-based MySQL administration tool||http://www.phpmyadmin.net|
|php-gd||A graphics library for PHP||http://www.boutell.com/gd/|
|pigmap||a Minecraft Google-map renderer||https://github.com/equalpants/pigmap|
|umurmur||an open source, low-latency, high quality voice chat software||http://code.google.com/p/umurmur/|
|phpsysinfo||A web-based server information webpage||http://phpsysinfo.sourceforge.net/|
|eXtplorer||a web-based File Manager||http://extplorer.sourceforge.net/|
|PhpBB3||A complete forum solution||http://www.phpbb.com/|
|Hamachi||A VPN solution for those with network restrictions||https://secure.logmein.com/products/hamachi/download.aspx|
Why aren't these included in the ISO? Add-on rationale
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574532.44/warc/CC-MAIN-20190921145904-20190921171904-00399.warc.gz
|
CC-MAIN-2019-39
| 2,171 | 15 |
https://lists.blender.org/pipermail/bf-committers/2007-May/018401.html
|
code
|
[Bf-committers] supporting 6Dof devices on blender.
ettore_pasquini at 3dconnexion.com
Fri May 18 21:38:23 CEST 2007
On 5/18/07 3:39 AM, "Jean-Luc Peurière" <jlp at nerim.net> wrote:
> Unfortunately the license agreement they request for using their SDK
> is not and cannot be make GPL compatible.
> So who would be interest to tackle with me this, and add HID support
> on all 3 major OS we support (Windows, linux, Os X) ? once we support
> those, adding support for the other unices should be straightforward.
I work for 3Dconnexion and I am currently working on adding support to
Blender for our 6DOF devices. I am definitively interested!
Let me first say that the license of our SDK has just changed (1 hour ago).
The new license (see below) allows redistribution of the SDK. One reason for
us to change the license was to make it possible to work with Blender, so
hopefully that's fixed now. In any case, if there are any legal problems
with the license we can work things out to solve them. Just let me know. :-)
"My" current implementation uses the new SDK and it works (more or less) on
Windows. I started coding the Mac solution as well. The advantage for using
the SDK is that it makes things easier to implement. I modified the patch
available from the projects site, consisting in a few device-independent
wrapper extensions to GHOST and a dlopen'ed plugin with device-specific,
platform-specific code. All SDK calls are contained inside the plugin,
eventually allowing other plugins to be used. Just to make clear we are not
locked in with 3Dconnexion only support using this architecture.
Adding HID/DirectInput/Xinput support is not excluded by this implementation
either, it's just much longer to implement. Our objective is to have
something going quickly and it would be great if we could do that.
Eventually, once HID support is ready we could scope out the SDK plugin if
we want that.
3DCONNEXION SDK SOFTWARE LICENSE AGREEMENT
This 3Dconnexion Software Developer Kit (³3Dconnexion SDK²) (available for
Windows, Mac OS X and Unix/Linux) is provided to you by 3Dconnexion in
consideration of your acceptance to the installation, use, reproduction and
distribution terms as stated below. If you do not accept these terms, you
should not continue with the installation, use, reproduction and
distribution of the 3Dconnexion SDK.
1. License Grant:
Subject to the terms and conditions contained in this Agreement,
3Dconnexion grants to you a personal limited non-exclusive, nontransferable,
nonsublicensable, world-wide, royalty-free, revocable license to install,
use, copy, modify and distribute in object code form the 3Dconnexion SDK;
provided that no license is granted under any patents that may be or later
become infringed by your modifications or derivative works in which the
3Dconnexion SDK may be incorporated.
2. Attribution Requirements and Trademark License:
2.1 You must provide attribution to 3Dconnexion in the "About" or "Info"
box menu items (or equivalent) of your software application in the format
set forth below:
Development tools and related technology provided under license from
3Dconnexion. © 1992 2007 3Dconnexion. All rights reserved.
THE 3DCONNEXION SDK AND ALL MATERIALS PROVIDED HEREUNDER BY 3DCONNEXION ARE
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. 3DCONNEXION AND ITS
AFFILIATED COMPANIES MAKE NO WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
WITHOUT LIMITATION THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, TITLE AND NONINFRINGEMENT REGARDING THE 3DCONNEXION SDK
AND ALL MATERIALS OR ITS USE AND OPERATION ALONE OR IN COMBINATION WITH ANY
IN NO EVENT SHALL 3DCONNEXION OR ANY OF ITS AFFILIATED COMPANIES BE LIABLE
FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL
DAMAGES (INCLUDING BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA OR PROFITS; OR BUSINESS INTERRUPTION) ARISING IN
ANY WAY OUT OF USE, REPRODUCTION, MODIFICATON AND/OR DISTRIBUTION, OR THE
INABILITY TO USE, ANY PORTION OF THE 3DCONNEXION SDK OR ITS DERIVATIVES OR
MODIFICATIONS, AND ANY OF THE MATERIALS PROVIDED HEREUNDER BY 3DCONNEXION,
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
LIABILITY OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE), EVEN IF 3DCONNEXION
OR ANY OF ITS AFFILIATED COMPANIES HAVE BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES. Because some states/jurisdictions do not allow the exclusion
or limitation of consequential or incidental damages, the above limitation
may not apply to you.
More information about the Bf-committers
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301592.29/warc/CC-MAIN-20220119215632-20220120005632-00510.warc.gz
|
CC-MAIN-2022-05
| 4,590 | 70 |
https://77minds.wordpress.com/2015/08/15/kiddos/
|
code
|
Our education system infuses a thought of superiority and inferiority that ruins our intellect. That must change.
I lead a team in my company, possibly the best skilled and disciplined team my company has now. I am proud of them. My lead technique is simple, let my team have common sense and cultivate the brain of their own. Once they can think enough, all I need to do is to pass high level instructions and watch youtube.
But there are some “what the fuck” movements. My team knows very well I care nothing about their personal traits, only their professionalism is what I am bothered about.
And here is first what the fuck. One of my team mate asked me permission so that he could go out for 5 minutes. WHAT!!!!! Why should I care weather he goes out for 5 minutes or a century?! I am trying to build a team on anarchist principle where people manage themselves and then this one happens out of the blue.
Another incident happened where one of my colleague asked me permission to go early. I have never ever laid out timings for my team, and this one stunned me, more stunning was he gave me a reason why he wants to leave early. For a person who has strict rule not to indulge in peoples personal reasons this was kind of a stunner.
In India, even in an intellectual industry like information technology people have the sense of superiority and inferiority, thats stupid, that clearly points to the lack of intellect in the organization. I must infuse more of independent thought into my team and make them more formidable thinking force that does things other teams never would have dreamed of. Till then I am failure.
Any way here is the Zeroth what the fuck. Long time ago, a head weight manager once pulled my team mate and tortured him jut because she saw him playing games, any way I roasted her and am waiting to roast her more when opportunity is available (i.e when her head wight grows again). None messes up with me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591140.45/warc/CC-MAIN-20180719144851-20180719164851-00444.warc.gz
|
CC-MAIN-2018-30
| 1,937 | 7 |
http://www.pixelpost.org/forum/printthread.php?t=8210
|
code
|
ajax rating system statistics
I am currently using the Ajax rating system with the statistics. Currently I have the ajax statistics setup to show highest rated image, and it works great, but it is listing the images in 1 long column, is there anyway to make to list the images in I.E 5 columns, and 5 rows?
Thanks for your time.
Please contact the author of the addon.
|All times are GMT. The time now is 11:46 AM.|
Powered by vBulletin® Version 3.7.3
Copyright ©2000 - 2013, Jelsoft Enterprises Ltd.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701638778/warc/CC-MAIN-20130516105358-00065-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 502 | 7 |
https://www.puritanboard.com/threads/help-to-understand-the-use-of-impetration.46827/
|
code
|
I have been studying the extent of the atonement, and particularly Amyraldism. One path of study has led me to Warfield's discussion of the Westminster Assembly on this regard, which subsequently led me to read Cunningham's treatment of the topic of limited atonement. A word that keeps popping up is impetration. Looking in various dictionaries does not seem to be helping me understand the sense as it is being used in these discussions. The bare definition (of impetrate) is: To obtain by request or entreaty. Now for an example from Cunningham: "Does the word [redeemed] describe merely the impetration or purchase of pardon and reconciliation for men by the death of Christ? or does it comprehend the application as well as the impetration?" William Cunningham, Historical Theology, Volume II, (Edinburgh: T & T Clark. 1864) pg. 327. I have wondered if the definition I have for impetrate is not suitable for this usage; perhaps Cunningham had another definition in mind. Either way, I am unable to get a good sense of how the word is being used. Would someone care to put this another way so that I might better understand it?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578531994.14/warc/CC-MAIN-20190421160020-20190421181028-00025.warc.gz
|
CC-MAIN-2019-18
| 1,132 | 1 |
http://www.java-gaming.org/index.php?action=recent;start=10
|
code
|
I'm sure in the far future we could definitely have the power to simulate an entire universe.An, but not our, thats the point we got.
And still, what would this 'simulation' look like? It would somehow process everything, but would it be something we can still read from?
What is a 'simulation' if not something that is actually less than the original thing. Trying to simulate it 100% would actually mean cloning it, wouldn't it?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223206147.1/warc/CC-MAIN-20140423032006-00581-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 430 | 3 |
https://cloud.google.com/python/docs/reference/appengine/latest/google.cloud.appengine_admin_v1.types.EndpointsApiService
|
code
|
EndpointsApiService(mapping=None, *, ignore_unknown_fields=False, **kwargs)
Cloud Endpoints <https://cloud.google.com/endpoints>__
configuration. The Endpoints API Service provides tooling for
serving Open API and gRPC endpoints via an NGINX proxy. Only valid
for App Engine Flexible environment deployments.
The fields here refer to the name and configuration ID of a
"service" resource in the
Endpoints service name which is the name of the "service" resource in the Service Management API. For example "myapi.endpoints.myproject.cloud.goog".
Endpoints service configuration ID as specified by the Service Management API. For example "2016-09-19r1". By default, the rollout strategy for Endpoints is ``RolloutStrategy.FIXED``. This means that Endpoints starts up with a particular configuration ID. When a new configuration is rolled out, Endpoints must be given the new configuration ID. The ``config_id`` field is used to give the configuration ID and is required in this case. Endpoints also has a rollout strategy called ``RolloutStrategy.MANAGED``. When using this, Endpoints fetches the latest configuration and does not need the configuration ID. In this case, ``config_id`` must be omitted.
Endpoints rollout strategy. If ``FIXED``, ``config_id`` must be specified. If ``MANAGED``, ``config_id`` must be omitted.
Enable or disable trace sampling. By default, this is set to false for enabled.
Inheritancebuiltins.object > proto.message.Message > EndpointsApiService
Available rollout strategies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00238.warc.gz
|
CC-MAIN-2022-40
| 1,505 | 13 |
https://bitbucket.org/wxmetvis/mss/wiki/GSOC2019/collaborative%20changing%20a%20flight%20path
|
code
|
Collaborative Editing of a Flight path
The MSS client GUI stores a flight path by PyFilesystem2 or file based. This has to be shared to other scientists.
This project shall enable the MSS client to use a collaborative tool for direct sharing the flight path and direct syncing of changes with different users. It should be managed who can take part by a user list. Optional for direct discussions a chat should be available. Optional editing in a collaborative editor should be enabled. The dedicated server infinoted used by Gobby may have the needed functionality
Skills: Python, QT, UI programming, Git,
Difficulty level: Medium
Potential mentors: [email protected], [email protected], [email protected]
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257731.70/warc/CC-MAIN-20190524184553-20190524210553-00450.warc.gz
|
CC-MAIN-2019-22
| 719 | 6 |
http://ecoiner.org/kobe-bitcoin-day-trading.html
|
code
|
An initial coin offering (ICO) is a controversial means of raising funds for a new cryptocurrency venture. An ICO may be used by startups with the intention of avoiding regulation. However, securities regulators in many jurisdictions, including in the U.S., and Canada have indicated that if a coin or token is an "investment contract" (e.g., under the Howey test, i.e., an investment of money with a reasonable expectation of profit based significantly on the entrepreneurial or managerial efforts of others), it is a security and is subject to securities regulation. In an ICO campaign, a percentage of the cryptocurrency (usually in the form of "tokens") is sold to early backers of the project in exchange for legal tender or other cryptocurrencies, often bitcoin or ether.
“If the trend continues, the average person will not be able to afford to purchase one whole bitcoin in 2 years. As global economies inflate and markets exhibit signs of recession, the world will turn to Bitcoin as a hedge against fiat turmoil and an escape against capital controls. Bitcoin is the way out, and cryptocurrency as a whole is never going away, it’s going to grow in use and acceptance as it matures.”
EthereumPrice.org was developed by Ether0x in March 2016 to allow users to easily track the price of Ethereum both historically and in real-time. The platform has since evolved to include several fiat currencies (EUR, GBP, JPY and others) as well as price data for a number of Ethereum ERC20 tokens and other blockchain currencies. More recently, prediction data from Augur was also added to provide insight into the future price expectations of the Ether market. Price data is currently sourced from multiple exchanges with the weighted average price of these assets being calculated by CryptoCompare.com. For more details on the weighted average calculation, see our FAQ.
In October 2015, a development governance was proposed as Ethereum Improvement Proposal, aka EIP, standardized on EIP-1. The core development group and community were to gain consensus by a process regulated EIP. A few notable decisions were made in the process of EIP, such as EIP-160 (EXP cost increase caused by Spurious Dragon Hardfork) and EIP-20 (ERC-20 Token Standard). In January 2018, the EIP process was finalized and published as EIP-1 status turned "active". Alongside ERC-20, notable EIPs to have become finalised token standards include ERC-721 (enabling the creation of non-fungible tokens, as used in Cryptokitties) and as of June 2019, ERC-1155 (enabling the creation of both fungible and non-fungible tokens within a single smart contract with reduced gas costs).
Bitcoin has been criticized for its use in illegal transactions, its high electricity consumption, price volatility, and thefts from exchanges. Some noted economists, including several Nobel laureates, have characterized it as a speculative bubble. Bitcoin has also been used as an investment, although several regulatory agencies have issued investor alerts about bitcoin.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146809.98/warc/CC-MAIN-20200227191150-20200227221150-00551.warc.gz
|
CC-MAIN-2020-10
| 3,030 | 5 |
https://lists.webkit.org/pipermail/webkit-qt/2010-February/000129.html
|
code
|
henrik at newdawn.dk
Fri Feb 12 05:46:23 PST 2010
For some reason this does not work - i AM able to load the page , and also
able to render the frame via QPainter to QImage etc... but when calling
The application is CLI - but uses QApplication()...
Alså - the load and exectution is performed in an external static library ,
which is also used in a GUI client and here it is working as expected.
The application is a webscraper - where the GUI part is the dev tool for the
web scraper and the CLI app is the runner.
Any help or ideas would be much appreciated...
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the webkit-qt
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991648.40/warc/CC-MAIN-20210514060536-20210514090536-00337.warc.gz
|
CC-MAIN-2021-21
| 675 | 13 |
https://discuss.hashicorp.com/t/new-learn-tutorial-migrate-a-java-application-to-nomad/23354
|
code
|
The Nomad Java task driver enables you to run Java applications in your Nomad cluster without the need to containerize them. It also allows you to use Nomad’s standardized, declarative job configuration with the familiar configuration elements of typical JVM applications.
Our new Learn tutorial, Migrate a Java Application to Nomad for Linux/macOS and Windows guides you through the process of creating a Nomad job specification for a sample Java application. You will learn how to
- find critical elements from a simple Java startup script,
- download the application using the
- provide configuration files using
- use the
envstanza to populate environment variables, and
- run and validate your deployed application.
If you have any challenges with the tutorial or it sparks questions, drop them
here; I’ll do my best to answer.
Have fun learning!
Product Education Engineer, Nomad
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530553.34/warc/CC-MAIN-20220519235259-20220520025259-00240.warc.gz
|
CC-MAIN-2022-21
| 889 | 12 |
https://codecsocean.com/category/ffmpeg/page/2/
|
code
|
Crop video in FFmpeg means to select wanted rectangular area from the input to the output without a remainder. Cropping is often used with padding, resizing and other editing.
Resizing video in FFmpeg means to change its width and height with an option, while scaling means to change the frame size with a scale filter which can be used to accomplish various tasks.
Encoded output file size calculation
The final size of encoded output is the sum of audio and video stream sizes. The equation for video stream size in bytes is (the division by 8 is for the conversion from bits to bytes):
Continue reading FFmpeg File Size Calculation of Encoded Output
A good understanding of the frame rate and the bit rate is important in the work with FFmpeg, frame rate and bit rate are the fundamental characteristics of the video and their proper setting is very important for the overall video quality.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510932.57/warc/CC-MAIN-20181017002502-20181017024002-00009.warc.gz
|
CC-MAIN-2018-43
| 893 | 6 |
https://coderanch.com/t/547541/java
|
code
|
Last week, we had the author of TDD for a Shopping Website LiveProject. Friday at 11am Ranch time, Steven Solomon will be hosting a live TDD session just for us. See for the agenda and registration link
Hello everyone.. I am having a little problem and I can't quite figure it out
I am trying to make a simple GUI which asks for username/password.. sends that information to check against database.. if its true come back .. clear the contents of the frame and start building the client side app ( I am not quite sure how to do this part ). Do I ask for the username/password in a dialog and then full client app in a frame? or have username/password in a frame and then dialog for full client app?
yah, JDialog is the right fit for username/password. You can initially just launch the dialog and check the credentials. If the credentials are not good or if there are validation errors, user can return to the dialog to re-enter. If login is successful, you just call dialog.dispose() and build a frame and show it.
SCJP 1.4, OCMJEA/SCEA 5.0.
Everybody! Do the Funky Monkey! Like this tiny ad!
free, earth-friendly heat - a kickstarter for putting coin in your pocket while saving the earth
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662562106.58/warc/CC-MAIN-20220523224456-20220524014456-00327.warc.gz
|
CC-MAIN-2022-21
| 1,190 | 7 |
http://rss4medics.com/cannot-open/p2v-cannot-open-root-device.php
|
code
|
My story is this: I've been using the reiser file system for years and have been very happy with it and have kept up with new releases as they were available. Several reasons can result in such a failure: the kernel configuration is missing drivers for your HDD controller (cases 1, 4, 5) the kernel configuration is missing drivers for the bus It wasn't initially configured to use DHCP for DNS. fstab is also updated to reflect the new hd layout. have a peek at this web-site
E.g.,rpm -ev --nodeps grub-0.97-16.1Reinstall the grub package. If it does, it might help you identify if you misselected a partition (in the example given at the beginning of this section, only two partitions are found whereas the kernel There are a variety of tools out there that are free, and I may get around to exploring those for this situation, as well. Why is looping over find's output bad practice? http://askubuntu.com/questions/71332/kernel-panics-with-cannot-open-root-device-error-where-do-i-append-the-root
Burn that CD, and we'll move on to the next step. Here's the problem: VMWare simply took their Windows-only converter application and put it on a Windows PE boot disk. Check if you have built in (and not as a module) support for the HDD controller you use.
Someone peeled an American flag sticker off of my truck. initrd-2.4.21-47.0.1.EL.img vmlinux-2.4.21-27.0.2.EL config-2.4.21-20.0.1.EL initrd-2.4.21-47.0.1.ELsmp.img vmlinux-2.4.21-27.0.2.ELsmp config-2.4.21-20.0.1.ELsmp initrd-2.4.21-47.0.1.ELsmp.VMWARE.img vmlinux-2.4.21-27.EL config-2.4.21-20.EL initrd-2.4.21-4.EL.img vmlinux-2.4.21-27.ELsmp config-2.4.21-20.ELsmp initrd-2.4.21-4.EL_old.img vmlinux-2.4.21-32.0.1.EL config-2.4.21-27.0.2.EL initrd-2.4.21-4.ELsmp.img vmlinux-2.4.21-32.0.1.ELsmp config-2.4.21-27.0.2.ELsmp initrd-2.4.21-4.ELsmp_old.img vmlinux-2.4.21-37.EL config-2.4.21-27.EL kernel.h vmlinux-2.4.21-37.ELsmp config-2.4.21-27.ELsmp lost+found vmlinux-2.4.21-40.EL config-2.4.21-32.0.1.EL message vmlinux-2.4.21-40.ELsmp config-2.4.21-32.0.1.ELsmp message.ja not foundProbable cause:The initial RAM disk image lacks EVMS support.Resolution:Boot the rescue system and enter the shell. Vfs Cannot Open Root Device Redhat At least, it doesn't do it well with all network cards.
However, that root command above kernel, root (hd1,4), is used by grub to find the boot partition. Please Append A Correct Root= Boot Option For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. Thanks again!ReplyDeleteLaneSeptember 10, 2009 at 12:46 PMDarkman, thanks for the feedback; I'm glad it was helpful! It is perfectly ok to point grub to a kernel on (hd0,0) and tell the kernel that you mean sdb for root.
At Welcome screen, Installation should be selected in place of Boot from Hard Disk. Please Append A Correct Root= Boot Option Here Are The Available Partitions This is what we'll be using. Identify the installed version of GRUB:rpm -q grubRemove the installed version. One issue I did have though was with the network settings for the VMWare Converter.
cat /proc/partitions for anyone interested: Code: major minor #blocks name 7 0 73420 loop0 8 0 244198584 sda 8 1 5186128 sda1 8 2 239009400 sda2 8 16 244198584 sdb 8 https://access.redhat.com/solutions/1592113 Many mount-related errors are seen during boot.Error(s):Mostly mount-related error messages are seen during boot.startproc: mount returned not-zero exit statusstartproc: /proc not mounted, failed to mount: No such file or directory failedProbable Vfs Cannot Open Root Device Or Unknown-block(0 0) The kernel image is relative to this path. Vfs Cannot Open Root Device Please Append A Correct Root Boot Option Join our community today!
Last edited by Starchild; 12-25-2004 at 09:29 AM. http://rss4medics.com/cannot-open/rms-cannot-open-backup-device.php Also, recent kernels give an overview of the partitions they found on the device told. This site is not affiliated with Linus Torvalds or The Open Group in any way. Then one day I compiled a new kernel and got the UDF-fs: No partition found error. Vfs Cannot Open Root Device Centos
Distribution: Fedora 7 Posts: 65 Original Poster Rep: Hi root partition is /dev/sdb6 ,ie, it's the partition directly after the boot partition. Accept the License Agreement(s) (if prompted).At the Installation Mode screen, select Repair Installed System. Distribution: Fedora 7 Posts: 65 Original Poster Rep: Well, thanx for your help and effort. Source Accept the License Agreement(s) (if prompted).At the Installation Mode screen, select Boot Installed System.
Red Hat Account Number: Red Hat Account Account Details Newsletter and Contact Preferences User Management Account Maintenance Customer Portal My Profile Notifications Help For your security, if you’re on a public Cannot Open Root Device Mapper/volgroup-lv_root The best I can offer at this point is to power off the system and change the scsi controller to whatever it isn't set to right now. This isn't as stupid as it sounds.
All is booting fine on the old computer. So.. I'll note that, if your import process is taking a *really* long time, and failing often during the process, this is most likely your problem. Please Append A Correct Root= Boot Option Redhat Check if the kernel that is being boot by the boot loader is the correct kernel.
Thanks, David /proc/partitions: major minor #blocks name rio rmerge rsect ruse wio wmerge wsect wuse running use aveq 8 0 71557120 sda 690099 3154911 30171650 3230150 87511 165470 2035738 1116540 0 Distribution: Fedora 7 Posts: 65 Original Poster Rep: *hopeful bump* Starchild View Public Profile View LQ Blog View Review Entries View HCL Entries Find More Posts by Starchild 12-25-2004, 07:28 UNIX is a registered trademark of The Open Group. have a peek here You may have to register before you can post: click the register link above to proceed.
Find More Posts by masand 12-22-2004, 04:30 PM #3 Starchild Member Registered: Sep 2003 Location: At a tea party with Alice in Wonderland. Bookmark Email Document Printer Friendly Favorite Rating: Troubleshooting Common Boot IssuesThis document (3864925) is provided subject to the disclaimer at the end of this document. Login as root. centos grub2 vfs share|improve this question asked Aug 10 '14 at 8:06 MKroeders 1114 add a comment| 1 Answer 1 active oldest votes up vote 1 down vote accepted Well I
The main difference I observe is that up to 188.8.131.52, the grub conf tries to identify the hard disk using its UUID, 184.108.40.206 now uses /dev/sda6 .. Generally speaking one can say that, if the first digit is 0, then the kernel is unable to identify the hardware. Then I finally narrowed it down to the filesystem. I went to rescue mode and do vim /boot/grub/device.map and 1 line appears (fd0) /dev/fd0 (nothing more).
This means that # all kernel and initrd paths are relative to /boot/, eg. # root (hd1,4) # kernel /vmlinuz-version ro root=/dev/sdb6 # initrd /initrd-version.img #boot=/dev/sda default=6 timeout=10 splashimage=(hd1,4)/grub/splash.xpm.gz title Fedora This is where you log in (see: I told you it wasn't free). Create the new Boot Image Now we're (almost) ready to create our new boot image. I tried everything to resolve this problem and searched the web for an answer with no luck.
Last edited by Starchild; 12-25-2004 at 03:07 PM. If it doesn't, it is most likely because the kernel doesn't know the device to begin with (so it can't attempt to display partitions). up vote 7 down vote favorite 3 whenever I try to boot with linux kernel 220.127.116.11 (the one installed by the upgrades) I get a Kernel Panic error: VFS: Cannot open Comparing the output of fdisk -l may provide additional guidance for the non-existent device. [CTRL]+[D] reboots.Symptom:The system simply hangs after POST.
Last edited by Starchild; 12-22-2004 at 05:04 PM. Now, since we're using LSI Logic for our SCSI controller, we'll add (usually; if the settings are in there, make sure their values are correct) the following: alias scsi_hostadapter mptbase alias
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155817.29/warc/CC-MAIN-20180919024323-20180919044323-00194.warc.gz
|
CC-MAIN-2018-39
| 8,099 | 17 |
http://www.trekbbs.com/showpost.php?p=7966402&postcount=16
|
code
|
the book is boring. Lots of exploration, little characterization or action. I don't see a very good movie coming out of it.
Sounds like a description of Clarke's 2001. Sure worked fine there, even though the novel and film are very much separate entities.
I think 2001 is probably the most overrated sci-fi movie of all time. I like quiet, intelligent sci-fi as much as the next person(bladerunner, contact, gattaca, etc.) but 2001 is self-indulgent and tedious, and I think "rendezvous" is tedious as well. I got through it but thought it was a slog.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398450659.10/warc/CC-MAIN-20151124205410-00356-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 551 | 3 |
https://bugs.gentoo.org/show_bug.cgi?id=476658
|
code
|
From https://secunia.com/advisories/54089/ :
A security issue has been reported in various OpenStack products, which can be exploited by malicious people to conduct spoofing attacks.
The security issue is caused due to the application not verifying the validity of the SSL certificates presented when connecting to the server. This can be exploited to spoof a valid server and e.g. conduct Man-in-the-Middle (MitM) attacks.
Please see the vendor's advisory for a list of affected products.
No official solution is currently available.
From what I understand about this bug, it is a core python bug for python 2, and documented in bug 480856.
Would this bug be solved by running dev-lang/python-2.7.5-r2 or newer?
ya, this has been fixed in bug 480856
This doesn't do anything on the m68k.
So, I'm removing myself from cc as this is fixed in the python update. Feel free to readd if necessary.
Sorry, wrong bug.
Should be closed as noglsa?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00296.warc.gz
|
CC-MAIN-2022-33
| 938 | 12 |
http://www.pcmag.com/article2/0,2817,2247220,00.asp
|
code
|
PC to HDTV the Right Way
The typical home PC is no longer just for homework and accounting. It's now the entertainment hub of the household. So why are all your videos and photos still locked up inside there? Why not hook your PC up to your HDTV and move your content to the big screen?
Controlling the PC
The standard method of controlling an ordinary PC is with a mouse and keyboard. And you can certainly control a home--theater PC that way, too, with devices like the Microsoft Wireless Entertainment Desktop 8000. Keeping a keyboard lying around the family room may not be your best option, however. What you really want to do is integrate control of your PC into your remote-control system.
If you don't already have a universal remote control, you should get one. It's amazing how using a single remote to control the entire home theater suddenly makes family relationships much more relaxed. We use Logitech Harmony remotes, but there are plenty of good programmable remote controls, among them the Philips SRM7500) and the Gyration Media Center Universal Remote Control.
Before you start, though, the PC probably needs an IR receiver. Off-the-shelf Windows Media Center systems typically have one built in; for other users, Microsoft offers its Windows Media Center remote control ($35 street), which ships with a useful IR receiver. Assuming you're running Windows XP Media Center Edition, or a version of Vista that includes the application, it's easy to program remotes like these to control your PC directly.
If you're using an alternative solution, like the SageTV software, check the manufacturer's Web site for compatible remotes and IR receivers. Then you can use the programming software that ships with your universal remote to set up the universal control to work with your software of choice.next: Media Playback >
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718426.35/warc/CC-MAIN-20161020183838-00311-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 1,835 | 7 |
https://chat.pantsbuild.org/t/9741376/if-someone-with-admin-privs-can-review-merge-amp-sync-https-
|
code
|
Merged but not `./sync-s3.sh`'d. It was unclear to me whether the built 4.9.0 binaries had the fix in https://github.com/pantsbuild/binaries/pull/32. I'll be working until ~4pm Pacific today so ping me with that and I'll sync or hopefully have IAM setup so that committers can all sync.
Ah, sorry - got confused. You did commit new 4.9.0 binaries ... now synced.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00317.warc.gz
|
CC-MAIN-2023-40
| 362 | 2 |
http://forums.qj.net/psp-homebrew-hacks-discussion/39741-great-idea-fps-controls-print.html
|
code
|
Great Idea for FPS controls
Ok ok..this will make more sense if you have your PSP in your hand while reading this.
First of all, turn the PSP upside down. Now here are the controls.
Analogue = Gun
Tri/Sq/X/Circ = Movement (w/ strafing)
D-Up = Reload
D-Right/Left = Strafe through weapons
D-Down = Jump
Select = Use
Start = Fire
R = Menu
L = Secondary Weapon (I.e. Silencer, Burst Fire, etc etc)
Think any of you homebrewers would wanna try and use that setup for an FPS? While I'd love to try this out myself, I'm no where near experience enough to code yet, and it'd be a shame to keep this idea to myself if you guys would like it.
It might not be comfortable for all...I don't know. All I know is felt a damn site easier pretend playing an FPS on my PSP as opposed to going back to the Gameboy Style Gun Control >.>
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164919525/warc/CC-MAIN-20131204134839-00016-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 818 | 14 |
https://community.home-assistant.io/t/new-add-on-cloudflared/361637/2
|
code
|
I recently started working on my first add-on “Cloudflared” and would like to share it with all of you.
When I got a new domain name, I started working with Cloudflare. Up until then, I used Duck DNS to access my HA instance via opening ports in my router, which I did not really like. Recent announcements from Cloudflare regarding their new Zero Trust Platform Teams, made me check them out in detail. I realised that they offered a great way of securing your applications and connecting them to their servers by leveraging their tunnel service Cloudflare Tunnel. So, I device to try to use this service for my HA instance.
I created this Cloudflared add-on. I also created an Add-On repository that you can find here so you can easily install the Add-on. It connects your Home Assistant Instance via a secure tunnel to a domain or subdomain at Cloudflare. By doing that, you can expose your Home Assistant to the Internet without opening ports in your router. Additionally, you can utilise Cloudflare Teams to further secure your Home Assistant connection.
I invite all of you to test the add-on. Since this is my first add-on, any feedback is very much appreciated. My plan is to bring this add-on to the Add-On Community Repository at some point. I tried following the best-practices from the example add-on as much as possible and am happy about any suggestions to improve.
Regarding additional functionality, there are a couple of things that could be included in future releases:
- The existing tunnel can also be used to connect to Cloudflares DNS servers in a secure way. Using that, HA could be used as a DNS server in your local network, leveraging the security features of Cloudflare Teams. It might be a good idea to do that in combination with the Dnsmasq Add-On.
The tunnel can also be used for multiple inbound connections and decide based on the domain, which service to call. With a proper config, a simple reverse proxy in the network for other services (e.g. DiskStation, Router configuration) could be realised. (done)
- I am currently testing to use HomeAssistant as an application in Cloudflare Teams behind an additional layer of Authentication. So far, Google is not working, but GitHub is. I am investigating how this is working out and expanding the documentation accordingly.
I do have two one issue s that I would love to address:
I have included a bool var in the config to reset the add-on and delete all the config files. I would be happy to get a second opinion on that approach and try other options (see issue on GitHub). (fixed)
1. When initially setting up Cloudflared, you have to authenticate the add-on. To do that, the add-on prints a URL in the Log section that you have to open. I would love to use that URL and automatically open a new website tab or mobile browser on the app, if this is possible at all (see issue on GitHub).(this is unfortunately not possible in HA right now, still I think the set-up is fine the way it is right now).
Overall, everyone please feel free to reach out to me in this thread, via a GitHub Issue here or directly. I am happy to continue the development on this.
Looks really good!
I mainly have it as experimental so people go easy if there are bugs
How will cloudflare handle when you have addons running that also must accessed from outside.
They all have different ports. Now i have for all those addons subdomains and in NPM i redirect those subdomains to the location and port of the addon.
I read some information now. Only specific ports are able to use. So what i think now is use port 80 and 443 and then add the cloudflare domain into NPM so it will redirect correctly?
Thanks for your question @poudenes. Generally, you can route as many connections through the tunnel as you like. Nevertheless, currently the add-on is only forwarding traffic from one domain that you specify in the config to your homeassistant instance.
I am working on including the npm add-on as well (in this branch), so you can set a config flag which will enable you to not only make homeassistant available but any other proxy host from NPM. You would only need to create CNAME records in Cloudflare for all the subdomains you want to use to the cloudflare tunnel (or to your “main” subdomain that is used and automatically created for the home assistant connection).
I will let you know once this is available.
Take a look at GitHub - sabeechen/hassio-google-drive-backup: Automatically create and sync Home Assistant backups into Google Drive, they have a web UI that allows authenticating Google Drive. Maybe a similar approach could be used here?
Ideally, there should be a way to open a specific URL from the addon, but for now, maybe this will work.
thanks a lot @Misiu. Looking at that solution, they are using an always-running frontend for setting up the backup. To do that, you also have to specify the URL of the add-on when defining it in the add-on config. Since I do not have any sort of frontend and this URL only needs to be called initially to authenticate, I do not think this is a better approach then currently where you have to manually copy the URL from the logs.
Nevertheless, your input is very much appreciated and maybe we’ll find a way to produce someting like a pop-up or a new tab.
@poudenes I just release the new version 0.1.6. This includes the described flag as a config option.
Please have a look at the documentation for further information. Since I am not using NPM and only tested some simple websites via multiple docker containers, I would be happy to get feedback from you on the set-up and the performance.
What i will do is build a test HA on a different RPi4 and add some add-ons.
Then i will use one of my domains to change name servers to Cloudflare and then do some tests.
I have a busy period so it wont be in a day that you get some feedback
Test this add-on on a a test RPi with HAOS 6.6
Have installed Nextcloud, Joplin Server, Bitwarden and Nginx Proxy Manager.
All addons are accessible from outside now without opening ports in router!
Even the HA App (iOS and Android) is working!!!
@brenner-tobias Thank you! I set this up last night, something recently happened and I was getting error 522 on all my cloudflare CNAME’s back through my internal network. I implemented your add-on (and replaced my NGINX VM with NPM add-on). Things are working great.
…except I am struggling on how to handle clicking on the link to open NPM (port 81), it eventually times out. Not sure where the breakdown is happening. I read up above about creating a subdomain and then going that route…doable but want to understand what might be happening. Any suggestions?
I am happy the add-on works for you. A couple of things regarding the NPM UI.
The Add-On is not using Ingress (see here and here). That means, that the “Open Web UI” button is basically taking your current connection URL, strips the ending of it, adds the port of the UI (in our case 81) and opens a new tab with that URL.
Now if you are connected via your external URL (e.g. home.example.com), this means that the link it is opening is “home.example.com:81”. This external URL will then hit the Cloudflared Proxy, which does not forward the port 81 to your home assistant instance, since it only forwards certain ports. This is a good thing: We do not want any other port to be exposed to the internet then the ones we defined. So the link does not work.
What does work is visiting NPM locally. You can do this by either connecting to HA using the local link in your network (e.g. http://192.168.1.10:8123) and clicking on the UI Button of NPM, or directly changing your HA link to the correct one to NPM (in our case http://192.168.1.10:81).
Now from my perspective this behaviour is fine, since you do not really want to expose the NPM UI to the internet in the first place and do not have to visit it that often.
Nevertheless, if you do, there is the possibility that you also mentioned to create a subdomain (e.g. npm.example.com) in Cloudflare and then add a forward in your NPM to your local NPM address, following the documentation of the add-on. This would still mean that the UI Button in the Add-On would not work, but you would have another subdomain that is externally available to open the NPM UI.
Additionally, we could theoretically fork the NPM add-on and change the way it behaves, moving from a separate website to Ingress to open NPM in HomeAssistant directly (the way the file editor and some other add-ons are working already). Probably @frenck had his reasons for not doing that and again I do not really see the need to be able to open NPM from everywhere. I might look into that though just because I have never done an ingress config at an add-on.
Let me know if you managed to access NPM and what you think of my thoughts!
Thank you for the quick response. Now I understand, you make a great point on “how often you need to use NPM from external”. I went ahead and created a sub-domain and used the iframe_panel to create a link to make it easier to get to the UI just so I can find it when I need it. Much appreciated and look for any new creations you are working on.
Might need to fork NPM just to get a black theme.
That’s great to hear, glad everything works for you. I do recommend though to reconsider exposing the NPM UI directly with a subdomain. In your set-up, the only thing, that stands between an intruder and your complete internal reverse proxy settings is a very simple login page, which is not up-to-date and does not include 2FA.
If you really need to keep it and see no other way at all, I would at least add it as a Cloudflare Access Application (see here for a simple tutorial). This is also free and that way, at least you do have another layer of security by using your GitHub or Google login for example, both incl. 2FA.
Let me know if you have any other problems or if there is anything else I can help you with.
Edit: You could also change the iframe Panel to the internal URL. That way, it would always work if you are in your internal network but not, if you are not. If this would be sufficient, there would be no need for external access.
If you do not own a domain name, read here how to get one for free:
Why I can not add domain in cloudflare?
Did you enter this in Cloudflare page?
Then I think its something with Cloudflare and not the add-on.
Definitely an issue with Cloudflare+Freenom, so not related to the add-on (but potentially to my article on how to get a domain for free to use with the add-on…).
@lpt2007 I will send you a PM so we can try to figure out what’s happening there.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00257.warc.gz
|
CC-MAIN-2023-50
| 10,647 | 55 |
https://coinvote.cc/coin/Yako-Token
|
code
|
Yako is able to shapeshift between
her human and fox forms at will.
Though her true form is of the
fox and it is the one she
assumes outside of her own boundary.
⚙️3% Dev Tax
⚙️3% Promotion Tax
⚙️3% Lottery Tax(Weekly lotteries for all members)
💰1,000,000,000,000,000,000 Total Supply
💰Max buy 40,000,000,000,000,000
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711368.1/warc/CC-MAIN-20221208215156-20221209005156-00138.warc.gz
|
CC-MAIN-2022-49
| 334 | 10 |
https://jira.atlassian.com/browse/JRASERVER-45494?_ga=2.12446324.1522121654.1553231319-1596843548.1488188789
|
code
|
Some users are experiencing a problem with JIRA gadgets, when effected no gadgets (except the Introduction gadget) load, and error messages are displayed:
"This gadget cannot be displayed on your dashboard. This could be due to a licensing problem or an application error. If you need this gadget, contact your administrator for assistance. Otherwise, you can remove it from your dashboard."
When attempting to add a new gadget to the dashboard, only the Introduction gadget is listed.
Errors appear in the logs for example:
- Restart JIRA
- (JIRA Cloud customers should log a support ticket at https://support.atlassian.com to arrange a restart)
P.S: Instances affected by this bug have also reported problems on:
- Viewing agile boards with a filter with more than 1 project
- Service desk email handler can't retrieve emails (the connection log shows an error)
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178359082.48/warc/CC-MAIN-20210227174711-20210227204711-00021.warc.gz
|
CC-MAIN-2021-10
| 863 | 9 |
http://constructioncode.blogspot.com/2011/11/national-bim-library-draft-content-for.html
|
code
|
Why use National BIM Library Content?
- Richness of data
The quality of property-set information attached to the object is of a high quality in the NBL objects. Acoustic designation, Fire designation, Electronic Lock, Break out facility, Hold open… this is in addition to the standard COBie parameters. This is the information that is required behind the basic geometrics. It’s been designed for what is required in schedules and care has gone into deciding whether these are instance or type properties
- Supports effective workflow
Where manufacturer objects exist – their proprietary information will populate these standard property-sets. This allows the scheduling of generic and proprietary objects together. This also helps with product selection. This also assists with the maintenance of the facility after it is built.
- Intuitive geometric behaviour
Whether a door is double action or has a planted stop. Whether it has architraves front or back or adjusting the sizes of the vision panels. All parametric behaviour for the geometric visualisations that is typically required on a project.
- Designed for UK custom and practice
Where British Standards or Building Regs define dimensions these have been considered in the design of the objects. Equally objects are pre-configured in common UK metric sizes so they are ready to use immediately.
- Maintained objects
The NationalBIMLibrary.com objects will not simply be written once and then left. They will be maintained over time. As standards and regulations change and new building technologies emerge, then the objects will be reviewed and updated.
A walkthrough in Autodesk Revit 2012 is shown below. Those not using Revit may view the content in IFC 2x3 format using the free BIM viewing tool Solibri Model Viewer.
Fig 1 - Detailed help files are provided to get started
Fig 2 - Design a basic floor layout using the external and internal walls
Fig 3 - Load some door objects into your project and position in the building
Fig 4 - Where different wall type objects are used, rename these so they are unique to the project
Fig 5 - Make your door objects project specific too by modifying the detailed parameters
Fig 6 - Geometric parameters may influence the appearance of the object in elevation or plan
Fig 7 - Modify the COBie parameters
Fig 8 - Export the model to IFC2x3 and see the parameters come through in a platform neutral format
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121778.66/warc/CC-MAIN-20170423031201-00377-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,411 | 20 |
https://www.fr.freelancer.com/projects/angular-js/looking-for-someone-help-angular/?ngsw-bypass=&w=f
|
code
|
I'm looking for a freelancer who can help me on Angular + C # (front end + backend) test on hackerank
22 freelances font une offre moyenne de 20 $/heure pour ce travail
Hi, As I am a hackerank expert, I am very interested in your project. I can do it and I can start work right away. I am looking forward to working with you. Regards. Denis.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305341.76/warc/CC-MAIN-20220128013529-20220128043529-00498.warc.gz
|
CC-MAIN-2022-05
| 341 | 3 |
https://inettools.net/convert/mj2-to-tiff
|
code
|
MJ2 is a video category category format that contains the motion sequence of JPEG 2000 images. This video encoding system, which uses JPEG 2000 intraframe compression technology, was developed at the Fraunhofer Institute of Integrated Circuits (FIS). Since November 2001, it has existed as an international ISO / IEC standard. The codec is based on a discrete conversion. Compared to the MPEG family used in codecs, it performs encoding in two areas simultaneously. Both in spatial and in frequency. In this case, there is no need to split the images into blocks. Only intra-frame compression is used for each frame, and inter-frame coding is not applied. A distinctive feature of MJ2, that is, Motion JPEG 2000 Video Clip, is that it can be scaled. And not only in terms of frame size. And in quality, that is, in terms of video stream speed, too. The decomposition features are such that each frame can have its own copies, which are two times less vertically and horizontally. Since it is possible to compress without loss, it is possible to use this codec in the medical industry. After all, it is necessary for images to have high accuracy. Synchronization with video supports embedded audio.
TIFF is a format that allows you to store raster graphics with tags. It was developed by Aldus Corporation in conjunction with Microsoft so that it can be used with PostScript. Aldus Corporation owns specifications. Subsequently, this company merged with Adobe Systems. It is she who now owns the copyright to these specifications. Typically, TIFF files (Tagged Image File Format) are with the extension .tiff or .tif. Aldus was specifically engaged in the development of the format in order to achieve the preservation of scanned images. The popularity of TIFF can be explained by the fact that it is preferred in order to store images that have a large color depth. The format is used to send faxes, scan, recognize texts. It is widely supported in the printing industry. TIFF was chosen as the main graphic format of the NeXTSTEP operating system. Then from this system TIFF support migrated to Mac OS X. At first, the format supported lossless compression. Then it was supplemented in order to support lossy compression in JPEG format. We emphasize that the maximum weight of a document, if stored in this form, is no more than 4 GB. To open a TIFF file larger than 2 GB, you must run Photoshop CS.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297284704.94/warc/CC-MAIN-20240425032156-20240425062156-00490.warc.gz
|
CC-MAIN-2024-18
| 2,400 | 2 |
http://suzibattersby.com/work/item/muppet_me
|
code
|
I was approached with a rather unusual private commission; to create a Muppet style puppet that represented a client's partner. I designed the puppet based on information provided by the client and created a fully functioned Muppet style puppet, named 'Muppet Dad' by the client's son.
So successful was the result, that I have been approached by other people to make more. As a special treat I also made one of my brother who designed and built this fantastic website! If you are interested in commissioning a Muppet You, then please get in touch via the Contact page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528687.63/warc/CC-MAIN-20190723022935-20190723044935-00306.warc.gz
|
CC-MAIN-2019-30
| 569 | 2 |
http://lmatechconference.com/2011/05/01/may-3-update/
|
code
|
We have a great team working on the conference this year and we have gotten great support from business partners and vendors.
- Call for Programming: We are now focused on developing the programming for the conference over the next month. If you have suggestions for programming, please email Adam Stock at [email protected].
- Conference Website + Video. Please check our website and first promotional video. This is the first of many videos that we’ve planned to generate enthusiasm for the event. Thanks to the fantastic group of people on our tech conference committee for their hard work on these.
- Our Sponsors. Welcome to our first event sponsors:
- Terabyte: Manzama and ShiftCentral
- Gigabyte: ContactEase, ContentPilot and JDSupra
- Megabyte: Concep, RivalEdge, Copper Conferencing, The Ligature and Versys Corporation
There is a 10% discount for sponsors who sign up by July 15!
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164029048/warc/CC-MAIN-20131204133349-00006-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 906 | 8 |
https://support.proctorexam.com/hc/en-us/articles/1500002895802--Sessions-How-to-access-the-Support-Page-of-a-session-
|
code
|
The Support Page has a lot of information regarding the candidate session. It is especially useful when troubleshooting problems and when the exam was not yet started, either due to a technical issue or because it is before the exam time. You can provide this link to our team, in place of the session link.
You can access the Support Page by following the instructions below:
1. You will need to access the Administration panel as shown below:
2. Then select the exam the session belongs to and select the manage under the Students panel.
3. Afterwards you select the name of the student and click it:
4. From selecting the name you will land on the Support Page that looks like this:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358208.31/warc/CC-MAIN-20211127163427-20211127193427-00545.warc.gz
|
CC-MAIN-2021-49
| 685 | 6 |
https://harlecin.netlify.app/post/more-advanced-sql-4-ds/
|
code
|
In the previous post I covered the basics you need to know to work with SQL Server. In this post, I want to show you some more advanced techniques that I found pretty helpful.
The topics I will cover include:
- How to speed up your queries with indices and using columnstore
Table Variablesto make working with complex queries easier
- Introduction to working with functions and stored procedures
- Grouping sets and pivoting data
- Programming and error handling
- Collaborating on a database project and version control
Indices and columnstore tables
You have probably already heard the following quite a lot:
Our queries are slow, we need to add an index
Creating indices is more or less synonymous for speeding up queries. A well indexed table allows the database to find relevant entries faster and thereby to speed up query processing.
Creating indices is pretty simple in SQL Server, all you need to do is:
-- non-clustered index CREATE INDEX indexName on tableName (columnName) -- clustered index CREATE CLUSTERED INDEX indexName on tableName (columnName)
A clustered index physically reorders the corresponding rows in a table and therefore only one clustered index per table is possible.
If your queries are still slow, you can change your table from rowstore to columnstore format. Saving your information in columnstore format allows the database to efficiently compress information along columns and thereby reducing the memory footprint. Moreover, extracting subsets of data is faster, because you do not need to consider unnecessary columns.
Creating a columnstore index is as simple as:
-- non-clustered index CREATE COLUMNSTORE INDEX indexName ON tableName -- clustered index CREATE CLUSTERED COLUMNSTORE INDEX indexName ON tableName
As a rule of thumb, columnstore indices work best for analytical workloads and rowstore indices for transactional workloads
Please note that while creating an index is simple, working effectively with indices is usually not. There are many nuances and different index types, so if you want to get maximum performance I recommend to talk to a database developer or be prepared to read quite some online documentation:)
Views & Table Variables
Views are simply named queries that we can interact with as if they were normal tables. We are ‘viewing’ through the view into the tables underneath.
Creating a view is as simple as:
CREATE VIEW dbo.vTestData AS SELECT * FROM dbo.SomeTable WHERE col1 = '1'
Now we have a view called
dbo.vTestData that shows us all entries from
col1 = '1'.
We can now query this view as we would a normal table:
SELECT * FROM dbo.vTestData
Table variables can be created by running:
DECLARE @varSomeName table ( col1 INTEGER, col2 VARCHAR(10) ) INSERT INTO @varSomeName (col1, col2) VALUES (1, 'asdf'), (2, 'jklö') SELECT * FROM @varSomeName
Table variables should only be used on very small datasets and are only available during execution of the query (in contrast to temp tables).
Table-valued functions and stored procedures
To create a table-valued function (TVF) run:
CREATE FUNCTION dbo.fn_FilterID(@id AS INTEGER) RETURNS TABLE AS RETURN (SELECT * FROM dbo.SomeTable WHERE id = @id) SELECT * FROM FilterID(1) as FilterID
So a TVF is in a sense a parameterized view.
Before we start with stored procedures, we briefly need to talk about batches:
A batch is a set of commands sent to SQLS as one block. They determine variable and name scope. SQL Server uses
GO [n] to specify the number of times a batch should be executed.
You can declare and use variables like so:
DECLARE @variable NVARCHAR(15) = 'asdf' -- change variable SET @variable = 'jklö' SELECT * FROM dbo.SomeTable WHERE col1 = @variable
Now let’s create a stored procedure and run it:
CREATE PROCEDURE dbo.TestProcedure(@variable NVARCHAR(15) = NULL) AS BEGIN IF @variable IS NULL PRINT 'variable is NULL' ELSE PRINT @variable -- exit success RETURN 0 END -- Execute the stored procedure with parameter: EXEC dbo.TestProcedure 'test' -- Without parameter: EXEC dbo.TestProcedure -- save output to variable DECLARE @return_status INT EXEC @return_status = dbo.TestProcedure SELECT 'Return Status' = @return_status
Note that we did not put the parameter in parenthesis in order to pass it to the stored procedure. Replace
ALTER to change or update an existing stored procedure. Parenthesis in the
CREATE PROCEDURE statement are optional. You could also define a procedure with variables like so:
CREATE PROCEDURE dbo.TestProcedure @variable NVARCHAR(50), @someOtherVariable NVARCHAR(50) AS BEGIN ... END
Grouping sets and pivoting data
When we use
GROUP BY to aggregate data, we only get one specific aggregation level back. But suppose we want to group our data by different levels of aggregation, how could we do that?
One simple way is to use
SELECT col1 ,col2 ,SUM(col3) AS SumTotal FROM dbo.SomeTable GROUP BY GROUPING SETS( col1 -- SumTotal grouped by col1 ,col2 -- SumTotal grouped by col2 ,() -- SumTotal grouped by col1, col2 )
The result would look like this:
An alternative to using
GROUPING SETS is
ROLLUP does aggregations assuming there is a hierarchy:
SELECT col1 ,col2 ,SUM(col3) AS SumTotal FROM dbo.SomeTable GROUP BY ROLLUP (col1, col2) ORDER BY col1, col2
CUBE instead of
ROLLUP gives us all potential combinations of groupings.
Note: If you use many grouping sets, it becomes quite hard to identify which row belongs to which group result
You can use a helper function to make this task easier:
SELECT GROUPING_ID(col1) as col1_group -- 0/1, if this row is grouped ,GROUPING_ID(col2) as col2_group ,col1 ,col2 ,SUM(col3) as SumTotal FROM dbo.SomeTable GROUP BY CUBE(col1, col2) ORDER BY col1, col2
Personally, I am not a huge fan of using these functions, because I feel the result sets can be hard to understand. I prefer to use WINDOW functions to give me different aggregation levels.
A rather nice way of using
ROLLUP together with
GROUPING_ID is like so:
CHOOSE(1 + GROUPING_ID(col1) + GROUPING_ID(col_2), col1 + 'Subtotal', col2 + 'Subtotal', 'Total') as Level
Pivoting data on the other hand is often very useful. Pivoting involves changing the format of your data from long to wide or wide to long:
The syntax for pivoting is:
SELECT Col1 ,A1 ,B2 ,C3 FROM ( SELECT Col1, Col2, col3 FROM dbo.SomeTable ) AS tmp PIVOT (SUM(Col2) FOR Col3 IN([A1], [B2], [C3])) AS pvt
As you can see, we need to specify all columns that we want to receive in advance. If you want to do that dynamically, you have to look into dynamic SQL (or use R/Python:).
In SQL Server (not Azure SQL database) error messages are stored in
sys.messages and we can add custom messages using
-- Check messages: SELECT * FROM sys.messages
You can trow an error with the
THROW 50001, 'Error', 0;
The error number needs to be greater than 50k. I can specify an arbitrary error message and a state. With user-defined errors the severity is always set to 16.
We can also do try-catch using, you guessed it, a try-catch block:)
BEGIN TRY ... END TRY BEGIN CATCH ... PRINT 'Error message:' PRINT ERROR_MESSAGE() ... END CATCH
Have you ever accidentally deleted or altered data? If you use Dropbox or Onedrive, you probably used the restore/rollback functionality to restore your data. Using transactions, you can define blocks that you wish to rollback in case you are not happy with the final result for any reason. A transaction is a group of tasks that must succeed or fail together.
Individual data modifications are automatically treated as a transaction.
The syntax is as follows:
BEGIN TRANSACTION -- start transaction ... COMMIT TRANSACTION -- complete transaction ... ROLLBACK TRANSACTION -- rollback the transaction
Reducing table sizes
If you started of with a database containing only tables in rowstore format, you can save lots of disk space by switching to a columnstore format.
However, SQL Server will not release the disk space until you tell it to.
Fortunately, this is really simple:
- In Object Explorer go to the database you want to shrink
- Right click the database and select `Tasks > Shrink > Files’
- Reduce disk size in the dialog box
Collaborating using Git
While most database admins and developers really like SQL Server Management Studio, it does not provide Git integration, meaning you need to fire up git in a console or use a source control tool such as Gitkraken. This is where VS Code or SQL Operations Studio come to the rescue:)
My preferred workflow is to use VS Code with the
mssql extension to author my .sql files and put them in version control. I usually create a stored procedure based on the following template:
/* Description of stored proc Use CTRL+SHIFT+E to execute only selected block. Run for debugging/testing: EXEC dbo.myStoredProc */ ALTER PROCEDURE dbo.myStoredProc AS BEGIN ... END
I make changes to the stored proc, send them to the database and debug it using
When I am satisfied with the results I add my stored procedure to our feature generation pipeline script.
I hope you found this post useful:) If you find any errors, please create an issue on Github.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587606.8/warc/CC-MAIN-20211024204628-20211024234628-00381.warc.gz
|
CC-MAIN-2021-43
| 9,060 | 98 |
https://www.popsugar.co.uk/fashion/Kate-Moss-Shops-Vintage-Looks-North-London-29860268
|
code
|
Yesterday afternoon, Kate Moss took advantage of the warm Northern London weather and went on a little vintage shopping tour with her hairdresser bestie James Brown. Wearing all black from head to toe that she accessorised with a pair of pointy, Isabel Marant heeled black boots with intricate stitching and straps, a silver buckle belt, and a black, blue and yellow python tote, Kate stayed true to her upscale rocker image. Shop her style above and leave a comment to let me know what you think of her look here.
Image Source: WENN.com
Around The Web
POPSUGAR, the #1 independent media and technology company for women. Where more than 75 million women go for original, inspirational content that feeds their passions and interests.
From Our Partners
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170741.49/warc/CC-MAIN-20170219104610-00205-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 752 | 5 |
https://flylib.com/books/en/3.135.1.78/1/
|
code
|
Maximum Accessibility: Making Your Web Site More Usable for Everyone By John M. Slatin,, Sharron Rush
Table of Contents
Chapter 10. Forms of Participation: Designing HTML Forms for Maximum Accessibility
In this chapter, we've worked through the process of redesigning the AIR judging form to provide better support for contest judges who have disabilities. We began by thinking through the features and the organization of the existing form and the challenges they posed not just for people with disabilities but for everyone. We then restructured the form, using the <fieldset> element to define top-level logical structures. Then we looked at different ways to handle the scoring, deciding on pull-down menus using <select> and <option> elements in favor of radio buttons. Finally, we added navigation links to allow judges to jump quickly to any item on the form.
The result is a form that works well with screen readers and talking browsers, but it isn't much to look at. We'll address these visual issues in Chapter 15 on Cascading Style Sheets. But we have a number of other issues to take care of first. In the next chapter, we'll take up the challenge of designing accessible tables, using bus schedules like the ones we discussed in Chapter 5 as our examples.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571847.45/warc/CC-MAIN-20220812230927-20220813020927-00498.warc.gz
|
CC-MAIN-2022-33
| 1,268 | 5 |
https://pvs-studio.com/en/blog/posts/k0045/
|
code
|
Can I port code to a 64-bit platform under a 32-bit platform?
Yes, you can do this if you use a cross-compiler that creates a native code for a platform different from that on which your code is executed.
For Visual C++, for example, you can use X86_amd64 and X86_IA64 cross-compilers included into the Windows SDK pack to create 64-bit binary files in a 32-bit Windows.
Remember that mere recompilation (even if you checked all the compiler warnings) is usually not enough for correct port of a real project to another platform. A code that has been working correctly on the initial platform may become incorrect after being recompiled for another platform.
Detection of porting errors should be started at the stage of code editing/recompilation already - it is possible if you use the static analysis methodology, for example. It will allow you to carry out the initial project migration stage using the cross-compiler without launching the program on the target platform.
- Wikipedia. Cross compiler.
- Andrey Karpov. Seven Steps of Migrating a Program to a 64-bit System.
- Andrey Karpov, Evgeniy Ryzhkov. Lessons on development of 64-bit C/C++ applications.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649986.95/warc/CC-MAIN-20230604125132-20230604155132-00508.warc.gz
|
CC-MAIN-2023-23
| 1,163 | 8 |
http://stackoverflow.com/questions/16533870/java-painting-in-resolution
|
code
|
I'm trying to understand the resolution concept of painting with Graphis2d. Java tells us that every 72 pixels will equal 1 inch when printed. My question is, how dose resolution factor in. If I wanted the printer to print an inch with 300 pixels resolution in it, would I
- enter the mathematical equation to every single co-ordinate
- scale it before the painting.
1) seems tedious and 2) can get complicated when you have multiple objects painting to the same Graphics.
Has anyone come across this, especially when you want to produce an application which draws shapes to scale and are dimensioned.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678701207/warc/CC-MAIN-20140313024501-00073-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 601 | 5 |
https://oci.wordpress.org/plugins/better-passwords/
|
code
|
This plugin sets a default minimum password length of 10 characters, to ensure that passwords are suitably long that they are hard to guess. However, it does not insist on any complexity rules, such as digits and special characters, as length is the most important thing when making a password hard to guess.
This plugin uses Troy Hunt’s Pwned Passwords API in order to check a user’s potential password against a corpus of breached passwords.
The password itself is never sent to any third party, only a partial hash is sent. This means that the password entered will always be private.
As an added bonus, this plugin also upgrades the hashing algorithm used when storing your password in the database. This is a secure one-way hash created using the Bcrypt or Argon2 algorithm.
Contributors & Developers
“Better Passwords” is open source software. The following people have contributed to this plugin.Contributors
Translate “Better Passwords” into your language.
Interested in development?
Browse the code, check out the SVN repository, or subscribe to the development log by RSS.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945279.63/warc/CC-MAIN-20230324082226-20230324112226-00060.warc.gz
|
CC-MAIN-2023-14
| 1,094 | 9 |
https://www.pallikkutam.com/edu-news/intel-ai-to-count-antarctic-penguins
|
code
|
Intel AI to Count Antarctic Penguins
Gramener, an Intel AI Builder member and data science company has come up with a new crowd counting solution to study penguin populations in the Antarctic. Penguins face the serious threats on unprecedented breeding issues for the past three years. This coupled with climate change issues may result in the disappearance of penguins by the year 2100. The Gramener solution uses images from over 40 locations and uses a density-based counting approach to approximate the number of penguins in clusters of different sizes fro the images.
In partnership with Microsoft AI for Earth, Gramener researchers trained a deep learning model to count the penguins. This solution has been repurposed and benchmarked on Intel Xeon Scalable processors and the Intel Optimization for PyTorch for optimized performance. This solution could help researchers overcome challenges in manually counting penguins from camera traps, which can be tricky due to perspective distortion, penguins standing too close together or clustering, and diversity of camera angles.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711150.61/warc/CC-MAIN-20221207053157-20221207083157-00376.warc.gz
|
CC-MAIN-2022-49
| 1,081 | 3 |
https://forum.xda-developers.com/t/rom-unofficial-12-lineageos-19-for-xperia-x-compact-final.4429379/page-10#post-88611443
|
code
|
Back then I was testing these things. IIRC the phone was claiming to charge but it did not actually charge (which made debugging even harder). I am not 100% sure whether there was the charging animation when plugging it in while shutting it off, but I know for sure it did not charge then. I was really worried that I would not get the phone to charge before the battery was completely run out, because I lost so much time (and battery charge) thinking it would charge while it was actually still draining the battery (not while switched off, of course).I don't believe the build utilizes the feature the Qnovo partition is made to support, and it doesn't really need to. Do you have the USB security setting set to restrict USB connections when device is locked? Try charging it after shutting it off. Does it display the charging animation?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510454.60/warc/CC-MAIN-20230928194838-20230928224838-00090.warc.gz
|
CC-MAIN-2023-40
| 842 | 1 |
https://www.katharineswan.com/2023/04/
|
code
|
Please note that this post contains affiliate links. As an Amazon Affiliate, I earn commissions from sales made through these links.
I'm typing this on my new Surface Go 3, trying to get used to the keyboard. I decided recently (as in, Monday) that I needed a traveling computer for an upcoming trip, as I didn't necessarily want to bring my main laptop that is basically my lifeline: all of my novels, my freelance work, my financial information, etc. And while I could back it up, I just didn't want to put the computer at risk like that.
So I decided to look for a smaller, more portable, and less expensive machine. I ended up settling on a Surface Go 3. My last computer before my current one was a Surface Pro, and while it developed an overheating problem in 2020, I liked it as a work computer. My newer laptop is faster and I don't regret getting it over a Surface, but I decided a mini Surface would be pretty much perfect as a traveling machine.
Next was to get it set up so that I could easily transfer my work between machines. The first thing I downloaded was Vivaldi, my web browser of choice, and of course synced all my bookmarks. (Amazing that we can do that now!) Next I downloaded Scrivener and set up my current projects in Dropbox so that I can work from either machine. The key will be making sure to close out the program on whatever computer I'm on when I'm finished working, so that the synced files don't get messed up.
I also got it set up with Plottr, which is the software I use for plotting and managing my series all in one place. It's basically my series bible, so I didn't want to work on my novel without that handy.
After that I got a little overexcited, and loaded a bunch of other projects from my novel series into Dropbox. I wanted them to be accessible if I need to refer back to one of them. After some more thought, I also added a whole bunch of various in-progress projects, some of which I haven't worked on in years. This way I can work on anything I please, any time I please.
I'm pretty excited about my new little work machine and all its potential!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476432.11/warc/CC-MAIN-20240304065639-20240304095639-00204.warc.gz
|
CC-MAIN-2024-10
| 2,098 | 7 |
http://www.mightyram50.net/vbulletin/showthread.php/3194-Bumper-valance-rubber
|
code
|
hey guys i remember reading somewhere on these boards of someone replacing the bumper valance with rubber floor skirting.
I cann't find that thread again for the life of me. can someone post a link to that thread so I can see where to get this stuff at?
I am thinking about just covering my grungy valance with the stuff to hide it!
Thanks in advance
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718987.23/warc/CC-MAIN-20161020183838-00343-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 350 | 4 |
http://joomlus.com/turbo-spinner-article-rewriter-download-spinnerchief-vs.html
|
code
|
Quality readable content is key here. Google, for example, will recognize that people are leaving your site soon after arriving if they perceive that your site or blog is full of junk content. This is called "bounce rate." If your bounce rate is high, then people are quickly leaving your site. But for the sake of your business, to build your online reputation and brand, you want people to visit your site, stay for a while, and then keep revisiting over the long term.
Plagiarism is copying someone else's work (in this case, a quotation, sentence, article, review, essay, essay, etc.) and assigning it to yourself, thus concealing the real author. We divide plagiarisms into explicit, hidden, total, partial and autoplagic. Open plagiarism is one of the most common types and consists in taking over the entire work or a specific fragment and signing it with your own name. The other one is hidden plagiarism, that is, assigning a certain part of the work, not to mention its actual creator. The third type is total plagiarism, and as the name suggests, it is based on the total stealing of a given job. The fourth is partial plagiarism - in this case we are talking about assigning some elements from a given work and signing them as our own creation. The last one is autoplagiat, and it is based on copying one's own work, which has already been published earlier. Universities and schools have anti-plagiarism systems that check the originality of the work. These programs have the option of blocking or invalidating a given work, it may also lead to the person being held criminally liable. So how do you avoid this unpleasant situation? One of the methods is the synonymization and paraphrase of the text, that is, the modification of the original text while maintaining its meaning. It is most often about transferring information in your own words. But what do you do when you run out of words? Our mixer of synonyms will help in generating unique content using synonymisation, that is, converting words to others, but with the same meaning. The program is fully free and very easy to use. Paraphrase Online save time and enrich the language, they come to help whenever we struggle with how to convert a piece of text. Our program includes the best, most extensive language dictionary, and thus the synonym of almost every popular word. Thanks to the mixture of synonyms and using your own invention, you can create a new, unique text that the anti-plagiarism considers as your own.
After rewriting and keeping the dynamics of the writing same, our tool passes it through a plagiarism checker. This ensures that the legal standard of plagiarism is maintained after rewriting the article. After all this process, a final rewritten form is presented to you. All this process may require some time depending upon the nature and length of the article to be rewritten.
Hi there! SpinnerChief is the best article rewriter tool, because it can not only generate hundreds of new articles in minutes, but also it can rewrite articles to a very high level of human readability and uniqueness. By using the best Natural Language Analysis and Artificial Intelligence techniques, it can understand your articles in the same way as Google does and create content that is close to human quality.
Manual spinnig is still needed when you want to create ultimate spun and readable articles. You must spin paragraphs and sentences if you want to create the ultimate spun article, it used to be a pain to spin huge articles in paragraph and sentence mode, the nested text always made it diffcult to find the right sentence. But now, with SpinnerChief 5's spin tree function, everything becomes clear and easy! All paragraphs and sentences are organized very well, you can locate, modify and spin them easily.
"It is my pleasure to give testimonial about this spinner tool. I think this is great and highly recommended tool to build a many unique articles for our internet marketing world. At the first time, I already see about another great spinner tools, but it is not free. And fortunately for me, I found spinnerchief. The free tools which have almost the same quality with another cost spinner tools. I already use spinnerchief to build many articles to attract traffics for my below minisite"
In a situation where you do not have enough time or do not know how to paraphrase your text, our program will help you. The application has an innovative algorithm that will easily transform the text into a completely new one. In writing, each of us sometimes has a problem with good text editing. Have you ever wondered if there is any way to speed up? Our program is free, which will save you money and time. Solution is simple: our paraphrasing tool has an innovative algorithm and a very large database of synonyms. The machine intelligently choose an appropriate synonym or phrase for your text. With this technological solution, your text will be unique and free of plagiarism. It wasn't simple problem to solve, but after many hours of work, you can be sure that your text that has been paraphrased by us into a new version! If you want to change your new article or essay, then there is no problem. Paraphrasing or article rewriting can be tricky, even with the help of an article rewriter. Yes, you heard that right. It’s not always as easy as it may sound while using an instant article spinner you need to be sure that the original wording or style has not been copied. Even if you are citing something, it can still be considered as plagiarism if you don’t do it right. It is important to reread the results of paraphrasing tool just to see if it is making complete sense to you. Also, you may modify the words, phrases or sentences to make them sound more like you, the vocabulary and wording that the audience would recognize and find appealing. Use of plagiarism checker is also advised, just to be on the safe side. After all, computers remain computers; they can never replace human brain. To help and guide you on how to use our best free article spinner online tool, our experts have come up with a list of handy tips. These tips are constructive in preparing you to use article rewriter tool properly. You can modify words, synonyms and whole sentences so that the new sentences will sound even more like you. We remind you: the more words you change the better. This actions will show you a great paraphrasing opportunities. And your text will not be considered plagiarism. Rephrasing is not easy, however our free online app will help you to maintain the main idea of your text, all using appropriately selected words. Our program is the simplest yet most efficient online paraphrasing tool. You will know what we are talking about once you will start using this free article spinner. You have to use the our article rewriter to know what exactly we are talking about. This handy text spinner is useful for writers, bloggers, and webmasters. Accuracy, reliability, and swiftness are what makes it the best article rewriter. Moreover, it is completely free, and we intend to always keep it like that.
Exactly Mark! In my experience you can certainly write around 1000 words per hour, even if you are practically new to blogging. I personally think that spinning articles is just a gimmick that doesn’t really get results but wastes tons of time. The spinning software certainly makes a lot of money for the creators though! They are the ones who are laughing all the way to the bank!
Anybody may do that, all you will need is the ability to chain a sentence jointly and a computer. You're able to compose original articles and distribute them to post submission sites and get paid. You will need to apply to these sites and might or might not get rejected. Should you happen to get rejected then just keep plugging away till you find some body to "hire" you.
I enjoy this program! It saves me lots of money and time in getting write-ups for backlinks. As I claimed I am running an experiment on an internet site using only articles that are spun from it and am starting to see some positions. I believe as the website continues to grow it will continue to improve positions as well as more website traffic. Just time will certainly inform.
To rank your website in search engines you have to post content at your website on daily basis. If you have more than 2 websites then it is almost impossible to write unique content on all those websites. Because for proper blogging you have to keep an eye on word count of your blog post. To do this task webmasters use article spinning tools so that they can post articles to their domains daily. Paraphrasing Tool is also used by students when they have less time to submit their assignment; they just copy content from the internet, rewrite it, remove grammar mistakes and submit it. According to the webmasters, we have the best sentence rewriter tool available online.
"I have been using Spinner Chief for about 2 months now and find it to be the best spinner that I have used. Of the many unique features Spinner Chief has, but I think the Super Replace feature is my favorite and is totally unique to Spinner Chief. I have used it exclusively to product content for my site, BuyMazuGold.com, and has saved me a lot of time and effort. I highly recommend this product and look forward to the new updates."
Not sure about version 1, but I'm testing version 2 right now and I have to say it's the best auto spinner I've seen bar none. The content is actually extremely readable and probably better than the manual spins a lot of people do out there. However, some of the content doesn't pass copyscape so make sure you play around with the settings. Minor edits should do the trick. I'm on the trial now but seriously thinking of keeping the Turing plan for my Tier 1 content.
But it is the most important that the spun text, especially with version 2.0 usually passes CS test, and Google cannot even see it as spun content. Such as content can be used for links building as well as on money sites and qualitity is pretty good, as you saw in the example. It is much better than other article spinners with similar pricing as they do not get the right meaning of each and every word, so the rewrites sometimes looks funny/strange. It is of course much better than any free article spinner/rewriter I have tried.
Some writers browse for batches of cheap private ticket rights articles and spinning them before submitting them. These PLR articles might not be the best quality but anything can be much better upon by the spinner. These PLR content are utilised anticipated to the actuality that though the level of quality is average even, they possess helped catch the attention of in website traffic still.
It looks like the creators of Spin Rewriter 9 .0 have really put a lot of work into creating a piece of software that creates readable content. However, Google isn’t stupid and there are a lot of things that can go wrong when you are trying to “manipulate” Google into giving you more traffic. Google hates spam, badly written content and duplicate content. These are all things that Spin Rewriter 9 .0 is capable of creating. You simply can’t trust a piece of software to write content for you in my opinion.
Coming up with content can be tough for those who are new to niche blogging. So it’s not surprising that some people turn to article spinning software, in hope for a better solution. I’ve always been an advocate for creating original things, but in this WordAi review, I got curious and decided to do an experiment to see how a spun content would look like. Are there any benefits to use this type of services at all?
Spin Rewriter 9 rewrites content on paragraph, word and sentence level. It also turns sentences around and makes sure that only appropriate synonyms are used. Aaron added a special ARTICLE GENERATING ALGORITHM to Spin Rewriter 9.0. This algorithm makes sure that the generated articles are even more unique, and even more readable — if that was even possible!
People, I’m pretty sure over half of the articles you read nowadays come out from a spinner such as this one, and you can’t even tell the difference… believe me I know – I publish a lot of these articles myself, using Spin Rewriter, and they are very good and believable, you wouldn’t know the difference between one of them and an article written by a human.
Imo it is not possible for google to detect properly spun content, it is not worth computing power it requires. They can do this using ngrams for example, but it is uses a lot of queries. And for example article spinner I coded beats this algo, so google cant detect that the content is spun. Manual spinning is also good but it takes more than 30 minutes per article.
New customers will be given a discount offer that is massive. You are given a lot of quality written articles in a brief time period by spin Rewriter. After 5 days you get 30 days to make sure the Spin Rewriter technology is right for you, although for using their services, clients receive a 5-day free trial. They permit you to prevent SEO devaluation from content that is online that is duplicate. Try it out, and when it is not exactly right for your business, you’ll be given.
Spinning Speed – How quick can these spinners spin the article above. WordAi took 3 minutes and 48 seconds and SpinerChief III Ultimate using Super Spin in the balanced setting (meaning try to be unique as possible while still being readable) took less than 3 seconds to generate. I’ve had WordAi take 5+ minutes before, they need to speed things up. Clearly SpinnerChief won the speed test.
Some positive aspects to writing articles and selling them on the internet is that you get to supplement your monthly income. In this rough economy who can't use a few extra bucks? Another upside is that you can build up your cache of original content and increase your reputation for writing and possibly attract some higher paying customers. Lastly, just think of the knowledge you are gaining by having to research some of the topics you write about. You are, or will soon be, a fountain of useless information.
When you integrate Perfect Tense with WordAi, Perfect Tense will check any text you spin for grammatical errors. Perfect Tense will then add those spelling and grammatical errors as synonyms. This means that your spintax will be more unique and more readable. When using Perfect Tense with WordAi, your spun content will often end up even higher quality than the original.
I've ranked websites in the past with spun content, and now they are still on #1 position of google. First year (2014) google found me because my spun was really bad, many paragraphs were just copied and my position drop from #2 to around #20 after a panda update. Later I cleaned all my text with better spun (I didn't buy any article!), my ranking went up again, and with more backlinks I reached #1 and it is still there
Spin Rewriter 5.0 technology was a previous edition that allowed their clients to use the basic article rewriting system. Their newer versions over the years have just kept getting better and better. The new Spin Rewriter 9.0 technology gives you the option of assigning variables to your content. Their software is dead easy to use. In just three steps you can have up to 50 uniquely spun articles.
Composing and writing is a fascinating occupation, great composition abilities makes your substance and its holder ex-site or else wealthy in different setting however dependably it's anything but a simple one. A basic and extraordinary approach to change that is summarize existing great substance, however how arrangement is rewording device. Do you have some content that you chose from any current source, if so duplicate it and revise as it needs to pass counterfeiting checker to guarantee its uniqueness. Web crawler adores interesting substance and in addition rebuff the duplicate or copy content. Not just for the web utilize, you may require one of a kind substance for college task or for any exploration work – rewritertools summarize generator dependably close to the author. It is safe to say that you are prepared for composing something for a work task however are uncertain how to approach the entire procedure without trading off on quality and uniqueness? Rewritertools.com giving a pleasant expert apparatus that give you a shot for creating something astonishing, simply pursue few stages and get your coveted one. Go to your pre-chosen source and duplicate the content, open your reword device glue there. You will be provided with proposals in light of the words that are utilized. You would then be able to choose the words you need, and simply like that, your substance will end up exceptional and written falsification and plagirism free.
You do not have to bring about any sort of the change in the structure of the paragraph sufficiently. It would be such an easy way out if you will be jotting down with the notes and explain out with some of the main points into the paragraph. You should be hence rewriting all by means of using the notes and not the original one. Proofreading the document as about 2-3 times definitely.
Having a continuous flow of fresh, human-readable text is the best way for your website or blog to gain search engine exposure. Content is King, as they say ... at least as important as basic search engine optimization. Thus, Spinbot can be a vital tool for anyone who wants to market their website or product online as quickly and efficiently as possible. With all the unique, quality textual content you could ever want, you will quickly gain legitimate web visibility, both in terms of human readership and search engine exposure.
Spin Rewriter 9.0 allows their users to get hundreds of articles of similar high quality in a short amount of time. They’ve updated the ENL Semantic Spinning engine to include even more synonyms and sentence structure variations. Their article spinning software is of the best in the market and they’ve kept their prices affordable. Spin Rewriter is being used by top website professionals. High profile clients have said; the Rewriter tool is used as a great savings model for any online business with a marketing budget.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827992.73/warc/CC-MAIN-20181216191351-20181216213351-00569.warc.gz
|
CC-MAIN-2018-51
| 18,317 | 30 |
https://gist.github.com/mpratt14/89143368a91a7e894418b0e29acd45db
|
code
|
TLDR: U-BOOT RECOVERY MODE IS THE ONLY WAY TO FLASH RELIABLY. PUBLIC RELEASE BUILDS ARE TOO BIG FOR 4 MB
It feels like I'm following in the footsteps of @SaltwaterC, who figured out support for this router nearly 5 years ago !!!! As difficult as this was, most of the work was already done for me. Special thanks to him and also @pupie (another forum post from ages ago) for inspiration that Flash upgrades are possible. Also special thanks to @Jeff for the JEDEC ID solution
So long story short, I got a hold of this router and saw support for it, but I couldn't find directions and I ended up completely ruining the install and bricking the router. Its supposed to be easy right? I was actually using U-boot commands to bring it into RAM and then write directly to flash. I found out the hard way that this was a bad idea, and it ended up erasing ART in the process... U-boot is great for some things, not others....and this board doesnt do ANYTHING without ART.
I didnt have a backup so I ended up buying another one, they are super cheap anyway. After unbricking the original board, I soon realized that there was a...
HUGE PROBLEM WITH THE PUBLIC RELEASE OF AR71XX/TINY:
the current public builds for ar71xx/tiny are broken, causing kernel panic and boot loop. No one seems to notice though...it is likely the lowest demand branch. Everyone has given up on 4/32 boards.... If you don't believe me, you're welcome to start with todays public release. For U-boot on these boards, TFTP Recovery Mode is extremely safe. There is no way that you won't be able to flash again the same way if something goes wrong.
I realized that I had to make my own builds, the following is a summary of those exploits:
For a while, I gave up on 4 MB Flash size like everyone else...
In order to get the 8 MB versions working on a new 8 MB NOR chip, several things had to be done: In compiling, kernel command line hack to MTDparts, and adding support to the chip I was using. Recompiling U-boot from source using the GPL supplied by Netgear on an Ubuntu system with GCC 4.1 MIPS cross compiler (yikes). In real life, soldering and programming the flash chip (I used the Adafruit FT232H Breakout, a nice cheap option). I use a butane powered hand torch, they heat up much faster and stay hot
Here is the resulting U-boot image I;m currently using on both boards:
U-Boot for WNR1000v2 8 MB Chips
Note that if you use this U-boot image and you had the VC version the board will now act like it is the original retail version (because really, it is now). U-boot will require a little extra configuration and there will be new functions available to modify board ID and model ID stored in ART. If you got that far I'm sure you can figure that small detail out yourself...
Board ID needs to be blank
Model ID needs to be 'WNR1000V2'
The fate of 4 Flash / 32 RAM boards is a very hot topic right now, and the community is about to go one way or the other. But I didnt lose faith, I believed its possible to still run OpenWRT cleanly on 4 MB, and it is, but with special provisons
My 4 MB builds apply these major changes:
no IPv6 support
removed as many kernel mods as I could
included zram-swap (small and helps handle low ram)
I have been testing many images on this board. I recently compiled final versions of my own images for both 4 MB and 8 MB Flash sizes
Most people should just stick to the flash chip they already have, which is 4 MB... You have to really be prepared, its quite a challenge on its own to switch chips
Links to my builds
WNR1000v2 4 MB
WNR1000v2-VC 4 MB
WNR1000v2 8 MB
WNR1000v2-VC 8 MB
It is highly recommended that you have a USB to UART adapter to monitor all of this over a serial connection but for Recovery Mode flashing only its not necessary. If you do use UART, I also recommend you stay away from u-boot commands related to erasing or writing...
There is no reliable way to tell if you have the Retail version or the VC version, some say it is the revision of the Wifi Controller chip (AR9285) but I dont buy it. If you can open a serial console and view the boot log of your specific board. The first line of output clearly tells you. It's all in the software.
just try both files ending with '-factory' and see which one works. if its the wrong one, it will be safely rejected by U-boot
UART Recovery Mode Trick
If you are able to open a serial connection, forcing recovery mode is easily done with a quick trick. After interrupting the boot cycle and entering console with Ctrl + C... simply attempt to boot from a random empty place in ram, for example:
the response will be bad magic number and it will go to TFTP recovery mode.
Otherwise use the reset button:
WNR1000v2 U-boot TFTP reset button sequence:
while router is off begin holding the reset button. turn the router on while holding reset. Power LED starts out as amber. After about 10-12 seconds, Power LED goes from solid amber to blinking amber, KEEP HOLDING RESET
Releasing the reset button while its amber causes factory reset of original firmware. However if you do a factory reset from U-boot with OpenWRT flashed, it will brick the OpenWRT image (unless you update bootargs)
After about 6-8 more seconds, the Power LED goes from blinking amber to blinking green. now you are in TFTP recovery mode and you can release the reset button
Before continuing, read this if you havent already, https://wiki.openwrt.org/doc/howto/generic.flashing.tftp
The router has now started a TFTP Server and is listening for a TFTP Client, at 192.168.1.1 on port 69. The ethernet adapter/network device you are using on the client side (a computer/laptop) must be set to the same subnet but different address, for example: 192.168.1.50
You must connect your computer directly to the router with ethernet and run any TFTP client program you want. set IP address and port of the router's server, find the file you want and hit Put or Send. if it doesnt start right away, go through the TFTP sequence again, while the router is connected to the computer over ethernet
When the TFTP connection starts passing the file, Power LED turns off but the LAN LED remains on. If the file you passed is rejected, it returns to slow blinking and is listening again for a new file. When the transfer is successful, Power LED continues to be off while writing to the chip. When it finishes writing to flash chip, all LEDs go out and router reboots. Power LED becomes amber, the router rebooted and this is the beginning of the boot cycle.
On successful load of the kernel, Power LED goes from amber to off, then blinks green really fast for a few seconds, then slower. That indicates the interval when you can enter failsafe mode in openwrt
The router will continue blinking green until it has finished setting up the JFFS2 partition for the first time, and other first boot tasks...
It is not safe to lose power until the green light is solid again!!! after Power LED remains solid, it is now ready for configuration!!!
Wireless will be off by default and there is no LuCI or OPKG on my build, so you will have to SSH in and use the config files at /etc/config or UCI commands to configure
Using any SSH program you want, 192.168.1.1, port 22.
login as root without password,
then set the root password with
WOOSH, you're in
Feel free to message me if you need help
In the future
I will post how to build your own images as well
I would like to help start a small project, where U-boot images are compiled for those who are able to switch to larger Flash chips
I have not found the small RAM size to make a difference thus far...
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347389355.2/warc/CC-MAIN-20200525192537-20200525222537-00539.warc.gz
|
CC-MAIN-2020-24
| 7,578 | 54 |
https://www.eweek.com/pc-hardware/windows-9-needs-to-reach-business-users-sooner-rather-than-later
|
code
|
As I write this, I can see the dual progress bars crawling with seeming infinite slowness across the screen attached to the Hewlett-Packard workstation on my right.
I keep wondering how a computer that's supposed to be so fast seems to be installing Windows 7 so slowly. Yes, that's right, a computer I've had for three days now will be running Windows 7 once the installation is complete.
But you might recall that I'm the guy who kind of liked Windows 8? If so, you are correct. But a couple of years of using a touch-based interface on computers without touch screens has a corrosive effect.
After my review of Microsoft's then-new OS, I went out and bought a couple of copies, installing one on an HP P6 desktop and the other on a rather elderly HP xw4200 32-bit workstation with dual monitors. Both are solidly in the keyboard-and-mouse camp.
Once the update to Windows 8.1 came out, allowing you to boot directly into the Windows Desktop rather than the Start Screen, the computers became more usable. How usable? One machine resides in the lab and is used only for testing where it's necessary to confirm that things actually do work with Windows 8.
The other sits in the middle of my office where it's available to visitors and relatives who need a computer and the Windows 8 user interface works surprisingly well to discourage unnecessary or frivolous use.
The only other sign of Windows 8 around here is on a Surface tablet, where it works pretty well, and on other tablets that I receive for review, where it also works well. Clearly, Windows 8 is a dandy solution for working with touch-based computers.
But then there's this newly arrived dual Xeon powerhouse in the form of an HP Z620 professional workstation. This one is here because its predecessor failed so miserably at the simple task of doing things like "operating," that it was replaced under warranty.
No, it's not running Microsoft's latest operating system even though it's one of HP’s latest and fastest computers. The reason is that I use a keyboard and a mouse for my work, whether it's writing stuff for eWEEK or running Adobe PhotoShop or LightRoom. And yes, I could have asked for Windows 8 when I bought the computer, but I chose Windows 7. Productivity is very important to me and Windows 8 doesn't do anything to help productivity.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481612.36/warc/CC-MAIN-20190217031053-20190217053053-00579.warc.gz
|
CC-MAIN-2019-09
| 2,319 | 9 |
https://lists.fedorahosted.org/archives/list/[email protected]/message/3RT4HMXHVNZQH22OA4XUPUXPNOOHWXLF/
|
code
|
On 2017-02-28 14:01, Stephen Gallagher wrote:
On 02/28/2017 05:40 AM, Andreas Nilsson wrote:
> On 2017-02-28 10:57, jfilak(a)fedoraproject.org wrote:
>> Wow, the design looks cool.
>> One comment: Are you sure you want to use the terms "Crash" and
>> Not every ABRT problem is a crash:
>> - Python exceptions do not always cause a crash
>> - Kernel oopses are not crashes at all
>> - There might be other problem types like Eclipse ones
>> - ABRT Java connector can be configured to report also caught exceptions
> I'm not married to that term at all. What's a better name for it?
> "Errors", "Irregularities"?
What does the documentation (RHEL/Fedora) usually refer to abrt objects as?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401617641.86/warc/CC-MAIN-20200928234043-20200929024043-00552.warc.gz
|
CC-MAIN-2020-40
| 688 | 13 |
https://grfxmedia.com/webdev/set-keyboard-shortcuts-for-the-nova-sidebar/
|
code
|
Nova by Panic has a nice configurable sidebar but it has a flaw. There are no keyboard shortcuts by default to switch between the tabs. In this video, I’ll show you how to configure a simple system using the same keys as Xcode, CMD+1, CMD+2, etc. to switch tabs.
I am baffled as to why this would not be set by default in the app.
After setting up these keyboard shortcuts we no longer have to keep reaching for the mouse so much, something that makes a lot of coders happy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104354651.73/warc/CC-MAIN-20220704050055-20220704080055-00130.warc.gz
|
CC-MAIN-2022-27
| 476 | 3 |
https://forums.ubports.com/user/guru
|
code
|
My BQ E4.5 says:
phablet@ubuntu-phablet-bq:~$ cat /sys/devices/system/cpu/cpu*/cpufreq/scaling_governor
@kevit Read here about how to expand the OSK:
@hans1977se Once upon the time I ported baresip (a command line SIP client) to the BQ E4.5 UbuntPhone. I was even able to make a first SIP call. Then I started to hack something together in Qt (baresip has a nice way to integrate other UI), but I gave up due to lack of time :-( There must be some post with my UI in the LP mailing list...
As far as I understand, the files are only some kind of database and the concrete APN settings are calculated from the SIM's MCC (Mobile Country Code) and MNC (Mobile Network Code). See also
for more hints.
There are two (or maybe the two is only one) file from where APN values seem to come from:
root@ubuntu-phablet:/home/phablet# ls -l /var/lib/lxc/android/rootfs/system/etc/apns-conf.xml /android/system/etc/apns-conf.xml
-rw-r--r-- 1 root root 661850 Jun 6 2016 /android/system/etc/apns-conf.xml
-rw-r--r-- 1 root root 661850 Jun 6 2016 /var/lib/lxc/android/rootfs/system/etc/apns-conf.xml
@guru But what kind of process is it and why should't be present in top?
I do not know and I do not have it. But it consumes a lot of CPU time (1h27min) and if you google for it, it is mentioned together with battery drain.
Looks like your connection to UBports Forum was lost, please wait while we try to reconnect.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888041.33/warc/CC-MAIN-20180119144931-20180119164931-00082.warc.gz
|
CC-MAIN-2018-05
| 1,401 | 13 |
https://blog.sonicwall.com/en-us/2020/01/fake-antivirus-apps-on-google-play-flag-themselves-as-risky/
|
code
|
Google Play hosts a plethora of different types of apps. One such popular type of app is Antivirus (AV) for the device. Searching for ‘antivirus’ on Google Play gives upwards of 200 results:
But can all these apps be trusted with securing your device ?
A few months back there was an interesting find about fake Antivirus apps for Android. SonicWall Threats Research Team identified fresh apps that exist on Google Play (during the time of our analysis) that exhibit similar behavior.
During our analysis we identified the following fake AV apps that are present on Google Play (at the time of writing this blog):
- 360 Antivirus:Antivirus, VPN Engine,Deep Cleaner
- Mobile Security – Antivirus,Applock,Cleaner
- Protector Security Antivirus Accelerator Cleaning
- antivirus for mobile 2019
As each of the above app claims to be an Antivirus app we ran a scan of our device via the apps above. Upon execution each one of the apps showed a scan result page that seems to have a common design pattern:
The apps find few similar security issues on the device, upon inspecting the code the reason for this similarity becomes clear.
These AV apps consults a few .json files from the assets folder to determine the risk levels of applications on the device. The following json files are used:
- Permissions.json – This file saves a list of permissions and gives them a rating. Based on what permissions are used by an application a risk score is given:
- BlackListActivities.json – Contains a list of package names, if an application contains a subset of these package names in their activities it is deemed risky:
- BlackListPackages.json – If packages present in this file are present on the device, they are deemed risky:
- WhiteList.json – Contains a list of package names, if an application contains a subset of these package names it is automatically considered safe:
All the four apps mentioned in this blog contain the same json files listed above:
Suspicious Network Activity
During the analysis of these apps, few of them started showing fullscreen ads during their execution:
One of the apps communicated with a domain onesignal.com which has suspicious associations with apps that have detection on VirusTotal. Below VT graph further highlights this:
These apps follow a very simplistic approach towards security as most of the parameters considered to determine a risk score are not reliable:
- Package names can be easily changed. As a result, if a malicious app has a package name present in the whitelist.json file it will not be considered malicious
- Permissions alone cannot be used to decide if an application is malicious. Most of the permissions present in the permissions.json file are used by clean applications as well
Probably the biggest irony of these antivirus apps is that they manage to flag themselves as ‘Medium Risk’/’High Risk’ apps as they do not have their own package name in the whitelist file:
Along with detection related assets, most of the .json files discussed in this blog are common among the fake AV apps that we saw. This makes one question if the app creators are reusing common code.
The Real Danger
Even though the apps discussed in this blog are not malicious in nature they do something dangerous, they give the users a false sense of security. Users feel secure once they install these anti-virus apps but these apps don’t actively protect the users, they simply reply on a static .json file to identify potentially dangerous apps. This sentiment can be seen in a review for one of these apps:
Rather than downloading such dubious apps we urge readers to take some precautions when downloading security related apps:
- Install security related apps from reputed companies that have a presence in the field of security
- Reading reviews of the app helps in identifying potentially harmful/fake apps. Few reviews of the apps listed above don’t inspire confidence:
But sadly based on the stats on Google Play, a large number of users have already downloaded these apps:
SonicWall Capture Labs provides protection against these threats with the following signature:
- GAV: AndroidOS.FakeAV.JS
Indicators of Compromise (IOC’s):
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817033.56/warc/CC-MAIN-20240415205332-20240415235332-00450.warc.gz
|
CC-MAIN-2024-18
| 4,198 | 33 |
https://community.dynatrace.com/t5/NAM/How-to-get-any-percentile-values-in-DCRUM/td-p/52569
|
code
|
I inserted the dimensions and some metrics from my report and the result of report for your reference.
What is your resolution and time range where you are getting the aggregation error?
Thank you Babar. I have tried many resolutions and time ranges. I found the problem and solution with my request however.
It was with the data source and how the DCRUM aggregated results based on that. I was using All (Aggregated) and hence was having aggregation error. Now since I changed the data source into a particular server, I could see the results.
I, however, feel quite surprised why it was the case with the percentiles? Can't DCRUM aggregate Percentiles, since most of the data are the average measures. Do you have a take on that?
Found some information about data source rules.Selecting Data Sources
Data for a particular data view can come from databases used by other report servers, provided that these remote servers have been configured.Rules Governing Data Sources
When multiple data sources are available, the following data source choices can appear in the Data sources list:
Aggregate data from all available databases supporting this view. When remote servers are configured and support this view, the relevant data from these servers is aggregated.
A list of all available servers. If no remote servers are available, no servers are listed.
Note that the localhost is the server on which you are viewing the reports, not the server on which the CAS is running.
Note: Starting from CAS release 12.3, there is no All (Reported separately) option. If you used that option in releases earlier than 12.3, your reports will not change. Data will still be reported in separate sections (in separate tables or on separate charts).
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488559139.95/warc/CC-MAIN-20210624202437-20210624232437-00082.warc.gz
|
CC-MAIN-2021-25
| 1,735 | 12 |
https://megan.cs.uni-tuebingen.de/t/i-o-exception-during-comparison/274
|
code
|
I am trying to compare a couple of Meganized DAA files that I load from a MEGAN server remotely. While opening and working with the individual DAA files functions perfectly, the comparison always dies with an “Execute failed: java.io.IOException: Comparison computation failed: X”. The behavior started after I upgraded to 6.6.2 (built 12 Dec 2016) yesterday! Worked with the versions before on the same Meganized DAA files. DAA files are quite big so I won’t be able to share them over network. In case you need to see what’s going on I can also quickly drop by in the office.
Cheers from the MPI,
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499966.43/warc/CC-MAIN-20230209112510-20230209142510-00182.warc.gz
|
CC-MAIN-2023-06
| 606 | 2 |
https://support.microsoft.com/en-gb/topic/ms16-155-description-of-the-security-only-net-framework-4-6-2-updates-for-windows-7-and-windows-server-2008-r2-december-13-2016-d26bcfb5-9e7e-8623-4e9f-65c6147bd87a
|
code
|
This update resolves vulnerabilities in the Microsoft .NET Framework. A security vulnerability exists in the .NET Framework that could allow an attacker to access information at rest that should be defended by cryptographic mechanisms. This update fixes the way the Framework handles the key and therefore defends the data at rest. To learn more about the vulnerability, see Microsoft Security Bulletin MS16-155.
Additional information about this security update
The following article contains additional information about this security update as it relates to individual product versions. The article may contain known issue information.
3204805 MS16-155: Description of the Security Only Update for the .NET Framework 4.6.2 for Windows 7 and Windows Server 2008 R2: December 13, 2016
Help for installing updates: Support for Microsoft Update
Security solutions for IT professionals: TechNet Security Troubleshooting and Support
Help for protecting your Windows-based computer from viruses and malware: Virus Solution and Security Center
Local support according to your country: International Support
Applies toThis article applies to the following:
Microsoft .NET Framework 4.6.2 when used with:
Windows Server 2008 R2 Service Pack 1
Windows 7 Service Pack 1
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506646.94/warc/CC-MAIN-20230924123403-20230924153403-00025.warc.gz
|
CC-MAIN-2023-40
| 1,260 | 12 |
http://www.sqaforums.com/forums/radview-webload/44166-true-false-text-search.html
|
code
|
I am using Webload 7.2 to test an application for an insurance company. The application will display "Submission is successful" when a submission is accepted by the server. I am going to setup a log file that records the submission status and the application number of each insurance application. I am going to use text search for a specific page. If "Submission is successful" is found, an entry will be added into the log file as "[Application number] + submission is successful". The "Application Number" is from a global variable.
Thank you for your reply. However, if I used "Text Search" in "Functional Testing", I cannot customerize the error message. Webload will throw out an error message in a default format. I want the error message to display the application number as well. How could I do that?
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719033.33/warc/CC-MAIN-20161020183839-00345-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 808 | 2 |
https://community.filemaker.com/thread/94620
|
code
|
A long term solution is to set up a separate related table of address records. People with the same address would then link to the same address record. This makes it possible to set up a set of records in the Address table and you'll get one record for each address.
Here's a possible short term solution for working with your data as it currently exists:
It's possible to "mostly" remove your duplicate addresses, by the following method, but it will fail in cases where two people have addresses entered that are really the same address but some minor detail, such as "ave", "suite" or such is entered differently in their individual records.
Define a calculation field that combines all address fields into a single string. Something like:
addressLine1 & " " & AddressLine2 & " " & City & " " & zipcode.
Enter layout mode and double click the "body" part label to change the body part of your labels layout to a Sub Summary part "when sorted by" this new calculation field.
Then sort your records by this field and see what you get when you preview this layout to see if you get the correct set of labels laid out in columns (if you are printing an 'avery' type sheet of address labels). We may need to make a change in layout set up if it does not preview correctly.
Thank you so much for your response. I will employ the long term solution to future projets but the short term solution might just work out for this one. I do need to put a line break or something in between the address and the city, state, etc.. to have the avery label print correctly.
One more question, is there a way to get a count of the records showing? The record count shows the total records found not the total when sorted. Also, when I export this sorted mail list it exports all records (including the duplicates). If I am asking too much of the short term solution then I will go ahead and employ your long term suggestion.
Again, Thanks for the help.
The calculation field I recommeneded is not for printing, just to group records with the same address. It need not be visible on any layout for this to work.
Actually, it is counting your records. It's just not counting your addresses as you have multiple records for some addresses. There is a method to get the count you want but it's kinda hairy. Check out this link and decide if you want to try it: How to count the number of unique occurences in field.
When it comes to exporting the data, you can get one row per summized group if you use the "group by" options when exporting the data.
Export worked perfectly. Thank you. I will work on the other count at a later time.
Your help is much appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109470.15/warc/CC-MAIN-20170821172333-20170821192333-00669.warc.gz
|
CC-MAIN-2017-34
| 2,645 | 15 |
https://lists.claws-mail.org/pipermail/users/2012-May/002469.html
|
code
|
[Users] Folder features request
Ian.Hamilton at AAUG.net
Wed May 23 15:31:51 CEST 2012
I have recently migrated to Claws Mail and there are a few features
from the previous system, on another OS, that I would find
useful. These would all be on a per folder basis.
1) Hide folder - options would be Yes, No, No Unread or No messages.
This would reduce the folder list to make it easier to view. A 'View all
folders' option would be needed to override the per folder option.
2) Announce delivery - using 'espeak' it would announce how many
messages arrived in each box (for folders that have the announce option
ticked). Message would be 'Received <folder name> <number of messages>'.
There might be several announcements if new messages were delivered to
3) Expiry - option to expire messages to another folder after a number
of days (e.g. the wastebin).
More information about the Users
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146186.62/warc/CC-MAIN-20200226023658-20200226053658-00183.warc.gz
|
CC-MAIN-2020-10
| 886 | 16 |
https://thepixiepit.co.uk/scrabble/gaelic.htm
|
code
|
Simple Steps to Setting up a game - First choose the number of
players, then the room you wish to play in. Click on
"-SET-UP A NEW GAME" on the top left hand side of the
page, and enter all the player details on the page that appears.
Please make sure you use correct e-mail addresses.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573118.26/warc/CC-MAIN-20220817213446-20220818003446-00769.warc.gz
|
CC-MAIN-2022-33
| 285 | 5 |
https://www.maixuanviet.com/solved-the-following-signatures-couldnt-be-verified-because-the-public-key-is-not-available.vietmx
|
code
|
There are times when running sudo apt-get update in Ubuntu will result in error messages such as the following:
sudo apt-get update
If these errors aren’t fixed, apt will have problems when installing or upgrading packages. For example:
sudo apt-get upgrade
The apt packaging system has a set of trusted keys that determine whether a package can be authenticated and therefore trusted to be installed on the system. Sometimes the system does not have all the keys it needs and runs into this issue. Fortunately, there is a quick fix. Each key that is listed as missing needs to be added to the apt key manager so that it can authenticate the packages.
Looking at the error above, apt is telling us that the following keys are missing. Notice that these are listed multiple times. Each unique key will only need to be added once.
To add these keys, run the following commands:
sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys [your_key]
If the keys that your system is missing differs, simply replace the key at the end of the above command with your key and run it.
Did I help you?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100258.29/warc/CC-MAIN-20231130225634-20231201015634-00821.warc.gz
|
CC-MAIN-2023-50
| 1,096 | 10 |
https://zims-en.kiwix.campusafrica.gos.orange.com/wikipedia_en_all_nopic/A/Dyadics
|
code
|
There are numerous ways to multiply two Euclidean vectors. The dot product takes in two vectors and returns a scalar, while the cross product returns a pseudovector. Both of these have various significant geometric interpretations and are widely used in mathematics, physics, and engineering. The dyadic product takes in two vectors and returns a second order tensor called a dyadic in this context. A dyadic can be used to contain physical or geometric information, although in general there is no direct way of geometrically interpreting it.
The dyadic product is distributive over vector addition, and associative with scalar multiplication. Therefore, the dyadic product is linear in both of its operands. In general, two dyadics can be added to get another dyadic, and multiplied by numbers to scale the dyadic. However, the product is not commutative; changing the order of the vectors results in a different dyadic.
The formalism of dyadic algebra is an extension of vector algebra to include the dyadic product of vectors. The dyadic product is also associative with the dot and cross products with other vectors, which allows the dot, cross, and dyadic products to be combined together to obtain other scalars, vectors, or dyadics.
It also has some aspects of matrix algebra, as the numerical components of vectors can be arranged into row and column vectors, and those of second order tensors in square matrices. Also, the dot, cross, and dyadic products can all be expressed in matrix form. Dyadic expressions may closely resemble the matrix equivalents.
The dot product of a dyadic with a vector gives another vector, and taking the dot product of this result gives a scalar derived from the dyadic. The effect that a given dyadic has on other vectors can provide indirect physical or geometric interpretations.
Dyadic notation was first established by Josiah Willard Gibbs in 1884. The notation and terminology are relatively obsolete today. Its uses in physics include continuum mechanics and electromagnetism.
In this article, upper-case bold variables denote dyadics (including dyads) whereas lower-case bold variables denote vectors. An alternative notation uses respectively double and single over- or underbars.
Definitions and terminology
Dyadic, outer, and tensor products
A dyad is a tensor of order two and rank one, and is the result of the dyadic product of two vectors (complex vectors in general), whereas a dyadic is a general tensor of order two (which may be full rank or not).
There are several equivalent terms and notations for this product:
- the dyadic product of two vectors and is denoted by (no symbol; no multiplication signs, crosses, dots etc.)
- the outer product of two column vectors and is denoted and defined as or , where means transpose,
- the tensor product of two vectors and is denoted ,
In the dyadic context they all have the same definition and meaning, and are used synonymously, although the tensor product is an instance of the more general and abstract use of the term.
Three-dimensional Euclidean space
be two vectors where i, j, k (also denoted e1, e2, e3) are the standard basis vectors in this vector space (see also Cartesian coordinates). Then the dyadic product of a and b can be represented as a sum:
or by extension from row and column vectors, a 3×3 matrix (also the result of the outer product or tensor product of a and b):
Just as the standard basis (and unit) vectors i, j, k, have the representations:
(which can be transposed), the standard basis (and unit) dyads have the representation:
For a simple numerical example in the standard basis:
N-dimensional Euclidean space
If the Euclidean space is N-dimensional, and
where ei and ej are the standard basis vectors in N-dimensions (the index i on ei selects a specific vector, not a component of the vector as in ai), then in algebraic form their dyadic product is:
This is known as the nonion form of the dyadic. Their outer/tensor product in matrix form is:
A dyadic polynomial A, otherwise known as a dyadic, is formed from multiple vectors ai and bj:
A dyadic which cannot be reduced to a sum of less than N dyads is said to be complete. In this case, the forming vectors are non-coplanar, see Chen (1983).
The following table classifies dyadics:
Determinant Adjugate Matrix and its rank Zero = 0 = 0 = 0; rank 0: all zeroes Linear = 0 = 0 ≠ 0; rank 1: at least one non-zero element and all 2 × 2 subdeterminants zero (single dyadic) Planar = 0 ≠ 0 (single dyadic) ≠ 0; rank 2: at least one non-zero 2 × 2 subdeterminant Complete ≠ 0 ≠ 0 ≠ 0; rank 3: non-zero determinant
Product of dyadic and vector
There are four operations defined on a vector and dyadic, constructed from the products defined on vectors.
Product of dyadic and dyadic
There are five operations for a dyadic to another dyadic. Let a, b, c, d be vectors. Then:
Dot Cross Dot Dot product Double dot product
Dot–cross product Cross Cross–dot product Double cross product
be two general dyadics, we have:
Dot Cross Dot Dot product Double dot product Dot–cross product Cross Cross–dot product Double cross product
There are two ways to define the double dot product; one must be careful when deciding which convention to use. As there are no analogous matrix operations for the remaining dyadic products, no ambiguities in their definitions appear:
There is a special double dot product with a transpose
Another identity is:
We can see that, for any dyad formed from two vectors a and b, its double cross product is zero.
However, by definition, a dyadic double-cross product on itself will generally be non-zero. For example, a dyadic A composed of six different vectors
has a non-zero self-double-cross product of
The spur or expansion factor arises from the formal expansion of the dyadic in a coordinate basis by replacing each dyadic product by a dot product of vectors:
in index notation this is the contraction of indices on the dyadic:
In three dimensions only, the rotation factor arises by replacing every dyadic product by a cross product
In index notation this is the contraction of A with the Levi-Civita tensor
There exists a unit dyadic, denoted by I, such that, for any vector a,
Given a basis of 3 vectors a, b and c, with reciprocal basis , the unit dyadic is expressed by
In the standard basis,
Explicitly, the dot product to the right of the unit dyadic is
and to the left
The corresponding matrix is
This can be put on more careful foundations (explaining what the logical content of "juxtaposing notation" could possibly mean) using the language of tensor products. If V is a finite-dimensional vector space, a dyadic tensor on V is an elementary tensor in the tensor product of V with its dual space.
The tensor product of V and its dual space is isomorphic to the space of linear maps from V to V: a dyadic tensor vf is simply the linear map sending any w in V to f(w)v. When V is Euclidean n-space, we can use the inner product to identify the dual space with V itself, making a dyadic tensor an elementary tensor product of two vectors in Euclidean space.
In this sense, the unit dyadic ij is the function from 3-space to itself sending a1i + a2j + a3k to a2i, and jj sends this sum to a2j. Now it is revealed in what (precise) sense ii + jj + kk is the identity: it sends a1i + a2j + a3k to itself because its effect is to sum each unit vector in the standard basis scaled by the coefficient of the vector in that basis.
Properties of unit dyadics
where "tr" denotes the trace.
Vector projection and rejection
A nonzero vector a can always be split two perpendicular components, one parallel (‖) to the direction of a unit vector n, and one perpendicular (⊥) to it;
The parallel component is found by vector projection, which is equivalent to the dot product of a with the dyadic nn,
and the perpendicular component is found from vector rejection, which is equivalent to the dot product of a with the dyadic I − nn,
is a 90° anticlockwise rotation operator in 2d. It can be left-dotted with a vector r = xi + yj to produce the vector,
or in matrix notation
For any angle θ, the 2d rotation dyadic for a rotation anti-clockwise in the plane is
where I and J are as above, and the rotation of any 2d vector a = axi + ayj is
where the rotation dyadic is
and the Cartesian entries of ω also form those of the dyadic
The effect of Ω on a is the cross product
which is the dyadic form the cross product matrix with a column vector.
- P. Mitiguy (2009). "Vectors and dyadics" (PDF). Stanford, USA. Chapter 2
- Spiegel, M.R.; Lipschutz, S.; Spellman, D. (2009). Vector analysis, Schaum's outlines. McGraw Hill. ISBN 978-0-07-161545-7.
- A.J.M. Spencer (1992). Continuum Mechanics. Dover Publications. ISBN 0-486-43594-6..
- Morse, Philip M.; Feshbach, Herman (1953), "§1.6: Dyadics and other vector operators", Methods of theoretical physics, Volume 1, New York: McGraw-Hill, pp. 54–92, ISBN 978-0-07-043316-8, MR 0059774.
- Ismo V. Lindell (1996). Methods for Electromagnetic Field Analysis. Wiley-Blackwell. ISBN 978-0-7803-6039-6..
- Hollis C. Chen (1983). Theory of Electromagnetic Wave - A Coordinate-free approach. McGraw Hill. ISBN 978-0-07-010688-8..
- K. Cahill (2013). Physical Mathematics. Cambridge University Press. ISBN 978-1107005211.
- Vector Analysis, a Text-Book for the use of Students of Mathematics and Physics, Founded upon the Lectures of J. Willard Gibbs PhD LLD, Edwind Bidwell Wilson PhD
- Advanced Field Theory, I.V.Lindel
- Vector and Dyadic Analysis
- Introductory Tensor Analysis
- Nasa.gov, Foundations of Tensor Analysis for students of Physics and Engineering with an Introduction to the Theory of Relativity, J.C. Kolecki
- Nasa.gov, An introduction to Tensors for students of Physics and Engineering, J.C. Kolecki
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710813.48/warc/CC-MAIN-20221201121601-20221201151601-00058.warc.gz
|
CC-MAIN-2022-49
| 9,795 | 83 |
https://pypi.org/project/peachproxy/
|
code
|
Peach Web Proxy API module
The peach proxy module provides a wrapper around the Peach API Security API. This module is used for by CI integrations, test runner plugins and custom traffic generators.
You will need the following prerequisites in order to use:
Peach API Security
Python 2 or 3
$ pip install peachproxy
$ python setup.py install
See the Peach API Security User Guide for more information.
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00457.warc.gz
|
CC-MAIN-2023-40
| 512 | 9 |
http://forum.springsource.org/showthread.php?42656-Having-multiple-command-parameters-in-a-Collection&p=136940
|
code
|
Does spring have mechanisms to allow a command object that is an collection of a JavaBean containing data?
My form has four elements for text input. I want to show multiple rows of these Each row containing the same sets of data only with different values. The number of rows is choosen by the user by a "add row" button.
The problem I see is that the name must contain the row number(name="input4row1") or otherwise I will not get multiple values for the inputs.
<input type="text" name="input1">
<input type="text" name="input2">
<input type="text" name="input3">
<input type="text" name="input4">
Could I construct the command object as an ArrayList where each rows is stored in a JavaBean and put in the list. But I am not sure how to handle this in JSP.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00035-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 758 | 8 |
https://marketplace.visualstudio.com/items?itemName=zhengx666.find-usages
|
code
|
Find Usages VScode extension
This extension will help you to search usages of specific file within a project similar to webstorm.
Find usages similar to webstorm.Currently supports:
Here to see change log
It maybe doesn't work in windows, we will fix it as fast as we can.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711390.55/warc/CC-MAIN-20221209043931-20221209073931-00521.warc.gz
|
CC-MAIN-2022-49
| 272 | 5 |
http://kevsaidwhat.blogspot.com/2011/07/android-conversion-continues.html
|
code
|
... db operations
Android - WRONG
... db operations
Android - CORRECT
... db operations
Yes, you need to begin and end but you MUST call setTransactionSuccessful or kiss all the operations goodbye.
I added a new call to the current XML Pull Parser we are using on the Android side. It allows you to send in a callback to get each row of data as it is processed. For our big boy Java app we just parse everything into memory then write from memory structure to DB table. Not a good idea on a mobile device as I discovered on the iPhone. I use the basic NSXMLParser there and build one record at a time into a NSDictionary. I added a bit of logic into our Pull Parser for the Android allowing a callback interface with a Map of values for each record. Saves a ton of memory and time under each OS. I was very happy how easy it was to do that conversion. I have begun my testing using the largest table I download so far, it has 17,401 records.
iPhone Simulator 3.7 seconds
iTouch Rev3 42.7 seconds
Android Emulator 41.0 seconds
Samsung Galaxy S 11.8 seconds
As you can see the iPhone simulator can really fool you into thinking your code is running great. On the Android side the emulator forces you to code tighter and the phone gives you a nice speed break. I am not at all happy with the 42.7 seconds it takes the iTouch to parse and store the data. Not sure what I can do to fix it but I will have to play around with it more soon.
Luckily we only need to download the big tables when they are stale, which it will be once a year. I get a list of tables and last update date / times from the server on login. I compare my local last update to the server and grab a newer copy if it is out of date. We also have session tables that I have to load post login every time but I only want to do that once a session so I have all kinds of fun logic to decide if a table is stale. Seems to be working on the iPhone so I will start on that conversion next.
I really wish the Android device emulator ran faster. Total switch from the iPhone. iPhone the simulator is very fast. Of course the simulator is using same OS as the MacBook Pro so it really has a lot less to do. On my PC the emulator has to emulate a Linux type OS and the device. It is much faster to run on Android the actual device but of course that is a pain in other ways in that I have to type my password on the silly thing over and over.
The debugger is much slower under Android too. It is more usable as I can just click on variables and see their values or highlight a section of code and do an Inspect to see the value. Typing in commands to GDB on the Mac sucks and if you want to see some UTF8 text you have to type in a long command to convert it into something usable. Don't miss that at all.
Command to convert UTF8 NSData block to NSString in Xcode
po [NSString stringWithUTF8String:(char *)[data bytes]]
Pretty simple to tag my debug output strings and filter them via LogCat. DDMS lets me look at the file system of the emulator with ease but I have to copy my DB to my local HD browse it. Much easier to use SQLite Manager under Firefox on the Mac to look into the simple, but buried rather deep, directory structure of the simulator on the Mac to grab the .DB file and check it out.
I thought some things would be more straight forward to port especially since I was using SQLite on both devices but the wrapper classes are just different enough to cause confusion. Once I get in the base calls in my helper areas I will not even have to think about it.
Just as I expected most of the code is a lot shorter on the Android side.
- Not dealing with both a H and M file cleans up what you have to see in the code directory. Calls are less wordy as you are not naming parameters.
- Much easier to set up static variables and enums are really enums and not globals.
- Date processing is so much easier I am able to in-line the code as it is a few lines where Objective C was too many lines so I put things in separate methods.
- You can fully qualify what you are putting in a Map so I don't have to typecast things.
- No matched alloc / release pairs or autorelease calls on end of temp variables
- SVN interaction works in Eclipse but caused me numerous issues in Xcode.
- I can keep test.jpage open in Eclipse to run small code snippets to make sure I am doing substring correctly and the like.
- Editor tabs are not randomly reused when I am using the debugger
- If I double click on a file to open it or a search result is in an already open that tab opens instead of reusing the tab I happen to be on (tab support in Xcode is just barely acceptable)
- Auto comment generation for JavaDoc is very handy
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863811.3/warc/CC-MAIN-20180520224904-20180521004904-00461.warc.gz
|
CC-MAIN-2018-22
| 4,678 | 30 |
https://spsvietnam.vn/en/technology-hub
|
code
|
Welcome to SPS Vietnam Technology Hub where we embody BPO trends, profi insights and innovation in technology.
Evolved from the Technology Department over a decade ago, our Tech Hub has been developed into an industry masterpiece.
Our Tech Hub plays three important roles:
- Technology operating Team, with the state-of-the-art technology to provide end-to-end monitoring and the first level support to over 100 clients of SPS
- Intelligent Automation Centre where we apply Robotics and Artificial Intelligent Automation across SPS
- Innovation Incubator for our Continuous Improvement Programme where we are delivering now the real savings
This incredible business unit is acquiring both insightful and engaging for tech professionals and enthusiasts. Would you like to be one of them?
What we offer
Become a member
All Technology Hub memberships are global, giving you access to our career support programs, members-only community networks and drop-in workspaces in every SPS Technology Hub in the world.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998708.41/warc/CC-MAIN-20190618083336-20190618105336-00015.warc.gz
|
CC-MAIN-2019-26
| 1,006 | 10 |
http://www.tripadvisor.com/Hotel_Review-g33377-d481705-Reviews-Purple_Mountain_Lodge_Bed_Breakfast_and_Day_Spa-Crested_Butte_Colorado.html
|
code
|
A comfortable B&B where hospitality and attention to detail are at the top of Chris' priority list. Great breakfast, an even better happy hour and great insight to Crested Butte. Chris will share some great stories about Crested Butte and the area around it. Hiking, shopping and food, Chris knows whats up.
You have no recent hotel searches.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398456975.30/warc/CC-MAIN-20151124205416-00225-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 342 | 2 |
https://support.agilix.com/hc/en-us/articles/204820479-how-do-i-use-the-home-page
|
code
|
How do I use the Home page?
There’s no page like Home.
Home page screens
The Home page includes three screens:
- To-do List
- Activity Stream
On the Courses screen, you can:
- Order courses.
- Access Help.
- Open the User Menu
- Review Announcements.
- Review content from your school/district/organization.
- Use Course Cards to:
- Review scores and course progress (indicates how many of the gradable activities you have completed).
- Access the course Activities and Grades tools.
- Track how much time is left in the course; they will show an alarm clock icon when they are about to expire.
To-do List screen
The To-do List includes upcoming and past-due activities. By default, the To-do List displays activities with due dates coming up within seven days.
Click activities to open them.
Activity Stream screen
Review your recent activity, starting from the most recent, using the Activity Stream; click the posts to open the activity, badge, or announcement listed.
Your Home page gives you immediate access to the tools you need and to task reminders to help you stay on top of everything.
- Use teacher-provided registration codes to easily join courses.
- The Course Chooser remains in the navigation bar so you can jump between courses at any time. Selecting a course from the Course Chooser on the Home page will filter all information to just that course.
- You can search your To-do List to find specific activities.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949598.87/warc/CC-MAIN-20230331082653-20230331112653-00719.warc.gz
|
CC-MAIN-2023-14
| 1,431 | 25 |
https://storypitches.com/2020/04/22/twitter-short-story-the-chase-by-katy-crighton/
|
code
|
Two-year-old Rory’s only thought of the future was what to do with the feisty little chipmunk she was trying to catch. Tumbling and bumbling around the playground, each step extended her perpetual fall until she rolled over the balance beam that rested on the mulch.
Performed by Allison Kampf
Producer/Director: Matthew Toffolo http://www.matthewtoffolo.com
Festival Moderators: Matthew Toffolo, Rachel Elder
Casting Director: Sean Ballantyne
Editors: Kimberly Villarruel
Festival Directors: Rachel Elder, Natasha Levy
Camera Operators: Ryan Haines, Temitope Akinterinwa, Efren Zapata, Zack Arch
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539049.32/warc/CC-MAIN-20220521080921-20220521110921-00217.warc.gz
|
CC-MAIN-2022-21
| 598 | 8 |
http://hahut.pro-penosteklo.ru/intersexual-222.html
|
code
|
Some intersex traits are not always visible at birth; some babies may be born with ambiguous genitals, while others may have ambiguous internal organs (testes and ovaries).
The truth is that the vast majority of people with intersex conditions identify as male or female rather than transgender or transsexual.
Thus, where all people who identify as transgender or transsexual experience problems with their gender identity, only a small portion of intersex people experience these problems.
Intersex people face stigmatization and discrimination from birth or discovery of an intersex trait.
In some countries, documented in parts of Africa and Asia, this may include infanticide, abandonment and the stigmatization of families.
To better explain this, we can liken the sex spectrum to the color spectrum.
Intersex people possess any of several variations in sex characteristics including chromosomes, gonads, sex hormones, or genitals that, according to the UN Office of the High Commissioner for Human Rights, "do not fit the typical definitions for male or female bodies".
It’s also important to understand the differences between these two groups because in spite of some similarities they face many different struggles, including different forms of discrimination.
The differences between transgender and transsexual and intersex have been understood by lawmakers in countries such as Australia where lawmakers have publicly acknowledged that people with intersex conditions have distinct needs from people who identify as transgender or transsexual.
To answer this question in an uncontroversial way, you’d have to first get everyone to agree on what counts as intersex —and also to agree on what should count as strictly male or strictly female. How small does a penis have to be before it counts as intersex?
Do you count “sex chromosome” anomalies as intersex if there’s no apparent external sexual ambiguity?
Globally, some intersex infants and children, such as those with ambiguous outer genitalia, are surgically or hormonally altered to create more socially acceptable sex characteristics.Tags: Adult Dating, affair dating, sex dating
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178364764.57/warc/CC-MAIN-20210302190916-20210302220916-00237.warc.gz
|
CC-MAIN-2021-10
| 2,161 | 12 |
http://nthur.lib.nthu.edu.tw/handle/987654321/84005
|
code
|
This paper proposes a distributed packet protection mechanism that can minimize the packet loss probability for mesh based P2P video streaming systems. The proposed scheme combines a peer selection method with forward error correction (FEC) codes. The parent peers select the child peers, which can achieve the minimal packet loss probability compared to other candidate child peers, to transmit the FEC redundant substream. Moreover, the proposed scheme utilizes a packet loss model to estimate the packet loss probability in a mesh based P2P network. The packet loss propagation among peers is modeled through Markov random field (MRF). Simulation results demonstrate that our scheme can effectively mitigate packet loss in a mesh-based P2P network.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400201601.26/warc/CC-MAIN-20200921081428-20200921111428-00570.warc.gz
|
CC-MAIN-2020-40
| 751 | 1 |
https://feedback.acumatica.com/ideas/ACU-I-1370
|
code
|
The new Dashboards in Acumatica are much improved over the ones in 5.3. Plus, now we can show them in the mobile app, even better. But let's not stop, let's keep making them even better.
One way to make them better, I think, would be to add Dashboard Parameters. If you could define parameters for Dashboards that would be displayed on the top of the Dashboard, that would be very cool. They could function just like the Parameters tab in the Generic Inquiry screen.
When defining a new Dashboard Widget, you would need a way to pass a Dashboard Parameter to it. There is currently an INQUIRY PARAMETERS button on the widgets which opens a new window when you click it, but the Value column in that window is just a text field. If the Value column could accept a formula, including the new Dashboard Parameter (eg. @DashboardParameter1), then that would solve the problem.
Overall, this would function very much like a subreport in Report Designer where you still have to define a parameter in the report that you are calling, but you can pass a value to it when calling it on the main report.
It would also function similarly to the new Navigation feature in Generic Inquiry where you can create a formula that includes a parameter in the Parameter field in the Navigation Parameters section on the Navigation tab of the Generic Inquiry screen.
Many use cases for this, but here is one that I just heard from a partner who is demoing to a prospect: The prospect wants to see a 360 degree view of a customer. You could build a Customer dashboard that displays all sorts of KPI metrics about the customer (total open orders, total sales this year, total sales last year, number of open opportunities, etc.), with the ability to drill into the inquiries behind the KPIs. But you would need a Dashboard Parameter at the top so you could select the Customer and have all of the KPIs update with data about that Customer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738723.55/warc/CC-MAIN-20200810235513-20200811025513-00103.warc.gz
|
CC-MAIN-2020-34
| 1,916 | 6 |
https://dev.arvados.org/issues/13198
|
code
|
[Keep-web] Add metrics endpoint
Use same approach as keepstore metrics added in #13025 (prometheus, etc).Easiest metrics to provide:
- reqDuration (partitioned by method and status) using promhttp.InstrumentHandlerDuration
- timeToStatus (ditto) using log.AddHook, as in #13025
This should be refactored into a go package (sdk/go/httpserver?) instead of copying code from keepstore to keep-web.Keep-web specific metrics to provide:
- time to fetch block from keep
- cache hits, misses
#6 Updated by Peter Amstutz over 3 years ago
On the topic of metrics and health checks, we should add a page to the "Admin" section of documentation that describes which components have endpoints and how to use the health check aggregator. That would address the situation where no one remembers where we are with the project of implementing health checks / metrics, at least it would be written down.
#8 Updated by Tom Clegg about 3 years ago
13198-keep-web-metrics @ 0011b5236fc9a562bc13f943f9a431c496b2b7cd https://ci.curoverse.com/job/developer-run-tests/815/
#14 Updated by Tom Clegg about 3 years ago
13198-keep-web-metrics @ 413db07b4c81ea08663f90f31ee03227349d2be4 https://ci.curoverse.com/view/All/job/developer-run-tests/832/
This doesn't have "time to fetch block". It just exports the cache metrics we were already collecting (and exporting in status.json) and exports them as prometheus counters/gauges.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323583083.92/warc/CC-MAIN-20211015192439-20211015222439-00111.warc.gz
|
CC-MAIN-2021-43
| 1,401 | 14 |
https://boyleprojectconsulting.com/tomsblog/2018/06/19/extract-the-logic-plan-inside-your-schedule-project-virtual-conference-2018/
|
code
|
In June 2018 I had the privilege of speaking at the Project Virtual Conference 2018. The event was very well done and was supported by a number of key sponsors in the Microsoft Project consulting world. (Surprisingly, Microsoft was not among them.) I hope to have a chance to return in future years. My session focused on using BPC Logic Filter to examine schedule plans. The 55-minute session was recorded (link below).
There are a few lines I’d like to have back, especially the repeated reference to DCMA (the Defense Contract Management Agency) as the Defense Contract Management Association. Maybe I conflated DCMA with the NDIA (the National Defense Industry Association) to create this new fiction…. Both have issued comprehensive guides related to project schedule quality, and the Planning and Scheduling Excellence Guide (PASEG) from NDIA is one of the better ones out there.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948223038.94/warc/CC-MAIN-20240305060427-20240305090427-00785.warc.gz
|
CC-MAIN-2024-10
| 889 | 2 |
https://www.thebeautyofislam.com/practical-islam/stones-will-speak-against-the-oppressors-imran-hosein-animated/
|
code
|
STONES WILL SPEAK AGAINST THE OPPRESSORS! – Imran Hosein Animated Islamic Video
Donate link below for more videos!
Every penny counts towards making these videos 🙂
In this video Imran Hosein talks about how the Muslims are going to fight the zionist jews & Dajjal when Imam Al Mahdi comes & Jesus(as) returns to earth.
When this happens, even the stones are going to speak against the oppressors and tyrants who used to spread corruption in the land, even the stones will be fed up and assist the muslims in destroying the Zionist Jewish Elite who are constantly warmongering with their neighbours in pursuits of this Greater Israel Project.
So don’t loss hope! You have the upper hand, strive and struggle in the cause of Allah and be patient because Victory comes after Trials & Calamities.
Like, Comment & Subscribe
Peace be upon you
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711336.41/warc/CC-MAIN-20221208114402-20221208144402-00043.warc.gz
|
CC-MAIN-2022-49
| 843 | 8 |
http://www.computerworld.com/s/article/9084938/Microsoft_faults_OEMs_for_some_XP_SP3_endless_reboots_
|
code
|
Microsoft faults OEMs for some XP SP3 endless reboots
Reboot problem also happened in 2004 with XP2, says support doc
The document also showed that the "endless reboot" problem some users have reported after installing XP SP3 was neither unanticipated or new; Microsoft updated the document on the same day it released the service pack, and the company indicated that the same thing happened nearly four years ago when it rolled out Windows XP SP2.
On Monday, Microsoft confirmed the document's conclusions. "Microsoft is aware of a reboot issue experienced by some users who have attempted to install Windows XP SP3," a company spokeswoman said in an e-mail. "Microsoft issued guidance to OEMs advising them to only load Windows XP images onto like hardware in 2004."
Knowledge Base Article 888372, last updated May 6, spelled out an error message that stops a PC's boot process -- and, depending on the machine's settings, may make it repeatedly reboot -- after installing SP3. The fault, said the Microsoft document, is in the Windows XP image originally installed on the PC by the computer manufacturer.
"The problem may occur if the original Windows XP Service Pack 1 (SP1) Sysprep image is created on an Intel processor-based computer and if the Sysprep image is then deployed on a non-Intel processor-based computer," said Microsoft.
"Under this configuration, after the computer is upgraded to Windows XP SP2 or SP3, the Intel processor driver (Intelppm.sys) may try to load because an orphaned registry key remains from the original Sysprep image," the document continued. "This issue may also occur if the original Windows XP SP2 or Windows XP SP3 Sysprep image is created on an Intel processor-based computer and if it is then deployed onto a non-Intel processor-based computer. Again, the Intel processor driver (Intelppm.sys) may try to load because an orphaned registry key remains from the original Sysprep image."
A day after Microsoft added XP SP3 to Windows Update, users whose machines use processors from Advanced Micro Devices Inc., reported that they were rebooting endlessly. Many of them said that the crippled systems were from Hewlett-Packard Co.
"I too have an HP Pavilion with an AMD Athelon [sic] processor," said a user identified as "jrednasnh" in a message posted Saturday to a Microsoft support forum. "I find it discouraging that HP may be partially at fault and did not attempt to notify us AMD customers, nor attempt to fix the issue."
Jesper Johansson, a former program manager for security policy at Microsoft and currently an MVP (Microsoft Most Valuable Professional), worked with others to identify some of the reboot issues as involving PCs running AMD CPUs. Johansson, who said one of his HP PCs repeatedly rebooted after installing XP SP3, traded accounts with several other users on the newsgroup and summarized the results on his blog.
"The problem is that HP, and possibly other [manufacturers], deploy the same image to Intel-based desktops that they do to AMD-based desktops," Johansson said. "Microsoft points out in a Knowledge Base article that installing both drivers on the same computer is an unsupported configuration, putting the blame on the [manufacturer] that deploys the image. The article in question was written when the same problem occurred after installing Service Pack 2 for Windows XP." Microsoft unveiled XP SP2 in August 2004.
According to Johansson, only HP desktop models are affected. "It also appears that this is unique to their desktop image, and any HP AMD-based laptops are unaffected by the problem," he said.
As Johansson mentioned, Microsoft has dubbed the practice "unsupported" in KB888372. "We do not support using Sysprep to install an operating system from an image if the image was created by using a computer that has a different processor," said Microsoft. "For example, you cannot create a Sysprep image on a computer that has an Intel processor and deploy the image to a computer that has an AMD processor."
KB888372 instructed users how to modify the Windows registry to disable the errant Intel driver, assuming users could regain control of their PCs long enough to boot into Safe mode.
The company has also listed several other scenarios that [resellers] should avoid in another support document.
As of 1:30 p.m. EDT Monday, Hewlett-Packard had not responded to questions posed Sunday about how it built the Windows XP images on its AMD-powered PCs.
Read more about Windows in Computerworld's Windows Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Taking Windows Mobile on Any Device Taking Windows applications mobile has many advantages, but the process of identifying a solution is complex. Learn how to solve this complex problem...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Windows White Papers | Webcasts
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394021389272/warc/CC-MAIN-20140305120949-00071-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 5,908 | 32 |
http://piluf.com/33-literarywondrous-tommy-bahama-backpack-beach-chair-photo-design/tommy-bahama-backpack-cooler-beach-chair-review-october-furniture-home-literarywondrous-photo/
|
code
|
Published at Thursday, 19 October 2017 by Teresa Lawson in Furniture Home, with total 24 pictures.
the stairs is safeguarded as stair steps may become hazardous particularly when wet or worn out.
There are no other major distinctions between the two stair nosings, both serve the same purposes. Worn out stair
Presently several models of aluminium stair nosings are suggested for the protection and secure use of the
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893300.96/warc/CC-MAIN-20180124030651-20180124050651-00427.warc.gz
|
CC-MAIN-2018-05
| 416 | 4 |
https://blenderartists.org/t/trees/1354096
|
code
|
It looks kind of boring right now, feedback is appreciated!
Are the trees realistic enough?
I think the tree texture looks weird and the leaves are not realistic, can you show me the leaf shader?
In my opinion, the trees are pretty realistic and you are overall on the right path. However I see a few things happening:
-The bench looks tiny in the picture and is in the shade, which means that it’s a bit hard to notice and the picture seems to have no focus or main point of interest.
-The sunlight attracts the eye exactly in the parts of the image where there is nothing.
-The trees look like they are all the same size. Also, we can see the sky under them, which makes it look like the forest is tiny. That area could use a bit of foliage (though this might also not look good, you would have to try and decide yourself).
-I can’t quite tell if this place is supposed to be more of a wild and natural area or a well maintained garden. If it’s a forest, I would expect many different sizes of trees, as well as rocks, stumps, broken branches and different kinds of grasses, flowers and bushes on the ground. If it’s a garden, I would expect more signs of human presence such as stone paths, hedges, maybe flower beds.
-Finally, a lot of the interest in this scene would come from better image composition, so I would recommend searching for tutorials on this topic.
So these are my suggestions. However, only you know what vision you have for this piece, so don’t hesitate to try different stuff.
Thanks for the feedback!
I do see this as more of a maintained area, hence no small trees / shrubs / etc… sort of a fancy dog park. The bench is to help show scale of trees, but is a poor focus point for sure.
I featured you on BlenderNation, have a great weekend!
Hey, that’s a really cool scene!
Maybe it’s lacking a little story? I can imagine that a couple of characters around the bench could build a narrative pretty quickly.
For general enhancement, I suggest you look at the following youtube video: https://www.youtube.com/watch?v=J-zfEqMQS88
It seems to be spot-on for your question.
You could also consider adding at least a gradient at the bottom of your trunks. The tiled texture shows a little, and real trees have very complex and patterned bases. I’d either get a 3D scan on the tree on the forefront, or work through procedural shading. If you have the opportunity, concentrating leaves around the end of the branches could also help (looks like there is quite a bit of mass in the center, where real leaves would not get access to light).
If you’re interested to go down the 3D scan route, I’d advise you look at this:
Wow, wasn’t expecting that lol
Thanks @bartv !
Hey, thanks, I appreciate the feedback!
The trees and and tree material are both procedural. I think the pattern you mention might be just the consistent size of the Voronoi texture. I will work on that some more to add different size cells. Texturing a procedurally generated tree is a very tricky process. The goal is to be as good as the photo scanned trees.
I am glad you mentioned the leaf distribution, it seemed off to me, now I know why (however, trees can be pretty weird in nature too).
I was hoping I could stay away from adding anything other than nature, wanted this to be a beautiful photo of a landscape, but it just looks ok
As both a tree lover and procedural lover, I feel you. But as of now, I did not succeed in reproducing the same amount of detail through procedural materials. I think that 2 things are usually lacking:
Note that I’m only digressing on the subject, and not criticising your render. It looks stunning as is.
Also bugs in GN didn’t help
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500357.3/warc/CC-MAIN-20230206181343-20230206211343-00844.warc.gz
|
CC-MAIN-2023-06
| 3,686 | 28 |
http://www.pearltrees.com/t/html5/id2689887
|
code
|
Avoiding common HTML5 mistakes. Between curating sites for the HTML5 gallery and answering readers’ questions here at HTML5 Doctor, I see a host of HTML5 sites and their underlying markup.
In this post, I’ll show you some of the mistakes and poor markup practices I often see and explain how to avoid them. Don’t use section as a wrapper for styling One of the most common problems I see in people’s markup is the arbitrary replacement of <div>s with HTML5 sectioning elements — specifically, replacing wrapper <div>s (used for styling) with <section>s. In XHTML or HTML4, I would see something like this: <! Now, I’m instead seeing this: <! Frankly, that’s just wrong: <section> is not a wrapper. With that in mind, here’s the correct way to mark up the above example using HTML5 and a couple of ARIA roles.
<body> <header> <h1>My super duper page</h1> <! If you’re not quite sure which element to use, then I suggest you refer to our HTML5 sectioning content element flowchart to guide you along your way.
Html5 games. HTML5 Encoding Secrets. HTML5 Encoding Secrets After viewing this video, video publishers will have all the information they need to encode and stream to HTML5 browsers.
Companies Mentioned: An hour is all a developer needs to begin working with MPEG4/H.264 and WebM video. That's the length of Jan Ozer's information-packed session How To: Encoding Video for HTML5 at the recent Streaming Media East conference in New York City. Presenting detailed information on both formats, as well as the codecs that drive them, Ozer gave viewers the knowledge they need to stream to HTML5 browsers. "One of the benefits, I think, of Google announcing WebM, is before they did there was some chance that we may have ended up paying for royalties for H.264 in 2015," said Ozer. "And then Google bought On2, the VP8 codec, then they open-sourced it, and right after Google open-sourced VP8 as WebM, MPEG LA said, 'No royalties ever on free Internet video.' The ultimate HTML5 resource guide.
Despite the fact that the HTML5 specification won’t officially be finished until 2022, (though it will be mostly finalized by 2014), a lot of designers are already diving into the parts of HTML5 that currently have support in modern browsers.
As it's Blink's first birthday, let's take a brief look at where we've got to. Read more… Introducing the world’s most useless extension By Andreas Bovens · Tuesday, April 1, 2014 0 We're proud to introduce the world’s most useless extension for your daily use and enjoyment. Read more… Removing showModalDialog() from the Web platform By Mathias Bynens · Thursday, March 27, 2014 0 The showModalDialog() API is being removed from the Web platform.
This post explains why, and what the consequences are for web developers. Read more… Practical application and usage of the W3C Device Orientation API By Rich Tibbett · Wednesday, March 26, 2014 0 The W3C's device orientation API allows us to determine the orientation of a device in physical space. Dive Into HTML5. HTML5 Readiness. What is HTML5? (Infographic) Element Index. Seriously, What is HTML5? I’m tired of people getting confused.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701171770.2/warc/CC-MAIN-20160205193931-00213-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 3,168 | 8 |
https://www.mathworks.com/help/deeplearning/ug/deep-learning-in-matlab.html;jsessionid=cfb00bec060bfcb8101ac6ef5910
|
code
|
Deep Learning in MATLAB
What Is Deep Learning?
Deep learning is a branch of machine learning that teaches computers to do what comes naturally to humans: learn from experience. Machine learning algorithms use computational methods to “learn” information directly from data without relying on a predetermined equation as a model. Deep learning is especially suited for image recognition, which is important for solving problems such as facial recognition, motion detection, and many advanced driver assistance technologies such as autonomous driving, lane detection, pedestrian detection, and autonomous parking.
Deep Learning Toolbox™ provides simple MATLAB® commands for creating and interconnecting the layers of a deep neural network. Examples and pretrained networks make it easy to use MATLAB for deep learning, even without knowledge of advanced computer vision algorithms or neural networks.
For a free hands-on introduction to practical deep learning methods, see Deep Learning Onramp.
|What Do You Want to Do?||Learn More|
|Perform transfer learning to fine-tune a network with your data|
Fine-tuning a pretrained network to learn a new task is typically much faster and easier than training a new network.
|Classify images with pretrained networks||Pretrained Deep Neural Networks|
|Create a new deep neural network for classification or regression|
|Resize, rotate, or preprocess images for training or prediction||Preprocess Images for Deep Learning|
|Label your image data automatically based on folder names, or interactively using an app|
Image Labeler (Computer Vision Toolbox)
|Create deep learning networks for sequence and time series data.|
|Classify each pixel of an image (for example, road, car, pedestrian)||Getting Started with Semantic Segmentation Using Deep Learning (Computer Vision Toolbox)|
|Detect and recognize objects in images||Recognition, Object Detection, and Semantic Segmentation (Computer Vision Toolbox)|
|Classify text data||Classify Text Data Using Deep Learning|
|Classify audio data for speech recognition||Speech Command Recognition Using Deep Learning|
|Visualize what features networks have learned|
|Train on CPU, GPU, multiple GPUs, in parallel on your desktop or on clusters in the cloud, and work with data sets too large to fit in memory|
To learn more about deep learning application areas, including automated driving, see Deep Learning Applications.
To choose whether to use a pretrained network or create a new deep network, consider the scenarios in this table.
|Use a Pretrained Network for Transfer Learning||Create a New Deep Network|
|Training Data||Hundreds to thousands of labeled images (small)||Thousands to millions of labeled images|
|Computation||Moderate computation (GPU optional)||Compute intensive (requires GPU for speed)|
|Training Time||Seconds to minutes||Days to weeks for real problems|
|Model Accuracy||Good, depends on the pretrained model||High, but can overfit to small data sets|
For more information, see Choose Network Architecture.
Deep learning uses neural networks to learn useful representations of features directly from data. Neural networks combine multiple nonlinear processing layers, using simple elements operating in parallel and inspired by biological nervous systems. Deep learning models can achieve state-of-the-art accuracy in object classification, sometimes exceeding human-level performance.
You train models using a large set of labeled data and neural network architectures that contain many layers, usually including some convolutional layers. Training these models is computationally intensive and you can usually accelerate training by using a high performance GPU. This diagram shows how convolutional neural networks combine layers that automatically learn features from many images to classify new images.
Many deep learning applications use image files, and sometimes millions of image files. To
access many image files for deep learning efficiently, MATLAB provides the
imageDatastore function. Use this
Automatically read batches of images for faster processing in machine learning and computer vision applications
Import data from image collections that are too large to fit in memory
Label your image data automatically based on folder names
Try Deep Learning in 10 Lines of MATLAB Code
This example shows how to use deep learning to identify objects on a live webcam using only 10 lines of MATLAB code. Try the example to see how simple it is to get started with deep learning in MATLAB.
Run these commands to get the downloads if needed, connect to the webcam, and get a pretrained neural network.
camera = webcam; % Connect to the camera net = alexnet; % Load the neural network
If you need to install the
alexnetadd-ons, a message from each function appears with a link to help you download the free add-ons using Add-On Explorer. Alternatively, see Deep Learning Toolbox Model for AlexNet Network and MATLAB Support Package for USB Webcams.
After you install Deep Learning Toolbox Model for AlexNet Network, you can use it to classify images. AlexNet is a pretrained convolutional neural network (CNN) that has been trained on more than a million images and can classify images into 1000 object categories (for example, keyboard, mouse, coffee mug, pencil, and many animals).
Run the following code to show and classify live images. Point the webcam at an object and the neural network reports what class of object it thinks the webcam is showing. It will keep classifying images until you press Ctrl+C. The code resizes the image for the network using
while true im = snapshot(camera); % Take a picture image(im); % Show the picture im = imresize(im,[227 227]); % Resize the picture for alexnet label = classify(net,im); % Classify the picture title(char(label)); % Show the class label drawnow end
In this example, the network correctly classifies a coffee mug. Experiment with objects in your surroundings to see how accurate the network is.
To watch a video of this example, see Deep Learning in 11 Lines of MATLAB Code.
To learn how to extend this example and show the probability scores of classes, see Classify Webcam Images Using Deep Learning.
For next steps in deep learning, you can use the pretrained network for other tasks. Solve new classification problems on your image data with transfer learning or feature extraction. For examples, see Start Deep Learning Faster Using Transfer Learning and Train Classifiers Using Features Extracted from Pretrained Networks. To try other pretrained networks, see Pretrained Deep Neural Networks.
Start Deep Learning Faster Using Transfer Learning
Transfer learning is commonly used in deep learning applications. You can take a pretrained network and use it as a starting point to learn a new task. Fine-tuning a network with transfer learning is much faster and easier than training from scratch. You can quickly make the network learn a new task using a smaller number of training images. The advantage of transfer learning is that the pretrained network has already learned a rich set of features that can be applied to a wide range of other similar tasks.
For example, if you take a network trained on thousands or millions of images, you can retrain it for new object detection using only hundreds of images. You can effectively fine-tune a pretrained network with much smaller data sets than the original training data. If you have a very large dataset, then transfer learning might not be faster than training a new network.
Transfer learning enables you to:
Transfer the learned features of a pretrained network to a new problem
Transfer learning is faster and easier than training a new network
Reduce training time and dataset size
Perform deep learning without needing to learn how to create a whole new network
For an interactive example, see Transfer Learning with Deep Network Designer.
For a programmatic example, see Train Deep Learning Network to Classify New Images.
Train Classifiers Using Features Extracted from Pretrained Networks
Feature extraction allows you to use the power of pretrained networks without investing time
and effort into training. Feature extraction can be the fastest way to use deep
learning. You extract learned features from a pretrained network, and use those features
to train a classifier, for example, a support vector machine (SVM — requires
Statistics and Machine Learning Toolbox™). For example, if an SVM trained using
achieve >90% accuracy on your training and validation set, then fine-tuning with
transfer learning might not be worth the effort to gain some extra accuracy. If you
perform fine-tuning on a small dataset, then you also risk overfitting. If the SVM
cannot achieve good enough accuracy for your application, then fine-tuning is worth the
effort to seek higher accuracy.
For an example, see Extract Image Features Using Pretrained Network.
Deep Learning with Big Data on CPUs, GPUs, in Parallel, and on the Cloud
Neural networks are inherently parallel algorithms. You can take advantage of this parallelism by using Parallel Computing Toolbox™ to distribute training across multicore CPUs, graphical processing units (GPUs), and clusters of computers with multiple CPUs and GPUs.
Training deep networks is extremely computationally intensive and you can usually accelerate training by using a high performance GPU. If you do not have a suitable GPU, you can train on one or more CPU cores instead. You can train a convolutional neural network on a single GPU or CPU, or on multiple GPUs or CPU cores, or in parallel on a cluster. Using GPU or parallel options requires Parallel Computing Toolbox.
You do not need multiple computers to solve problems using data sets too large to fit in
memory. You can use the
imageDatastore function to work with
batches of data without needing a cluster of machines. However, if you have a cluster
available, it can be helpful to take your code to the data repository rather than moving
large amounts of data around.
To learn more about deep learning with large data sets, see Deep Learning with Big Data.
- Classify Webcam Images Using Deep Learning
- Transfer Learning with Deep Network Designer
- Train Deep Learning Network to Classify New Images
- Pretrained Deep Neural Networks
- Create Simple Deep Learning Network for Classification
- Scale Up Deep Learning in Parallel, on GPUs, and in the Cloud
- Deep Learning with Big Data
- Recognition, Object Detection, and Semantic Segmentation (Computer Vision Toolbox)
- Classify Text Data Using Deep Learning
- Deep Learning Tips and Tricks
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300810.66/warc/CC-MAIN-20220118092443-20220118122443-00556.warc.gz
|
CC-MAIN-2022-05
| 10,590 | 91 |
https://publica.fraunhofer.de/handle/publica/396749
|
code
|
FuhSen: A federated hybrid search engine for building a knowledge graph on-demand
A vast amount of information about various types of entities is spread across the Web, e.g., people or organizations on the Social Web, product offers on the Deep Web or on the Dark Web. These data sources can comprise heterogeneous data and are equipped with different search capabilities e.g., Search API. End users such as investigators from law enforcement institutions searching for traces and connections of organized crime have to deal with these interoperability problems not only during search time but also while merging data collected from different sources. We devise FuhSen, a keyword-based federated engine that exploits the search capabilities of heterogeneous sources during query processing and generates knowledge graphs on-demand applying an RDF-Molecule integration approach in response to keyword-based queries. The resulting knowledge graph describes the semantics of entities collected from the integrated sources, as well as relationships among these entities. Furthermore, FuhSen utilizes ontologies to describe the available sources in terms of content and search capabilities and exploits this knowledge to select the sources relevant for answering a keyword-based query. We conducted a user evaluation where FuhSen is compared to traditional search engines. FuhSen semantic search capabilities allow users to complete search tasks that could not be accomplished with traditional Web search engines during the evaluation study.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334579.46/warc/CC-MAIN-20220925132046-20220925162046-00710.warc.gz
|
CC-MAIN-2022-40
| 1,536 | 2 |
https://hibernate.atlassian.net/browse/HSEARCH-168
|
code
|
Ability to disable automatic indexing both on a per index level and programmatically
It is very resticitive in an application that has multiple indexes to only allow the disabling of automatic indexing on an application wide level (or at least SessionFactory wide...). I can see it being very useful to have auto indexing on a per index basis.
Also, it would be nice to be able to turn auto indexing off and on programmatically using something like
I think these use cases are very reasonable so I'll optimistically schedule this to be done for version 5.1
Thanks for reminding of this old issue!
I need to be able to do this too...I have a process that runs and sometimes I do a bulk insert and I need the insert to run quickly and then do the mass indexing later but under normal circumstances I want the event indexing to take place. The Event based indexing is causing my bulk insert to take a lot longer so if I could turn it off programmatically and then reenable it later, it would be extremely useful.
I found this issue while searching for a way to temporarily disable the indexing. My use case is that the app can generate test data itself at startup when needed. Transparent indexing dramatically slows down this process as batch updates cannot be used during this process (hierarchies are being created). The app also does a partial, manual re-indexing of changed entities since the app was last stopped to catch external updates to the database while it was down.
I would really much like the ability to disable transparent indexing while my test dataset is being generated. Thereafter, the partial re-indexing will occur and batch index these new entities.
Thank you for this great piece of software.
You will need to give me good use cases for both per index indexing and programmatic indexing.
There are strong reasons why this is not the case today.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088731.42/warc/CC-MAIN-20210416065116-20210416095116-00591.warc.gz
|
CC-MAIN-2021-17
| 1,866 | 11 |
https://devforum.roblox.com/t/nevermind-this-request/52275
|
code
|
As a Roblox developer, it is currently too hard (uses unnecessary memory, anyway) to know what value a Value Instance used to have if the change is not essentially predictable, or the game's scripts simply aren't written to remember them. It would be much easier if Roblox could fire also the Value's old value after its new value in the Changed signal.
RBXScriptSignal Changed (property value, property oldvalue)
script.StringValue.Value = 5
print(newval, oldval) – Prints (5,0)
The way my game is set up, I need Value Instances to hold data to be read by multiple scripts. I’m currently using a hacky method of remembering their old values, but I feel this is a bit too data-heavy, so it would be better if Roblox could just tell me what the old values are before they change. This could also be a new method of checking security.
Alright, alright, I already have several people messaging me saying “duh it’s easy to remember the old value”. I just feel like it should be easier to know the old value without having to use up that much more memory to save it as a variable. I don’t know why I should have to waste memory recording the variables when I only need to know what it was before it changed. We may as well not fire the new value in the first place since you can already fetch it so easily, yes? Close the thread if you want.
What do you use the old value for?
Mostly for the server to verify a player’s game statistics, to make sure that they aren’t changing too much or too little. I need the values to be visible by the client so this is largely for data protection.
OP gave a bad example, and is not a good case for why this would be useful. It’s already possible to know the old value by storing it in a variable every Changed fire, so we should be looking at why this would be more convenient than storing the old value in a variable. @dragonfrosting please try to tailor your feedback to this.
It’s really simple to track the last value of an object. I guess the biggest benefit of this feature would be to have a stateless event.
This seems like a pretty niche use case considering you can already do this yourself and it seems like this only applies in non FE games. It would be complicated to add and would cause events to fire slightly slower (more data to send over the Lua bridge) so I don’t think this feature is worth adding.
This seems like more of a misunderstanding of how resource usage works than a need for a feature. Resource usage is only a problem when it has a negative effect – not “it seems like I’m using too much”. The memory used by storing a few variables is negligible – saving this negligible amount of memory would cause a much more noticeable decrease in event speed because more data has to be sent across the network, as TheGamer101 mentioned.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296820065.92/warc/CC-MAIN-20240425000826-20240425030826-00424.warc.gz
|
CC-MAIN-2024-18
| 2,823 | 12 |
https://ltgtrfestival.com/schemas_different_from_attorney.zcl
|
code
|
Amazon Affiliate Disclaimer Altuve
School Blogs Find Out More About What We Do?
Users with the necessary privileges can access objects across multiple schemas in a database.
Serverless application platform for apps and back ends.
The optimizer uses a nested loops algorithm for EXISTS subqueries by default, views, and vice versa.
The user is only associated with the schema of the same name and often the terms will be used interchangeably.
Select the columns to be included in your query by clicking the check box to the left of the column name.
It seems to think the SAS dataset is an Oracle table because of the connect statement.
If you have two similar long names for columns, enter the name of the primary key.
Senior Management Team
- Promotional Products Supplier
- Amazon Prime Free Trial Without Credit Card
- You can enable star transformation by setting the value of the initialization parameter STAR_TRANSFORMATION_ENABLED to TRUE.
BITMAP KEY ITERATION row source which fetches values from the subquery row source tree, views, just put it in a different rule block.
We also compute the ordering for this joined set based on age, meaning the same across software platforms, try to use the smallest data type that can correctly store and represent your data.
Outlook Cannot Connect To Gmail Keeps Asking For Password Providers For FormALOK Speaks Of Going Beyond The Gender Binary To Kick Off Pride Week
When creating a standard ODBC table, the queue looks like it did in the beginning.
Do I Have To Pay Car Insurance While Not Driving
Data Insiden Keselamatan Pasien Di Indonesia
Awakening To The Potential Of Artificial Intelligence In Coffee
Bridging The Sustainability Gap With Common Property Rights
The Switch Tables batch strategy differs depending on whether the origin performs full table or partition processing.
Toad and see the data in toad.
Get the tables in one database if you want to join them.
Hopefully this helps but if I am still misunderstanding what you are doing please let me know.
Configure the tables from different schemas and improve performance of
This batch to synchronize the optimizer then joins from different schemas
Slenderella Dobby Cotton Short Sleeve Nightdress
Making Electromagnetic Weapons
Find The Right Bedroom Furniture At EF Brannon
Women Of Childbearing Age And Pregnant Women Who Are Taking Opioids
Which of the following operators is not allowed in an outer join?
Cena Of New Service
This batch strategy to end the package constants for joining tables from different schemas but look at work
It is the intent to provide valuable information and best practices, controlling, and FULL keywords are equivalent.
So the database returns all its rows.
Cisco Cloud Security Identity And Access Management
Enables entering credentials on the Credentials tab.
Which of the following queries will solve the purpose?
The ON clause makes code easy to understand.
Outer join types and from different issue, for the version of data vault model
Bold New Art Exhibition Celebrates Shetland Nature
And then takes over inner join between oracle joining tables from different schemas to a scrollable cursor.
To edit a query, the origin reads all available data from each table when you start the pipeline.
Thank you both, and this will automatically identify all exposures to drugs containing lisinopril.
The table and sql generated for joining tables are as a pull request may not enforced by alias.
My Online Business As A Content Creator And Educator
From multiple databases are you need and the from different parts
How about a summary of what Data Masker does?
Department Of International Relations
To include unmatched records in the results, it would be great if this was fixed already.
You are no longer logged in.
With a different tables, or existing applications and delivery platform on
View the number of database objects by type for the selected schema.
You need a subscription to comment.
The answer will become way too long.
They are described later in this section.
The Attribute Dictionary page displays a report of all attributes in your workspace.
Next I create a BMM and put them into it and create logical fact and dimension tables.
Macam Macam Teknik Pengumpulan Data Kualitatif
How we are connected to make your results to different schemas, postgres will also describes recommended
We recommend laracasts news and different schemas are used against the form of the aspects.
Service for creating and managing Google Cloud resources.
- Huzoor Tajushshariah Ka Paigam Ahle Sunnat Ke Naa
- Information For Healthcare Professionals
- Hall Of Fame Nomination Form
- Enabling Wind Power System Integration
As tables from different schemas but they store
Storage on concatenated index combinations to constraints must specify tables from tables different schemas; the database that significantly simplifies analytics tools for the object details on a list of the life.
If the current value is empty, creating a batch from its cached result set.
Which of different schemas as needed
You can solve both of these problems by using denormalized views.
SQL query for processing.
This create this easier to different tables from some point you remove all files and.
Oracle technology is changing and we strive to update our BC Oracle support information.
Have a question about this project?
We implement custom root certificate installed from different
Rapid deployment and installation.
One of the functions of the package is to support parameterization of SQL.
Each column can have an individual dataset configured and the rule only makes a single pass through the table.
Data referenced by different tables
We now want to see what we have as spectroscopic values and where they come from.
We hoped that the caching and other features would mean that joins between two schemas or JDBC sources would be faster than materialized views, they should be in the same database.
Infrastructure and application health with rich metrics.
The optimizer then estimates the cost of each plan and chooses the one with the lowest cost.
Set of sql query populate the different tables from schemas, if they are the instead
Video classification and recognition using machine learning.
National Seminar On SDG Held At IUBAT
To provide a backward compatible interface to emulate a table whose schema has changed.
Click Here To Sign Up For The KCKPS District Newsletter
NULL join columns that an SQL query author cannot modify and which cause inner joins to omit data with no indication of an error.
It also treats unpartitioned tables as a single partition.
Have you ever worked with Oracle database?
Usually, UNIONs, the view again becomes usable.
Service is empty strings to join
Backstage With Gentry Thomas
The Farberware Air Fryer Toaster Oven And How To Use It Effectively
Researchers Discover Extraocular Light Sensing System In Flatworms
This is because the trailing spaces will be trimmed from the value to be stored.
This can be done using a special subtype of ODBC table.
Occasionally you may need to write queries that use several values as criteria.
Noida Medical College Mci Recognized Medical College In Noida
UN Committee On The Elimination Of Discrimination Against Women
The Place Where You Find Simple And Best Textile Notes
Village Virgin Sick Of Donating Blood To Every Ritual Sacrifice
Enter the from different data is accessed many different results of rows?
PROMOTING THE BETTERMENT OF WATER QUALITY AROUND THE GLOBE
Hector Slam Mapping And Indoor Positioning ROBOT With ROS And Lidar
Creamos Un Contenedor En Html Que Llamaremos Con El Id CajaCode
And in the back end SQL query we can find a additional in statement using parameters.
As tables will pull from different tables
How to access Oracle data residing in separate sch.
Displays the observation_period table joining tables from different schemas but even when the origin generates a device
All of them actually.
Codeigniter table joining queries are used to join two database tables.
Chris helps clients around the world adopt the microservice architecture through consulting engagements, to make them easier to write and work with.
Use a query optimizer chooses the different tables and sap answers
When i do not different tables from schemas.
These tables are given the type ODBC.
Using union command against threats to merge or rather than joining tables
This could possibly lead to you unintentionally dropping the wrong object.
Can a computer determine whether a mathematical statement is true or not?
We will compute the incidence rate in the first week following treatment initiation, Comment, which are used more than once.
Andrew the table reports containing the different tables from the emp table
Thanks for the reply.
Two tables from different schemas but same db what SQ or.
Displays statistics about the cursors in the Oracle database.
Migrate and run your VMware workloads natively on Google Cloud.
Business And Contractual Relations In Post Corona Virus World
Reference templates for Deployment Manager and Terraform.
Choose the smallest size that can hold your required range of values, the Initial Table Order Strategy advanced property can affect the order.
Automate repeatable tasks for one machine or millions.
API works by copying rows between the server and the storage engine in a row buffer format; the server then decodes the buffer into columns.
International Conference On Manufacturing Science And Engineering
It can we recommend doing customer information with new sql standard odbc tables from different schemas
This be normalized schema or large amount being read tables from different schemas they do
This leaves A in the front of the queue.
For more information about configuring a fetch size, selects via dblink, you can increase the size of the Design and Result panes.
The behavior around caching the result set and the number of batches to process from the result set is the same, peering, a common column must exist.
Dbs in different tables must represent the other schemas to the greatest number
Class name for the JDBC driver.
In this case, change the name of the database before you publish the package to Prod.
Another way to have the result set in memory is to use the memory option.
The comma on the third line should probably be JOIN.
To go with odbc tables from a specific application performance of
Les Cryptomonnaies De Demain Ne Seront Pas Celles Que Vous Croyez
You can compare all objects in the schemas or limit your report to specific objects.
Community Pharmacy South Central Statutory DUAL used nested loops and was very fast.
Select in oracle to do i fix this from tables, the underlying schema of
Maintaining a data warehouse is costly.
Enter Your Email Address To Sign Up For Our Newsletter
Integer that indicates the version of the event record type.
The Generate DDL Wizard appears.
Please note that other Pearson websites and online products and services have their own separate privacy policies.
Private Git repository to store, the origin continues reading with the next offset and skips some rows with the current timestamp.
You can use this file to import user interface defaults to another database and Oracle Application Express instance.
See this matrix for information about which joins you can create, generates a result set, or generating summary tables can also be a big win.
Teaching tools to provide more engaging learning experiences.
Quantum Resonance Magnetic Analyzer Installer Free Download
JDBC Multitable Consumer events can be used in any logical way.
The member tables cannot have indexes created on computed columns in the table.
In particular, name.
Whistleblower Protections And Laws In South Korea
It produces an error because the join order of the tables is incorrect.
You can define the initial order that the origin uses to read the tables.
Enterprise needs work and tables from two column in
Install the repetition from tables from the same connection
The name is split using underscores.
Yes, and in the CPU cache.
This default connect tableau desktop in output, tables from it but now let me in the back ends.
Select an object from the Object Selection pane.
Why Virtual Reality Is Set To Transform Mental Health Treatment
How To Make Your Bedroom An Ideal Place To Sleep
After that you from tables using and number of the best regular intervals
This query returns a list of tables and their columns with details.
It only takes a minute to sign up.
Now, company or government agency, which may not be what you want.
How about with good performance?
Employment Information For Employers
Are you sure you want to perform this operation?
Second French Workshop On Corporate Governance
Each column in addition, each into visual mode queries to different from its objects must be
Any suggestions would be appreciated!
Note that have an identifier column description, oracle tables as b contains the earliest system.
Oracle database users, consecutive partitions from the same table to the end of the queue.
AS HRMS ON PMT.
How to use this table and specify the command to send?
Services And Support For Aboriginal Jobseekers
But it supports database connections and the remote query has just to oracle tables from different schemas are allowed to
This process creates a generic join between the table or view and the other table, the Database Engine raises an error.
These operations currently include many backup and recovery functions, if tables with the same name are present in several schemas and the schema name is not specified, a denormalized schema can speed up some types of queries but slow down others.
Use this statement to create a view of the data in one or more tables in the database.
The result is an empty table on the database server.
Creamy Spiced Pumpkin Soup With Toasted Pistachios
The tables from
Oracle can perform a cluster join only for an equijoin that equates the cluster key columns of two tables in the same cluster.
Using SQL and R, the result columns of the join consist of the concatenation of all columns of the joined tables.
The two tables from complex queries, then compute the file to read in a procedure call sqoop specifying a given table from tables with subsecond resolution?
It must be equal to or greater than the value defined for the Number of Threads property.
Maximum number of batches to create from a result set.
Oxford Dictionary Torrent Free Download Full Version
Marketing you the oracle sql developer, from tables different schemas into rpd
I need to join two tables for two different schemas under the.
WITH CHECK OPTION clause.
The logical impact is the same, LAST_NAME, an object is created within the first schema in the search path of the database.
Analytics and collaboration tools for the retail value chain.
Used With Permission From The Syndics Of Cambridge University Library
Boss Clue Crossword
The date lookup tables because different tables from schemas to view or more engaging learning
Can we use join for two different database tables?
Unfortunately you cannot join two tables from different database in single information link.
Length of the column in bytes.
While this is allowed, and the operations required by the rest of the query.
Quand Un Atelier Mode Se Transforme En Moment Inoubliable Entre Amies
Bethel Is Only Kansas College Selected For Racial Healing Institute
Tql has the partition pairs of ten best suited to set from tables different schemas; the validity range
Join data from 2 Oracle tables located in different database on the Get the data.
You export user interface defaults in the same way you export any related application file.
But did you not experience a hash join in the remote query with local dual, and manage APIs with a fully managed gateway.
This definition ignores the FIRST_NAME, except that schemas cannot be nested.
Sometimes it comes down to trialling different types of queries to get one that gives you the.
Principles To Improve The Effectiveness Of Instructional Videos
Piloting Of A Mentoring Approach As Part Of The ORION Project
In second schema and which of bytes to make use from different
Choose The Capacity Size Of Fire Protection Tank That You Need
Wildcard table to apply column exists subqueries that equates the result set being applied to oracle tables from different schemas sorted by selecting controls for example.
Files for any of employees of joining tables from different schemas in memory consumption of employees and building web and left, threads and satellites for future use driving table?
How to do it can be stored on an inner join and analyzing, connect will display deltas is different from.
Upload an XML document.
Why Traditional Maintenance Cannot Meet The Needs Of Business Today
Sid Dillon Chevrolet Buick Chrysler Dodge Jeep Ram Ford Crete
You choose an sql functions and glossary support views so while this in different tables
California law and applies to personal information of California residents collected in connection with this site and the Services.
Here we seek to replicate this finding, you can resize Design and Results panes by selecting the gray horizontal rule in the center of the page.
Is there an explanation?
Utilizing user interface defaults can save valuable development time and has the added benefit of providing consistency across multiple pages in an application.
Guide To Purchasing Composted Soil Amendments For Agricultural Use
Oracle Virtual Directory Administration Training
Same stands for the customers.
But some suggestions for tables from the natural join
You can also use hints to improve the plan.
In the columns for the view, depending on your data.
|FOUNDATION||Cloud services for extending and modernizing legacy apps. In|
|Title IX Compliance||Tricks On How To Remove Water Stains From Hardwood Floors|
|PRIVACY STATEMENT||Fluorescent Common Blue Opal Gemstone Polished Slice Slab|
|Boating Under The Influence||SQL IN Predicate: With IN List or With Array?|
|Upgrade Your Experience||The files are in a proprietary binary format.|
The view which might show columns are physically represented by different from one masking set for many thanks
After the initial defaults are created, you can use the sequence name given or update it as necessary.
Usually, some drivers prefetch the rows for each table to reduce the number of round trips to the database, the columns must be referred using the same.
Can I Still Get A Mortgage With A Poor Credit Profile
Developing Successful Interpersonal Skills
The survey questions relating to different tables from the upper left corner
The COHORT table is defined in the CDM, API Composition, and tools.
Connecticut State Firefighters Association
This is much faster and results in a defragmented, and worldwide events.
This script and tables from different schemas are you can easily adapt them
JDBC driver for the database.
Natural join instructs Oracle to identify columns with identical names between the source and target tables.
SQL joins and how to use them Launch School.
After the append symbol in the result pane comes another line from the bottom.
Around since ever, the view is called distributed partitioned view, these tables are not accessed in the query.
This has several benefits.
With a very useful to be refreshed and tables from different schemas
Memory size required is calculated during the first sequential table read.
Which combination of joins used in the blanks in the above query gives the correct output?
Part_type and bottommost are physically represented by services are oracle tables used to specify a third subquery
Debugging parameterized SQL can be a bit complicated.
Empathy Is My Superpower And Kryptonite
The Top SQL page appears.
Premium Members Attend Masterclasses For Free Nonaka Yuki No From
If tables without primary keys or table joining tables and unified platform for all other services
Please select a reason below or use the text box to input your own reason.
All occurences of mag will be marked.
Come inside, if you go to the physical layer diagram, the star transformation is based on combining bitmap indexes on individual fact table columns.
Load XML Data Wizard appears.
His or tables you can expect a weird query joining tables in two or right
Disables foreign keys in the target database.
Here again, which among the following will be the best practice?
If you do not obliged to information from tables different schemas
Data warehouse for business agility and insights.
If chaining, we lose all records about the department itself.
What An RAF Pilot Can Teach Us About Being Safe On The Road
The following left joins toys and bricks on their IDs.
This allows us if you different from the table dictionary page
When loading into a new table, then the second column of the next query needs to be datetime, unsupported technique.
IF I do something in a wrong way, which was not displayed in the example above.
Employee e INNER JOIN Person.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710936.10/warc/CC-MAIN-20221203175958-20221203205958-00638.warc.gz
|
CC-MAIN-2022-49
| 20,926 | 288 |
https://www.cyprusjobs.com/jobs/job/94120/devops-engineer
|
code
|
CyprusNet is not responsible or liable for any scams, frauds, misleading job offerings or false resume information within Cyprus Jobs free service. We strongly recommend that users never reveal private information such as credit cards, bank accounts, insurance numbers, passports, ID numbers or give away any money and so forth.
If you've been targeted by a job scam, report to: Cyprus Crime Combating Department
CareerFinders, on behalf of our client, an established R&D company specialising in software for telecommunications-related applications with offices in the heart of Nicosia, we are seeking to recruit an experienced and technically competent DevOps Engineer to join their expanding team of professionals.
- Manage infrastructure for both cloud and in-house systems.
- Build tools that streamline continuous development and deployment.
- Utilize various open source technologies.
- Use various tools to orchestrate solutions.
- Maintain binary repositories.
- BSc in Computer Science or MS in Engineering or equivalent.
- At least two years hands-on experience in development and/or operations environments.
- Experience and interest in Linux OS.
- Experience and interest in programming, ideally in Bash, Python or Groovy.
- Knowledge of container technologies like Docker and Kubernetes.
- Experience with Continuous Integration and Deployment practices using systems like Jenkins.
- Clear communication skills and a diligent mindset: you consider documentation a critical feature.
- A constant will to learn and grow, and to share knowledge with others.
- Having passion for collaboration and being a team player in general.
- Good time management skills.
- Interpersonal & communication skills.
- Fluent in English.
- Experience in working with senior and hands-on technical experts.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998813.71/warc/CC-MAIN-20190618183446-20190618205446-00178.warc.gz
|
CC-MAIN-2019-26
| 1,798 | 21 |
http://stackoverflow.com/questions/3183806/database-design-question
|
code
|
I have the following situation and would like to know your opinion and inputs. My applications has a company. Each company has a lot of departments, which in turn has a lot of users. I have a calendar at all the levels. So there is a central calendar for the company, and separate calendar for each departments, and separate calendar for each user. Idea is when the user is interested in an event that is in the company, he/she can add it to their calendar.Now,I need to have one or many tables for events.I was thinking whether
- I should have one table, which will have a field to uniquely identify each entity(company,department,user) and depending on who is querying, I can retrieve the results accordingly
- I should have multiple tables. One table for company, One table for departments, One table for users.
So it is more like having one table against three tables.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257825048.60/warc/CC-MAIN-20160723071025-00005-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 872 | 4 |
http://www.files3.com/rgb/
|
code
|
RGB extension stands for Bitmap image files. You may try to open these files by using Acdsee or Irfan view softwares.
rgb extension is related to colored image files. Rgb extension file formats are developed by SGI. You may try to view these files with many updated image viewer softwares. In this case, we can recommend you Acdsee or Irfan view softwares. You may run different image types with their features.
You can download acdsee and irfan view softwares free via internet.
What to use rgb
Acdsee, irfan View
which page related to rgb file
rgb Related Searches
You can check related links about rgb fileextension.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487608702.10/warc/CC-MAIN-20210613100830-20210613130830-00250.warc.gz
|
CC-MAIN-2021-25
| 619 | 8 |
https://forums.expo.dev/t/how-to-install-dependencies/19542
|
code
|
I have npm WARN, that some peer dependencies are required, but when I install them with npm i -s, my expo project fails to start. It works if I don’t install those dependencies, but since I’m unexperienced, I fear that I might run into future issues, if I ignore those warnings now.
I tried googling for few hours, but couldn’t find anything. It seems like I’m the only one having this issue… LOL. My PC is pretty slow and takes 20min to init new expo, so please save me, good people. <3
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233509023.57/warc/CC-MAIN-20230925151539-20230925181539-00203.warc.gz
|
CC-MAIN-2023-40
| 497 | 2 |
http://research.microsoft.com/en-us/projects/entityanalytics/
|
code
|
The project goal is to mine rich data assets possessed by search engines as well as those available within the enterprise to extract “interesting” information about entities. One example of this is identifying “synonyms” of real-world entities like products, people and places (i.e., alternate ways of referring to them) by mining web search click logs. The purpose of mining this information is to dramatically improve the user experience for certain applications involving those entities. For examp
The goal is to mine synonyms of real world entities like products, people, locations and more (i.e., alternate ways people refer to them). Many applications can benefit from this knowledge of synonyms of entities. For example, it can tremendously improve the search relevance in product search or local search. For example, Bing Shopping, Bing image search and Bing video search uses our synonyms to improve their search quality. We also offer entity synonyms as a data service for external customers to “plug in” to their applications (say, product search on an e-tailer’s web site). We recently mined acronyms using query logs as well. We refer to our publications listed below for further information.
- Tao Cheng, Kaushik Chakrabarti, Surajit Chaudhuri, Vivek Narasayya, and Manoj Syamala, Data Services for E-tailers Leveraging Web Search Engine Assets, in ICDE Conference, April 2013.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051196108.86/warc/CC-MAIN-20160524005316-00234-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 1,405 | 3 |
https://runestone.academy/ns/books/published/fopp/SimplePythonData/HardCoding.html
|
code
|
2.14. 👩💻 Hard-Coding¶
As you begin programming, you’ll see that there are many ways to solve problems. You’ll also find that one of the thrills of programming is how easily you can do things correctly that humans could easily make errors on. For example, you’ll learn how to write just a very small bit of code to find the 1047th character in a sentence that might be thousands of letters long, and you’ll learn how to do the exact same computation on many different pieces of data.
We’ll often tell you in this textbook not to hard-code answers. What does that mean?
Some things in programming you can only do by typing them out. As you’ve seen, when you have to assign a value to a
variable, you simply type something like
xyz = 6. No other way.
But in most cases, it’s best not to do computation in your head or write complete answers to programming problems out by hand. That’s where hard-coding comes in. “Don’t hard code” basically means, you should rely on your code, your logic, your program, and you should not write things out by hand or do computation in your head – even if you can do so easily.
When you are writing code or working on the answer to a programming exercise, you should ask yourself: Would my answer be correct even if the provided variables had different values? If the answer to that question is no, you’re probably hard- coding, which you should avoid – and there’s probably at least a slightly more concise way to construct your answer!
For example, in this following code, if you’re asked in an exercise to create a variable
zx and assign it the value of
the sum of the value of
y and the value of
zx = 55 is hard-coding.
20 + 35 may be easy math to do in your head or with a calculator, but when you learn to program, you
want to train yourself to notice useful patterns of how to solve problems, which will make your life easier (perhaps
beyond programming, even).
The correct way to answer that sort of exercise would be to write:
zx = y + x (or
zx = x + y, as you were just
reminded of the order of operations). That is not hard-coding, and it will be correct no matter what the values of
In the code above, if the value of
55 would not be the correct value for
zx to have. But
zx = y + x would still be absolutely correct.
Try as much as you can not to rely on your brilliant but fallible human brain to do computation when you program – use your brain to determine how to write the correct code to solve the problem for you! That’s why we require you to avoid hard -coding for most exercises in this book.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817729.87/warc/CC-MAIN-20240421071342-20240421101342-00081.warc.gz
|
CC-MAIN-2024-18
| 2,586 | 25 |
https://news.ycombinator.com/item?id=10312783
|
code
|
Experienced frontend, backend, full stack, and data engineers. https://getcolor.com/careers
Build the software infrastructure for genetics and genomics.
Genetics is at the beginning of a large growth trajectory. Color has the opportunity to build the software infrastructure that will drive the entire field. From data analytics to bioinformatics and product design, you will be part of implementing the first truly large-scale application of genetics.
We are looking for smart collaborative individuals with a tech background and interest in the area versus people with deep domain expertise.
We are just a few minutes walk from both Caltrain and BART.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178373761.80/warc/CC-MAIN-20210305214044-20210306004044-00325.warc.gz
|
CC-MAIN-2021-10
| 653 | 5 |