url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://gallantlab.org/pymoten/auto_examples/introduction/demo_batching.html
code
Computing motion energy features from batches of stimuli¶ This example shows how to extract motion energy features from batches of a video. When the stimulus is very high-resolution (e.g. 4K) or is several hours long, it might not be possible to fit load the stimulus into memory. In such situations, it is useful to load a small number of video frames and extract motion energy features from that subset of frames alone. In order to do this properly, one must avoid edge effects. In this example we show how to do that. Features from stimulus¶ First, we specify the stimulus we want to load. import moten import numpy as np import matplotlib.pyplot as plt stimulus_fps = 24 video_file = 'http://anwarnunez.github.io/downloads/avsnr150s24fps_tiny.mp4' Load the first 300 images and spatially downsample the video. small_vhsize = (72, 128) # height x width luminance_images = moten.io.video2luminance(video_file, size=small_vhsize, nimages=300) nimages, vdim, hdim = luminance_images.shape print(vdim, hdim) fig, ax = plt.subplots() ax.matshow(luminance_images, vmin=0, vmax=100, cmap='inferno') ax.set_xticks() ax.set_yticks() 72 128 Next we construct the pyramid and extract the motion energy features from the full stimulus. pyramid = moten.pyramids.MotionEnergyPyramid(stimulus_vhsize=(vdim, hdim), stimulus_fps=stimulus_fps, filter_temporal_width=16) moten_features = pyramid.project_stimulus(luminance_images) print(moten_features.shape) Features from stimulus batches¶ Next, instead of computing the features from the full stimulus, we compute them from separate but continous stimulus chunks. These stimulus chunks are the stimulus batches. We have to include some padding to the batches in order to avoid convolution edge effects. The padding is determined by the temporal width of the motion energy filter. By default, the temporal width is 2/3 of the stimulus frame rate (int(fps*(2/3))). This parameter can be specified when instantating a pyramid by passing e.g. filter_temporal_width=16. Once the pyramid is defined, the parameter can also be accessed from the filter_temporal_width = pyramid.definition['filter_temporal_width'] Finally, we define the padding window as half the temporal filter width. window = int(np.ceil((filter_temporal_width/2))) print(filter_temporal_width, window) Now we are ready to extract motion energy features in batches: nbatches = 5 batch_size = int(np.ceil(nimages/nbatches)) batched_data = for bdx in range(nbatches): start_frame, end_frame = batch_size*bdx, batch_size*(bdx + 1) print('Batch %i/%i [%i:%i]'%(bdx+1, nbatches, start_frame, end_frame)) # Padding batch_start = max(start_frame - window, 0) batch_end = end_frame + window stimulus_batch = luminance_images[batch_start:batch_end] batched_responses = pyramid.project_stimulus(stimulus_batch) # Trim edges if bdx == 0: batched_responses = batched_responses[:-window] elif bdx + 1 == nbatches: batched_responses = batched_responses[window:] else: batched_responses = batched_responses[window:-window] batched_data.append(batched_responses) batched_data = np.vstack(batched_data) Batch 1/5 [0:60] Batch 2/5 [60:120] Batch 3/5 [120:180] Batch 4/5 [180:240] Batch 5/5 [240:300] They are exactly the same. assert np.allclose(moten_features, batched_data) In this example, the stimulus ( luminance_images) is already in memory and so batching does not provide any benefits. However, there are situations in which the stimulus cannot be loaded all at once. In such situations, batching is necessary. One can modify the code above and write a function to load a subset of frames that can fit into memory (e.g. stimulus_batch = load_my_video_frames_batch(`my_stimulus_video_file.avi`, batch_start, batch_end)). Total running time of the script: ( 0 minutes 29.012 seconds)
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00286.warc.gz
CC-MAIN-2023-50
3,774
27
https://stephenscholtz.com/archive/201107
code
One of the important steps you need to do when setting up a new Drupal site is creating a cronjob that hits up your Drupal install. Or at least it used to be an important step in the past. Poormanscron is a module that simulates a crontab by keeping track of the time and then running Drupal's cron task whenever a page on your site is loaded around the right time, and it has been added to core in Drupal 7. Finding this out explained where all these mysterious cron calls in my log were coming from! Even still, I wanted to go through the crontab setup process anyways, as I was learning the ins and outs of my new hosting company's control panel. (And as mentioned, Poormanscron will only run when a page is accessed, so if your site doesn't get a lot of hits, your cron won't run as often as you like)
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474893.90/warc/CC-MAIN-20240229234355-20240301024355-00388.warc.gz
CC-MAIN-2024-10
805
2
https://www.nsc.liu.se/~pla/blog/page/3/
code
Next week, I am off to Denver, Colorado to participate in The Supercomputing Conference (SC13). I will also attend HP-CAST and the Intel HPC Roundtable. I am always interested in meeting other people working with ab initio/electronic structure software. Send me an email if you want to meet up. Here comes a more generic recipe for installing and compiling VASP using only open-source tools (i.e. without Intel’s Fortran compiler and MKL). This chould be useful if you want to run smaller calculations on a laptop or an office machine. Below follows how I did it on Ubuntu 13.10 with GCC/Gfortran, OpenMPI, OpenBLAS, FFTW and Netlib SCALAPACK. Please note that compiling VASP with gfortran is not recommended or supported by the VASP developers. From what I can tell, it appears to work, but I have only done limited testing. First of all you need the VASP source code, which you get from the VASP home page: Then we need to install some Ubuntu packages. Install either through the Synaptic program or apt-get in the terminal. This is starting from a completely new Ubuntu installation. If you have done any programming on your machine before, some of these packages could already be installed. For other Linux distributions, you will need to find out the names of the corresponding packages. They should be similar, except for “build-essential”, which is specific to Debian. I did not have much success using Ubuntu’s BLAS/LAPACK/ATLAS, so we will need to download the latest OpenBLAS and compile it ourselves from source. The same applies to SCALAPACK, which we have to tie together with our OpenBLAS and the system OpenMPI installation. Download the latest OpenBLAS tarball from After decompressing it, you will have a directory called “xianyi-OpenBLAS-….”. Go inside and check the TargetList.txt file. You will have to decide which processor architecture target is appropiate for your processor. For a new Intel processor, “SANDYBRIDGE” should be best, and for a new AMD processor, “BULLDOZER”. Here, I choose the safe and conservative option “CORE2”, which should work on any recent processor. Then we compile with make. make FC=gfortran CC=gcc USE_THREAD=0 TARGET=CORE2 This should produce a library called libopenblas_core2-r0.2.8.a (or similar). Make note of the directory in which you compiled OpenBLAS, you will need it later. Mine was “/home/pla/build/xianyi-OpenBLAS-9c51cdf” Download the latest SCALAPACK tarball from Netlib.org. To compile it, we need to set up a SLmake.inc file containing some configuration parameters. Start by copying the SLmake.inc.example file. You need to update the LAPACKLIB variables and insert a direct reference to your OpenBLAS compilation. CDEFS = -DAdd_ FC = mpif90 CC = mpicc NOOPT = -O0 FCFLAGS = -O3 CCFLAGS = -O3 FCLOADER = $(FC) CCLOADER = $(CC) FCLOADFLAGS = $(FCFLAGS) CCLOADFLAGS = $(CCFLAGS) ARCH = ar ARCHFLAGS = cr RANLIB = ranlib SCALAPACKLIB = libscalapack.a BLASLIB = -L/home/pla/build/xianyi-OpenBLAS-9c51cdf -lopenblas LAPACKLIB = $(BLASLIB) LIBS = $(LAPACKLIB) $(BLASLIB) This should be enough to get SCALAPACK to compile by typing “make”. In the end, you should get a Proceed to compile VASP with gfortran according to the previous guide. You need to apply the source code patches described there, otherwise it is straightforward. If you have never compiled VASP before, looking through one of the more detailed system specific guides in the VASP compile section might help. The makefiles and the source code patch I used are available for download: vasp-ubuntu.tar.gz. Some highlights (update the paths if necessary): FFLAGS = -ffree-form -ffree-line-length-0 -fno-second-underscore -I/usr/include We need to include -I/usr/include to pick up the FFTW header file. And refer to the BLAS/LAPACK library from our OpenBLAS installation. CPP = $(CPP_) -DMPI -DHOST=\"LinuxGfort\" \ -DCACHE_SIZE=4000 -Davoidalloc -DNGZhalf \ -DMPI_BLOCK=262144 -Duse_collective -DscaLAPACK -DMINLOOP=1 And set the precompiler flags. In the MPI section of the makefile, there should be a reference to our compiled SCALAPACK: The binaries you compile are MPI-enabled, so they should be launched with mpirun. For example: mpirun -np 4 ~/build/vasp-5.3.3/vasp.5.3/vasp You will probably find that the --bind-to-core option will help performance. mpirun -np 4 --bind-to-core ~/build/vasp-5.3.3/vasp.5.3/vasp If you have dual socket workstation, similar to a compute cluster node, I recommend trying: mpirun -np 16 --bind-to-core --npersocket 8 ~/build/vasp-5.3.3/vasp.5.3/vasp When doing standard double precision floating point operations in C or Fortran, you can expect 15-17 significant digits. But what do you do when 15 decimals are not enough? The GNU multiple precision arithmetic library is go-to library when you need not 15, but thousands of decimals, but for more modest needs, quadruple precision (128 bits), might be enough. In Fortran, 128 bits is REAL*16, and in C we can access it by the type __float128. These may not be availabe in all compilers, but GCC (4.6 and newer) and Intel C/Fortran do support it. According to the GCC manual, we can expect it to be “an order of magnitude or two slower” than double precision. I decided to test the quad precision by doing a simple matrix-matrix multiplication test. Two 256x256 matrices are initialized with trigonometric expressions and then multiplied by each other. It is straightforward to change the program into quad precision: the doublearrays should be declared as __float128, the trig. functions are called sinq, and we need to use the special function quadmath_snprintf to print the numbers to the screen. (In Fortran, you don’t even need to use a different print function.) For simplicity, I look specifically at the decimal expansion of one matrix element (0,0). With gcc, I get $ gcc -o matmul_double -O3 -mavx -std=c99 matmul_double.c -lm $ ./matmul_double Matrix size: 256 by 256 (double precision). Time: 0.010 seconds (3355.4 MFLOP/s) C(0,0)-diagnostic: -0.0939652685936642 gcc -o matmul_quad -std=c99 -O3 -mavx matmul_quad.c -lquadmath -lm ./matmul_quad Matrix size: 256 by 256 (quad precision). Time: 4.140 seconds (8.1 MFLOP/s) C(0,0)-diagnostic: -0.093965268593662358578620940776 which confirms that __float128 works in gcc, but with significant speed penalty. In this case, the difference in runtime is around 1000x. Does Intel’s C compiler fare better? $ icc -o matmul_double -std=c99 -O3 -xavx mmul_double.c -lm $ ./matmul_double Matrix size: 256 by 256 (double precision). 0.000 seconds (inf MFLOP/s) C(0,0)-diagnostic: -0.0939652685936624 $ icc -o matmul_quad -std=c99 -O3 -mavx -I/software/apps/gcc/4.7.2/lib/gcc/x86_64-unknown-linux-gnu/4.7.2/include -L/software/apps/gcc/4.7.2/lib64/ matmul_quad.c -lquadmath -lm $ ./matmul_quad Matrix size: 256 by 256 (quad precision). 0.880 seconds (38.1 MFLOP/s) C(0,0)-diagnostic: -0.093965268593662358578620940776 Yes, it is evident that the quad precision floating maths runs a few times faster with ICC, even though the same underlying library is used. If we actually look at the decimals, and compare the results, we find something interesting. The quad precision results from GCC and ICC are identical, which is assuring, but the double precision binary compiled by ICC delivers higher precision, despite using very high optimization. GCC(double) -0.09396526859366|42 ICC(double) -0.09396526859366|24 GCC(quad.) -0.09396526859366|2358578620940776 ICC(quad.) -0.09396526859366|2358578620940776 Lowering GCC’s optimization did not help, and gcc is not supposed to introduce any unsafe mathematical operations unless explicitly enabled by -Ofast in the first place, so it is unclear to me where the difference comes from. Typically, fluctuations in the last decimal is not a problem in practice for many codes. There are many that run fine with e.g. gcc’s -ffast-math, but if you are struggling with ill-conditioned matrices, every decimal could count. Are bigger servers better for high-performance computing? It is often assumed that communication between processors within a compute node must be faster than using Infiniband networking in a cluster. Consequently, I come across scientists asking for big shared memory servers, believing that their simulations would run much faster there. In reality, it is not always so. In the previous post, I wrote about how the VASP application is bottlenecked by memory bandwidth. In such cases, compute work and communication will compete with each other for precious resources, with severe performance degradation as a result. Consider this experiment. Let us first run a VASP compute job with 512 bands on a single compute node using 1 to 16 cores. This will give us a scaling graph showing what kind of improvement you can get by using more cores in a server. Now, for comparison, we run the same job but with only one core per compute node. This means that the 16-core job uses 16 compute nodes and only communicates over Infiniband. Which scenario will be faster? It turns out that communicating only over Infiniband is superior to shared memory. With 16 cores it gives twice as fast calculations. The reason is simply that we throw more hardware at the problem: our processors can now use all the memory bandwidth for computations, while exchanging data over the Infiniband network instead. The graph above shows that there is no inherent benefit to run an MPI parallelized application such as VASP on a big server vs smaller servers in a cluster connected by Infiniband. The only advantage you get is the increased total amount of available memory per server. As a user, you can apply techniques like this to speed up your calculations. For example, by using twice as many nodes, but with half the number of cores on each node. On Triolith, you can do like this: #SBATCH -N 16 #SBATCH --ntasks-per-node 8 mpprun /software/apps/vasp/5.3.3-18Dec12/default/vasp This will run your application with 8 cores per compute node, for a total of 128 cores. The improvement in speed compared to using 8 full nodes can be as much as 50%, and you will also have twice as much memory available per processor. The drawback is, of course, that you spend twice the core hours on your calculation. But if it is important to get the results quickly, it might be worth it. I was recently asked what kind of hardware you should for running VASP calculations. I recommend looking at the configuration of the Triolith cluster at NSC. It was designed to run VASP as big part of the workload, and we did extensive benchmarking to optimize price/performance. An alternative is too look through the supercomputing Top500 list for the most recent entries, to get a feel for what the supercomputing centers are buying at the moment. At Top500, they also have a statistics section where you can follow trends in hardware over time. It is obvious, for example, that big shared memory systems have fallen out of favor. I recommend is dual-socket servers with low clock frequency Intel Xeon E5 processors, connected by Infiniband networking. Why? Type of CPU: At the moment, Intel’s server processors are significantly ahead of AMD’s in terms of performance and energy efficiency. VASP is also very reliant on Intel’s Fortran compiler. This makes Intel processors an optimal choice. It is possible to run VASP on POWER and SPARC processors, but these server platforms are generally not cost efficient for high-performance computing. CPU model: VASP is very dependent on high memory bandwidth. It is one of the most memory intensive applications in high-performance computing. This means that you do not need processors with high clock frequency, because they will spend most of their time waiting for data to arrive from memory anyhow. What you need is the cheapest processor model that still comes with maximum memory bandwidth. In the current Xeon E5-2600 series, that is likely to be the 2650 and 2660 models. The quad-core 2643 model could also be interesting, because you typically gain only 25% when going from 8 to 16 cores per node. Memory: It is crucial to have 1600 Mhz DDR3 memory, which is currently the fastest memory (1866 Mhz will soon come). All four memory channels should be occupied. Try to get dual rank memory modules if you have only 1 DIMM per memory channel – it will improve performance by ca 5%. Typically, 32 GB of memory is enough (2 GB/core), the reason being that you can easily get an equivalent of 4 GB per core by running with half the number of MPI ranks per node without losing too much performance. But if the majority of jobs are of hybrid type or GW, I would go for 64 GB per server instead. Network: A fast network, like Infiniband, is necessary to run VASP in parallel on more than a few nodes. It is difficult to do comparative studies of different network setups due to the amount of hardware required, but in general VASP scales almost perfectly up to 16 compute nodes using both Mellanox and Qlogic (now Intel) Infiniband, so there is no given winner. FDR Infiniband does not significantly improve performance over QDR for VASP in the few tests I was able to do (+16% on a 16 node job spanning two switches), so I would look at it mostly from a price/performance perspective. Occasionally, I get enquiries about various kinds of scripts for pre- and post-processing of VASP calculations. A comprehensive set of scripts covering the most common tasks is available within the Aflow high-throughput framework for VASP, developed by the Curtarolo group at Duke University. To use Aflow on Triolith, just load the “vasptools/0.2” module; it will put the aconvasp binary and other scripts such as “vasp2cif” and “vaspcheck” into your PATH. module load vasptools/0.2 Here are some examples of what can you do with Aflow: aconvasp --cart: convert POSCAR from direct to Cartesian coordinates aconvasp --data: show basic structure data such as volume, alpha, beta gamma, etc. aconvasp --volume 170.0: Change the volume of the cell to 170 A3 . aconvasp --clat 5.0 5.0 7.0 90.0 90.0 120.0: convert (a,b,c,alpha,beta,gamma) to Cartesian basis vectors which can be copy-pasted into POSCAR. aconvasp --chgdiff CHGCAR.1 CHGCAR.2: subtract charge densities in CHGCAR files. (But it seems to be broken when I test it.) aconvasp --supercell 2 2 2: make supercell out of an existing POSCAR. aconvasp --swap 0 1: swap coordinates of atomic species 0 and 1 in the POSCAR file. aconvasp --spacegroup: spacegroup and symmetry detection. aconvasp --cif: generate a CIF file from POSCAR. aconvasp --xyz: generate an xyz file from POSCAR. You can find more information in the full documentation. If you use aconvasp or aflow, don’t forget to cite their paper: S. Curtarolo, W. Setyawan, G. L. W. Hart, M. Jahnatek, R. V. Chepulskii, R. H. Taylor, S. Wang, J. Xue, K. Yang, O. Levy, M. Mehl, H. T. Stokes, D. O. Demchenko, and D. Morgan, AFLOW: an automatic framework for high-throughput materials discovery, Comp. Mat. Sci. 58, 218-226 (2012). This week we are running a course in parallel programming with OpenMP at NSC. Joachim Hein from LUNARC is teaching and a few of us from NSC are helping out with the programming labs. It is often said that parallel programming can be incredibly hard, and that there is currently no reliable way to automatically parallelize an existing serial program. This statement is still true in general, but sometimes, parallel programming can also be embarrassingly easy. Why? Because while automatic parallelization is not perfect, it can still give you some improvement. There are also many subroutines in BLAS, LAPACK and FFTW that are already parallelized, and since many programs rely on these libraries, they can see speed-up on multicore processors by just linking the right library version and setting OMP_NUM_THREADS=X in the shell. Let us consider the Elk FP-LAPW code . It is written in Fortran90, and has already been parallelized using both OpenMP and MPI. But what could we have done in the hypothetical case of starting out with the serial version of Elk? How good is automatic parallelization? It will surely not get us all the way, but every percent counts, because you essentially get it for free. It is merely a question of finding the relevant compiler flags. To establish a baseline, I have Elk compiled without any special compiler flags or machine-optimized numerical libraries. This may seem naive and unrealistic, but in reality, it is not uncommon to come across scientific software built without any compiler optimizations flags or optimized linear algebra libraries such as GotoBLAS, MKL, or ATLAS. (In my experience, it is not so much a result of ignorance, but rather technical problems with compilation and/or lack of time for tinkering.) The test case I am using is the YBCO example distributed with Elk (13 atoms) with the rgkmax parameter increased to 7.0 to get longer runtime. The first step in our hypothetical example is to simply add “-O3” optimization. This gives us 9% speed boost. The next crucial step is to replace the bundled BLAS, LAPACK and FFT libraries with Intel’s MKL libraries, which improves the speed by 27%. And finally, we activate the compiler’s automatic threaded parallelization, which gives us +80%. The results can then be compared with the production version of Elk for Triolith, which uses aggressive compiler optimizations, MKL libraries, and has manual OpenMP parallelization. We can see that automatic parallelization gives a modest speed-up of 1.7x using 16 cores on a Triolith compute node. Still, this is not too bad compared with the OpenMP parallelized version which gets 5.0x over the serial version in total, but only 2x of that is actually due to the OpenMP constructs in the code. So essentially, we get half of the parallelization done automatically for free, without having to change any Fortran code. Another way of looking at this graph is that it can really pay off to spend some time looking into the best way to compile and link a program. The optimized auto-parallel version is 2.5x faster than the naive version built just from the Elk source with integrated numerical libraries. Most of tricks I used to compile Elk in this example are listed in the Triolith User Guide. If you encounter problems compiling your own program on Triolith, or need help with choosing the best libraries, please don’t hesitate to contact [email protected]. Yesterday, I installed a new version of the Atomic Simulation Environment on Triolith. ASE allows you to script your ab initio calculations using Python. Here comes a tutorial on how you can run VASP calculations with ASE on Triolith. It is a little bit more elaborate than the official documentation of VASP module which can be found on the ASE web site. First, we need to load the Python and ASE modules. I recommend the module load python/2.7.4-snic-1 ase/3.7.1 Next, we need to tell ASE’s VASP module where to find the VASP binaries and the POTCARs files. export VASP_COMMAND="mpprun /software/apps/vasp/5.3.3-18Dec12/default/vasp" export VASP_PP_PATH=/software/apps/vasp/POTCARs Note that ASE requires that there are directories called potpaw_PBE below the VASP_PP_PATH, so you may have to create symlinks with these names if you don’t have them in your own database. Now, we need to create the actual ASE Python script that sets up the calculation. The idea in this little example is to calculate the equilibrium volume and bulk modulus of hcp Mg. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 The script works like this: first, we create cells for 10 different volumes and at the same time attach VASP settings to them, then we call get_potential_energy() for each of these cells and collect the energies and volumes, and finally, we use ASE’s built-in equation of state subroutine to calculate the equilibrium volume and bulk modulus. To run this script on a Triolith compute node, we need to create a job script. In the job script, we just launch the Python script, which will start ASE and then launch VASP for us. #!/bin/bash #SBATCH -J mg #SBATCH -N 1 #SBATCH --exclusive #SBATCH -t 0:10:00 python mg-hcp.py When the job has completed (it should not take more than a few minutes), look in the slurm.out file for the output from ASE. [pla@triolith1 asetest]$ cat slurm-693921.out Calculation output ------------------ Volumes: [30.469003876435877, 32.782153276649034, 35.209509626875203, 37.753824901813466, 40.417851076162975, 43.204340124622782, 46.116044021892051, 49.155714742669836, 52.326104261655324, 55.629964553547552] Energies: [-1.86460718, -2.2747034, -2.5757448, -2.78654685, -2.92182549, -2.99416931, -3.01374966, -2.99022215, -2.93151648, -2.84418079] Equation of state parameters ---------------------------- E0: -3.013844 eV V0: 45.9 A^3 B: 36.5 GPa The experimental bulk modulus of Mg is ca 45 GPa, so the result seems reasonable. For some time, VASP has been centered on the x86 processors and Intel’s Fortran compiler. Inside the VASP source distribution, you can find some makefiles for other compilers, but they seldom work nowadays, and in many cases you need to make modifications to the source code to make it work with other compilers. In particular, recent versions of Gfortran cannot compile VASP. If you try, the compiler would stop at errors concerning a circular dependency of a module (i.e. the module includes itself), and some output formatting errors. From what I can understand, these problems are actually related to violations of the Fortran language standard, which are allowed by the Intel compiler. There are no compiler flags for gfortran that let you “relax” the standard like this to let it compile VASP, so you need to modify the source to make it compliant. When I tested with gcc 4.7.2 and gcc 4.8.0, four files needed to be modified: us.F, vdwforcefield.F, finite_diff.F, and spinsym.F. I have prepared the patches as a “patch file” which you can download. To apply the patches to the source code, locate your VASP 5.3.3 source code directory and do cd vasp.5.3 patch -p0 < vasp533gcc.patch In the makefile, you need to set the following compiler flags for gfortran. FC = mpif90 (or similar depending on the MPI) FFLAGS = -ffree-form -ffree-line-length-0 -fno-second-underscore OFLAG=-O3 -march=corei7-avx -mtune=corei7-avx Global -O3 optimization seems to work for me on Triolith (Xeon E5 processors), but I haven’t tested all functionality of the gfortran version yet. As with the Intel compiler, you may have to decrease the optimization or disable aggressive inlining in certain files. In the preprocessor section, put something like this. Note that you should not use the -DPGF90 flag when compiling with gfortran. CPP = $(CPP_) -DHOST=\"NSC-GFORTRAN-B01\" -DMPI -DMPI_BLOCK=262144 \ -Duse_collective -DCACHE_SIZE=12000 -Davoidalloc -DNGZhalf\ These tricks made it for me, and I now have a reference version of VASP compiled with Gfortran on Triolith. The speed seems to be about same as when compiled with Intel Fortran, since VASP relies heavily on FFTWs and BLAS calls and I still link with MKL and Intel’s MPI. Later, I will try to make a longer guide how to compile VASP with a fully free software stack, and compare performance and stability. I promised some multi-node scaling tests of the LiFeSiO4 128-atom job in the previous post. Here they come! The choice of NPAR is of particular interest. Do the old rules of NPAR=sqrt(number of MPI ranks) still apply here? To recap: when running on one node, I found that NPAR=3 with 24 cores per compute node and a special MPI process binding scheme (round-robin over NUMA zones) gave the best performance. To check if it still applies across nodes, I ran a full characterization again, but this time with 2 compute nodes. In total, this was 225 calculations! Inspecting the data points shows us that the same approach comes out winning again. Using 24 cores/compute node is still much more effective (+30%) than using all the cores, and NPAR=6 is the best choice. Specifying process binding is essential, but the choice of a particular scheme does not influence as much as in the single node case, presumably because some of the load imbalance now happens in between nodes, which we cannot address this way. From this I conclude that a reasonable scheme for choosing NPAR indeed seems to be: NPAR = 3 * compute nodes Or, if we have a recent version of VASP: NCORE = 8 The “RR-NUMA” process binding has to be specified explicitly when you start VASP on Abisko: srun --cpu_bind=map_cpu=0,6,12,18,24,30,36,42,2,8,14,20,26,32,38,44,4,10,16,22,28,34,40,46 /path/to/vasp When using these settings, the parallel scaling for 1-8 compute nodes looks decent up to 4 compute nodes: Remember that each node has 48 cores, of which we are using 24 cores, so 4 nodes = 96 MPI ranks. We get a top speed of about 30 Jobs/h. But what does this mean? It seems appropriate to elaborate on the choice of units here, as I have gotten questions about why I measure the speed like this instead of using wall time as a proxy for speed. The reasons is that you could interpret the “Speed” value on the y-axis as the number of geometry optimization steps you could run in one hour of wall time on the cluster. This is something which is directly relevant when doing production calculations. For reference, we can compare the speeds above with Triolith. On Triolith, the same job (but with 512 bands instead of 480) tops out at about 38 Jobs/h with 16 compute nodes and 256 ranks. So the parallel scaling looks a bit weak compared Triolith, but the absolute time to solution is still good.
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051299749.12/warc/CC-MAIN-20160524005459-00067-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
25,731
142
https://www.oreilly.com/library/view/boulevard-of-broken/9780691154534/chapter007.xhtml
code
HOW GOVERNMENTS GO WRONG: BAD IMPLEMENTATION Even if a program to encourage entrepreneurship is well conceptualized, things can still go wrong once it is begun. The implementation of these programs requires many decisions. While decision making about programs may seem like an obscure, even arcane topic, it is incredibly important. As we’ll see from many examples in this chapter, program administrators can make seemingly reasonable decisions that turn out to be destructive. This chapter will consider three of the most common errors in implementation. Ignoring the need for well-directed incentives, not evaluating what is happening with the program, and failing to allow beneficial internationalization are all mistakes that can be extremely ...
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313501.0/warc/CC-MAIN-20190817222907-20190818004907-00024.warc.gz
CC-MAIN-2019-35
752
3
http://stackoverflow.com/questions/7371657/how-to-store-list-of-numbers-to-database?answertab=active
code
The following table structure makes the following assumptions: - Subgroups are unique and distinct to each group, and are distinct from actual Groups (one-to many relationship, and Groups are not useable as subgroups). Users must be members of at least one subgroup in order to participate in a group GroupID (FK on GroupTable.GroupID) Now, create a many-to-many relation table establishing User participation within one or more sub-groups: UserID (FK on UserTable.UserID) SubGroupID (FK on SubGroupTable.SubGroupID) If Groups are also able to be subgroups, then the example provided by nulvinge is one option, though I would do it slightly differently: ParentGroupID (Composite Key on GroupsTable.GroupID) SubGroupID (Composite Key on GroupsTable.GroupID) UserID (Composite Key on UserTable.UserID) GroupID (Composite Key on GroupsTable.GroupID) From here, you simply use the JOIN between various tables to perform your search. For example, to return all Users who belong to a certain Group: tblUser ON tblUser_Group.UserID = tblUser.UserID tblUserGroup.GroupID = @GroupID To return all SubGroups of which a specific User is a member: tblGroup.GroupName AS SubGroupName tblUser_Group AS UG tblUser ON UG.UserID = tblUser.UserID INNER JOIN tblGroup_SubGroup AS GSG ON UG.GroupID = GSG.SubGroupID INNER JOIN tblGroup ON GSG.SubGroupID = tblGroup.GroupID tblUser.UserID = 1 And so on. It can be challenging to think your way through the various JOIN permutations at first, but this is a very flexible and scaleable arrangement. Hope that helps!
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064160.12/warc/CC-MAIN-20150827025424-00123-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
1,542
24
https://en.wordpress.com/tag/source-control/
code
Here is example git on github working with Visual Studio. Step 1: Go to your github, if you don’t have an account, please create it because it allows you upto 1GB each repositories. 158 more words For those who are familiar with Jeff Foxworthy, you’ll know his signature joke format: If you <insert stupidity here>, you might be a redneck! In that vein, I am starting a series of posts in the format: If you <insert anti-pattern here>, you’re <emphasis statement> doing it wrong! 283 more words “Michael: There’s nothing here to fear. Lucifer: Well, there’s always the truth.” Source control can be hard. Source control can be terrifying. And worst of all, source control can be a real Biblical hell.504 more words
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320386.71/warc/CC-MAIN-20170625013851-20170625033851-00023.warc.gz
CC-MAIN-2017-26
728
6
https://forums.couchbase.com/t/what-is-the-best-way-to-search-array-in-docs-if-they-match/19948
code
I have a Doc which a user can categorize as well as assign it to one or more buckets. What is the most effective way to search if any doc contains any of the values provided for one of these arrays. For example categories Array looks like this categories: [ “CC”, “DL”, “HL”, “R” ] and Bucket array looks like this bucket : [“Seller”, “Buyer”, “Investor”] in my query ifor example would want to get all docs where categories contains DL and HL in array as well as bucket is Seller or Buyer
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347413624.48/warc/CC-MAIN-20200531182830-20200531212830-00392.warc.gz
CC-MAIN-2020-24
517
4
https://www.curseforge.com/minecraft/mc-mods/sbm-bear-trap
code
The good old classic bear trap, great for catching prey out of sight. Works on all mobs including those that want to pretend walls don't exist. - 3 states (open, open set, and triggered) - Opened with an item (defaults to any stick) - Set as ready with an empty hand (extra safety factor to prevent opening and setting in one click) - Can be escaped using a stick - Causes no damage so is great for passive mobs - Prevents teleportation (limited to same world) - Prevents entity movement (complete for player, most for entities) - Works on all entities (living, dead, and objects[arrows, items]) - List of supported items to open the trap - Disable ore-dictionary names for sticks - Enable release timer to allow entities to escape - Enable teleportation escape Single Block Mod The Single Block Mod series is dedicated to creating a wide range of simple single purpose mods. Focusing for most on having one block/unit of content refined to offer as many options and choices as possible. This makes many of the mods in the series perfect for filling gaps in modpacks. Allowing pack developers to reduce the need to include larger mods to complete a feature list. See our site for other mods in the series http://www.builtbroken.com/addons.html Join us on Esper.net IRC #BuiltBroken #BuiltBrokenModding or on Discord https://discord.gg/MDQ9DrN Issues or bugs If you have any issues please report them to our issue tracker on Github.com. You can get to the issue tracker by clicking the issue button at the top of the mod page. If you do not see this button visit https://github.com/BuiltBrokenModding and navigate to the correct mod repository. If you have a crash report please paste it into a site like pastebin.com before submitting to improve readability of the issue ticket.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499646.23/warc/CC-MAIN-20230128153513-20230128183513-00878.warc.gz
CC-MAIN-2023-06
1,778
20
https://www.jupiterbroadcasting.com/tags/low-latency/
code
Is Fuchsia a risk to Linux? We try out a cutting-edge Fuchsia desktop and determine if it is a long-term threat to Linux. We celebrate the life of Erlang author Dr Joe Armstrong by remembering his many contributions to computer science and unique approach to lifelong learning. The lead developer of PipeWire Wim Taymans joins us to discuss Linux’s multimedia past, and its exciting future. They promise to greatly improve handling of audio and video under Linux.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00667.warc.gz
CC-MAIN-2023-23
465
3
http://flutter.axuer.com/docs/resources/bootstrap-into-dart
code
New to the Dart language? We compiled our favorite resources to help you quickly learn Dart. We looked at a lot of languages, and we found Dart easy and fun to learn. We hope these resources make Dart easy for you to learn, too. - Language tour - Your best introduction to the Dart language. Learn about Dart’s features such as strong types, closures, libraries, lexical scoping, top-level functions, named parameters, async / await, and lots more. - Library tour - A good overview of Dart’s powerful core libraries. Learn about Dart’s support for collections, async, math, numbers, strings, JSON, and more. - Intro to Dart for Java Developers Codelab - Use your Java knowledge to get up and running quickly with Dart. Learn about classes, constructors, parameters, and interfaces with examples from the Java Tutorial. - Effective Dart - Guides for style, authoring documentation, usage, and more. - Asynchronous Programming: Futures Tutorial - Learn how to use Futures, which are used extensively in the Dart core libraries. Futures can be used instead of one-time callbacks. - Asynchronous Programming: Streams Tutorial - Learn how to use Streams, which are used extensively in the Dart core libraries. Streams can be used instead repeating callbacks. For example, the File class uses Streams to read bytes from a file. Want to learn more and maybe contribute? Check out the Dart community.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107916776.80/warc/CC-MAIN-20201031062721-20201031092721-00435.warc.gz
CC-MAIN-2020-45
1,398
14
https://premium.wpmudev.org/forums/topic/i-would-like-to-use-popup-pro-to-display-a-disclaimer-for
code
I would like to use PopUp Pro to display a disclaimer for our member content. There are two components I'd need to make this happen: 1) Adding a rule/condition so that the popup only displays on a custom post type named 'courses.' 2) Adding a second button. This way the 'Agree' button closes the popup and the 'Disagree' (likely CTA box) redirects them to the homepage.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676595531.70/warc/CC-MAIN-20180723071245-20180723091245-00208.warc.gz
CC-MAIN-2018-30
370
3
https://programmingbooks.org/prepare-for-the-future-with-this-50-web3-programming-course/
code
Prepare for the future with this $50 Web3 programming course The following content is brought to you by ZDNet partners. If you purchase a product featured here, we may earn an affiliate commission or other compensation. The world of technology is constantly changing. One movement that has spurred much of this innovation has been the recent push towards Web3, the third generation of the Internet. Web3 envisions a fully decentralized web with cryptocurrency and the metaverse playing a vital role in allowing users to wrest control of the web and financial systems from large institutions and governments. Web3 is also the future for programmers, so if you want meet labor market requirements today and in the future, Web3 Programming Course Complete Pack can help you. This set of eight courses includes training from Mammoth Interactive, DesignersLab and Total Seminars – three leading online technology educators. Their courses cover a wide range of topics, starting with blockchain, Python, and Solidity. Here you will interact with the blockchain with Web3 Python, create and deploy a Solidity smart contract in Colab, deploy NFT smart contracts with Python, and more. Along the way, you’ll sharpen your Web3 programming skills. Dive into the future of the internet. For a limited time, you can get the Full set of Web3 programming masterclass on sale for just $40.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337631.84/warc/CC-MAIN-20221005140739-20221005170739-00112.warc.gz
CC-MAIN-2022-40
1,376
6
http://www.famigo.com/app/tiny-wings/
code
Tiny Wings is a side scrolling physics game with excellent gameplay and graphics. One of those games that is easy for anyone to pick up and play, but difficult to master. We could not put it down. Its hard to find fault with this game, probably because there really isn't anything wrong with it. This app has been also added to your wishlist, so your parents can see all the apps you want to download!
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700132256/warc/CC-MAIN-20130516102852-00029-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
401
3
https://devpost.com/Andrew_Walker
code
Technology Evangelist @Apple, prev. SWE @Lufthansa, @Apple, @iZettle, 15/16/17 WWDC Scholar. Co-founder of @WWDCScholars. iOS application for digital currency market data, with simple portfolio tracking. My WWDC 2017 scholarship application. Get to know the WWDC scholarship winners, their projects and their background. My WWDC 2016 scholarship application. Structured training sets to help you achieve your push-up goals. Breakout game for Apple Watch. The best app for accurate attraction information and real-time wait times and FastPass return times. Contextual video recommendation platform based on your emotions, where you are and who you're with.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710771.39/warc/CC-MAIN-20221130192708-20221130222708-00641.warc.gz
CC-MAIN-2022-49
655
9
https://qualified.one/ca/companies/integrio-systems/portfolio/48951/
code
Mobiry is a SaaS company specializing in improving marketing and consumer loyalty initiatives with state-of-art technologies. In 2018 they started working on an ambitious idea of utilizing the potential of machine learning to boost consumer loyalty initiatives. The idea later on turned into a startup and eventually became their core product. In 2018 Mobiry partnered with Integrio to design and develop their new… solution. Find more details in the case study?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00604.warc.gz
CC-MAIN-2023-14
464
3
https://proceedings.mlr.press/v119/lacotte20a.html
code
Optimal Randomized First-Order Methods for Least-Squares Problems Proceedings of the 37th International Conference on Machine Learning, PMLR 119:5587-5597, 2020. We provide an exact analysis of a class of randomized algorithms for solving overdetermined least-squares problems. We consider first-order methods, where the gradients are pre-conditioned by an approximation of the Hessian, based on a subspace embedding of the data matrix. This class of algorithms encompasses several randomized methods among the fastest solvers for least-squares problems. We focus on two classical embeddings, namely, Gaussian projections and subsampled randomized Hadamard transforms (SRHT). Our key technical innovation is the derivation of the limiting spectral density of SRHT embeddings. Leveraging this novel result, we derive the family of normalized orthogonal polynomials of the SRHT density and we find the optimal pre-conditioned first-order method along with its rate of convergence. Our analysis of Gaussian embeddings proceeds similarly, and leverages classical random matrix theory results. In particular, we show that for a given sketch size, SRHT embeddings exhibits a faster rate of convergence than Gaussian embeddings. Then, we propose a new algorithm by optimizing the computational complexity over the choice of the sketching dimension. To our knowledge, our resulting algorithm yields the best known complexity for solving least-squares problems with no condition number dependence.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00660.warc.gz
CC-MAIN-2023-40
1,488
3
https://forum.gitea.com/t/moving-issue-to-an-other-repository-with-sql-queries/4662
code
On my personal Gitea instance I have a repository that I found to be having information about too many distinct things. It’s purpose is mostly tracking issues and ideas pertaining to a thing, but soon I also want to use it for storing configurations and other documents. Earlier it seems appropriate to group the issues this way, but now it starts to become very clear that it is not. What I want to do is create x number of new repositories, and distribute all of the issues from this big repository between those, thematically. The problem is, I haven’t found a solution for moving issues. I have read on Github multiple issues where it is said that there is currently no functionality to do this, and that it is planned but not being worked on. I understand that. I don’t need tracking it in an issue’s history that it has been moved, so I think it would be safe to just modify the database while Gitea is down, though I’m not familiar with Gitea’s database architecture. I’m afraid if I just went ahead and did a few SQL queries that may make it work, it may introduce a ton of inconsistencies if I don’t update certain things that I should. Could you help in what records are to be modified and how? You obviously don’t need to explain SQL. It might be important to note that I’m using MariaDB (MySQL). The reason I want to do it this way instead of just copy pasting the text of issues is because I want to keep dates and other metadata. I think other users/admins may also benefit if this information could be gathered, since from time to time there are issues on Github asking questions about a feature doing this automatically.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476137.72/warc/CC-MAIN-20240302215752-20240303005752-00374.warc.gz
CC-MAIN-2024-10
1,656
9
http://ljive.com/domain/myacpl.org
code
A quick breakdown about the Myacpl.org website can be found further down: |Website load speed:| |Number of (outgoing) links:| HTTP/1.1 200 OK Server: nginx Date: Fri, 09 Jun 2017 03:27:08 GMT Content-Type: text/html; charset=UTF-8 Transfer-Encoding: chunked Connection: keep-alive Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache X-Cache-Enabled: True Link: <http://www.myacpl.org/wp-json/>; rel="https://api.w.org/", <http://www.myacpl.org/>; rel=shortlink Set-Cookie: PHPSESSID=46e3267c3b26b1c6c0b72a503288b4a3; path=/ Set-Cookie: wpSGCacheBypass=0; expires=Fri, 09-Jun-2017 02:27:08 GMT; Max-Age=-3600; path=/ Set-Cookie: wfvt_406468161=593a158cb159b; expires=Fri, 09-Jun-2017 03:57:08 GMT; Max-Age=1800; path=/; httponly Vary: Accept-Encoding,User-Agent Host-Header: 192fc2e7e50945beb8231a492d6a8024 Cache-Control: public Expires: Tue, 31 Dec 2010 23:59:59 GMT Access-Control-Allow-Origin: https://staff.myacpl.org X-UA-Compatible: IE=edge X-Content-Type-Options: nosniff X-Proxy-Cache: MISS The following domains are, too, hosted on 188.8.131.52: Strangely, no meta keywords are used by the website Myacpl.org. Based on A and B block, the following IP adresses are similar to 184.108.40.206 |Website address||IP in detail| The following domain extensions are available for the domain name, with a total of 730 variations available: As mentioned by Alexa on their official page, the Alexa rank or rating is calculated using a number of different parameters, such as daily average of unique visitors as well as pageviews over the last three months. The more unique visitors and pageviews, the higher the overall rank. spotted 1,692 days ago spotted 1,661 days ago spotted 1,665 days ago Visitors frequently mistype myacpl.org. Here is a list of most common misspellings: It seems myacpl.org has only been registered once and was never abandoned or has never expired. Established in 2006, the technology company Quantcast provides audience measurements and an opportunity for advertising in real time. In addition to that, the American company ensures public access to all sorts of website-related data (traffic and demographic) for millions of websites, as well as in-depth user insights to digital bloggers and publishers enrolled in Quantcast's Quantified Publisher Program. The processing capability provided by Quantcast is impressive – over 800 thousand transactions per second, with, as claimed by the company, accurate audience calculation for over 100 million online destinations. In 2013, Quantcast was widely believed to be among the top five of world's largest data processing companies. Holding offices in London, Dublin, New York and Chicago, the main headquarters of Quantcast is in San Francisco, CA. spotted 2,250 days ago spotted 2,324 days ago spotted 2,272 days ago Other lists the domain myacpl.org appears in are:
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370526982.53/warc/CC-MAIN-20200404231315-20200405021315-00184.warc.gz
CC-MAIN-2020-16
2,924
21
https://generatepress.com/forums/topic/undefined-key-in-header/
code
Thanks for your reply. No I did modified the files in any away. I followed the instructions, it was a fresh install (for the third time) I did that 3 times and always keep coming with the same issue. I am quite happy to give you the credentials for you to have a look, why is this happening? Just let me know what email account to send the credentials. It could be a bug? Who knows? Please let me know what you think.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949107.48/warc/CC-MAIN-20230330070451-20230330100451-00228.warc.gz
CC-MAIN-2023-14
417
8
https://mathvis.academic.wlu.edu/2015/06/24/volume-by-cylindrical-shells/
code
On Monday, June 15, I modeled a volume by cylindrical shells from Calculus II. I used Example 1 in 7.3 of Stewart’s Essential Calculus, which is a volume of revolution of the curve \(y=2x^2-x^3\) about the y-axis. This is shaped a bit like a stadium. The plan is to approximate this volume using 16 cylindrical shells. I first sketched out the curve in 2-dimensions to get a feel for the profile of the shape. Next, I wrote out each point on the curve from \(x=0\) to \(x=2\) in intervals of length 1/8, namely \((0,0), … , (1.875,0.439), (2,0)\). Each cylindrical shell is determined by its height, the thickness of the shell and either the inner or outer radius. By construction, each shell has thickness 1/8 and for each \(k=0,1,2, \dots, 15\), the inner radius of a shell is \(k/8\), while the outer radius is \((k+1)/8\). I chose the height of each shell to be \(f(k/8)\), which is the the \(x\)-value closer to the origin. To summarize, if \(r=\)inner radius of shell, \(R=\)outer radius of shell, and \(h=\)height of tube, then for \(k = 0, 1, 2, \dots , 15\), $$r = k/8, \quad R = (k+1)/8, \quad h=2r^2 – r^3.$$ Since the height function is increasing between \(x=0\) and \(x=4/3\), the cylindrical shells lie inside the volume of revolution. Between \(x=4/3\) and \(x=2\), the function is decreasing and the shells lie outside the volume. I then made a model of this Riemann approximation for the solid in Cinema 4D by inserting tubes (Cinema 4D’s name for “cylindrical shells”) of inner radius \(r\), outer radius \(R\), and height \(h\). When Cinema 4D inserts a tube, it places half of the tube above the \(xy\)-plane (the \(xz\)-plane in Cinema 4D) and half of it below. Therefore, I needed to add half of each tube’s height to put each shell onto the \(xy\)-plane. The object was first printed with the supports setting on just in case, although I thought that they did not need supports. The result was that a couple superfluous strands of plastic running along the shells, which needed to be removed. Given the geometry of the shape, I would advise against using supports in building this object. I would advise that you use a raft to build this object, however, because it was very difficult to remove the object from the build plate. (It took 5 minutes of very careful tugging by David Pfaff.) You can find this objects on Thingiverse here.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646937.1/warc/CC-MAIN-20230531150014-20230531180014-00737.warc.gz
CC-MAIN-2023-23
2,372
9
https://boards.straightdope.com/t/1920s-death-rays/521590
code
That thread was somewhat helpful, although most of the links no longer work. Wonder whatever happened to that OP? Anyway, it kicked me in the head to search on Grindell Matthews. Although that only turns up two threads, and I’ve found more mentions that than just poking around myself. But one of the threads is 1920s style death rays? HALL OF FAME NOMINATIONS where some guy posts a long article giving me much of what I need to know. Thanks, guy from the distant past I no longer remember. Oh, and something I’ve wanted to say for a long time. Just a general plea, maybe a reminder that should go into a sticky. Don’t just post a bare link with no information. Give us something that a) makes it searchable on the Dope and b) makes it findable on Google if the links goes dead at a later time. The example I’m looking at in that thread is: Which guy? What site? What article? The link is now dead. That happens all the time. It would be really helpful for people to put the name of the article and site into the link and quote a bit of the text so that we aren’t clicking blindly.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400212039.16/warc/CC-MAIN-20200923175652-20200923205652-00057.warc.gz
CC-MAIN-2020-40
1,092
8
https://angel.co/binpress/jobs?utc_source=crunchbase
code
We are a 500startups accelerator alumni / funded startup just before it breaks through. Now is the time to join and be a part of a small creative team before they make it big :) We solve a very tough problem - monetizing open-source. We want to make open-source successes like MySQL and Magento reproducible for every developer. If you want to help make that happen, get in touch. Note: Please leave a personal message about which position you are interested in and why you would be a good fit for that position and for Binpress. Please be more specific than "I like what you are doing" - if your background is different than the stated requirements, please help us understand how you are relevant for the position. We are the marketplace for free and commercial open-source code. We provide a platform for developers to build profitable businesses from releasing and working on their own code. We connect those developers with businesses and entreprenuers who wish to build software products with open-source code. We provide the commercial layer to the long-tail of open-source, providing open-source developers with the options that made MySQL and RedHat huge open-source businesses. We provide licensing, marketing, sales, payment processing, support and ticketing system and a custom services system - everything an open-source project needs to run like a professional and sustainable business. We were bootstrapped and profitable before joining 500startups accelerator in the summer of 2013.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398446500.34/warc/CC-MAIN-20151124205406-00072-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
1,497
7
https://support.mozilla.org/ga-IE/questions/758488
code
Cuireadh an snáithe seo sa chartlann. Cuir ceist nua má tá cabhair uait. I need to know the standard default font for Firefox I had a Dell 20 inch 2007fp monitor that I had to give up. I purchased an LG 22inch widescreen monitor. My home page is the Drudge Report and with the new monitor the font is all messed up. What is the standard default font for Firefox? All Replies (1) You can see the defaults in a screenshot in this KB article: Some text shows up bold after upgrade You can check the font setting in: Tools > Options > Content : Fonts & Colors: Advanced Default Font: Times New Roman (16) Fonts for : Western Proportional: Serif (16) Serif : Times New Roman Sans-serif : Arial Monospace : Courier New (13) Your above posted system details show outdated plugin(s) with known security and stability risks. - Next Generation Java Plug-in 1.6.0_18 for Mozilla browsers Update the Java plugin to the latest version. - http://java.sun.com/javase/downloads/index.jsp (Java Platform: Download JRE)
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058222.43/warc/CC-MAIN-20210926235727-20210927025727-00084.warc.gz
CC-MAIN-2021-39
1,004
18
http://hatta-wiki.org/Install%20on%20Debian%20or%20Ubuntu%20Linux
code
Note: This is a step-by-step guide for hatta prior to 1.5.0. For 1.5.0 and newer, refer to Install. Open a terminal and follow the instructions. Commands that use sudo will ask you for your password. (Running Etch? Also see the additional instructions specific to Etch). First you need to install the dependencies: sudo apt-get install mercurial python-werkzeug Optionally install Pygments for syntax highlighting: sudo apt-get install python-pygments If your version of python is 2.4, you will also need sudo apt-get install python-wsgiref If you are installing the development version, you will also need sudo apt-get install python-pkg-resources python-jinja2 Download the most recent version of the script from http://hatta-wiki.org/Download, rename it to hatta.py and make it executable with: chmod a+x hatta.py Just execute the script: This will create two subdirectories: cache, and also start a new Mercurial repository in the docs directory. Then it will start a web server on port 8080. You can now open your web browser and type http://localhost:8080/ into the address bar to use the wiki. Note: When Hatta starts, you will see a warning message, it's harmless, seems to be a glitch in the Debian's install of Mercurial, see Running on Debian stable (etch)? for more details. If you start Hatta in an existing Mercurial repository, it will also create the directories as above, but won't start a new repository in the docs directory – instead all the changes will be commited to your existing repository. You might want to add the cache directory to .hgignore, so that you are not bothered about the files in it. See Script settings. In case you're running Hatta on your own server you might want to ensure that Hatta will be up and running also after rebooting the server. Using Ubuntu's Upstart is a nice and easy way of doing this. Login as root and create a file named /etc/init with the following contents: start on startup script cd /path/to/hatta python hatta.py end script Now Hatta will be started on server boot, in addition you can use the initctl command to control Hatta: sudo initctl start hatta *or* sudo initctl restart hatta *or* sudo initctl stop hatta
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817729.87/warc/CC-MAIN-20240421071342-20240421101342-00463.warc.gz
CC-MAIN-2024-18
2,183
31
http://420weedmart.com/news/420-denver-colorado-weed-tourism/
code
The stoner’s guide to 420 weed tourism in Denver, Colorado! For more info, check out my Stoner’s Guide to Weed Tourism in Denver here: https://www.joanjetsetter.com/theblog/2018/4/19/a-stoners-guide-to-weed-tourism-in-denver My trip to Denver was made possible by my wallet and the following companies: My 420 Tours: https://my420tours.com/ High End Transportation: http://www.highendtransportation.com/ International Church of Cannabis: https://www.elevationists.org/ If you value experiences over consumerism, if you think there’s more to life than the 9-5, if you want to travel to every country in the world before you die, subscribe to my channel, and let’s see where we end up next: http://ow.ly/Vx3Xs
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742963.17/warc/CC-MAIN-20181115223739-20181116005108-00024.warc.gz
CC-MAIN-2018-47
715
7
https://bedlan.net/data/
code
BEDLAN is committed to making the data used for our analyses freely available to the academic community, so that our findings can replicated and extended. UraLex basic vocabulary dataset (v1.0) UraLex is a dataset consisting of lexical reflexes of 313 meanings from 26 Uralic languages. Most of the meanings originate from standardized basic vocabulary lists. The lexical reflexes are accompanied by multistate characters that represent their historical relationships. Cite the dataset as: Syrjänen, Kaj, Lehtinen, Jyri, Vesakoski, Outi, de Heer, Mervi, Suutari, Toni, Dunn, Michael, Määttä, Urho, Leino, Unni-Päivä. (2018). lexibank/uralex: UraLex basic vocabulary dataset. DOI:10.5281/zenodo.1459402 Digital dialect atlas of Finnish Lauri Kettunen’s Dialect Atlas of Finnish from the 1940s includes 213 pages of dialectal features describing variation within the Finnish language. The atlas was originally digitized from its book format by the Finnish Dialect Atlas project, led by Sheila Embleton and Eric S. Wheeler and funded by the Social Sciences and Humanities Research Council of Canada. This data was checked for errors and converted into its current format by the BEDLAN research project. The atlas is available online as part of the Kotus Language Atlas. In the future we intend to release the following datasets:
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879673.14/warc/CC-MAIN-20201022141106-20201022171106-00429.warc.gz
CC-MAIN-2020-45
1,333
8
https://techcommunity.microsoft.com:443/t5/yammer-blog/measure-and-grow-engagement-with-group-insights-in-yammer/ba-p/122411
code
Yammer helps you engage employees across organizational groups, form communities and run cross-company initiatives. Community managers play a large role in creating and nurturing groups for these purposes. We want to empower community managers to make better decisions around their efforts on Yammer by helping them better understand the activity happening in their groups. Over the past year, we have made significant progress on helping Office 365 admins gain insights on how people are using Yammer in their organizations through the Office 365 Usage Reporting Dashboard, Office 365 Adoption content pack and Microsoft Graph reporting APIs. These reporting capabilities provide and extensive view into Yammer usage and adoption at the user, device and group levels. This week, we are excited to release new group insights in Yammer, providing engagement metrics right within Yammer so that community managers and members can get a better understanding of their groups' engagement and activity. This, in turn, will help better inform efforts to improve, grow or execute campaigns in groups. Accessible across your network We have heard extensive feedback that managing a cross-organizational community oftentimes includes the efforts of stakeholders and champions with limited or no access to the information available in the Office 365 admin center. For that reason, insights for public groups can be accessed by anyone in your network by navigating to group actions from the group's feed. Insights for private groups, however, are restricted to members of the group. People activity in your community Yammer groups are open by default, allowing the knowledge and information created in them to benefit people regardless of their membership status in the group. Passive visitors may gain value from group conversations and apply the information elsewhere in their daily work. In fact, during early research we discovered that in addition to understanding group member activity, community managers find it beneficial to understand the activity of visitors who are not members of the group. This is why group insights break down activity for both group members and non-members. With group insights, you get an overview of activity for the last 7 days, 28 days and 12 months. This will help you: Group activity over time Group insights show you how posting, reading and liking activities are trending over time. These visualized trends illustrate the contributions of group members and non-members to activity in the group. Now, you can track engagement with content from campaigns or initiatives hosted in Yammer. Identify spikes in activity over the course of the year, month or week so that you can report back to leaders and optimize efforts. All the data shown in group insights is available for download on a per-day basis for the last 24 months, which is particularly useful if you want to plot your own trends over a custom timeframe. To see a demo of group insights in action along with other community management tools available for Yammer, we encourage you to watch our session Introducing new tools to measure and build your Yammer communities from Microsoft Ignite 2017. To get more details on group insights in Yammer, please check out our support article. We are excited to see how you use group insights to better nurture your communities in Yammer. We will continue to evolve group insights using the great feedback from customers and partners. UPDATE: Group insights for All Company Given the astounding feedback we've gotten from all of you, we are excited to announce that Group Insights for All Company will be available by the end of this year! Given that many companies starting off on Yammer use All Company as an open space to engage your entire organization, we've learned how valuable group insights can be for nurturing this community. You’ll have the same features, data and insights for All Company as you have had for your other groups - both in home networks and 'All Network' groups in external networks. Thank you again for your continued engagement. Q: What makes a message read? A: Messages read counts the number of times a conversation - in other words a thread - was read by people in the group. A conversation is counted as read if it appears on screen for the user. However, it is not counted until the user scrolls to the bottom of the message. Q: Where can I observe Yammer activity across my entire network? A: To observe Yammer user, device and groups activity at a network level, please use the Office 365 Usage Reporting Dashboard and Office 365 Adoption content pack available to Office 365 admins and individuals in your organization with the Reports Reader Role. Q: What will happen with the legacy Yammer analytics dashboard? A: The data found in the legacy Yammer analytics dashboard should now be accessed via the Office 365 Usage Reporting Dashboard and Office 365 Usage Analytics. Access to the legacy analytics dashboard in Yammer will be removed on in late November. You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499816.79/warc/CC-MAIN-20230130101912-20230130131912-00453.warc.gz
CC-MAIN-2023-06
5,145
23
https://lists.debian.org/debian-user/2007/03/msg02809.html
code
Re: My sound card!!! -----BEGIN PGP SIGNED MESSAGE----- The Navigator Gold wrote: > Hi everyone my name is Jeser and I'm from Panama. > Since I heard about Linux I was excited about this > idea (free OS) and I decided to install Linux Debian > in my computer. > But I have a big problem, I am a sound editor, and I > need my sound card works very well and Debian can�t > recognize it!!. > I need an explication of how can I install my sound > It's a Sound Blaster Audigy 2. > I am so inexperienced in this OS so please be kind. Welcome to Debain. Unfortunately, you didn't tell us which version of Debian you were using, so I am guessing that you chose the current stable version, Sarge. Debian 4.0 (etch) can easily recognize that soundcard during boot, and automatically set it up. It is also possible that you have more than one sound device in your computer (such as a microphone for your webcam) and that is being set as the default sound device. Check in your setup to see which soundcard(s) your computer finds. The commandline to configure your soundcard is alsaconf. You type that in in a terminal and follow the on screen prompts. Perhaps if you provide us with a little more detail, one of us can help Registerd Linux user #443289 at http://counter.li.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org -----END PGP SIGNATURE-----
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865250.0/warc/CC-MAIN-20180623210406-20180623230406-00242.warc.gz
CC-MAIN-2018-26
1,424
30
http://www.avrocks.com/mpls-l3vpn-and-vmx-ge-not-showing.html
code
I am trying to configure MPLS L3VPN with juniper but I found out that em* is not supported in routing instance. I've been reading that I must use ge-* but it is not showing on my interface terse. Can anyone tell me know to fix this so that I can continue in configuring MPLS L3VPN? Error: 'interface em3.0' RT Instance: Interface em3.0 not supported under routing-instances. error: configuration check-out failed
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514578201.99/warc/CC-MAIN-20190923193125-20190923215125-00099.warc.gz
CC-MAIN-2019-39
412
2
http://www.pcmag.com/article2/0,2817,1165656,00.asp
code
Getting Started with MIDIColors To install MIDIColors, unzip the downloaded file into a temporary folder and run the supplied install program, Setup.exe. This will copy the program files to your hard drive and create a shortcut to MIDIColors in your Start menu. To uninstall MIDIColors, use the Add/Remove Programs applet in Control Panel. MIDIColors' File menu lets you load a MIDI file, play it, and stop it. Once a MIDI file is playing, the Play option changes to Pause. When a file is paused, the Pause item becomes Resume. The Play and Stop items mirror the two buttons at the far left of the toolbar. The toolbar contains a tracking bar to the right of the Play and Stop buttons. The pointer on the tracking bar moves to show the current position in the file as it plays. You can drag the tracking bar pointer manually to an approximate location in the file. To the right of the tracking bar is a spin control that lets you adjust the tempo. The value is a tempo multiplier. Values below 1.0 play the composition at a slower tempo. Values above 1.0 play it faster. A warning: If a composition contains many notes and you play it at a very fast tempo, the program may not be able to keep up. If so, play will stop and a message box will notify you of the problem. The View menu contains several items that let you customize the display of keyboards in the window. The Keyboard size item lets you select one of five different keyboard sizes, called Largest, Larger, Medium, Smaller, and Smallest. Whichever you choose, the keyboards show all 128 notes supported by MIDI with middle C indicated by a dot. The top and bottom ends of the 128-note range are rarely used; some synthesizers may not even play the notes at the extreme ends correctly. For this reason, you can use large keys and manipulate the scroll bars to focus more on the central part of the keyboard (see Alternatively, you can select a keyboard size called Scale to window, which displays all 17 keyboards scaled to the size of the window (see ). With this option, the keyboards for the 16 MIDI channels are truncated slightly at the top and bottom ends. The Channel item on the View menu lets you select which keyboards are displayed. When you first load a file, only those channels used by the file are displayed. You may want to display an unused keyboard to play along with the file. The other items on the View menuShow all channels, Hide all channels, and Show only used channelsare shortcuts for showing and hiding channels on the Channel submenu.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719136.58/warc/CC-MAIN-20161020183839-00066-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
2,524
10
https://epflicht.ulb.uni-bonn.de/content/titleinfo/476165
code
Many destination countries consider implementing points-based migration systems as a way to improve migrants' quality, but our understanding of the actual effects of selective policies is limited. We use data from the ACS 2001-2017 to analyze the overlap in the wage distribution of low- and high-educated recent migrants from different origins after controlling for other observable characteristics. When we randomly match a high- with a low-educated immigrant from the same country, more than one-quarter of time the loweducated immigrant has a higher hourly wage, notwithstanding a statistically significant difference in the mean wage of the two groups for most origins. For 98 out of 114 countries, this synthetic measure of the overlap in the two wage distributions stands above the corresponding figure for natives. We also find that at least 82 percent of the variance in log wages for migrants with a given number of years of schooling is due to differences within rather than across countries. This suggests that heavily relying on education to select immigrants might fail to markedly improve their quality.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00708.warc.gz
CC-MAIN-2024-18
1,118
1
https://blogs.sap.com/2014/08/06/sles-root-folder-growing-big/
code
As SAP HANA developers we must have at least a basic understanding of SUSE Linux Enterprise Server (SLES) and get to know its system folders and files. So, if you fear Linux systems let me tell you that there is nothing to be afraid of, and you are still in time to start browsing around. This week I discovered an unusual disk consumption in SLES root directory (~/) on which a HANA instance was running. It had about 49GB of free space and the day after it suddenly came down to 0%. It took me a bit of time to find out the reason for this: Linux graphical interfaces not always work correctly, generating error messages as they fail. Those messages are produced by the X-windows system and kept in the log file: ~/.xsession-errors. There was that file and a second one named ~/.xsession-errors.old. About 48GB of disk space were being used by these 2 files. The temporary solution for this is to run the following sentences to delete both files: rm ~/.xsession-errors rm ~/.xsession-errors.old I said temporary because SLES will create the log file again, so we must delete the files from time to time, not very good ah?. If any of you ever found a way to stop the X-window logging or a way to trick SUSE into thinking that the messages are being saved, please let me know!
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178362899.14/warc/CC-MAIN-20210301182445-20210301212445-00318.warc.gz
CC-MAIN-2021-10
1,276
6
http://www.airliners.net/forum/viewtopic.php?f=11&t=1303371
code
|Quoting hOMSAr (Reply 13):| Question for yous out there in the know: Why are multiple passes seen as necessary to wipe a hard drive completely clean? If the utility rewrites every bit/byte of the disk with new data, why does it have to do it again and again? Is it like erasing pencil marks on paper, where you still see traces of the old stuff even after you've written over it, or is it more a matter of "just in case it missed something this time"? Hard disks store data by modifying the magnetic field of parts of the drive, essentially. All data is reduced down to a 0 or a 1 in computing, however when writing to an analog medium (i.e. a hard disk using magnetic fields as storage), there is not a pure 0 or 1 on the drive. In essence, one bit is "mostly 0" or "mostly 1", with potential for variations in there. The drive hardware controller then interprets these fields into digital form, and tells the computer it is either a 1 or a 0 - no "mostly" involved. Well, if one were to simply take a drive with data and then write 0's to it in every sector, it is possible that the 0's that were 0's before would be more 0 than the 0's that were a 1 before. Do enough analysis, on a platter-level using some sophisticated machinery, and you can, potentially, re-create data that was removed. Now, you have some pretty big enemies in life if anybody will be doing this on your hard drive, but it still isn't a bad idea to do two passes: #1 do random data to the disk, then #2 to zeros to the disk. By that time, you'll have written over everything enough that you can rest easy. If you want to be paranoid, do the 5 or 6-pass DoD approved, or if you're off-your-rocker-insane, do the 35 passes, but that is pointless. Now, all of that is much, much different than not using an eraser utility at all. Typically when an operating system deletes a file, it actually just deletes any reference of the file, while the file itself stays on disk. Effectively you are removing the entry in the table of contents of a book, but the page itself and all words on it still exists. This is why many criminals are caught after there computers are forensically analyzed and the criminal thinks he's ok because he cleared his internet history. Surprise surprise, the data is still on disk in many cases, as long as it has not been overwritten by new data. Simply browsing the disk, even within the operating system using some special tools (doesn't require fancy hardware), you can fully recover the file itself. This is why just reformatting and reinstalling Windows leaves data left on the computer. This data can be recovered outside the context of the operating system, however the OS or programs cannot, typically, read the data. Further, this data is no longer going to be saved - it could be overwritten at any minute by the operating system, as it sees that physical spot on disk as available and may write to it next. This is why if you have a virus, reformatting takes care of the virus in most cases. There are some exceptions, such as ring-0 viruses that virtualize everything running on the computer and don't let the computer actually access the hardware itself. These are fairly rare, though. In regards to the OP: If your mom is the owner of your soon-to-be-gifted computer, just reformat it and reinstall Windows. If its going to leave your family, however, or anybody you trust, do yourself a favor and do one or two passes over the entire disk just to be safe. You'd be surprised at what I've found on old computer hard drives. Just takes one dumpster diver... The above post is my opinion. Don't like it? Don't read it.
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661795.48/warc/CC-MAIN-20160924173741-00234-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
3,626
9
https://nixdoc.net/man-pages/Tru64/man1/line.1.html
code
line - Reads one line from standard input Interfaces documented on this reference page conform to industry standards as follows: Refer to the standards(5) reference page for more information about industry standards and associated tags. The line command copies one line, up to and including a newline, from standard input and writes it to standard output. Use this command within a shell command file to read from your terminal. The line command always writes at least a newline character. The line utility has no internationalization features and is marked LEGACY in XCU Issue 5. Use the read utility To read a line from the keyboard and append it to a file, enter: echo 'Enter comments for the log:' echo ': \c' line This shell procedure displays the message: Enter comments for the log: It then reads a line of text from the keyboard and adds it to the end of the file log. The echo ': \c' command displays a : (colon) prompt. See the echo command for information about the \c escape sequence. Commands: echo(1), ksh(1), read(1), Bourne shell sh(1b), POSIX shell sh(1p) [ Back ]
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00003.warc.gz
CC-MAIN-2023-40
1,081
23
https://www.freelancer.com/work/web-developer-net-sql-server-2005-jobs-egypt/
code
Looking for a programmer with UNET Unity experience to work on my MMO Cooperative Shooter Game. Must be fluent in English. ...several different travel tools, all day, every day The flexibility to work shifts, including nights and weekends Trade the world’s most popular jobs and explore them in a great team. We offer thousands of online jobs! We are a 24/7 operating environment and we are currently offering split shifts which can offer you some flexibility and work/life balance The application is job application and it is gonna provided free for people. Users can use the tinder like app to search for jobs. The app should have multiple splash screens with 4 photos randomly selected at login. This project will be build using Xamarin c# technologies and it should be native android and apple app. There's already the part of swipe ...[login to view URL] 2-In the photographs, when you enter for example here: [login to view URL] this happens in all the photos that are uploaded to the web. 3-You can click on the photo and it is wide, I would like to deactivate that, possibly you have to modify the plugin. 4-Add logo in the admin panel, replaced by the company's ...publication and a BS. She must be female, and ideally, she has an MA and is working on her Ph.D. 2. Find a female Egyptologist in Egypt. At least with BS, better MA and ideally working on her Ph.D. Must study in Egypt and ideally be non-caucasian. We need to have the publications and at least one, better two ways of contacting her. E.g., Email and i need someone to setup 2 cron jobs #1 Auto import the inventory from ebay. Only the new products [login to view URL] #2 Auto delete this folder content every 30 min [login to view URL] #3 Auto Delete contents in this folder every 30 min This [login to view URL] I am looking for few colleagues which could be able to deliver quality and fast results in data entry and web research jobs. I am a consultant and I need few people to work on various tasks, I will show tasks and working process here to understand better. Note - No automatic bidding will be accepted, that's why I ask to write me an introductory 1) Go to the websites Indeed.com. Search for roles of (a) iOS developer (b) Android developer (c) Software Engineer (d) Server Side Engineer (e) Data Engineer (f) Front-end (g) Back-end. And put location as San Francisco Bay Area, California. Look at first 10 Job Descriptions. 2) Try to divide these roles into categories for each role like Databases Looking for an experienced wix website designer to handle a client for me and my company. We do not need a wordpress developer that thinks they can do wix, we require someone that has experience with wix and can showcase some clean beautiful sites they have made. If you do well with this client, this could become a continuous job for you and we will Overview: Custom Wordpress Plugin for DB Integration With WP-Jobs Plugin Plugin Functionality: Custom Wordpress plugin required to: • Access a remote database • Check for new records • Copy data from new records and add a new job in WP-Jobs. • Data must be copied perfectly • Images must be uploaded into the new job Script Execution Schedule Looking for professional email writer for daily jobs. ...the end of Chapter 3. REQUIRED: 1. Explain what would make a “good” classification in the context of international accounting. 2. Are the classifications made before 2005 still relevant for some purposes in the new IFRS world? 3. Think of how things could be classified in the new world of IFRS. Prepare two classifications as follows and provide i have been running my business for 20 years, we are leading in our market in Egypt. we manufacture car accessories ex: car alarm system and car audio. we are now looking for an export strategy that would help us do more business internationally. Sorry to bother; I'm a full stack developer with broad experience. Due to an emergency, I need to earn some pocket money in a part-time role ASAP. I can do Python Django, Java EE, Node.js, React, Angular, web scraping, socket programming, etc. Small projects preferred.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863684.0/warc/CC-MAIN-20180520190018-20180520210018-00276.warc.gz
CC-MAIN-2018-22
4,117
14
https://www.npmjs.com/package/hyper-savetext
code
hyper-savetext is a text export plugin for Hyper. It enables you to save/export text within the terminal to a text file. The feel and functionality of the plugin has been modeled after the same feature within macOS's Terminal.app. Currently, Hyper has been tested on macOS, Linux, and Windows with the stable version of Hyper 1.4.8, 2.1.1, and 3.0.2. Using Hyper's CLI hyper install hyper-savetext To install, edit ~/.hyper.js and add plugins: [ "hyper-savetext", // other plugins... ], Using the plugin You have the option to save all the text in the terminal or just the selection. The save button is under Hyper's 'Shell' menu on macOS, and the 'File' menu on Window and Linux. Saving can also be done through the keybindings Cmd-S (Ctrl for Windows/Linux) or Cmd-Shift-S, which corresponds to saving all the terminal text or just the current selection, respectively. To set up the project for development: - Clone the repo to - Add this to your localPlugins:// local plugins...'hyper-savetext' - Reload terminal window
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585121.30/warc/CC-MAIN-20211017052025-20211017082025-00003.warc.gz
CC-MAIN-2021-43
1,022
13
https://forums.developer.amazon.com/questions/71018/not-getting-any-request-for-exchanging-token-in-au.html
code
Hi Amazon i am getting trouble to link the Alexa account using authorization grant flow. The redirect url will look like this "https://layla.amazon.com/api/skill/link/Mmmmmm?code="generated code"&state="xyz". But i am not getting any request for token exchange at endpoint. Here is the error i am getting "cannot link with alexa to imonitor skill try again later" ?. I tested account liking process using postman and getting token successfully. Please help me to resolve this issue
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657172545.84/warc/CC-MAIN-20200716153247-20200716183247-00356.warc.gz
CC-MAIN-2020-29
481
2
https://daftarmains128.co/zbot-free-download/
code
- Counter Strike 1.6 - Z-Bot. ZBot Trojan Remover 220.127.116.11 Replace all files. You have now installed Zbot! Now just start Counter-Strike, make a New Game. Now you will need to add the bots to the game. This is done either with the console or by pressing "H". Pressing "H" will bring up the command menu. If you prefer the console, commands are listed below. When the first bot joins the. Changing command menu button. By default the command menu is bound to "H". To change this bring up the console and type:. bind "button" "+commandmenu". Causes a bot to be added to the game. "bot_add" will add a bot to the team specified by the "bot_join_team" cvar. "bot_add_t" and "bot_add_ct" forces the bot onto the respective teams. This command takes either the name of a bot, or the keyword "all" - causing all bots in the game to be killed. This command takes either the name of a bot, or the keyword "all" - causing all bots in the game to be kicked. These commands are shortcuts that set the bot_allow_* cvars accordingly. bot_difficulty [0-3]. This cvar determines the difficulty of all newly created bots (existing bots will retain the difficulty setting they were created with). Zero = easy, 1 = normal, 2 = hard, 3 = expert. Difficulty values higher than 3 are reset to 3. Setting this cvar to a nonzero value will cause the given number of bots to be maintained in the game.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662556725.76/warc/CC-MAIN-20220523071517-20220523101517-00680.warc.gz
CC-MAIN-2022-21
1,382
7
http://govit.sys-con.com/node/2534668
code
|By PR Newswire|| |February 11, 2013 10:58 AM EST|| 'Power-Curve Society' examines rising economic inequality, challenges to existing institutions and conceptions of value, and an imminent "personal data revolution" WASHINGTON, Feb. 11, 2013 /PRNewswire-USNewswire/ -- The Aspen Institute Communications and Society Program today released a report that offers a sweeping look at how technological innovation is restructuring productivity and lays out the social and economic impact resulting from these changes. "Power-Curve Society: The Future of Innovation, Opportunity and Social Equity in the Emerging Networked Economy," written by David Bollier, addresses the growing concern about the technological displacement of jobs, stagnant middle class income, and wealth disparities in an emerging "winner-take-all" economy. It also examines cutting-edge innovations in personal data ecosystems which could potentially unlock a revolutionary wave of individual economic empowerment. Read it at http://as.pn/powercurve. On Twitter: use #powercurve and follow @aspencs. The report derives from the Aspen Institute's Communications and Society Program's 21st annual Roundtable on Information Technology, held in Aspen last August. It includes insights from MIT Media Lab Director Joi Ito, Federal Communications Commission Chairman Julius Genachowski, Cisco's Padmasree Warrior, MIT Economists Andrew McAfee and Erik Brynjolfsson, Reputation.com CEO Michael Fertik, and Khan Academy President and CEO Shantanu Sinha, among many others. "Power-Curve Society" considers the broad implications of a globally networked economy that allows greater ease of transactions but relies less on human workers to carry them out. In this emerging technologically accelerated economy, wealth increasingly concentrates in the hands of a few rather than spreading itself out across the larger population (i.e., the traditional "bell curve" of normal distributions). The Report explores the mechanisms of this phenomenon and its suspected role in "hollowing out" the American middle class. It also questions contemporary measurements of equality, well-being and value in the digital age; and it surveys the ways that cloud computing, Big Data and collaboration are redefining work and commerce. Along with examining the historical relationship between innovation and productivity, "Power-Curve Society" assesses the increasing speed by which new technologies are outpacing social and institutional capabilities. It then presents groundbreaking new frameworks for rethinking entrenched notions of jobs, learning, skills, entrepreneurship and public policy to better brace everyone, rich and poor, for the unrelenting future. "This report lays out some of the gravest issues that face us," said Charlie Firestone, Executive Director of the Communications and Society Program, "and the solutions and insights gathered by David Bollier come from some of the brightest minds leading the charge." "Power-Curve Society: The Future of Innovation, Opportunity and Social Equity in the Emerging Networked Economy" is the result of a three-day Aspen Institute dialogue that convened venture capitalists, economists, management gurus, technologists, and innovators in business, education, philanthropy and government to address the topic. Dialogue participants who shared their insights in this report include John Seely Brown, Co-Chairman, Deloitte Center for the Edge; Erik Brynjolfsson, Director, MIT Center for Digital Business; Zoe Baird Budinger, President, Markle Foundation; Michael Fertik, Founder and CEO, Reputation.com; Shane Green, President and CEO, Personal.com; Julius Genachowski, Chairman, Federal Communications Commission; Reed Hundt, Former Chairman, Federal Communications Commission; Joi Ito, Director, MIT Media Lab; Leila Janah, Founder and CEO, Samasource; James Manyika, Director, McKinsey Global Institute; Andrew McAfee, Principal Research Scientist, MIT Center for Digital Business; Shantanu Sinha, President and CEO, Khan Academy; Padmasree Warrior, Chief Technology and Strategy Officer, Cisco Systems; and others. Charlie Firestone, Executive Director, Communications and Society Program, moderated the Roundtable. A complete list of participants is in the Report. Read it at http://as.pn/powercurve. About The Aspen Institute The Aspen Institute Communications and Society Program serves as a non-partisan venue for global leaders and experts to exchange insights on the societal impact of advances in digital technology and network communications. It also creates a multidisciplinary space in the communications policy-making world where veteran and emerging decision-makers can explore new concepts and develop new policy networks. Its annual Aspen Institute Roundtable on Information Technology examines the implications of emerging information technologies on societies, governments, communities, and individuals, and the new leadership roles that are required. Learn more at www.aspeninstitute.org/c&s and follow the Communications and Society Program on Twitter @aspencs The Aspen Institute is an educational and policy studies organization based in Washington, DC. Its mission is to foster leadership based on enduring values and to provide a nonpartisan venue for dealing with critical issues. The Institute is based in Washington, DC; Aspen, Colorado; and on the Wye River on Maryland's Eastern Shore. It also has offices in New York City and an international network of partners. For more information, visit www.aspeninstitute.org. SOURCE The Aspen Institute As more intelligent IoT applications shift into gear, they’re merging into the ever-increasing traffic flow of the Internet. It won’t be long before we experience bottlenecks, as IoT traffic peaks during rush hours. Organizations that are unprepared will find themselves by the side of the road unable to cross back into the fast lane. As billions of new devices begin to communicate and exchange data – will your infrastructure be scalable enough to handle this new interconnected world? Oct. 13, 2015 05:00 PM EDT Reads: 124 This week, the team assembled in NYC for @Cloud Expo 2015 and @ThingsExpo 2015. For the past four years, this has been a must-attend event for MetraTech. We were happy to once again join industry visionaries, colleagues, customers and even competitors to share and explore the ways in which the Internet of Things (IoT) will impact our industry. Over the course of the show, we discussed the types of challenges we will collectively need to solve to capitalize on the opportunity IoT presents. Oct. 13, 2015 04:30 PM EDT Reads: 116 SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever. Oct. 13, 2015 04:00 PM EDT Reads: 731 SYS-CON Events announced today that Sandy Carter, IBM General Manager Cloud Ecosystem and Developers, and a Social Business Evangelist, will keynote at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Oct. 13, 2015 03:15 PM EDT Reads: 260 SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in high-performance, high-efficiency server, storage technology and green computing, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and Embedded Systems worldwide. Supermi... Oct. 13, 2015 01:45 PM EDT Reads: 232 With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal an... Oct. 13, 2015 01:00 PM EDT Reads: 228 The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team.... Oct. 13, 2015 01:00 PM EDT Reads: 345 The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth. Oct. 13, 2015 01:00 PM EDT Reads: 341 Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of at least three separate application components: the software embedded in the device, the backend big-data service, and the mobile application for the end user's controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/target - this makes the integration of these separate pipelines and the coordination of software upd... Oct. 13, 2015 12:00 PM EDT Reads: 415 As a company adopts a DevOps approach to software development, what are key things that both the Dev and Ops side of the business must keep in mind to ensure effective continuous delivery? In his session at DevOps Summit, Mark Hydar, Head of DevOps, Ericsson TV Platforms, will share best practices and provide helpful tips for Ops teams to adopt an open line of communication with the development side of the house to ensure success between the two sides. Oct. 13, 2015 12:00 PM EDT Reads: 696 The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll share tips on how to speed up business initiatives, harness Big Data and remain one step ahead by apply... Oct. 13, 2015 12:00 PM EDT Reads: 750 There will be 20 billion IoT devices connected to the Internet soon. What if we could control these devices with our voice, mind, or gestures? What if we could teach these devices how to talk to each other? What if these devices could learn how to interact with us (and each other) to make our lives better? What if Jarvis was real? How can I gain these super powers? In his session at 17th Cloud Expo, Chris Matthieu, co-founder and CTO of Octoblu, will show you! Oct. 13, 2015 12:00 PM EDT Reads: 306 Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driving this change including privacy controls, data transparency and integration of real time context w... Oct. 13, 2015 11:00 AM EDT Reads: 308 The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, will explore the current state of IoT connectivity and review key trends and technology requirements that will drive the Internet of Things from hype to reality. Oct. 13, 2015 11:00 AM EDT Reads: 323 "Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Oct. 13, 2015 07:00 AM EDT Reads: 6,012 Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data. Oct. 13, 2015 04:00 AM EDT Reads: 686 There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete end-to-end walkthrough of the analysis from start to finish. Participants will also be given the pract... Oct. 13, 2015 03:00 AM EDT Reads: 413 Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity. Oct. 13, 2015 03:00 AM EDT Reads: 265 WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing these ideas and some early experiments performed in the Kurento open source software community in areas ... Oct. 13, 2015 12:45 AM EDT Reads: 857 Electric power utilities face relentless pressure on their financial performance, and reducing distribution grid losses is one of the last untapped opportunities to meet their business goals. Combining IoT-enabled sensors and cloud-based data analytics, utilities now are able to find, quantify and reduce losses faster – and with a smaller IT footprint. Solutions exist using Internet-enabled sensors deployed temporarily at strategic locations within the distribution grid to measure actual line loads. Oct. 13, 2015 12:00 AM EDT Reads: 280
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738017788.94/warc/CC-MAIN-20151001222017-00199-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
16,794
53
https://communities.sas.com/t5/SAS-Communities-Library/How-to-change-a-password-for-SAS-Visual-Analytics-users/ta-p/308478
code
How can SAS Visual Analytics users change their own passwords? We are not using LDAP/Active Directory, but "internal" SAS accounts that are managed in the SAS environment. First, I'll share the simple method: using SAS Personal Login Manager. If your end users don't have access to that tool, there is another programmatic method that you can set up -- but it's more complicated. If you are using internal accounts for your end users (they are all sharing an OS account as the outbound login), they can change their own passwords via SAS Personal Login Manager, usually installed in the end users PCs. This gives them a simplified interface that only changes passwords stored in the SAS metadata repository. I think I've found a solution that allows users to change passwords for internal metadata accounts (@saspw) via web interface. I've searched for an existing SAS tool or utility that could be used, but only found options to change passwords for non-internal accounts. I guess one of the reasons for that, according to Open Metadata Interface: Reference and Usage (page 170), is because "Internal logins are not intended for regular users. They are intended for metadata administrators and some service identities." Anyway, using the SAS Java Metadata Interface documented in the reference doc mentioned above, I was able to create a Java class “setPasswd” that changes passwords for internal accounts. I have attached the code (.java.txt extension because .java is not considered a valid extension for attachements here), but I have to say that I'm not a Java programmer, and I'm sure this code can be improved, especially as it refers to error handling, constructors, and better structuring the Java class. The API methods I used require administrator privileges, so I've used sasadm@saspw internally. This custom Java class “setPasswd” can be instantiated from a SAS program within a datastep. The SAS code would look something like this (see SAS Language Reference: Concepts for additional information): data _null_; length rc 8; dcl javaobj j ("setPasswd"); j.callIntMethod("changePasswd", "&_metaperson", "&Passwd1", rc); j.delete(); run; Observe that this is just part of the code. Another requirement that has been shared in this thread stated that those internals accounts should be set to have their passwords expiring in 30 days or so. If the password expiration option is set, once the password is changed by an administrator, it is automatically flagged as expired to force the user to change it next time he or she logs in. This happens for example if you go to SAS Management Console as an administrator and change the password for someone else's internal account, as well as if you do so through the Java API. In order to reset that flag, you need to execute the sas code below that uses datastep metadata functions to set the attribute PasswordTimestamp (which is zero when the password is expired) with the same value as LoginTimestamp. More information can be found in the SAS Language Interfaces to Metadata: options metauser="sasadm@saspw" metapass="99999999999999999999999999999999"; data _null_; length rc 8 id $20 type omsUri $256 logints $100; call missing(id, type, logints); omsUri = "omsobj:InternalLogin?InternalLogin[ForIdentity/Person[@Name='&_metaperson.']]"; rc=metadata_resolve(omsUri,type,id); rc=metadata_getattr(omsUri,"LoginTimestamp",logints); rc=metadata_setattr(omsUri,"PasswordTimestamp",logints); run; I wondered if there was a method in the Java Metadata Interface that could be used to perform this step within the custom Java class and eliminate the need for the SAS code above. What inspired me to go towards this direction was this other Community post by Andreas Menrath regarding CREATE”INTERNAL ACCOUNT – PASSWORD UPDATE” in SAS 9.4. The final step is to make this code available as a stored process that also streams a HTML form to capture the new password as a parameter to the stored process, that internally becomes the &Passwd1 macro variable. The other macro variable &_metaperson is automatically set by the stored process and contains the userid of the executing user. The following is a simplified version of the HTML interface, featuring only the key components. I have attached the complete stored process code as well: data _null_; format infile $char256.; input; infile = resolve(_infile_); file _webout; put infile; cards4; <HTML> <HEAD> </HEAD> <BODY> <FORM ACTION="&_URL" METHOD="post"> <INPUT TYPE="HIDDEN" NAME="_program" VALUE="&_program" /> Changing password for &_metaperson (&_metauser).<br> <br> New Password<br> <INPUT TYPE=PASSWORD NAME="Passwd1" /><br> New Password (validation)<br> <INPUT TYPE=PASSWORD NAME="Passwd2" /><br> <br> <INPUT TYPE="SUBMIT" VALUE="Change Password" /><br> <br> </FORM> </BODY> </HTML> ;;;; run; To make this stored process available to the end users in a web-based interface, you can embed it as a stored process object in a SAS Visual Analytics report: You will need to set classpath environment variable for the SAS session that runs in the Stored Process Server. This can be done in a few different ways as documented in the SAS Language Reference: Concepts. In this example I’ve added the line below in the stored process <sas_config_dir>\Lev1\SASApp\StoredProcessServer\sasv9_usermods.cfg file. Note that I’ve copied all of the jar files I thought I’d need to my project folder, but you don’t need to do that. In order to compile the Java program you will need to use the same version that SAS is currently using. You can find this and additional info by running the following PROC: PROC javainfo all; run; As a final disclaimer, I’d like highlight that I have not assessed the potential security breaches that this solution may have. If you decide to implement that in production, especial attention will be needed in order to review and improve security aspects. Registration is open! SAS is returning to Vegas for an AI and analytics experience like no other! Whether you're an executive, manager, end user or SAS partner, SAS Innovate is designed for everyone on your team. Register for just $495 by 12/31/2023. If you are interested in speaking, there is still time to submit a session idea. More details are posted on the website. Data Literacy is for all, even absolute beginners. Jump on board with this free e-learning and boost your career prospects.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00274.warc.gz
CC-MAIN-2023-50
6,399
19
https://forum.level1techs.com/t/games-not-going-fullscreen-on-obs/56765
code
I'm having trouble trying to get my games running full screen when I'm live streaming. To sum it up to make it easy to explain. Games that aren't at 1920X1080, but are at a lower resolution, does not go full screen, but only shows up as a window. I don't know what is going on there. If anyone can help, that will be awesome!
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337524.47/warc/CC-MAIN-20221004184523-20221004214523-00237.warc.gz
CC-MAIN-2022-40
325
1
http://www.artsjournal.com/artfulmanager/main/sustaining-breakout-and-disrup.php
code
‘Innovation’ is the buzz word at many arts conferences these days, and among many funders. With so many things changing in our environment — all of the STEEP variables at once (Sociological, Technological, Economic, Environmental, Political) — innovation in programming, practice, business process, strategy, and such seems a best way through. - Sustaining innovations in products or services are incremental. They help any organization raise the bar enough to stay in the game. In the computer world, this would include incrementally smaller, faster, cheaper laptop computers. - Breakout innovations significantly advance the level of play within an existing category. Think about netbooks, for example, that were quite significantly smaller than laptops. - Disruptive innovations change the game. According to the article, they are disruptive “because they disrupt the current market behavior, rendering existing solutions obsolete, transforming value propositions, and bringing previously marginal customers and companies into the center of attention.” Enter the iPad and other tablet computers.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370492125.18/warc/CC-MAIN-20200328164156-20200328194156-00140.warc.gz
CC-MAIN-2020-16
1,110
4
http://conferences.computer.org/3dui/3dui2007/cfp/overview.html
code
|Call for Participation: Overview & dates| We invite you to participate in the IEEE Symposium on 3D User Interfaces 2007 in Charlotte, North Carolina, USA, March 10-14, 2007. IEEE 3DUI 2007 is the second international symposium on 3D UIs and will be held to provide an intensive exchange between industrial and academic researchers working in various 3DUI research areas and to trigger discussions among participants. It builds on successful 3DUI workshops in 2004-05 and 3DUI 2006. The symposium will last for two days, and will be followed immediately by the IEEE VR conference. Hideya Kawahara, Sun Microsystems, developer of Looking Glass, will give the 3DUI Keynote. The theme of the Symposium will cover all areas of 3D UI research. The Symposium themes include, but are not limited to, the following topics: There is also a PDF version of the CFP.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690340.48/warc/CC-MAIN-20170925055211-20170925075211-00045.warc.gz
CC-MAIN-2017-39
854
5
http://lambda-the-ultimate.org/classic/message2753.html
code
Thanks! This is really a good presentation.| I was amazed how closley the topics discussed match my personal experience. I had the sma e feeling when I learning about the (sum i) and (sum i^2) formulas, and I even invented a constructive approach. I always prefered the non-clairvoyant approach to solving inequalities. And I am an abstraction and generic programming buff. So it isn't surprising that I agree the conclusions regarding CS education (Java is the way to go, naturally).
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516194.98/warc/CC-MAIN-20181023132213-20181023153713-00499.warc.gz
CC-MAIN-2018-43
484
6
https://www.universalhub.com/2010/patch-bust-belmont
code
Hey, there! Log in / Register Patch to bust up Belmont By adamg on Tue, 04/06/2010 - 8:44am Not only does AOL's nascent Belmont site have an editor, it's hiring freelance news and sports writers (hey, anybody else old enough to remember when people like that were called "stringers?"). Like the job UHub is doing? Consider a contribution. Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655247.75/warc/CC-MAIN-20230609032325-20230609062325-00676.warc.gz
CC-MAIN-2023-23
346
5
https://aclanthology.org/2020.acl-main.716/
code
AbstractLinguistic Code-switching (CS) is still an understudied phenomenon in natural language processing. The NLP community has mostly focused on monolingual and multi-lingual scenarios, but little attention has been given to CS in particular. This is partly because of the lack of resources and annotated data, despite its increasing occurrence in social media platforms. In this paper, we aim at adapting monolingual models to code-switched text in various tasks. Specifically, we transfer English knowledge from a pre-trained ELMo model to different code-switched language pairs (i.e., Nepali-English, Spanish-English, and Hindi-English) using the task of language identification. Our method, CS-ELMo, is an extension of ELMo with a simple yet effective position-aware attention mechanism inside its character convolutions. We show the effectiveness of this transfer learning step by outperforming multilingual BERT and homologous CS-unaware ELMo models and establishing a new state of the art in CS tasks, such as NER and POS tagging. Our technique can be expanded to more English-paired code-switched languages, providing more resources to the CS community.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510575.93/warc/CC-MAIN-20230930014147-20230930044147-00143.warc.gz
CC-MAIN-2023-40
1,163
1
http://stackoverflow.com/questions/5362895/backing-up-work-on-a-branch-using-heroku-rails-and-git
code
Rails/Heroku/Git newbie - here is my question. I have an app deployed with Heroku and am using the git repository hosted there as the only remote copy of my local work. I start making changes locally on a new branch and want to make this branch available on Heroku so that I can continue work on it from another computer. Heroku ignores branches other than master and I don't want to merge my changes yet (or push them as master). Is there a way to store/access my new branch via my Heroku git repository, or is it better to have another remote git repository for my work in progress.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064420.15/warc/CC-MAIN-20150827025424-00215-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
584
1
https://www.fundmytravel.com/campaign/YCLaLkQcBQ
code
Please help me save money for my school trip to France!!!!! I don't really know how it will help the community but I will help by traveling around the world like eating different foods, learning different languages, exploring the things they have there and more well it wasn't me that chose it, it was mainly my French teacher so instead of studying it by the computer she figured out that we can go to see for ourselves but because I haven't got enough money to raise for it I have to figure out how I can get the money that's why I did this this makes it meaningful to me because I love France I love everything about it but the fact is that I don't know how to speak French but I'm getting better and I never been so this would be amazing if I could actually go but i need to make the money that I need to go there so please help me
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948549.21/warc/CC-MAIN-20180426203132-20180426223132-00052.warc.gz
CC-MAIN-2018-17
835
4
http://avemariasongs.org/aves/F/FoxL.htm
code
Composer: Linda Fox (s.a.), 1999 |Recording: not available A-_-_-_-_-_-_-_-ve, Gra ti a ple _ na, Do mi _ nus _ te _ cum, Be _ _ _ _ ne dic ta _ _ _ tu in mu _ li er _ i bus. Et be ne dic tus, be ne dic _ tus fruc _ _ tus ven _ _ tris tu _ i Je _ su, Je _ _ _ su. |San _ _ _ _ _ cta Ma ri _ _ a, O _ _ _ _ _ ra _ pro no _ bis. O _ _ ra O _ _ _ ra _ pro no _ _ _ _ _ _ bis pec _ ca to _ ri bus, O ra, _ o ra _ pro no _ _ bis, O _ _ _ _ _ ra, San _ _ cta Ma _ _ _ ri a, A _ ve, A-_ ve. |Score: free print |Posted on YouTube: Not available at |You could be If you (or your choir) perform this Ave Maria, make a video recording. Post your video on YouTube, email me the page URL and I'll embed the video in this page. You can also email me an MP3 for audio only. |I don't think by any stretch of the imagination I'd call myself a serious composer. I studied music at Oxford in the 60s, and then trained as a singer at the Royal Academy of Music (singing voice now, sadly, almost completely defunct) and have been teaching or directing music in some form or another ever since then - everything from secondary schools to opera companies to adults with severe learning difficulties to children's choirs. Having also been a solo and choral singer and an opera translator (as well as a mum!), I've diversified so much that I probably haven't devoted enough of my career to any one thing to say I've been a stupendous success at it; but over the past 20-odd years I seem to have produced a lot of assorted little bits of music as needed, and I'm really looking forward to being able to put some of it on the SibeliusMusic website for others to hear and maybe perform. It's all very functional and approachable and quite easy, because it was all written with a performance in mind. It's mostly school music and choir arrangements, plus music for plays, and there's also a clutch of complete opera translations amongst this Please notify us of any Page last modified: March 14, 2013 Return to my homepage:
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00483.warc.gz
CC-MAIN-2023-50
1,994
44
https://www.programmableweb.com/sdk/sharethis-php-sdk-shin
code
June 3, 2016 Single purpose API Sorry, No followers So, you are an indie developer, or a small to midsize business, without the resources to curate your own complex backend? Enter Orchestrate (formerly known as Orchestrate.io), a database-as-a-service (DBaaS) provider that manages a complex infrastructure of scalable storage and querying engines (NoSQL), each optimized to a particular task or query. Topsy, a leading social analytics solutions provider, has just announced the launch of a brand new set of social data APIs that have been added to Topsy API Services. The new set of APIs allow developers to integrate social metrics, insights, and content from any time period or in real time directly into applications. The AP Metadata Service that has internally powered the Associated Press' award-winning news operation is now available to third-party developers and publishers. The service is aimed at publishers looking to "add rich metadata to their content, enabling them to connect their customers with more relevant news and information." The AP delivers the Metadata service in a cloud-based offering via a set of APIs associated with the organizations news content.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886106465.71/warc/CC-MAIN-20170820112115-20170820132115-00009.warc.gz
CC-MAIN-2017-34
1,179
6
http://www.adminlinux.org/2010/09/spanish-linux-support-engineers-red-hat.html
code
Technical Support Engineers needed Red Hat. Red Hat jobs UK (Farnborough) Primary responsibilities include assisting with highly technical support requests from our enterprise customers in EMEA via the telephone and the Web while maintaining an extremely high level of customer satisfaction. Will also be expected to keep technical and non-technical skills current by participating in training courses and tending to personal development, all while working in a multicultural/multilingual technical team. Relocation expenses will be offered to qualified candidates with EU work authorization. Specific Duties/Primary Responsibilities: • Perform initial or secondary investigation and respond to online and phone support requests • Carrying out the necessary research and provide analysis to fully understand the issue • Proposing workarounds if appropriate • Proposing and discussing fixes, providing advice and educating customers • Interfacing with engineering, product management and support management when necessary in order to prioritise customers' requests • Incorporating your findings in Red Hat's knowledge base Skills • Fluency in English and or another european language(Spanish,Italian,German) and spoken Demonstrable commercial Linux experience in the enterprise sector - configuration, troubleshooting, debugging, system admin etc. • Good theoretical knowledge of networking, UNIX-like services and concepts • Advanced application debugging knowledge • Basic kernel debugging and tuning knowledge • Strong troubleshooting skills and a passion for problem solving and investigation • Customer focus and service orientation • Previous knowledge of support systems and tools • Solid understanding of Open Source technologies and technical support environments • Scripting abilities preferred (Perl/Python/Bash) • Knowledge of enterprise storage solutions and clustering • Knowledge of enterprise database solutions • Prior participation in open source software projects is preferred • Relevant technical degree or qualified by experience. • RHCE or other Linux certification is preferred (although we will train and certificate successful candidates with an RHCE accreditation) Please apply with a covering letter and CV (in English) to [email protected]
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122933.39/warc/CC-MAIN-20170423031202-00080-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,306
28
https://www.ozxmod.com/awesome_checkout_api
code
Awesome Checkout Setup Awesome Checkout Setup Demo: Social Login API Setup: - Click Here and click on Add a New App button to make the app ID. - Choose Website - Give an app name and click on Create New Facebook App ID - Click on Create app ID - Click on Skip Quick Test - Go to the Google Developers Console Select an existing project, or create a new project by clicking Create Project: - In the Project name field, type in a name for your new project. - In the Project ID field, the console has created project ID. Optionally you can type in a project ID for your project. But project ID must be unique worldwide. - Click on the Create button and the project to be created in some seconds. Once the project is created successfully, the project name would be appearing at the top of the left sidebar. - In the left sidebar, select APIs under the APIs & auth section. A list of Google APIs appears. - Find the Google+ API service and set its status to Enable. - In the sidebar, select Credentials under the APIs & auth section. - In the OAuth section of the page, select Create New Client ID. - Create Client ID dialog box would be appearing for choosing application type. - In the Application type section of the dialog, select Web application and click on the Configure consent screen button. - Choose Email address, enter the Product name and save the form. - In the Authorized redirect URI field, enter the redirect URL. - Click on Create Client ID. - The Client ID for web application will be generated. Note the Client ID and Client secret for later use that will need to use to access the APIs. - Click Here Go to the Apps page at LinkedIn Developer Network and login with your LinkedIn account credentials. - Click on the Add New Application link for create new App. - Enter the new application details into the app registration form. - Company Info: If you already have not any company page, select “New Company” and enter your company name. - Application Info: Enter all the application details and select “Live” option as “Live Status”. - Contact Info: Enter your contact details. - OAuth User Agreement: Select the “Default Scope” and enter “Redirect URLs” ( ), “Accept Redirect URL” (http://localhost/login_with_linkedin_using_php/process.php), “Cancel Redirect URL” (http://localhost/login_with_linkedin_using_php/index.php). - Click on the Add Application button. - Once the application is created successfully, application details would be displayed. - Keep the API Key and Secret Key for later use. - At first go to the https://apps.twitter.com/app/new and login at your Twitter developer account. - Create new apps with the following details. - Name: Your application Name. This is shown to the user while authorizing. - Description: Your application Description. This is shown to user while authorizing. - Website: Your application website. - Callback URL(*): After authorization, this URL is called with . - Now change the apps permission to Read and Write or Read, Write and Access direct messages. For change the apps permission, you need to add mobile number to your twitter account. If you are not able to add mobile number from the web, then please follow the below steps. - In order to use this process, you need to have a smart phone and install the Twitter mobile application. By this process you will be able to switch to Twitter application write access, although the Twitter websites doesn’t accept your phone number. - After installing the Twitter mobile application, go to the tab on the right, it’s the screen showing your user details. Hit the wheel (it’s shown under the amount of tweets) and click Settings. - After clicking on Settings, another view opens where you have to click on your account. - The following view shows the options for your Account – scroll all the way down and click Security. - After hitting the Security option, the application will ask you to add a phone. - After clicking Add phone, the mobile browser will open and require you to insert your phone number. - After adding the phone number and pressing save, wait a few minutes. Twitter will send you a link to the phone number you just added to verify it. After clicking the link in the SMS the phone number is approved and you should be able to switch the application access to write. - After the apps creation you have to click on Test OAuth. Also you should login with your twitter account for test OAuth. After that you would be redirected to the OAuth Settings page. At the OAuth Settings page you can see the Consumer keyand Consumer secret. - Congratulation! your apps creation has completed.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499713.50/warc/CC-MAIN-20230129112153-20230129142153-00381.warc.gz
CC-MAIN-2023-06
4,650
49
http://k4vb.com/Computer%20tinkering.htm
code
I served as President of the Huntsville PC Users Group from 2004 thru 2007. Click here to access the HPCUG Webpages. My home computer system consist of 3 home made (by Sam's guys at DTM Computers) AMD based desk top PCs and one Asus X52F laptop all running Windows 7 except one which is a dual boot W7 or W8. I also have one reasonably reliable Acer Aspire 5100 laptop. It works pretty well but the external monitor port stopped working so I could no longer use it for PowerPoint. I use the laptops primarily for PowerPoint presentations. The Acer came with Vista which I didn't really like that well so I replaced it with W7. All computers were networked using a Netgear WGR614 wireless Router. My wife was the recipient of an Apple iPad Air for Christmas. It worked poor at best and not at all on my home network. After many attempts to make it work, I concluded that the router was the problem. When I updated the firmware on the Netgear router the installed version was 10 years old. I consider 10 years to be great life for a router and it still worked just not with an Apple product. Best buy had no Netgear Modem/Router combination so I purchased a Zoom 5352 Modem/Router with wireless N. My research indicated that wireless N was what worked with the iPad Air. That did the trick, after a short chat with my Internet service provider (Wow) the system worked great, even the iPad Air! By the way, I have had 2 problems solved by the Wow technicians out in South Dakota. I have nothing but good things to say about that group. They are fast, efficient, professional and a pleasure to work with. One of the towers was used to run my ham radio station. I purchased a software defined ham radio and decided that I needed a faster machine. It still did the job but I was in a bigger hurry than it was, so I upgraded. The new Ham shack computer was built for me by DTM Computers and is a whizzer. It is an Asus M5A97R2.0 with a 6 core AMD processor with a solid state "C" drive. I added a second 23 inch monitor. I now display the Software Defined Radio on monitor one and all of my digital ham radio programs on monitor two. That really works slick. I can run my satellite tracking program, MulitPSK, and HDSSTV (easy PAL) all at the same time and display them on the bigger monitor and see them all at the same time and still have room for more. The dual boot is working well but once I used W8, I really like it and maybe didn't need dual boot. All of my ham radio digital programs are interconnected within the computer with the Software Defined Radio using Virtual Audio Cables (VAC) which further adds to the speed of operation and eliminates the need for intercafing boxes between the radio and the computer. The "C" drive is pretty big so that dual boot has not penalizing me that much, so far. It is a major problem in that to date I have not figured out if or how I can run a given software package on both W7 and W8 on that machine without having 2 copies of the software. I purchased Office 2013 because I needed a feature that was new in that version of PowerPoint. Problem is, it only works on the W8 side, where I installed it, and I have not figured out if or how I can make it work on W7 and W8 without buying another copy of Office 2013. One of my software programs that I used for tracking satellites was Nova for Windows. So far, I have not been able to get it to work at all on W8. It works fine on W7 which is also a 64 bit version but not on W8. That forced me to look a little deeper into another satellite tracking program that I have "SatPC32". It runs great in W8 and after reading the operators manual a little closer, it is probably the best program so I plan to continue to use it instead of the Nova program. Before retiring the old ham radio computer I had to reformat the Hard drive and had planned to continue using XPpro thinking it was more compatible with my ham radio software. When I tried to reload XP, I got a "call µsoft" screen. It was on a weekend and the phone number connected me to someone in India that spoke a different English than I so I had a lot of difficulty understanding. I finally gleaned after several attempts that he was telling me that I had to get a new product code from µsoft and that it had to come from a state side phone number and that number was not available on weekends. With such poor service, I choose to load W7 instead. That was probably best because all of my ham radio software so far rns fine on W7. I like messing with computers and software. I am not that good at it but I beat my way through. When I get too hung up, I call on my friend and owner of DTM Computers, Sam, and he bails me out. Last updated 4/17/14 brf
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813712.73/warc/CC-MAIN-20180221182824-20180221202824-00548.warc.gz
CC-MAIN-2018-09
4,699
9
http://feedback.xodo.com/knowledgebase/articles/752619-accessing-files-on-an-sd-card
code
1. Tap the SD Card tab. 2. Tap the Add button. 3. If you want to access the entire SD card, tap SELECT "SD-CARD-NAME" at the bottom. If you only want to access a specific folder or set of folders, navigate to that folder or set of folders, then tap SELECT "NAME-OF-FOLDER(S)" at the bottom. 4. Once you've accessed the SD card, you can manage files and folders on the SD card like you can on the other file browsing tabs. Creating a new PDF (blank or from an image) Creating a folder Saving a copy of a file with a new name Deleting a file
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057447.52/warc/CC-MAIN-20210923195546-20210923225546-00162.warc.gz
CC-MAIN-2021-39
539
9
https://www.basicfantasy.org/forums/viewtopic.php?f=2&t=2910
code
Evil DM/Rational Caster Spell Tactics Sleep is very effective against low-level PCs. An entire party down, especially since many versions allow NO saving throw for characters below 4HD, And since players ALWAYS pick sleep if they can, and ALWAYS use it immediately on mobs I see no reason not to turn the tables. My NPC wizards are at LEAST as smart as the PCs are, and he has more resources and prep time. Sleep is an no-brainer and I feel it's actually cheesy for a wizard (who knows sleep) not to use it as a first or second resort on a troublesome party - for the same reason it would be silly for PCs not to use it on a horde of Goblins. Fireball, for the reasons above, can be super-effective. Since PCs tend to cluster together in tight quarters and try to focus their attacks on on melee target (and thus maximize deaths/round) and NPC casters are usually a bit higher in level individually than the average of the party, a Fireball can kill an entire party with one hit. All the wizard has to do is send ONE orc at your party, watch them try to do a 'defeat in detail' tactic by surrounding him, and drop a fireball right in the middle. Assuming a normal spread, that means the PCs might be level 4 facing a level 6-8 Magic-User. That's 6d6-8d6 damage to everyone in the party, who have 4d8/4d10+12 HP at maximum. Polymorph works great on PCs. Instantly turn the party's MU or cleric into a pig, and they're basically screwed. The party's pig probably won't even be smart enough to run away with the party, making it an easy mark for arrows and orcish butchers. Hold Person isn't as cool as Sleep, but since PCs are humans and demi-humans this works in a similar manner. Again, since NPCs usually outnumber PCs a simple Hold Person on 1-3 party members will allow the Orcish henchmen to tie up/execute all of the players while immobilized and/or gang up on any who aren't so frozen. Slow works very well, because it has the effect of giving everyone on the NPC side Haste against the party - again, since NPCs usually outnumber PCs it's more 'spell-slot' efficient to simply slow the party than to only haste SOME of your own party. Also, since casting Slow on someone else doesn't come with the negative aging effects of Haste on yourself this would probably be preferred by a caster, anyway. Summon Monster - anything that's poisoned. Don't bother summoning high HD monsters - summon a ton of crappy snakes. Multiple attacks with a chance of 1-shot death beats stronger attacks that have no greater chance of killing targets instantly, and multiple attacks are better than a bonus to hit in-game mechanically. Blind, whether from the spell Light or Blind, can be permanent or at least last for the length of an entire combat and gives the PC targeted by it a serious malus to attacks and AC. Basically, it's like making ALL of the NPCs invisible with ONE spell. Web and similar spells can be SUPER-effective for NPCs that have a large number of ranged weapons - pin the PCs down and keep running away, firing missile weapons. The PCs will take serious damage before they can get close enough for melee or the spell's duration ends. Of course the PCs can return fire with missile weapons, but if the enemy takes cover (something the PCs can't do because they're moving too slowly/stuck in the middle of a field) they will still have a serious advantage in the exchange. Illusions, very simple ones - put a perfectly ordinary looking stone floor illusion over a pit of spikes. One spell and an afternoon with some grunt laborers can manage to injure/trap/kill at least one PC most of the time, and also creates a barrier between the PC and NPC enemies that favors ranged and spell slinging. And, again, since NPCs usually outnumber PCs the ability to engage in multiple ranged attacks means the NPCs are more likely to hit and kill even if they're lower level. Unlike melee, dozens of orcs can fire arrows at the same PC wizard. Silence will of course neuter PC casters pretty well, and prevent them from using buffs, heals, and offensive spells against the NPCs. NPCs may also find themselves adversly affected, but again the superior numbers mean that the Orcs can be sent in to wade through the blood while the NPC caster hangs back with a magic missile ready for any survivors. Magic Missile isn't usually a 1-shot-kill spell, except that NPC casters are usually higher level than PC casters. Thus, their magic-missile damage may be the same as the PC Caster or Thief's hit-dice. Unless their target cast Shield already, they stand a good chance of being 1-shotted. Spells which cause Confusion or random actions are also extremely effective, since PCs need control of their own characters and group coordination to act effectively. Deny their ability to choose their next action, target, or spell and you've done serious damage to their tactical cohesion. Bonus points if the spell has a chance of causing PCs to attack each other. The Sanctuary spell is EXCELLENT for NPC clerics - with this trivial spell the cleric can indefinitely force the players to ignore his actions and maneuvers (so long as he doesn't break the terms of the spell), and while the PLAYERS want to target the enemy caster, their CHARACTERS are forced to melee frogs and Bullywugs while the 8' necromancer whistles a tune and puts himself in position for an AoE death attack or just plain healing/rezzing all those Bullywugs. (Thanks to Dave R on G+ for pointing this one out). General topics, including off-topic discussion, goes here. 2 posts • Page 1 of 1 Hey, good stuff...thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867085.95/warc/CC-MAIN-20180525102302-20180525122302-00360.warc.gz
CC-MAIN-2018-22
5,574
17
https://meta.stackoverflow.com/users/7883/vasil
code
Apparently, this user prefers to keep an air of mystery about them. Member for 11 years, 11 months 2 profile views Last seen May 7 '14 at 6:08 Top network posts - 630 Setting Windows PowerShell environment variables - 418 Obtain form input fields using jQuery? - 400 How can I decode HTML characters in C#? - 149 Returning redirect as response to XHR request - 87 How can I use UUIDs in SQLAlchemy? - 76 How does Python sort a list of tuples? - View more network posts →
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738960.69/warc/CC-MAIN-20200813043927-20200813073927-00562.warc.gz
CC-MAIN-2020-34
472
12
http://mathhelpforum.com/calculus/43630-xy-dv-triple-integration-help-bounds.html
code
here for the method of finding bounds. post #2 gives a shortcut for special cases (this one). posts #7 and #9 give the longer, more conventional way of tackling it ∫∫∫ xy dV, where the solid is a tetrahedron with vertices (0,0,0), (1,0,0),(0,2,0), and (0,0,3) I tried this with 0<x<1, 0<y<-2x+2, and 0<z<3 with no luck =\ Are my bounds wrong in this case? What would be really helpful is if someone could explain how I am supposed to figure out the bounds. I don't even know how to figure them out which means I can't do any of the problems assigned
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698543577.51/warc/CC-MAIN-20161202170903-00072-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
555
4
https://www.fantasybaseballcafe.com/forums/viewtopic.php?t=294049
code
I can explain how our retroactive tool works, and what the intent is. The intent was always to provide an option to leagues that don't quite get themselves ready to roll by opening day. The way it works is that there is a commissioner setting for the "retroactive date". If the commissioner sets that date, then when that date arrives, the starting lineups for each team are noted, and the league scoring is calculated from scratch as if the teams had been using those starting lineups since opening day. If you started a week late, and just want to associate some value with the first week of the season, this is a reasonable approximation. If you are well in, have been making drops and adds, trading, whatever, then it starts to become a pretty pale substitute for actually playing the game for the missed time. But it is an option; if you decide it is better than nothing you can use it, or you can choose not to. As for the usability of Yahoo's site, I can only say it is staggeringly good Not that I'm biased or anything. Hope this helps...
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701962902.70/warc/CC-MAIN-20160205195242-00258-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
1,046
6
https://www.linuxscrew.com/install-ubuntu-packages-by-clicking-html-link
code
[digg-me]Apturl allows to install Ubuntu packages using apt:pkgname like syntax with any compatible browser like Firefox, Konqueror or other. Let me note that apturl comes with Ubuntu Gutsy 7.10 by default and is very useful while placing links through manuals, howtos etc. For example, to install ntop utility in Ubuntu I’d suggested to run the following command from terminal: sudo apt-get install ntop, but now I can just place the link like this: hey, install ntop by clicking here! Here is graphical representation of this example: After you click pressing “ok” button Ubuntu will start installation process of certain package: I hope this would be useful for bloggers writing manuals for Ubuntu Gutsy users. Real thanks apturl’s author Harsh J (aka Qwerty Maniac).
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662564830.55/warc/CC-MAIN-20220524045003-20220524075003-00126.warc.gz
CC-MAIN-2022-21
778
5
http://tagteam.harvard.edu/hub_feeds/1762/feed_items/2557
code
Coercive Citation in Academic Publishing Connotea Imports 2012-03-21 Abstract: Despite their shortcomings (1–4), impact factors continue to be a primary means by which academics “quantify the quality of science” (5). One side effect of impact factors is the incentive they create for editors to coerce authors to add citations to their journal. Coercive self-citation does not refer to the normal citation directions, given during a peer-review process, meant to improve a paper. Coercive self-citation refers to requests that (i) give no indication that the manuscript was lacking in attribution; (ii) make no suggestion as to specific articles, authors, or a body of work requiring review; and (iii) only guide authors to add citations from the editor's journal. This quote from an editor as a condition for publication highlights the problem: “you cite Leukemia [once in 42 references]. Consequently, we kindly ask you to add references of articles published in Leukemia to your present article” (6). Gentler language may be used, but the message is clear: Add citations or risk rejection.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664752.70/warc/CC-MAIN-20191112051214-20191112075214-00229.warc.gz
CC-MAIN-2019-47
1,102
3
http://itsonly4u.blogspot.com/2008/10/hacking-techniques-part-1.html
code
Hello friends in this post and in the next post i am going to tell you some most common hacking techniques that most of the hackers used during hacking. 1) CALLBACK UNITS:Callback units are a good security device, But with most phone systems,it is quite possible for the hacker to use the following steps to getaround a callback unit that uses the same phone line for both incoming and out going calls:First, he calls he callback unit and enters any authorized ID code (this is not hard to get,as you'll see in a moment). After he enters this ID, the hacker holds the phone line open - he does not hang up. When the callback unit picks up the phone to call the user back, the hacker is there, waiting to meet it. The ID code as I said, is simple for a hacker to obtain, because these codes are not meant to be security precautions.The callback unit itself provides security by keeping incomming calls from reaching the computer.The ID codes are no more private than most telephone numbers. Some callback units refer to the codes as "location identification numbers," and some locations are used by several different people,so their IDs are fairly well known.I've been told that, in some cases,callback ubits also have certain simple codes that are always defined by default. Once the hacker has entered an ID code and the callback unit has picked up the phone to re-call him,the hacker may or may not decide to provide a dial tone to allow the unit to "think" it is calling the correct number. In any event,the hacker will then turn on his computer, connect with the system - and away he goes.If the however, the hacker has trouble holding the line with method,he has an option: the intercept. The Intercept: Holding the line will only work with callback units that use the same phone lines to call in and to call out.Some callback units use different incoming and outgoing lines, numbers 555-3820 through 555-3830 are dedicated to users' incoming calls, and lines 555-2020 through 555-2030 are dedicated to the computers outgoing calls.The only thing a hacker needs in order to get through to these systems is a computer and a little time - he doesn't even need an ID code. First,the hacker calls any one of the outgoing phone lines, which, of course, will not answer.Sooner or later, though, while the hacker has his computer waiting there, listening to the ring, an authorized user will call one of the incomming lines and request to be called back.It will usually be less than an hours wait, but the hacker's computer is perfectly capable of waiting for days, if need be. The callback unit will take the code of the authorized user, hang up, verify the code, and pick up the phone line to call back.If the unit tries to call out on the line the hacker has dialed, the hacker has his computer play a tone that sounds just like a dial tone.The computer will then dial the number given that matches up with the user's authorized ID.After that,the hacker can just connect his computer as he would in any other case.If he is really serious,he will even decode the touch tones that the mainframe dialed,figure out the phone number of the user the system was calling, call the person, and make a few strange noises that sound as though the computer called back but didnt work for some reason. 2) TRAPDOORS AS A POSSIBLILITY:I haven't heard of this happening, but i think it is possible that a callback modem could have a trapdoor built into it.Callback modems are run by software, which is written by programmers.An unscrupulous programmer could find it very easy to slip in an unpublicized routine, such as, "if code =*43*, then show all valid codes and phone numbers." And such a routine, of course, would leave security wide open to anyone who found the trapdoor.The obvious protection here, assuming the situation ever arises,is simply an ethical manufactorer that checks its software thoroughly before releasing it. A trapdoor is a set of special instructions embedded in the large program that is the operating system of a computer.A permanent, hopefully secret "doorway", these special instructions enabe anyone who knows about them to bypass normal security procedures and to gain access to the computer's files.Although they may sound sinister, trapdoors were not invented by hackers, although existing ones are certainly used by hackers who find out about them. In the next post i will tell you the remaining hacking techniques.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121869.65/warc/CC-MAIN-20170423031201-00583-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
4,435
10
http://tv.adobe.com/videos/adobe-flash-player-10-1/
code
HD Streaming with HTTP Dynamic Streaming Show: MAX 2010 Develop Learn how to stream video and audio over HTTP networks with HTTP Dynamic Streaming and Adobe Flash Player 10.1, helping you lower costs and reach a wider audience with your video content. This session will step you through the workflows for encoding, packaging, protecting, and delivering video using the Open Source Media Framework. Discover techniques to optimize the F4F file format, tweak the F4F file packager and live packager, and apply DRM with Adobe Flash Access 2. Learn how to set up your own HTTP Origin using Apache to work with popular content delivery networks.
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398468233.50/warc/CC-MAIN-20151124205428-00071-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
640
3
http://www.ahfb2000.com/threads/2225-script-that-prevent-user-copy-picture(also-works-in-xp)
code
Results 1 to 8 of 8 10-12-2003, 11:58 AM #1 script that prevent user copy picture(also works in xp)? hi...i there anybody know the "no right click script" that also can work in windows xp as well?bcoz i found lots of no right click scripts,but all is not working in xp. what i meant is the code is actually working ,is just that..we are still be able to copy the picture ..because if we using windows xp,if we mouse over a picture ,a small window will come out and enable us to save the picture. so is there any script to prevent that?(nt necesarrily have to be a no right click script) 10-12-2003, 01:37 PM #2 I think you're referring to the "image toolbar". It's a browser feature available via (in IE 6): TOOLS / INTERNET OPTIONS..... / ADVANCED / MULTIMEDIA / "ENABLE IMAGE TOOLBAR" Seeing that it requires a restart to enable and disable, it's highly unlikely you'll find a way to disable it on a visitors browser. I have a question about the toolbar, though: How come it is only triggered on some images and not others? I haven't figured out yet whether it's triggered via file size, or screen area or what. It just appears on some images and not on others. Another IE bug? 10-12-2003, 05:28 PM #3 You can diable the toolbar with a meta tag <META HTTP-EQUIV="imagetoolbar" CONTENT="no"> 10-12-2003, 07:53 PM #4 10-13-2003, 03:33 PM #5Originally Posted by QuietDean I'm curious. When the user enables/disables it manually it requires a restart. How come it can be enabled/disabled by html without a restart. Is there a comprehensive list of what and how things can be disabled in the browser? 10-13-2003, 04:28 PM #6 As its an Internet Explorer-specific tag (only put in because of the uproar from webmasters etc) , I am not sure how it works to be honest, I have not come across any lists showing these 'trick' tags. They are basically 'bodge jobs' I'll try a google. 11-07-2003, 06:10 PM #7 I havent tried it, but I have a program (Webmaster Tools from www.sawpit.net) which contains a script that will basically cover an image with a transparent image. When someone goes to right click and save, they are actually saving the clear image, not your main image. Might be something to try. 11-07-2003, 06:24 PM #8
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118477.15/warc/CC-MAIN-20170423031158-00522-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,217
25
https://security.stackexchange.com/questions/172923/vulnerable-framework-and-iis-server-versions-are-being-displayed-in-an-error-pa
code
As security tester, I need to report and justify that a security misconfiguration in a 3rd party application is a risk to us. Following is the scenario: 1.) There is a 3rd party application which the customers use to submit their applications to us. We receive the data from the 3rd party application and process them further. 2.) In that particular application, upon clicking a hyperlink an error page is being displayed with the following information: a) Source file path (however it is forbidden when tried to access) b) .Net framework version which is vulnerable ASP.Net Forms Authentication Bypass c) IIS server version (7.5) which has exploits as per my knowledge. What is the risk of this misconfiguration to us. How to justify it? Note: This error page appears only after a user is logged in. And this is a public facing application.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145729.69/warc/CC-MAIN-20200222211056-20200223001056-00477.warc.gz
CC-MAIN-2020-10
841
7
https://www.fi.freelancer.com/projects/angular-js/issue-angularjs-code/
code
Details: [url removed, login to view] 19 freelanceria on tarjonnut keskimäärin %project_bid_stats_avg_sub_18% %project_currencyDetails_sign_sub_19%/tunti tähän työhön I have 2 years of Technical skill in Angular JS, But i was new to freelancer. and i'll promise you that you will never disappoint with my work. hope you'll approve my proposal.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589902.8/warc/CC-MAIN-20180717203423-20180717223423-00241.warc.gz
CC-MAIN-2018-30
349
3
https://aziacelestino.com/tag/opinion/
code
Kim K. ‘More Influential’ Than Michelle Obama? Kanye West has been very media-friendly lately, and with the interviews come the backlash. On Wednesday morning, ‘Ye made a statement about fiancé, Kim Kardashian. Kim K. has not yet graced the cover of Vogue magazine, a privilege granted to first lady, Michelle Obama not once, but twice. The rapper added that since his lady is… Childish Gambino “Heartbeat” (Official Video) Childish Gambino – Heartbeat (Official Video) Dudeee, did he really put her in the video because of this? …crazy. Or “stupid, so dummy?” You be the judge. http://vimeo.com/35172691
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946584.94/warc/CC-MAIN-20230326235016-20230327025016-00465.warc.gz
CC-MAIN-2023-14
625
4
https://www.headhonchos.com/jobs/software-developer-java-python-software-design-development-it-technology-software-services-delhi-278041.html
code
Software Product Development using web Technologies such as Java / Python in the field of Big Data Analytics.B Tech/M Tech from premiere institutes (IIT, NIT, BITs). Big Data Analytics Software Product Development More applications and a highlighted profile mean more chances of getting noticed. The new Application Feedback facility for Platinum Members helps you know the status of your application when you believe a job is highly suited to you. What if there's no response? Your Application Review is re-instated and can be used again if we are not able to reach the employer.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541426.52/warc/CC-MAIN-20161202170901-00402-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
580
6
https://microbepipettor.com/index.php/2020/02/01/understanding-the-latest-research-on-novel-2019-coronavirus-features-genomic-characterization-mechanism-of-entry/
code
January 31, 2020- I awoke this morning to an onslaught of scary new “Coronavirus” headlines. Just yesterday, the World Health Organization (WHO) declared the 2019 novel coronavirus (2019-nCoV) a “global public health emergency,” a designation reserved for serious and/or sudden diseases that may threaten public health internationally and which could “potentially require a coordinated international response.” This emergency designation was motivated by the need to prevent the spread of the virus into countries with less developed healthcare systems, which could result in uncontrollable spread. Briefly, 2019-nCoV is a virus that causes a pneumonia-like illness in infected people, has a two-week incubation period, and has been shown to be able to be transmitted between people. See “Resources” for some great starting material to learn more. Taking a look at how quickly scientists, public health officials, academic institutions, construction workers, and government agencies around the world have responded to this new threat always gives me hope, and I aim to share that with you. Below are the amazing strides made in research thus far: The “China Novel Coronavirus Investigating and Research Team” identify and describe features of 2019-nCoV: based on publication in New England Journal of Medicine (24 Jan 2020) Fluid from the airways of three patients was collected, and whole genome sequencing (where the complete DNA of an organism is determined) identified the novel virus in all three patients. 2019-nCoV genome sequences were made publically available, and the 25 available sequences -as of today- can be downloaded from GenBank here. Zhu et. al then used virus obtained from these fluid samples to inoculate human airway cell cultures and examine the effects. Light microscopy revealed that compared to mock-infected cells (A), virus-infected human airway cells (B) do not appear to be beating their cilia, tiny hairs that typically serve as a defense mechanism for the airways by moving mucus up and out. Chinese CDC scientists release genomic characterizations of 2019-nCoV: based on publication in the Lancet (30 Jan 2020) In this paper, complete genome sequences of 2019-nCoV were obtained from eight patients and (1) compared against each other, (2) compared to reference genomes that were closest in sequence identity (bat SARS-like betacoronavirus, bat SLCoVZC45 and bat-SL-CoVZXC21, and (3) to the genome of SARS-CoV. (1) Sequence identity between 2019-nCoV genomes and significance The eight complete 2019-nCoV genomes obtained from patients showed 98-99% sequence similarity, which suggest that the virus only recently showed up in humans (the virus hasn’t had enough time to acquire mutations). (2,3) Comparison of the 2019-nCoV sequence to other bat-SARS-like-CoV sequences and SARS-CoV From the above graph, it is clear that the 2019-nCoV genome sequence more closely resembles the bat-SARS-like-CoV sequences than SARS-CoV, with the most notable deviations from all 3 in the region encoding the spike protein “S”. This data indicates that bats are natural hosts for 2019-nCoV, though the authors note that the <90% sequence identity between 2019-nCoV and bat-SARS-like-CoV likely implicates a more recent ancestor and therefore an intermediate host for the virus. In simpler terms, it means viral transmission likely moved from bat → unknown animal → human. The coronavirus spike proteins “S” consist of two subunits – a variable S1 subunit, responsible for recognition of and binding to host cell receptors, and a highly conserved S2 subunit, which is responsible for fusion of the viral particle to the host cell. In short, spike proteins are how viruses establish themselves in human host cells. Importantly, Roujian Lu et al. found that the 2019-nCoV protein sequence of “S” looked more like SARS-CoV “S” than the bat-SARS-like-CoV “S”, which points to a potential common method of the two viruses’ ability to bind and invade human cells. The researchers then modeled the binding region in S1 of three human viruses SARS-CoV, 2019-nCoV, and MERS-CoV. Note how the bottom half of 2019-nCoV, which is the part of the virus that purportedly interacts with human cells, looks a LOT like the bottom half of SARS-CoV. This means that maybe, 2019-nCoV binds to the same human host cell receptor that SARS-CoV does! Wuhan scientists shed light on how 2019-nCoV is able to enter human cells: based on bioRxiv preprint by Peng Zhou et al (23 Jan 2020) SARS-CoV binds to a receptor called ACE2. Figure 4 in this paper (which I cannot show here because it is a preprint, but please go see the real thing) showed that the 2019-nCoV could only invade and replicate cells that were making ACE2 but not in cells that were not making ACE2. This demonstrates that 2019-nCoV can invade human cells making ACE2, but whether this mechanism of entry actually happens in people infected with 2019-nCoV remains to be determined. Australian scientists at the Doherty Institute successfully grow 2019-nCoV in Culture (29 Jan 2020) Researchers at the Doherty Institute in Melbourne released a video of 2019-nCoV growing in culture. In this short video, visualized through what appears to be inverted phase contrast light microscopy, infected cells (dark) divide again and again. What seems like a phagocytic cell in the upper left corner eats as many infected cells as it can, but is hopelessly outpaced by the relentless rate of viral infection. Johns Hopkins University generates a map tracking the geographical distribution in real-time (22 Jan 2020) JHU Center for Systems Science and Engineering released a map showing confirmed 2019-ncoV cases worldwide in real-time, putting the outbreak into perspective with information and statistics from WHO, the Centers for Disease Control and Prevention (CDC), European Centre for Disease Prevention and Control, Chinese CDC, and the National Health Commission of the People’s Republic of China. Importantly, the data used to generate the map can also be downloaded and could serve as a valuable source for epidemiological research. Such swift strides in research were enabled by massively coordinated efforts and rapid outbreak response of the Chinese government as well as other governments around the world, and I deeply respect and appreciate all those working to contain the spread of this virus. *please feel free to comment if something should be corrected. If you are unfamiliar with what nCoV is, I recommend these starting materials: (1) (24 Jan 2020) 2:28 minute video from Nature video- with great graphics!, https://www.youtube.com/watch?v=Q_4fIkc2k6g (2) (updated 30 Jan 2020) CDC summary, if you prefer reading https://www.cdc.gov/coronavirus/2019-ncov/summary.html Sources in order of reference:
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057598.98/warc/CC-MAIN-20210925052020-20210925082020-00384.warc.gz
CC-MAIN-2021-39
6,820
27
https://archive.sap.com/discussions/thread/3886355
code
Appraisal workflow opening in display mode I have created a custom workflow for the Appraisal form. Work item is getting created properly as soon as form gets created using the Function module 'HRHAP_DOCUMENT_PREPARE'. However, when appraiser opens the work item, form is opening in display mode not allowing him to evaluate the appraisal though work item is calling the edit method. Please let me know if there could be any configuration settings which might be causing this. kindly help me in solving this. Thanks in advance. Helpful answers would be rewarded..
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247491141.23/warc/CC-MAIN-20190219183054-20190219205054-00165.warc.gz
CC-MAIN-2019-09
563
7
https://mci.ir/web/en/sudoflaw-en
code
Sudo Bug Opens Root Access on Linux Systems A vulnerability in the Linux sudo command has been discovered that could allow unprivileged users to execute commands as root. Thankfully, this vulnerability only works in non-standard configurations and most Linux servers are unaffected. Before we get to the vulnerability it is important to have some background information on how the sudo command works and how it can be configured. When executing commands on a Linux operating system, unprivileged users can use the sudo (super user do) command to execute commands as root as long as they have been given permission or know the root user's password. The sudo command can also be configured to allow a user to run commands as another user by adding special directives to the /etc/sudoers configuration file. The sudo vulnerability The bug (CVE-2019-14287) allows attackers to circumvent this built-in security option to block root access for specified users. Red Hat, which rated the flaw with a 7.8 severity score out of 10 on the CvSS scale, explained in a posting Monday that "a flaw was found in the way Sudo implemented running commands with arbitrary user ID. If a Sudoers entry is written to allow the attacker to run a command as any user except root, this flaw can be used by the attacker to bypass that restriction." The vulnerability, which was discovered by Joe Vennix of Apple Information Security, can be exploited by merely specifying the user ID of the person executing commands to be "-1" or "4294967295." Thanks to the bug, both of these user IDs automatically resolve to the value "0", which is the user ID for root access. Since Sudo doesn't require a password to run commands in the context of another user, the exploitation level of difficulty is low, according to Red Hat. Linux distributions that contain the "ALL" keyword in the RunAs specification in the /etc/sudoers configuration file are affected. The ALL keyword allows all users in a specific group to run any command as any valid user on the system and is usually present in default configurations of Linux, according to Red Hat. "This can be used by a user with sufficient Sudo privileges to run commands as root even if the Runas specification explicitly disallows root access as long as the ALL keyword is listed first in the Runas specification," according to the Sudo project, in a posting on Monday. Sudo patched the vulnerability with the release of version 1.8.28, which Linux distributions will now need to roll out to their users. You can also use these command's to updade the sudo : # sudo apt update # sudo apt upgrade
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.91/warc/CC-MAIN-20211020055136-20211020085136-00093.warc.gz
CC-MAIN-2021-43
2,610
15
https://vi.stackexchange.com/questions/42847/how-do-i-get-size-of-whole-vim-instead-of-a-single-window
code
I want to create a floating window, with the width of the entire Vim viewport. I had used winwidth() function, but I've encountered problems when windows are split. I could get a list of windows in a tab, and then try to resolve the full width, but it gonna be a hassle especially when dealing with horizontal splits. Is there any simpler way function or variable to get those dimensions?
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474661.10/warc/CC-MAIN-20240226162136-20240226192136-00401.warc.gz
CC-MAIN-2024-10
388
4
https://community.onion.io/user/hc
code
@crispyoz Thank you very much for your message. It is more clear now after also checking again and again the small details of GPL. Thanks again! Best posts made by hc Latest posts made by hc RE: Developing Closed Product Based on Omega2 @Lazar-Demin @crispyoz Thank you very much! But I am a bit confused. I have also checked the GPLv2 license to get a bit more familiar as you already suggested. My understanding is, if we are developing a software based on stack whose license is GPLv2 license (openWRT in this case), then we must publish it to somewhere which means it mush be open-source and publicly accessible. But @crispyoz Your last post makes me a bit confused. You mentioned you have closed product because you did not change anything in openWRT. Actually my plan is developing a closed product based on onion 2s+. But I am planning to disable ssh and also I will change the web interface which is used to configure the device. To disable ssh and also o remove non-used modules, I am planning to rebuild the sources of onion omega. But sources are also based on openWRT. In this case, what is my responsbility to onion.io & openWRT? Should I make my new image publicly accessible? Another question, I can also disable ssh and uhttpd in application. Then It will be a kind of application code. So, I guess I will not in change of publishing anything, correct? Thanks again for details. Developing Closed Product Based on Omega2 Not fully related to this topic but Can I develop a closed product with your module by doing a few customizations in your firmware? e.g. domain, name / http server / and also some default applications in the customized firmware. If yes, Should I follow any license of you? Any mark on the product regarding onion or any visualization on the user manual or http server about that I am powered by onion and/or openwrt etc? If all is OK then what is your plan for the duration of availability? 2 years later, will still be producing this module?
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141171126.6/warc/CC-MAIN-20201124053841-20201124083841-00384.warc.gz
CC-MAIN-2020-50
1,979
18
https://www.webucator.com/tutorial/advanced-microsoft-sharepoint/document-id-service/activating-configuring-the-document-id-service-exercise.cfm
code
This exercise can only be performed on a pay version of SharePoint Server 2010. It is not available with SharePoint Foundation 2010. You can perform these steps only if you have access to your farm's Central Administration site. If you do not, you can wait 24 hours for it to naturally occur. The default setup for this class calls for the Central Administration site to be accessible through "http://spserver2013:5000".
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607813.12/warc/CC-MAIN-20170524112717-20170524132717-00175.warc.gz
CC-MAIN-2017-22
420
3
https://community.monzo.com/t/iphone-x-and-in-app-chat/29128
code
I’ve just tried to send a message through the in-app chat, but it seems if your message gets long enough, the keyboard is automatically dismissed, and you end up stuck between a rock and a hard place - if you try to select the text field to shorten your message, the keyboard appears and then immediately disappears. doh! If your force close the app and re-open, the text is still there, so effectively the in-app chat is broken for me. So thats the bug - the enhancement I’d like to request is in the above screenshot Also I have videos of it occurring so if you need them just let me know where to put them.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247481832.13/warc/CC-MAIN-20190217091542-20190217113542-00005.warc.gz
CC-MAIN-2019-09
613
4
http://innerengineering.com/SadhguruLive/att-oasis/sadhguru-events/
code
Sadhguru is a realized yogi and mystic – a man whose passion spills into everything he encounters. With a keen mind, balanced by a heart that knows no boundary, his presence creates an extraordinary opportunity to break through limitations into one’s natural state of freedom, love and joy. Sadhguru has a unique ability to make the ancient yogic sciences relevant to contemporary minds, and acts as a bridge to the deeper dimensions of life. His approach does not ascribe to any belief system, but offers methods for self-transformation that are both proven and powerful. An author, poet and internationally renowned speaker, Sadhguru’s wit and piercing logic provoke and broaden our thoughts and perception of life. Sadhguru has been an influential voice at major global forums including the UN, MIT, the World Economic Forum, etc. Sadhguru established Isha Foundation, a non-profit organization supported by over two million volunteers worldwide. From powerful yoga programs to large-scale humanitarian projects, the foundation’s activities are designed to create an inclusive culture and establish global harmony, earning a special consultative status with the United Nations.
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275429.29/warc/CC-MAIN-20160524002115-00059-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
1,188
3
https://www.mail-archive.com/[email protected]/msg65746.html
code
To see what I'm working with, go here: You may want to copy the source and the (mySQL) db structure and set it up on your system there to test it out. Though, if you don't want to do that, I show the output at the very bottom of the page. One note: I took out all the code that connects to the db and what not. It's not really relevant and it has logins, etc. Now, what I'm trying to do is build a tree based on the data in the DB. It's working relatively ok if I uncomment the code that is on line 48 and comment out line 49. However, what I really want to do is build a fully associative array doing this and now an array that has string keys but then, those arrays having numeric keys (copy and run this code un/commenting the lines above and you'll see what I mean). What is going wrong is that for whatever reason (and I can't see why, it should be working and I'm getting ready to become certifiable any time now), though it works at the beginning, what is getting passed to getParentNodes() on line 55 eventually stops being an array. What's getting passed is the word "SET" (something I'm just putting in there. I'm not really interested in the value, just the keys of the various arrays). Why is that? $currentBranch["$nodeName"] should *always* be an array in that section of the code... if you define $array["this"]["that"] = 1; $array["this"] is an array. However, in my code, the array that I'm using is not being treated as such and I have no idea why. One other thing of note about the data from the DB: I realize that "this" and "briggs" are looping back on one another. The code that I have at lines 45 and 47 keep it from infinitely looping. Please, can someone offer any explanation as to why I'm getting the problem that I am? PHP General Mailing List (http://www.php.net/) To unsubscribe, visit: http://www.php.net/unsub.php
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937780.9/warc/CC-MAIN-20180420120351-20180420140351-00201.warc.gz
CC-MAIN-2018-17
1,845
31
https://giters.com/notea-org/notea/issues/49
code
Feature Request: Note Versioning/History RavetcoFX opened this issue · comments Keeping a history of note edits would be amazing, possibly configurable for amount of time it keeps the versions I have plans to do. But I’m not sure if I should create the version automatically or manually. Any ideas? Do you mean automatically with an S3 API or manually on the Notea server side? All on the Notea server. Because S3 version backup is not applicable to notes (notes are updated every time the user enters). I mean is whether the client periodically requests to create a version or the user clicks a button to create a version. Ah, I would say automatic is the best then. Automatic backup whenever you make a change is great. If you later realise you made a mistake, you can go back to fix it. Wordpress posts versions mechanisms maybe the easy way, save post as new version every time when users save or publish
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711336.41/warc/CC-MAIN-20221208114402-20221208144402-00105.warc.gz
CC-MAIN-2022-49
911
11
https://www.eclipseorigins.com/topic/2674/dawn-2-1-0-scripted-chests
code
Hello there, since scripting has just been added to Eclipse Dawn 2.1.0, I figured I’d make a quick tutorial that shows you how easy it can be to add new functionality to your server by just changing a few files! Now, then… Let’s get started shall we? Step 1: Your server. Make sure your server is up to date, and running AT LEAST Eclipse Dawn 2.1.0, it will not work in lower versions or any other custom Eclipse Version. Please note that it does not matter whether your server is running or not, there’s a method of reloading the scripts while the server runs. Step 2: Making directories. Since my script uses specific directories to store Data, let’s make them! Head into your Server Directory and click on Data, once in there make a new folder called ScriptData and go inside it, in there make another folder called Frankenstein and enter it as well, then finaly in there make a new folder called Chests. If all went well, you should now have the following folder structure to get where you are: *\data\scriptdata\frankenstein\chests*. Head back to your Server Directory and click the Scripts folder, once in there make a new folder called **User **and go inside it, in there make another called Frankenstein. If all went well, your folder structure should be as follows: data\scripts\user The reason I chose these names are simply to keep things organized in the future should I want to add more scripts of my own, or another user. But do bear in mind that it does not matter what folder structure you use, as long as you rewrite the script(s) to reflect the changes. Step 3: Creating the file script file. First, copy the following script: Function GetPlayerChestState(Index, Chest) GetPlayerChestState = GetVar("data\scriptdata\frankenstein\chests\cheststate.ini", GetPlayerName(Index), CSTR(Chest)) ' Error checking below, if the record is empty it returns a blank string. ' And a blank string can't be converted to a Long, so that's why we need to check this manually. If GetPlayerChestState = "" Then GetPlayerChestState = ChestStateFull Else GetPlayerChestState = CLNG(GetPlayerChestState) End If End Function Sub SetPlayerChestState(Index, Chest, State) PutVar "data\scriptdata\frankenstein\chests\cheststate.ini", GetPlayerName(Index), CSTR(Chest), CSTR(State) End Sub Function GetChestMaxItems(Chest) GetChestMaxItems = CLNG(GetVar("data\scriptdata\frankenstein\chests\chestcontent.ini", CSTR(Chest), "MaxItems")) End Function Function GetChestItemNum(Chest, Item) GetChestItemNum = CLNG(GetVar("data\scriptdata\frankenstein\chests\chestcontent.ini", CSTR(Chest), "Item" & CSTR(Item) & "Num")) End Function Function GetChestItemVal(Chest, Item) GetChestItemVal = CLNG(GetVar("data\scriptdata\frankenstein\chests\chestcontent.ini", CSTR(Chest), "Item" & CSTR(Item) & "Val")) End Function Sub OpenChest(Index, Chest, OpenMsg, EmptyMsg) Dim i, MaxItems, Item, Val, Name ' Check if the chest is empty for this player before we begin. If GetPlayerChestState(Index, Chest) <> ChestStateEmpty Then ' The chest seems to be alright for this guy, let's move on! ' Retrieve the max amount of items in this chest. MaxItems = GetChestMaxItems(Chest) ' And time to loop through this mess, we want to hand out the items to the player, after all. For i = 1 to MaxItems ' Retrieve the item number and amounts. Item = GetChestItemNum(Chest, i) Val = GetChestItemVal(Chest, i) ' Hand it out GivePlayerItem Index, Item, Val Next ' Set the chest state to empty. SetPlayerChestState Index, Chest, ChestStateEmpty ' Done! Let's notify our player of his opened chest! PlayerMsg Index, OpenMsg, BrightRed Else ' Seems like this player's opened the chest before. ' Let's notify them. PlayerMsg Index, EmptyMsg, BrightRed End If End Sub
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156416.22/warc/CC-MAIN-20180920041337-20180920061337-00215.warc.gz
CC-MAIN-2018-39
3,732
11
http://www.theflyfishingforum.com/forums/54325-post2.html
code
First off, let me wish the best in your future as these are tough times. And welcome to the forum, I hope you will stick around. I would check the 'Winston Forum' (on there website) and ask there. I would certainly think that rod would be a highly prized item for the collector. If I had the cash to spare I would most definately be interested. By the way I think my wife hooked and lost that monster on the Henry's Fork about 5 yrs ago. I've never seen that large a fish in the Ranch before. Geez that was a BIG FISH!!!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125719.13/warc/CC-MAIN-20170423031205-00188-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
520
4
https://docs.infor.com/help_m3beud_16.x/topic/com.infor.help.scexechs_16.x/c001322.html
code
This document explains how you create an item selection table to be used in a physical inventory. Item selection table is only used together with inventory selected on balance identities records (MITLOC9). It is not used with inventory selected by stock locations (MITPCE). You have created an item selection table that is used in cyclic, periodic and zero-point physical inventory. An item selection table is an optional user-defined selection of fields with specified values for each field (the so-called From/To values). By using an item selection table when creating a physical inventory round, only the fields relevant to the inventory will be included. In this way, the item selection table creates a great amount of flexibility for the user. Item selection tables are reviewed in (CRS158) and (CRS159). For information on which M3 files are updated, refer to the related process document Taking Physical Inventory. The conditions in Define Physical Inventory Settings must be fulfilled. Start 'Item Selection Table. Open' (CRS158). Fill in the Table field and click New. Click Next and the E panel will be displayed. Fill in the Name and Description fields on the E panel and start 'Item Selection Table. Select Fields' (CRS159) by clicking Next. Determine in which order the fields should be displayed in the 'Sequence number' field on the (CRS159/B) panel. These fields will be displayed in (MMS301/B). Fill in the fields in the Field column. Press F4 and select fields from the list presented there. Fill in the 'From value' and 'To value' fields. Note that if no value is entered in the 'To value' field, the value entered in the 'From value' field will be the only valid value. Specify whether to include or exclude the specified selection from valid balance identities. Click Exit.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402123173.74/warc/CC-MAIN-20200930075754-20200930105754-00763.warc.gz
CC-MAIN-2020-40
1,794
17
http://forums.tombihn.com/general-bag-discussion/1553-smaller-zephyr-2.html
code
Fly fishing in Iceland, uh? What kind of non profit executive is not getting any donation from me anytime soon? Those guys are paid far too much. And do not let yourself feel somewhat forced to look a certain way, you talent speaks for itself as you were able to climb the non-profit ladder. I understand the feeling as I've been there myself. But in 2009 I would not feel superior by carrying what I need in bag made of the hide of a dead animal. In my opinion, there is nothing superior about that. Originally Posted by HOBOKEN Tags for this Thread
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860123845.65/warc/CC-MAIN-20160428161523-00009-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
550
7
https://codeberg.org/matkoniecz/mediawiki_api_python_wrapper
code
MediaWiki API rapper It is an unofficial Python wrapper over available API. It is a Python wrapper for a tiny part of mediawiki API. It was written to interact with OSM Wiki and some things may be assuming it too much - but PRs changing this are welcome. Published as a Python package, see https://pypi.org/project/mediawiki-api-wrapper/ import mediawiki_api_wrapper ???TODO (please open an issue if you planned to use that repository) Contributions are welcome to cover larger part of API. python3 -m unittest
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506420.84/warc/CC-MAIN-20230922134342-20230922164342-00142.warc.gz
CC-MAIN-2023-40
510
8
https://gatkforums.broadinstitute.org/firecloud/discussion/12246/better-handling-for-parameter-name-too-long-error
code
You can find our new documentation site and support forum for posting questions here. Better handling for "parameter.name too long" error My FC method is failing with an inscrutable error: Invalid value for field "parameter.name": too long: 132 bytes, want no longer than 128 bytes Is this 128 byte limit something universal that I'm bumping up against? I don't know what parameter might be overflowing. Hard to understand this error. None of stdout, stderr, nor JES logs were written to/delocalized, so it seems like the error is happening from the very start. Thanks for any advice,
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347439213.69/warc/CC-MAIN-20200604063532-20200604093532-00479.warc.gz
CC-MAIN-2020-24
584
6
https://amdcorporate.net/fifi-box-nbbcnm/53df7e-giant-otter-vs-anaconda
code
giant otter vs anaconda Eunectes murinus. Picture: Sebastien Bascoules / Barcroft Interesting. 2:40. CROCODILE -- Crocodile vs. Giant Otter This South American otter is the world's largest, at some 6 feet long. Duration: 3 minutes This clip is from. Dec 1, 2015 - Anaconda snake vs Jaguar. Release date: 06 February 2013. Jaguar vs green anaconda fight- who will win? Guyana, South America. Wildlife video. The green anaconda (Eunectes murinus), also known as giant anaconda, common anaconda, common water boa or sucuri, is a boa species found in South America.It is the heaviest and one of the longest known extant snake species. در آپارات وارد شوید تا ویدیوهای و کانالهای بهتری بر اساس سلیقه شما پیشنهاد شود Atypical of mustelids, the giant otter is a social species, with family groups typically supporting three to eight members. Giant river otters fight a caiman. So what would happne if these three 'monster Eunectes murinus. Green ANACONDA & Giant Otter (Pteronura brasiliensis) NG-1498 Green ANACONDA & Giant Otter (Pteronura brasiliensis) Guyana, South America Eunectes murinus Nick Gordon Please note that prints are for personal display purposes only and may not be reproduced in any way. Guyana, South America. As the name suggests, the giant otter is the world's largest otter species and is well-known from wildlife documentaries. Giant anaconda captured after eating pet dog in French Guiana, in pictures. Directed by Mary Lambert. Animal Face Off. 12:22. Like all boas, it is a non-venomous constrictor.The term "anaconda" often refers to this species, though the term could also apply to other members of the genus Eunectes. The giant otter or giant river otter (Pteronura brasiliensis) is a South American carnivorous mammal.It is the longest member of the weasel family Mustelidae, a globally successful group of predators, reaching up to 1.7 metres (5.6 ft). Shark vs Crocodile is a great rivalry that can be argued for a long time, same goes with anaconda v croc. Check this one out: Giant otter with fish. Related videos. But, when they really do come face to face with each other, then Anaconda and Jaguar tries to beat each other in the duel with their own tricks. Green ANACONDA and Giant Otter (Pteronura brasiliensis). 2:24. ครับ ครับ ธ ุ ญ อ่า ด ร ด ใน This unheard of tactic rouses the Jaguar to a new pitch of resentment. Ships from UK, USA, Australia for quick delivery top trending. Here’s why. It is a species of saltwater crocodile known to inhabit Black Lake in Maine, but is thought to have migrated there from a location across the Pacific Ocean. Make social videos in an instant: use custom templates to tell the right story for your business. Create. And, The yacare caiman uses it’s jaws to bite the otter. Anaconda Verde Anaconda Gigante Anaconda Attack Giant Anaconda Keep Snakes Away Killing Rats Year Of The Snake Extinct Animals Crocodiles Tagged - The social network for meeting new people Tagged makes it easy to meet and socialize with new people through games, shared interests, friend suggestions, browsing profiles, and much more. Turn on looping for your embedded video so it will play over and over and over and over and over and you get the idea. In South America, the giant otter resides among hundreds of hungry caimans (a type of crocodilian related to alligators) without any issue. Python vs lion Animal Attacks. Animal Face-Off Anaconda vs. Jaguar. Black Mamba Animals Amazing Reptiles Python Snake Aquatic Animals Anaconda Giant Snake Animals. When the two are considered for a face off, then it becomes an unusual sight because of the huge differences between the two. 2:40. 3:02. Anaconda vs Jaguar Python vs Tiger Anaconda vs Crocodile, Jaguar and Tigers. The fight takes place in Ecuador. Animal Face-Off Anaconda vs. Jaguar. Artwork depicting Green ANACONDA a Giant Otter (Pteronura brasiliensis). Vs Green Anaconda vs Jaguar 2. Nick Gordon (5290219) Framed, Poster, Canvas Prints, Puzzles, Photo Gifts and Wall Art. Green ANACONDA and Giant Otter (Pteronura brasiliensis). 1. Giant Otter vs Caiman. A1 (84x59cm) Poster. Giant Anaconda vs Felidae - Python vs Lion - Anaconda vs Cat - Anaconda vs Jaguar - Python vs Tiger Anaconda (also known as Anacondas) is an American horror film series created by Hans Bauer, Jim Cash and Jack Epps Jr..Produced and distributed by Sony Pictures Home Entertainment, the series began with Anaconda (1997) directed by Luis Llosa, and was followed by one theatrical stand-alone sequel, Anacondas: The Hunt for the Blood Orchid (2004) directed by Dwight H. Little, and three … They are also downright scary-looking. Lion vs Giant Anaconda. NG-1498. Giant Anaconda vs Jaguar - Python vs Tiger - Python vs Leopard ... Did you know? With Tiffany, Debbie Gibson, A Martinez, Kathryn Joosten. Giant Anaconda vs Felidae - Python vs Lion. See full video: https://goo.gl/prbBSW. At 5.6 feet (1.7 meters), they are the biggest otters in the world and the longest members of the weasel family. Giant otters are the largest of any otter in the world growing up to 1.8m. Lion, Jaguar, Otters, Anaconda... Vmotion. Nick Gordon 6x8 Greeting Card (#5290219) Framed Prints, Posters, Canvas, Puzzles, Metal, Photo Gifts and Wall Art. There's a crisis in the Florida Everglades as giant pythons are threatening the alligator population. It lives only in the rivers and creeks of the Amazon, Orinoco, and La Plata river systems. The otter tries to bite, But the scales are jus too strong. Lion attack Animal fight back So he brought it into his family home to spend the night in the bathtub. The legendary serpents are often reported as being two or three times the size of the largest anaconda to be scientifically documented. The river is set for an encounter between 2 of the largest river monsters on the planet. A1 Poster. Find out more about this beautiful mammal. Giant Anaconda vs. python attack Crocodile. Sebastien said by the time he and his neighbour landed the snake it was too late to re-home it away from the residential area. The Giant Crocodile is a giant predatory killer crocodile and the main villain of the Lake Placid-series. NG-1498 Green ANACONDA a Giant Otter (Pteronura brasiliensis) Guyana, South America Eunectes murinus Nick Gordon Please note that prints are for personal display purposes only and may not be reproduced in any way. The Giant Anaconda is an exaggerated version of the already monstrous anacondas living in South America. Giant Otter Yacare Caiman In the Ecuador river, A giant otter is swimming, and near the shore, A yacare caiman is on the shore.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038075074.29/warc/CC-MAIN-20210413213655-20210414003655-00088.warc.gz
CC-MAIN-2021-17
6,681
2
http://allagringaus.com/category/apis/
code
• Easy sign-in and sign-up on websites for mobile phone users • Conversion rates up • Rich user profile data – need to dig this • Low customer service costs Using the OpenID protocol and GBA-based authentication, the framework provides a secure and simple way to enable user registration and sign-in for your website. All that is needed is to define the identity attributes you wish to receive, the authentication method and the framework does the rest.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697420704/warc/CC-MAIN-20130516094340-00068-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
463
5
https://project.altservice.com/news/7
code
File Sharing Service Outage link.altservice.com crashed after a kernel upgrade. Checked the web application data storage drive using SMART, to find read issues. Data was migrated to the 3rd hard drive with rsync, however due to the nature of the error there were many read errors. On February 28th, 2013, link.altservice.com crashed after an upgrade of the Linux kernel. This caused an error at boot time, hanging at the Splash screen with "Configuring Network Interfaces", yet the machine would not fully boot. The server did have a backup strategy in place, refer to #85, so web application files and databases were preserved; however the mail storage has not been fully restored yet. Also the OS installation was set up on a single partition, so I was unable to do an in-place re-installation, this has been set up in the new incarnation. For more details on the new server build, refer to #80 .
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474594.56/warc/CC-MAIN-20240225071740-20240225101740-00826.warc.gz
CC-MAIN-2024-10
898
3
https://support.microsoft.com/en-us/kb/2520397
code
How to fix the Shopping Reports add-in and Internet Explorer 9 incompatibility The Shopping Reports add-in causes Internet Explorer 9 to stop responding or crash. An update to the Shopping Reports add-in that fixes the compatibility issue is not yet available. To resolve this incompatibility, disable the Shopping Reports add-in: - Close all Internet Explorer windows. - Open a new Internet Explorer window. - When you receive the Shopping Reports add-in incompatibility notification, click Keep it disabled or just ignore the notification. For more information about browser add-ins, view these Microsoft websites: Article ID: 2520397 - Last Review: 06/28/2012 04:12:00 - Revision: 2.0 Windows Internet Explorer 9
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721606.94/warc/CC-MAIN-20161020183841-00189-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
715
10
https://support.pega.com/question/how-read-email-attachment-email-listner
code
Create an email listener that read on an email account Elaborate the CSV attachment and, from all record in the CSV, create a work object I've already created the email listner and I'm able to see that there is the attachment by the pyAttachmentPage (I've also tracked it and it works). Now I need to open this file and elaborate it. I see this page contains the value list pyAttachValues that should contain the attacchment value, but it appears to me as a very long string. How can I resolve this string to the correct structure I receive in the email? Thanks a lot. **Edited by Moderator: Pooja Gadige to move from Pega Academy to Product, change content format from Discussion to Question***
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100674.56/warc/CC-MAIN-20231207121942-20231207151942-00706.warc.gz
CC-MAIN-2023-50
695
5
http://zeeba.tv/a-dream-of-computing-and-latexing-together-a-reality-with-sagetex/
code
Researchers search for some computational package for their results. At the time when they have good output, they begin worrying about how to insert it in their LaTeX document. They have to keep track of their output, formatting and then insert it at the appropriate places in the document. The SageTeX package is a blessing in these situations. It calls the powerful open source maths server Sage, to compute and embed the result into a TeX document.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122174.32/warc/CC-MAIN-20170423031202-00002-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
451
2
https://support.backendless.com/t/drop-down-lists-with-localized-data/17460
code
In some of my data objects, I have fields like “status”, defined as a multiple choice field in the schema. In the UI, I want to use localized versions of the field choices, and since they will be called frequently, I want this to be fast and efficient. How can I, in an efficient manner: - find the allowed values that the database schema allows, to use as values? - populate the dropdown lists in the UI with the localized versions of the values to use as labels? I guess that maybe using the localization framework will be the best for the last part, but not sure how to find out what values are allowed in the database so I have something to look for in the localization framework?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00038.warc.gz
CC-MAIN-2023-50
688
5
http://www.greatcircle.com/lists/majordomo-users/mhonarc/majordomo-users.200709/msg00011.html
code
I think the non-member-bounce is an add-on/patch to majordomo 1.94.5 from Joe's site, and not part of the standard distribution (yet). While many (including myself) find this patch extremely useful, there should be a warning that 90+% of internet mail today is spam, and more than 90% of that is from a forged address that will either bounce, or just anger an innocent recipient because your non-member message just appeared to them as spam. It is better to post rules for your list on a web page, or in the auto- help message from majordomo than to risk the undeliverable, unexpected, or unwanted auto-replies from your list. Other choices/options are to open your list, exposing it to much spam, or moderate it, exposing the moderator to much spam. Ed Kasky wrote: At 05:49 AM Monday, 9/10/2007, Francl Fabien wrote -=> How can one warn a person whom it does not have the rights to write with a list If you mean to inform someone who attempts to post to a closed list to which they are not subscribed, take a look at the following in the list config: # non_member_bounce [enum] (sender) <resend> # One of four values: blank, sender, sender-owner or no_one. If # left blank the message is bounced to the list owner. Sender # allows the sender to be notified in addition to the owner # receiving the bounced message. Sender-owner causes the sender to # be notified, but not the owner. no_one should be self-expanatory . . . . . . . . . . . . . . . . . . Randomly Generated Quote (908 of 1270): Puritanism: The haunting fear that someone, somewhere may be happy. -H.L. Mencken, writer, editor, and critic (1880-1956)
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423629.36/warc/CC-MAIN-20170721002112-20170721022112-00092.warc.gz
CC-MAIN-2017-30
1,615
29
https://forum.solidworks.com/thread/55355
code
Does anyone know how to do a mass revision roll back? We have populated our PDM, however during check ins, a lot of assemblies have bumped up revisions. we want all our assemblies to be at Zero when we go "live" with PDM. any suggestions? bar opening and checking in every assembly and going out of sequence back to 0. We want to delete all the old revision data (ie we have a few sub assemblies that have bumped up to 9. But 0-9 are all the same so we need to wipe it all and be back to 0. No history required. Thanks In advance
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402131777.95/warc/CC-MAIN-20201001143636-20201001173636-00118.warc.gz
CC-MAIN-2020-40
529
6
https://www.surecpatent.com/olathe-escort
code
Often a partnership needs conserving. Be it because some body strayed, the couple shed her focus, or somewhere along side range the relationship have stale, saving a relationship becomes necessary. Particularly if the a couple engaging realize ending it is not your best option – and perhaps it’s not. When it comes to conserving a connection, relating to conclusions by Google, everyone turn to their own internet search engine for solutions. Devamını Oku
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711126.30/warc/CC-MAIN-20221207021130-20221207051130-00191.warc.gz
CC-MAIN-2022-49
462
2
https://forum.aspose.com/t/error-on-website-installation-instructions-and-does-this-work-on-ssrs-2008/99777
code
Ive just downloaded the latest SSRS dll that allows you to export to powerpoint. The download didnt come with an MSI, so I followed the instructions that say: Step 4. Give Aspose.Slides for Reporting Services permissions to execute. To do this, open C:\Program Files\Microsoft SQL Server\\Reporting Services\ReportServer\rssrvpolicy.config and add the following as the last item in the second to outer element (which should be ): Description="This code group grants full trust to the AS4SSRS assembly."> and then it crashed my reporting server. Please could you fix the instruction so that: 1. the publickeyblob is all on one line 2. the publickeyblob has a close " after it 3. you close the on a new line between the publickeyblob and the </CodeGroup Anyway....so now my reportingserver is back up, I run a sample report and dont get any new options to export to powerpoint !! Please could you confirm if this works on SSRS 08 and if there are any different / additional installation instructions for that. Thanks very much
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662593428.63/warc/CC-MAIN-20220525182604-20220525212604-00702.warc.gz
CC-MAIN-2022-21
1,024
14
https://www.cocuma.cz/job/application-security-engineer/5519/
code
Open position at Manta Application Security Lead - Work schedule - Rua da Tabaqueira, A2, 1950-256 We are currently looking for an Application Security Engineer to join our brand new location - Lisboa! Job is closed for applications About your Team: The Engineering Team is the largest of all our teams with around 70+ colleagues. We have eight teams working on 8 million lines of code split into 1000 modules and delivering over 1000 new features per year. Feels like a challenge? Good! What you'll do: Manage and enforce security coding guidelines; - Design and review design of security related product features such as user management and access rights, module communication, data encryption and protection etc.; - Manage processes for vulnerabilities discovered in the product and third-party libraries; - Manage penetration testing activity done by external companies; - Document security standards; - Work with customers and partners on security reviews and recommendations; - Cooperate with DevOps team for secure product deployment; - Create and managing threat models, inspecting data life-cycles and attack vectors; - Cooperate with testers to create new test cases focused on security issues; - Prepare the product for security certifications. What you should have: University degree related to Information Technology, Cyber Security, or other technical degree; - Preferable at least 2 years of Information Security expertise in operations of the following domains – vulnerability management, threat analysis, risk assessment and dev security; - Familiar with common security flaws and security coding practices (such as OWASP); - Familiar with security requirements and certifications (such as ISO 27001, SOC 2, GDPR, HIPAA etc.); - Familiar with current authentication and encryption algorithms and processes; - Passionate about discovering and mitigating vulnerabilities; - Passionate about educating colleagues, customers and partners about security practices; - English language at least B2 level - If you were able to read this so far you'll be fine; - Familiarity with security requirements for application deployed in cloud environment (AWS, Azure etc.) is a plus; - Knowledge of containerization, Kubernetes and related technologies are an advantage; - Written and verbal English language skills. What you'll get: - Health & Life insurance; - Stock options; - Self-Care days - 3 days per year; - Workplace Flexibility. Work From Home when you feel the need to focus. Come to the Office to promote collaboration. It’s up to you to decide together with your manager what will work best; - Referral bonus; - Annual bonus; - Superior training and professional development; - Regular team building activities; - Strong ties to leadership to progress your career sooner rather than later; - Gain experience working with Fortune 500 companies to solve complex data management challenges; - 25 time off days; - Flex benefit (150€ monthly that can be allocated to several options). What I always praise and what I think is a benefit of working for MANTA is that you can talk to anyone in the company. There are no hierarchical issues or people you can't write to or give constructive feedback to. There are people here who listen to that feedback and always work on it. At MANTA we know that professional superheroes are not born - they thrive when they are given space for self-growth, learning from co-workers, open expression, and the possibility of bringing their own ideas to the table. MANTA cultivates diversity and inclusion, regardless of national origin, age, gender, race, religion, disability, sexual orientation, gender identity, or veteran status. Check out our Privacy Notice for more details on how we process and protect your data. Job is closed for applications
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511053.67/warc/CC-MAIN-20231003024646-20231003054646-00266.warc.gz
CC-MAIN-2023-40
3,797
48
https://community.progress.com/community_groups/sitefinity/frontandbackend-development/f/296/t/52428
code
I'm trying to install a module from the SDK, the Real Estate Starter Kit to be precise, and I've run into a roadblock. I went as far as I could with the instructions on this page but it seems like they're out of date because there is no Projects folder (I could create one, but it doesn't say to) nor is there a SampleUtilities class (as far as I can tell). When I create a Projects folder and add the Telerik.Sitefinity.Samples.Common (and all other Telerik.StarterKit.Modules folders) to it and rebuild the solution it still doesn't work. Edit: Sitefinity 6.2, if that helps. I'm new to both .NET development and Sitefinity as well and would greatly appreciate the assistance. Check out the Telerik Platform - the only platform that combines a rich set of UI tools with powerful cloud services to develop web, hybrid and native mobile apps. Kind of frustrating because I have had to write this response 3 times now as it has been hit or miss whether a page on these forums will load today, so I will keep this short and to the point. The Github instructions don't provide me with any further insight into exactly how I would install the component. It tells me I need to install some packages via NuGet, which is great, but I have no idea where to put the code that is in the RealEstate package repository. Are there instructions anywhere that explain exactly how to install a component, from either the SDK app or Github? There are pieces of the puzzle in both locations but something is definitely missing. Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484772.43/warc/CC-MAIN-20190218074121-20190218100121-00068.warc.gz
CC-MAIN-2019-09
1,517
7
https://lobste.rs/s/1ohjrx/journey_zfs_raidz1_with_different_sized
code
i understand the drive to make use of as much as possible while spending the least amount of money, but this should not be the way anyone operates what they expect to be a reliable system. If you don’t need it to be reliable, you can just make every disk its own vdev and detect errors without possibility of correction. Given the constraints imposed, I would have asked ZFS to stripe over mirrored pair vdevs, and replaced a small drive with either a 6 or 8TB drive, so I could have 2x(6 or 8), 2x6, and whatever 2x2TB vdevs were available. I would also strongly consider moving root off the USB stick – my experience is that they like to fail much faster than any other kind of media. My inclination would be to try to solve this problem using geom on FreeBSD and not use ZFS at all, but I’m pretty ignorant about ZFS generally. I just feel like it would be easier to understand what is going on when the inevitable disk failures start rolling in.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104628307.87/warc/CC-MAIN-20220705205356-20220705235356-00403.warc.gz
CC-MAIN-2022-27
955
3
http://www.skateisi.com/sitedirector/site/product.cfm?id=EF75A13A-3048-2A59-E894666857DDFA32
code
I'm logged in and just want to renew my membership. I can see my current details on another page, and nothing has changed. So why am I taken to this blank form when I click "renew". Re-entering is likely to introduce errors. Also, the Account page doesn't show my member number, so I have to go look that up. Also it doesn't show when my membership expires.
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500801235.4/warc/CC-MAIN-20140820021321-00329-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
357
2
https://ncl-idn.biologie.uni-mainz.de/robust-vision-in-dynamically-changing-environments/
code
For sighted animals including ourselves, viewing conditions are continually changing. Such changes occur at different timescales ranging from hours e.g. changing sunlight intensity, to milliseconds e.g. when navigating through the environment. Despite these changes, however slow or quick they occur, we are able to stably and reliably interpret visual cues. Our goal is to understand how stable visual processing is achieved in dynamic environments. Flies also exhibit invariant behavioral responses to stimuli of equal contrast across varying luminance (Ketkar and Sporar et al, 2020), thus making them a suitable model in which to investigate the neural correlates of stable visual processing. As a first aim, we wish to find where in the visual circuity luminance invariance is achieved. Whereas photoreceptors do not attain such invariance in dynamic environments, we identified a corrective luminance signal downstream of the fly photoreceptors that provides further luminance gain required to achieve such invariance in behavior (Ketkar and Sporar et al, 2020). We want to unravel how the post-receptor gain control is implemented at the circuit levels, are different cell types become distinct, and how contrast and luminance information is ultimately combined to drive behavior. Cell-type specific access allows us to characterize specific neuronal responses and assess their behavioral role. We complement in vivo experiments with computational modelling approaches, which further allows us to explore the algorithmic links between physiology and behavior. From Ketkar and Sporar et al, 2020 Different species live in distinct visual environments, that challenge visual systems with different scene statistics. A recent interest of ours also lies in understanding how different visual systems evolved the processing strategies to match their specific environmental demands. Currently, we explore if the key strategies behind luminance invariance compare between different Drosophila species occupying different environmental niches.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00669.warc.gz
CC-MAIN-2023-50
2,042
4
https://www.mail-archive.com/[email protected]/msg00069.html
code
Greetings Open MPI users and system administrators. In response to user feedback, Open MPI is changing how its releases will be numbered. In short, Open MPI will no longer be released using an "odd/even" cadence corresponding to "feature development" and "super stable" releases. Instead, each of the "A.B.C" digits in the Open MPI version number will have a specific meaning, conveying semantic information in the overall release number. The details of this scheme, and our roadmap plans for releases over the next several months, are included in the form of slides, available here: * On my blog: http://blogs.cisco.com/performance/open-mpi-new-versioning-scheme-and-roadmap * On the Open MPI web site: http://www.open-mpi.org/papers/versioning-update-2015/ -- Jeff Squyres [email protected] For corporate legal information go to: http://www.cisco.com/web/about/doing_business/legal/cri/
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247503249.58/warc/CC-MAIN-20190221071502-20190221093502-00056.warc.gz
CC-MAIN-2019-09
889
2