url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://www.mynextjob.ro/loc-de-munca/senior-data-scientist-1656728
|
code
|
Spyrosoft Group is continuously growing thus we are thrilled to announce that we are currently looking for Data Science Consultants for our new initiative. Data Scientist will be responsible for customization and implementation of solutions centered around Artificial Intelligence technologies – specifically natural language processing and information extraction. You will support AI solution development tasks, provide feedback to the AI lab researchers. To qualify for the role, you must have 4+ years of experience in the field 1+ years of experience in Healthcare / Life Science sector Experience in working with healthcare specific data and language formats such as HL7 / FHIR, xDT, openEHR, OMOP, SNOMED Stay up to date on the latest trends & technologies in AI/ML on the market Programming experience in Python or others: R, Scala Machine learning domain knowledge—bias-variance tradeoff, exploration/exploitation—and understanding of various model families, including neural net, decision trees, Bayesian models, instance-based learning, association learning, and deep learning algorithms Excellent communication skills Good command of English Ideally, you’ll also have Experience in using Agile methodologies (Scrum, Kanban, etc.) Experience in MLOps. Experience with one of the Cloud platforms, preferably on Azure Ability to communicate in German
Senior Data Scientist in Constanţa
Datele de contact vor fi vizibile dupa ce veti aplica!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00721.warc.gz
|
CC-MAIN-2024-10
| 1,457 | 3 |
http://qpid.apache.org/components/index.html
|
code
|
The Qpid project offers two kinds of components, messaging APIs for building AMQP applications, and messaging servers for deploying AMQP networks. You can use them together to build robust distributed applications.
Messaging APIs give your application a tool for efficient, high-level interprocess communication.
Qpid offers three messaging APIs. Qpid Proton is a reactive API with full-spectrum AMQP control. In addition to being a messaging API, Qpid Proton is used by other Qpid components to implement AMQP 1.0 protocol support. Qpid JMS is an AMQP-fluent implementation of the widely used Java Message Service API. The Qpid Messaging API is a connection-oriented API that supports many languages.
The term "client" is often used to refer to messaging APIs, but some messaging APIs, such as Qpid Proton, can be used to implement any kind of messaging component, including clients, servers, bridges, and proxies.
Messaging servers are message-transfer intermediaries that provide additional behaviors such as store-and-forward for improved reliability.
The Qpid message brokers are full-featured message-oriented middleware brokers. They offer specialized queueing behaviors, message persistence, and manageability. Qpid offers pure-Java and native-code implementations, the Broker for Java and the C++ broker.
Dispatch router is a new kind of messaging server. It allows you to build redundant router networks connecting clients, brokers, and standalone services.
|C++ broker||-||Linux, Windows||1.0, 0-10|
|Broker for Java||-||JVM||1.0, 0-10, 0-9-1, 0-9, 0-8|
|Qpid JMS||Java||JVM||1.0, 0-10, 0-9-1, 0-9, 0-8|
|Qpid Messaging API||C++, Perl, Python, Ruby, .NET||Linux, Windows||1.0, 0-10|
Any Qpid components that share an AMQP version can interoperate. For instance, the brokers are implemented in C++ and Java respectively, but they do not require C++ or JMS clients for communication.
Apache Qpid, Messaging built on AMQP; Copyright © 2015 The Apache Software Foundation; Licensed under the Apache License, Version 2.0; Apache Qpid, Qpid, Qpid Proton, Proton, Apache, the Apache feather logo, and the Apache Qpid project logo are trademarks of The Apache Software Foundation; All other marks mentioned may be trademarks or registered trademarks of their respective owners
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190234.0/warc/CC-MAIN-20170322212950-00214-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 2,280 | 13 |
http://www.blender.org/forum/viewtopic.php?t=25681&view=previous
|
code
|
Im fairly new to Blender. I've been messing with Cycles. Im trying to design and render out a low light scene and my Renders are coming out VERY VERY noisy, despite rendering with upwards of 1000 samples. Any help would be greatly appreciated. BTW, I have ambient occlusion turned off because it makes my scene too exposed.
My 3d View Set Up. The small orb over the desk has a emitter texture. Then the 3 planes in mid air also have an emitter texture.
My render settings.
go to the Light Paths and set Diffuse to 0!
this helped me a bit on my renderings.
if u need more, then set samples up
maybe 5000 or 10000
Uncheck caustics. Its not needed in a scene like that either way.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696381630/warc/CC-MAIN-20130516092621-00040-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 677 | 8 |
http://saviry.com/deal/1392449
|
code
|
offers Standard Calculator 12 Digit,Desktop Large Display and Buttons
. Free shipping with Prime or on orders over $25.Product Description:
- 【PORTABLE SIZE】: 5.5" x 3.4", automatic sleep function, two years of use.Very light,Easy to put in Pockets,Bags
- 【BIG DISPLAY】: Large button, candy color. Large LCD screen, 12-digit display, vertical back, 15-degree angle for easy-to-read calculator. One LR44 battery is included in the package
- 【APPLICATION SCENARIO】: Made of durable ABS material. Yellow-white, pink-white, orange-white, pure white, pure green, a variety of fashion styles. Small and portable general purpose desktop calculator for home, school, office or shop, can do common math like we do Has a variety of financial functions, great for adults and students
- 【DURABLE SILICONE KEYS】: Good feel, ABS plastic material, light weight. Reasonable configuration, comfortable operation, automatic shutdown, independent memory, M+, M-, total (GT),Delete key(▶).Anti-slip design, with anti-slip washers, it is not easy to slide during operation.
- 【VEWINGL AFTER-SALES SERVICE】: Worried about product quality? We provide them with 24 months of technical support! If you are not satisfied with our standard calculator, please contact us directly. We provide you with high-quality after-sales service and reply within 24 hours. 100% refund if you are not satisfied. If you are not satisfied after opening the box, you can also apply for a refund.
Category: Office & School Supplies
Posted on 09 March 2023, 07:12 AM
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948620.60/warc/CC-MAIN-20230327092225-20230327122225-00798.warc.gz
|
CC-MAIN-2023-14
| 1,542 | 9 |
https://forums.expo.dev/t/why-the-commit-id-is-the-same-after-changes-in-code/64643
|
code
|
- Whether you are bare or managed workflow
- What you have tried so far I tried to make changes in code again and clear cache with --clear-cache option but the commit id is still the same.
I have a question why my eas build commit id is the same while there are changes between builds?
I discovered this because I feel weird why the build app’s behavior is not same when I run it on my laptop with expo start --localhost --ios. And the eas build commit number should not be the same after I made changes to the code.
Please drop a line if you have any clue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644915.48/warc/CC-MAIN-20230530000715-20230530030715-00344.warc.gz
|
CC-MAIN-2023-23
| 559 | 5 |
http://sethaobxu.collectblogs.com/8084545/facts-about-online-programming-assignment-service-revealed
|
code
|
In higher than instance I have extended the implementation on the sample Elaborate course presented below operator overloading part.
Working with Django apps needs a database. Utilizing SQLite is chosen, since it is pre-configured. If you are utilizing a different database engine, make certain it really is put in and configured thoroughly.
For a few rationale you remind me of the sort of coder who refuses to write down comments, scarcely produces any entity that throws exceptions, not to mention handles them and it is chargeable for cryptic and diagnostically ineffective error messages.
Loops and iteration complete our four simple programming styles. Loops are classified as the way we inform Python to perform some thing repeatedly. Loops will be the way we Make plans that stick with a dilemma until finally the problem is solved.
Because a direction is explicitly specified, In cases like this the controller class may be the StudentRegistrar.
Printed variations — I have created this reserve available for obtain in printed versions within the print-on-need publisher lulu.com. That is for advantage only, for many who would want to Have a very sure printout in a good form. (Remember to usually do not come to feel obliged to purchase the printed version; I will not make any funds from it!
The language permits an overloaded assignment operator to acquire an arbitrary return variety (including void). Having said that, the operator will likely be defined to return a reference to your assignee. That is according to the behavior of assignment operator for crafted-in sorts (returning the assigned price) and permits using the operator invocation as an expression, For illustration look at these guys on top of things statements or in chained assignment.
.Web and Java makes use of the Composite relation to determine their Collections. I see Composition is being used in all kinds browse this site of other methods far too. Nonetheless the greater essential aspect, that many people neglect may be the lifestyle time element. The lifetime time of the two classes that has bond with a composite relation mutually rely on one another. For those who go ahead and take .Web Selection to comprehend this, there you may have the Collection component determine inside (it really is an inner section, therefore known as it's composed of) the gathering, farcing the Factor to have disposed with the Collection.
Nevertheless, the presence of try this site checked exceptions in Java may make practical programming inconvenient, since it could be important to catch checked exceptions after which rethrow them—a dilemma that does not take place find out in other JVM languages that do not have checked exceptions, for example Scala.[citation necessary]
The class IOException can increase the performance of The category Exception by introducing new kinds and approaches and by overriding existing types.
Another way that functional languages can simulate point out is by passing close to a data composition that represents the current state to be a parameter to function phone calls.
Pair programming is surely an agile program growth procedure during which two programmers get the check here job done together at a single workstation. One particular, the driver, writes code when the opposite, the observer or navigator,[one] opinions Every line of code as it truly is typed in. The 2 programmers switch roles often.
C++ supports assignment amongst different classes, both equally by using implicit copy constructor and assignment operator, If your location instance course is definitely the ancestor with the source occasion class:
Printing the eleventh Fibonacci amount, purposeful declaration type, working with lazy infinite lists and primitives
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829399.59/warc/CC-MAIN-20181218123521-20181218145521-00234.warc.gz
|
CC-MAIN-2018-51
| 3,759 | 14 |
https://support.awesome-table.com/hc/en-us/articles/115004265825-Introduction
|
code
|
These articles present Awesome Tables and explain how to create an app, how to set up your data source and how to share your app.
Create a filterable People Directory
timer 20 min.
- Create an Awesome Table app
- Set up a Google spreadsheet or an Excel file with Awesome Table
- Use filters and parameters
- Own a Google or a Microsoft account
You will create a searchable People Directory that can be filtered using a Table app.
Live example :
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657142589.93/warc/CC-MAIN-20200713033803-20200713063803-00110.warc.gz
|
CC-MAIN-2020-29
| 444 | 9 |
http://www.webhostingtalk.com/showthread.php?t=213332
|
code
|
To be sure, I run a head command from bash:
# HEAD http://smut-site.com/expire/
Cache-Control: public, must-revalidate, max-age=86400
Date: Wed, 03 Dec 2003 19:39:20 GMT
Server: Apache/1.3.29 (Unix) mod_gzip/220.127.116.11a mod_auth_passthrough/1.8 mod_log_bytes/1.2 mod_bwlimited/1.2 FrontPage/18.104.22.16834 mod_ssl/2.8.16 OpenSSL/0.9.6b PHP-CGI/0.1b
Content-Type: text/html Expires: Thu, 04 Dec 2003 19:39:20 GMT
Last-Modified: Tue, 02 Dec 2003 23:59:37 GMT
Client-Date: Wed, 03 Dec 2003 19:39:18 GMT
Yup, appears to be working. Let me make sure the image is cached as well.
Expires: Thu, 04 Dec 2003 19:40:02 GMT
Last-Modified: Tue, 02 Dec 2003 22:05:00 GMT
Yup, that works.
Testing it in IE, it isn't caching the images. Any reason why? What am I missing here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719646.50/warc/CC-MAIN-20161020183839-00177-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 766 | 13 |
https://animals.fandom.com/wiki/Coraciiformes
|
code
|
European Roller (Coracias garrulus)
Coraciiformes is a family of usually colorful birds including the kingfishers, the bee-eaters, the rollers, the motmots, and the todies. They generally have syndactyly, with three forward-pointing toes (and toes 3 & 4 fused at their base), though in many kingfishers one of these is missing.
The name Coraciiformes means "raven-like", which is a misnomer (ravens are passerines). Specifically, it comes from the Latin language "corax", meaning "raven" and Latin "forma", meaning "form", which is the standard ending for bird orders.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655899931.31/warc/CC-MAIN-20200709100539-20200709130539-00489.warc.gz
|
CC-MAIN-2020-29
| 568 | 3 |
https://de.alienwarearena.com/ucf/show/2164063/boards/technical-support-1/ForumPost/m15-r6-external-display-4k-140hz
|
code
|
So the problem is following:
- is it possible to connect somehow 4k@140Hz monitor (ASUS ROG STRIX XG27UQR) to my laptop (M15 R6)?
- my laptop doesn't have DisplayPort however this monitor supports DSC (Display Stream Compression) so I had a hope to connect it with HDMI. But sadly, refresh rate is limited to 60Hz :(
Right now I see two possible options:
1. Use thunderbolt port instead directly (my prev attempts was unsuccessfull);
2. Buy a docking station Thunderbolt -> DisplayPort;
But I've seen information that NVIDIA GPU card even doesn't connected to this port. Is it true for this model?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711200.6/warc/CC-MAIN-20221207153419-20221207183419-00055.warc.gz
|
CC-MAIN-2022-49
| 597 | 7 |
https://store.kde.org/s/KDE/find/?search=linux&page=1&pci=157&ls=830&t=plasma
|
code
|
Search results for "linux"
Various KDE 1.-4. Improvements by gmolina
Firefox stores its passwords internally, optionally protected by a master password. KDE has its own password manager called KWallet. KWallet stores every password in the KDE system, and protects access by a master password. With this extension you are able to use KWallet instead of the default...
extension linux kde plasma unix
Oct 17 2014
Various KDE 1.-4. Improvements by bk12
[b]What is it?[/b] Colibri provides an alternative to KDE4 Plasma notifications. Colibri notifications look lighter and are completely passive: they do not provide any buttons. You may or may not like this. Since they are completely passive, they smoothly fade away when you mouse over...
unix extension plasma kde linux
May 15 2013
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662552994.41/warc/CC-MAIN-20220523011006-20220523041006-00490.warc.gz
|
CC-MAIN-2022-21
| 782 | 9 |
https://studysoup.com/tsg/1117369/statistics-informed-decisions-using-data-5-edition-chapter-1-5-problem-5
|
code
|
In Problems 5–16, the survey has bias. (a) Determine the type of bias. (b) Suggest a remedy.
5. A retail store manager wants to conduct a study regarding the shopping habits of his customers. He selects the first 60 customers who enter his store on a Saturday morning.
Lecture 19 Nicole Rubenstein November 7, 2017 Introductory example Let Y and Y have the joint probability density function given by 1 2 ( e▯(y1+y2); y > 0;y > 0 f(y ;y ) = 1 2 : 1 2 0; elsewhere We know that for any y > 0 the conditional density function of Y given that Y = y is 2 1 2 2 f(y jy ) = e ▯y 1; 1 2 which is free of y 2 This implies that the probabilities associated with Y are 1he same, regardless of the observed value of Y 2 Independence De▯nition 19.1. Let Y have distribution function F (y );Y have distribution function F (y ); and Y and 1 1 1 2 2 2 1 Y2have joint distribution function F(y ;y1): 2hen Y and 1 are sa2d to be independent if and only if F(y 1y 2 = F (1 )1 (y2) 2 for every pair of real number (y ;1 )2 If Y a1d Y are2not independent, we call them dependent. We can check the introductory example: Z Z
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103269583.13/warc/CC-MAIN-20220626131545-20220626161545-00789.warc.gz
|
CC-MAIN-2022-27
| 1,110 | 3 |
http://www.tivocommunity.com/community/index.php?threads/streambaby-new-streaming-application.416858/page-44
|
code
|
Hi I came back to this after not using it for a while and I'm really impressed with how slick and stable it's become. I'm using Streambaby to stream MP4 files with embedded metadata. Right now, I have my files titled with the episode number in the file title. I've noticed that if I view/open a file, when I go back to directory-browsing, the directory lists the embedded title information, rather than the file name. While this is a neat feature, it means that I can no longer see the episode number when browsing, which makes it difficult to keep the episode sequences straight. Is there any way to disable this feature, while keeping the other metadata features working?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125074.20/warc/CC-MAIN-20170423031205-00583-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 673 | 1 |
https://www.enotes.com/topics/jean-renoir/critical-essays/jacques-joly
|
code
|
[Rules of the Game] is original precisely for the connection it makes between a traditional theatrical structure and a new content, and for the way it articulates their relation. For Rules of the Game is the one film in a thousand where the study of a given milieu is inseparable from a particular dramatic scheme: in it, artistic reflection is on a par with historical analysis.
Renoir's project was clear: to perform the "autopsy" of the bourgeoisie in crisis, to record the proof positive of a class overwhelmed by the events in Europe…. Renoir's film was intended, in his own words, as "an exact description of the bourgeois of the time." Directly, then, Rules of the Game is given...
(The entire section is 2124 words.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647530.92/warc/CC-MAIN-20180320185657-20180320205657-00043.warc.gz
|
CC-MAIN-2018-13
| 726 | 3 |
http://digiassn.blogspot.com/2010/01/droid-wifi-tetheringhotspot-on-droid.html
|
code
|
Since the announcement of the Pre+ for Verizon would have WiFi hotspot built in, I have been salivating for the wireless hotspot functionality. Of course, I kicked myself because I just bought a Droid. Well, I can hold off my wanting because some clever hackers figured out how to do the same thing with the Droid. That’s right, the Droid is capable of being a WiFi hotspot.
So how is this feat accomplished?
- Root your Droid.
- The instructions say that you will get a blank screen. This is true. Wait a few minutes (I waited about 5, probably way too much), then reboot the device.
- Follow the directions here.
That’s it. Pretty easy. Took me about 20 minutes to do. Although not indicated in the article because it assumes prior understanding, the “ADB” application refered to requires the Android SDK, and is a tool located under the “tools” folder. Also, the step to “flash_image” was actually not needed since this is part of the Android Root Helper application. Also, during the WirelessTetherPather programs final stages, it asks you to “login, and run the tether app”. This actually refers to running the “Wireless tether for Root users” application under your applications menu on the Droid, not running it using Busybox using ADB. That step confused me for some reason.
If your having problems finding the “Droid Root Helper” application, you can use the one I found here. Apparently, it is also in the Marketplace.
That’s it, the last little void from my HTC Touch has been filled. Seriously, how could Verizon NOT want this? This is just so freaking awesome, it should be a standard feature.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189802.72/warc/CC-MAIN-20170322212949-00281-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 1,636 | 8 |
https://www.bigdataworldasia.com/speakers/vojtech-kurka
|
code
|
Meiro Pte Ltd
Vojtech is Head Nerd (CTO), responsible for the systems that power Meiro. He started as a developer and working with data analytics just in his free time - analyzing highway accidents. After working as a data analyst for Webnode, he got into ETL, data integrations, data warehousing, and visualizations. As a solution architect for Keboola, Vojtech worked on integrating different data sources - building and implementing custom data workflows and pipelines both in the cloud and on-premise - using various technologies from Hadoop to Snowflake, from SOAP to REST, from Python through PHP to R, from CSV to JSON.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527566.44/warc/CC-MAIN-20190419101239-20190419123239-00400.warc.gz
|
CC-MAIN-2019-18
| 626 | 2 |
https://stylebyayaba.wordpress.com/2014/06/23/weekend-highlight-what-i-wore-to-watch-the-super-eagles-kick-ass/
|
code
|
Happy new week!
My weekend was a busy one! As you may know I manage PR for my company (or now you know anyway..) and to celebrate the world cup we organised a soccer viewing event of the Nigerian vs BIH Match.
It was super fun especially as we were rewarded with a win…ignore those who said we got lucky!
Leather and Jersey Dress: Ayaba (POR)
Shoes: New Look
Watch: Michael Kors
Lipstick: Mac Ruby Woo
Live, Love, Style..
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583661083.46/warc/CC-MAIN-20190119014031-20190119040031-00047.warc.gz
|
CC-MAIN-2019-04
| 423 | 8 |
https://community.filemaker.com/thread/127886
|
code
|
Totally customise email body
I have a script which loops through records in a found set and sends an email for each. That parts easy.
And I know how to customise the body of the email message from within the send email dialogue. Again easy.
And I do this all with the 'perform without dialogue' option which is what I want.
But ... I'm not the end user. I want the different end users to be able to enter their custom message into a layout somewhere and have the email use that instead. Again that's easy until I want to use replaceable text.
For example, if I enter the following DIRECTLY into the message box of the Send Email window I get what I need
"Hello "& subject::name
which gets me Hello John, Hello Sally etc. Great
But my customers may want something different, perhaps not even in English. So I created a global field called BODY in a GeMail table and I call that onto the message box with.
Now the customer could go to the layout with that field and enter their custom message. They may enter
"Dear "& subject::firstname
It no longer works. The emails will just repeat the text verbatim rather than get the firstname for each record.
I hope this makes sense. Note I can get the result I want by importing a text file into the message box but I can't do that automatically with no dialogue.
Please help if possible
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890187.52/warc/CC-MAIN-20180121040927-20180121060927-00252.warc.gz
|
CC-MAIN-2018-05
| 1,327 | 14 |
https://www.rtsoft.com/wiki/doku.php?id=proton_entity&rev=1288080936
|
code
|
This is an old revision of the document!
“Update and Render functions? Where we're going we don't need hardcoded Update and Render functions”
First of all, a disclaimer: You don't really *HAVE* to use the Proton Entity System to use the framework. If you already have a system you like, or are porting existing code, you can safely ignore most of this section.
I've made a lot of engines and a lot of game frameworks and for some reason I'm constantly trying new methods, mostly because it keeps things fun and interesting.
Here are some past methods I've tried when creating games:
Using all of these, this is how it went:
(Ladies, look at your game programming development cycle)
(Now look at mine)
What if we could trade some initial complexity in the beginning for a more sane experience over all?
Aka, “my interpretation of how Unity internals sort of work after I used it for a few hours”.
If you take a look at Entity.h you'll see some functions but nothing about thinking/updating or drawing. So what can an entity do?
Well, not much, alone. It's fairly lightweight at about 200 bytes.
Instantiate an entity
Ok, time to just cannon-ball into the pool and show you what this stuff can do. The important thing to realize is we're just using entities and components to do everything.
If you say a weird function, like, BobEntity(), realize that it's just a helper function from EntityUtils.cpp and is components to manipulate things to make any entity “bob”. These helpers are not that complicated and just save on repetitive code, so dig in and look at them.
My philosophy is if it's a simple one line of code to add a fade, zoom, or bob to a visual, you are that much more likely to do it.
If you'd like to work along with me, open the RTSimpleApp project now!
//Open App.cpp. Find MainMenuCreate(pGUIEnt) in App::Update(), comment it out and add two lines so you have this: //MainMenuCreate(pGUIEnt); AddFocusIfNeeded(pGUIEnt); //so it will render, update, and draw. Really it just adds a few components. Entity *pEnt = CreateOverlayEntity(pGUIEnt, "logo", "interface/proton.rttex", 0,0);
Instead of the menu as before, you should see the proton logo rendered. (I've set my screen output to iPhone size in main.cpp btw)
Well, we see the logo there. If you looked inside of CreateOverlayEntity, you'd see it creates an Entity, and adds a RenderOverlay component to it and sets some properties. (All of which are storied in either entity's VariantDB (like pos2d, color, scale2d, etc) or the components VariantDB if it is specific to the component. (properties like fileName, and framex, framey)
Add a few lines of code:
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484648.28/warc/CC-MAIN-20190218033722-20190218055722-00145.warc.gz
|
CC-MAIN-2019-09
| 2,637 | 21 |
http://forums.nextgames.com/walkingdead/discussion/29431/how-to-replace-a-save-game
|
code
|
If you are new here, create your account below.
How to replace a save game
I'm not able to save game on my iPhone, as 'only one save is allowed per Game Center'. The problem is, I don't have the game on any other iOS/Android devices anymore. What should I do not to lose my progress?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887414.4/warc/CC-MAIN-20180118131245-20180118151245-00040.warc.gz
|
CC-MAIN-2018-05
| 283 | 3 |
https://uel.history5231.pw/github-cs61c.html
|
code
|
There is no checkoff this week. This will reduce the number of check-offs we have to perform allowing us to answer more of your questions as well as give you someone to discuss class material with. BOTH partners will need to be present at check-off to receive credit and both partners will be asked to participate during the check-off.
Try your best to find someone in your lab section with similar work habits as yourself. At the end of each exercise, there is a section labelled "Checkoff. Once you and your partner finish ALL of the exercisesyou should put your names and logins on the checkoff list on the board, and a course staff member will come and check you off.
Labs in CS 61C are graded out of 2 points. Labs are due for full points by the next lab session which is 1 week after the lab was assigned. If they're another week late, then you get half credit. Any later than that and it's 0 points. You can always ask for help on the lab, but you can only asked to be checked off once.
CS61C Fall 2019
If you asked to be checked off and you don't pass the checkoff you'll get 0 points. This semester, to encourage students to use lab time more efficiently by starting the lab at home, you can also earn extra credit by checking-off within the first hour of your assigned lab time. For every lab in which you and your partner get checked-off within the first hour of your assigned lab section, both you and your partner will receive 1 extra credit point.
After getting checked-off early on a lab, a good way to spend the rest of your lab time is by being altruistic and helping other students with the lab, which will also help you solidify your own understanding of the material.
In today's lab only, everyone will need to find a partner, preferably with the same operating system, but both students in the partnership will need to complete the setup steps in Exercises 0, 1, and 2.
Later exercises only need to be done on one computer. All of the exercises in this lab as well as future labs will rely on using the terminal to navigate and manipulate files and programs on your computer. Oftentimes, as in this lab, we'll also be connected remotely to another computer, so it's especially important to learn an efficient workflow for the terminal shell environment.
In this lab, we omit a few commands because we assume that you have some experience working with git before and have learned how to navigate to different directories, make new directories, and edit and remove files. If you're not as comfortable, it's especially important to find a partner to work through the lab! Once logged-in, create a new account for CS 61C.
This should give you a username and a temporary password. Now, you can login to your instructional account by running the command ssh cs61c-xxx hiveYY. You are now remotely accessing the "Hive" computer located in Soda.
You can also login directly onto one of the lab computers with that username and password. If you're having trouble logging into particular Hive machine, make sure that it's connected to the internet.
You can check the availability of all of the EECS instructional computers by using the Hivemind web tool to monitor current computer usage. This will be particularly handy when it comes time to run projects on the Hive machines to help identify which computers are under heavy use, and which ones are not. In order to change your password from the temporary one, while still logged into your instructional account i. If you're unable to obtain a CS 61C account through webacct, complete the Instructional Account Request Form and we will manually process your request at the end of each week prior to the drop deadline.
You can still complete the rest of the activities in this lab with your partner, and setup your GitHub repository as well. Please read the following instructions carefully before proceeding.Please accept the github classroom assignment by clicking this link.Unideals inc
If we publish changes to the starter code, you may get them by running git pull staff master Please read the entire spec before beginning the project. This project will finish off the compiler you started to build in Project 1. Code generation is the last step of our compiler. This can be tricky, but we know you can do it! In Project 1, we received feedback that it was hard to tell how different functions related to one another. Before we start, open cgen. Try to view the code as we describe it.
Switch over to cgen. This function does three things. First, it creates all necessary global data variables declared globally and all strings used in the file and places it in the. Then, it calls dispatch to generate assembly for the DAST starting with the root that was passed in. The dispatch function takes in a DAST and decides how to generate assembly code based on its type. These types are the same ones you worked with in Proj and you can find them in the ast.
Based on the type of the node, the appropriate process function is called. Not all nodes require processing ie. Within the selected process function, assembly instructions are emitted to our output file.Best atmos horror movies
Each process function emits assembly only for the node it processes eg. We can see it has one child, an expression 4 in our previous example.
The dispatch call on child is how we generate the value 4. By our code generation invariants, we know the value whatever it is is now in register S1. The next thing to do is multiply by First we load the immediate -1 into a temporary register with an ADDI. Then we multiply and store back to S1 the final value Open up instructions. The ordering of arguments to emit functions is extremely important.
You are welcome to add more instruction functions if you like, though you may want to look at your green sheet to figure out instruction formatting.
If your code does not execute in Venus, it will not execute in the staff autograder.Please accept the GitHub Classroom assignment by clicking this link. If we publish changes to the starter code, retrieve them using git pull staff master.
Any updates and important information will be recorded on Piazza, so check there to see if there are any changes for you to pull. Note: You will need to run the code in this project on a Hive machine.
Literally a hive. Our testing will also occur on a Hive machine with identical processor and cache configurations. In this project, you will apply some of the performance optimization techniques that you have learned in class to the real-world problem of classifying images using a Convolutional Neural Network CNN. The following sections will introduce you to CNNs and a high-level idea of what is going on. Image classification describes a problem where a computer is given an image and has to figure out what it represents from a set of possible categories.
In general, neural networks assume that there exists some sort of function from the input e. While classical algorithms may try to encode some insight about the real world into their function, CNNs learn the function dynamically from a set of labelled images—this process is called training. Once it has a fixed function rather, an approximation of itit can then apply the function to images it has never seen before. For this project, we do not require you to understand how CNNs work in detail.
However, we want to give you enough information to get a sense of the high-level concepts. If you would like to learn more, we encourage you to take one of the Machine Learning or Computer Vision classes in the department, or check out this brief online-course. At a high level, a CNN consists of multiple layers.
Each layer takes a multi-dimensional array of numbers as input and produces another multi-dimensional array of numbers as output which then becomes the input of the next layer. When classifying images, the input to the first layer is the input image e. Depending on the layer, the weights have different interpretations, but for the purpose of this project, it is sufficient to know that each layer takes the input, performs some operation on it that is dependent on the weights, and produces an output.
This step is called the forward pass : we take an input and push it through the network, producing the desired result as an output. The forward pass is all that needs to be done to use an already-trained CNN to classify images. In practice, a neural network really ends up being a pretty simple pattern recognition engine with remarkably limited capacitybut it can be quite bizarre in what it ends up recognizing. And it worked very well… by seeing the snow and the forest trees in the background of the wolf photos.
There is much research done on different neural network architectures and training methods. However, another crucial aspect of neural nets is, given a trained network, actually classifying images in a fast and accurate way.
The binary version suitable for C programs is already loaded onto Hive machines. The network will already have the finalized weights, and the algorithm for computing the forward pass of the network is given to you.As with Projects 1 and 2, we will be creating a new project repository on GitHub Classroom and pulling the starter code from GitHub.
You are welcome to complete the project alone or with a partner, but we really encourage you to work with a partner, especially for Projectwhich is much more involved than Project If you don't have a partner and would like to find one, fill out this Google form and we will try to pair you with another student that has a relatively similar schedule and work preferences. It is fine to work on Project without a partner and Project with a partner, so feel free to fill out the form until Monday, November 12th, though obviously sooner is better!
Whether or not you have a partner, complete the Project 3 Repository Registration Form which will guide you through the necessary steps to create a repository for this project. Once you've cloned your Github classroom repository, make sure to setup the starter code remote repository and pull to make sure all changes are up to date.
Setting the starter repository as a remote and pulling the starter code is independent of setting up your Github classroom repository, so please add the starter as a remote and get started if you're having any trouble. Any clarifications about this project will be posted both here and on the Project Index Post on Piazza.
Getting a merge conflict?
CS61C Spring 2019
If it's from pulling the starter code, first, open your. To demonstrate, if you see this:. Your first task is to create an ALU that supports all the operations needed by the instructions in our ISA which is described in further detail in the next section. Please note that we treat overflow as RISC-V does with unsigned instructions, meaning that we ignore overflow. All of them are required with the exception of mulh, which will take some extra effort to implement but you're certainly up to the task!
You are allowed and encouraged to use built-in Logisim blocks to implement the arithmetic operations. When implementing mul and mulhnotice that the multiply block has a "Carry Out" output the adder block also has this, but you will not need this located here:.
Experiment a bit with it, and see what you get for both the result and carryout with negative and positive 2's complement numbers. You should realize why we made mulh extra credit. Follow the same instructions as the register file regarding rearranging inputs and outputs of the ALU. When you run. To use it, do the following: you may have to use "py" or "python3" as is appropriate on your machine.
If you want to see the difference between your output and the reference solution, put the readable outputs into new. However, in this project, You will only implement 9 of them specified below to save you some repetitive work.
This means your rs1, rs2, and rd signals will still be 5-bit, but we will only test you on the specified registers. Your RegFile should be able to write to or read from these registers specified in a given RISC-V instruction without affecting any other registers. You are provided with the skeleton of a register file in regfile. The register file circuit has six inputs:. If you were implementing a real register file, you would omit those outputs.This will reduce the number of check-offs we have to perform allowing us to answer more of your questions as well as give you someone to discuss class material with.Dell latitude e5420 body
BOTH partners will need to be present at check-off to receive credit and both partners will be asked to participate during the check-off. Try your best to find someone in your lab section with similar work habits as yourself. You'll notice that at the end of almost every exercise, there is a section labelled "Check-off. Labs in CS61C are graded out of 4 points.
A lab is considered on-time if it is turned in within a week of the lab session in which it is initially assigned to you. For example, the lab assigned to you in this weeks lab is this document, lab 0. Thus, the latest you may get lab 0 checked off for full credit is the beginning of your lab next week. Each week that the lab is late past this point, you lose one point on the lab. Unfortunately, although the lab is open this week, the machines are not yet ready for use.
Instead, you can complete today's lab by ssh-ing into cory. We will discuss more about the machines in Soda during next week's lab.
Once you are logged in, you should do the following on your class account to ensure that your account has been setup correctly:. This semester, we will be requiring that you use gita distributed version control system.
Version control systems are better tools for sharing code than emailing files, using flash drives, or even other file sharing mechanisms like Dropbox. We'll be using GitHub to host private repositories in which you'll store your code. If the previous sentence means nothing to you, don't be alarmed!
We'll walk through the process shortly. But first, you'll need to create a GitHub account if you don't already have one. On the homepage, fill in the requested fields to create an account. Make sure you note the username you choose, as we'll need to use that in the next step. It's highly recommended that you choose a somewhat professional username, since you'll likely want to link to your GitHub account on your resume in the future.
Now, fill in the Google form linked below.
Again, please be extremely careful when entering the requested information - mistyping will likely get your submission rejected, at which point you'll have to talk to a TA to get your account fixed. To fill out the form, you will need to be logged into your berkeley.
If you do not have a berkeley. This form connects your GitHub username to a free private repository that we automatically create for you under the cs61c-spring organization.Cala numero decessi in alto adige, 4 in 24 ore
The backend will take a couple of minutes to process your submission and then will send you an email, but you can continue to work on through this lab while you wait. First, lets configure git so that it knows who you are.
Next, in order to interact with GitHub without repeatedly entering a username and password, we'll need to setup an SSH key.Forget the terminal. Download our native app instead. Skip this guide. SSH keys are a way to identify trusted computers, without involving passwords. The steps below will walk you through generating an SSH key and then adding the public key to your GitHub account.
Tip: We recommend that you regularly review your SSH keys list and revoke any that haven't been used in a while. Since we're working on a clean account, there will be no existing SSH keys.
You may move on to the next step. It will be created when you run the ssh-keygen command in step 2 below. To generate a new SSH key, copy and paste the text below, making sure to substitute in your email address. The default settings are preferred, so when you're prompted to "Enter a file in which to save the key", just press Enter to continue. Tip: We strongly recommend a very good, secure passphrase. For more information, see Working with SSH key passphrases.
Run the following command to copy the key to your clipboard. Alternatively, using your favorite text editor, you can open the public key file and copy the contents of the file manually. Warning : it's important to copy the key exactly without adding newlines or whitespace.
This is your SSH key. Select all and copy to your clipboard. In the top right corner of any page, click. In the user settings sidebar, click SSH keys. Click Add SSH key. When you do this, you will be asked to authenticate this action using your password, which was the passphrase you created earlier.Gmc yukon xl 2021
Open up your Terminal your Terminal your Git Bash the command line and type:. This is a known problem with certain Linux distributions. For a possible resolution, see our help article. Don't worry! This is supposed to happen. Verify that the fingerprint in your terminal matches the one we've provided up above, and then type "yes.GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.
If nothing happens, download GitHub Desktop and try again. If nothing happens, download Xcode and try again.github מדריך - גיטהאב שיעור 1
If nothing happens, download the GitHub extension for Visual Studio and try again. Skip to content. Dismiss Join GitHub today GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together. Sign up. CS61C Spring Labs. C Assembly Makefile Go. Branch: master. Find file.
Sign in Sign up. Go back. Launching Xcode If nothing happens, download Xcode and try again. Latest commit. Latest commit bf1 May 13, You signed in with another tab or window.Qubo app
Reload to refresh your session. You signed out in another tab or window. Organise lab files, add lab01 starter. Jan 24, Feb 4, Merge branch 'master' of github. Mar 4, Lab 4 solutions. Feb 19, Mar 5,
- Ps4 pro on 4k tv
- Diels alder test questions
- Olive oil before bed bodybuilding
- Blood of the gods rh negative
- Video ya baba na mtoto iliyovuja
- Cessna 150 rotax conversion cost
- Pca conference
- Korean snacks wholesale
- Katar sabji ka photo
- Tft freeze comp
- How to get every skin in fortnite xbox
- Measurement and instrumentation lecture notes ppt
- 3 similarities between judaism and christianity and islam
- Qnap reverse proxy ssl
- Prestar trolly
- Ftb sky odyssey server list
- Call of cthulhu 1920 weapons
- Abiti lunghi corti dietrole da e incredibile cerimonia davanti
- Pineapple sails used
- How to turn on water meter illegally
- Rachel allan size chart
- Invalid server response iptv
- Hindi sparsh class 10 summary
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323584886.5/warc/CC-MAIN-20211016135542-20211016165542-00500.warc.gz
|
CC-MAIN-2021-43
| 18,922 | 81 |
http://asteriskfaqs.org/2016/06/08/asterisk-users/asterisk-and-freeradius-aaa.html
|
code
|
Dear asterisk friends,
I like to use asterisk and to do authentication, authorization and accounting (AAA) for it with freeradius. I looked for any documentation on the net, but could not find much useful and detailed information.
I have made a first shot with radiusclient-ng. I configured cdr.conf, cel.conf and radiusclient.conf. Execution of radexample gave a positive result. So at least for authentication, the setup of radiusclient.conf seems to work. However asterisk throws following error upon a phonecall:
[Jun 8 12:17:29] ERROR: cdr_radius.c:228 radius_log: Failed to record Radius CDR record!
The debug of freeradius does not show any activity.
Is it possible to combine asterisk and freeradius for AAA? If yes, is there any documentation available and can you point me to it? Can I debug the error message ERROR in more detail.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891705.93/warc/CC-MAIN-20180123012644-20180123032644-00551.warc.gz
|
CC-MAIN-2018-05
| 841 | 6 |
https://hydroculture.global/aquaponics/growing-fish-and-vegetables-together-aquaponics-systems-aquaponic-farming-setup-beginners-guide/
|
code
|
Aquaponics is a sustainable method of raising both fish and vegetables. It is popular with individuals, entrepreneurs, educators, missions and governments. Furthermore, with this type of indoor farming, you grow substantially more food with less water, land and labor than traditional agriculture.
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, commenting, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Educational or personal use tips the balance in favour of fair use.
-This video has no negative impact on the original works (It would actually be positive for them)
-This video is also for teaching purposes.
-It is not transformative in nature.
We make these videos with the intention of educating others in a motivational/inspirational form. We do not own the clips and music we use in most cases. Our understanding is that it is in correlation to Fair Right Use, however given that it is open to interpretation, if any owners of the content clips would like us to remove the video, we have no problem with that and will do so as fast as possible. Please message us on YouTube or Facebook if you have any concerns.
We also do not wish to use the heart of any piece of work that would perhaps decrease the market value of the original content, if anything we hope to promote the content so that people can reach out and subsequently increase the market value.
Lastly these videos are to educate people in an entertaining fashion.
Visit our Website:
NOTE : This channel doesn’t belong to Discovery network.
Discover Agriculture YouTube Channel : http://www.youtube.com/DiscoverAgriculture
EMAIL : [email protected]
FOLLOW US ON : Instagram : https://www.instagram.com/roshan_shetty_c
Facebook : https://m.facebook.com/RoshanShettyCG/
Instagram : https://www.instagram.com/harshith_bhandary_
Facebook : https://www.facebook.com/harshith.bhandary.7
Growing Fish and Vegetables Together..! AQUAPONICS SYSTEMS | Aquaponics Farming Setup Beginners Guide
Tags : aquaponics,aquaponic,aquaponics system,aquaponics for beginners,aquaponics systems,aquaponics India,aquaponics farm,aquaponics farming,aquaponics farming system,aquaponic farming,aquaponic farming in India,aquaponic fish farming,aquaponic farm,growing fish and plants together,growing fish and vegetables together,growing plants and fish together,growing vegetables and fish together
#Aquaponics #AquaponicsFarming #Agriculture #Farming #DiscoverAgriculture
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499804.60/warc/CC-MAIN-20230130070411-20230130100411-00232.warc.gz
|
CC-MAIN-2023-06
| 2,611 | 19 |
https://www.warriorforum.com/internet-marketing-product-reviews-ratings/55131-anyone-used-easy-click-mate-script.html
|
code
|
I got a lot of great feedback on my question about the RAP script the other day. A mentor recommended Easyclickmate.com.
He is a very famous marketer who shall remain anonymous...however I'd like some other opinions from people who have heard of it.
I appreciate all feedback! Thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588246.79/warc/CC-MAIN-20211028003812-20211028033812-00613.warc.gz
|
CC-MAIN-2021-43
| 284 | 3 |
https://wiki2.epidemium.cc/index.php?title=Challenges_1_and_2_projects&printable=yes
|
code
|
Challenges 1 and 2 projects
[Dec 5th, 2017]
[Jan 5th, 2018]
[Jan 20th, 2018]
Time-series analysis and forecast models on cancer incidence (prédictif) x - - Le CAT (Cancer au Travail) | Wiki ✓ ✓ The Most Ethical Project Prediction of pediatric brain cancer incidence (Verteego) x - - IDEA (Conix) | Wiki ✓ ✓ Epidemium Second Prize Cancer and local prediction | Wiki ✓ ✓ Epidemium Grand Prize Immunology Based Predictive Model for : Lung Cancer Evolutions Associated Treatments' Side Effects x - - Cancer Diet | Wiki ✓ ✓ Epidemium Third Prize Medical environment of cancer and impact on health state of the population (AROUND) | Wiki ✓ ✓ The Most Ethical Project
The Most Impact On The Patients Health
Scientific posters of the Projects
The scientific posters of the Challenges 1 & 2 projects, presented at the Final held on January 20, 2018, are gathered on this page.
Challenge 1: See cancers (June 6th - December 5th, 2017)
Constructing a Data-Visualization of the incidence of cancers by exposing the epidemiological factors associated with their dynamics.
The registered projects:
|IDEA (Intuitive Datavizualisation for Epidemiologic Analysis)|
| Aim: offer to untrained/unskilled users/medical professionals the best data manipulation and visualization.
Associated skills: Graphics, Mathematics, Statistic, HTML, NOSQL, Query Languages, Geographic Information Systems, Machine learning, Data visualization
Challenge 2: Foresee cancers (June 6th - December 5th, 2017)
Developing a predictive tool for the progression of cancer in time and space,depending on the known or supposed factors that determine its evolution.
The Training set will be composed of the data covering the period from 1950 to 2003.The validation set will be composed of the data covering the period from 2003 to 2007. Note that the data from 2007 to 2012 in the process of being obtained and will be Integrated into the validation set.
This challenge is divided into two distinct parts:
- Prediction in the world
- Prediction by country
The registered projects:
|Opencancer||Time-series analysis and forecast models on cancer incidence|
|Aim: deliver a prediction model to confirm the correlations with colon cancer.
Associated skills: Data cleaning, Database Management Systems, Relationnal Database Management Systems, Mathematics, Statistic, Rules of Professional Responsibility and Ethical Obligation.
|Aim: provide a study on time-series analysis and forecast models on cancer incidence (Machine Learning approaches).|
Associated skills: Python, Java, C, C++, R, SQL, NOSQL, Machine learning, Deep learning, Elastic Search, Data preparation, Data cleaning, Data visualization, Mathematics.
|Cancer and local predictions||Baseline 2nd Edition|
| Aim: optimize the understanding and prediction of stand-alone cancers under certain circumstances (geographical e.g.).
Associated skills: Distributed Databases, Deep learning, Machine learning, Data visualization, Mathematics, Statistic, Biology, Oncology, Virology, Geriatrics, Treatment Services, Hierarchical Database Systems, Data cleaning.
| Aim: create an online platform hosting an interactive, robust, ready-to-use dataset. This platform should ideally be linked with a data science / machine learning environment to easily design and test statistical models.|
Associated skills: Data cleaning, Data preparation, Machine learning, Database Management Systems, Mathematics, Statistic, UI Design, Web design, Graphics, Oncology, SQL.
| Le CAT
(Cancer Au Travail)
|Medical environment of cancer and impact on health state of the population|
| Objectif : montrer que les modèles sociaux et économiques favorables au travail après cancer impactent la durée de survie.
Compétences associées : Geographic Information Systems, Relationnal Database Management Systems, Distributed Databases, Data cleaning, Data visualization, Mathematics, Sociology, Statistic, Political science, Labour law.
| Aim: provide insight on the most efficient measures to reduce cancer impact on people in order to identify optimal levers to implement in a public health perspective.|
Associated skills: R, Data cleaning, Data preparation, Machine learning, Statistic, Anthropology, Economy, Communication/Information, Rules of Professional Responsibility and Ethical Obligations.
| Prediction of pediatric brain cancer incidence
||Immunology Based Predictive Model for : Lung Cancer Evolutions & Associated Treatments' Side Effects|
| Aim: predict child brain cancer incidence regarding the evolution of social and economic countries features.
Associated skills: Oncology, Pediatrics, Python, SQL, Machine learning, Data preparation, Mathematics, Biology, Statistic.
| Aim: build a predictive model to anticipate lung cancer evolution and severe side effects occurrence in order to react with more effective solutions for patients.|
Associated skills: Oncology Clinical Research, Molecular Oncology, Immunology, Biostatistics, Data visualization, Data Analysis, Patient experience, Statistic Biology.
| Cancer & Food
| Aim: find through data scietific methods the influence of food to cancer incidence based on consumption, production and cultural behaviors
Associated skills: Data Analysis, Data visualization.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746171.27/warc/CC-MAIN-20181119233342-20181120015342-00215.warc.gz
|
CC-MAIN-2018-47
| 5,240 | 47 |
https://andreabrykocapainting1.wordpress.com/2017/03/14/retrospective-post-part-5-project-1-exercise-1-different-ways-of-applying-paint-impasto/
|
code
|
Retrospective post following tutor feedback.
14 March 2017. In her feedback to Assignment 5 my tutor suggested that I rearrange my blog for Part 5 of the course for easier cross-reference in assessment. Since doing this with the existing blog posts would in my opinion produce more trouble than clarification I decided that I would produce retrospective posts fitting the project exercises in the sequence of appearance in the study guide (Open College of the Arts, 2011, pp. 123-134). I apologize for double-posting images already contained in the posts covering the work for my assignment pieces.
So, here is my exercise work for testing the impasto technique of applying paint. In Part 3 of the course I had already started using my palette knives (Lacher-Bryk, 2016a) (Fig. 1). After an awkward start I had found them increasingly good and easy to use:
Also part of my preparatory work and assignment piece for Assignment 4 was mostly painted using impasto (Lacher-Bryk, 2016b). The finished result unfortunately suffered from a deplorable longer-term change of colour in the black paint I had used then (it turned a very unfortunate indifferent dark grey after I had taken the photo, which swallowed all the beautiful elements visible in Fig. 2 below), but I was quite happy with the structural quality of the rocks produced. I also noticed that my confidence in using palette knives grew quickly:
For the present exercise I first produced an intuitive multi-layered impasto piece, in which I examined the emergent properties of depth and light effects. This 56 x 42 cm acrylic paper would later become the background for one of my Assigment 5 pieces (Lacher-Bryk, 2016c) (Fig. 3).
Next I produced some monochrome structured layers on 42 x 56 cm acrylic paper, first using acrylic medium only on top of a dried white background (Fig. 4), then using acrylic paint directly (Fig. 5). The structures were created using two different kinds of large serrated spatulae. Both the exercises below were later used in my Assignment 5 project “A Shadow on his Soul” (Lacher-Bryk, 2016d):
Some more impasto effects I also tested in preparation for my third Assignment 5 project. In particular, I mixed finely grated willow charcoal into white acrylic paint and applied it with a palette knife. The charcoal dust mixed with the paint to give a wonderful cool grey, while the larger pieces moved with the direction of the palette knife to produce a very attractive pattern (middle row in Fig. 6 below. This type of mix I later used to prepare the background layer for my third assignment piece (Lacher-Bryk, 2016e).
Impasto for me is an incredibly versatile technique, which I will without any doubt come back to regularly with great joy.
Lacher-Bryk, A. (2016a) Part 3, project 1, exercise 1/2: Portrait and Figure – drawing the human figure, linear figure study [blog] [online]. Available at: https://andreabrykocapainting1.wordpress.com/2016/07/18/part-3-project-1-exercise-12-portrait-and-figure-drawing-the-human-figure-linear-figure-study/ [Accessed 14 March 2017]
Lacher-Bryk, A. (2016b) Assignment 4: “Claustrophobia” [blog] [online]. Available at:
https://andreabrykocapainting1.wordpress.com/2016/11/29/assignment-4-claustrophobia/ [Accessed 14 March 2017]
Lacher-Bryk, A. (2016c) Assignment 5, subject 1: “A Shadows Only Painting” (including Part 5 project exercises) [blog] [online]. Available at: https://andreabrykocapainting1.wordpress.com/2017/01/15/assignment-5-subject-1-a-shadows-only-painting-including-part-5-project-exercises/ [Accessed 14 March 2017]
Lacher-Bryk, A. (2016d) Assignment 5, subject 2: “A Shadow on His Soul” (including Part 5 project exercises) [blog] [online]. Available at: https://andreabrykocapainting1.wordpress.com/2017/01/21/assignment-5-subject-2-a-shadow-on-his-soul-including-part-5-project-exercises/ [Accessed 14 March 2017]
Lacher-Bryk, A. (2016e) Assignment 5, subject 3: Hans Christian Andersen “The Shadow”. An attempt at an illustration (including part 5 project exercises) [blog] [online]. Available at:
https://andreabrykocapainting1.wordpress.com/2017/02/02/assignment-5-subject-3-hans-christian-andersen-the-shadow-an-attempt-at-an-illustration-including-part-5-project-exercises/ [Accessed 14 March 2017]
Open College of the Arts (2011) Painting 1. The Practice of Painting. The Bridgeman Art Library, London, New York, Paris, pp. 123-134.
One thought on “[Retrospective post] Part 5, project 1, exercise 1: different ways of applying paint – Impasto”
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949689.58/warc/CC-MAIN-20230331210803-20230401000803-00564.warc.gz
|
CC-MAIN-2023-14
| 4,530 | 17 |
https://forum.aspose.com/t/range-export-to-image/73039
|
code
|
I am in the process of evaluating Cells and Words and I have a need to export a range to an image for later import into Word. I am working with .net and C#, VS2013.
I need the image to be sized in a specific way. For example, 6"x6" at 300dpi
I have tried the following code :
sheet.PageSetup.PrintArea = "A1:CH41";ImageOrPrintOptions options = new ImageOrPrintOptions();
options.OnePagePerSheet = true;
options.VerticalResolution = 300;
options.HorizontalResolution = 300;
options.ImageFormat = System.Drawing.Imaging.ImageFormat.Png;ImageFormat.Png;
This certainly gives me an image but it is 14" by 30" image so I have to resize.
What I can't find is a property to set an explicit size for width and height so that I can set width as, for example, "width = 6.0 * dpi".
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572043.2/warc/CC-MAIN-20220814143522-20220814173522-00774.warc.gz
|
CC-MAIN-2022-33
| 770 | 10 |
http://katie.casey.com/2010/09/fun-with-neurotheology.html
|
code
|
Just now I was doing my Neurotheology reading, which explained that "strong religious belief" was considered a mental disorder until 1994 by the American Psychiatric Association.
I promptly ran to Google and discovered that homosexuality was only considered a mental disorder until 1973.
While I realize that any proposed divide between "gay people" and "religious people" is a super-false dichotomy, I still happily announced to my assembled friends that the gays won this one, and hurried to write this blog post.
Procrastination, how I love you. Back to reading!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816875.61/warc/CC-MAIN-20240414064633-20240414094633-00492.warc.gz
|
CC-MAIN-2024-18
| 565 | 4 |
https://s-space.snu.ac.kr/handle/10371/62298
|
code
|
S-Space College of Engineering/Engineering Practice School (공과대학/대학원) Dept. of Computer Science and Engineering (컴퓨터공학부) Others_컴퓨터공학부
Java Client Ahead-of-Time Compiler for Embedded Systems
- Hong, Sunghyun; Kim, Jin-Chul; Shin, Jin Woo; Moon, Soo-Mook; Oh, Hyeong-Seok; Lee, Jaemok; Choi, Hyung-Kyu
- Issue Date
- LCTES'07 : 2007 ACM SIGPLAN-SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems, San Diego, CA , ETATS-UNIS, 2007.
- J2ME CDC; Java ahead-of-time compiler; Java virtual machine; early binding; just-in-time compiler; relocation
- Language, Compiler and Tool Support for Embedded Systems
Proceedings of the 2007 ACM SIGPLAN/SIGBED conference on Languages, compilers, and tools for embedded systems
San Diego, California, USA
- The performance of embedded Java virtual machine can be improved by ahead-of-time compiler (AOTC), which translates bytecode into machine code in the server and installs the machine code on the client device. Although AOTC is more advantageous than just-in-time compiler (JITC) due to its absence of the translation overhead, AOTC cannot be applicable to dynamically downloaded classes at runtime. This paper proposes client-AOTC (c-AOTC) which performs AOTC on the client device using the JITC module installed on the device, complementing the server-AOTC. The machine code of a method translated by JITC is cached on a persistent memory of the device, and when the method is invoked again in a later run of the program, the machine code is loaded and executed directly without the translation and interpretation overhead. One of major issues in c-AOTC is relocation because some of the addresses used by the cached machine code are not correct when the machine code is loaded and used in a different run; those addresses should be corrected before they are used. Constant pool resolution and inlining complicate the relocation problem and we propose our solutions. We developed a c-AOTC on Sun's CDC VM reference implementation (RI) and our evaluation results indicate that c-AOTC can improve the performance significantly, as much as an average of 12%. We also experiment with the issue of reducing the number of c-AOTC methods to be cached when the persistent space is tight, with a graceful degradation of performance.
- Files in This Item: There are no files associated with this item.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150264.90/warc/CC-MAIN-20210724094631-20210724124631-00591.warc.gz
|
CC-MAIN-2021-31
| 2,392 | 11 |
https://resource.dopus.com/t/percent-full-display-not-working/13380
|
code
|
I have just upgraded to version 10.0.5.4497 and the percent full display is not showing, I read the forum and found someone that changed the display to Used Space, if I do that and save the lister, when restarting Opus it reverts to the original percent full, and it is still blank. I am using Windows 7 Pro (32Bit)
I'm not exactly sure what you mean - could you post a screenshot to illustrate the issue?
That should be fixed if you grab the latest beta version:
HOW can I sent a screen shot of nothing. the percent full column is empty, also if I change it to Used Space, save the lister
restart opus, and the column is still empty, with no information
The same way you'd make a screenshot of anything else. Jon wasn't sure what you were looking at -- you could be talking about My Computer, or the status bar; both show free-space graphs -- so a screenshot showing the My Computer folder with the graph missing would have helped him understand what you were seeing.
But a screenshot isn't needed as I know the problem that you're seeing and it is fixed in the latest beta version, which I linked to. (I know because I fixed it. Jon didn't work on that particular issue so it wasn't obvious to him what you were talking about.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948234904.99/warc/CC-MAIN-20240305092259-20240305122259-00356.warc.gz
|
CC-MAIN-2024-10
| 1,229 | 7 |
https://ashbgame.com/super-mario-maker-2-15-things-you-need-to-know-before-you-buy-2/
|
code
|
Super Mario Maker 2 – 15 Things You Need To Know Before You Buy SUBSCRIBE: https://youtu.be/WfsAkSb923k : Our hearts jump with joy every time we hear the cheery old “it’s-a me, Mario!” with new mainline Mario titles, but there’s something even more special about Super Mario Maker. It is a Mario game in and of itself, but it also gives you the tools to create your own Mario levels- not a new concept by any means, but one that’s executed excellently.
Super Mario Maker 2 is looking to expand on that concept even further and deliver an even better experience, and we truly hope it succeeds. In the lead up to its launch, excited as we are about the game, in this feature we’ll talk about fifteen most vital pieces of information about it that you should know. Without further ado, let’s get started.
SUBSCRIBE FOR MORE VIDEOS:
LIKE US ON FACEBOOK:
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400201601.26/warc/CC-MAIN-20200921081428-20200921111428-00371.warc.gz
|
CC-MAIN-2020-40
| 865 | 4 |
http://syhomeworkwbio.laluzsiuna.info/encrypt-the-plaintext-below-using-the.html
|
code
|
To encrypt a plaintext using aes with openssl, the enc command is used the following command will prompt you for a password, encrypt a file called plaintexttxt and base64 encode the output the following command will prompt you for a password, encrypt a file called plaintexttxt and base64 encode the output. Before running any steps that involves access to plaintext keys or the key store (identified in the accesses plaintext keys/key store column in the below table), make sure that the powershell environment runs on a secure machine that is different from a computer hosting your database. Spect any algebraic structure of the plaintext and ciphertext spaces, ie no computations can be performed on the ciphertext in a way that would pass through the encryption to the un- derlying plaintext without using the secret key, and such a property would in many contexts. If the plaintext size is small comparatively to the size of p(as we can see in many practical scenarios), the relative size overhead becomes worse for example, assuming pis a 2048-bit prime, in a hybrid encryption scenario where a sym. Below is ciphertext produced by a shift cipher with undisclosed encryption key decrypt it using frequency analysis (note that the line breaks do not necessarily occur between.
To understand why, please encrypt the same plaintext using (1) two different ivs, and (2) the same iv please describe your observation, based on which, explain why iv needs to be unique. A encryption - encrypt the encryption of a plaintext p makes use of two parameters: δ, which affects the number of decoy texts that can be extracted, and ǫ, which affects the length and security of the private key. Ciphertext: when the plaintext written by anyone is encrypted using some keys then the result is known as ciphertext the main and primary purpose of encryption is to protect the data confidentiality of digital data stored on a computer system or transmitted through the internet or other networks. Setting it up the code below sets up the program in this example we are going to take a simple message (the quick brown fox jumps over the lazy dog), and then encrypt it using a predefined key and iv.
For a block cipher with a n-bit key, if, given a plaintext block and the corresponding ciphertext, the key can be guessed in less than 2 n-1 step on average, then that block cipher will be said to be broken and cryptographers will make a point of not using it. View notes - homework_1 from itec 443 at eastern mediterranean university message (plaintext): come to my office ciphertext : 5 encrypt the message below using ceasar cipher (rot-14. Now that we have our key, we will create the encryption function we will pass our data to be encoded, and our key, into the function in addition to our key, there is a secondary random string we will create and use called an initialization vector (iv) that helps to help strengthen the encryption. Use: alice's private key (an encrypted message can be read only by using the recipient's private key) bob wants to send a copy to himself of the encrypted message that he sent to alice use: bob's: public key to encrypt. An encryption algorithm (a precise specification of the steps to be taken when encrypting plaintext and when decrypting the resulting ciphertext) is known as an asymmetric algorithm if the encryption and decryption keys that it uses are different otherwise it is a symmetric algorithm.
For example aws kms encrypt api takes plaintext, a customer master key (cmk) identifier, and an encryption context ( encryption context is a set of non-secret key-value pairs that you can pass to. The correctness property of evaladd is that if c1 is an encryption of plaintext element m1 and c2 is an encryption of plaintext element m2, then c3 should be an encryption of m1+m2 • evaladdconst(params, ek, c1, m2) → c3. Assuming you've observed at least one character, if the encryption is a caeser cipher then yes: it would be sufficient to recover the key this is because you can take the difference between the first character of the plaintext and ciphertext to find the key. - chosen plaintext-ciphertext attack 2 e g frequency analysis the message below was enciphered using a shift cipher letter frequencies, determine the likeliest values of the shift and use a process of eradication to obtain the plaintext.
I have a symmetric key which can be used to encrypt plaintext and decrypt the resulting ciphertext i use it to encrypt a plaintext which is a copy of the aforementioned key my adversary gets a copy of the resulting ciphertext. Encrypt text or binary content (plaintext) by using a cloud kms key decrypt ciphertext that was encrypted with a cloud kms key before you encrypt or decrypt data, you must create a key ring and a key as described in creating key rings and keys for security reasons, the raw cryptographic key. In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms.
These elements is displayed below where 𝑇𝑃 is plaintext, 𝑀 is a method of encryption, 𝐾 is the key, 𝑇 is the cipthertext and 𝑀 is a method of decryption the encryption and decryption. One way to send this is to include it in the encrypted file, at the start, in plaintext form we demonstrate this technique below (under file encryption with aes ) for now, we assume that the iv is available. Below is my code and this is the data i feed to the methodsbut before you loko at the code this is what i encrypt [email protected]@se this is what returns encrypted. The encrypted and hard-to-read message is called ciphertext or an encrypted message using the inverse key to turn the ciphertext back into plaintext is referred to as decrypting or deciphering if you are able to decrypt the message without being told the inverse key, we call that cracking the code.
In this article, we will write a c# program to encrypt and decrypt data using a symmetric key what is symmetric key symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. Internally at encryption time, there is a des_encrypt of the data with k1, then a des_decrypt of the output from the previous encrypt, using k2, and another des_encrypt of the output from the previous step, using k3. C# program to encrypt/decrypt using rijndael key posted on october 12, 2013 by manish this c# program encrypts/decrypts using rijndael keyhere the namespace that is used is systemsecuritycryptography and the methods and properties of the rijndael method is used.
Learning in public encrypt and decrypt a password using powershell two quick powershell code snippets the first demonstrates how to take a plaintext password, encrypt it, and save it to a file. Combined one byte at a time with the plaintext stream using the xor operation, a key stream is the output of the pseudorandom bit generator pseudorandom stream one that is unpredictable without knowledge of the input key and which has an apparently random character.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742793.19/warc/CC-MAIN-20181115161834-20181115183834-00358.warc.gz
|
CC-MAIN-2018-47
| 7,220 | 8 |
https://help.ecomposer.io/docs/faqs/what-should-you-do-when-see-the-template-content-exceeds-256kb-limit-message/
|
code
|
What should you do when seeing the “Template content exceeds 256KB limit” notice?
When saving or publishing your page, you may see a message “Template content exceeds 256KB limit” like the below image.
While EComposer is super flexible, we still need to abide by Shopify’s rules regarding themes and templates. One of those requirements is that template files in themes are less than 256KB in size. When building a page you might exceed that limit in a few ways. But in general, it is probably because there are too many elements on the page or you are using big chunks of code in custom code blocks.
One of the reasons is that your content contains too much HTML code. For example, when you copy content from somewhere else and paste it into our app, you accidentally copy the HTML code of that content. The way to solve this problem is when pasting content, please use the key combination ⌘ + shift + v to paste text only instead of using ⌘ + v
If you can not solve it yourself, don’t hesitate to get in touch with us via live chat, we will help you check and solve the problem.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030336880.89/warc/CC-MAIN-20221001163826-20221001193826-00427.warc.gz
|
CC-MAIN-2022-40
| 1,096 | 5 |
https://blairanderson.github.io/open-source-job-board/
|
code
|
Open Source Job Board
This is the
readme.md for a Ruby on Rails application that allows users to create accounts and post job listings.
Because when i was learning to program, I wanted to play with code that had a familiar model and get some instant gratification.
The problem with learning to code is the learning-curve. Shit is real and painful and i found that the best cure for the pain was cloning an app with features and tweaking until it broke and learning along the way.
I think this is why wordpress is SO popular. Its stupid-easy to fire-up, and changes come with one-click package installs and tiny code changes.
- A visitor can view the list of job posts
- A visitor can view the job form, but is forced to signup before filling it out.
- A visitor can register for an account
- A user can login and logout
- A user can submit a new job post
- Admin dashboard at
/admin, config in
rails_admin.rb- admin is
- Posts can be
draft, published, archived
learn more about
Change the Code!!!
My main goal for this is to give new programmers some code to look at and talk about. Anytime i get questions, I plan to add them here…
If you’re new to rails, follow this and come back http://installfest.railsbridge.org/installfest/
Open your terminal
$ git clone [email protected]:blairanderson/open-source-job-board.git jobbr $ cd jobbr
Lets look at some code
SO you type something into google and hit enter, then click to the first result….
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663006341.98/warc/CC-MAIN-20220527205437-20220527235437-00022.warc.gz
|
CC-MAIN-2022-21
| 1,460 | 24 |
https://rossum.ai/video-customize-schema/
|
code
|
Hi, and welcome to Rossum! In this video, you are going to learn how to customize your Rossum schema.
Here you can see how Rossum works. First, import your invoices, our AI will process them, after which you can validate and export the data into your preferred system.
Customizing schema is a part of the User Interface part and enables you to customize your Rossum account and data extraction specifically to your needs. Let’s see how you can do that.
Click on the Settings icon in the top left corner of your Rossum account. Now click on one of the queues and a Fields to capture tab. The only step left now is to check/uncheck desired fields. Hit save, and you’re ready to validate.
This is the basic way to customize, for the more technical types, there is a Schema editor in JSON which offers you many more possibilities. You can find out more about this in our documentation, which is linked in the description. Make sure to check it out!
This is how you customize your Rossum schema. Go ahead and try how fast this is for yourself – set up a trial account by following the link in the description. In our next video, we will show you the import options you have in Rossum. Don’t miss out on that and subscribe to our YouTube channel! We wish you a template-free day!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506028.36/warc/CC-MAIN-20230921141907-20230921171907-00724.warc.gz
|
CC-MAIN-2023-40
| 1,281 | 6 |
https://www.mammalwatching.com/2011/10/27/rfi-florida-in-late-november/
|
code
|
RFI: Florida in Late November
I am currently in the process of planning a birding trip near the end of November, to coincide with the marine mammal meeting being held in Tampa. During the meeting I plan on hitting up the Tampa power plant for Manatee, which should be an easy lifer, but have had mixed results getting much other mammal info for Florida (although Mark Hows report was useful).
I will have about a week before the meeting where I will be birding with a little bit of herping Miami, Everglades, and possibly the Keys. Besides the Manatee, any info on the following would be great:
Mountain Lion (I know…long shot)
Any rodents or bats info
Thanks in advance for any assistance
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100531.77/warc/CC-MAIN-20231204151108-20231204181108-00734.warc.gz
|
CC-MAIN-2023-50
| 691 | 6 |
http://wptest.ingenuity.com/products/ipa/ipa-summer-release-2014
|
code
|
What’s New in the IPA Summer Release (June 2014)
With the IPA Summer Release you can explore how endpoints of Canonical Pathways may be increased or decreased based on activation or inhibition of molecules within that pathway.
Canonical Pathways in IPA have historically displayed disease and functional endpoints as “text boxes”; now, these endpoints can be used to interactively visualize the directional impact the pathway exerts upon them.
In this release of IPA, diseases and functions on Canonical Pathways are interactive and can be used by the Molecule Activity Predictor (MAP) to simulate the effect on disease or function.
Interactive Disease & Function nodes on Canonical Pathways. In this zoomed-in portion of the “Role of NANOG in Mammalian Stem Cell Pluripotency” Canonical Pathway, there are interactive nodes for “Endoderm specification”, “Mesoderm differentiation”, “Ectoderm Differentiation”, “Trophoectoderm differentiation”, “Pluripotency” and “Regulation of telomere length”. Based on the differential expression of molecules in a differentiating cardiomyocyte dataset that was overlaid on the pathway, the first three functions (colored orange) are predicted to be increased, while the latter two (colored blue) are predicted to be decreased.
Discover & explore diseases or functions that are relevant to molecules on a pathway or network
Quickly discover diseases or functions that are biologically (and statistically) relevant to a set of molecules on a network or pathway. Automatically connect diseases or functions of interest to the relevant molecules and use MAP (Molecule Activity Predictor) to simulate how activated or inhibited molecules are likely to affect the disease based on findings in the Ingenuity Knowledge Base.
Grow to Diseases & Functions feature. Selecting the Grow menu (in BUILD tools) and clicking on the Diseases & Functions tab displays a table which shows the relevant diseases or function that can be added to the pathway, ranked by statistical significance (by Fisher’s Exact Test) with respect to the set of molecules in the network in the right panel. When one or more is selected and the apply button is pressed, they will automatically be added and connected to the network (continued, see below).
Grow to Diseases & Functions feature (continued). You may filter the list of significant diseases or functions to focus on those of interest. In the example shown, two keywords were used to filter the list resulting in two matching functions that were added to the pathway at the right. Note that you can use the wildcard (asterisk) to create a more permissive filter. In this example, MAP automatically predicts the added functions are increased based on the activity of the molecules to which they are connected (orange color corresponds to a prediction of increase).
Configure Comparison Analysis heat maps to focus on rows of interest.
Quickly focus on diseases, functions, or Canonical Pathways of interest when viewing a comparison analysis heat map. Now you can narrow the list of diseases, functions, or pathways that are shown in the heat maps in IPA Comparison Analysis. In the Disease and Functions tab, you can now filter on major categories or on specific individual diseases and functions as shown in the figure below.
Focus on particular diseases & functions in Comparison Analysis. In this example, the heat map is being filtered (by clicking the FILTER button at the top left) to display only functions in the category “Cardiovascular System Development and Function”. In addition it is filtered to display only those rows where at least one column has an absolute z-score of 2 or greater.
Likewise, you can filter Canonical Pathways in their corresponding heat map.
Focus on particular Canonical Pathways in Comparison Analysis. In this example, the heat map is being filtered (by clicking the FILTER button at the top left) to display only Metabolic Pathways as well as the pathways specifically associated with Cardiovascular Signaling. You can display the filters in a tree view (as shown) or sorted alphabetically by name (click the List View radio button). The heat map is also being filtered to display only those rows where at least one column has a -log(p-value) of 3 or greater, which is equivalent to a p-value of <= 0.001.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612013.52/warc/CC-MAIN-20170529034049-20170529054049-00220.warc.gz
|
CC-MAIN-2017-22
| 4,347 | 14 |
https://github.com/cakephp/cakephp/commit/6d60e6a
|
code
|
Please sign in to comment.
Backport 7eec482 to 2.x
Backport fixes to base path generation that prevent issue when a URL contains // it can circumvent the base path generation, which results in unwanted user data in the base/webroot paths. This creates an opportunity for CSS manipulation in old versions of IE, and newer ones via iframe inheritance.
- Loading branch information...
Showing with 20 additions and 0 deletions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532050.7/warc/CC-MAIN-20190421180010-20190421202010-00375.warc.gz
|
CC-MAIN-2019-18
| 424 | 5 |
https://forums.creativecow.net/docs/forums/post.php?forumid=170&postid=862701&univpostid=862701&pview=t
|
code
|
All I want to do is add a solid color border to my mask. In after effects... simple. In Avid simple. However, I'm going to be at a facility that only has the FCS applications. I would rather do this in FCP but all I get is buy so and so plugin. If I was at my own studio I would do this. But I'm afraid I won't be allowed to bring any plugins to a corporate facility.
Back to my point, I thought I'd be able to do it in motion and I'm sure it can be done, but how. The logical ways aren't working for me. I tried adding a simple drop shadow and tweak the parameters, but I can't achieve the effect.
It was suggested add an outer glow and play with the settings until a solid border was had. I keep getting close but no cigar. There must be a simple way and I'm not getting it. How is it that all these work-arounds for something that should be standard. Please tell me I'm missing something obvious.
I was originally trying to do this to a crop in FCP and it has led me to this...and a three hour morning to accomplish.
Macbook Pro 17
4 gigs ram
GeForce 8600 GT 512 mb
HD One 8 drive Raid 5
One method: Draw a shape, use it as the source for an Image Mask of your element, dupe the shape, turn off Fill and turn on Outline for the dupe, and Bob's your uncle. If you make any changes to the original shape (the source of the mask) you'll need to do the same for the the dupe, but this method will give you total control of the look of your border.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741176.4/warc/CC-MAIN-20181113000225-20181113022225-00189.warc.gz
|
CC-MAIN-2018-47
| 1,446 | 9 |
https://www.g-portal.us/forum/thread/3108-email-server-admin-on-file-when-server-is-down/?postID=13017
|
code
|
It would be a nice feature if an automated message was sent to the email on file for the server admin when the server goes down.
I currently run a PS4 server. I was out of town the other day when a patch came through. My server was down for most of the day.
Luckily one of the players sent me a message through PSN and I restarted the server from my phone.
Slightly off topic, a mobile app for GPortal would be awesome
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347389355.2/warc/CC-MAIN-20200525192537-20200525222537-00538.warc.gz
|
CC-MAIN-2020-24
| 418 | 4 |
https://www.dailytechng.com/how-to/fixed-we-apologize-for-the-inconvenience/
|
code
|
FIXED: We apologize for the inconvenience, Error when visiting some pages in Adsense.
Have you tried to open a page on AdSense and met with this ugly error response?
We apologize for the inconvenience, but we are unable to process your request at this time. Our engineers have been notified of this problem and will work to resolve it.
This can be very disturbing as you may not be able to complete the task at hand.
Fortunately I found the reason I am faced with this error and its really simple.
Over the past few weeks I have been trying to visit my Blocking Control page on AdSense, but all I see is the error above.
After a long search for solution I realized something. Opening the page on another browser didn’t give me this error, but my favorite browser shows this error. So I began to compare. Suddenly it hit me. I recently installed an AD Blocker on my browser in order to prevent me from viewing the ads on my site. But little did I know that the ad blocker also blocked some important features of AdSense.
While turning off AD Blocker may not be the solution to all instances of this issue yet this kind of error is usually associated with browser compatibility or extensions which may prevent the page from loading properly.
I hope this helps.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879362.3/warc/CC-MAIN-20201022082653-20201022112653-00372.warc.gz
|
CC-MAIN-2020-45
| 1,260 | 9 |
http://cs-nawigator.ru/skachat-gauss-gun-calculator/
|
code
|
|Оценка пользователей:||(4,9 из 5)|
|Проверен Dr.Web:||Вирусов нет|
Подробный ликбез на « Gauss Gun Calculator»
- Скачать Gaussian DM Calculator v1.
- Оставить отзыв о Gaussian DM Calculator v1.
- Технические подробности Gaussian DM Calculator v1.
- Самая популярная в мире программа для сжатия файлов, уже более 20 лет являющаяся лидером в этой области.
Avira Internet Security Suite 15. По последним тестам браузер Opera самая быстрая программа для просмотра страниц в интернете. Vault-Tec Central Mainframe has been restarted. 4 has been released on June 15, 2017.
This is a maintenance release fixing a few regressions and other issues. 3 has been released on February 21, 2017. This is a maintenance release fixing a few regressions and other issues. 2 has been released on January 18, 2017.
1 has been released on December 06, 2016. This is a maintenance release with few bug fixes and performance regressions since the first release of the 3. After more than three years of efforts, Eigen 3.
3 has been released on November 10, 2016. 3 version leverage numerous major novel features and improvements that are summarized in the dedicated 3. The latest stable release is Eigen 3.
Looking for the outdated Eigen2 version? It supports all matrix sizes, from small fixed-size matrices to arbitrarily large dense matrices, and even sparse matrices. It supports all standard numeric types, including std::complex, integers, and is easily extensible to custom numeric types.
It supports various matrix decompositions and geometry features. Its ecosystem of unsupported modules provides many specialized features such as non-linear optimization, matrix functions, a polynomial solver, FFT, and much more. Expression templates allow to intelligently remove temporaries and enable lazy evaluation, when that is appropriate.
Fixed-size matrices are fully optimized: dynamic memory allocation is avoided, and the loops are unrolled when that makes sense. For large matrices, special attention is paid to cache-friendliness. Algorithms are carefully selected for reliability. Reliability trade-offs are clearly documented and extremely safe decompositions are available.
BLAS test suite, and parts of the LAPACK test suite. Implementing an algorithm on top of Eigen feels like just copying pseudocode. Eigen has good compiler support as we run our test suite against many compilers to guarantee reliability and work around any compiler bugs. 98 and maintains very reasonable compilation times. Eigen 3 documentation: this includes a getting started guide, a long tutorial, a quick reference, and page about porting from Eigen 2 to Eigen 3.
We use the CMake build system, but only to build the documentation and unit-tests, and to automate installation. If you just want to use Eigen, you can use the header files right away. There is no binary library to link to, and no configured header file. Eigen is a pure template library defined in the headers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945669.54/warc/CC-MAIN-20180423011954-20180423031954-00152.warc.gz
|
CC-MAIN-2018-17
| 3,203 | 16 |
http://stackoverflow.com/questions/18607551/how-consume-iis-hosted-wcf-on-a-remote-android-device
|
code
|
I have a HTTP wcf hosted on IIS. I checked the service on local machine using android emulator. The emulator and wcf on local machine is working fine.
In webbrowser I can access service by using this URL:
and in android emulator I am using
http://10.0.2.2:4806/Service1.svc to successfully connect android with wcf.
Now I wanted to use android device to access the wcf on PC. How can I do that? Do I need to make any changing in web.config file? it is web.config file code
<service name="JSONService.Service1" behaviorConfiguration="JSONService.Service1Behavior"> <!-- Service Endpoints --> <!--Change the binding to webHttpBinding and set behaviour configuratiion to web--> <endpoint address="" binding="webHttpBinding" contract="JSONService.IService1" behaviorConfiguration="web" > <!-- Upon deployment, the following identity element should be removed or replaced to reflect the identity under which the deployed service runs. If removed, WCF will infer an appropriate identity automatically. --> <identity> <dns value="localhost"/> </identity> </endpoint> <endpoint address="mex" binding="mexHttpBinding" contract="IMetadataExchange"/> </service> </services> <behaviors> <serviceBehaviors> <behavior name="JSONService.Service1Behavior"> <!-- To avoid disclosing metadata information, set the value below to false and remove the metadata endpoint above before deployment --> <serviceMetadata httpGetEnabled="true"/> <!-- To receive exception details in faults for debugging purposes, set the value below to true. Set to false before deployment to avoid disclosing exception information --> <serviceDebug includeExceptionDetailInFaults="false"/> </behavior> </serviceBehaviors> <!--Newly added configuration--> <endpointBehaviors> <behavior name="web"> <webHttp/> </behavior> </endpointBehaviors> <!--End of newly added Configuration--> </behaviors>
Thanks for help.
I tried by using IP of PC like this
http://192.168.1.67:4806/Service1.svc and also open a port in windowsfirewall 4806. I wanted to login from android device and get authentication from wcf running on PC. Now when I press login button the application get stop and give error foreclose. Any help is this regard would be great. Thanks
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644068184.11/warc/CC-MAIN-20150827025428-00105-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 2,201 | 9 |
http://www.javaprogrammingforums.com/%20java-servlet/12946-how-run-voice-servelet-running-player-background-printingthethread.html
|
code
|
how to run voice in servelet running the player in the background
I have developed a code in which the servlet calls a particular wave file. The problem with it is, the player is shown in the browser window while the wave file is playing. I want the wave file to b playing in the background and dont want the player to show. plz help
Re: how to run voice in servelet running the player in the background
1. Welcome to Java Programming Forums.
2. Play the wave file but don't draw the GUI for player.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461863352151.52/warc/CC-MAIN-20160428170912-00023-ip-10-239-7-51.ec2.internal.warc.gz
|
CC-MAIN-2016-18
| 499 | 5 |
https://slastudios.net/portfolio.php
|
code
|
The Lost Aether's final build start cinematic. Game created by Sla Studios team, look in Downloads to try out our game! I've done programming, story and design for this game
The Lost Aether's alpha menu design. Logo was still in progress.
The Lost Aether first alpha testing of the engine. Custom engine using Love2D framework, written by Sla Master.
Testing Love2D and VREP with QR Code library integration. Later on it was used in a robotic application example.
Airfield from Red Alert recreated in 3D by Sla Master using GMAX (A free 3Ds Max software for games)
Airfield from Red Alert imported in LevelEdit for C&C Renegade game.
Concept of Airfield from Red Alert in GMAX.
Testing direct geometric model for a JEL robot using Love2D framework
ControlJEL is an application that is used to control compatible JEL industrial robots. Made by Sla Master for IMST Faculty from Polytehnic University of Bucharest. This is the final User Interface design. It also includes a own programming language for the robot.
Sla's Games Gallery is a game of games made by Sla Master and is currently in progress. This is the final user interface design using modern style
JEL Robot simulated in VREP and controlled using ControlJEL in offline mode, using Lua programming language
ControlJEL's first interface design and testing on the robot.
ControlJEL communication testing using serial protocol RS232C
A Jewel 3-match game variation in Sla's Games Gallery
Sla's Games Gallery game selection mode based on windows' tiles style
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644309.7/warc/CC-MAIN-20230528150639-20230528180639-00119.warc.gz
|
CC-MAIN-2023-23
| 1,514 | 15 |
https://steemit.com/utopian-io/@jestemkioskiem/english-polish-translations-for-the-node-js-project-2
|
code
|
English -> Polish; translations for the Node.js Project (#2)
Because of that, I've chosen to bring the barrier of entry quite a bit down for polish programmers that wish to learn all about node.js and contributing to it and will be attempting a full translation of all of their documents uploaded to Crowdin, learning more about Node.js myself in the process.
The translated text -
pull_requests.md aims to teach the user all the steps - from setting up his own fork and local environment of the project, all the way to having their PR accepted - about setting up a Pull Request to the node.js repository.
This is of crucial importance to the project's development as consistent culture of commits and pull requests makes reviewing and implementing them much faster.
While working on the translation, I've set up a small dictionary of words that should consistently be translated to the same thing (you can read about why it's important here) and shared it with other Polish translators of Davinci for them to follow and discuss about. This is the preview of the current words in the dictionary which will continue to evolve:
The texts were translated from English to Polish.
I am a native speaker of the Polish language and have a level of C2 in English, as well as a good understanding of the technical language present throughout the texts thanks to working in the international field for a while.
According to Crowdin's analytic tools, I've translated 1020 words from English to Polish. There were no obvious repetitions in the texts I've translated and the git commands (even though partially translated) were excluded from that number.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141194171.48/warc/CC-MAIN-20201127191451-20201127221451-00025.warc.gz
|
CC-MAIN-2020-50
| 1,641 | 9 |
http://mathforum.org/kb/plaintext.jspa?messageID=767383
|
code
|
Date: Sep 26, 1996 10:13 PM
Author: Julian Bushell
Subject: Length of cubic polynomial (spline) ?
I have a computer problem.
I need to know the length of a cubic polynomial.
I'm actually using Catmull-Rom splines to describe the path of an object
with a known velocity.
I need to be able to travel along this spline a given distance for each
/ P(i-1) \
C(t) = [tó tò t 1] B | P(i) |
| P(i+1) |
\ P(i+2) /
where P is the interpolated points and B is the matrix
/ -0.5 1.5 -1.5 0.5 \
B = | 1.0 -2.5 2.0 -0.5 |
| -0.5 0.0 0.5 0.0 |
\ 0.0 1.0 0.0 0.0 /
C(t) = (-0.5*tó + 1.0*tò - 0.5*t) * P(i-1) +
( 1.50*tó - 2.5tò + 1.0) * P(i) +
(-1.5*tó + 2.0*tò + 0.5*t) * P(i+1) +
(0.5*tó - 0.5*tò)* P(i+2)
Since P are constant numbers. Polynomials in x and in y can be formed.
I need to know the length of the curve for any t value (especially the
entire length i.e. from t=0 to t=1).
Please note that this is required for real-time computer processing so
speed is essential.
Any help will be much appreciated, thank you.
From Julian Bushell
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865411.56/warc/CC-MAIN-20180523024534-20180523044534-00152.warc.gz
|
CC-MAIN-2018-22
| 1,077 | 28 |
http://www.gdandt.com/training-products/text-materials
|
code
|
After taking several GD&T training courses with AGI and having first hand experience with all of the instructors over the years, I knew exactly who I wanted to turn to to help me prepare for taking the GDTP senior level certification test. The practice test given during the course was a great representation of what to expect during the actual examination. I'm not sure how I would have done on the ASME exam without this course but I am absolutely certain I would not have done nearly as well I did if I had not taken the course. I didn't just pass the senior level ASME exam, but I passed at a high percentage. If you are considering taking the ASME exam, I would highly recommend this course.
- Travis Bennett
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927634.1/warc/CC-MAIN-20150521113207-00315-ip-10-180-206-219.ec2.internal.warc.gz
|
CC-MAIN-2015-22
| 713 | 2 |
https://www.reddit.com/r/splatoon/comments/4sde13/thumbnail_for_my_youtube_video_in_showing_some/
|
code
|
I want to make a YouTube webcam video where I show some stuff I own that's related to the game, including the new Squid Sisters amiibos, a Wii U GamePad protector, and a couple of t-shirts.
There's a problem I'm running into when I publish the video: it's using a custom thumbnail. Now, I am way too new to using custom thumbnails to engage the most audience, which is why I'm asking you to see which choice would work best.
My first option is to simply recreate a thumbnail that's similar to this Instagram photo (https://www.instagram.com/p/BFnVYrJK890) as I'm a full-time student at the University of Waterloo. Problem is, it doesn't have one of the characters from the game on it, not even the iconic Inklings you would see on the amiibo packaging or game packaging.
Second option: Have the Orange Inkling Girl in a standing pose (which is the same as on the amiibo packaging), have the title logo on the right side of it, and underneath just have the phrase "MERCHANDISE + MORE" underneath it in the game's font face, all on top of a light blue background.
Third: Have the game's title logo, my engineering hardhat, my GamePad with a protector on it, and a simple color scheme such as a red background.
I can think of more options, but I don't want to investigate those quite yet. However, in my honest opinion, I feel like the second option would work out.
The thumbnail has to be 16:9, have a resolution large enough so that it's detailed in different screen and player resolutions, and very simple yet attractive and colourful. And it has to be completely relevant to the topic and follow the theme, which is definitely on Splatoon.
One user from posting this on SquidBoards recommends the second option as well: http://squidboards.com/threads/thumbnail-for-my-youtube-video-in-showing-off-some-game-merchandise.26366
Please let me know what you think!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741628.8/warc/CC-MAIN-20181114041344-20181114063344-00064.warc.gz
|
CC-MAIN-2018-47
| 1,860 | 9 |
https://veterinaryresearch.biomedcentral.com/articles/10.1186/1297-9716-43-7/figures/5
|
code
|
Ingenuity Pathway Analysis network depicting interactions between genes known to be involved in apoptosis induction. Two major pathways are shown, the death receptor (extrinsic) pathway, and mitochondria-dependent (intrinsic) pathway. Pink color of molecules indicates upregulation of genes analyzed in this study (level of upregulation after 24, 48 or 72 h of CCH exposure to M. synoviae), with darker shades of pink representing higher levels of gene upregulation. Grey color indicates no change in gene expression, whereas molecules that were not analyzed are white. Types of relationships are explained in the legend. The pathways depicted represent conserved pathways generated from knowledge published for different species. (Note that exceptions specific for avian species could be possible).
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335286.15/warc/CC-MAIN-20220928212030-20220929002030-00738.warc.gz
|
CC-MAIN-2022-40
| 799 | 1 |
http://quant.stackexchange.com/questions/tagged/investing+general
|
code
|
Quantitative Finance Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Long-term vs short-term strategies \ investing
Suppose most investors have very short investing horizons and use appropriate (for them) strategies, but investor X has a very long horizon. He would like to trade some advantages (early withdrawal ...
Aug 29 '12 at 13:38
newest investing general questions feed
Hot Network Questions
Effect of Maariv being originally optional
How to respond to "Why shouldn't we hire you?"
How can a singularity in a black hole rotate if it's just a point?
(x-y)/y vs (x/y)-1
What if a parachute does not open while sky diving?
Message ALL users before shutdown
Avoiding the Hermann grid illusion
What does “Come-to Jesus (moment / stage / meeting)” mean? Is it a popular word?
Distribute iOS app without human interaction
Custom Object is not visible in report making option
Origin of exact sequences
What's the meaning of "and then only"
Language problems at the airport?
Where does Allah come from?
Does the bijection of function sets imply bijection of sets?
Understanding dependency injection
How to merge all scene geometry into a single mesh?
Any place for people with fear of writing?
How can I mount a block device from one computer to another via the network as a block device?
Why do some websites enforce lack of SSL?
Is it OK to use while ((line = r.readLine()) != null) construct?
How much money did Charlie Harper have?
How can I kill myself?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Overflow
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678677514/warc/CC-MAIN-20140313024437-00006-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 2,056 | 52 |
http://effingtheineffable.blogspot.com/2010/02/doh.html
|
code
|
I'm not sure if it's encroaching senility or just that I'm a moron but I just now spent at least a minute searching wildly for my wallet before realising I was holding it in my teeth*.
Words fail me.
* no I don't normally keep it there - I was in a hurry to miss a bus and trying to find my pass and.. there's a good reason! Honest! Shut up!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794870771.86/warc/CC-MAIN-20180528024807-20180528044807-00216.warc.gz
|
CC-MAIN-2018-22
| 341 | 3 |
https://ealc.indiana.edu/people/tanaka-nozomi.html
|
code
|
- Ph.D., University of Hawaiʻi at Mānoa, 2016
- Language acquisition
- Second language acquisition
- Heritage languages
- Language processing
- Japanese linguistics
- J 101/102 Elementary Japanese
- J 301/302 Third-Year Japanese
- J 525 Teaching Japanese as a Foreign/Second Language
- E 270 Japanese Language and Society
- JCHAT Award (Best Paper), the 16th Annual International Conference of the Japanese Society for Language Sciences, 2014
- East-West Center Association Summer Travel Grant, 2012
- Japan Iron and Steel Federation/Mitsubishi Foundation Graduate Fellowship in Japanese Studies, Asian Studies Center, University of Pittsburgh, 2009-2011
- Heiwa Nakajima Foundation Fellowship, 2009-2011
- Ibuka Masaru Memorial Fund Scholarship, 2005-2009
- Tanaka, Nozomi, William O’Grady, Kamil Deen, Chae-Eun Kim, Ryoko Hattori, Ivan Paul M. Bondoc, and Jennifer U. Soriano. 2016. An agent advantage in Tagalog relative clause comprehension. In AFLA 22: The Proceedings of the 22nd Meeting of the Austronesian Formal Linguistics Association , ed. by Henrison Hsieh, 191-202. Canberra: Asia-Pacific Linguistics.
- Tanaka, Nozomi, and Yasuhiro Shirai. 2014. L1 acquisition of Japanese transitive verbs: How do children acquire grammar in the absence of clear evidence? In Japanese/Korean Linguistics (Vol. 21), eds. by Seungho Nam, Heejeong Ko, and Jongho Jun. Stanford, CA: CSLI.
- Tanaka, Nozomi, William O’Grady, Kamil Deen, Chae-Eun Kim, Ryoko Hattori, Ivan Paul M. Bondoc, and Jennifer U. Soriano. 2014. Acquisition of Tagalog relative clauses. In BUCLD 38: Proceedings of the 38th Annual Boston University Conference on Language Development, eds. by Will Orman, and Matthew James Valleau, 463-470. Somerville, MA: Cascadilla Press.
My research interests focus on first and second language acquisition, as well as language processing. Using experimental methods, I investigate how different structures are understood and produced by children, adults, and second language learners. I am also interested in the acquisition and maintenance of heritage languages. I have primarily worked on Japanese and Tagalog, but I also hope to work on other languages of Asia and the Pacific, including the Ryukyuan languages.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584350539.86/warc/CC-MAIN-20190123193004-20190123215004-00264.warc.gz
|
CC-MAIN-2019-04
| 2,223 | 19 |
https://www.mis.mpg.de/events/event/a-stochastic-phase-field-model-derived-from-molecular-dynamics
|
code
|
A Stochastic Phase-Field Model Derived from Molecular Dynamics
- Anders Szepessy (KTH Stockholm, Stockholm, Sweden)
The phase-field method is widely used to study evolution of microstructural phase transformations on a continuum level; it couples the energy equation to a phenomenological Allen-Cahn/Ginzburg-Landau equation modeling the dynamics of an order parameter determining the solid and liquid phases, including also stochastic fluctuations to obtain the qualitatively correct result of dendritic side branching. This work presents a method to derive stochastic phase-field models from atomistic formulations by coarse-graining molecular dynamics. It has four steps: (1) derivation of stochastic molecular dynamics from the time-indepedent SchrÃdinger equation; (2) a precise quantitative atomistic definition of the phase-field variable, based on the local potential energy; (3) derivation of its coarse-grained dynamics model, from microscopic Smoluchowski molecular dynamics; and (4) numerical computation of the coarse-grained model functions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.26/warc/CC-MAIN-20240227121318-20240227151318-00740.warc.gz
|
CC-MAIN-2024-10
| 1,056 | 3 |
https://www.popmatters.com/72017-music-day-2-primal-scream-2496039621.html
|
code
|
Music Day 2: Primal Scream
I've long been of the mind that Primal Scream's 2000 effort, XTRMNTR, was a victim of self-sabotage by the band. The disc's first half marks some of the fiercest and most, well, primal music the band ever put down. The second half, however, faded just a touch. My cockamamie theory is that if Primal Scream had maintained that level of intensity from start to finish, it might have turned out like Monty Python's skit about the world's deadliest joke: Anyone who heard it would die. That effect thankfully doesn't carry over to their live show, which was a relentless assault of rock groove. Couched at the end of the Cedar Street Courtyard, which is pretty much a wide alleyway with a bar at the back, Primal Scream hardly acted like they were trapped or cornered. After getting off to a strong start, technical difficulties brought them to a stop (with the band vamping through the Jackson 5's "ABC" and singer Bobby Gillespie offering the crowd some thick-accented banter that needed subtitles while things got fixed). After that, they raised the intensity song by song, until they had the crowd going out of their minds by the time they got to "Swastika Eyes" and "Rocks".
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107883636.39/warc/CC-MAIN-20201024135444-20201024165444-00143.warc.gz
|
CC-MAIN-2020-45
| 1,203 | 2 |
http://php5.laurent-laville.org/umlwriter/manual/current/en/processor-guide.html
|
code
|
Each processor is a specialized version of a graphical engine. UmlWriter version 1.0.0 is able to render only two diagram syntaxes :
But you are free to make your own. Here is the class diagram of processors architecture built with PlantUML processor
With the CLI mode, use the umlwriter command.
$ umlwriter diagram:render:namespace --processor=plantuml /path/to/umlwriter Bartlett\UmlWriter\Processor
Output return the PlantUML diagram syntax, that you may redirect directly to a file
Then build a
$ java -jar plantuml.jar -Tpng /path/to/puml_file -o /path/to/ouput/dir
Any new processor must implement the
And to avoid to implement again and again the same methods, you should used
Bartlett\UmlWriter\Processor\AbstractProcessor class, that will do
the job for you.
There are three methods to implement :
renderClass()that is in charge of return diagram syntax of a single class and its direct dependencies.
renderNamespace()that is in charge of return diagram syntax of a single namespace and all its objects.
render()that is in charge of return diagram syntax of all namespaces and objects.
There are additional protected methods available in the abstract
renderEdges()that is in charge of building all links between objects (class, interface, trait)
formatLine()that may format line with a left indentation.
writeObjectElement()that render details of each object (class, interface, trait) in a namespace
writeObjectInheritance()that render the class or interface parent.
writeObjectInterfaces()that render all interfaces implemented by a class
`writeConstantElements()`that render all constants of a class
writePropertyElements()that render all properties of a class
writeMethodElements()that render all methods of any objects (class, interface, trait)
There are two abstract methods you should implement :
pushObject()to render an object with all details (attributes, operations)
pushEdge()to render links (inheritances, implements) between objects
Other specialized methods that each processor must implement :
writeGraphHeader()to render header of the main graph
writeGraphFooter()to render footer of the main graph
The PlantUML processor is not yet able to print the PHP namespace \ (backslash), that is replaced by the . (dot)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00631.warc.gz
|
CC-MAIN-2022-33
| 2,237 | 31 |
http://www.dongnguyen.nl/index.html
|
code
|
Hi, I'm Dong Nguyen and a PhD student at the University of Twente (at the Human Media Interaction group). I am also affiliated with the Meertens Institute. I'm interested in Natural Language Processing, Information Retrieval and Machine Learning to support research in the social sciences and the humanities. This involves making data more accessible as well as using computational methods for answering questions from the social sciences and humanities. I especially enjoy working with social media data.
I received a master's degree in Language Technologies after graduating from Carnegie Mellon University and a bachelor's degree in Computer Science from the University of Twente. In fall 2011 I was a software engineer intern at Facebook and in fall 2013 a research intern at Microsoft Research.
Email: (Languages: Dutch and English)
I received the UT in the Media 2013 award (for receiving the most press attention in 2013).
This year I'm in the Viva 400, a list of 400 successful women under 45 years compiled by the Dutch magazine Viva.
We're organizing a Federated Web Search track at TREC 2014!
Demo of our Twitter research: TweetGenie guesses age and gender of Twitter users (sorry, only for Dutch Twitter users!)
Program Committee: EMNLP 2013, ACL 2014, Workshop on Entity Attribute Prediction in Social Media (ACL 2014), Student Research Workshop EACL 2014, ICMI 2014
Organizer: Federated Web Search Track (TREC 2013, 2014)
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526311.33/warc/CC-MAIN-20140416005206-00268-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 1,435 | 9 |
https://nationalreentryresourcecenter.org/resources/2021-review-and-revalidation-first-step-act-risk-assessment-tool
|
code
|
2021 Review and Revalidation of the First Step Act Risk Assessment Tool
The current National Institute of Justice (NIJ) report complies with the First Step Act’s requirement to review, validate, and release publicly its risk and needs assessment system, i.e., PATTERN. This report details activities to date under the NIJ’s contract established in April 2019 to develop PATTERN.
Part 1 of this report summarizes the development and initial review of PATTERN. As documented in NIJ’s January 2021 report (PDF), discrepancies were identified with some of the measures used to create PATTERN. The current report presents the results of consultants’ collaboration with staff from the Bureau of Prisons’ (BOP’s) Office of Research and Evaluation (ORE) to correct the discrepancies.
Part 2 of the current report describes the study sample and statistical models that were estimated using the updated data to create PATTERN version 1.3. This section also summarizes the new version 1.3 item weights, item point assignments, risk-level categories, and descriptive statistics of risk scores and risk level categories (RLCs) for the validation and revalidation samples. This report also includes the review and revalidation analyses related to the predictive validity, dynamic validity, and racial and ethnic neutrality of PATTERN 1.3, as required by the FSA. Overall, results suggest PATTERN 1.3 has a high level of predictive accuracy, with Areas under the Curve (AUCs) ranging from 0.75 to 0.79 across validation and revalidation samples. Extensive figures, tables, and references
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00265.warc.gz
|
CC-MAIN-2023-40
| 1,584 | 4 |
https://forum.atlas-games.com/t/an-interesting-question/1658
|
code
|
Copyright laws (and their enforcement!) vary from country to country (a significant consideration on the Wild Wild Web!). International Copyright laws are often hard to enforce (as in "expensive", if not impractical.) But, in theory, and without any agreement or release to the contrary*, intellectual property belongs to the person creating it. We write it, we "own" it.
(* Some sites/boards DO have such a release as part of their basic User Agreement- Atlas does not.)
Now, practically speaking, (and just as if you published a hard-copy book or describe it in a group of friends), once it's out there anyone can steal it, or be inspired by it, and a few tweaks can make it nearly impossible to prove after the fact, if you ever are aware of it.
I once created what I "knew" was a 4th ed AM mage of my own design for a PbP RPG game, but then realized some time later that huge parts of it had been inspired by a long-forgotten reading of some of the Ars on-line material (one magi from Atlas' on-line covenant roster). I could not remember ever reading it, but the parallels were just too close to deny. I had even duplicated the name of the Magus almost perfectly and independently, by scanning thru a latin dictionary until the "appropriate" name had jumped out of the mix. At first, I wondered if some Atlas writer had "stolen" my mage (which had been used in an on-line game and was publically viewable), but the Atlas staff assured me that the material in question had been uploaded long before my character was public, and so I accepted that the fault was my own.
Was it intentional? Nope, it wasn't even conscious! (But that doesn't matter in the eyes of the law.) Was it a copyright infringement? Well, yeah. Did anyone care? No more than they care about any dark elf character with two-scimitars in any RPG, online or not. I wasn't making money on it, nor "publishing" it in any real sense. Did I still "steal" it? Yeah, legally I did, despite the work I put into it- somewhere in my unconscious the work that legally belonged to someone else, that I pretty clearly had read at some point, bubbled up as "my own". Did I still run/enjoy the character? Yep, didn't slow me down a bit. Nor, I think, did it much bother Atlas- they probably would never have known the difference I hadn't asked, it didn't diminish their published material, nor did I profit from it (except in abstract emotional terms). They certainly could have asked me to delete the material, or credit them, or even brought legal action if they wanted - (as if they had the time and money to burn on that pursuit), but they realized that, in this case, it was no biggie, no threat or loss to the material that they in fact owned.
My point? The way things work in theory is not the way that things work in practice. If it's important to you, don't publish it in a casual context. And/or if you do, don't fool yourself that someone won't swipe it or be inspired heavily by it, intentionally or not.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00593.warc.gz
|
CC-MAIN-2023-50
| 2,974 | 6 |
http://www.colourlovers.com/shape/7958/Doubles_Champion
|
code
|
The shape aspect of CL is a work in progress. Currently you can create shapes using Seamless Lite for viewing here by everyone, or you can create shapes using Seamless Studio which can be viewed by only you. Your Lite shape files are hosted on the CL servers so everyone can see them, but only you (for now) can use them. Possibly in the future there will be a way to share shape files through CL with other users. Seamless Studio shape files are saved on your computer, so only you can see them and use them. You can download, to your computer, your shape files, created with Seamless Lite, Inkscape or other programs and use them with Seamless Studio. I don't do that but a number of other users do.
I didn't realize that there was an option to upload shapes to this site. Very cool. I'm curious though... is there anything to be done with them or are they just to look at? Is it possible to use your shapes in the pattern maker?
I'm just curious. No offense meant, I'm not trying to infringe on your work or anything. I'm just curious about what exactly this site offers.
Thanks for your time. :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701638778/warc/CC-MAIN-20130516105358-00017-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,099 | 4 |
https://synactive.com/qa/general/qa_gen_106.html
|
code
|
Script changes not
visible: When I change my script code, save the changes and press the
refresh button the screen is not refreshed in SAP GUI. Only after I close system
can I see the changes. My scripts are on a file server.
the file cache is switched on in your GuiXT profile. Scripts from
file servers are then cached and you do not see your script updates.
switch off the file cache or assign a drive letter e.g. Z: for
put Z:\scripts into GuiXT profile.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00344.warc.gz
|
CC-MAIN-2023-40
| 458 | 8 |
https://www.isticktoit.net/?p=1504
|
code
|
Base64 is an encoding scheme, which allows the safe transmission of files between ascii- and EBCDIC-based computer systems, which were popular in the fifties and sixties. Although no computer today uses the EBCDIC character set, base64 is still used for encoding binaries on the internet. Email attachments are encoded this way, and sometimes you can find small images, which are directly embedded in the source code of the web page.
So what is
base65536 encodes data in a similar fashion to
base64, but its alphabet, instead of being 64 characters long, is 65536 characters long. This means, one can map 16 bits of data into a single unicode codepoint.
It is of course terribly inefficient, if you were to count the outputted bytes (especially when UTF-8 encoded), but if you count just the number of unicode characters, as for example Twitter does for it’s length limit, you can fit double the data per character.
This was GitHub user ferno’s intention when creating this ‘standard’: to fit more data into a single tweet.
My implementation does exactly that! it is written in c, the command line options are compatible (for now, only short options are implemented) and i finally found an excuse to implement a complete binary search tree in a project.
As always, i put my code up on GitHub, if anyone wants to check it out.
Details of the implementation
If you have a look at GNU’s base64, you will see, it is quite dependent on the GNU C Libary. I wanted a minimalistic program, which should compile without dependencies on GNU specific stuff. Therefore, I have opted to use
getopt() from the POSIX C Library instead of
getopt_long(), which is GNU-specific. Because of that, only the single letter arguments are supported.
On the encoding part of the program, not much is happening: each byte is read in (either from stdin or the specified file) and encoded. The second byte is used to find the block, and the first one will be added to it. This order allows for the second byte to be
EOF (-1), without having to pad the last byte and use a trunctuation marker, as base64 does with its
=. For the EOF to be correctly passed through all the functions involved, each byte is internally represented as an
Decoding is much more interesting*. I deviate a little from
base64 in the part where I handle non-Base65536-codepoints. as Base65536 does not assign meaning to any single-byte codepoint, those can be placed anywhere inside the encoded string, either for formatting (whitespace, which can also be added automatically by the encoding function) or inserting cleartext messages. Even when having the abort-on-decoding-error enabled,
base65536 will not stop when encountering an ASCII (7bit) character. This is meant as a feature.
On to the binary search tree.
All the existing implementations have one thing in common: They were all written in languages that natively have a hash map data structure implemented. This allows for a simple (albeit not really performant) way of rethrieving the beginning of a block. As I have begun studying CompSci this year, I wanted to challenge myself and implement the most suitable data structure for this task: a binary search tree. When sorting the list by block-start, it is in the same order as when sorting by block-id. This means, the BST can be traversed by looking at the ids or the start at will. As i wanted the lookup to be as efficient as possible (yes, this is premature optimisation – deal with it), a linked list was not the way to go with this implementation (declaring that would be pretty ugly, and loading it dynamically would require
malloc()ing and balancing – too much hassle). I therefore went with the implementation in form of an array. This brings a new chalenge: the tree has 257 elements, and is therefore not completely full (total). Most simple algorithms (including mine) one can use to transform a sorted array into BST form are capable of balancing the tree (which is necessary for a good performance), but won’t left-align the the last row. This means, a large portion of extra memory would be necessary to put the last
element in the middle of the last row. The simplest solution was, to remove the two smallest blocks (ids EOF and 1), which leaves us with a total tree containing 255 elements. appending the previously removed elements (EOF, 1) to the end of the tree will make it left-aligned.
A small program,
base65536.c. For that, I had to implement a queue (again – this is an overengineed CompSci student project). The last line in the
main function reads:
//NOTE: memory occupied by the tree-as-linked-list is not freed. deal with it.
This program is intended to be run once during programming, so not a lot is gained spending time there.
Wow - you are still reading this? Anyway, I had a lot of fun, actually using some of the algorithms and data structures I otherwise only used in boring proseminar exercises.
base65536 is by no means even remotly something that advances the human race, but it was a fun exercise and I am generally into quirky, not very serious programming. I'll gladly point you to the
asciiplayer; a player that renders porn as ASCII characters and displays it in your terminal. Another project (which is not on the internet, as I found more robust implementations afterwards) is displaying images in the terminal, either using the Braille Character Set or half-block characters from Unicode and coloring them in. Those provide minimal real-life use cases and stem from my because-I-can attitude to recreational programming.
* relatively. if you are into this kind of stuff 😉
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474653.81/warc/CC-MAIN-20240226062606-20240226092606-00520.warc.gz
|
CC-MAIN-2024-10
| 5,599 | 31 |
http://refractions.net/products/postgis/support/
|
code
|
Refractions Research provides support for enterprises developing applications based on PostGIS / PostgreSQL. Our staff have years of experience with practical issues in spatial database development and deployment:
- Large scale spatial databases (10M rows and up)
- High load spatial databases (multiple updates per second
- High reliability installations (replication and clustering)
- Multi-dimensional spatial databases (3- and 4-dimensions)
- Spatial data modeling (very large data models)
|Enterprise Support||$5000||1 Year||Preferential access to our team during business hours, expertise and trouble-shooting, contact us for more information.|
Biodiversity BC and its government and non-government partners were looking for regional-level environmental statistics. Refractions proposed a new approach to generating GIS summaries, using the power of a relational database and web tools to provide GIS analysis to users who previously had no access to it.
Rento is a free web service that makes it easy to find a place to rent in Greece. Powered by PostgreSQL and PostGIS, it provides ad listings with photographs displayed on a map. Searching is accomplished through map navigation and natural language processing, with the search engine being capable of answering complex (spatial) questions such as "flat near the University of Athens" or "loft up to 800 euros near a metro station" (in greek).
Refractions provides full-service support for the British Columbia Digital Roads Atlas – systems design, maintenance, data conflation, client service, and rapid response.
Open Source Company
Refractions sponsors and develops PostGIS as an open source project in collaboration with developers from around the world. Visit the PostGIS open source community site at postgis.net.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500368.7/warc/CC-MAIN-20230207004322-20230207034322-00070.warc.gz
|
CC-MAIN-2023-06
| 1,780 | 12 |
https://mc.ai/selfie2art%E2%80%8A-%E2%80%8Aneural-style-transfer/
|
code
|
Source: Deep Learning on Medium
Written by Jeroen
In late 2017 we received a request from a colleague on whether we could rebuild a showcase he had seen at an event. This showcase took a picture of you and transformed that photo into a painting that mimicked the style of a reference art piece.
We guessed that what the colleague had witnessed was an example of Neural Style Transfer (see wikipedia). A quick search led us to the project on Github by zhanghang1989 — PyTorch-Multi-Style-Transfer.
We essentially used that codebase to quickly build a demonstrator that used the camera_demo code in that project to enable the taking of a selfie (by taking a single frame from the webcam stream) and then rendering the composite image by running that through the process. Since we took a selfie with the webcam and rendered this as art, we called this project selfie2art.
Following these steps we were able to generate python code running PyTorch using CUDA on a Linux laptop with an NVIDIA graphics card. In an interactive setup this would render the image from a full HD webcam in less than 2 seconds. People would then take a photo of the screen to keep a record (not saving images leads to less GDPR impact).
Since the early days we have used this showcase at multiple events. It is a constantly running showcase in our space in Frankfurt. However, getting this installed on a laptop is not simple. Since it uses older versions of PyTorch and thus CUDA this is difficult to get installed on a modern Linux.
Issues with installing for our space in Istanbul has led to the development of a web-version. More about that in a future post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657146247.90/warc/CC-MAIN-20200713162746-20200713192746-00307.warc.gz
|
CC-MAIN-2020-29
| 1,637 | 8 |
https://boards.dingoonity.org/gcw-releases/dosbox-0-74-svn-for-gcw0/40/
|
code
|
Thanks for dosbox, it works great!
Just a few suggestions:
Could you include the default mapper.txt? For some games it might come handy, to re-define the keys, in case the game does not allow redefining them - for example, I'm looking forward to playing psycho pinball or pinball fantasies from the shoulder buttons! I could figure out the keycodes by myself, but that will be quite tedious, and wont help others.
Also, just a suggestion: perhaps we could associate dosbox with .conf files so, that dosbox could be invoked as such: 'dosbox -userconf -conf CUSTOM.conf' (equivalent to dosbox -conf ~/.dosbox/dosbox-SVN.conf -conf CUSTOM.conf).
As the custom config file will override everything in the default config file, this will simplify running every game. The config file can have a custom [autoexec] -section (which will actually, btw., be appended to the default one), so no need to brose the folders and looking for the .exe/.bat/.com every time. But also, everything else could be configured, too, if desired (such as a custom mapper.txt). This will require some knowledge from the user (i.e. to setup a common C drive in the common config file, or a separate one in the custom ones for each game),
but, won't change current usage for those who don't want to. I looked at the Freedesktop .desktop specification, and, unfortunately, there can be only one Exec -key, so this approach is only alternative to the current one, unless two applications are made.
I already do the above on my linux box, but especially on a gaming console without a real keyboard, it would rock!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655884012.26/warc/CC-MAIN-20200704042252-20200704072252-00351.warc.gz
|
CC-MAIN-2020-29
| 1,579 | 7 |
https://youtube24.online/assassins-creed-origins-gameplay-walkthrough-part-1-oracle-ac-origins_f78607dba.html
|
code
|
Make sure to Smash that like LIKE button and Dont forget to Subscribe.
TURN ON THAT NOTIFICATION BUTTON UP THERE TO NEVER MISS MY UPLOADS!
Donation Link: https://streamlabs.com/roninmj1999
Send any donations to support the stream. Big or little, every penny helps! Thanks so much everyone!
No refunds after donation has been sent
Minimum Donation: $1
Join our Discord:https://discordapp.com/invite/SuGJkk
Follow my socials-:
Instagram: https: https://www.instagram.com/mahhhmudddd
Thank you guys for your support :) Peace.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578551739.43/warc/CC-MAIN-20190422095521-20190422121521-00290.warc.gz
|
CC-MAIN-2019-18
| 522 | 10 |
https://lists.freebsd.org/pipermail/freebsd-ports/2012-March/073822.html
|
code
|
qpopper compile failure
admin at vizion2000.net
Wed Mar 14 13:40:50 UTC 2012
On Tuesday 13 March 2012 07:23:37 Matthew Seaman wrote:
> On 13/03/2012 13:01, David Southwell wrote:
> > qpopper has been working fine (amd64 running postfix) but on portupgrade
> > I am Getting the following error:
> > set MISSING_OBJS to base64.o
> > set MISSING_SRCS to base64.c
> > Set AR_FLAG = -r ; RANLIB_CMD =
> > checking for sendmail program... ERROR: The sendmail program cannot be
> > located ===> Script "configure" failed unexpectedly.
> > sendmail is
> > [root at dns1 /usr/ports/mail/qpopper]# whereis sendmail
> > sendmail: /usr/local/sbin/sendmail /usr/local/man/man1/sendmail.1.gz
> > /usr/src/usr.sbin/sendmail
> > qpopper config log includes the following lines:
> > PATH: /usr/local/kde4/bin
> > PATH: /sbin
> > PATH: /bin
> > PATH: /usr/sbin
> > PATH: /usr/bin
> > PATH: /usr/games
> > PATH: /usr/local/sbin
> > PATH: /usr/local/share/lprof
> > PATH: /usr/local/bin
> > PATH: /home/admin/bin
> > Does anyone have any idea why this error might occur?
> Yes. All unix apps that send e-mail expect to do it by piping the mail
> into /usr/sbin/sendmail. Despite the name, on FreeBSD that is not
> actually sendmail-brand sendmail, but mailwrapper(8) -- a handy program
> that redirects that piped input into the MTA of your choice.
> (sendmail q.v. is actually in /usr/libexec/sendmail/sendmail)
> Restore /usr/sbin/sendmail and verify that the contents of
> /etc/mail/mailer.conf are sane, and qpopper should spring into life again.
Does that not produce problems with postfix?
How do we retain mailwrapper functionality?
spf was working fine until upgrading. What has changed? Atm I have spf turned
off until I get this sorted.
More information about the freebsd-ports
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998558.51/warc/CC-MAIN-20190617183209-20190617205209-00133.warc.gz
|
CC-MAIN-2019-26
| 1,767 | 40 |
https://words.strivinglife.com/post/itunes-music-to-sqlite-version-01-beta-released/
|
code
|
iTunes Music to SQLite - version 0.1 beta released
While it was at the same stage as it is now back on the 19th, I'm finally releasing the beta version of iTunes Music to SQLite.
This console application finds all Music playlists in iTunes and imports them into a SQLite database (called iTunesMusic.s3db).
You can change this by passing the database and source names as parameters.
iTunesMusicToSQLite.exe "datum.db" "James Skemp's 80 gig"
You can run the executable and it will prompt for a key press before exiting, in case you want to view any messages.
This is a beta version, and was done more as a proof of concept than anything else, so this may be the only version released.
.NET Framework 3.5 is recommended, and may be required (check your version of .NET Framework).
- Review: Dr. Brown's 4 Piece Options Wide Neck Bottle, 9 Ounce
- Review: Philips Sonicare FlexCare Whitening Edition
- Review: Logitech G903 LIGHTSPEED Gaming Mouse with POWERPLAY Wireless Charging Compatibility
- Review: Empires of EVE: A History of the Great Wars of EVE Online
- Review: Ghost in the Shell README: 1995-2017
Support This Site
If my blog was helpful to you, then please consider visiting my Amazon Wishlist.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891543.65/warc/CC-MAIN-20180122213051-20180122233051-00450.warc.gz
|
CC-MAIN-2018-05
| 1,205 | 15 |
https://www.programmableweb.com/library/musicbrainz-libmusicbrainz-objc-objective-c-library-joachim-brandon-leblanc
|
code
|
The MusicBrainz (libmusicbrainz-objc) Objective-C Library by Joachim Brandon LeBlanc is an iOS Library for the MusicBrainz Web Service. The MusicBrainz database contains a huge amount of music metadata, which is maintained by the MusicBrainz community.
Expect a mash pit, not a mosh pit, at this weekend's Music Hack Day in London. Over 200 people will come together from the UK and across Europe for what the organizers call "the best industry to hack on, with the cleanest APIs and the most enjoyable content."
The web's largest video site has added a new personalization feature to its YouTube API. Sure to be misunderstood as a privacy concern, the service now lets applications access viewing history for authenticated users. Amazon also made two announcements related to its storage and database services. That and 19 new APIs round out today in APIs.
Shuffler.fm is a web based music magazine that allows users to browse music on the web through music sites and blogs. It allows them to discover new music and keep an eye on current trends, with the help of those in the know.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865023.41/warc/CC-MAIN-20180523004548-20180523024548-00562.warc.gz
|
CC-MAIN-2018-22
| 1,083 | 4 |
https://www.howtoforge.com/community/threads/posible-bug-related-to-quotas-and-user-edit.40305/
|
code
|
Hi, I am experiencing the following behavior. If I log in as a client and try to edit an user autoresponse. I get the same error as I'd get if I had not enough quota for the mailbox. That is: The max space for mailboxes is reached. The max. available space in MB is: 400 but I am in fact under quota (as the error also suggest) and I'm not touching the user quota which is, in this case, 50 MB. So it seems that when I change tabs to get to the autoresponder tab the value in the quota field is... somewhat lost and mail_user_edit.php can't see it and believes that I want to change the quota to 0 or something like that thus giving me the error message. I didn't really have the time to properly debug the problem but I hope that the description helps you to understand what I mean and how to reproduce.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662604495.84/warc/CC-MAIN-20220526065603-20220526095603-00562.warc.gz
|
CC-MAIN-2022-21
| 804 | 1 |
http://www.matt-hughes.com/forums/showpost.php?p=180064&postcount=8
|
code
|
Molly, use the power of google. You can use this to search within ANY site on the internet. For example, if you want to search for "fighter" on www.matt-hughes.com
, you can type this into google:
Or if you'd like to search for anything Matt Hughes on ufc.com:
site:ufc.com matt hughes
Simple as that!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281746.82/warc/CC-MAIN-20170116095121-00180-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 301 | 5 |
http://wiki.squeak.org/squeak/2282
|
code
|
Last updated at 2:15 pm UTC on 7 January 2022
Use the text below as a start for the StringMorph class comment
StringMorph is a subclass of Morph. It has the following additional instance variables:
- font (normally nil; then the accessor #font gives back TextStyle defaultFont)
- contents (aString)
Inherited from the class Morph are the following instance variables:
It further has 20 or more subclasses.
StringMorph allSubclasses size 21 "Squeak 5.3"
The color of a StringMorph object applies to the font, not the background.
How to construct a StringMorphs with a particular font
See StringMorph examples - Bitmap DejaVu Sans 9, 18, 36
Edit content of StringMorph
If you shift-click on a StringMorph you can edit it's string.
This is accomplished the following way:
class StringMorph overrides the message #mouseDown: and then tests
(evt shiftPressed and: [self wantsKeyboardFocusOnShiftClick]) and if it is true it launches a StringMorphEditor.
StringMorph as a button
A StringMorph may as well be used like a SimpleButtonMorph to do an action when clicked.
Use the menu 'extras' / 'add mouseUpAction'.
The following propery will be defined:
aStringMorph valueOfProperty: #mouseUpCodeToRun
see Morph mouse up action (Smalltalk expression)
StringMorph and SimpleButtonMorph example -- another counter
You can add custom menu entries to any Morph, see Morph menus.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00805.warc.gz
|
CC-MAIN-2023-50
| 1,366 | 24 |
https://www.4thand24.com/post/mvp-candidates-6-22-22
|
code
|
Now that we are nearing the half-way mark of the season, I’ll be releasing my first story going in-depth about the top 3 candidates (along with some honorable mentions, and players that could catch fire to improve their candidacy) for MVP in each league. I plan to do a few more updates to this, along with a Cy Young article at some point too, and update both throughout the season, culminating in the release of a mock awards ballot at the end of the season. Check out the article on my Stories page.
MVP Candidates (6/22/22)
Updated: Jun 22, 2022
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817200.22/warc/CC-MAIN-20240418061950-20240418091950-00314.warc.gz
|
CC-MAIN-2024-18
| 551 | 3 |
https://cs.nyu.edu/web/Academic/Undergrad/course_descriptions.html
|
code
|
The undergraduate computer science course offerings cover a wide array
of topics and interests. The official course descriptions can be found
in the College of Arts and Science Bulletin. Detailed information on
each course can be accessed each semester from the Courses link.
Computer Science Course Offerings
Mathematics Course Offerings
| contact [email protected]
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888113.39/warc/CC-MAIN-20180119184632-20180119204632-00361.warc.gz
|
CC-MAIN-2018-05
| 379 | 7 |
http://mail.python.org/pipermail/python-list/2003-October/230329.html
|
code
|
Why don't people like lisp?
costanza at web.de
Mon Oct 20 15:23:40 CEST 2003
Ville Vainio wrote:
> Pascal Costanza <costanza at web.de> writes:
>>So why is it that Python is continuously evolving as a language? Do
>>you think this is going to stop at some stage?
> Python is not only the language, it's also the implementation (or
> implementations). I don't know whether the evolution is ever going to
> stop, you've got to ask Guido :-). Obviously I wouldn't mind if the
> language reached Perfection within, say, 10 years, after which it
> could be standardized and only the libraries and the implementation
> would evolve.
...and if it never reached perfection? If perfection were not reachable,
not for Python, not for any language?
>>Wouldn't it be better if everyone could contribute to the evolution of
>>a language, and then let the community decide what the best approaches
> Possibly. But personally, I trust the guys in charge. Lisp might the
> very essence of programming, built into the DNA of computer science,
> but Python is the channeling of that quintessential truth into a form
> that is *easily* writeable and esp. readable by mere mortals.
No, it's not. Python doesn't have the "programs = data" feature.
>>With Python, you have to stick to the constructs the languages give
>>you. When you want to add domain-specific abstractions on the language
> Yes, and it gives me all I need. You can do a whole lot with
> dynamically typed OO and powerful data types.
What makes you so sure that it gives you all you need? Is this merely a
belief, or can you back that claim by objective facts?
Pascal Costanza University of Bonn
mailto:costanza at web.de Institute of Computer Science III
http://www.pascalcostanza.de Römerstr. 164, D-53117 Bonn (Germany)
More information about the Python-list
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708144156/warc/CC-MAIN-20130516124224-00046-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,809 | 32 |
http://www.remkoweijnen.nl/blog/2014/08/28/twitter-analytics-adblock-plus/
|
code
|
About Virtualization, VDI, SBC, Application Compatibility and anything else I feel like
Twitter has opened access to Analytics for all users. However when you use an Ad Blocker, like Adblock Plus, you’ll get the following error:
For Adblock Plus you can fix this by adding a filter: go to Filter Preferences and on the "Custom filters" tab add a new filter within a filter group (or create a filter group for this rule).
Use this as a filter rule:
And don’t forget to Enable the rule!
EDIT: Twitter user @Ertraeglichkeit mentioned a different method:
To understand how this works it’s good to know how adblocker detection roughly works, see here for a good explanation.
To implement this in AdBlock Plus use the following filter rule:
Or install the "Element Hiding Helper" for AdBlock Plus then open the Twitter Analytics Page and choose the "Select an element to hide" option:
Move the mouse around until the red rectangle is around the complete page (because that’s what’s being hidden with the overlay:
In the bottom left corner you can see the html element that is selected. Press the S key to select the object and the rule is composed:
.NET .NET FrameWork Active Directory Altiris Apple Automation Manager Citrix Dell Delphi Excel Exchange Exchange2003 Exchange2010 Hack HP iOS Java LinkedIn Linux Lync MSI Office Office 2010 Passat Password PowerPoint PowerShell RES RNS510 SasLibEx SCOM Security Terminal Server ThinApp TSAdminEx VBS VCDS Visual Basic Visual Studio VMWare Volkswagen VW Windows PE Wordpress XenApp
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281332.92/warc/CC-MAIN-20170116095121-00573-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 1,533 | 12 |
https://docs.oracle.com/en/cloud/saas/human-resources/23d/fapua/get-help-FA.html
|
code
|
There are a number of ways to learn more about your product and interact with Oracle and other users.
Get Help in the Applications
Use help icons to access help in the application. If you don't see any help icons on your page, click your user image or name in the global header and select Show Help Icons.
Increase your knowledge of Oracle Cloud by taking courses at Oracle University.
Join Our Community
Use Cloud Customer Connect to get information from industry experts at Oracle and in the partner community. You can join forums to connect with other customers, post questions, suggest ideas for product enhancements, and watch events.
Learn About Accessibility
For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program. Videos included in this guide are provided as a media alternative for text-based topics also available in this guide.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.72/warc/CC-MAIN-20240414130604-20240414160604-00471.warc.gz
|
CC-MAIN-2024-18
| 883 | 8 |
https://dspace.mit.edu/handle/1721.1/3878
|
code
|
An Asymptotically Optimal On-Line Algorithm for Parallel Machine Scheduling
Author(s)Chou, Mabel; Queyranne, Maurice; Simchi-Levi, David
Jobs arriving over time must be non-preemptively processed on one of m parallel machines, each of which running at its own speed, so as to minimize a weighted sum of the job completion times. In this on-line environment, the processing requirement and weight of a job are not known before the job arrives. The Weighted Shortest Processing Requirement (WSPR) on-line heuristic is a simple extension of the well known WSPT heuristic, which is optimal for the single machine problem without release dates. We prove that the WSPR heuristic is asymptotically optimal for all instances with bounded job processing requirements and weights. This implies that the WSPR algorithm generates a solution whose relative error approaches zero as the number of jobs increases. Our proof does not require any probabilistic assumption on the job parameters and relies extensively on properties of optimal solutions to a single machine relaxation of the problem.
High Performance Computation for Engineered Systems (HPCES);
Weighted Shortest Processing Requirement on-line heuristic, job processing requirements and weights
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585183.47/warc/CC-MAIN-20211017210244-20211018000244-00433.warc.gz
|
CC-MAIN-2021-43
| 1,242 | 5 |
https://help.prodpad.com/article/865-17-07-05-release-update
|
code
|
17-07-05 Release Update
- Customer Feedback customer and company filters all persist correctly now.
- UserVoice integration had minor fixes applied.
- Trial Admin dashboard fixed so that new trials can add products.
- Fixes and improvements applied to product roadmap.
- CFP error fixed.
- IE11 fixes throughout app.
- Integration UX has been improved to help guide the user into pressing the relevant save buttons.
- The Roadmap link in the main navigation now shows tooltip explaining to user that they need to create a product before they can access a roadmap.
- Updates to sign up flow to ensure exiting doesn't break the account.
Did this answer your question?
There was a problem submitting your feedback. Please try again later.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539049.32/warc/CC-MAIN-20220521080921-20220521110921-00268.warc.gz
|
CC-MAIN-2022-21
| 735 | 12 |
https://www.newschoolers.com/forum/thread/757246/12-13-Saga-Anomie-Red-Blue-Black-Size-L--60
|
code
|
12/13 Saga Anomie Jacket-Large. 8/10 condtion. Only thing wrong with this is one of the bottom buttons popped off internally. there are 2 buttons at the bottom so it still closes up just fine, doesnt really affect anything at all, just isnt there. $60 plus shipping!
The internet sucks. Lets go skiing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948567042.50/warc/CC-MAIN-20171215060102-20171215080102-00031.warc.gz
|
CC-MAIN-2017-51
| 302 | 2 |
https://borkelectronics.com/products/nrf24-module
|
code
|
NRF24L01 + / NRF24L01 + PA + LNA
The NRF24L01 + is a 2.4 GHz transceiver with a built-in hardware protocol (Enhanced ShockBurst ™), made for ultra-efficient wireless applications. The nRF24L01 uses the 2,400 - 2.4835GHz band to communicate. This module can be accessed with the Serial Peripheral Interface (SPI). The configuration registers of the module can also be changed via SPI.
The + version has an external antenna, power amplifier (PA) and a low noise amplifier (LNA), making the range of the NRF24L01 + PA + LNA module even larger than the module with only the internal antenna.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00765.warc.gz
|
CC-MAIN-2023-50
| 589 | 3 |
http://www.codingforums.com/printthread.php?t=163670
|
code
|
How do I add a link to a flash Movie to load a new page?
I am working on a website, and I have made animated buttons using Macromedia flash. However, in Microsoft Expression Web 2 (the program I am using) it does not allow me to add hyperlinks to these .swf images, and I would like to link these buttons to other pages in my website. Perhaps onclick may work (??) but I am not very skilled in coding, and I was wondering if anyone could help me with this problem. I have already shown the owners of this website the Index page, and they have seen these buttons, and I sincerely hope I do not have to change them. Can anyone help me?? :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120694.49/warc/CC-MAIN-20170423031200-00281-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 637 | 2 |
https://crucible.hubbe.net/t/blade-font-isnt-matched-with-sound-font/2038
|
code
|
Hello, I´ve recently added new blade fonts that I created on Fetts website and wanted to add soundfonts to them. Uploaded the blade fonts via arduino and got no error, blade fonts are installed without issue. However they dont have sound fonts, even though they are uploaded on sd card. When selecting the blade font on lightsaber, it says “Font directory not found”.
First of all, you should probably clean up your defines section. None of the sa22c ones are needed if you’re using the Fett263 prop.
Secondly, when uploading, what message is it displaying? Are you seeing the progress bar with % numbers increasing?
Thirdly, just to make sure, delete all the ini/tmp files from the root and see if that helps.
Will try to clean up the defines, but it worked before on all my sabers.
Yes, I see the progress bar, no errors presented and it looks like this:
Before using that define be sure you read this
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00429.warc.gz
|
CC-MAIN-2022-33
| 910 | 7 |
https://itch.io/post/595737
|
code
|
Dear blerkotron, may I please re-share your games (not just this one:) on my github project page? More details about the project in my profile --> https://retrobrews.itch.io/. Thank you in advance! Retro Fan
I have no problem with people including the games in free projects, although if you have a documentation page for the games it would be nice if you could include a link back here in case people are curious. Good luck with the project!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587655.10/warc/CC-MAIN-20211025061300-20211025091300-00542.warc.gz
|
CC-MAIN-2021-43
| 442 | 2 |
https://iamsteve.me/tag/sass
|
code
|
Initially I thought it would be quite frustrating to get going with SVG, but after jumping in and seeing where I got it’s quite simple.
Sass has a handy feature for setting defaults for mixins and variables to override easily later. So how do you use it?
There are a lot of units of measurement in CSS. The em is a powerful unit you can use to efficiently scale elements.
An attempt at adding browser chrome to images without the need for extra markup.
I’m going to run through a few of my favourite mixins that I have come to rely on.
I have been recently trying to get a consistent look across my element mixin no matter the colour. That’s where scale-color comes in.
This mixin is one I’ve been using for a few months now to create buttons/anything with a particular style.
A selection of tips for those getting started with a Sass.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00122.warc.gz
|
CC-MAIN-2022-40
| 843 | 8 |
https://health-reporter.news/thailand-news-update-meeting-today-about-thailand-pass-and-local-restriction-updates/
|
code
|
Thailand News Update | Meeting today about Thailand Pass and local restriction updates
Big announcements today regrind Thailand’s Covid restrictions. There could be a tightening of the quarantine system and banning alcohol consumption in restaurants, currently the only premises you can legally consume alcohol. he Minister is also quoted as saying that “all returnees and arrivals from abroad will be quarantined”. Thailand’s local airlines are getting a cash injection as the Export-Import Bank of Thailand has offered up over 6.2 billion baht to keep them afloat and their planes in the sky. To help develop home-developed and manufactured Covid vaccines, the Stock Exchange of Thailand has donated 40 million baht to the Thai medical teams working on the vaccines. 2 vaccines are currently being developed at Chulalongkorn University, in separate departments and involving different partnerships.
#Phuketsandbox #NightlifeinThailand #testandgo #Thaiomicronupdate #TheThaiger #dailyThailandnews #todayThailandnews #newsinThailand #ThailandnewsinEnglish #Thaigernews #latestnewsinThailand #dailynewsinThailand #ThailandNews #Thailandrestriction
// Download Thaiger App
📱 MOBILE APP for iOS / Apple users: https://apple.co/3sFqPLU
📱 MOBILE APP for Android users: https://play.google.com/store/apps/details?id=com.TheThaiger.android&hl=en&gl=US
// Want more from The Thaiger family?
🔔 SUBSCRIBE to be notified of new content: https://www.youtube.com/thethaiger?suv_confirmation=1
🎁 JOIN to become a member: https://www.youtube.com/channel/UCfyWB_cTvCBWau8mFcMnJkQ/join
🔎 BROWSE to read the latest news: https://thethaiger.com
📢 ADVERTISE on The Thaiger: https://thethaiger.com/advertise
💬 THAIGER TALK FORUM to discuss news stories: https://thethaiger.com/talk/
📧 EMAIL for our daily newsletter: https://thethaiger.com/subscribe
👍 LIKE and FOLLOW our Facebook page: https://www.facebook.com/thethaigernews/
🐦 FOLLOW us on Twitter: https://twitter.com/ThaigerNews
📷 FOLLOW us on Instagram: https://www.instagram.com/thethaigernews/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306181.43/warc/CC-MAIN-20220129122405-20220129152405-00178.warc.gz
|
CC-MAIN-2022-05
| 2,071 | 16 |
http://www.cs.utexas.edu/users/novak/kiczales97.html
|
code
|
Aspects: cross-cutting features of a program that cannot be cleanly encapsulated as procedures: performance, memory management, synchronization, failure handling.
Programming languages provide mainly a single composition rule: procedure call. Aspects "follow such different composition rules and yet must co-compose."
Aspect-Oriented Programming (AOP) includes:
"AOP provides component and aspect languages with different abstraction and composition methods."
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396089.30/warc/CC-MAIN-20200528104652-20200528134652-00433.warc.gz
|
CC-MAIN-2020-24
| 459 | 4 |
https://forums.theregister.com/post/reply/3879637
|
code
|
"the problem is that nobody else made an alternative that gained any kind of wide-scale adoption"
That may be because the faults of SysV init, while real, aren't as serious as some people assert. Yes, having something better is desirable, but outside of some edge cases (for which there are alternate init systems that can be used), it's not really that big of a deal.
Also, in my opinion, systemd is worse than SysV overall anyway. It does improve some things, but brings so much badness along with it that it's not a good tradeoff.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176256.21/warc/CC-MAIN-20201124111924-20201124141924-00147.warc.gz
|
CC-MAIN-2020-50
| 533 | 3 |
https://dineshkumarkb.medium.com/?source=post_internal_links---------2----------------------------
|
code
|
I am sure most of you would have used pyinstaller for generating executables. This article does not cover what a pyinstaller is. However, the focus of the article will be on how to add external data files to your pyinstaller binaries and their use cases.
Usually, we generate a one file executable in pyinstaller using the following command.
$pyinstaller --onefile --clean <file_name.py>
Let’s say you have a help file for your application which needs to be packed along with your executable. Your application needs to read the file at runtime and display it to the user.
How do we do…
Security in your code is considered to be of paramount importance today, especially when we work remotely. We do a lot of proof-of-concepts, implement business logic with multiple libraries. Though most of them are open source, there could be vulnerabilities, license issues when we productize the code for commercial use. It is almost impossible to keep an eye on every single library and their possibility for commercial use. That’s why we have vulnerability scanners to make lives easier.
Ochrona security provides solution for validating dependencies of your python project.
Ochrona gives users access to a centralized web portal to manage…
Recently, I was given a task of refactoring our legacy command line application. I was thinking what more could we do to improvise a legacy command line application that’s working just fine.
Remembering the commands and their respective flags, optional parameters etc is bit hectic. Of course you could copy all the commands in a notepad and use ’em as needed. But that’s still annoying if you ask me.
So what did I do?
I came across this library called PyInquirer and
rich with which we could make colorful command line applications that are interactive.To …
Do you want to get over the regular monochrome command line? Interested in building visually appealing clis? …Or want to showcase your cli with cool enhancements? If you have any of these on your mind, then you should definitely try using python’s
Rich works on OSX, linux and windows platforms
≥ Python 3.6.1
pip install rich
Rich is a Python library for writing rich text (with color and style) to the terminal, and for displaying advanced content such as tables, markdown, and syntax highlighted code.
Without further ado, let’s start using the commands of the
I hope we all are familiar how plain Python classes work and their use cases. Python also provides an indirect way to implement immutable classes using namedtuples. Wait, why are we talking about
namedtuples here? Well, there is a reason why I am talking about them here.
For people, who are new to namedtuples please have a look here to understand more about it and it’s applications.
namedtuple is a container provided as part of the
collections module which has the same properties as a
tuple. The only difference is we can access the members of a
Pip has been the package installer for Python libraries for a long time. However, pip has a few limitations. We don’t have a single solution to download, install, package, build and publish in Python.
Traditionally we download and install dependencies using
pip in Python. However, we have to rely on
setuptools to build and distribute packages in Python.
We use the following commands to build a source distribution/binary distribution or a wheel file.
$python setup.py bdist
$python setup.py bdist_wheel
$python setup.py sdist
To publish to PyPI, we may have to use
twine. As just discussed, we don’t have a one-stop…
The most common mistakes we make in interviews are the most silly ones. Do you agree? This happens because we ignore the ones which we are quite familiar. During interviews, we prepare the most difficult data structure and algo questions and seldom give importance to fibonacci or prime number programs. However, sometimes we get stuck during interviews in these petty programs. This article is a refresher for fibonacci series generation using python.
🆗 Now, let’s cut to the chase!
pip is the package manager for python.pip can be used to install python libraries from PyPI. In other words,
pip is the
python. We use pip to install and manage python libraries that are not part of the python standard library.
Any python developer predeminantly uses
pip day in and out.However, the usage is limited to just install and occasionally upgrade.
This article is a consolidated non-exhaustive list of all the pip commands every python developer should know. This could be a reference for any future pip commands.
The install command is used to install the specified library…
Any Python application has to be packaged for a user to use it. Why package your application? Firstly, you may not want to expose your code directly to the customer. Secondly, your end-user may need a single executable or a binary file to use your application rather than digging along the script files.
If you have been working as Python developer for a while now, I am pretty sure you would have packaged your application into a binary or an installable file.The most common libraries we use are
py2exe etc. Although
pyinstaller is relatively more prevalent.
Command-line interfaces are quick and efficient tools to accomplish tasks. Not only that, but it’s also cool to have a command-line interface for any web application you develop to avoid having the end-user getting lost in the vast UI sitemap.
That’s why despite having a feature-rich console, aws has an amazing cli backed by its
botocore module doesn’t it?
If yes, then you should definitely read further.
We can build interactive and immersive command-line interfaces in python using
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991870.70/warc/CC-MAIN-20210517211550-20210518001550-00501.warc.gz
|
CC-MAIN-2021-21
| 5,689 | 53 |
http://forums.scottishfootballforums.co.uk/topic/22817-value-bet-checker/
|
code
|
I've created a new website - http://www.valuebetchecker.com/
It's an attempt at trying to use historical results to suggest odds for a particular scoreline. The odds could then be compared against the bookies to see if there is value.
It might not stay in it's current format. I'm just trying out an idea at the moment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891926.62/warc/CC-MAIN-20180123111826-20180123131826-00445.warc.gz
|
CC-MAIN-2018-05
| 319 | 3 |
http://windowssecrets.com/forums/showthread.php/106052-Dem-ol-CD-blues
|
code
|
Results 1 to 2 of 2
Thread: Dem ol' CD blues...
2008-02-26, 21:50 #1
Dem ol' CD blues...
Since as long as I can remember and with every PC and laptop I've had since CD writers were affordable, I've had this problem:
I put a blank CD in the drive, a window pops up and asks me what I want to do, and I select "Open writable CD folder using Windows Explorer".
I select the files to write, and click on "Write these files to CD".
The CD Writing Wizard does its stuff, and ejects the newly burnt CD.
I am then asked if I want to create another CD using the same files, which in this case I do (although the same problem occurs if I want to burn another CD in the same session) so I insert a new blank CD and click on Next.
After a few seconds of CD searching, another window pops up and tells me there is no CD in the drive (even if it has been sitting in there for several minutes) and ejects the CD drawer.
I close the drawer again, click Next, and burning progresses as if nothing had happened. (It also automatically starts without clicking Next once it sees the CD.)
So, why is the blank CD never recognised the first time, but is the second?
On this laptop (on which I'm busy burning 80 copies of a CD), I also have some Roxio thingy. Although it doesn't eject the CD, it does spend a considerable amount of time deciding what to do before running the burn and has a rather naff GUI which involves clicking on half a dozen buttons to do the same thing as the wizard. What should be a 35 second burn is taking over two minutes per CD <img src=/S/crazy.gif border=0 alt=crazy width=15 height=15>Leif
On UK time
2008-02-26, 23:19 #2
- Join Date
- Mar 2001
- New Jersey
- Thanked 11 Times in 11 Posts
Re: Dem ol' CD blues...
I've experienced the same thing and found that it's a bit faster if you don't put the new CD in until after the system tells you there isn't one. Seems to save some of the search time.
This "feature" is there to prevent you from burning 2 CDs at the same time. <img src=/S/grin.gif border=0 alt=grin width=15 height=15><IMG SRC=http://www.wopr.com/w3tuserpics/DocWatson_sig.gif>
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189903.83/warc/CC-MAIN-20170322212949-00342-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 2,101 | 22 |
https://www.emily-marsh-designer.com/charles-darwin-infographic
|
code
|
Evolution is a heavily debated theory on whether or not it’s true. Nowadays, people in school don’t remember much about Evolution, especially the man behind the theory, Charles Darwin. Charles Darwin was a very important scientist when putting together the theory of Evolution, however people don’t really know anything about him.
Create an infographic that talks about Charles Darwin. It can be mainly type based, fact based, or image based, as long as it educates people on Darwin’s life.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141177607.13/warc/CC-MAIN-20201124224124-20201125014124-00526.warc.gz
|
CC-MAIN-2020-50
| 498 | 2 |
http://dauntingfire.deviantart.com/journal/
|
code
|
I replied to someone's criticism of how the 'It Gets Better' movement was leaving out a large group of people being bullied. While I am not the best at speaking or writing I wanted to share my thoughts again here since the conversation was deleted:
Why do you have a problem with people bringing attention to it?
People are starving in Africa, animals are being mistreated everywhere, sex trafficking is a plague, children are still getting molested.
Awful shit happens in the world.
But that doesn't mean you should criticize the people who are trying to being attention to a cause they believe in.
If you feel like it's leaving people out then throw your support behind a program that does what you believe in OR start your own movement.
There are far better things you can do with your time than discourage people who are trying to make a difference. That's just kind of....awful, to be honest. I mean really, you're criticizing people trying to help others. Just because it's not the 'others' you care about doesn't mean they're not trying to do something good.
Considering how little good is done in the world why not just let them DO IT instead of telling them they're doing it wrong.
Not very eloquent but hopefully the idea came across.
Trufacts: I hate PETA. I find their methods and even some of their ideas (like putting down pets that need to be re-homed because they think it's more 'humane') repulsive. So I support the ASPCA and my local shelters.
Lets redirect negative feelings towards things like that and actually do something about something we care about instead, you know?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702127714/warc/CC-MAIN-20130516110207-00049-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,594 | 11 |
https://apps.alexandriava.gov/Calendar/?sc=311
|
code
|
Events & Public Meetings
|Nov 19, 2019||Tue||7:30 AM||Waterfront Commission Meeting|
Regular Monthly Meeting
|Nov 19, 2019||Tue||7:00 PM||Potomac Yard Metrorail Implementation Work Group|
The public is invited to attend the next Potomac Yard Metrorail Implementation Work Group (PYMIG) meeting, scheduled for Tuesday, November 19 at 7:00 p.m. in the Charles Houston Recreation Center Multipurpose Room. The City will provide updates on the Potomac Yard Metrorail Station project. Additional information about PYMIG, including past meeting ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496666229.84/warc/CC-MAIN-20191113063049-20191113091049-00315.warc.gz
|
CC-MAIN-2019-47
| 542 | 5 |
https://flylib.com/books/en/4.124.1.11/1/
|
code
|
This chapter's intention is to set the scene. I will do that by looking back in time over the last few years regarding how I have thought about different concepts and how my ideas have changed over time.
We will jump around quite a lot and cover a lot of ground, but the overall idea is to discuss values to value regarding architecture and processes for development.
On this journey, we will introduce and talk about many concepts that we will discuss in depth later on in the book.
Start the camera...Action!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488257796.77/warc/CC-MAIN-20210620205203-20210620235203-00148.warc.gz
|
CC-MAIN-2021-25
| 510 | 4 |
https://blogs.glowscotland.org.uk/glowblogs/eslbnew/2011/09/08/national-qualifications/
|
code
|
The National Qualifications Team is currently working to develop initial support for the new National Qualifications. We are also contintuing to support existing and revised qualifications. You can access our wide range of existing resources and support materials by going to our home page at: http://www.ltscotland.org.uk/nationalqualifications/index.asp
We also have Glow Groups to support staff delivering NQs you can find these at: https://portal.glowscotland.org.uk/establishments/nationalsite/National%20Qualifications%20Group/default.aspx. We are planning to redevelop these groups this year to encourage greater sharing of resources and ideas among practitioners delivering NQ courses.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300010.26/warc/CC-MAIN-20220116180715-20220116210715-00633.warc.gz
|
CC-MAIN-2022-05
| 693 | 2 |
https://radoncnotes.com/2020/08/27/academic-publishing-reform-peer-review-v/
|
code
|
I had been discussing opening up the data exchanges based on blockchains. There are enough legal safeguards to ensure that the data be kept in escrow, for example, while the scientists can collaborate effectively. One of the major spin-off benefits would be in the costs savings for the libraries.
Opening up the prepublication archives would help the universities or researchers with far lesser resources. Bulk of grants go towards the “fees” to make the “research open access”. Assuming that it costs around USD 10 for hosting the articles (based on very optimistic unreasonable assumptions), it would again free up the money for pursing more projects than a large chunk of money for fewer.
On our proposal, publication happens at the initiative of authors on one or more online archives of scientific publications. Insofar as journals continue to exist, they will create issues consisting of previously published articles. Since these are already publicly available, they will not be in a position to charge for access, so all journals will be open access (we expect these to be run mainly by academic societies rather than for-profit publishers, and to be fewer in number).Is Peer Review a Good Idea? | The British Journal for the Philosophy of Science | Oxford Academic
The journals provide “editorial inputs” (if any) and copy editing services. This, too, can be done locally that would still leave libraries with enough resources to have better trained personnel.
Data exchanges based on blockchain and raw-data in escrow has the potential to revolutionise academic publishing with a quicker turnaround time.Tweet
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499954.21/warc/CC-MAIN-20230202003408-20230202033408-00057.warc.gz
|
CC-MAIN-2023-06
| 1,632 | 5 |
https://www.blograby.com/the-air-application/
|
code
|
NativeApplication represents your AIR application. It belongs to the flash.desktop package and inherits from EventDispatcher. It is a singleton automatically created when the application launches. You can get a reference to it via the static property NativeAp plication.nativeApplication.
NativeApplication dispatches application-specific events such as invoking and exit ing and has application-specific properties such as icon and systemIdleMode. Some of its properties, created for AIR on the desktop, are not relevant to the mobile environment, such as activeWindow and openedWindows, because there are no multiple windows in this environment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00287.warc.gz
|
CC-MAIN-2023-40
| 647 | 2 |
http://farmdev.com/thoughts/on/26/gtac-2008/
|
code
|
Thoughts on GTAC 2008
back to all thoughts
Last year at the Google Test Automation Conference (GTAC) 2007, the talk by Atif was one of my favorites. He had been working on a system of model based testing for desktop GUI applications (affectionately called GUITAR) and hinted that he will be applying the work to web applications next. Now, at GTAC 2008, here is a taste of what his dept. has been up to. The talk is by Oluwaseun Akinmade and Prof. Atif M. Memon. Both are at University of Maryland.
The idea of automated model based testing hints at a future where software can be used to figure out how to test itself. That is, when software is modeled in a way that exposes inputs, outputs, event handlers, and end-points, then introspection can be done to find all possible interactions within an application and test them. Yes, it is one step away from artificial intelligence. This is fascinating to me but I think it still needs a lot of work. Atif is asking for as much feedback as possible from industry professionals to find out how this can best be used in the real world.
Here are my notes from the talk ...
This was one of the talks at GTAC 2008 that I was most looking forward to before the conference. It was excellent, I was not let down. The talk was given by Markus Clermont and John Thomas who work at Google. Since the talk was right after lunch they decided to take a Q & A approach. It sort of went off in tangents at points but overall the format seemed to work.
In my own work I've been struggling at maintaining a now bloated test suite for an AJAX website but their approach made something click in my head. I'm already working on a refactoring plan.
Here is my abbreviated interpretation of the talk ...
Google Test Automation Conference (GTAC) is my all-time favorite conference. It's free. It's on a single track — this means you don't miss any talks and everyone experiences the same journey of thought. Also, since you have to apply for admittance with a short essay, everyone who attends is really passionate about testing. It's still sort of "underground" which keeps it small and very social.
Last year, I made some kind of attempt to live blog summaries of the GTAC talks but I never made it past part 1. We'll see how far I get this year, stay tuned.
The videos for 2008 aren't online yet but check youtube often because last year they were up in less than a day.
The Future of Testing was the first talk of the GTAC 2008 conference on Thursday Oct 23rd given by James A. Whittaker, a very entertaining speaker who works for Microsoft. His talk was excellent and I highly recommend keeping a lookout for the video. Here are my notes...
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125532.90/warc/CC-MAIN-20170423031205-00472-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,672 | 12 |
https://www.slnova.org/paprescott/projects/191127/
|
code
|
1- When I hit setup, I only see a few turtles but there should be lots more.
2- the turtle movement is not what I expect, I want them to have a wiggle walk.
3- It's not supposed to have so many turtles! Why do I get more and more turtles?
4- Even with the transmission rate on the highest, not all are getting sick.
5- They aren't recovering, just getting sick and staying sick.
6- my graph isn't working.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528141.87/warc/CC-MAIN-20190722154408-20190722180408-00370.warc.gz
|
CC-MAIN-2019-30
| 405 | 6 |