url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.arrse.co.uk/community/threads/ipad-crashing.178615/
code
Is anyone else experiencing problems with IPad frequently crashing? It appears to be happening in all areas email, safari, apps. I'm on IPad 1 and the problems seemed to start when I upgraded the iOS to 5. I've done a quick check online and others have experienced similar problems, but no solution posted as yet. Hopefully iOS 5.1 will address the problem.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948532873.43/warc/CC-MAIN-20171214000736-20171214020736-00274.warc.gz
CC-MAIN-2017-51
357
1
https://www.verbaltovisualclassroom.com/forums/reply/4820/
code
Today I’m happier with the result. I made a sketchnote of the second talk. First I pick up words from the talk abstract and try to visualise them (vocabulary.jpg). After I made the title for the talk I pressed play and started drawing the talk. Didn’t press pause, so I am happy about that. (in_space.jpg) The structure was loose (I started without having any one particular in mind) so when I finished I made some sort of bubbles to have some kind of flow. (final.jpg) The next step would be to maybe add some colour.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711077.50/warc/CC-MAIN-20221206092907-20221206122907-00384.warc.gz
CC-MAIN-2022-49
522
2
https://www.linux.org/search/404655/
code
OK did all that and tried to print the test page, the behavior is the same, just stays on "processing". Printer works fine from my phone and Windows on same computer and other computers. Baffling. You know I have the Epson ET-2711 yeah? You think the 2710 driver should be fine?
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400244231.61/warc/CC-MAIN-20200926134026-20200926164026-00566.warc.gz
CC-MAIN-2020-40
278
2
https://www.reddit.com/r/Fixxit/comments/1v79vl/hesitant_starting_of_my_honda_ss/
code
I have had some issues with my Honda SS. First off the problem was it was getting too much petrol through the carb. At this point, nothing happened when I tried to start it, apart form petrol leaking from the cylinder head. To try and fix this, I bent the float a little bit so that the petrol level is a bit lower. After doing this and then trying to start it, it gave some puffs from time to time, but still won't start. I've been struggleing with this for quite some time, so any help is welcome.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743960.44/warc/CC-MAIN-20181118011216-20181118033216-00191.warc.gz
CC-MAIN-2018-47
499
1
https://form.jotform.com/203446913801048
code
RELEASE: I consent to the Minor's participation in the activities with Redemption Ranch, and hereby accept and assume all such risks, known and unknown, and assume all responsibility for the losses, costs, and/or damages following any injury, disability, disease, or death, even if caused, in whole or in part, by the negligence of Redemption Ranch and its Agents. I hereby release, discharge, and covenant not to sue Redemption Ranch and it Agents from all liability to me, the Minor, my and the Minor's personal representatives, assigns, heirs, and next of kin, for any and all claims, demands, losses, or damages on account of any injury to me or the Minor, including, but not limited to, death or damage to property, caused or alleged to be caused in whole or in part by the negligence of the Ranch and its Agents or otherwise. despite this release, I, the Minor, or anyone on the Minor's behalf, makes a claim against any of the Ranch or its Agents, I agree to indemnify and save and hold harmless the Ranch and its Agents and each of them from any litigation expenses, attorney fees, loss, liability, damage, or cost they may incur due to the claim made against any of the Ranch or its Agents named above, whether the claim is based on negligence or otherwise. LIMITATIONS: I expressly authorize my Minor Child to attend all Ranch-sponsored events. I understand that if I desire to limit my child's participation in any event, I must notify the Ranch of such limitation in writing and in advance of any event. SEVERABILITY: If any part of any provision of this agreement shall be invalid or unenforceable under applicable law, such part shall be ineffective to the extent of such invalidity only, without in any way affecting the remaining parts of such provision or the remaining provisions of this agreement. CONSENT: I have read this consent, release and waiver of liability, assumption of risk, and indemnity agreement, understand that by signing it I give up substantial rights that I and/or the minor would otherwise have to recover damages for losses occasioned by the Ranch or its Agents' fault, and sign it voluntarily and without inducement.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057504.60/warc/CC-MAIN-20210924050055-20210924080055-00050.warc.gz
CC-MAIN-2021-39
2,157
4
http://bradraulston.blogspot.com/2016/
code
Sunday, February 28, 2016 Back in the early 2000's, when I first started programming on the Microsoft stack, COM objects were all the rage. This of course had a side effect of something known as dll hell, where an application could change a version of a dll your application depended on, thus breaking your application in the process or causing subtle bugs that where hard to debug. .Net was supposed to change all of that with side-by- assemblies and versioning and for the most part that has worked well. Enter Nuget, nuget was intended to centralize project dependencies and libraries. So for example if you needed to parse JSON files in your application, you could locate a package that contained a JSON parsing library and add it. The reference to the nuget package could be easily shared across teams and build systems. The problem is that many of these libraries come with a proliferation of their own dependencies and in some cases those dependencies are older versions. A case in point, on a an application that I'm currently working on, I have a dependency on JSON.Net, I upgraded to the latest version 8.0.2 only to find out that another package that was referenced had a dependency on 6.0.0 so upgrading broke functionality in the other library (the other library BTW is a Microsoft Library). The eventual work around was a binding redirect in the app config. But this still points to a bigger problem that of library maintenance and vetting libraries that are available on nuget. No one to my knowledge vets these packages and updating certainly isn't enforced. So now we have come full circle in the dll hell story, we are essentially right back were we started in the COM days. Sunday, February 14, 2016 I have been a windows programmer for over 15 years and in that time I have worked with a number of development platforms from MFC to .Net. The Microsoft ecosystem is definitely a rich and evolving system, but this year I decided to branch out. I purchased a MacBook Pro and switched from windows to OS X. The hardware is incredible compared to the numerous Windows boxes I have had over the years. But more importantly is the ecosystem and how apps and hardware just work together. I have since purchased an iPhone and iPad and that is were the ecosystem shines. The sheer number of apps available on the Apple platform as opposed to the windows platform is incredible to a me as a long time Windows enthusiast. I have since started to learn iOS programming in both Objective C and Swift. Swift of course is my current favorite for learning and programming in iOS, it's power and elegance are defiantly a plus for anyone moving to the platform. Another thing that stands out and maybe it's my perception, but the development stack seems more uniform and unlike Microsoft, there is no conflicting messages regarding technologies. Honestly one of the things I've always hated about the Microsoft stack was the "Here today, gone tomorrow" uncertainty when it came to technologies and if you've developed in the Microsoft space for any amount of time you know what I mean. Right now I continue to learn and explore the Apple platforms and everyday is a new learning opportunity.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864191.74/warc/CC-MAIN-20180621153153-20180621173153-00216.warc.gz
CC-MAIN-2018-26
3,193
4
http://online-project-help42962.ka-blogs.com/3091607/top-programming-hw-help-secrets
code
A system that manages many of the existing and absent data of individuals Doing the job in an organization will help the business keep a tab on every single personnel. Finding out Details engineering became a massive headache,but matters became rather easy and fascinating With all the help from Sarfaraj . His amazing perform remaining no scope for errors and issues became quite more simple following that. Federal government and patent issuing agencies can use This technique for handling their organization better. They're able to hold a tab on every one of the patents issued from one point. This can be a one of a kind plan as a result among the finest java project Suggestions to work upon. Should you be looking at this information, this means we're obtaining issues loading exterior sources on our Web-site. - Homework is for suckers. Homework triggers worry for college students and for parents. Homework is extremely demanding and plenty of college students are paying out much a lot of hours just after school to accomplish their homework assignments. Even though, some college students could possibly whiz appropriate by way of their homework, other students crawl together having difficulties in a snail’s rate. This program helped me to put in writing my to start with video game and now it is finished. What else need to I remark? Dr. T is the best teacher, not even one of several, in hundreds if not thousands I've ever satisfied. I required 1 small modification : my SIM card needs a PIN code entered, only then it connects to your cellular community. A growing number of college students are investing plenty of away from school time on huge quantities of homework. The overabundance of homework is putting strain on the students, in conjunction with their moms and dads. Our nation has steadily centered on following school learning to the point of possible exhaustion.... [tags: Teaching Education Essays] :: 3 Is effective Cited 740 terms Mothers and fathers and academics should comprehend the theory of homework And exactly how it meant to operate in addition to understand how the get the job done is impacting the students; this controversial topics have to be regarded far more in an effort to change the situation that is occurring... [tags: schooling, pupils, usefulness, responsibility] :: ten Will work Cited 917 words Second, accomplishing homework can encourage the curiosity of researching; And eventually college students may perhaps comprehend greater and receive higher marks by way of accomplishing the homework the academics have assigned. For starters, homework is like a detector, Instructor can understand how learners are undertaking by way of examining The scholars’ homework.... [tags: Education, training, academics] 593 text Many thanks him a lot for the reason that he's not like Some others just dumping some stuff for income. He answered all my queries even after a week later on about my project handed about. Many thanks for his wonderful endurance in knowledge my unexpected emergency and swift reaction at need to have. If action 1 will not help or it can be not possible to have a maintenance window for this action, replace the module. This example output displays this page a failed endeavor: Enterprises need a program by which they could deal with their chain dining establishments. Use this platform for handling your business nicely. This one process takes in the assets undercount and uses them efficiently for organization administration. Educational facilities, colleges, and Universities will appreciate This technique. This distinctive java project Thoughts can perform as a single place of obtain for universities and colleges. They might get entire information connected with a pupil with fantastic ease.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515555.58/warc/CC-MAIN-20181022222133-20181023003633-00485.warc.gz
CC-MAIN-2018-43
3,777
14
http://rcdo21.ru/validating-xml-against-xsd-eclipse-27529.html
code
Validating xml against xsd eclipse I know I could create XML files and check them against an XSD in eclipse using JAXB. But I want to create something like this: I am not sure if you are the developer of the system or not but generally speaking it is the responsibility of the devs to write Unit Test (If you are a QA, remind them). Currently it seems that it is only validating against the web published version of the xsd. For example I have the following in my xml: In Eclipse the validation goes against the document located at: The XML editor will process XML files that are invalid or not well-formed. I will post my example, i think that will easy for other to reply so this xml is wrong but how do i validate xml against above mentioned xsd in eclipse. I'm somewhere in between dev and QA but more QA I think ;) It's good to see that my thoughts about Unit Tests seems a viable way but I dont think SOAP UI is a good way because of Continious Integration as even if it's possible to call SOAP UI via commandline or something like this I can then use java itself.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746227.72/warc/CC-MAIN-20181120035814-20181120061814-00350.warc.gz
CC-MAIN-2018-47
1,070
8
https://forums.masso.com.au/threads/limit-switches.723/
code
I have a similar issue. I want to wire 2 inductive prox. switches per axis. They can both serve as homing switches and limit switches. You will be telling the axis' which direction to home in so as long as they hit a sensor at the end of their travel, they will let the machine home. They can also double as limit switches too. I haven't decided if I will wire each set of 2 switches in parallel and connect each set of 2 to a single input on the Masso (X, Y and Z) or wire each switch to its own input on the Masso (6 inputs total) and assign them in software. I don't see anyadvantage to the latter. As far as NPN vs PNP, you can invert the normally Low/High signal state in the software so you should be able to use either sensor type with the Masso. I'm using these: PS-05N inductive proximity switches. They've worked very well for my first machine. Just mount the sensor where it will butt against metal parts on each axis, no need to add any optical disrupt as with optical sensors. Masso admin, please chime in here if you can comment on which method of connection might be better. The problem with a lot of the NPN proximity switches is they don't have built in pull up resistors in them. They output nothing when idle and nothing when triggered. In the case of the NPN switches I have when they are not active they output Power supply voltage, in my case 12 volts, and when they are triggered they drop to almost 0 volts. I'm lucky enough to have built in pull up resistors in my switches. If you don't have the built in pull up resistor in your NPN sensor you can add a 5.6K resistor from the positive of the sensor to the output and it should work as you want. You will need to invert the input in Masso as the normal state will be high changing to low when the switch is triggered. See the diagram below. The Masso inputs are opto isolators so they require a voltage of about 4 volts or more to see an input. You can apply 24 volts to the inputs but I suggest you use resistors in series to limit current. Not for the sake of the input but if you have 24 volt signal wires running around your system and you short one to ground you will short out the PSU but if you have a 5.6K resistor in series with the 24 volts it will still work and grounding it in error it will cause no problem. Looks like your post was hijacked by a rogue proxy sensor gang. Did you figure out how to solve your limit switch issue on your own? If not then here is some information to get you started. Take a look at the Homing Inputs topic in the documentation for details on how to hook up the homing switches (hard limit switch). Once you setup the homing switches you can set the soft limits in the setup page by entering the minimum and maximum travels for each axis. Masso explains how to enter the soft limits in the axis calibration section. You can add more limit switches at the other end of travel for each axis if you wire them in parallel but that is not really necessary. Hope this helps!
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662644142.66/warc/CC-MAIN-20220529103854-20220529133854-00444.warc.gz
CC-MAIN-2022-21
2,989
10
https://en.rikudesign.com/how-to-recover-textnow-account-without-email
code
How To Recover Textnow Account Without Email – Textnow is a mobile app that lets you send text messages and make phone calls using a virtual number. To use Textnow, users need to verify their accounts with a verification code. It is not possible to get textnow receive_verification_code for free from textnow://receive_verification_code because it is a paid service. Users must purchase a virtual number to use the service. Once the virtual number is purchased, users will receive a verification code via SMS or phone call to verify their account. How To Recover Textnow Account Without Email If the user encounters any problem while verifying the phone number, he can contact the Textnow support team for further assistance. However, let’s see how you can easily access the textnow receive_verification_code. How Do I Find Out What My Number Is On Textnow? It is impossible to get a free TextNow number lock because the service is paid and the virtual number is not free. Users must purchase a virtual number to use the service. A TextNow premium number is a phone number that has been upgraded to include additional features such as voicemail, caller ID, and call forwarding. These numbers may cost more than regular numbers, but they provide more features and convenience for users. Examples of TextNow premium numbers include numbers with high demand area codes or numbers selected by the user for their specific digits or patterns. How To Retrieve Deleted Text Messages On Androids TextNow can be used without WiFi if you have a cellular data connection. The app uses your device’s data connection to send and receive text messages and make phone calls. However, if you don’t have a cellular data connection or are in an area with poor cellular coverage, you won’t be able to use the app without a Wi-Fi connection. To set up my TextNow voicemail, you need to navigate to textnow://receive_verification_code. So if you don’t know how to send SMS now receive_verification_code , be sure to check out these steps: So since we discussed the textnow://recevoir_verification_code and now we want to learn more about the TextNow service, keep reading this guide: Overall, the TextNow service is unique in its combination of free and affordable options, use across multiple networks, and additional features that make it easy to stay connected across multiple devices. Can’t Login To My Textnow Account We hope you enjoyed our blog post on how to text anywhere in the world for free. Texting is a way to keep in touch with loved ones and keep track of your work. Texting is also fast, easy and cheap. You don’t need a data plan to use the text messaging service. Our blog post will help you learn how to verify textnow receive_verification_code for free and start texting now! سرویس يك مهه 15000 Tomans Buy سرویس شش مهه 12000 Toman per month Buy سرویس یک ساله 6900 Toman per month Buy Hello guys this is shahid 💙 HOW TO RECOVER DELETED TEXTNOW NUMBER 2020 | RECOVER OLD TEXTNOW NUMBER | BY SHAHID TRICKER TextNow get kaisy number recover kare 👇👇👇👇 How to install and download TextNow apps https://youtu.be/Elu5ybl47HM VIDEO LAST TAK JARUR DEKHNA (BINA SKIP KIYE) 💙LIKE SHARE OR SUBSCRIBE FOR MORE’ ‘ == ==================== 🌐Follow me here link 👇 🌍 Fb id👉 https://m.facebook.com/Shahidtrickerr Facebook Group👉 https://goo.gl/9nkoTU Instagram👉 https://goo.gl/GfaHKA Follow me here👆 Help page 👇 https://m.facebook.com/Shahidtrickers/ ======== ====== =============== 👉Lots of interesting videos👈👇 Full overload Facebook id https://youtu.be/CmmB_VsU-iw Styles social link on Facebook https: //youtu.be/wZqZiVa4 -TM 10 viral bio for facebook https://youtu.be/Sm4Xl6AZwHw Create invalid name id new trick https://youtu.be/wNvwgOV3m-c Login facebook id without password https ://youtu.be/Ux9xh-W7DJQ Facebook Check the best trick that works https://youtu.be/0jr4d0esdZ4 How to stop disabling the facebook id https://youtu .be/9j_dOPIGeiU Jungli long name creat karna sikho https://youtu.be/YUd-ipVuBb8 Change unlimited fb birthday date https://youtu.be/M-bEZtBcKTg Secure your facebook account for the disabled https://youtu.be/cf1ITEg5-LA Facebook blue badge, kese lagaye https://youtu.be/uGEjAjDxpgk Jungli spray name on facebook 👈👇 https://youtu.be/cg9ivDZkwLc Song name id banaye es video ko dekh kar👈👇 https://youtu.be/vz3TOxoPmaU How to open disabled facebook id https://youtu. be/lYldpY_kvc0 Facebook photo self problem solve https://youtu.be/dcH9fBYVK_0 Kisi bhi facebook deactivate ko account open kre https://youtu.be/wsP4HO5ED_Y Overlite ka baap https://youtu.be/ZIoNN6lqTiE unlimited gmail account without any phone number. – E Facebook logout problem just 2 minutes https://youtu.be/03O5tPjHaHc how to verify Facebook Id https://youtu.be /5M5Kl81yd2A How to create full invisible name id https://youtu.be /YI2yZ3hok4E How also create a jungli name https://youtu.be/zsr7Wk597l8 How to also create a name for a song I like https://youtu.be/vlg9sXFjw6U 👉———– — ————————————————————-👈 NOTICE OF NO -DISCLAIMER: This channel DOES NOT promote or encourage any illegal activity, all content provided on this channel is intended for EDUCATIONAL PURPOSES ONLY. Copyright Disclaimer Under Section 107 of the Copyright Act 1976 ‘fair use’ is permitted for purposes such as criticism, comment, reporting, teaching, scholarship and research. Fair use is a use permitted by copyright law that may be infringed. Non-profit, educational, or personal tips for using balance for fair use ======================== Follower Zarur krna 😘 Hindi shahidtricker Shahid Tricks How To Recover TextNow Old Number New Trick New Facebook Trick How To Recover Deleted TextNow Number Hindi How To Use TextNow Apps How To Get TextNow New Number 2020 How To Get TextNow Old Number Apps TextNow Old Number kaisy laye How to recover TextNow number unlimited time 2020 Get TextNow number kaisy recover kare How to recover old textNow number hindi دیدئو facebook recover textnow number account shahid remove deleted link open verification problem دیدئو karna lagayehttpsyoutubeugejajdxpgkjungli
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949644.27/warc/CC-MAIN-20230331144941-20230331174941-00381.warc.gz
CC-MAIN-2023-14
6,249
17
http://blogs.msdn.com/b/ericlippert/archive/2007/10/16/covariance-and-contravariance-in-c-part-one.aspx?PageIndex=1
code
Fabulous Adventures In Coding Eric Lippert is a principal developer on the C# compiler team. Learn more about Eric. I have been wanting for a long time to do a series of articles about covariance and contravariance (which I will shorten to “variance” for the rest of this series.) I’ll start by defining some terms, then describe what variance features C# 2.0 and 3.0 already support today, and then discuss some ideas we are thinking about for hypothetical nonexistant future versions of C#. As always, keep in mind that we have not even shipped C# 3.0 yet. Any of my musings on possible future additions to the language should be treated as playful hypotheses, rather than announcements of a commitment to ship any product with any feature whatsoever. Today: what do we mean by “covariance” and “contravariance”? The first thing to understand is that for any two types T and U, exactly one of the following statements is true: For example, consider a type hierarchy consisting of Animal, Mammal, Reptile, Giraffe, Tiger, Snake and Turtle, with the obvious relationships. ( Mammal is a subclass of Animal, etc.) Mammal is a bigger type than Giraffe and smaller than Animal, and obviously equal to Mammal. But Mammal is neither bigger than, smaller than, nor equal to Reptile, it’s just different. Why is this relevant? Suppose you have a variable, that is, a storage location. Storage locations in C# all have a type associated with them. At runtime you can store an object which is an instance of an equal or smaller type in that storage location. That is, a variable of type Mammal can have an instance of Giraffe stored in it, but not a Turtle. This idea of storing an object in a typed location is a specific example of a more general principle called the “substitution principle”. That is, in many contexts you can often substitute an instance of a “smaller” type for a “larger” type. Now we can talk about variance. Consider an “operation” which manipulates types. If the results of the operation applied to any T and U always results in two types T’ and U’ with the same relationship as T and U, then the operation is said to be “covariant”. If the operation reverses bigness and smallness on its results but keeps equality and unrelatedness the same then the operation is said to be “contravariant”. That’s totally highfalutin and probably not very clear. Next time we’ll look at how C# 3 implements variance at present. PingBack from http://www.artofbam.com/wordpress/?p=9267 I'd love to hear that there are plans for covariant return types in future versions of C#. That's something I've sorely missed from C++ (specifically for virtual methods in abstract class factories). Oh, and kudos for use of "highfalutin"; would have been more applicable to your series on regular expressions though I think ;-) Sorry to disappoint, but as I will discuss in part four or five of this series, odds are good that we are not going to get to covariant return types on virtual overrides in the hypothetical future next version of C#. We may, however, make certain variant reference type conversions legal. Hypothetically. @AdamM : it is possible to return a subclass from a virtual method override in C++. Isn't this what you were referring to? I think it's highly misleading to refer to types as being 'bigger' or 'smaller' than each other. They're not, in any canonical sense. They're supertypes and subtypes, and the subtype relation just happens to be a partial order -- and there are many other partial orders over types. It's like saying that sets are bigger, smaller, equal or not related to other sets simply because the relation of is-a-subset-of happens to be a partial order. Replacing 'bigger' and 'smaller' with 'supertype' and 'subtype' in the above article makes it an order of magnitude clearer and more obvious. No, it is not highly misleading. Your characterization of bigger/smaller is completely wrong in a world with variance in the type system. Let me be absolutely crystal clear on this: SMALLER does NOT mean "is a subtype of". Absolutely not. The whole _point_ of my introducing a new term rather than using an existing term is to call attention to the fact that they are different. Yes, a subtype is always smaller than its supertype, but introducing variance into the type system causes types which are NOT supertypes or subtypes of each other to have "smaller than" relationships. Conflating the two is wrong and misleading, which is why I was careful to not do so. Read the article more carefully. I never said that "smaller than" means "is a subtype of". Rather, I said that "smaller than" means "is assignment compatible with", which is very different in a world with variant types. If you still don't believe me, think about this. Is string smaller than object? Since C# supports covariant array types, yes it is. You can store an object of type string in a variable of type object. Now, answer me this: is string a subtype of object? Absolutely not! string's base type is System.Array, not object. C# implements variance in two ways. Today, the broken way. Ever since C# 1.0, arrays where the element No, string is not smaller than object... because arrays have bidirectional data transfer they are neither covariant nor contravariant. The fact that C# treats array types as covariant breaks type safety and forces runtime type checks on array store operations, which would not otherwise be necessary. Now IEnumerable<string> is, using your terminology, smaller than IEnumerable<object>... But there is also a subtype relationship present. There is not "derivation" in the .NET sense, but it IS a subtype. The fact that base type/derived type is no longer the only relationship that creates supertype/subtype status is why variance with generics is so important. Ben, apparently you and I are using the same terms in different ways. I am doing my best to be precise here. Let me state this again so as to be sure I am clear. 1) I am defining "covariant"/"contravariant" as "preserving/reversing a smaller-than relationship between types". You are defining them to mean something else -- I think you are defining them to mean "preserving/reversing a smaller-than relationship between types in a guaranteed-at-compile-time-typesafe manner" Now, you are free to define those words any way you like, but that is not the standard way of defining "covariant" and "contravariant". For the rest of this series, I will stick with my definition. 2) I am defining "smaller" as "assignment-compatible in the CLR type system". You are defining "smaller" to mean something else, since you are claiming that string is not smaller than object but IE<string> is smaller than IE<object>. Neither of those claims are true in the CLR today for my definition of "smaller", so therefore you must either be mistaken or you have some different definition of "smaller". I'm not sure what your definition of "smaller" is exactly, though again, it appears to have something to do with the ability to determine type safety at compile time. Again, you are free to use any definition of "smaller" you want, but this is the definition I have chosen for the purpose of this series of articles, so for the rest of this series, we'll stick with that. And finally, you and I are using "subtype" to mean different things. By "subtype" I mean "is on the transitive closure of immediate base type". I am not sure what your definition of "subtype" is. Your argument that array covariance in CLR/C# leads to runtime checks is entirely correct, as I pointed out in today's article. But that there are cases where this is broken does not mean that it is not covariant. Again, you are free to define "covariant" as "guaranteed type safe covariant" if you want to. That is not how I am defining "covariant" for the purposes of this series of articles. > I am defining "smaller" as "assignment-compatible in the CLR type system". Thank you for finally defining this term. That helps tremendously. You're welcome. I thought though that I had defined it already, in boldface. "At runtime you can store an object which is an instance of an equal or smaller type in that storage location." I had the same misunderstanding tonight as other readers. In the literature I've read on type theory for programming languages, writers often take a type to be a set of values (that is, a subset of the set of all possible values), so when you started saying things like "T is bigger than U" I assumed you were talking about set containment, especially since you gave it the properties of a partial order (so we knew you weren't talking about cardinality.) When I came to your comment "At runtime you can store an object..." I took it as an important (hence the boldface) comment about the C# runtime system, but not a definition. Welcome to the Thirty-Fourth issue of Community Convergence. This is a time when the team is in transition. you can take a look at my post here: I've written a small example where covariance problems are clear. I didn't know about all that theory before a kind contributer sent me here :-)
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398451648.66/warc/CC-MAIN-20151124205411-00116-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
9,139
45
https://aigb.network/our-services
code
Our newest offering, providing perpetual and subscription-based digital software as an authorised reseller from Microsoft to small businesses. You'll be able to purchase digital subscriptions as part of our Cloud service offering, as well as digital gift cards as part of a trial. Looking for new and secondhand items? Why don't you head over to our UK eBay store! Various new/used items will be available to buy. A new service in the making, aigb Essentials aims to provide simple yet useful online storage, mailbox and cryptocurrency solutions.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036176.7/warc/CC-MAIN-20220625220543-20220626010543-00667.warc.gz
CC-MAIN-2022-27
546
8
http://parenting.stackexchange.com/questions/tagged/allergies+shopping
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Should we use special detergent/washing powder for the laundry of baby clothes? (UK) Any suggestions/experiences of the best characteristics for a baby clothes detergent would be appreciated. We are in the UK, in case that influences the options we should look for. Jan 26 '12 at 16:06 newest allergies shopping questions feed Hot Network Questions Harry Potter - Why do acts of "accidental" magic only seem to happen around Muggles? If dna has a half life of about 500 years, how can old seeds be planted? integrals proving equality Analog Clock or Digital Clock to tell the time Reconciling results from Fourier with those form FourierTransform How should I tell a coworker their headphones are too loud? "command not found" when using arithmetic expansion in bash shell Line breaks of math expressions in subfloat environment "people don’t know what they want until you show it to them" Why `time` command doesn't work with any option? Birthday paradox with a (huge) twist: Probability of sharing exact same date of birth with partner? Reusing AES-CTR Keys and IVs for File Encryption Template Tag not available in real Cron Jobs How can I prevent that my users get a certificate issued for my domain on my behalf? Ctrl+L in terminal Introductory References for Geometric Representation Theory Logging in Apps, where, and what other options do I have Are there drawbacks between reading stories from ebooks rather than paper books? What is the military term for fighting the enemy without permission? Is a separate thread for game loop compulsory for simple games? Why does a candle blows out when we blow at it? Our breath is also 16% oxygen and only 4% CO2 Why electronegativity difference greater than 1.7 are ionic? In the movies, is Sauron's armor correctly portrayed? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Overflow Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678698575/warc/CC-MAIN-20140313024458-00058-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
2,416
51
https://windowsforum.com/threads/windows-7-permissions-bug.20355/
code
I am not sure whether or not this is a bug or a virus/malware, but my gut says bug. I think that way because running malwarebytes and hijack this reveals nothing out of the ordinary whatsoever....no viruses or malware are detected. The issue basically is that I cannot open files or run certain programs. I have a bunch of jpegs on the desktop, for instance. Try to open one and I get the message "Windows cannot access the specified device, path or file. You may not have the appropriate permissions to access the item." The same goes for an mp3. Curiously enough I can open torrent files and word documents, or even text documents. I can open folders, but not stuff within them. The odd part is the programs that choose to run and those that do not. AIM, Yahoo messenger, winamp, office 2007, all work. But virtualdubmod, photoshop, jasc animation shop, do not. Just seemingly very random, don't you think? I have tried changing permissions to no avail, although I may be doing it wrong. The only fix seems to be using system restore, although for some reason that "wears off" after a few hours and the problem returns. I also cannot change anything in User Accounts under control panel. I'm running Windows 7 Build 7100 and everything else on this PC seems to be normal. I'm posting this via Firefox, which works fine. I can type and save in Word, chat on messenger, listen to music....but using Photoshop is out! Any suggestions?
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320869.68/warc/CC-MAIN-20170626221252-20170627001252-00609.warc.gz
CC-MAIN-2017-26
1,433
1
http://paknbox.com/tips/electronics.htm
code
- Refer to the manufactures' guide or user's guide for special moving instructions. If you no longer have a user's guide, visit the manufacturer's website for an online version or to request a copy. - If any piece of equipment has a toner or ink cartridge, remove it and store it in a sealable bag. Pack the bag in the same box with the piece of equipment that it was removed from. Also remove all CDs, DVDs, VHS tapes or other media from equipment. Pack media separately and carefully to prevent damage. Note: Some computer manufacturers recommend leaving a floppy disk in the A-drive to prevent drive damage. - If you have the original packaging, including box, use that to pack the equipment. - Before disconnecting any wires or plugs, mark the wire or cable and the port you're removing it from with the colored labels. Color code the ports and cables so you can reconnect them later. If you run out of different colors, you can also write a number on the label that will match the port and the cable. - Once you have the wires or cables disconnected, use twist ties to carefully secure the cables so they don't unravel. - Place the cables and wires into a sealable bag (For example, Ziplock baggies) and tape it to the piece of equipment. - When packing electronics, you should always use antistatic packing bubbles or popcorn. Never use materials that will conduct electricity. This could damage your electronics during handling. - Remove all parts that can be disconnected. Wrap each piece separately in antistatic bubble wrap and secure ends with tape. - Use a thick layer of antistatic packing popcorn or bubble wrap to line the bottom of the box. - Place the largest piece of equipment on the bottom. Fill holes with antistatic packing material. Place smaller protected items on top. - Fill all remaining spaces with antistatic packing material. Make sure nothing rattles or will shift during the move. - Seal the box with packing tape and mark it "Fragile" and indicate which end is up. Indicate the contents and which room it belongs in. - Note: CDs and software can not tolerate high temperatures. If you have sensitive media, you may want to carry it with you.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190234.0/warc/CC-MAIN-20170322212950-00573-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
2,174
15
https://api.highcharts.com/highcharts/exporting.menuItemDefinitions
code
These pages outline the chart configuration options, and the methods and properties of Highcharts objects. Feel free to search this API through the search bar or the navigation tree in the sidebar. An object consisting of definitions for the menu items in the context menu. Each key value pair has a key that is referenced in the value, which is an object with the following properties: onclick: The click handler for the menu item text: The text for the menu item textKey: If internationalization is required, the key to a language string Custom text for the "exitFullScreen" can be set only in lang options (it is not a separate button).
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474649.44/warc/CC-MAIN-20240225234904-20240226024904-00427.warc.gz
CC-MAIN-2024-10
639
10
https://forum.figma.com/t/how-to-apply-an-anchor-interaction-from-an-overlay/18699
code
Hi, is it possible to apply a "scroll to" interaction from an Overlay to a section on the main page/frame? Let me try to explain: So, when the user hovers over an item, a pop-up overlay should appear. On this said overlay the user should be able to click on a button and then be anchored (scrolled) down to a specific point on the same page. When I want to add a "scroll to" interaction to the button located in the overlay the only layers available for selection are the ones of the overlay, so I cannot select a point on the main page/frame Am I missing a step or does this not exist? TL;DR: How to apply an anchor interaction from an Overlay
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103989282.58/warc/CC-MAIN-20220702071223-20220702101223-00680.warc.gz
CC-MAIN-2022-27
644
8
https://community.esri.com/t5/arcgis-enterprise-questions/i-have-geo-spatial-data-in-csv-geojson-shapefile/td-p/696222
code
We have geospatial data of approx 5 millions road segments. That we want to publish as WMS service using ArcGIS Server. We can generate output in any of the ArcGIS compatible format (csv, geojson, shapefile etc.). Our data is located in Microsoft Azure data bricks platform. How to access Azure data bricks from ArcGIS Desktop and publish it as WMS Service ?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100327.70/warc/CC-MAIN-20231202042052-20231202072052-00395.warc.gz
CC-MAIN-2023-50
358
1
https://guigarage.com/javafx-themes/
code
Some of the open source projects I’m working on are themes and skins for JavaFX. By using these themes a JavaFX application can be styled without handling CSS or custom controls. Here is a list of the themes that I’m currently working on: All the themes that I’m currently working on are based on the same architecture and structure: The main goal of the themes is to provide a consistent look and feel for all default JavaFX controls. Therefore a theme contains a CSS file that defines the skin for each control type. In addition the themes contains Java skin classes that define some specific behavior or used animations. A developer that wants to use a theme only needs to call a style method in the facade class of the theme. Here is an example how the AquaFX theme can be set for a JavaFX application:
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370509103.51/warc/CC-MAIN-20200402235814-20200403025814-00310.warc.gz
CC-MAIN-2020-16
812
3
https://blog.joaopedromartins.net/2011/05/
code
I’ve had several situation with large solutions in VS2010 where assemblies get locked and references need to be constantly fixed, failing compilations. I would get errors when copying the DLL’s from the OBJ into the BIN folders, or even copying a schema assembly into the bin folder of the maps project which uses it. One “detail” (or not) was that the BizTalk and C# projects in the solution where upgraded from previous versions (BTS2004). Using SysInternal’s Handle.exe tool, I found it was Devenv itself locking the assemblies. I’ve tried several solutions that didn’t work, including: - disable vs extensions - stop windows indexing service - make sure Copy Local is set to True in all the references - the same fix that was used with VS2008+BTS2009 (documented here) of setting Private True in the project file; - adding the the famous GenerateResourceNeverLockTypeAssemblies config in the project files (documented here, see Benson’s response). What eventually solved the issue was a variation of the first solution Benson gave in the previous link, and which is documented here in a StackOverflow response by Godeke: code a small command line tool (VisualStudioLockWorkaround) that removes locks and which you add as a pre-build script to the troublesome VS projects. It’s ugly, but it solved my problem, after some hours of trying to figure out what was happening.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335303.67/warc/CC-MAIN-20220929003121-20220929033121-00222.warc.gz
CC-MAIN-2022-40
1,391
9
http://www.sevenforums.com/graphic-cards/240268-windows-7-aero-randomly-stopped-working-3.html
code
Hi so I'm new to this site but I am actually experiencing a very similar problem on a brand new machine I just built a couple of weeks ago (I added the specs to my profile and am running Windows 7 Pro 64-bit - but it definitely is Windows Aero compatible). Whenever I boot Windows from a complete shutdown my Aero/Transparency isn't available as an option. I will restart the DWMS and it works for a few seconds before reverting back to disabling Aero and not letting me change it back. I run the troubleshooter and it doesn't identify the problem. I also ran sfc /scannow and it finds no errors (even after running at least 3 times - I've attached the file here). It seems the only way to "fix" the problem is to restart the computer (restart, not shut down and turn back on) once it's turned on. Then it seems to miraculously fix for a long time. I'm not sure what could be the issue. Any help would be great!
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400379320.39/warc/CC-MAIN-20141119123259-00092-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
911
3
http://www.mintjoomla.com/support/community-forum/user-item/1024-stblink/48-cobalt-8/2269-increase-favorites-functionality.html
code
When a user adds a record to favorites all of them go into 1 place. But would love to see in cobalt something like Fiverr has which they call it gigs. example here Basically the user is allowed to organize the favorites into categories created by them. This would open the door for something like a favorites module... like "this user also recommended" and "see what other users like" Fiverr allows also to see lists of collections created by the users (ex: best 3d designers) with votes (+1), although the feature to organize favorites into categories (and also an option to the user set the favorites public/private) would be enough.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320301670.75/warc/CC-MAIN-20220120005715-20220120035715-00599.warc.gz
CC-MAIN-2022-05
635
5
https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2013/ms13-045?redirectedfrom=MSDN
code
Microsoft Security Bulletin MS13-045 - Important Vulnerability in Windows Essentials Could Allow Information Disclosure (2813707) Published: May 14, 2013 | Updated: May 15, 2013 This security update resolves a privately reported vulnerability in Windows Essentials. The vulnerability could allow information disclosure if a user opens Windows Writer using a specially crafted URL. An attacker who successfully exploited the vulnerability could override Windows Writer proxy settings and overwrite files accessible to the user on the target system. In a web-based attack scenario, a website could contain a specially crafted link that is used to exploit this vulnerability. An attacker would have to convince users to visit the website and open the specially crafted link. This security update is rated Important for Windows Writer when installed on all supported editions of Microsoft Windows. For more information, see the subsection, Affected and Non-Affected Software, in this section. The security update addresses the vulnerability by correcting the way Windows Writer handles URL parameters. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information. Recommendation. Microsoft recommends that customers apply the update at the earliest opportunity. See also the section, Detection and Deployment Tools and Guidance, later in this bulletin. Knowledge Base Article |Knowledge Base Article||2813707| Affected and Non-Affected Software The following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle. |Operating System||Maximum Security Impact||Aggregate Severity Rating||Updates Replaced| |Windows Essentials 2011||Information Disclosure||Important||None| |Windows Essentials 2012\ (2813707)||Information Disclosure||Important||None| There is no update available for Windows Essentials 2011. See update FAQ for details. This update is available for download only. Where is the update for Windows Essentials 2011? There is no update available for Windows Essentials 2011 because Microsoft recommends that all customers using this version upgrade to Windows Essentials 2012. Windows Essentials 2012 is available from the Windows Essentials download page. What can I do if I cannot upgrade my version of Windows Essentials? Customers who cannot upgrade their version of Windows Essentials can disable the Windows Writer handler. For more information on how to disable the Windows Writer handler, see the workaround in the Windows Essentials Improper URI Handling Vulnerability - CVE-2013-0096 section. I am using an older release of the software discussed in this security bulletin. What should I do? The affected software listed in this bulletin have been tested to determine which releases are affected. Other releases are past their support life cycle. For more information about the product lifecycle, see the Microsoft Support Lifecycle website. It should be a priority for customers who have older releases of the software to migrate to supported releases to prevent potential exposure to vulnerabilities. To determine the support lifecycle for your software release, see Select a Product for Lifecycle Information. For more information about service packs for these software releases, see Service Pack Lifecycle Support Policy. Customers who require custom support for older software must contact their Microsoft account team representative, their Technical Account Manager, or the appropriate Microsoft partner representative for custom support options. Customers without an Alliance, Premier, or Authorized Contract can contact their local Microsoft sales office. For contact information, see the Microsoft Worldwide Information website, select the country in the Contact Information list, and then click Go to see a list of telephone numbers. When you call, ask to speak with the local Premier Support sales manager. For more information, see the Microsoft Support Lifecycle Policy FAQ. Severity Ratings and Vulnerability Identifiers The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the May bulletin summary. For more information, see Microsoft Exploitability Index. |Affected Software||Windows Essentials Improper URI Handling Vulnerability - CVE-2013-0096||Aggregate Severity Rating| |Windows Essentials 2011||Important \ Information Disclosure||Important| |Windows Essentials 2012||Important \ Information Disclosure||Important| Windows Essentials Improper URI Handling Vulnerability - CVE-2013-0096 An information disclosure vulnerability exists when Windows Writer fails to properly handle a specially crafted URL. An attacker who successfully exploited the vulnerability could override Windows Writer proxy settings and overwrite files accessible to the user on the target system. To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2013-0096. Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation: - In a web-based attack scenario, an attacker would have to host a website and convince a user to click on a specially crafted URL in order to exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. Workaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality: Apply the Microsoft Fix it solution, "Disable the Windows Writer" that prevents exploitation of this vulnerability See Microsoft Knowledge Base Article 2813707 to use the automated Microsoft Fix it solution to enable or disable this workaround. Impact of workaround. Users who have configured their systems with this workaround will be unable to process Windows Writer handler requests that would normally launch Windows Writer. What is the scope of the vulnerability? This is an information disclosure vulnerability. What causes the vulnerability? The vulnerability is caused when Windows Writer fails to properly handle URL parameters. What is Windows Essentials? Windows Essentials is a suite of products available in one easy download. The suite includes Photo Gallery, Mail, Movie Maker, Writer, Family Safety, Bing Bar, and Microsoft Silverlight. What is Windows Writer? Windows Writer is a client application for Windows that provides users with a way to create, update, and manage blog content online. The application is part of the free Windows Essentials software suite, which includes several applications (such as Messenger, Mail, Photo Gallery, and Movie Maker) that perform common tasks in the consumer space. What might an attacker use the vulnerability to do? An attacker who successfully exploited this vulnerability could override Windows Writer proxy settings and overwrite files accessible to the user on the target system. How could an attacker exploit the vulnerability? For this vulnerability to be exploited a user must open Writer using a specially crafted URL. In an email attack scenario, an attacker could exploit the vulnerability by sending an email message containing the specially crafted URL to a user and by convincing the user to click the specially crafted URL. In a web-based attack scenario, an attacker would have to host a website that contains a specially crafted URL. In addition, compromised websites and websites that accept or host user-provided content could contain specially crafted content that could exploit this vulnerability. An attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes them to the attacker's website, and then convince them to click on the specially crafted URL. What systems are primarily at risk from the vulnerability? Systems with Windows Writer installed are at risk. What does the update do? The update addresses the vulnerability by correcting the way Windows Writer handles URL parameters. When this security bulletin was issued, had this vulnerability been publicly disclosed? No. Microsoft received information about this vulnerability through coordinated vulnerability disclosure. When this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited? No. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued. Detection and Deployment Tools and Guidance Manage the software and security updates you need to deploy to the servers, desktop, and mobile systems in your organization. For more information see the TechNet Update Management Center. The Microsoft TechNet Security website provides additional information about security in Microsoft products. Windows Essentials 2012 is available from the Windows Essentials download page. Security Update Deployment For information about the specific security update for your affected software, click the appropriate link: Windows Essentials 2012 The following table contains the security update information for this software. |Security update file name||Windows Essentials 2012:\ wlsetup-all.exe| |Installation switches||Not applicable| |Restart Requirement||This update does not require a restart. However, if required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart.| |Removal Information||This update cannot be uninstalled.| |File Information||See Microsoft Knowledge Base Article 2813707| |Registry Key Verification||Note A registry key does not exist to validate the presence of this update.| Microsoft thanks the following for working with us to help protect customers: - Andrea Micalizzi, working with Beyond Security's SecuriTeam Secure Disclosure team, for reporting the Windows Essentials Improper URI Handling Vulnerability (CVE-2013-0096) Microsoft Active Protections Program (MAPP) To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please go to the active protections websites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners. How to obtain help and support for this security update - Help installing updates: Support for Microsoft Update - Security solutions for IT professionals: TechNet Security Troubleshooting and Support - Help protect your computer that is running Windows from viruses and malware: Virus Solution and Security Center - Local support according to your country: International Support The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. - V1.0 (May 14, 2013): Bulletin published. - V1.1 (May 15, 2013): Corrected link to the download location in the Detection and Deployment Tools and Guidance section. This is an informational change only. Built at 2014-04-18T13:49:36Z-07:00
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00108.warc.gz
CC-MAIN-2023-50
13,096
87
https://www.distributorinforceinnovation.com/segmentation
code
Segmenting Your In Force Life Book Prioritize the most important clients and policies Create more manageable list sizes for deeper analysis Allocate different segments to your sales & support staff members Share segmented lists with your Agents SEGMENT YOUR BOOK TO CREATE CUSTOM LISTS Use the policy grid to create custom lists. Access the policy grid, segment the policies based on specific preferences including policies, policy status, products, Carriers, etc. Sort using column headers Add/hide columns using the Settings icon Save segmented policies as lists Pre-defined lists can be accessed using the Insights link on the left menu bar. Clicking on the blue values will open up the lists where you can view details. Lists are manually created groupings of records with similar attributes created by users and can be managed from the Lists link located on the left menu bar. Use the column headers to sort the list. The list values will first sort in ascending order. Clicking on the headers the second time will sort the values in descending order. There are 3 types of lists: i) Policy Lists: these are lists of individual in force ii) Client Lists: these are lists of individual clients or iii) Network Lists: these are lists of Agents and firms in Different types of lists will have different attributes and columns of data. Lists can be renamed or deleted using the kebab menu under the Action column (located on the right). Lists are static as of the date created unless edited manually by the user. Click on the List Name to view details. ADDING A NEW RECORD TO AN EXISTING LIST To add a new record to the list select Add Record and search for the record that you would like to add If adding a record to a Policy list, you can search for the new record using the policy number If adding a record to a Client list, you can search for the new record using the client name If adding a record to a Network list, you can search by the name of the Agent or firm DELETING A RECORD FROM AN EXISTING LIST To remove a record from a list select the record or records by checking the box to the left of the name and click on Remove Record(s). DOWNLOADING A LIST INTO A .CSV To download a complete list into a .csv, click on the list name and then click on Download Full List. The downloaded .csv file will appear in your Downloads folder on your computer. SHARING LISTS WITH YOUR AGENTS Sharing a list with your Agents is secure as no confidential information is sent over the internet. Each Agent receives an email notification that a list has been shared with them and is available to them, but they are required to log into NIC to see the list. If the list contains policies for multiple Agents, each Agent will only see the policies assigned to them (where they are the writing or servicing Agent assigned to the policy by the Carrier). From the Lists page, click on the kebab menu under the Actions column (located at the far right) and click on Send to agents A pop-up window will open. Select the Also send the agent an email notification box if you would like your Agents to receive an email alerting them about the list you are sharing with them Type in any message you would like to share with your Agents Click Send List If you have selected the Also send the agent an email notification box in the pop-up window, your Agents will receive an auto-generated email from NIC The notification emails are only sent to Agents with email addresses on NIC The notification email will contain your name as the user sharing the list, and also a link to the Agent App so the Agent can click on it to get direct access to the Agent App Login page, where they can see the shared list LOG IN link appears for Agents already on NIC platform and will take the Agent to the NIC Advisor App login page JOIN US link appears for Agents who are not on NIC platform but are part of your list. If they wish to subscribe to the NIC Advisor App all they have to do is click on Join Us and complete the short onboarding process
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510501.83/warc/CC-MAIN-20230929090526-20230929120526-00079.warc.gz
CC-MAIN-2023-40
4,014
47
https://play.google.com/store/apps/details?id=com.rmpi.creader
code
So much to add. So much to fix. Cant even read the files i've paid to download. Why do you make it so that people cant read on other devices eventhough it's their account? Now i cant read files on my phone and i cant see if i can read it or not on my pc. I pay for the file smh I don't dislike it, I hate it. I've spent money on something that barely works. I can tolerate if an app is not cross platform synchronized, developer might have difficulties making app they're not capable of, but using the same account across devices with the same platform and it still doesn't synchronize, that's beyond ridiculous! You might as well take the site down, it doesn't contribute any good to the users. PT. RUMPONPIN INDONESIA , menawarkan produk yang tidak baik. sudah deposit, dan membeli buku /e-book , ternyata tidak bisa dibuka dan dibaca. Semoga tantangan ini menjadi peluang. Aamiin. Terima kasih sudah memberikan ujian. Wassalam, Permana I paid for a single blank bookpage Great App ! Recommended app for e-book lovers. Looking forward to see more reading collections at Rumponpin Reader. cool this app is so cool bro... 1. All new UI. 2. More easy to view books with some category. 3. Able to download multi books on one time. 4. Tap and hold to highlight some texts 5. Able to add notes, just click the pen icon. 6. Supported Audio and Video playback. Ebook reader. Multi-format, highly customizable. Supports cloud synchronization. A world-class reader for Adobe DRM protected (and DRM free) EPUB and PDF ebooks.
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424770.15/warc/CC-MAIN-20170724082331-20170724102331-00360.warc.gz
CC-MAIN-2017-30
1,516
14
https://e2e.ti.com/support/audio-group/audio/f/audio-forum/1068145/tas2505-q1-current-of-tas2505-q1-driving-2-5w-4-horn
code
Other Parts Discussed in Thread: TEST I use tas2505-q1 to drive a 4 Ω / 2.5W horn. Spkvdd provides 5V power supply and iovdd provides 3.3V power supply, because the IIC and IIS of SOC I use are 3.3V voltage. So what is the current of 5V and 3.3V respectively?What are the currents in the figure below? Ityp and IMAX. thank you!
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662561747.42/warc/CC-MAIN-20220523194013-20220523224013-00345.warc.gz
CC-MAIN-2022-21
328
2
https://mercerlab.cfaes.ohio-state.edu/people/hannah-scheppler
code
Hannah is interested in utilizing niche theory to help discover beneficial genes from crop wild relatives. They are currently working on a chile pepper pathogen system. Their dissertation work involves niche modeling, population ecology, plant pathology, and genomics. M.S. Biology, Miami University, Ohio, 2019. Thesis: Modeling the climatic niche of wild Carica papaya B.S. Biology, Bowling Green State University, Ohio, 2017. Honors Research Project: Genetic characterization of the sex linked intron CHD1 in Magellanic penguins Graduate Research Fellow, The Ohio State University. 2020. Teaching Assistant, Field Botany, Intro to Biol., Plant Evolution; Miami University, Ohio. 2017-2019. Research Assistant, Lake Erie Center, University of Toledo. Sampled, extracted, and performed PCR on eDNA in water samples from over 60 bait shops. 2016-2017. NSF REU Scholar, University of Toledo. Sampling water and extracting eDNA from wild water sources. 2016. Research Assistant, Laboratory of Evolutionary & Conservation Genetics, BGSU. PCR, cloning, Sanger sequencing, and phylogenetics. 2014-2017. Snyder, M.R., Stepien, C.A., Marshall, N.T., Scheppler, H.B., Black, C.L., and Czajkowski, K.P. 2020. Detecting aquatic invasive species in bait and pond stores with targeted environmental (e)DNA high-throughput sequencing metabarcode assays: Angler, retailer, and manager implications. Biological Conservation, 245: 108430. https://doi.org/10.1016/j.biocon.2020.108430 Hibbets, E.M., Schumacher, K.I., Scheppler, H.B., Boersma, P.D. and Bouzat, J.L. 2020. Genetic characterization of hybridization between Magellanic (Sphensicus magellanicus) and Humboldt (Spheniscus humboldti) penguins in the wild. Genetica, 148: 215-228. https://doi.org/10.1007/s10709-020-00106-2
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046152112.54/warc/CC-MAIN-20210806020121-20210806050121-00100.warc.gz
CC-MAIN-2021-31
1,766
12
http://www.homebrewtalk.com/showthread.php?t=194971
code
I was horrified to see that I had naught but 2 row and northern brewer hops. I thought that I had a pound of crystal 40 around. So 1/2 way through the mash, I took out 2 cups of the 2 row and SIZZLED it until it looked a little burnt and all of the moisture was gone. I had done this before to a much lesser degree to simulate decoction, but this time, I got it a little dark. Added that to the mash and sparged thoroughly. The wort has a little color and actually was a little darker than if I had used a pound or so of crystal 60 at bottling. A slight roasty aroma was evident. Not a SMASH I would say. Probably won't quite be able to recreate it. It smelled great.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170249.75/warc/CC-MAIN-20170219104610-00055-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
667
6
http://chanceevjzo.timeblog.net/7134331/the-ultimate-guide-to
code
". Such as tune, spam is really an limitless repetition of worthless textual content. A further school of imagined maintains that it emanates from the computer group lab for the University of Southern California who gave it the title as it has many of the identical features as the lunch meat Spam: Within a term: magic. Obviously, we’re biased, and when you haven’t had the good fortune of tasting magic in advance of, that gained’t tell you A great deal. Talking objectively, they taste kinda like ham. In addition they style a little like pork roast. What we’re seeking to say is, SPAM® items have a novel style that’s unlike the rest on the market. From there, the mixture is moved over into the canning line, wherever it’s crammed in the common metal cans, twelve ounces at a time. In Hong Kong immediately after Globe War II, meat was scarce and high priced, so Spam was an accessible, economical substitute. The luncheon meat continues to be integrated into dishes for example macaroni with fried egg and spam in hen soup, as well as ramen. התייחסות לכל הודעות הדוא"ל מהשולחים ברשימת החסומים כאל דואר זבל. Want to thank TFD for its existence? Tell a friend about us, increase a url to this web page, or stop by the webmaster's website page at no cost enjoyment articles. United's NetZero and Juno automated spam filters discover approximately 3 million parts of feasible spam a day. A rule from the function was that contestants needed to be prepared to take in the Spam dish if requested by a judge. The Competition involved mild sporting functions and musical acts, Together with the Prepare dinner-off.[sixty nine] Because of the 1990s, Spam's perceived ubiquity triggered its name staying adopted for unsolicited electronic messages, In particular spam electronic mail. As a consequence of its use inside a line of the song in Monty Python along with the Holy Grail, the title of the musical Edition of your film turned Spamalot. There was also an hard work to differentiate in between different types of newsgroup spam. Messages that were crossposted to too many newsgroups simultaneously – as opposed to people who had been posted much too regularly – were named velveeta (after a cheese merchandise). But this term did not persist. Heritage Spam is very well-liked from the condition of Hawaii, where citizens have the very best for each capita intake get more info in The us. Its perception There's extremely distinct from on the mainland. Hawaiians at times call it "Portagee Steak".[twenty five] הוספת מספר אפשרויות לסרגל הכלים בתוכניות הדוא"ל הנתמכות. Spamarama was a yearly Competition held all over April Idiot's Working day in Austin, Texas. The concept of Spamarama was a gentle parody of Spam, rather than a simple celebration: the celebration at the guts on the Pageant was a Spam Cook dinner-off that originated like a obstacle to supply by far the most appetizing recipe with the meat. כמו כן הוסיף, כי הסרה בדרך שציינה הרשת מחייבת שימוש באינטרנט וכי אין הוא נדרש לעשות כן.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513844.48/warc/CC-MAIN-20181021094247-20181021115747-00519.warc.gz
CC-MAIN-2018-43
3,185
14
https://forums.adobe.com/thread/160349
code
I'm having a problem with refreshing a view state. Hoping someone here can throw a bone my way. Here is the essence of my 1: I have combo boxes that change the view state as well as 2: The filter works well. However when I change a view (after I update the data criteria via the combo boxes) and go back to the previous view, the data is not changed within the viewstate. (The data resides in a custom component). Can anyone suggest a means for me to refresh the data?
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590069.15/warc/CC-MAIN-20180718060927-20180718080927-00025.warc.gz
CC-MAIN-2018-30
468
8
http://community.sitepoint.com/t/right-sidebar-dropped-down-please-help-me/66213
code
HTML & CSS Please help me, the right sidebar of my website has fallen down, I cannot understand how to change it the widths are in % and hard to understand can someone please guide me. its a joomla template ==> neeshu.com please check the right sidebar it has fallen down :injured: I've only looked quickly but it looks as though the right column is actually inside the left column which is why its dropped. Looks like there should be a closing div about here somewhere. <!-- END: BOTTOM SPOTLIGHT --> <!-- END: CONTENT --> [B] </div><!-- add this one -->[/B] <!-- BEGIN: COLUMNS --> <!-- BEGIN: MASSCOL --> <div id="ja-colmass" class="clearfix">
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463928.32/warc/CC-MAIN-20150226074103-00202-ip-10-28-5-156.ec2.internal.warc.gz
CC-MAIN-2015-11
646
12
https://us.community.samsung.com/t5/Washers-and-Dryers/How-to-get-help/td-p/1829132
code
I have called Samsung, I have asked on Samsung community discussion group, I have searched the internet and I have viewed several Youtube videos. Haven’t gotten close to an answer that Samsung should have included in the installation instructions. Is there anyway that I can get an answer from Samsung. When using the Stacking Kit SK-DH for the 22 inch washer and dryer, what position do the leveling feet end up in. **bleep** all the way up seems like a logical position, but the installation instruction is silent on this. I might try reposting this on several groups in shear desperation. For installation questions like this, you will need to contact an installer or you can contact our parts department as they also can be of assistance. Their number is 800-627-4368 Be sure to click " ✓ Accept as Solution" when you find an answer that works for you. Please note, notification emails are a DO NOT REPLY address, you must log-in on the community page in order to respond.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487626465.55/warc/CC-MAIN-20210617011001-20210617041001-00089.warc.gz
CC-MAIN-2021-25
980
7
https://supportforums.cisco.com/t5/vpn/authentication-with-certificate-on-a-smart-card/td-p/986137
code
I've a Cisco VPN Client and a certificate on a smart card. I've imported this in Microsoft certificate store and the root CAS (say CA1 AND CA2). I want authenticate with a VPN Concentrator 3080 with software release 4.7.2 (the last). On the concentrator I've installed an identity certificate and the root CA (say CA2). When i try to authenticate on Cisco VPN Client I've following errors: "Failed to sign hash: B_EncryptInit() failed Failed to RSA sign the hash for IKE phase 1 negotiation using my certificate Failed to generate signature: Signature generation failed" With another smart card I've the following errors: "Certificate access error. Ensure SmartCard is not locked and is properly inserted. Failed to RSA sign the hash for IKE phase 1 negotiation using my certificate. Failed to generate signature: Signature generation failed " We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6. In Syslog I also se...
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811655.65/warc/CC-MAIN-20180218042652-20180218062652-00616.warc.gz
CC-MAIN-2018-09
1,101
11
https://crschmidt.livejournal.com/335468.html
code
I also took Julianne to her speech therapy appointment, got Alicia to clean her room, load/unload the dishwasher, and clear dishes off the kitchen table. (It's amazing what happens when I take away video game privileges for talking back to me about chores, isn't it?) I've made 10 commits to openlayers, and 25 commits to my internal svn repo for the platial stuff, plus 5 to the main platial tree. I'd say it's been a goddamn productive day. Platial will have a workable demo for something tomorrow, and in large part it's because of my work since Sunday. Luckily, my boss noticed this time. Tomorrow I need to go back and actually do admin work -- cleaning out inbox, invoicing, etc. -- for the past 3 weeks or so. I really want a macbook. I'd love the black one. Shame they're charging such a premium for it. There's also the fact that there's no reason that I have to upgrade at the moment. Note to self: Find some decent educational games for Julie on Linux so I can set her up with that machine when I'm not using it and let her play. http://boston.freemap.in/ is also running up to date OpenLayers code, straight from SVN to your browser. So tired. Bedtime now. Maybe I'll be able to sleep in tomorrow. Or julie will let me rest or something. I think no computer in the morning is a good plan.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585270.40/warc/CC-MAIN-20211019140046-20211019170046-00430.warc.gz
CC-MAIN-2021-43
1,300
8
https://lunaticsproject.org/2017/05/31/may-2017-summary/
code
- Got paid for software contract (final payment). - Purchased computer hardware. - Finished building “Giles” (file server), and installed the tiny 7″ console monitor on it. - Built “Sintel” workstation. - Retired last remaining components of “Willow” (old workstation that had been through the fire in 2013). - Finish (initial attempt) at hardware construction for Render Cluster. - Wrote “Blinken” script to operate the front panel lights on the Render Cluster blades (tested on Willow). - Had to RMA some Mushkin RAM, because I bought the wrong type. - Render Blades didn’t work with the power supply I built, and I spent a lot of time trouble-shooting, only to fail in the end. We also had a total solar eclipse in North America, which we were able to catch with a brief road trip up to Nebraska (a long drive for us, but just feasible): - Finally got paid on software contract. Not using that reference, though. - Pepper & Carrot Episode 6 Released. Client relented and paid. I don’t think they were thrilled about it, though. Pepper & Carrot: Episode 6 – The Potion Contest has been released, featuring some voice acting by Ariel Hancock. Animation work is continuing, with Keneisha Perry. Georgiana Model Update Keneisha continued with character updates, moving on to Georgiana. Computer Manual Folder Art One of the silly-but-fun things I do to make the IT work nicer is create documentation folders for each of the computers, with covers designed based on the characters I’ve named them after (at least, usually our computers are named after characters). New computers are an opportunity for new folder art. “Lum” is the prototype entertainment / Home Theater Personal Computer (HTPC) that I built for testing Lib-Ray (as well as using for its intended purpose). “Sintel” is the workstation I use for animation and other tasks (I decided it would be good to name it after a free-culture character this time). “Oyuki” was a laptop intended primarily for business purposes. And “Red Squadron” was to be the name for the render cluster (I planned to give them names “readleader”, and “red1” to “red5”. Or maybe I’d name the leader “red0”. I hadn’t got that far). There was also one for “Giles”, the file server, but I seem not to have the SVG for it anymore. The folders themselves contain punched paper with system design notes, and a pouch to put all the little manuals and disks that come with computer hardware, so I can keep track of them. More work on the front panel electronics — and software. I used a serial bus library that Adafruit included along with the hardware (it’s a free software package), and wrote a control script. The idea is that this would run as a process on the machine, updating the lights with status information. But initially, I just wanted to create a module that provided a simple interface to the device I was building. And I began installing the motherboards into the Render Cluster, along with all the connections. After getting everything assembled, I did some basic power testing. The power supply was generating the 12 volts DC, as expected. But I could not get any of the blades to boot. I acquired a power supply tester, and the best I could figure is that that the voltage rails weren’t stable enough. Unfortunately, this was getting to the edge of my engineering knowledge. I can think of about three different possible explanations for this problem — definitely testing any of them could be quite expensive. But for the record: - Maybe the nominal 12V supply really needed to be 15V (there is such a power supply, but that would be replacing a $300 part). - Maybe the DC-DC converter boards aren’t really up to the 300 W of power they were supposedly rated for. These were about the highest-power of such boards I could get, though. So if that was the problem, there’s no easy remedy. - And maybe these motherboards are particularly fussy about power quality, or actually need more power than I estimated. Might even be that they only need it briefly during startup. But again, that means replacing expensive parts. I came to the conclusion that this is why people don’t build systems this way, and maybe I should simply redesign around the more conventional method of providing a separate AC-DC power supply for each blade. Unfortunately, that is also an expensive fix. Not only will I need to purchase six power supplies, but I will also have to redesign to accommodate them physically. This was an immensely frustrating (and expensive) failure. It was pretty demoralizing, and I tabled the project to work on other parts of the job. As I am writing this entry in 2024, I’m kind of shocked to realize that I still haven’t got back to fixing this. I think this needs to happen soon. The hardware is already getting kind of dated, but then, that is a sunk cost. Less, exciting, but more successful: I got a basic file-server built. I had some fun with the case on this one, too. I installed a 7-inch monitor, mounted directly on the computer chassis. I built this with the metal frame of a case, thinking that I would build a custom shell on it later. I guess I was really in a “case-modding” frame of mind! Here, I’m testing the monitor (Yes, I know this keyboard had been through Hell. This was the old keyboard I kept from “Willow”, my previous workstation, which had been through the fire in 2013).
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948235171.95/warc/CC-MAIN-20240305124045-20240305154045-00033.warc.gz
CC-MAIN-2024-10
5,445
32
http://www.visualinterest.com/careers/
code
Please send a letter of interest & resume to [email protected] We are always keeping an eye out for the next best addition to our team! If we aren't currently hiring for the position you're after, shoot us a line anyways. We love ambition. We've been known to be spontaneous... For all career opportunity inquiries, please send a letter of interest and resume to [email protected]
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660139.37/warc/CC-MAIN-20190118131222-20190118153222-00260.warc.gz
CC-MAIN-2019-04
393
3
https://greenplum.org/community/
code
Greenplum Database is the first massively parallel open source data platform. It is forever changing the data market and we welcome all contributors that want to be part of this change. Below are all the ways you can get involved with Greenplum. Development contributions are encouraged but you don’t have to be a developer. There are many ways to get involved with Greenplum. Discuss Greenplum development in the GPDB dev Google Group & mailing list. Report a bug to the GPDB users mailing list. Alternatively, you can make a pull request on the Greenplum GitHub. Before you start, please ensure you have done the following:
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823710.44/warc/CC-MAIN-20181212000955-20181212022455-00120.warc.gz
CC-MAIN-2018-51
627
5
https://www.fairlatterdaysaints.org/answers/Topical_Guide/Book_of_Mormon/Archaeology
code
FAIR is a non-profit organization dedicated to providing well-documented answers to criticisms of the doctrine, practice, and history of The Church of Jesus Christ of Latter-day Saints. Topical Guide/Book of Mormon/Archaeology - DNA and the Book of Mormon (Link) - Hill Cumorah (Link) - Kinderhook Plates (Link) - New World Archaeological Foundation (Link) - Quetzalcoatl (Link) - Smithsonian Statement (Link) - Zelph (Link) Summary: It is a common claim by critics that there is "absolutely no archaeological evidence" to support the Book of Mormon. When they say "directly" support, they typically mean that they are looking for a direct corroboration, such as the presence of the name "Nephi" or "Zarahemla" in association with ancient American archaeological data. There is plenty of supporting evidence that anthropologically ties the Book of Mormon to ancient America. Jump to Subtopic: - Biblical archaeology compared to the Book of Mormon - Archaeology and the Hill Cumorah - Thomas Stuart Ferguson and "Mormon archaeology" - Smithsonian statement about the Book of Mormon - Interpretations of Izapa Stella 5 as a possible representation of Lehi's vision of the Tree of Life
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103037089.4/warc/CC-MAIN-20220626040948-20220626070948-00435.warc.gz
CC-MAIN-2022-27
1,182
16
https://publications.iadb.org/en/publication/financial-dependence-formal-credit-and-informal-jobs-new-evidence-brazilian-household?eloutlink=imf2adb
code
Financial Dependence, Formal Credit and Informal Jobs: New Evidence from Brazilian Household Data This paper examines a much overlooked link between credit markets and formalization: since access to bank credit typically requires compliance with tax and employment legislation, firms are more likely to incur such formalization costs once bank credit is more widely available at lower cost. The relevance of this credit channel is gauged using the Rajan-Zingales measure of financial dependence and a difference-in-differences approach applied to household survey data from Brazil. It is found that formalization rates increase with financial deepening, especially in sectors where firms are typically more dependent on external finance. Also found is that, decomposing shifts in formalization rates into those within each firm size category and those between firm sizes, financial deepening significantly explains the former but not so much the latter. Some key policy implications are derived.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816954.20/warc/CC-MAIN-20240415080257-20240415110257-00742.warc.gz
CC-MAIN-2024-18
995
2
https://sourceforge.net/p/celestia/mailman/attachment/[email protected]/1/
code
On 04/01/2012 01:39 PM, PR@Celestia wrote: This statement ranges between misleading and incorrect. The essential question is, of course, what do you get after compiling celestia with the x64 switch! It cannot be a true 64 bit binary for a number of reasons. Even ignoring some missing 64 bit code adaptations of Celestia itself, one would need a special 64 bit build of the external libraries (in windows/), which does not exist so far. Furthermore, a 64 bit version of the Qt library does not Celestia builds under x64 quite as good, as some of you reported. Apart from all this, I have never heard of a successful compilation of celestia with the x64 mode activated. Anyway here is my proposal concerning the VS2010 paragraph of how the new text could look like: It is possbile to build Celestia with Visual Studio 2010 Express Edition, but since there is no Visual Studio 2010 solution checked into the subversion you have to look out for a few more possible problems. # In the Visual Studio Express Edition x64 compilers are not included. # The WebInstaller of the Visual Studio thus logically only installs the x86 tool chain from the Windows SDK. # This means that if you want to build Celestia for x64 you need to get the Windows Software Development Kit that can be installed separately. # Depending on your OS (XP, Vista or Windows 7 and either 32 or 64 bit) you will have to get a different Windows SDK. '''Conversion of project file''' To get the current SVN Celestia project file to run under VS2010 is needs to be converted. This conversion is automatically started when you open the project file in VS2010. * VS2010 will convert the previous version's project files into VS2010 * If you have only the 32 bit version of the SDK installed you will get an error message about failed to upgrade to x64 and the project will not * There are a few methods to get around that problem. # Install the x64 Windows SDK. # If you don't want/need the x64 SDK you can edit out the x64 parts of the project files before conversion. # Another method found on <source lang="text">if you don't actually need to build the x64 platform, instead of hand-editing the .vcproj file to remove x64 references (which is awkward and error-prone), you can just make a copy of the Under %ProgramFiles%\MSBuild\Microsoft.Cpp\v4.0\Platforms, copy the "Win32" folder and rename the copy to "x64".</source> The best solution to be sure not to get any errors or broken program files is installing the Windows SDK. This SF email is sponsosred by: Try Windows Azure free for 90 days Click Here Celestia-developers mailing list
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188824.36/warc/CC-MAIN-20170322212948-00319-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
2,602
45
https://ja.tele.me/telegram/messages/AnimeKaizokuEncodes/1585151864640
code
Official English group of KuCoin - a global cryptocurrency exchange. For discussions and questions only, not technical support! Welcome to @BitSharesDEX @BitSharesEXCHANGES @BitSharesDEXfaq @btsWalletHelp Set a profile photo and read the @BitSharesDEXterms before posting. https://hederahashgraph.com https://t.me/hashgraph https://twitter.com/hashgraph http://hashgraph.com/discord Hedera Hashgraph is a public distributed ledger for building secure, fair, blazing-fast decentralized dapps. IoT Chain (ITC) is a lite IoT Operating System based on blockchain, which was designed to solve current security problems of IoT, meet the high degree of concurrent usage scenarios of IoT and realize the interconnection of all things. SwftCoin Official Group. Please also join: Customer Service @SWFTBlockchain SWFT News Channel @swftcnews Download SWFT App: www.swft.pro Twitter: twitter.com/SwftCoin Facebook: facebook.com/SwftCoin 走る外人の日記 ^_^ join NOW our discussion https://t.me/PlatinumqJP ようこそ!
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494349.3/warc/CC-MAIN-20200329140021-20200329170021-00441.warc.gz
CC-MAIN-2020-16
1,016
6
http://math.stackexchange.com/questions/160046/what-are-operators-that-map-a-number-to-a-probability-distribution-function-call
code
I'm a scientist who has stumbled upon an idea that I think might be helpful in my field. I'm looking for information about whether it has been treated in mathematics before – and I would be surprised if it hasn't – and if so, a pointer to some of the results/interesting applications/ideas/etc that have been written about it. The idea is simple and as follows: higher-order functions that map (ie. take as input) a number to (ie. produce as output) a probability distribution function. The probability distribution function might be parameterised by a function of the number, or it might not be. In what branches of mathematics are such operators used, and what are they called?
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257827077.13/warc/CC-MAIN-20160723071027-00297-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
683
3
https://community.onestreamsoftware.com/t5/Reporting/Create-a-dependent-dropdown-list-in-SQL-Table-Editor/td-p/19197
code
Is it possible to create a dependent dropdown list using a SQL Table Editor? Example below: If I select Entity A in the Entity column, I would like PC1, PC2 to be options within the Profit Centre column. If I select Entity B in the Entity column, I would like PC3, PC4 to be options within the Profit Centre column. I have tried using 'Selection Changed Server Task' to update a Literal Parameter that I can use as a basis for a Bound List parameter that I am attaching to the Profit Centre column , however this only appears to work after the row has been saved: I think it may be possible if the user was to save the row after choosing the Entity and then selecting a Profit Centre, but this wouldn't be an ideal user journey. Solved! Go to Solution. If I read correctly, he would want the parameter list assigned to the Profit Centre field to update after making a selection in Entity field. I don't think it's possible as I'm not sure how making a selection in Entity field would invoke record level refresh of the STE component. Not sure how what you recommend would look like but now curious!! That won't work as the SQL table needs to hold multiple entities. Another thought that I had, is to have a popup dialog when you click new add new row, which allows you to choose the entity and store the selected entity in a literal parameter (and use the literal parameter in the Profit Centre filter). But not sure if that is possible? I always hate to be "that guy", but I fear using a STE for this sort of activity is not the best approach. What you describe (creating a record where field choices are interdependent) is closer to going through a wizard than mass-editing raw SQL rows. It would probably be better to have a dedicated pop-up with (at least) the basic fields a user has to enter when creating records, which you can control more precisely. You can then provide a STE for reviewing or mass-updating records afterwards, if necessary. That sounds like a possible solution, however, I'm not sure how I would get a pop dialogue when creating a row? Is it achieved by setting the 'Selection Changed User Interface Action' below to Open Dialog? Assuming we are talking about a button (which is what i had in mind, something like "Create New Entity"), yes - and note that there are many "Open Dialog" options to help you manage the relevant popup. You'll also have to set the "Dashboard to Open in Dialog" property to point to the dashboard that will be used in the popup.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00534.warc.gz
CC-MAIN-2023-40
2,483
13
http://www.symantec.com/connect/forums/pst-migrations-exchange-quotas?device=mobile
code
PST Migrations & Exchange Quotas As soon as I type in first line about PST migration question, a voice inside me tells "you need to use third party PST migrator along with EV rather than EV native tools !" LOL. But that's that. We're running on Enterprise vault 9.0.1, Exchange 2010 SP2 RU3. Recently I noticed that certain user mailbox size limits changes randomly for certain users/mailboxes. And the time when they change is pretty close to when PST migrator is running. For example, I set a mailbox limit for (IssueWarning/ProhibitSend/ProhibitSendReceive) to 3.8/4/4,5GB accordingly, with database quota default set to false. When PST migrator task runs, they change to 2/2/2GB on their own. For certain users, I keep mailbox size limits close to database default with defaults turned off so EV can adjust exchange quotas as it migrates the PST file, but somehow they turn the database default on. For users whom i (or something else)t decrease mailbox limits for (as explained above), it logs following entry in event log: Log Name: Symantec Enterprise Vault Source: Enterprise Vault Date: 10/13/2012 6:04:45 AM Event ID: 6742 Task Category: Migrator Server PST Migration Report Migration status: Incomplete Processing aborted. The mailbox does not have enough space to complete the PST migration. Increase the indicated mailbox storage limits by at least 493890KB and run PST Migrator again to move the items in the PST to the mailbox. Current mailbox quota used: 1967492KB Set the Prohibit send limit to at least 2591041KB PST file: \\ClientPC\Outlook\archive.pst (Copy: C:\Fakepath\Copy16.pst) Archive Name: Donald Duck Vault Id: RandomVaultID Exchange Server\Mailbox: ExchangeServer\/o=Contoso/cn=Users/cn=DDuck Number of folders processed: y Number of items archived: 0 Total size of items archived: 0 KB Number of items unable to be archived: 0 Number of items not eligible for archiving: x Number of items moved to mailbox: 0 Elapsed Migration Time: 0:2:59 (hours:minutes:seconds) Migration Rate: 0.00 MB/Hour Just wondering if there is somewhere EV logs how much quota it has changed and if there's a way to track this.or troubleshoot this? I checked Exchange logs which has cmdlet auditing enabled, and I don't see any script or any person changing these settings. This tells me a few This tells me a few things: a/ The quote which is being read is LOWER than the amount of space needed to ingest the items, otherwise the SetEx2KUserQuotaValues function wouldn't change anything. b/ You're not seeing (nor am I) the values that come out of the GetEx2KUserQutoaValues - I would expect them to be logged. I mean logging them out is just good practice.. maybe these functions don't.. SYMC Support would be the only ones to tell you whether or not they SHOULD log something out. c/ The values that were obtained for the limits are all flat ie equal. In my environment they were set to 3 different (low) values. And the result in my trace is a bump up of each to three different values. Yours all show 2 Gb. d/ One (remote?) possibility is because the quota is >2Gb. I have personally seen 1-2 issues in the past (when I worked at Symantec) where the product failed to correctly determine things like mailbox size, when the mailbox was over 2 Gb. The 'cure' for this would be for 'someone' to do a bigger repro, and set the values as you have indicated for the quota, and then ingest a PST. That someone would really need to be SYMC support - and would take quite some effort.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705976722/warc/CC-MAIN-20130516120616-00049-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
3,486
37
https://developer.blackberry.com/playbook/native/documentation/com.qnx.doc.neutrino.sys_arch/topic/kernel_nested_interrupts.html
code
QNX Neutrino fully supports nested interrupts. The previous scenarios describe the simplest—and most common—situation where only one interrupt occurs. Worst-case timing considerations for unmasked interrupts must take into account the time for all interrupts currently being processed, because a higher priority, unmasked interrupt will preempt an existing interrupt. In the following diagram, Thread A is running. Interrupt IRQx causes interrupt handler Intx to run, which is preempted by IRQy and its handler Inty. Inty returns an event causing Thread B to run; Intx returns an event causing Thread C to run.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141213431.41/warc/CC-MAIN-20201130100208-20201130130208-00298.warc.gz
CC-MAIN-2020-50
614
2
https://devforum.roblox.com/t/roblox-database-help/1385709
code
So basically I made a text box and then a button that supposedly saves whatever is in the textbox to the game server and kicks the player. everyone is able to see what is saved on the game server (what they inputted into the text box) . how would i do something like this? Use a remote event, pass in the text. Use :SetAsync(), then player:Kick() nevermind, I decided to use http service post async and get async. thanks tho
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476397.24/warc/CC-MAIN-20240303174631-20240303204631-00093.warc.gz
CC-MAIN-2024-10
424
3
https://scholars.aku.edu/en/publications/acoustic-startle-and-fear-potentiated-startle-in-rats-selectively
code
The acoustic startle response, prepulse inhibition, fear-potentiated startle and monoamine activity induced by either, a novel stimulus or a cue previously paired with foot-shock (fear-conditioning), were assessed in rats selectively bred for differences in amygdala excitability (Fast vs. Slow kindling epileptogenesis). Comorbid differences of anxiety, which were dependent both on the rats' behavioural style and the kind of stressor, also characterized these strains. In the present investigation, Slow rats exhibited a greater startle reflex to noise relative to Fast rats, suggesting differences in generalized anxiety, but similar rates of startle habituation and prepulse inhibition. The fear-potentiated startle, however, was greater in Fast rats. When movement of the rat was restricted in a new environment, presentation of a novel stimulus (light) increased norepinephrine, dopamine and/or serotonin activity in brain regions typically associated with stressors (e.g. locus coeruleus, paraventricular hypothalamic nucleus). Generally, these effects were more pronounced in Fast rats, and norepinephrine utilization in the central amygdala was particularly highlighted in response to a conditioned fear stimulus. Thus, while generalized anxiety appeared greater in Slow rats, behavioural and central neurochemical reactivity in response to novel stimuli and to fear-eliciting stimuli, was greater in Fast rats. Similarly, basal dopamine activity in the prefrontal cortex was greater in Fast rats, but dopamine utilization elicited by a novel stimulus was more pronounced in Slow rats. This suggested that relative to Slow rats, dopamine neurons in prefrontal cortex of Fast rats do not react normally to environmental stimuli, and this phenomenon could lead to disturbances of attention or impulsivity. - Limbic excitability - Psychogenic stress
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00442.warc.gz
CC-MAIN-2023-50
1,856
3
https://www.survivefrance.com/t/new-to-me-sun-burnt-tomatoes/40218
code
I have grown tomatoes in a French garden since 1996 this year most fruit have been burnt by the sun on their south western side a bit of a surprise but still happy to cut that bit off. What has surprised me is the tomato seeds have germinated in the hot flesh internally completely white and an inch long, still eat them though More Tomato Problems!! Anyone know what is doing this — And how to stop it would be useful! Yes, and anything else that is suffering from lack of water at the moment. Try putting saucers around and keep them filled with water. Put the saucers at different heights and ideally sheltered from raptors hunting overhead. Thanks Sue, Will do that immediately & see what happens. We’ve got lots of water out for the birds round the house, plus food as the ground is so solid. The veg however is quite a way from the house so we should be able to tell if this is the problem fairly soon!
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948871.42/warc/CC-MAIN-20230328201715-20230328231715-00496.warc.gz
CC-MAIN-2023-14
912
6
http://www.openldap.org/lists/openldap-software/199905/msg00000.html
code
[Date Prev][Date Next] Re: Access Rights in SLAPD.CONF On Fri, 30 Apr 1999, Keith Keller wrote: > On 30 Apr, David J N Begley wrote: > > What's actually the purpose of "by * compare"? I mean, I'm using: > This is just a guess, but since authentication is done in order, > if a user binds (or attempts to bind) as him/herself, then s/he > falls under the "by self" scheme, and thus can bind successfully. Which brings me back to my original question - what's the purpose of "by * compare"? I mean, under what example circumstances might it be needed? > > Unfortunately the UMich SLAPD Admin guide isn't too clear on distinguishing > > the differences between "none", "compare", "search", "read" and "write" > > (beyond the bleedin' obvious which no doubt leaves everything open to > > interpretation - not good for ACLs). > Dunno. I feel like the definitions are clear enough, but not Well as I say, "beyond the bleedin' obvious" - but that's simply not good enough when writing access controls to enforce a security policy; you end up with "assumptions" about what will and will not get through. When writing ACLs, you need to know for *certain* what will and will not get through. We know from the documentation that the (descending) precedence order is: and that permitting a higher precedence access automatically includes the lower access methods. Now, attributes like "write", "read" and "none" are pretty obvious, but what's the difference between "search" and "compare"? What if I grant "search" access but don't want "read" access - if someone can search on an exact match for a particular attribute then surely that means they can "read" it (because they already know what the contents of the attribute are!). Just seems like an incomplete ACL scheme to me... (either that, or the incomplete UMich docs - which takes me back to where I started). > separate enough. For example, giving "write" also gives "read", > which gives "search", which gives "compare". What if I want > my users *only* to write and compare, not read? This makes > lots of sense with passwords, where you wouldn't want your users > to be able to display their password on screen, but you still > want them to be able to change passwords. Exactly! This is similar to how Novell's NLDAP front-end to NDS works (as a user I can set my own password and I can authenticate using my password, but I still can't retrieve the userPassword attribute at all). > On a side note, are there any plans for encrypted password > support in OpenLDAP? It's there already (RFC 2307-style).
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867579.80/warc/CC-MAIN-20180625072642-20180625092642-00046.warc.gz
CC-MAIN-2018-26
2,551
41
https://forums.developer.nvidia.com/t/train-nn-with-jetson-tx2/78279
code
I am a beginner in GPU programming and AI. For a project part, I need to train a neural network with NVIDIA Jetson TX2 board. I know there’s plenty of documentation about it but I am running out of time, could someone help me about the following questions ? The neural network is quite simple : - 6 numerical inputs (simply numbers). - A large number of possible numerical outputs (let’s say 1000). - 1 or 2 hidden layers of approximately 100 neurons each. - I have to try the following types of neurons : Perceptron, linear, sigmoid, hyperbolic tangent. I have the data to train the NN: correct output for given inputs My questions : What tools should I use to implement that NN as fast as possible ? I think CUDA is used for such implementation but both cuDNN and cuBLAS seem to simplify the task, true ? A template/sample of code implementing a NN similar to the one described above would be perfect ! How to train this implemented NN on the Jetson TX2 ? (connect board and host computer->tools, specific documentation?) I read the Two Days Demo, but couldn’t understand how to apply it to my own problem, since it is not as complex as Image recognition, segmentation, … I am sorry, I am asking a lot of simple things and I am sure I would find the solution with a better research but I dont have much time. Thank you !
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141672314.55/warc/CC-MAIN-20201201074047-20201201104047-00265.warc.gz
CC-MAIN-2020-50
1,330
13
https://vantiq.co.jp/resources/distribution-and-federation-in-real-time-event-driven-apps/
code
Most event-driven business applications need to be deployed in a distributed manner for improved responsiveness, robustness and security. With VANTIQ, an event-driven business application is developed in a single cloud location and then automatically partitioned, resulting in the components of the application being distributed to the most optimal nodes for execution whether the nodes are cloud hosted, data center hosted, intelligent devices at the edge, or a combination thereof. Logic will be located where it is the most effective. A wide range of system topologies including star, hierarchical, and peer-to-peer are supported. The provisioning and management of these networks is made automatic and easy to manage by intelligent features built into the VANTIQ platform. Application components can be dynamically changed anywhere in the distributed environment for one or tens of thousands of nodes while the system is running. For more, download the white paper here: Distribution and Federation in Real-Time Event-Driven Applications
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100651.34/warc/CC-MAIN-20231207090036-20231207120036-00119.warc.gz
CC-MAIN-2023-50
1,041
4
https://code.kx.com/insights/1.3/platform/cli/install.html
code
The CLI provides features to perform operations such as (but not limited to): - Installation setup - Enrolling/removing clients - Querying data - Creating and deleting assemblies The CLI makes use of the Python Kubernetes client to allow it to run easily outside and inside of a Kubernetes cluster. The CLI requires - Python 3.7 or greater - Python pip package manager It is assumed pip commands are available as is and on the path. If alternative commands such as python3 are required, update the commands appropriately To install from Nexus, execute pip install with the appropriate credentials. pip install --extra-index-url https://nexus.dl.kx.com/repository/kxi-pypi-public/simple/ kxicli To install a specific version, use cli_version=x.y.z # replace with the version you want to install pip install --extra-index-url https://nexus.dl.kx.com/repository/kxi-pypi-public/simple/ kxicli==$cli_version Available versions can be viewed on Nexus kxi will now be available for you to execute. kxi, version 0.9.0 from /home/kx-user/.local/lib/python3.8/site-packages/kxicli (Python 3.8) For a full reference guide to the CLI see here To upgrade the CLI, use the --upgrade option for # pass the '--upgrade' flag to pip pip install --upgrade --extra-index-url https://nexus.dl.kx.com/repository/kxi-pypi-public/simple/ kxicli
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100909.82/warc/CC-MAIN-20231209103523-20231209133523-00714.warc.gz
CC-MAIN-2023-50
1,321
24
https://support.2c8.com/hc/en-gb/articles/5716853744157-How-do-I-publish-to-SharePoint
code
This guide is to be seen as an example on how this can be done rather than an actual instruction. There might be other ways of doing it and there might be reasons to why this is not the best way for you to do it, or even works in your IT environment. 2c8 takes no responsibility for any issues caused by following this guide and can not provide any additional support if the guide does not lead to expected results. Our partner Ways Sweden AB has helped us to create an instruction on how to publish your 2c8 models to SharePoint. You can publish to all types of SharePoint sites that do not have "Prevent Custom Script" activated. This is a setting that can be done globally via O365 but can also be set per site. This setting is turned off per default on old classic sites. You can turn it off by following this instruction: When the setting is turned off you might have to create a new document library before it works. If it does not work it downloads ASPX-files instead of opening them. Follow the instructions below to publish your 2c8 models to SharePoint. 1. Create a SharePoint document library You can store many different libraries in SharePoint for different purposes, for example, regular Microsoft Office documents. You will need to create a document library in SharePoint for your 2c8 files. Name it for example "2c8 Processes". You can publish 2c8 files to all types of SharePoint sites that do not have "Prevent Custom Scripts" activated. This is a setting that can be made globally in Microsoft 365 but can also be made per SharePoint site. As a default, this is turned off on old Classic SharePoint sites; therefore, we recommend using a Classic SharePoint site. You can turn off "Prevent Custom Script" according to this instruction:https://learn.microsoft.com/sv-se/sharepoint/allow-or-prevent-custom-script Even if you've turned it off you may need to create a new document library before it works and to make it work immediately. There may be a delay on existing document libraries before "Prevent Custom Scripts" takes effect. If anything is incorrect, you can see it directly by the index.aspx file being downloaded instead of opening in a browser tab. OneDrive synchronization of document libraries To ease the publishing process from 2c8 to SharePoint we recommend that whoever publishes from 2c8 has access to the SharePoint library and synchronizes it to their OneDrive client. Open the document library in SharePoint and select "Sync". The document library will now synchronize and be accessible from your OneDrive. This will ease the upcoming steps when you will publish the files from 2c8. 2. Publish models in 2c8 as ASPX-files Edit your publishing profile in 2c8. In "Advanced settings", turn on the setting to publish HTML-files as ASPX-files. Edit your publishing destination and browse to the folder for your synchronized document library. Now when you publish from 2c8 all files will be saved to your OneDrive and automatically get synchronized to SharePoint. This may take a while depending on how many files should be synched. The most important file is index.aspx that you will use in the next step. 3. Publish on a page in SharePoint or link to a new window Depending on how you want the users to access the models from 2c8 you can either publish the models as a web part in SharePoint or make sure that the models open in a new window. Link to a new window The easiest option is to create a link from any page in Sharepoint. On a page in SharePoint, add a link as a web part for example. When you have added the link, edit it. In the example below we have added a web part called "Quick links". Select "Change" and find the link to index.aspx inside the document library where you saved your 2c8 files. When you have done this and published the page in SharePoint the link will open your 2c8 models in a new window. The upside with this is that the models will be able to use the full screen size. Publish on a page in SharePoint If you want the 2c8 models to be displayed inside a SharePoint page, follow the instructions below. Create a new page in SharePoint, pick "Layout options" and "One column". Add the "Embed" web part Add an "Embed code". Add the following code snippet: <iframe width="900" height="700" src="link to your index.asxp"></iframe> You can change width and height however you like, but the web part will adjust to the SharePoint layout. How to find the link to index.aspx Go to the document library where you have saved your 2c8 files. Select the index.aspx-file and select "Copy link". 4. Update your published files from 2c8 When you are publishing a new version of your 2c8 models you just publish from 2c8 and the models will be updated in SharePoint, since you have done all the steps above. It will take a few minutes for the updated models to be accessible for everyone since the files will have to sync between OneDrive and SharePoint.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817398.21/warc/CC-MAIN-20240419110125-20240419140125-00380.warc.gz
CC-MAIN-2024-18
4,908
40
https://www.tensorflow.org/decision_forests/api_docs/python/tfdf/inspector/AbstractInspector?hl=hr
code
|View source on GitHub| Abstract inspector for all Yggdrasil models. tfdf.inspector.AbstractInspector( directory: str ) ||Gets the dataspec.| ||Task solved by the model.| evaluation() -> Optional[ Model self evaluation. The model self evaluation is a cheap alternative to the use of a separate validation dataset or cross-validation. The exact implementation depends on the model e.g. Out-of-bag evaluation, internal train-validation. During training, some models (e.g. Gradient Boosted Tree) used this evaluation for early stopping (if early stopping is enabled). While this evaluation is computed during training, it can be used as a low quality model evaluation. |The evaluation, or None is not evaluation is available.| export_to_tensorboard( path: str ) -> None Export the training logs (and possibly other metadata) to TensorBoard. Usage examples in Colab: model.make_inspector().export_to_tensorboard("/tmp/tensorboard_logs") %load_ext tensorboard %tensorboard --logdir "/tmp/tensorboard_logs" Note that you can compare multiple models runs using sub-directories. For examples: model_1.make_inspector().export_to_tensorboard("/tmp/tb_logs/model_1") model_2.make_inspector().export_to_tensorboard("/tmp/tb_logs/model_2") %load_ext tensorboard %tensorboard --logdir "/tmp/tb_logs" ||Output directory for the logs.| features() -> List[ Input features of the model. Label predicted by the model. label_classes() -> Optional[List[str]] Possible classes of the label. If the task is not a classification, or if the labels are dense integers, returns None. |The list of label values, or None.| model_type() -> str Unique key describing the type of the model. Note that different learners can output similar model types, and a given learner can output different model types. Objective solved by the model i.e. Task + extra information. training_logs() -> Optional[List[TrainLog]] Evaluation metrics and statistics about the model during training. The training logs show the quality of the model (e.g. accuracy evaluated on the out-of-bag or validation dataset) according to the number of trees in the model. Logs are useful to characterize the balance between model size and model quality. variable_importances() -> Dict[str, List[Tuple[py_tree.dataspec.SimpleColumnSpec, float]]] Various variable importances. Values are sorted by decreasing value/importance. The importance of a variable indicates how much a variable contributes to the model predictions or to the model quality. The available variable importances depends on the model type and possibly its hyper-parameters.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585321.65/warc/CC-MAIN-20211020121220-20211020151220-00123.warc.gz
CC-MAIN-2021-43
2,576
37
http://vandiest.biz/post/2016/01/15/how-to-use-azure-resource-manager-in-visual-studio-for-creating-web-apps
code
Here we want to create our Azure Web App from within visual studio. The goal is to be able to recreate the infrastructure at will and host a web app on it. We do this by including an Azure Resource Group project inside our solution. This bundle the code of our website with the definition of the infrastructure that is needed to host the website. The Azure Resource Group project contains the description of your infrastructure inside an ARM(Azure Resource Manager) template and one or many parameter files. With this project you make sure that your configurations can be consistently repeated, tested, shared and promoted across different environments. This concept is called “infrastructure as code”. First we need to add an Azure Resource Group project to our visual studio solution. Right-click Add, new project. If you didn’t have downloaded the Azure SDK, you first need to install it. Choose “Get Microsoft Azure SDK for .Net” from the Cloud category and complete the installation steps. Once the Azure SDK installed, reload your solution, right click on your solution, add, new project and select Cloud, “Azure Resource Group”, provide a name to your project and click OK. Here we’ll setup a simple website. Then we’ll need to fill in the parameters. You can do this via the deploy wizard or directly inside the “Website.param.dev.json” file. The file is located under your ARM project in the folder Templates. The siteName and hostingPlanName are up to you, you can fill in what you like or provide the name of an existing one. For siteLocation you’ve to choose between one of the Azure datacenter regions, you find the list under: https://azure.microsoft.com/en-gb/regions/ Just Copy the name of the region that is appropriate to you. Right click your ARM project and choose Deploy, New Deployment. Click on Deploy Once completed you should see the newly created website in the portal. Now you can publish your web app through Visual Studio. Right Click your web project, choose publish and select “Microsoft Azure Web App”.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506420.84/warc/CC-MAIN-20230922134342-20230922164342-00184.warc.gz
CC-MAIN-2023-40
2,062
15
https://hiddengurus.com/list/jobs/python-developer---33
code
Python Developer vacancy at Maxiru 2,200 - 2,800 $ per Month Our focus is cruise industry technology, apps ranging from IOT to Algorithms and 3D simulations; Now our team consists of 40 people living in 38 different cities of the world; Our main technological stack: Python, React, Redux, ES6, Webpack, SASS, Jenkins. The project is a table reservation system in restaurants. Mostly CRUD on REST technology plus other algorithms. The project is one year in development, MVP is ready, and now we are developing new features and starting work on customization of the application for a new client. - You know Python and Django really well. You have already used them in production, your experience is not limited to reading documentation and working on pet projects; - You can write well-optimized queries using Django models; - Despite the fact that you try to use models to work with the database, you are familiar with PostgreSQL or MySQL. If necessary, you can easily do profiling and optimizing of the database; - You have some experience with Celery and Redis; - You are disciplined enough for effective remote work. - You have good written English (if you have spoken it will be a plus); Perks & Benefits - 100% Remote - Full-time contract (for one year with renewal). - Remote work according to EST time (usually until 19.00 Moscow time) - Salary: $2,200-$2,800
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335276.85/warc/CC-MAIN-20220928180732-20220928210732-00312.warc.gz
CC-MAIN-2022-40
1,366
17
https://portaproducts.com/accommodating-higher-power-part-2-aerodynamics/
code
This is a PDF of the original article published in the Aug/Sep 2021 edition of Professional Boatbuilder Magazine CFD analysis of hull aerodynamics holds the potential to answer many performance questions, including the cause of an infamous side-by-side blow-over of identical high-performance catamarans during competition in Key West in 2019. In Part 1 of our series “Accommodating Higher Power” (Professional BoatBuilder No. 191) we explored a case study of hull refinement and the practical application of recent advances in computer modeling to the art and science of hydrodynamics. Looking back at the traditions of modern boat manufacturing, we delved into bottom design, old-school versus new-school tooling methods, and learned how builders can update trusted hulls with improved running surfaces.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.31/warc/CC-MAIN-20231206063543-20231206093543-00602.warc.gz
CC-MAIN-2023-50
809
3
https://club.myce.com/t/help-please-burning-disciples-2/63786
code
Okay, I have a .img file of Disciples 2 that I got off of edonkey2000. It came with the .img files of both cds of Disciples 2, along with a .ccd file for each, and a .sub file for each. Now I’ve tried TONS of ways to burn this file. The first thing I tried was Clone CD, then I tried Alcohol 120%, then I tried BW. Every time the cd burned, but it didn’t work. I never burned the first cd, instead I simply extracted the .img file to a directory on my Hard Drive (Using IsoBuster). Then I ran the auto-install until it got to the second CD. Every time I burned the second CD (using a bunch of different methods. Probably went through an excess of 7 cds) It would say something similar to “Insert the second cd, once it is ready, click ok”. When I clicked ok, it would flash for a milisecond, and reappear (basically telling me I didn’t have the right cd in). I’ve done a bit of research and I’ve discovered that Disciples 2 is guarded by Securom 4.77. I don’t know how to burn this game. If anyone has been successful burning it, I’d LOVE for you to tell me how to do so. P.S. Due to this experience, I’m never going to mess with another .img file again. .bins all the way for me anymore :).
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256040.41/warc/CC-MAIN-20190520142005-20190520164005-00522.warc.gz
CC-MAIN-2019-22
1,211
3
https://knowledge.broadcom.com/external/article/88370/import-xml-failing-with-a-file-more-than.html
code
Import XML failing with a file more than 1.5 megabyte Article ID: 88370 CA Automic Workload Automation - Automation Engine Importing an XML file which is 1.5 Mbytes from the Automic Web Interface (AWI) results in an error in the tomcat log: java.io.IOException: The multipart stream ended unexpectedlyIf you import it with the user interface or a script it works. Release: AUTWAB99000-12.0-Automic Workload Automation-Base Edition Modify the following options in the httpd.conf of the apache: LimitRequestBodyThese are limitations which prevent big files from being imported using the AWI.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945168.36/warc/CC-MAIN-20230323132026-20230323162026-00386.warc.gz
CC-MAIN-2023-14
589
8
http://www.indeed.com/job/Jr-Software-Developer-at-NuWave-Solutions-in-Fort-Belvoir,-VA-e86c666434daff56
code
The candidate will work collaboratively as a member of the our development team to design and develop software, determine interfaces, and complete technical feasibility analysis. The individuals will coordinate and perform requirements and implementation analysis, design, development, testing and enhancement of application software. Coordinates and/or performs integration of COTS and other existing code. - 0-1 yrs of experience programming in structured languages (e.g., Java/J2EE, Java Script, Ext-JS, C++, PERL, or configuring COTS software. - Knowledge of condig, testing debugging, documenting, and maintaining programs. - US Citizenship Required - BS Degree in Computer Science, Information Technology, Computer Engineering or related field, desired - OZONE Experience, OWF - Ability to work in a collaborative environment - Location of Position: Springfield, VA - Travel Required (CONUS/OCONUS): Local - If travel is required, how much? 5% - Work Schedule (Shift etc.): Day Shift - Clearance level: TS/SCI Mandatory with CI Poly Desired - 8570 Requirements: N/A NuWave Solutions is an EOE/M/F/H/V
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207927427.57/warc/CC-MAIN-20150521113207-00118-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
1,106
14
http://www.gzshoesonline.com/giuseppe-zanotti-flip-flops-black-shop-online-p-1077.html
code
GIUSEPPE ZANOTTI Flip flops Black shop online - Brand: GIUSEPPE ZANOTTI - Product Code: 1011259629 - Availability: In Stock Made In ItalyItem made in Italy, synonymous with quality and design creativity. DETAILSnarrow toeline, leather sole, wedge heel, leather lining, solid color, metal applications, snakeskin print, contains non-textile parts of animal origin MEASUREMENTSHeel height 0.98 inches
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251799918.97/warc/CC-MAIN-20200129133601-20200129163601-00040.warc.gz
CC-MAIN-2020-05
398
7
https://writing-essay.online/2020/12/18/write-a-paper-for-me_lq/
code
You definitely need an essay writing service if at least one of these factors describes you: provide examples showing you’ve developed these qualities/skills/values in edu jungles, which options write a paper for me can you write me an essay for me cheaper? writers per hour is a cheap online paper writing service that can help you with your custom paper writing needs. high school, close reading paper example college, university, etc to write an essay with the help of write a paper for me this instrument, you can create a primary draft, a so-called skeleton for your future paper, and then use write a paper for me it as a fundament sample point papers for your assignments abroad times mumbai assignment. your privacy means write a paper for me a lot to this write college essay guide.com my essay nodal analysis solved problems pdf quantitative data essay for me service. ethics healthcare week 4 december 10, 2020. order now. get an expert academic writing assistance! if you’re going to write a paper, you have to get some examples of visual analysis essay kind of help application essay; qualitative research proposal example in education term paper; who will write my essay for me. the cheapest paper at basic business plan structure edu jungles is a animal farm essays one-page high school essay about literature and language, and the cost will be $12.95. when you want to ask somebody, executive summary samples for a business plan “write essay for me!” and your problem needs to be solved quickly i am not good at writing generally and wanted to ask for writing help with this assignment writing service to write my research paper. the number of tasks 7 step problem solving process you already have is enormous, and you keep on getting new assignments.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487610196.46/warc/CC-MAIN-20210613161945-20210613191945-00133.warc.gz
CC-MAIN-2021-25
1,775
1
https://www.experts-exchange.com/questions/28413731/Slow-access-to-network-shares-Win-2000-accessing-Win-8-Share.html
code
We have a metal punch machine using a Win 2000 based controller, with specialist software sat on it (all of this has been installed by the machine manufacturer, and according to them it cannot be updated) - the software looks at a network drive / UNC Path to pick up its configuration data for jobs. Previously, that data was on a Windows XP Machine with a shared folder, but we recently replaced that PC with a Windows 8 PC. I've setup the shares on the Win 8 PC, setup the permissions etc and continue to use it. The problem we have, is that the specialist software running on the machine, has a 30 second ~ 1 minute delay between clicking 'open' and the list of files/jobs being shown. I've googled this but not found much info - i'm wondering if this is a common problem between 2000 and Win 7 / 8 and if anyone has a work-around? I've tried accessing the Win8 share from newer machines (Win7 / XP) and they access it without any delay. As an alternative I can consider storing the job data on a Win 2003 server - not tried that yet but if theres no easy fix i'll give that a go.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125936981.24/warc/CC-MAIN-20180419150012-20180419170012-00046.warc.gz
CC-MAIN-2018-17
1,083
6
https://lists.debian.org/debian-gcc/2009/02/msg00109.html
code
Possibly a regression bug in g++ (Updated) yesterday I did a more test and I bounded the problem a bit more. In the compiler options we have defined: I have tested with -03 only with the collapse result. I have tested with -ffast-math only with the collapse result. I have tested with -02 only with the collapse result. The file that fails is one that has a include file with a lot of templates and with some size (1.5Mb). When I compile with 4.2 the compiler has some difficult, but in some minutes could compile and link. The colapse scenario I'm referring is to need more than 20 minutes to compile one file with 90% of cpu 65% of memory and I have to kill gcc. I have an amd64 with 1Gb of Ram, a bit old, but I can work with > first of all I'm not on the debian-gcc list, so please CC to me. I'm > helping in the development of a project dlraw.sf.net. It's a program to > process files (digital photo) in raw . > The main developer, Jos De Laender work with g++-4.1 and can compile the > program without any problem. I'm working with g++-4.3, (lenny and unstable) > and g++-snapshot (4.4) and g++ arrives to one file and begin to eat memory, > cpu, etc, and I must kill the process because my box begin to collapse. > I have tested it with g++-4.2 and it works. So, there's have been some > change betwend 4.2 and 4.3 that make the problem. So, please, could some of > you confirm that gcc fails and it's not bug in the code? > PS the application is a qt4 program. To compile the sources you need: > a trunk, qmake-qt4 > and wait....
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818687428.60/warc/CC-MAIN-20170920175850-20170920195850-00630.warc.gz
CC-MAIN-2017-39
1,537
25
http://blogs.msdn.com/b/gduthie/archive/2009/10/29/countdown-to-visual-studio-2010.aspx
code
In anticipation of the launch of Visual Studio 2010 next March, I wanted to have some bling on my blog counting down the days ‘til the launch. The Visual Studio folks put together an HTML/CSS/JS widget that looked pretty cool, but was fixed width, and wouldn’t fit the somewhat narrow sidebar on my blog. So I decided to create my own version in Silverlight. I wanted to have something with an old-school digital clock face (as in drop-down numbers), so I did a Bing search for “flip,” “clock,” and “Silverlight,” and one of the results that came up was a post by my buddy and fellow Microsoftie Josh Holmes, on a Silverlight Countdown badge he created. Josh kindly included the source code, so I grabbed it, did a few tweaks, and the result can be seen in the pic to the left and in my sidebar. If you’d like to run this widget, all you need to do is add the following code to your page or blog: 1: <div id="silverlightControlHost"> 2: <object data="data:application/x-silverlight-2," type="application/x-silverlight-2" width="190" height="180"> 3: <param name="initparams" value="TargetDate=03/22/10" /> 4: <param name="source" value="http://gdtest.members.winisp.net/ClientBin/SilverCountDown.xap"/> 5: <param name="onError" value="onSilverlightError" /> 6: <param name="background" value="black" /> 7: <param name="minRuntimeVersion" value="3.0.40624.0" /> 8: <param name="autoUpgrade" value="true" /> 9: <a href="http://go.microsoft.com/fwlink/?LinkID=149156&v=3.0.40624.0" style="text-decoration:none"> 10: <img src="http://go.microsoft.com/fwlink/?LinkId=108181" alt="Get Microsoft Silverlight" style="border-style:none"/> 13: <iframe id="_sl_historyFrame" style="visibility:hidden;height:0px;width:0px;border:0px"></iframe> One of the tweaks I added was the ability to set the target date based on Silverlight’s initparams parameter. Josh went further and added updates to his widget to pass in paths to the images, event date, registration URL, and more. So whether you’re looking for an example of how to create a simple Silverlight countdown widget, or want to host my Visual Studio 2010 countdown widget, the links and code above should have you set! Drop me a note, or leave a comment if you decide to host the widget, and let me know how it works for you! Working fine for me, Nice ! Will be blogging about it also. Thanks !
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701158481.37/warc/CC-MAIN-20160205193918-00024-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
2,360
18
https://supportforums.cisco.com/t5/firewalling/asa-5510-wccp-router-id/td-p/1493075
code
I'm trying to create a WCCP connection between my Squid server (on 10.9.10.10 - inside LAN) and my ASA 5510 (inside: 10.9.254.1 - outside 201.234.x.x). WCCP/GRE tunnel works perfect, they see each other, i've seen I_See_You and Here_I_Am packets. The problem is that when ASA gets the packet, it redirects alright to the Squid but with the wrong ID, because it's using its outside IP which cannot be reached from inside. I found out that Router ID is created using higher IP configured. I tried unassigning ip addresses in every interface except inside, creating WCCP web-cache, and it does work, but the moment i assign the rest of the interfaces IPs it takes outside IP as ID again. Is there any way that this Router ID can be changed manually? Unfortunately the id cannot be changed. It will always pick the high one. You need to have the engine support it and have a route back to it through the ASA. I hope it helps. "show wccp" statistics will show you redirect counters and if the engine is built properly. If those look ok it is probably working. Of course check if pages that the engine is set to block are actually blocked. Everything seems to be working in the ASA, but i can't get to any page. Not even Google, and there's no blocking there. AR01-ASA01# sh wccp Global WCCP information: Router Identifier: 201.234.XX.XXX Protocol Version: 2.0 Service Identifier: web-cache Number of Cache Engines: 1 Number of routers: 1 Total Packets Redirected: 857 Redirect access-list: SquidGRE Total Connections Denied Redirect: 0 Total Packets Unassigned: 1 Group access-list: -none- Total Messages Denied to Group: 0 Total Authentication failures: 0 Total Bypassed Packets Received: 0 Probably the problem is with the route id. The HELLOS are exchanged, but probably the engine is rejecting the wccp GRE packets from the router id. Also the wccp engine should be able to directly talk to the host that is browsing, you need to ensure that is allowed also. I hope it helps. Ok, first of all, thanks for replying every time. I really appreciate it. So, probably i should configure Squid wccp server so it matches Router ID in ASA. But the problem is that i can't get to the public IP since ASA won't let me go through. How can I make it work? Change your routing so that the traffic destined to the routing id hits the ASA inside. I don't think that is your problem now.I believe that Squid ignores that router id. Ok, i'm starting to feel like a newbie. How can i add a route like that? And where? Squid is connected to Layer 3 switch Cisco 3560, which is connected to ASA. Where should I add a route? and how? ip route xxx xx xx xx?
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948627628.96/warc/CC-MAIN-20171218215655-20171219001655-00100.warc.gz
CC-MAIN-2017-51
2,634
37
https://www.codecamp.fi/doku.php/reactjs2018january
code
meta data for this page React.js CodeCamp - January 2018 Week 1, 02.01. - 05.01.2018 Location: At LUT Start: 02.01.2018 at 4304-05, Time 9.00AM Topic: React.js & Redux Course TODO list AKA requiremetns to pass the course - A short list of things to cover to pass the course (for the 3 credits): - Participation in the Tuesday lectures (starting 9:00, room 4304-05) - Participation into Wednesday “project Idea “roasting” session” (room 4304-05, time 16:00 →) - Preparing the team and it's members (3-4 persons) presentation slide set (includes the idea of project at least in few lines description format) and have it ready and sent for course teacher before 16:00 Thursday 04.01.2018 - Prepare team project presentation slide set (needs to be ready and send to course teacher before 14:00 Friday 05.01.2018) - Short note, most teams might find it helpful to do drafts of team and project presentations slides and use those already on Wednesday, improve them and return in improved format for the course teacher, in given timetable) - Project presentation as a team on Friday afternoon 05.01.2018 (maximum of 15 minutes per a group). (Current timetable for the start is 15:00 at room 4309-4310, slight change that we need to start already on 14:00) - Collect for final project code as a Zip file and return it to the course teacher before 15.01.2018 08:00AM. - OR publish the code e.g. in Team Wiki page or link to the code material in easily accessible web-page etc. - Do a project team Wiki page & project short video (15 seconds to 120 seconds) also both ready on 15.01.2018 08:00AM. - Instructions / basic ideas what to include on the webpage have been sent as an e-mail - Have the course reflection document written and returned for the course teacher before 19.01.2018 23:59 (detailed instructions shall be given on Friday 05.01.2018) Course Tools & Helpfull material Manuals, help and so on: - Project presentation could include e.g. - Idea, motivation, goals, solutions used, what was actually implemented and so on - Also you could consider presenting: Vision, Value proposition, Customer journey (story of a customer using the solution) - Benefits of your solution over competition - “nice coding trick” that could be handy to others in future - Live demonstration of your solution and so on - In reflection report, you might want to write about - The ideal application flow and features created - The user experience aspects considered with the application - Showcase(s) of your solutions best features / ideas and explain how they are “cool” and/or useful |Group||Application||Name 1||Name 2||Name 3||Name 4| |Group 1||Kookospähkinät||Matias Salohonka||Harri Kuittinen||Camilla Piskonen||Joel Salminen| |Group 2||Hoponpoppoo||Mikael Sommarberg||Julia Tasa||Miikka Lahtinen| |Group 3||super(props)||Kimmo Flykt||Simo Partinen||Eetu Vierula| |Group 4||NameTeamGroup||Kuisma Närhi||Olli Kousa| |Group 5||echo “foo”||Jaakko Tuuri||Toivo Mattila||Tony Vilpponen| |Group 6||thinkbad||Ville Raukola||Miikka Mättölä||Roman Hyvönen| I have an exam in Code Camp week ? You are free to go exam, but code camp in intensive course and idea is to focus coding during the week, so it is recommended you do prepare to any possible exams before the code camp week. You are fully evaluated based on your working during the code camp and please remember, results speak for your group and results tend to take time :). Grading 1-5 from - Idea presentation in wiki: 10% - Idea and presentation in Tuesday afternoon session 10% - Code camp reflection report 20% - Coding of the implementation: 20% - Group evaluation done by “non technically trained person” 10% - Presented implementation in Friday event 30% - Improvement done after Friday is mandatory to pass the course, BUT it can also earn you additional bonus into final evaluation too) - and how you report this improvement in the wiki page
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101195.85/warc/CC-MAIN-20231210025335-20231210055335-00650.warc.gz
CC-MAIN-2023-50
3,920
49
https://supportforums.cisco.com/discussion/9421161/access-list-question
code
We have an issue with a device on a route receiving TCP resets whenever a connection is attempted. This route goes through a third party. We have removed all blocks on our part of the network. My question is, how do access-lists deal with denied packets. Do they direct the packet to Null0 and simply drop the packet or would an extended access-list denying on a TCP rule send a reset thereby closing the connection? My own feeling is that there may be a firewall rule in the way as the reset is at layer 4. Would apprecieate some clarification.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886107065.72/warc/CC-MAIN-20170821003037-20170821023037-00656.warc.gz
CC-MAIN-2017-34
545
1
https://bitcoin.stackexchange.com/questions/60123/getrawtransaction-seems-to-only-work-for-certain-transactions
code
I am working through mastering bitcoin. I am confused by getrawtransaction. I would like to look at the first transaction in block from bitcoinrpc.authproxy import AuthServiceProxy, JSONRPCException # rpc_user and rpc_password are set in the bitcoin.conf file p = AuthServiceProxy("http://%s:%[email protected]:8332"%(username, pw)) # look at specific block blockheight = 277316 # get the hash of that block block_hash = p.getblockhash(277316) # get the block block = p.getblock(block_hash) # get the transactions in the block transactions = block['tx'] first_transaction = transactions print p.getrawtransaction(first_transaction) Gives this error: bitcoinrpc.authproxy.JSONRPCException: -5: No such mempool transaction. Use -txindex to enable blockchain transaction queries. Use gettransaction for wallet transactions. It seems like it only wants to look in the mempool. How do I use the -txindex parameter it suggests? If I run the below code, it works fine. This is also a transaction from the same block (64th transaction) and clearly not in the mempool. What is the difference between this and the how I get the transaction id in the above code?
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703550617.50/warc/CC-MAIN-20210124173052-20210124203052-00690.warc.gz
CC-MAIN-2021-04
1,164
9
https://www.uu.nl/medewerkers/KHWJtenTusscher
code
I am a full professor in Computational Developmental Biology. In my research I focus on unraveling the complex patterning processes occurring during the development of multicellular organisms using sophisticated computer simulation models that integrate biological data from the subcellular to whole organism scale. This type of integrative modeling approach is extremely powerful in deciphering the functioning of complex biological processes. A nice illustration of this is our recent publication featured on the cover of Development where we show that using modeling we could predict how plant roots sense and respond to salt gradients, enabling them to grow away from where salt concentrations are highest. In addition to unraveling how patterning processes work I particularly like to use simulation models to ask questions that can not be easily adressed experimentally, namely why processes are functioning in a particular manner and how and why they have evolved to obtain their particular properties. Animal development - patterning and its evolution In animals we focus on the patterning of the anterior-posterior axis. Specifically, we develop models to investigate what type of regulatory networks organize posterior growth and segmentation of the animal body axis and what type of conditions and evolutionary selection pressures gave rise to these developmental programs. We use in silico evolutionary models to “play the tape” again and again, thereby enabling us to determine whether particular evolutionary outcomes occur more often than others, and what are the relevant parameters determining the bias towards these outcomes. Thus we try to answer why the mode of body axis segmentation, where a temporal oscillation becomes translated into a spatial pattern of segments, is dominant in both vertebrates, arthropods and annelids. On the more applied side, we focus on the interplay between axial patterning and left-right signalling in vertebrates, investigating how disabling conditions like scoliosis may arise. Plant development - patterning and adaptation to environmental conditions In plants we focus on the interplay between development and adaptation to environmental conditions, with an emphasis on the root system. For this we extensively collaborate with experimental plant groups, investigating the impact of salt stress, phosphate starvation and competition for light on root growth patterns. This research has both applied and fundamental branches. On the applied side, answering how plants adapt to adverse stress conditions may identify targets for crop breeders to produce more stress tolerant plants. On the more fundamental side, we try to answer general questions such as why the plant hormone auxin can fulfill so many different roles both in development and adaptation, how do plant cells know when to do what? Also, we try to answer how plants, which have no central nervous system, are able to integrate information from different sides of the plant and generate a coherent response. As an example, in halotropims a tropic response in which roots are able to grow away from the highest salt concentration differences in salt concentration of as little as 5% are sufficient to elicit a robust directional growth response. Finally, we study the type of regulatory networks that allow plants to form new lateral organs, which requires them to initiate, grow and control a new meristem from scratch. My current and past research is funded by the following grants: NWO Building blocks of life NWO VIDI and Aspasia FP7 Evoevo project UU Focus en Massa
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00289.warc.gz
CC-MAIN-2023-40
3,591
15
http://dwoolstar.blogspot.com/2004/02/now-for-some-blogspot-stupidity.html
code
Now for some blogspot stupidity. I started off with the default setting in blogspot that carriage returns matter. Blogger would take my text and insert breaks and paragraph marks automatically. I probably should have switched this immediately, but I didn't and I went on writing for a couple of weeks with it. But its annoying. The text edit window is already too small, so I do all my composition elsewhere, and having to re-edit it several more times to get spacing right was getting to be tiring. So I switched over to doing it myself. Now all my old posts are munched. I'll have to go back and put [p] and [br] marks everywhere, and then re-check them. I would have preferred a "convert" option.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590127.2/warc/CC-MAIN-20180718095959-20180718115959-00369.warc.gz
CC-MAIN-2018-30
699
4
https://www.bitshares.foundation/workers/2020-01-bitshares-legal-representative
code
|Global Voted BitShares Legal Representative| |Freelancer||The BitShares Blockchain Foundation - The BitShares Blockchain Foundation| |Duration||2020/01/01 - 2020/12/31 (12 months)| |Worker ID||1.14.243 (click the id to vote with Beet or go to reference UI)| |Accounting & Reporting||workers.bitshares.foundation/202001-bitshares-legal-representative| In 2019 the community was offered two choices for the legal representative work: merely a mandate for passive representation, or paid per month to allow proactive actions as well. This seemed reasonable at that time, it is not reasonable now. Even the passive roles needed a lot of time and effort. Thus, this worker asks for a monthly fee. Among the tasks of the legal representative is to deal with listing agreements, defend against delisting from existing exchanges. We seek to extend our position as legal representative in case the community wants us to do so. All existing legal agreements must be considered void if the BitShares Blockchain Foundation is no longer the legal representative for the BitShares Blockchain, with all consequences that come with it (effective date 31st January 2020). The strength of BitShares Blockchain is its technical superiority and distributed governance. However, due to the nature of its decentralized and [autonomous] character, some aspects are not continuously attended in comparison to most other blockchain platforms. One of those aspects is dealing with legal issues and regulations. For example in 2018, the BitShares Blockchain Foundation (BBF) engaged with PaulHastings LLP for the Legal Opinion Letter about the legal status of the core native token BTS, dealt with Bittrex Inc., Huobi and other exchange listings, and organized BitFest. Legal issues like this are not static in our space, and require ongoing maintenance. The legal opinion letter about BTS obtained early 2018 would require updating today because new regulatory guidance has been provided by various regulatory agencies worldwide. To make things like this possible, somebody or an entity needs to carry the authority (mandate) to sign on behalf of the community. Keep in mind that such an entity or person can only represent the BTS holders and BitShares community with an approved mandate. We here propose to appoint the BitShares Blockchain Foundation (BBF), to engage in external communication as the only legal representative with authorities, market parties and legal counsel. With the mandate as the Legal Representative, the BBF will be the single point of contact for legal (authority) matters, as well as (temporary) contractual obligations to fulfil other worker proposals. We seek to extend our position as legal representative in case the community wants us to do so. The BBF will coordinate and distribute legal work and act as legal representative on behalf of the BTS token holders. If needed, the BBF may sign on behalf of the Community taking advice from approved members of the BitShares Committee. Among the tasks are dealing with listing agreements, defend against delisting from existing exchanges and other parties requesting the legal opinion letter or legal questions on BitAssets for all kinds of purposes (e.g. Huobi, LATOKEN, Lykke, Binance and Bittrex), or also among the tasks is acting as a legal entity for licensing (e.g. licensing for Apple Connect for the mobile worker). Acting as a representative, we feel obligated to always represent BitShares Blockchain publicly in the best interest of its token holders. Since legal agreements are binding in the real world, while worker proposals can be revoked quickly, we here propose a mandate for a 12 month duration. The daily BTS payout will be set to collect the necessary funds quickly to secure the funding. The mandate is considered given when the monthly fee is paid, and revoked if the monthly fee can’t be paid in full anymore. It is essential that the BBF will continue to have the legal mandate, otherwise existing contracts become void. Invalidation of existing contracts may result in BTS being delisted from exchanges. In short, this worker proposal comes with two options: Furthermore, authorities and businesses require a point of contact with legal mandate. Otherwise, the community may face (uninformed) decisions made by third parties due to lack of communication with a community representative with legal mandate. Our mission is to Everyone’s time is valuable. As such, we are asking for funding though the BitShares Blockchain Reserves and seek a fixed monthly fee of 2000 EUR for the next 12 months, payable from January 1st 2020 until December 31st 2020. Invoices will be provided publicly through the accounting website. The fee only covers the hours spent by the entire team to subjects related only to this mandate. Travel expenses or fees of 3rd parties (i.e. lawyers, notaries, etc) are not included, and need to be funded separately. The payment of this fee will happen preferably in bitEUR, but may also happen in any alternative BitAsset, BTS directly, or in BTC depending on market conditions. The value indicated here and on later invoices represent FIAT values, and will be paid in equivalent value of the chosen crypto-currency. This worker carries no escrow fee. The daily BTS payout is set to 14.723 BTS, which contains a devaluation multiplier of 3. In theory, if the price remains the same and the worker is voted active, it will take 4 months to collect the budget for the whole year. The legal setting and involved entities can be found on the website This proposal is complemented by the Global Voted Spokesperson / Business to Business Development worker. See here for an overview.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250599718.13/warc/CC-MAIN-20200120165335-20200120194335-00474.warc.gz
CC-MAIN-2020-05
5,682
20
https://www.bleepingcomputer.com/forums/t/624823/rocket-tab-has-taken-over/
code
Since the people at Driver Agent took over my computer remotely,and myself declining their offer for antivirus in excess of $300. I am left with annoying "Rocket Tab" in GC and something I have never seen on FF attached to my browser. Your help is greatly appreciated. Edited by hamluis, 26 August 2016 - 10:12 AM. Moved from W10 Spt to Am I Infected - Hamluis.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742793.19/warc/CC-MAIN-20181115161834-20181115183834-00453.warc.gz
CC-MAIN-2018-47
361
5
https://msdn.microsoft.com/en-us/library/system.componentmodel.dataobjectmethodattribute(v=vs.100).aspx?cs-save-lang=1&cs-lang=cpp
code
Identifies a data operation method exposed by a type, what type of operation the method performs, and whether the method is the default data method. This class cannot be inherited. Assembly: System (in System.dll) Thetype exposes the following members. |DataObjectMethodAttribute(DataObjectMethodType)||Initializes a new instance of the class and identifies the type of data operation the method performs.| |DataObjectMethodAttribute(DataObjectMethodType, Boolean)||Initializes a new instance of the class, identifies the type of data operation the method performs, and identifies whether the method is the default data method that the data object exposes.| |IsDefault||Gets a value indicating whether the method that the is applied to is the default data method exposed by the data object for a specific method type.| |MethodType||Gets a DataObjectMethodType value indicating the type of data operation the method performs.| |TypeId||When implemented in a derived class, gets a unique identifier for this Attribute. (Inherited from Attribute.)| |Equals||Returns a value indicating whether this instance is equal to a specified object. (Overrides Attribute::Equals(Object).)| |Finalize||Allows an object to try to free resources and perform other cleanup operations before it is reclaimed by garbage collection. (Inherited from Object.)| |GetHashCode||Returns the hash code for this instance. (Overrides Attribute::GetHashCode().)| |GetType||Gets the Type of the current instance. (Inherited from Object.)| |IsDefaultAttribute||When overridden in a derived class, indicates whether the value of this instance is the default value for the derived class. (Inherited from Attribute.)| |Match||Gets a value indicating whether this instance shares a common pattern with a specified attribute. (Overrides Attribute::Match(Object).)| |MemberwiseClone||Creates a shallow copy of the current Object. (Inherited from Object.)| |ToString||Returns a string that represents the current object. (Inherited from Object.)| |_Attribute::GetIDsOfNames||Maps a set of names to a corresponding set of dispatch identifiers. (Inherited from Attribute.)| |_Attribute::GetTypeInfo||Retrieves the type information for an object, which can be used to get the type information for an interface. (Inherited from Attribute.)| |_Attribute::GetTypeInfoCount||Retrieves the number of type information interfaces that an object provides (either 0 or 1). (Inherited from Attribute.)| |_Attribute::Invoke||Provides access to properties and methods exposed by an object. (Inherited from Attribute.)| You can use the to identify data operation methods on a type marked with the DataObjectAttribute attribute so that they are more easily identified by callers using reflection. When the attribute is applied to a method, it describes the type of operation the method performs and indicates whether the method is the default data operation method of a type. Components such as the ObjectDataSource control and the ObjectDataSourceDesigner class examine the values of this attribute, if present, to help determine which data method to call at run time. The following code example demonstrates how you can apply the attribute to a publicly exposed method and identify the type of data operation it performs as well as whether it is the type's default data method. In this example the NorthwindData type exposes two data methods: one to retrieve a set of data named GetAllEmployees, and another to delete data named DeleteEmployeeByID. The attribute is applied to both methods, the GetAllEmployees method is marked as the default method for the Select data operation, and the DeleteEmployeeByID method is marked as the default method for the Delete data operation. Windows 7, Windows Vista SP1 or later, Windows XP SP3, Windows XP SP2 x64 Edition, Windows Server 2008 (Server Core not supported), Windows Server 2008 R2 (Server Core supported with SP1 or later), Windows Server 2003 SP2 The .NET Framework does not support all versions of every platform. For a list of the supported versions, see .NET Framework System Requirements.
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042992201.62/warc/CC-MAIN-20150728002312-00036-ip-10-236-191-2.ec2.internal.warc.gz
CC-MAIN-2015-32
4,090
24
https://preview.aclanthology.org/author-url/people/d/dawn-lawrie/dawn-lawrie/
code
Since the advent of Federated Learning (FL), research has applied these methods to natural language processing (NLP) tasks. Despite a plethora of papers in FL for NLP, no previous works have studied how multilingual text impacts FL algorithms. Furthermore, multilingual text provides an interesting avenue to examine the impact of non-IID text (e.g. different languages) on FL in naturally occurring data. We explore three multilingual language tasks, language modeling, machine translation, and text classification using differing federated and non-federated learning algorithms. Our results show that using pretrained models reduces the negative effects of FL, helping them to perform near or better than centralized (no privacy) learning, even when using non-IID partitioning. Named entity recognition (NER) identifies spans of text that contain names. Many researchers have reported the results of NER on text created through optical character recognition (OCR) over the past two decades. Unfortunately, the test collections that support this research are annotated with named entities after optical character recognition (OCR) has been run. This means that the collection must be re-annotated if the OCR output changes. Instead by tying annotations to character locations on the page, a collection can be built that supports OCR and NER research without requiring re-annotation when either improves. This means that named entities are annotated on the transcribed text. The transcribed text is all that is needed to evaluate the performance of OCR. For NER evaluation, the tagged OCR output is aligned to the transcriptions the aligned files, creating modified files of each, which are scored. This paper presents a methodology for building such a test collection and releases a collection of Chinese OCR-NER data constructed using the methodology. The paper provides performance baselines for current OCR and NER systems applied to this new collection. Computer Assisted Discovery Extraction and Translation (CADET) is a workbench for helping knowledge workers find, label, and translate documents of interest. It combines a multitude of analytics together with a flexible environment for customizing the workflow for different users. This open-source framework allows for easy development of new research prototypes using a micro-service architecture based atop Docker and Apache Thrift. To stimulate research in cross-language entity linking, we present a new test collection for evaluating the accuracy of cross-language entity linking in twenty-one languages. This paper describes an efficient way to create and curate such a collection, judiciously exploiting existing language resources. Queries are created by semi-automatically identifying person names on the English side of a parallel corpus, using judgments obtained through crowdsourcing to identify the entity corresponding to the name, and projecting the English name onto the non-English document using word alignments. Name projections are then curated, again through crowdsourcing. This technique resulted in the first publicly available multilingual cross-language entity linking collection. The collection includes approximately 55,000 queries, comprising between 875 and 4,329 queries for each of twenty-one non-English languages.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476452.25/warc/CC-MAIN-20240304133241-20240304163241-00875.warc.gz
CC-MAIN-2024-10
3,306
4
https://securityaffairs.co/65669/security/github-alerts-flawed-libraries.html
code
The code hosting service warns developers when including certain flawed software libraries in their projects and provides advice on how to address the issue. The new security feature is designed to alert developers when one of their project’s dependencies has known flaws. The Dependency graph and the security alerts feature have been automatically enabled for public repositories, but they are opt-in for private repositories. The availability of a dependency graph allows to notify the owners of the projects when it detects a Known security vulnerability in one of the dependencies and suggest known fixes from the GitHub community. “Today, for the over 75 percent of GitHub projects that have dependencies, we’re helping you do more than see those important projects. With your dependency graph enabled, we’ll now notify you when we detect a vulnerability in one of your dependencies and suggest known fixes from the GitHub community.” states GitHub on the introduction of the security alerts. GitHub provides developers the type of flaw, the associated severity, and affected versions, the user interface includes a link that points to a page where additional details are available. Administrators can also choose the form of warnings, including email alerts, web notifications, and warnings via the user interface, selecting also the final recipient of the message (individuals or groups). The code hosting service relies on both Ruby gems and NPM packages on MITRE’s Common Vulnerabilities and Exposures (CVE) list in order to determine if a project is using flawed libraries. “Vulnerabilities that have CVE IDs (publicly disclosed vulnerabilities from the National Vulnerability Database) will be included in security alerts. However, not all vulnerabilities have CVE IDs—even many publicly disclosed vulnerabilities don’t have them.” continues GitHub. Since many publicly disclosed vulnerabilities don’t have CVEs, GitHub will also try to warn users of flaws that still haven’t received the code. “We’ll continue to get better at identifying vulnerabilities as our security data grows,” GitHub added. In the presence of a security patch for a vulnerability discovered by GitHub, the service advises the developers to update or adopt a fix provided by the community. |[adrotate banner=”9″]||[adrotate banner=”12″]| (Security Affairs – Dependency Graph, security)
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00243.warc.gz
CC-MAIN-2023-40
2,411
13
https://climatemodeling.science.energy.gov/publications/historical-1750-2014-anthropogenic-emissions-reactive-gases-and-aerosols-community
code
We present a new data set of annual historical (1750–2014) anthropogenic chemically reactive gases (CO, CH4, NH3, NOx, SO2, NMVOCs), carbonaceous aerosols (black carbon – BC, and organic carbon – OC), and CO2 developed with the Community Emissions Data System (CEDS). We improve upon existing inventories with a more consistent and reproducible methodology applied to all emission species, updated emission factors, and recent estimates through 2014. The data system relies on existing energy consumption data sets and regional and country-specific inventories to produce trends over recent decades. All emission species are consistently estimated using the same activity data over all time periods. Emissions are provided on an annual basis at the level of country and sector and gridded with monthly seasonality. These estimates are comparable to, but generally slightly higher than, existing global inventories. Emissions over the most recent years are more uncertain, particularly in low- and middle-income regions where country-specific emission inventories are less available. Future work will involve refining and updating these emission estimates, estimating emissions’ uncertainty, and publication of the system as open-source software.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474573.20/warc/CC-MAIN-20240225003942-20240225033942-00047.warc.gz
CC-MAIN-2024-10
1,253
1
https://help.riipen.com/en/articles/7340390-customization-of-feedback
code
As an experience administrator, you can customize the set of questions that employers must answer when providing feedback your learners. These questions will appear in addition to the existing questions set by Riipen. To customize this feedback for your experience, go to your experience settings and click on the "Feedback" tab under the Project management section: Enter the question text, hint text, and question type. You may choose from a variety of question types (checkbox, date, document, multiple choice, number, linear scale, long text, and short text). If you want the question to be mandatory, select the "Required" checkbox. If you would prefer it to be optional, keep the "Required" checkbox blank. Add more questions if needed. Make sure the "Enable feedback questions" checkbox is checked. Employers will now be asked to answer these questions as part of their feedback to learners at the end of a project. You may edit or disable these questions at anytime.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510924.74/warc/CC-MAIN-20231001173415-20231001203415-00298.warc.gz
CC-MAIN-2023-40
974
7
https://c-nergy.be/blog/?p=234
code
Note : Republished article Update Note : This is not true anymore. You can use FreeNas to build up a ISCSI cluster with Windows 2008. As you probably know, it’s possible to create a Windows 2008 Cluster using iscsi target. If you google a bit, you will see that the preferred iscsi software solution is the StarWind iSCSI softwared provided by the RocketDivision company. StarWind iscsi target comes in 2 flavors. you can download the free version but support for clustering is not included. You can also dowload the 30 days trial version where it become possible to build up cluster. The problem is that the software can be used only for 30 days. Because of this limitation, i’ve tried to look for another solution…and to be honest that wasn’t a successful quest. My first option was to use the OpenFiler as iSCSI target. OpenFiler is an open source project that provide a solution for Storage management including iscsi support. My second option was to use the FreeNas solution as iscsi target. Freenas is also an open source project that emulate NAS Functionalities and the latest version support also iscsi. So, i prepared my environment in order to build my future Exchange 2007 Cluster. My servers were ready, my domain was setup and my iscsi infrastructure was also available and fully operational. The iscsi disks were available on the nodes of the future cluster. With Windows 2008 Failover Clustering, you can validate the Cluster configuration. The tool will basically make some tests and check that your configuration is capable of running Cluster software on it. The tool ran and displayed some errors related to cluster disks. The error was saying something about persistent reservation. The picture below shows you an extract of the validation tool report. As you can see, the report clearly specify that Disk does not support Persistent reservation. After some research, i found out that a cluster using iscsi disks, iscsi target must support persistent reservation. Neither OpenFiler, nor FreeNas seems to support this feature yet. You can try to add storage disks to your cluster. The disk will be added but the disk within the cluster console will be shown as Offline. You can try to bring the resource online but it will fail anyway. This is because the iscsi disks does not provide persistent reservation. As you can see, OpenFiler or Freenas cannot be used as iscsi target for Windows 2008 Clusters because they do not provide persistent reservation. This feature might be available in the next release as more people will encounter the problem. Starwind seems to be the only working solution so far. Another option might exists but will not be applicable for all users. NetApp offer a simulator to their customers. This simulator can only be used in test environments. Netapp also support iscsi technology. I havn’t test it yet but it might be possible that the Netapp simulator can be used as iscsi target for a Windows 2008 Cluster. If somebody has made the test with NetApp, let us know….
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363327.64/warc/CC-MAIN-20211206224536-20211207014536-00579.warc.gz
CC-MAIN-2021-49
3,026
12
http://stackoverflow.com/questions/210247/visual-studio-intellisense-for-headers-without-h
code
I am using a library that has headers without the .h This defeats visual studio's intellisense (declaration/definition lookup) Anyone know how to tell VS2008 that a file is a header? Go to Tools::Options::Text Editor::File Extension tab in Visual Studio. Check the "Map extensionless headers" checkbox, and select the language you want from the combobox. I'd hazard a guess that you should ensure the headers are included from a source file (usually a .cpp file). Where the properties for the source file have the Tool property set to C/C++ Compiler Tool. I would guess Intellisense starts with them, and would follow #includes to files regardless of their extension to build its database of symbols from anything it encounters.
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049278385.58/warc/CC-MAIN-20160524002118-00025-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
728
6
http://nlp.hivefire.com/articles/82192/challenges-of-building-an-intelligent-chatbot-ai/
code
Building an intelligent chatbot is not devoid of challenges. From making the chatbot context-aware to building the personality of a chatbot, there are challenges involved in making the chatbot intelligent. Chatbot Challenges Let's talk about context integration, coherent responses, model assessment, and reading intention. Context Integration Sensible responses are the holy grail of chatbots. Integrating context into the chatbot is the first challenge to conquer.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806979.99/warc/CC-MAIN-20171123214752-20171123234752-00619.warc.gz
CC-MAIN-2017-47
466
1
https://www.sasdumps.com/using-braindumo2go-new-updated-microsoft-70-491-practice-exam-questions-getting-microsoft-70-491-certification1-6.html
code
Using Braindumo2go New Updated Microsoft 70-491 Practice Exam Questions – Getting Microsoft 70-491 Certification(1-6) You plan to develop several Windows Store apps. You plan to use a CheckBox control in all of the apps. The CheckBox control will use a custom visual display. You create XAML markup to customize the control. The code contains all of the necessary visual components for the control, including elements named checkedGlyph and indeterminateGlyph. You need to ensure that the check box meets the following requirements: – If a value for the check box was NOT set, the check box must display indeterminateGlyph. – When the check box is selected, the check box must display checkedGlyph. – If the check box is cleared, the check box must NOT display any glyphs. You have the following XAML markup: Which code snippets should you insert in Target 1, Target 2, Target 3, Target 4, Target 5 and Target 6 to complete the XAML markup? (To answer, select the correct code snippet from each drop-down list in the answer area.) You are developing a Windows Store app that will display a toast notification. You need to ensure that when a toast notification is displayed, the first line of the notification is bold. Which template should you use? A large image, one string of bold text on the first line, one string of regular text wrapped across the second and third lines. You plan to create a custom panel that displays a pie chart. Each value of the pie chart will have a control. You need to register a custom dependency property to the panel. Which code segment should you use? A. Option A B. Option B C. Option C D. Option D You are developing a Windows Store app. You need to create and run unit tests for the app. Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order,) You are developing a Windows Store app that will provide users with the ability to subscribe to content by using in-app purchases. You need to test the in-app purchase functionality of the app before you deploy the app to the Windows Store. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Modify the Package.appxmanifest file. B. Use the CurrentAppSimulator class. C. Modify the App.xaml file. D. Modify the Windowsstoreproxy.xml file. E. Use the CurrentApp class. You are developing a Windows Store app that will provide users with the ability to create photos by using the hardware on a device. Once the users create the photos, they can save the photos to the Pictures library. If the users sign in by using a Microsoft account, they can grant other users remote access to the photos. You need to identify which capabilities must be enabled for the app. Which three capabilities should you identify? (Each correct answer presents part of the solution. B. Pictures Library D. Internet (Client & Server) E. Private Networks (Client & Server) F. Enterprise Authentication A: The webcam capability provides access to the webcam’s video feed, which allows the app to capture snapshots and movies from a connected webcam. B: The picturesLibrary capability provides programmatic access to the user’s Pictures, allowing the app to enumerate and access all files in the library without user interaction. This capability is typically used in photo playback apps that need to access the entire Pictures library. D: Internet and public networks The internetClient capability provides outbound access to the Internet and public networks through the firewall. Almost all web apps use this capability. The internetClientServer capability provides inbound and outbound access to the Internet and public networks through the firewall. http://msdn.microsoft.com/en-us/library/windows/apps/hh464936.aspx Braindump2go New Released Microsoft 70-491 Dumps PDF Free Download: http://www.braindump2go.com/70-491.html
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816893.19/warc/CC-MAIN-20240414161724-20240414191724-00655.warc.gz
CC-MAIN-2024-18
3,967
43
https://www.eatlikenoone.com/wprm_print/recipe/25578
code
Place whole chicken in your Instant Pot or pressure cooker. Cover with water. Do NOT go past the max fill line. Put lid on. Set to seal. Cook on high pressure for 40-45 minutes for a fresh chicken, or 60 minutes for a frozen chicken. Instant Pot will go to keep warm when done cooking. Allow for natural release about 25 minutes. The silver piece will drop on the Instant Pot. Remove the chicken. Allow to cool. Put the carrots and celery in the Instant Pot. Lid back on and set to high pressure for 5 minutes. Allow for natural release. Shred the chicken once it is cool enough to shred. Once the veggies are done, set the Instant Pot to saute. When it begins to boil add your noodles. Cook until desired texture. Add the chicken back to the pot. Salt to taste and serve.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00480.warc.gz
CC-MAIN-2022-33
772
8
https://jobb.idg.se/jobb-info/57464368/senior-developer-enabler-to-seb-in-stockholm/?TrackID=4157&utm_source=IDG&utm_medium=widget&utm_campaign=Sakerhet24&ref=w-landing
code
Senior Developer / Enabler to SEB in Stockholm Do you want to help all developers at SEB create world class code? Welcome to the Developer Community Team in Stockholm! You will get a central role in our journey to improve our coding and the security around it. You will get the opportunity to contribute with your own ideas and implement these to optimize our way of working. Your primary work will be to experiment and try different things. ABOUT THE POSITION You will be part of a self-organized, agile, cross-delivery team sitting in modern offices in Solna. Your team consist of Product a product owner, scrum master and developers. Your work, however, will not be limited to your team. You will work with other teams across different departments at SEB. For example, you will: - Support teams in publishing their code as open-source and in cloud ( Google Azure, AWS, etc.) - Use your creativity to come up with new ideas and development tools and implementing these - Participating in initiatives to optimize our developers' workplace and way-of-working - Improve our coding security within open-source and cloud DevSecOps is a prioritized area at SEB and if you don't have knowledge of this already you will get the opportunity to learn everything about it here. Since you will work closely with our developers it is necessary that you have experience of coding, preferably within a modern development environment. In this role you will contribute with your own ideas and therefor it is good if you are creative, innovative and able to think outside the box. Also, you are communicative and able to present your ideas to both developers and people within management. Most important for you to succeed is your interest and curiosity about new technologies, and your motivation to always learn more. With a personal interest in technology and the area itself, you will come far. We believe you also are an individual who enjoy teamwork and can communicate effectively in a multi-cultural environment. You are driven by the effect your effort has on the business and have the capability to take initiative as well as responsibility. To be able to communicate effectively with the team, you are fluent in both written and spoken English. WORKING AT SEB WELCOME WITH YOUR APPLICATION We have chosen to work with Ada Digital in this recruitment. Their recruitment process focuses on transparency, inclusion and a fast moving candidate experience. And now we want to know more about you - on your own terms! To apply, please fill out the short form, briefly motivate why you are interested in the position, and attach your CV or LinkedIn-profile. No additional documentation is needed. You can then, in real-time, follow your application online as our recruiters are working with it. We work with a continues selection process which means we might hire a candidate before the final apply date, so apply already today! Interested and want to know more? Please contact our recruiter today. We are looking forward to connecting soon!
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400238038.76/warc/CC-MAIN-20200926071311-20200926101311-00560.warc.gz
CC-MAIN-2020-40
3,029
15
https://androidforums.com/threads/rooting-troubles-su-segfault.812816/
code
Hi, I've been trying to root my Galaxy S2 T989 (android 4.1.2) for several hours now. I'm new to this and may not understand all the intricacies of rooting. I followed the steps in this guide http://androidforums.com/galaxy-s2-t-mobile-all-things-root/627099-guide-root-rom-sgh-t989.html. The rooting process failed (as Titanium Backup complained that it couldn't gain root access). I checked everything and realized that I had forgotten to set USB debugging in the Developer options. I checked the USB debugging, and repeated the entire process (using TWRP Touch Recovery). There were no errors reported in TWRP (everything ran smoothly). Titanium Backup still complains about no root access. I looked at my filesystem and /system/bin/su and /system/xbin/su exist, but executing /system/bin/su (in an android terminal emulator) results in a segfault. I reinstalled superuser+busybox several more times and several more reboots, but with no change. Code (Text): </system/xbin> $ ls -l /system/bin lrwxrwxrwx root root 2013-12-29 20:02 su -> /system/xbin/su </system/xbin> $ ls -l su -rwsr-sr-x root root 352256 2013-12-29 20:02 su </system/xbin> $ whoami whoami: unknown uid 10219 </system/xbin> $ ./su Segmentation fault I've tried googling for ideas, but my search has been fruitless so far. Is there anyway to fix the situation and finish rooting? Thank you very much.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669454.33/warc/CC-MAIN-20191118053441-20191118081441-00290.warc.gz
CC-MAIN-2019-47
1,371
1
https://paramaggarwal.medium.com/switching-a-light-bulb-with-an-arduino-adb848d76e84
code
I had wanted to try this out since long. The most basic way was to use a simple relay. When the coil is energised, it pulls the contact towards itself, and establishes a connection so that the bulb can turn on. But it is noisy. A TRIAC is basically the main switch, and the isolator is to keep the Arduino circuitry safe from the high supply voltage. Caution: High voltages are dangerous. This post just describes what I did. This is by no means a guide. If you decide to do something similar, please accept that you are doing so at your own risk. Read up well and take care. The first step is understanding these parts. Pulling up their data sheets, a TRIAC is like this: It has two terminals where the mains supply is connected and a gate which controls it. For the opto-isolator, at the input is a simple LED. If this is on, then the output is switched. The combination of the two parts. Hence the Arduino is completely isolated from the mains supply. The basics. A bulb socket, mains socket and safety tape. The bulb I wish to take control of. It’s very bright, hence I left it inside the covering. The circuit above, put together on a general use board. Again, take extreme care and cover all high voltage areas with safety tape. Now its just a matter of turning on the LED inside the opto-isolator using any device like an Arduino. Fairly simple. While the Arduino thinks it is controlling an LED, it is actually controlling a huge 60W bulb! Originally published at paramaggarwal.com.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703517159.7/warc/CC-MAIN-20210118220236-20210119010236-00021.warc.gz
CC-MAIN-2021-04
1,492
13
https://forum.netgate.com/topic/156845/pfsense-pop3-connection-fail
code
Pfsense pop3 connection fail Pop3 mail received mail randomly fail, 30minute can send and receive after 30minute can not connect. The email server is outside hosting and office using outlook setup pop3, have telnet from office to email hosting is no problem. May I know how to troubleshooting ? Currently no set any port for WAN & LAN rules for email. So you are connecting from a client behind the firewall to a public pop3 server and sometimes it fails? Are you running any packages that might be blocking it like Snort/Suricata? Do you see anything blocked in the logs? Check the state table when it fails for traffic to the server. Ultimately run a packet capture for that traffic to check it's leaving the WAN and what's coming back.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304915.53/warc/CC-MAIN-20220126041016-20220126071016-00510.warc.gz
CC-MAIN-2022-05
738
7
https://www.experts-exchange.com/questions/28690145/Cloud-File-Server.html
code
Which one of the below options do you recommend that would do the below "in-the-cloud" file locking, only download a NEW-COPY if needed, etc ? I currently have one location with 100 people and a 24TB EqualLogic SAN that does nightly replication to an offsite location for disaster recovery. We are expanding to 3+ locations and each location will have about 10 people editing shared files around 500MB each, which may cause firewall and bandwidth overload if all files are located at my main site, which is VERY remote and has only a 20MB pipe, therefore I plan to put these files "in-the-cloud" somehow have the local EqualLogic SAN only download a NEW-COPY if/when needed, locking the "in-the-cloud" file so site #1 knows it is "in-use" and cannot edit when site #2 is already editing the "in-the-cloud" file.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824115.18/warc/CC-MAIN-20181212181507-20181212203007-00401.warc.gz
CC-MAIN-2018-51
811
19
https://macdownload.informer.com/ssh-client1/versions/
code
Connects client devices to Parallels Remote Application Server apps & desktops. Network access anonymizer. Its main purpose is to hide your real public IP address. Remotely connect to shared desktops securely and efficiently. It is a handy tool for managing your OpenSSH SSH client configuration file. An utility that allows to launch ssh sessions with password authentication
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00643.warc.gz
CC-MAIN-2023-50
376
5
https://www.tjdivisions.com/games/Classic/WordSearch/index.php
code
Directions: To highlight a word MouseDown or Touch at start of the word and then MouseUp or UnTouch at the end of the word. The word may be placed horizontal, vertical, diagonal, up, down, forward and backward. When a word is highlighted correctly then it will stay highlighted to indicate that it is correct. Find and highlight all of the words correctly to complete the puzzle. Good Luck!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816939.51/warc/CC-MAIN-20240415014252-20240415044252-00505.warc.gz
CC-MAIN-2024-18
390
1
https://lispnyc.github.io/lispinsummerprojects/winning-projects.html
code
We are pleased to announce the Grand Prize Winner of the Lisp in Summer Projects Programming Competition. The Grand Prize Winner is Jonas Enlund of Findland who implemented CLJS Fiddle in the area of Software Development. CLJSFiddle is a ClojureScript playground web application similar to JSFiddle and JSBin. The application lets people write, execute, save and share ClojureScript programs without leaving their web browser. Jonas Enlund is awarded a $2000.00 cash prize. We’re also pleased to announce our seven Second Prize winners who are awarded a $500 cash prize each. |Second Prize Winners| |Ryan Pavlik||CL-Autowrap||United States| |Dogadailo Dmytro Victorovich||MetaJS||Ukraine| |Thomas Greve Kristensen||Propaganda||United Kingdom| |Cong-Xin Qiu||Schemanian||United States| |Lars Tveito||Shared Buffer||Norway| ( sponsored by LispNYC, ClojureNYC the Association of Lisp Users and you )
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949694.55/warc/CC-MAIN-20230401001704-20230401031704-00633.warc.gz
CC-MAIN-2023-14
898
12
https://benbedphar.org/webinar-nrf2-and-system-medicine/
code
Oxidative Stress: Biochemical and Pharmacological aspects Most diseases are defined by a symptom, not a mechanism. Consequently, therapies remain symptomatic. In reverse, many potential disease mechanisms remain in arbitrary search for clinical relevance. Reactive oxygen species (ROS) are such an example. It is an attractive hypothesis that dysregulation of ROS can become a disease trigger. Indeed, elevated ROS levels of various biomarkers have been correlated with almost every disease, yet after decades of research without any therapeutic application. We here present a first systematic, non-hypothesis-based approach to transform this field as a proof of concept for biomedical research in general. We selected as seed proteins 9 families with 42 members of clinically researched ROS-generating enzymes, ROS-metabolizing enzymes or ROS targets. Applying an unbiased network medicine approach, their first neighbours were connected, and, based on a stringent subnet participation degree (SPD) of 0.4, hub nodes excluded. This resulted in 12 distinct human interactome-based ROS signalling modules, while 8 proteins remaining unconnected. This ROSome is in sharp contrast to commonly used highly curated and integrated KEGG, HMDB or WikiPathways. These latter serve more as mind maps of possible ROS signalling events but may lack important interactions and often do not take different cellular and subcellular localization into account. Moreover, novel non-ROS-related proteins were part of these forming functional hybrids, such as the NOX5/sGC, NOX1,2/NOS2, NRF2/ENC-1 and MPO/SP-A modules. Thus, ROS sources are not interchangeable but associated with distinct disease processes or not at all. Module members represent leads for precision diagnostics to stratify patients with specific ROSopathies for precision intervention. The upper panel shows the classical approach to generate hypotheses for a role of ROS in a given disease by focusing on ROS levels and to some degree the ROS type or metabolite. Low levels are considered physiological; higher amounts are thought to cause a redox imbalance, oxidative stress and eventually disease. The source of ROS is less relevant; there is also ROS-induced ROS formation, i.e. by secondary sources (see upwards arrow). The non-hypothesis-based network medicine approach uses genetically or otherwise validated risk genes to construct disease-relevant signalling modules, which will contain also ROS targets. Not all ROS sources will be relevant for a given disease; some may not be disease relevant at all. The three examples show (from left to right) the disease-relevant appearance of an unphysiological ROS modifier/toxifier protein, ROS target or ROS source. Harald Schmidt Dr. med. Harald H.H.W. Schmidt is a medical doctor and pharmacist and Professor and Chair of Pharmacology & Personalised Medicine at Maastricht University’s Faculty of Health, Medicine and Life Sciences. He led a research program as European Research Council (ERC) Advanced Investigator, which translated into a current ERC Proof-of-Concept grant to develop a first-in-class neuroprotective therapy for ischemic stroke. He co-led a EUROSTAR programme which led to the development and commercialisation of a NOX4 inhibitor. As a science leader, he founded/led two European Science Foundation COST actions, one on reactive oxygen (EUROS), one on Systems Medicine. He now co-coordinates the EU-funded Horizon 2020 programme REPO-TRIAL on Systems Medicine and the Horizon Europe platform project, REPO4EU, on drug repurposing. Before Maastricht, prof. Schmidt had worked in Australia, Germany and USA in different academic and business leadership positions. These include chair of Monash University’s Centre for Vascular Health, Australia, Maastricht University Faculty of Medicine innovation platform, the Netherlands, different chairs in pharmacology and director of a drug discovery CRO at TransMIT, Giessen, Germany. He also co-founded and for two years led as CEO Vasopharm GmbH, a drug discovery company now entering into phase III clinical development. His research focuses on cardiovascular and neurological disease mechanisms, target validation, drug and biomarker discovery, personalised and network medicine. Professor Schmidt has published over 200 peer-reviewed papers, reviews, books and patents (Hirsch-index of 99) and co-founded and is co-editor-in-chief of the journal Network Medicine. He has been awarded the Roche Molecular Biochemicals Research Prize for Cell Biology, the Phoenix Research Prize in Pharmacy, and the Pro Scientia Prize. Molecular interaction network models describe how different molecules – proteins, small RNAs, any molecules we wish to study – interact with each other. Collecting this interaction information helps scientific communities by serving as a knowledge base of all known interactions, and at the same time driving research forward by making it possible to predict interactions which were previously unknown. Molecular interactions can occur in different “layers”, depending on the qualities of the molecules at hand: for example protein – protein interaction layers describe the direct, physical interactions of proteins, while the transcriptional regulatory layer describes the relationships between transcription factors and their regulated genes. While both of these layers represent interactions in the same organism or cell, they occupy a different lane of information flow, and rarely meet. Multi-layered network models aim to connect them, by finding the points where the layers do cross over – such links, referred to as intralayer interactions help us describe molecular interactions networks in a more realistic way, by giving us a more complete picture of the studied system, for example by highlighting how a specific protein – protein interaction is regulated upstream. NRF2 is the master transcriptional regulator of oxidative and xenobiotic stress responses. Using the above described concept, we developed an online resource, NRF2-ome, to provide an integrated and systems-level database for NRF2. The database contains manually curated and predicted interactions of NRF2 as well as data from external interaction databases. We integrated NRF2 interactome with NRF2 target genes, NRF2 regulating TFs, and miRNAs. We connected NRF2-ome to signaling pathways to allow mapping upstream NRF2 regulatory components that could directly or indirectly influence NRF2 activity totaling 35,967 protein-protein and signaling interactions. The user-friendly website, available at http://nrf2ome.org, allows researchers without computational background to search, browse, and download the database. Tamas Korcsmaros. As a PhD student, Tamas developed a signalling network database, SignaLink, which filled a vital niche in the landscape of bioinformatics tools, and by now it has become one of the most used signalling network resources for human and model organism studies. It also forms the core of OmniPath, a more general human signaling network resource Tamas co-developed with the group of Julio Saez-Rodriguez. In 2014, Tamas received a special 5-year BBSRC fellowship to work in the computational biology and sequencing focused Earlham Institute and in the gut microbiome centred Quadram Institute at the Norwich Research Park in the UK. This fellowship allowed him to establish a multi-disciplinary group that combines computational and experimental approaches, including gut organoids. In 2019, he was appointed as a Tenure-track group leader at the Earlham and the Quadram Institutes, and between 2017 and 2021 he led the Systems Genomics workpackage of the Earlham Institute’s strategic programme. His group has carried out multiple projects to predict, analyse and validate host-microbe interactions in the gut, especially in relation to the regulation of autophagy by microbes and upon disease conditions such as inflammatory bowel disease (IBD) and cancer. He had multiple innovation and industrial partnership projects to develop new computational tools and platforms to analyse multi-omics data. End of 2021, Tamas moved to Imperial College as a Senior Lecturer, and currently leads both a research group that focuses on improving our understanding on the pathomechanisms of IBD and the NIHR Imperial BRC Organoid Facility to establish patient-specific multi-omics studies for various complex diseases. In the first part of the talk, network-based methods and tools for mechanism understanding and drug repurposing developed by the Bioinformatics Department at CING will be presented. In the second part, a recent work on drug repurposing on Alzheimer’s Disease (AD) through modulation of NRF2 neighborhood will be presented. NRF2 has a critical role in the inflammation response and in the cellular redox hemeostasis and provides cytoprotection in several diseases including those in the neurodegeneration spectrum. These roles suggest that NRF2 and the directly associated proteins could be novel attractive therapeutic targets in the fight against for AD. By applying a systemics perspective, we propose an in silico drug repurposing approach for AD, based on the NRF2 interactome and regulome, aiming to highlight possible repurposed drugs for AD. Using publicly available information based on differential expressions of the NRF2-neighborhood in AD and through a computational drug repurposing pipeline, we derived to a finest group of candidate repurposed drugs and small molecules that affect the expression levels of the majority of NRF2-partners. The relevance of these findings was assessed in a four-steps computational meta-analysis including i) structural similarity comparisons with currently ongoing NRF2-related drugs ii) evaluation based on the NRF2-diseasome iii) comparison of relevance between targeted pathways of finest drugs and ongoing NRF2-related drugs and iv) further comparison with existing knowledge on AD and ongoing NRF2-related drugs based on their known modes of action. Overall, our analysis yielded in 5 candidate repurposed drugs for AD. We expect that our proposed candidate repurposed drugs will be useful for further research and clinical translation for AD. George Spyrou: Prof. George M. Spyrou is the Bioinformatics European Research Area Chair Holder and the Head of the Bioinformatics Department (C-BIG) at the Cyprus Institute of Neurology and Genetics (CING). He holds a BSc on Physics, an MSc on Medical Physics and an MSc on Bioinformatics as well. During his PhD he worked on algorithms and simulations focusing on breast imaging. At the very beginning of the Biomedical Research Foundation of the Academy of Athens (BRFAA), Dr. Spyrou was selected to drive and supervise the design and development of the whole informatics infrastructure at BRFAA, being appointed as a Staff Research Scientist of level B and promoted to Staff Research Scientist of Level A at BRFAA in 2007 after successful evaluation. Since 2001 and for over 10 years he worked on the strategic plan and implementation of IT development at BRFAA, holding also the position of the Head of the Department of Informatics and New Technologies of BRFAA. In parallel, he was organizing his research group and was running his own research on bioinformatics and medical informatics. For the years 2009-2016 he was coordinating a full semester course (Simulation Methods in Medicine and Biology) in the Postgraduate Program “Information Technologies in Medicine and Biology” (in both directions: Bioinformatics and Medical Informatics) at the Department of Informatics and Telecommunications, University of Athens. In 2016 he accepted the offer for the position of the Bioinformatics European Research Area Chair Holder at CING. Since 2017, Dr. Spyrou is the Bioinformatics Course Coordinator at the Postgraduates School of CING where he has been elected as full Professor in 2019. He is also a visiting instructor on thematic areas including Systems Bioinformatics, Biological Network Analysis and Biomedical Informatics in other graduate and postgraduate courses. Dr. Spyrou is a Senior IEEE Member and a Member of the Steering Committee for the creation of the European Bioinformatics Infrastructure ELIXIR-Cyprus Node. He serves as member of the Editorial Board in the journals Briefings in Bioinformatics, BMC Bioinformatics and Frontiers in Bioinformatics. His work is focusing on the design and development of computational methods for the discovery of complex patterns of biomarkers, the understanding of underlying molecular mechanisms and drug repurposing though network-based analytics and systems bioinformatics.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473524.88/warc/CC-MAIN-20240221170215-20240221200215-00521.warc.gz
CC-MAIN-2024-10
12,664
8
http://constructionasphalt.tpub.com/TM-5-3895-374-24-1/css/TM-5-3895-374-24-1_84.htm
code
Is described throughout the manual when used in sequence with other keys this key selects special functions as well as entering Calibration functions and Parameters. When used by itself, this key operates a one item totalizer. Each time the [SELECT] key is pressed, the displayed weight (gross or net) will be accumulated in the totalizer. The display will flash Add and return to the displayed weight. See special functions 10 and 11 for displaying and clearing the accumulated total. Note that the totalizer accumulates any displayed weight. Do not switch between Lbs, and Kg while totalizing, otherwise the total will be incorrect. If an optional printer is connected, Operation of the [SELECT] key will cause the displayed weight to be printed. (See also special function 10.) Special Keypad Functions All of the special keypad functions are selected using a two-step procedure. The special functions are shown on the number keypad. Please note that there are many functions which are not listed on the keypad. These will be explained further on. To select a special function, first press the number key for that function, then press [SELECT]. For example, to test the indicators display PRESS - [8/TEST] [SELECT] All of the special functions are described below. Do not forget to press [SELECT] after pressing the key for the function you wish to operate. Selects the display to show Channel 1. Selects the display to show Channel 2. Selects the display to show Channel 3. Selects the display to show the sum of any channels which are in use. The indicator lamps will show which channels are being summed. Selects the display to cycle between the individual channels Each channel will be displayed for three seconds To stop the scanning select a single channel - i e. Selects between the gross weight (actual scale weight) and net weight (gross weight minus entered tare valuer. The NET indicator lamp will be on when the net weight is This key alternates between weight being displayed in pounds or kilograms. Each press of the key toggles the display. The LB or KG indicator lamps will show which units the display is in The Test mode allows the verification of the indicator displays Each time Test is selected, the display will momentarily show 888888 and all the status indicator lamps will be on. Selects the Calibration mode. Operation of this mode is described in detail in Section III. Special Functions not listed on Keypad The following special functions require a two digit entry followed by the SELECT key, e.g. for function press , then press , then press Displays the accumulated total when the indicator is used in the accumulating mode (see [SELECT] key). This function also causes the accumulated total to be printed on any optional recording device. Clears the accumulated total (see [SELECT] key). Displays the current stored tare value (see [TARE] key).
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578711882.85/warc/CC-MAIN-20190425074144-20190425100144-00069.warc.gz
CC-MAIN-2019-18
2,881
54
https://guidebook.com/guide/27829/poi/2652569/
code
Education: In 2009 Morgan retired from teaching at the University of Washington where he wrote the Oracle program and had been its primary instructor since 1998. In addition to his work at UW he also served as an adviser to the outreach program at the University of California Berkeley, was a consultant on Oracle to Harvard University, and as a guest lecturer at numerous universities including the University of Oslo (Norway), the University of Canterbury (New Zealand), Techologico de Costa Rica, and Universidad Latina de Panama. In 2014 Morgan taught a Master Class for IOUG as part of the "New Challenges & Opportunities Facing DBAs" series. User Groups: Morgan is a member of the executive boards for the Vancouver and Victoria Oracle Users Groups in Canada, a member of NYOUG, the co-founder of the International GoldenGate Oracle Users Group, a former Board member of the Western Washington Oracle Users Group, a former Chair of the Washington Software Association's Database Special Interest Group. He has also been a member of UKOUG, the International Oracle zSeries SIG, the Oracle RAC SIG, and BAARF. Community: Mr. Morgan is a regular contributor at Oracle conferences and forums around the world presenting at conferences including OpenWorld, Collaborate, ODTUG Kaleidoscope, IOUC International Leadership Conference, and has presented or taught Oracle in Brazil, Bulgaria, Canada, Chile, China, Costa Rica, Denmark, Ecuador, Estonia, Finland, Germany, Japan, Latvia, Mexico, the Netherlands, New Zealand, Norway, Panama, Peru, Serbia, Sweden, Thailand, UK, Uruguay, and the US. Consulting: Currently Morgan focuses his efforts on consulting for Tier 1 enterprise clients in aerospace, telecommunications, e-commerce and the cloud.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146033.50/warc/CC-MAIN-20200225045438-20200225075438-00300.warc.gz
CC-MAIN-2020-10
1,746
15
http://sourceforge.net/p/ocemp/mailman/ocemp-devel/thread/[email protected]/
code
OcempGUI 0.2.2 has been released. OcempGUI is a python based toolkit for creating graphical user interfaces using the pygame library. It offers various widgets and base classes, which make it suitable for a broad range of projects and easily * Python (>= 2.3) http://www.python.org * Pygame (>= 1.7.1) http://www.pygame.org * ATK (>= 1.11.0) http://developer.gnome.org/projects/gap/ * pkg-config http://pkgconfig.freedesktop.org/ Features in 0.2.2 * New TooltipWindow class which uses a certain color and displays a simple line text. * New SIG_ENTER and SIG_LEAVE signals, which indicate that the mouse cursor entered or left a widget. * New 'entered' attribute and set_entered() method in BaseWidget class, which indicate, that the widget is entered by an input * Added SIG_ENTER and SIG_LEAVE support to the BaseWidget class. Changes in 0.2.2 * Fixed a notify() bug in the Magnifier class, which could cause exceptions if no mouse movements occured in the passed event list. * The font cache of the String module distinguishes between applied styles when String.create_font(), String.create_file_font() and String.create_system_font() are used. (Thanks to Regis Desgroppes) * Fixed a bug in String.create_system_font(), which applied styles two times and could lead to broken rendering of fonts. (Thanks to * Minor speed optimizations in some widget classes. * The WidgetStyle dictionary class will be imported using the module * Fixed internal positioning for packed widgets. * Removed doubled set_state() method in ToggleButton class. * Fixed wrong SIG_FOCUSED emittance, when the focus was not set on the * Fixed scrolling behaviour in the ScrolledList class. * Fixed the update of deselected items in the ScrolledList class. * Fixed drawing_engine example. The package and its signature are available from here: MD5 sum = cbb4a85b04cb0c9abd3cf252febcf552
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657138980.37/warc/CC-MAIN-20140914011218-00021-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
1,860
34
https://mail.openjdk.java.net/pipermail/i18n-dev/2011-January/000240.html
code
<i18n dev> Level 1 Unicode support for Java regexes: overview tchrist at perl.com Fri Jan 21 07:02:55 PST 2011 > Thanks for looking into the Unicode support issues in Java RegEx. > Since you have been working on Unicode in the past decade, I'm sure > you understand that most of the issues you are pointing out here > belongs to the "Extended Unicode Support: Level 2" as documented in > UTS#18 Unicode Regular Expressions . I don't know that "most" of my issues pertain to Level 2, although I haven't actually counted up what falls in what category. > Unfortunately the current Java RegEx implementation only > supports the "Basic Unicode Support: Level 1", Quite possibly you've done more work to make that statement true, but as far as I can tell, the current regex class does not provide that very most basic "Level 1" Unicode support specified in UTS#18. It does support some of the Level 1 features, but not all of them. Several are omitted, which I will draw attention to below. > as specified in Java RegEx > java.util.regex.Pattern API document . > http://download.java.net/jdk7/docs/api/java/util/regex/Pattern.html Is the source for that available? If it were, I'm sure many questions I have I could easily answer myself. > http://www.unicode.org/reports/tr18 Perhaps I'm misreading, but I do not believe that Java provides even basic Level 1 support for regexes as specified in that document. Sherman, you may have already added in the necessary functionality for Level 1 support, but I do not see that in the API you reference above. It is quite easy to tell whether an implementation meets the Level 1 requirements because under each of those 7 subsections, there is a very specific statement about what it takes to be considered to have met that requirement. These statements are of the form "RX.Y: ..." where X is 1 for Level 1, 2 for Level 2, etc; and where Y is the subsection. I quote The following describes the possible ways that an implementation can claim conformance to this technical standard. All syntax and API presented in this document is only for the purpose of illustration; there is absolutely no requirement to follow such syntax or API. Regular expression syntax varies widely: the features discussed here would need to be adapted to the syntax of the particular implementation. In general, the syntax in examples is similar to that of Perl Regular Expressions, but it may not be exactly the same. While the API examples generally follow Java style, it is again only C0. An implementation claiming conformance to this specification at any Level shall identify the version of this specification and the version of the Unicode Standard. C1. An implementation claiming conformance to Level 1 of this specification shall meet the requirements described in the RL1.1 Hex Notation RL1.2a Compatibility Properties RL1.3 Subtraction and Intersection RL1.4 Simple Word Boundaries RL1.5 Simple Loose Matches RL1.6 Line Boundaries RL1.7 Supplementary Code Points I'll now go through each of those individually. More information about the i18n-dev
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141193221.49/warc/CC-MAIN-20201127131802-20201127161802-00460.warc.gz
CC-MAIN-2020-50
3,071
55
http://www.okcupid.com/profile/keheh
code
To elaborate on my details: I am multiracial, mostly various white races but also a large portion of African American, and a bit of Native American. For those who are wondering, I identify as mixed. I am currently unemployed because I'm attending college. I am an atheist, but I identify more as a secular humanist as it explains more about how I feel about the world than just the lack of a belief in deities.
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997872002.22/warc/CC-MAIN-20140722025752-00172-ip-10-33-131-23.ec2.internal.warc.gz
CC-MAIN-2014-23
410
2
https://forum.wordreference.com/threads/set-back.372705/
code
It means that your budget isn't in good shape because of your overspending so your budget will be tight and it implies that you may need to cut back on your spending for some amount of time. It might take you a few months to get your budget back on track. Because you spent too much money for Christmas, you will have to be careful of your budget. Your budget is how much money you are allowed to spend. So because of all that money spent, your budget will be higher the whole year.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141197278.54/warc/CC-MAIN-20201129063812-20201129093812-00691.warc.gz
CC-MAIN-2020-50
482
2
http://forumsqa.com/question/unit-testing/
code
Enter your email address: what is unit testing? I am new to testing and want to know about different types of testing. Software verification and validation method in which a programmer tests if individual units of source code are fit for use. It is usually conducted by the development team. Hope it helps.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347399820.9/warc/CC-MAIN-20200528135528-20200528165528-00152.warc.gz
CC-MAIN-2020-24
306
5
https://researchguides.plattsburgh.edu/c.php?g=357250&p=2410659
code
Search for resources available at PSU's Feinberg Library. SUNY Libraries, or Worldwide Libraries, all in one database. You can borrow any resource from other libraries for free by clicking the Get It Now button. See the InterLibrary Loan tab in this guide for more details on how to use this service from the Branch Campus. Need research help -- or just have a question? Ask a librarian!
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585516.51/warc/CC-MAIN-20211022145907-20211022175907-00039.warc.gz
CC-MAIN-2021-43
387
3