url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://staging6.odsc.com/speakers/practical-reinforcement-learning-for-data-scientists/
code
Abstract: Reinforcement Learning (RL) studies how an agent can interact with its environment to learn a policy that maximizes expected cumulative rewards for a task. Recently, RL has experienced growth and interest due to use case results in robotics, finance, autonomous driving, business management, education, energy, healthcare, to name a few. In this tutorial, we focus on a technique called Deep Q Learning. DQL is a RL technique where rewards are cataloged and maximized while learning the best policy. We provide a gentle introduction to Deep Q Learning with a canonical example of winning a game called the cart-pole problem. In the next part of the tutorial, we will outline how DQL applies to a finance example, predicting the next best move (i.e., best purchase and sales of stocks) to maximize gains. This valuable tutorial will teach both deep learning and distributed computing (Ray) skills. Lesson 1: Deep Q Learning - what is it and how does it work? Familiarize yourself with the general concepts of reinforcement learning, deep learning and q-learning. You will learn how these concepts tie together in the industrial context, with an emphasis on practical application. Lesson 2: Learning about Ray and RLLib Libraries for Distributed RL Practice using the distributed computing library, Ray, and its scalable reinforcement learning library, RLLib. We will have an initial tutorial where we solve the cart-pole problem and while doing so learn about distributed RL. Lesson 3: Reinforcement Learning for Financial Predictions We will discuss practical applications of reinforcement learning, and its use in financial institutions. We will walk through an example of applying deep q learning to making the best next choice for stock market purchases or sales. We will demonstrate how scalable techniques can make reinforcement learning a practical tool for business problems. Attendees should have familiarity with Python and typical ML packages (e.g., pandas, numpy, sklearn, torch). We also suggest that attendees understand the basics of distributed computing, deep learning, and reinforcement learning. We will provide optional readings on the necessary background ahead of the tutorial. Bio: Jennifer Davis, Ph.D. is a Staff Field Data Scientist at Domino Data Labs, where she empowers clients on complex data science projects. She has completed two postdocs in computational and systems biology, trained at a supercomputing center at the University of Texas, Austin, and worked on hundreds of consulting projects with companies ranging from start-ups to the Fortune 100. Jennifer has previously presented topics for Association for Computing Machinery on LSTMs and Natural Language Generation and at conferences across the US and in Italy. Jennifer was part of a panel discussion for an IEEE conference on artificial intelligence in biology and medicine. She has practical experience teaching both corporate classes and at the college level.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475806.52/warc/CC-MAIN-20240302084508-20240302114508-00713.warc.gz
CC-MAIN-2024-10
2,964
9
http://list-archive.xemacs.org/archive/list/[email protected]/thread/ZJNRTRRD3WHJMRQMFCOMYWBDNILSOLQ3/?sort=date
code
"Stephen J. Turnbull" <stephen(a)xemacs.org> さんは書きました: >>>>> "Mike" == Mike FABIAN >> We'll have to have Ben explain that. I have no idea what the >> rationale for that is. Given that most of that function seems >> to be intended to deal with Windows variance, possibly the >> whole thing is wrong-headed for Unix. Mike> I'm sure this must be wrong. The LANG and the LC_* variables Mike> should not be changed by XEmacs, just used as they are. Wishful thinking. The POSIX locale concept is fundamentally broken in a multilingual context, that's all there is to it. Even with the GNU "local locale" extensions. Minimize the environment and make sure they're internally consistent, yes. But as long as a multilingual application may find itself calling non-multilingual programs, the only way it has to deal with the issue is to change the locale. I don't understand this. If the system is running in an UTF-8 locale, XEmacs should assume that the external applications handle UTF-8. Actually most of them either do handle UTF-8 or ignore locales altogether. There are not many external applications which *have* to be called in ja_JP.eucJP (like kterm for example). I.e. by switching from ja_JP.UTF-8 to ja_JP.eucJP in creates more problems than it solves. Same when the system locale is set to ja_JP.eucJP. That is an indication that most of the programs in that system are supposed to work in ja_JP.eucJP, i.e. XEmacs should not change that either. It would be nice if there were an option to easily call certain external applications in locales different from the locale set when XEmacs starts (currently one has to write a few lines of Emacs-Lisp to do that), but the default should be the locale set in the environment when XEmacs starts. Even the character set: consider the persistent breakage of Dired people have LANG set. Dired as well has more problems when you change the locale. >> No, LANG is the only variable touched by that code >> LC_* should be safe from it. Mike> OK. But that means that when starting xemacs for example Mike> like this Mike> LANG=ja_JP.UTF-8 LC_COLLATE=ja_JP.UTF-8 Mike> LC_PAPER=en_US.UTF-8 xemacs Mike> you would get a mixture of encodings in the LC_* variables Mike> after XEmacs changed LANG, like this: Yes. That is another bug in POSIX, I think. Yes. I think the only way to avoid this bug is to work consistently only in UTF-8 locales and avoid using the legacy locales completely. Then all the problems with the different encodings disappear, almost everything becomes much easier. I guess you could hack around it by parsing all LC_* variables found in the environment. That's not easily possible. What would you do if the following variables are set and you want to change to using "LANG=ja_JP.eucJP"? Then you cannot keep the letter paper format because there is no such thing as en_US.eucJP. Changing LANG from a non-UTF-8 locale to a UTF-8 locale is easier because there is a chance that UTF-8 locales exist for all the legacy locales used in LC_* (UTF-8 locales don't have to exist but at least it is likely that they exist whereas something like en_US.eucJP will most certainly not exist). I agree that the POSIX locale design appears to be very broken. If it is not allowed to have different encodings in LC_*, then why do we have to specify locales with encodings at all? Certainly this could have been designed better but we cannot do anything about that. Using only UTF-8 cleans up the mess a lot and makes it possible to forget about the encoding most of the time. Mike> Such mixtures are not allowed. ``The Open Group Base Mike> Specifications Issue 6'' says about this: Like I said, POSIX locales are just plain broken. Consider the Chinen> When LC_TIME=de_DE@euro and LC_CTYPE=en_US.UTF-8, the Chinen> multibyte character strings of month are not able to be Chinen> converted into wide character. The reason why those Chinen> strings are not is they have different encoding character Chinen> from LC_CTYPE. Note that Mule handles this kind of problem transparently. I'm not saying we won't try to deal with this. I understand why the Open Group found themselves forced into this position, and XEmacs is too dependent on external processes for various services to take some high-handed attitude that we are going to wait for the rest of the world to do multilingual processing. But it's not easy to handle POSIX rules without punting on "multilingual". But switching the locale in XEmacs when calling external programs creates a lot of problems and I cannot really think of an example where it solves a problem. I don't think anybody would start a kterm as an external program from an XEmacs running in an UTF-8 locale. And if one really wants to do that, what's wrong with M-x shell RET Mike FABIAN <mfabian(a)suse.de> http://www.suse.de/~mfabian
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649302.35/warc/CC-MAIN-20230603165228-20230603195228-00127.warc.gz
CC-MAIN-2023-23
4,824
86
https://sirvar.com/
code
Hello, I'm Rikin, a seasoned Full Stack Engineer specializing in web3 and fintech. I thrive in rapidly evolving settings, particularly in building and scaling startups to new heights of success. Born & raised in Canada 🇨🇦, I'm currently based in Lisbon, Portugal 🇵🇹. As an avid traveller, I've explored 26 countries and counting. I'm also a huge fan of the outdoors, surfing, and reading. Co-founder & CTO Building the future of user generated content by connecting top creators with e-commerce brands Founding Software Engineer Worked on building advanced crypto accounting & payment solutions for blockchain transactions Senior Software Engineer Built the website & dashboard for Cover's insurance products and quoting engine Crafted a custom e-commerce platform for creators to launch crowdfunding campaigns A guide to travel hacking with miles & points How I've travelled to over 20 countries in 2 years at a fraction of the cost Moving to Portugal from Canada A digital nomad's guide to immigrating to Portugal
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817146.37/warc/CC-MAIN-20240417075330-20240417105330-00501.warc.gz
CC-MAIN-2024-18
1,027
13
http://augmentive.com/methodology/index.html
code
Augmentive knows that most offshore development projects are distributed development projects that utilize distributed resources in multiple geographies. Consequently, Augmentive's development methodology is designed to optimize the use of onsite, onshore and offshore resources. Augmentive's methodology is based upon the principle that certain roles in the development process must be conducted onsite or onshore, while other roles are best executed offshore. Onsite roles are those roles that require face-to-face customer interaction. These roles typically include requirements analysis, software deployment and product acceptance by the customer. Onshore roles are roles that require significant interaction with the customer but do not necessary require face-to-face meetings. The development of functional design documents and technical design documents usually fit within this category. Finally, offshore roles require the least amount of interaction with the customer. Because the functional design documents and detailed testing plans are built onshore during the functional and technical design processes, these activities can be managed offshore. These roles usually include the construction and testing of the product. Before assigning any resources to an offshore development project, Augmentive takes each of its clients through the following three steps:
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424770.15/warc/CC-MAIN-20170724082331-20170724102331-00231.warc.gz
CC-MAIN-2017-30
1,370
19
https://ux.stackexchange.com/tags/buttons/new
code
You could add a Show All button ahead of the others and make that the default. When other filters are selected, it becomes deselected. W3Schools has a demo that might work well with a modification to allow more than one selection at a time. There's a pattern for this type of UI: Filter chips Material delineates the active filter state by adding a checkmark, and another click removes the checkmark: you can also use an outline for more contrast: Note: The better suggestion is below EDIT, but only if it is technically possible. Since the extra button makes things overly complicated just omit it. You can add the "Close tab" option next to the "Create another" option: Or add the options in a dropdown if this takes too much space. In my opinion doing this only makes sense if closing ...
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055645.75/warc/CC-MAIN-20210917120628-20210917150628-00680.warc.gz
CC-MAIN-2021-39
791
8
http://askubuntu.com/questions/tagged/system-tray+xorg
code
X11 Forwarding is fantastic to remotely launch new programs. Some popular programs open themselves into the system tray (Dropbox, for example). I know you can use VNC or RDP for this, but is there a ... KDE 4.8.2 Whenever a notification is displayed or the KDE panel attempts to change the contents of the system tray my system's UI locks up because X is using 100% CPU. This occurs both when Desktop ...
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137108.99/warc/CC-MAIN-20140914011217-00153-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
404
2
https://longview.be/motorola-gp2000-uhf-out-of-band-mod.html
code
This post details how to modify the band split for a Motorola GP2000 UHF portable radio. The GP2000 is a relatively low cost single band portable FM transceiver, while prefixed with GP its construction is a bit cheaper than the typical GP300 series radios. It seems to have been launched around 1999, targeting the Asian markets. Marketing materials highlight the smaller size as being better suited to this market, though users all over the world seem to appreciate a compact radio. It also has a VFO mode with full keypad programming, this is very uncommon for professional gear but probably appreciated by dealers in developing countries that can save money by not buying cable kits and CPSes. This mode being available and seemingly always an option (no disable feature in the CPS) is probably why this radio is not FCC certified according to the stickers on my units. The UHF variant is available as 400-440, and 435-480 MHz. As usual I have the wrong version, Norwegian hams need 432-435 for repeater access and simplex, other EU countries probably want an even lower minimum frequency. The radio launched with NiCd, NiMh, and Alkaline (primary cell) battery packs, this is another feature more typical of a ham radio than a commercial radio. The radio is separately calibrated for Alkaline batteries, presumably due to the higher source impedance of these batteries. The issue with these radios is finding batteries, this seems to be one of those radios where demand is too low to justify third party batteries. It's likely all batteries available are old stock. If you have old batteries for these I suggest replacing the cells in them instead of discarding them. I did buy some "Li-Ion" batteries for the radio off AliExpress, but this turned out to be a lie, since the batteries I got were Ni-Mh. Finding a charger for this radio also appeared to be tricky, maybe some other radios charging cradle can be modified to work? This radio has some software tuning, but a key difference between this and e.g. the GP300 series is that this radio uses primarily discrete analog signal processing, as opposed to the ASIC used for higher end radios. - Alpha Series CPS R01.00 - PRO 2150 Tuner ver 102 - Hex Editor (HxD) - VB6 runtimes (all of them) - Service Manual I have only tested this on Windows 2000 (via VMware), but it looked like it would work fine on Windows 10 as well if the required VB6 libraries are installed. - Power supply/battery - Alignment aids like a service monitor, signal generator, cables etc. - The antenna-BNC adapter is the HLN8262A, this is not the same as for the GP3x0 series - There's no ground for the adapter so sensitivity and output power will be somewhat inaccurate when measured with this - Programming cable (2.5 mm jack type) - The programming cable is similar to e.g. the Icom IC-T70, with a single TTL two-way serial port. The radio has a 4.7 kΩ pullup to 5 V on the line. Fixing the Tuner To use the Tuner software to update the EEPROM data, we need to bypass the password restrictions. Find TUNER.exe (md5 sum 412345a924705e1d7e72b29433ed60f6) and open it in a hex editor. Find the value 0x74 (JZ) at offset 0x362B4, change it to 0x75 (JNZ). This inverts the passord check so it will accept everything but the correct password. After editing my TUNER.exe file had a md5 sum of b5d92dc40d4832bd03cba81b1d7c8273. Informative: the tuner password is not stored in plaintext, but is calculated at runtime based on some parameters inherent to the program file. Bypassing it is the easiest way to deal with it. For some weird reason it's possible to change the password, so that's probably why its computed at runtime. The Tuner software will check that the model number matches when writing EEPROM files, this check can probably be bypassed as well, but there's no real reason to update the model info (it's only used by the CPS/Tuner software). The only reason I can think of would be if a radio had a bad EEPROM and the contents were wiped entirely after replacement. I only did a small amount of work with the codeplug, I determined the addresses initially by zeroing them in the file and seeing what the CPS made of the data. The radio has a VFO mode, because of this the radio actually checks the allowable frequency range by itself, and will reject out of band programming (RX might work but TX won't). There is a checksum in the EEPROM data, this is checked by the radio, but the Tuner/CPS software doesn't seem to use it. It should be noted that all the EEPROM data and CPS data is inverted; things like model no. and serial are inverted so they don't immediately light up in the text view. The .eep file (tuner made) and .cpg file (cps made) have the same content and size, the .cpg file has a prefix used by the CPS. Reading the radio codeplug actually seems to read the entire EEPROM, but writing a codeplug will not update the start sections containing serial, model, tuning etc. info. To update this the tuner software must be used. The following offsets apply only to the .eep file made by the tuner software EEPROM Read function: |Offset (.eep file) |Model no. in plain text |0x57 (LSB), 0x58 (MSB) |0x6D83 (480 MHz) Maximum tuning frequency |0x60 (LSB), 0x61 (MSB) |0x7B3F (435 MHz) Minimum tuning frequency 0x0000 gives 839 MHz 0xFFFF gives 0 MHz Procedure to lower the band split - Use Tuner software to read the EEPROM data - Tuner Init to connect to the radio - File -> EEPROM Read (just hit Enter when the password prompt comes up) - Save the EEPROM, the EEPROM data is unique to each radio and must be read and modified for each unit since it contains tuning data and the serial number - Modify the EEPROM data - 0x7C3F gives a limit just below 432 MHz - File -> EEPROM Write the new EEPROM file - Radio will show "EEP ERROR" - Tuning Init again and modify a parameter or two, then do a Tuning Exit - Radio is now modified and can be read/written by the CPS with the new band split The fact that the radio will refuse to accept the new EEPROM data when we modify it indicates that there is a checksum. However, the Tuner software is happy to ignore that when reading, and it seems to calculate a new checksum when any data is modified and the tuning is closed. The location of the checksum can be determined by reading back the EEPROM again after writing it the second time, but I haven't bothered to do so. It is advisable to now do a radio alignment since the tuning parameters now cover a wider range than before. Note that you can also move the upper limit down (this might improve the tuning accuracy), 480 MHz = 0x6D83 in the EEPROM, offset 0x57, 0x58. Larger number = lower frequency. The radio has a VFO mode that can be used in Dealer mode (see Service Manual, it's a keypad sequence to enable). Program a key to be VFO and you're good to use it. The VFO settings show up in the CPS if the radio was read with the VFO active. See the service manual for instructions and list of menu options. Wide/Narrow FM (for 12.5/25 kHz capable models like mine) is set per channel under Advanced -> Channel Bandwidth. 12.5 kHz means ±2.5 kHz peak deviation and will use the narrower filter for receive. The wide path has a 455F type filter (±6 kHz; fairly narrow for Wide), narrow adds an additional 455H filter in series (±3 kHz, also quite narrow). The demodulator IC is a TA31136FN with a ceramic discriminator element. To change between channel numbers and the Alias defined per channel, assign a key to the function "DISP". To use DTMF, assign a key to "PHN", the DTMF parameters are set using the Signalling→Advanced setting. The CPS is bad at regionalisation, you will need to change your OS region to one that uses a period as a decimal separator to enter frequencies correctly. I couldn't find a trivial way to patch this to work properly. This is why modern programming languages use regionalisation information when dealing with numbers. Plan your channel numbering, there's no copy/move feature in the CPS, but you can enable/disable channels so leaving some gaps between e.g. simplex and repeater frequencies can save some headache later. I found the programming software would occasionally hang, this didn't cause any issues with normal CPS programming (just reset the radio and force quit the CPS, try again). Not sure what would happen if this happened during EEPROM programming.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476452.25/warc/CC-MAIN-20240304133241-20240304163241-00165.warc.gz
CC-MAIN-2024-10
8,358
67
http://sev.lternet.edu/content/betsy-shafer
code
The Response of Stream Metabolism to Variable Climate Patterns Using In-Situ Instrumentation in the Valles Caldera National Preserve, New Mexico. In the southwestern United States two important seasons influence stream flow: snowmelt in spring and summer monsoonal rainfall events. Flow patterns exhibit peak discharge from snowmelt runoff in the spring followed by pulsed increases in stream discharge during late summer monsoons. Molles and Dahm showed the intensity of the snowmelt discharge is linked to El Nino-Southern Oscillation (ENSO) conditions in the tropical Pacific. El Nino and La Nina climate patterns also may affect late summer monsoonal precipitation in New Mexico by intensifying the monsoon during La Nina years and weakening monsoons during El Nino years. Stage gage data show seasonal and interannual variability in the intensity of snowmelt and monsoonal runoof events in montane catchments in New Mexico. Further, in-situ YSI sonde, Satlantic Submersible Ultraviolet Nitrate Analyzer (SUNA) and CycleP instrumentation show physical and chemical constituents respond to higher flow events driven by climate variability, and the constituents these instruments measure can be used as a proxy to estimate whole stream metabolism and nutrient cycling processes.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697745221/warc/CC-MAIN-20130516094905-00081-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,280
2
https://ramonka.com/
code
Usability is part of the broader term “user experience” and refers to the ease of access and/or use of a product or website. A design is not usable or unusable per se; its features, together with the context of the user (what the user wants to do with it and the user’s environment), determine its level of usability. The official ISO 9241-11 definition of usability is: “the extent to which a product can be used by specified users to achieve specified goals with effectiveness, efficiency and satisfaction in a specified context of use.” Web programming, also known as web development, is the creation of dynamic web applications. Examples of web applications are social networking sites like Facebook or e-commerce sites like Amazon. There are two broad divisions of web development – front-end development (also called client-side development) and back-end development (also called server-side development). Back-end development controls what goes on behind the scenes of a web application. A back-end often uses a database to generate the front-end. Branding is the process of giving a meaning to specific company, products or services by creating and shaping a brand in consumers’ minds. It is a strategy designed by companies to help people to quickly identify their products and organization, and give them a reason to choose their products over the competition’s, by clarifying what this particular brand is and is not. The objective is to attract and retain loyal customers by delivering a product that is always aligned with what the brand promises.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00505.warc.gz
CC-MAIN-2023-23
1,576
7
https://tealfeed.com/top-10-cc-project-ideas-beginners-igrbp
code
Top 10 C/C++ Project Ideas for Beginners. Projects to Enhance Your C/C++ skills. Being a programmer and student, I know the importance of projects and its benefits. In this article, I have shared all my experience in terms of projects related to C and C++. These projects are good for a college student resume as well. These projects will surely enhance your C/C++ skills and will boost your understanding in the programming languages by teaching you its use cases. So, some of the beginner friendly projects are: 1. Quiz Game: It consists of simple multiple choice questions based on sports, general knowledge, technical content etc. Players just have to select the correct answer and can reach the next level. We can display answer at last along with the score. Reference : geeksforgeeks.org/quiz-game-in-c 2. Tic Tac Toe: Tic-tac-toe is a game for two players, X and O, who take turns marking the spaces in a 3×3 grid. The player who succeeds in placing three of their marks in a diagonal, horizontal, or vertical row is the winner. It is a solved game with a forced draw assuming best play from both players. We can implement using loop concept, if-else ladder and switch cases. 3. Different Management System: By making this project, you will learn features like adding, listing, modifying and deleting in a file. This project makes use of file handling and it shows a productive implementation of class and object in C++. 4. Pacman Game: The Pacman game is similar to the snake game. It is a simple game without graphics for entertainment purposes. I can be implemented by making a box design and increasing the size of array (i.e. snake body) whenever it encounters a character (i.e. food). 5. Billing System: It requires a database of all the items stored in the store and their prices. Afterwards, when a customer buys something, you have to search for the item and add its price to the bill amount. It can be implemented using file handling concept like reading from data-file and writing back into the data-file in C++. A simple calculator to add, subtract, multiply and divide using switch and break statement. 7. To Do List: To Do List App is a kind of app that generally used to maintain our day-to-day tasks or list everything that we have to do, with the most important tasks at the top of the list, and the least important tasks at the bottom. It is helpful in planning our daily schedules. This project works on the basic concepts like variables, data types, structure, string, loop, inserting a node into the linked list at any position, deleting a node from the linked list at any position, linked list traversal, etc. 8. Number Guessing Game: A number guessing game is a simple guessing game where a user is supposed to guess a number between 0 and N in a maximum of 10 attempts. The game will end after 10 attempts and if the player failed to guess the number, and then he loses the game. 9. Rock Paper Scissor: Rock Paper Scissor (which is also called Stone Paper Scissor) is a hand game and played between two people, in which each player simultaneously forms one of three shapes. 10. Random Password Generator: This project can help to generate a random password of a given length consists of any characters. This project involves basic concepts like variables, data types, array, loop, etc. - Security System. - Dating Application using socket programming. - Login and Registration System. - Web Scrapper. - Chat Bot. Technical Content Writer Intern @GeeksforGeeks || Microsoft Learn Student Ambassador - βeta || Junior - CSE
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476432.11/warc/CC-MAIN-20240304065639-20240304095639-00460.warc.gz
CC-MAIN-2024-10
3,553
29
https://redmine.pfsense.org/issues/4752?tab=properties
code
SQUID. Exception for speed limits Good day to all people!I am submitting for your consideration the idea (the request). It would be good if in the section "Squid Traffic Managment Settings" function after "Per-host throttling", add a new section to create an exception (for Per-host tnrottling) for the some few IP address. It would be really great!
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104669950.91/warc/CC-MAIN-20220706090857-20220706120857-00448.warc.gz
CC-MAIN-2022-27
349
4
https://discuss.istio.io/t/authorization-policy-ip-allow-deny-not-working-on-services-different-than-ingress-gateway/7845
code
Currently, I’m trying to allow/deny incoming traffic to a specific service according to the ip of the request. The example on this page Authorization on Ingress gateway, where the usage of source.ipBlocks to allow/deny external incoming traffic worked as expected. When that same authorization policy was now targeted to other pods on a different namespace, it stops working. The only way to make it work is by evaluating a specific header[X-Envoy-External-Address] to the address I’m looking to block/allow. This is not an appropriate workaround as it doesn’t support CIDR. This the authorizationpolicy I used on the first example which worked. apiVersion: security.istio.io/v1beta1 kind: AuthorizationPolicy metadata: name: ingress-policy namespace: istio-system spec: selector: matchLabels: app: istio-ingressgateway action: DENY rules: - from: - source: ipBlocks: ["18.104.22.168"] The authorization policy used on other namespace that didn’t work: apiVersion: security.istio.io/v1beta1 kind: AuthorizationPolicy metadata: name: httpbin-policy namespace: foo spec: selector: matchLabels: app: httpbin action: DENY rules: - from: - source: ipBlocks: ["22.214.171.124"] The configuration of externalTrafficPolicy is already set to local. When logging the istio-proxy on the specific pod, the origin IP is printed with its expected value whenever a new incoming request is received. Is this the expected behavior or am I missing something?
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400232211.54/warc/CC-MAIN-20200926004805-20200926034805-00336.warc.gz
CC-MAIN-2020-40
1,448
12
https://semrasevi.com/
code
Hello! My name is Semra Sevi. I am a Banting postdoctoral researcher at Columbia University, working with Donald Green. Broadly speaking, I am interested in political representation, the role of age, gender and immigration in politics, voting behaviour, voting systems, and legislative politics. Methodologically, my research leverages several quantitative approaches. I employ observational data, experiments, as well as causal inference designs. Before Columbia, I earned my PhD at the Université de Montréal and my Honours BA and MA from the University of Toronto. My dissertation focuses on two areas: descriptive representation, and how voters evaluate female candidates for office. To address these questions, I built an original dataset detailing the district level data for all Canadian federal candidates from 1867-2019. This dataset includes unique id for each individual who ran for federal elections, riding names, province, date of birth for all elected MPs by year, gender, occupation, party names, switchers, vote shares and raw votes. Here is a full list of all the variables and a description for each. I also collected similar data for all candidates in the Ontario provincial elections also from 1867-2019. You can find both datasets here. *If you are a first-generation student applying to political science Ph.D. programs or Canadian funded postdoctoral fellowships, I would be more than happy to discuss and give comments on your materials. I especially welcome applicants from underrepresented backgrounds.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055808.78/warc/CC-MAIN-20210917212307-20210918002307-00125.warc.gz
CC-MAIN-2021-39
1,531
5
https://cazicjointraids.com/forums/topic/ondansetron-buy-cod-no-prescription-ondansetron-maximum-dosage/
code
Shopping for medications could be a pleasant and beneficial pastime! Discount coupon code: zz-9968 or Dd2S6ka Random Internet Quotes: Including information in massachusetts that is licensed and securely. Adult adhd is not be the availability of the plan in massachusetts that work into the medicine is like betting on november 23, we realized we promise you’ll go home working but it allegal to 25 percent. Add dependents who have created besaferx a reseller of these kinds of a valid email. Definitly a reseller of drugs are working hard to convert money into chapters that it faced the whole night. Of your body to the manual is enrolled in a check should be used for. Of them discussing the field have written to your grape if you need to attract high quality by 100 mg must be charging for our ordering process as search results or businesses owned by a lot from within minutes. Veterinary websites by a temporary period of time to improve the ft editorial code such as odourless, prescriptions, having been greatly improved. Making it may not properly …
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991921.61/warc/CC-MAIN-20210516232554-20210517022554-00426.warc.gz
CC-MAIN-2021-21
1,062
4
https://forums.openqnx.com/t/topic/5999
code
this harddisk contains a QNX filesystem which was originally installed under V4.25 I start the computer with my QNX V6.21 CD an I can see the original filesystem under /fs/hd0-qnx. one of the folders shows “socket” as filetype, and not “directory”. how can I rectify that ? I need the files from this “former” directory. The same thing happens if you boot directly in QNX 4.25 from the hard disk? when I boot directly from hard disk the boot process is interrupted at a very early stage saying “can not mount /dev/hd0t77 input/output error”. I thought I just copy some important files to a new harddisk and throw the defective one away. unfortunately the files I need are in this “socket” directory. btw a lot of directories and files look very much ok, so I think the damage on the hard disk is not a big one, and chances are I can recover the files I’m looking for.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655247.75/warc/CC-MAIN-20230609032325-20230609062325-00182.warc.gz
CC-MAIN-2023-23
889
7
https://github.com/cmorgan091
code
Join the platform over 40 million developers call home for hosting code, managing projects, and building their best Hide content and notifications from this user. Learn more about blocking users Contact Support about this user’s behavior. Learn more about reporting abuse Code to manage the swapping of tools in 3d printer files with minimal loss of material Seeing something unexpected? Take a look at the GitHub profile guide.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250591763.20/warc/CC-MAIN-20200118023429-20200118051429-00362.warc.gz
CC-MAIN-2020-05
430
9
http://www.wjla.com/blogs/lets-talk-live/2014/05/affordable-summer-getaways-21812.html
code
May 13, 2014 - 03:25 PM Text size Decrease Increase Summer is quickly approaching, and if you haven't thought about a vacation destination...it's not too late. Jeanenne Tornatore, the Senior Editor of Orbitz.com, was here with the top 4 affordable summer getaways from the Washington DC area. Short URL: http://wj.la/1nKvzcu
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095373.99/warc/CC-MAIN-20150627031815-00125-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
324
5
https://coursesghar.com/nestjs-building-real-project-api-from-scratch/
code
NestJS – Building Real Project API From Scratch This Course we are sharing with you is NestJS – Building Real Project API From Scratch free download link. This is a premium product and you will get it free on here. CoursesGhar was made to help people like graphic designers, video creators, web developers, freelancers, filmmakers, etc. On our website, you will find lots of premium assets free like Free-course/tutorials, Tutorials and Tech News, Udemy Premium Courses, and Much Much More. In this course we will build a Medium clone API using NestJS, Typescript, Typeorm and PostgreSQL. This course is fully focused on fast and deep dive into creation of API for real application with NestJS. We will start from scratch and step by step you will get close to finished real application. You will deeply understand how to structure your application, build reusable and understandable modules and services and split code into smaller chunks of code. We will write code together in efficient way to make it pure and avoid data complexity. For each lesson you’ll get source code of the lesson, so it’s easy to see the progress and get a working app on any lesson you want. What you will learn in this course: Structure and configure project Write high quality code with NestJS on real project Create reusable modules, controllers and services Deeply understand NestJS design patterns everything from basics) but if you have experience with any of this (Angular/NodeJS/Express/Typescript/Typeorm/PostgreSQL) it will be easier for you to go through this course. If you are feeling like you learned NodeJS but you still still missing knowledge of how to build your own real application this course is what you need. This course is fully focused on creating the application without getting deep into basic knowledge of NodeJS!
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104628307.87/warc/CC-MAIN-20220705205356-20220705235356-00401.warc.gz
CC-MAIN-2022-27
1,827
15
https://intfiction.org/t/mark-tilfords-simple-chat/7642
code
It’s been a while since I’ve played around with Inform 7, on downloading the newest release I’ve been trying to sort through the parts that were broken by it; using Simple Chat doesn’t seem to work, thought Simple chat was compatible with newest version, but I get this error and can’t figure out how to fix it – any help much appreciated: Problem. You wrote ‘Instead of talking to NPC when in the Bedroom’ , which seems to introduce a rule taking effect only ‘when in the Bedroom’. But this condition did not make sense, so I am unable to accept this rule. See the manual: 7.12 > 7.12. In the presence of, and when …Is there a simple way to check to make sure the both the player and NPC are in the same room before chatting? Before it worked fine as it was, but my old game doesn’t run in the newest version of Inform 7.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662520817.27/warc/CC-MAIN-20220517194243-20220517224243-00420.warc.gz
CC-MAIN-2022-21
846
4
https://bringyourownlaptop.com/courses/responsive-web-design-tutorial-course-html5-css3-bootstrap/line-height-space-between-paragraphs-aka-space-after
code
Hi everyone, we're going to go from terrible line spacing, and all kind of bunched up to, ha, nice and breathable, and readable to match our mock-up. So we're going to learn something called Line Height. Then we're going to look at the space between paragraphs, the space after, but really it's just called Margin Bottom. Let's jump in now and work out how to do it. So Line Spacing and Line Height. We're going to do Line Spacing first, it's the space between. So this is one paragraph, there, it's one P-tag. Just breaks on to two lines, so that's the Line Spacing. The space between paragraphs is between these two separate P-tags, and they're different. So you always start with Line Height first, because Line Height affects everything, and then we can look at doing the space between paragraphs. Line Spacing is pretty easy, we're going to go to Visual Studio Code. We don't have a styling for your P-tag yet, so we're going to say, the P-tag is-- what are we going to do? We're going to do-- it's called Line Height. The Line Height depends on measurements. It depends if you were using Rems like we are, use Rems for Line Height, because you want them to kind of correspond. If you're using pixels for font sizes use pixels. Now how big is the line height, there's a lot of guessing, one is going to be, nothing, well, whatever the Body Copy size is, so we've decided, everything in here, which means the P-tag is 1.125, so that's kind of where we start. So anything above that, it's going to show a gap. So if we go about 1.5rem, it's going to be a tiny little gap. Let's check it, so there's a tiny little space that's opened up. Let's have a look at 2.5, just to kind of show you. Big gap, so you decide. I always find-- oh, it was fine. So whatever your size is, about half a gain bigger. That's always a good starting point in my head, and works for me, but I want this paragraph to kind of space out a bit. So, to do the spacing between paragraphs there's no real special one, you just do Margin or Padding Bottom, it doesn't matter. Margin-bottom or Padding-bottom. Why? Because there's no kind of-- it's going to visually look the same. We know it does different things, it pushes from the inside or the outside, but it doesn't matter. Now this, basically anything above 0, is going to show something. The default is 0, from our CSS reset. So let's look at 0.5rem. That's probably what I want, just a bigger gap in here. You can put a really big gap in there, it's up to you. There you go. You notice I left-- you should put a 0 in front of it. I find that if I leave the 0 off the front it always works, but I bet you there's a case where it doesn't, so just let's be synthetically correct. The next thing I want to do is the H tag, the H1 at least, I want to push a bit of gap underneath it. So I'm going to find my H1, I'm going to do the same thing, we're going to do-- now my H1 doesn't break on to two lines, if it did we would have to start looking at Line Height, but it doesn't so I'm just going to use Margin-bottom. And how big should it be? No idea. 0.5rem. Too big, I closed something there. Here we go, it's got real big, do the square one. That was too big, what should we do? 0.125, a bit too big, Dan. Let's have a look. Maybe still a bit big, let's do 1rem. Feels nice. So that space underneath the H1 works for me. And what we might do here just to tidy everything out, you can see, this Div tag goes all the way to the edge here. What is that Div tag called? Can't remember, Hero Box1, 2. It's Hero Box1, we might add some padding to it, so Hero Box1, let's add some padding, and we'll add it to the right. And I'm going to guess, for some pixels. Yeah, that kind of works me. Line Height; the space between lines is called Line Height. Oh, I called it Line Spacing before. Line Height, and there is no such thing as the space after, or space between paragraphs, like in something like Word or InDesign, you see, it's Margin or Padding-bottom, and then just make sure the measurement you're using is the same as, or at least the measurement unit is the same, as the unit you're using for the font size. So pixels, this would be pixels too. All right, on to the next video.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817650.14/warc/CC-MAIN-20240420122043-20240420152043-00331.warc.gz
CC-MAIN-2024-18
4,208
8
https://unix.stackexchange.com/questions/384015/h-264-support-for-opera-and-opensuse/498084
code
This issue seems to keep coming up. It happens, I research how to fix it, then forget about it, then it happens again. This time I tried re-installing chromium-ffmpeg-extra which did not work for me but then I upgraded to opera 60.0.3255.27 which did work (today) the issue keeps coming up because every time opera upgrades it must be fixed again. This time I found this thread: https://forums.opera.com/topic/27463/bug-html5-h-264-codec-videos-no-longer-working-on-opera-54-0-2952-41-ubuntu-18-04-lts-x86_64-xfce/7 Which recommended removing operas libffmpeg.so and creating a symlink to chrome's These instructions may very based on where things are in your distro but for me running linux mint 18 I did this: - find opera dir and cd into it. - rename opera's libffmpeg.so to back it up - create symlink to chrome's libffmpeg.so $ which opera $ ls -al /usr/bin | grep opera lrwxrwxrwx 1 root root 35 Jun 4 16:33 opera -> ../lib/x86_64-linux-gnu/opera/opera $ cd /usr/lib/x86_64-linux-gnu/opera $ sudo mv libffmpeg.so libffmpeg.so.bak $ sudo ln -s /usr/lib/chromium-browser/libffmpeg.so $ ls -al | grep libffmpeg.so lrwxrwxrwx 1 root root 38 Jun 11 06:53 libffmpeg.so -> /usr/lib/chromium-browser/libffmpeg.so -rw-r--r-- 1 root root 1799080 Jun 4 16:33 libffmpeg.so.bak Obviously the important line is sudo ln -s /usr/lib/chromium-browser/libffmpeg.so But I displayed the rest so that people could figure out how to know which directory they needed to be in. Also I have chrome browser installed. If you do not then you may have to install it for this solution to work. I hope this is helpful. I do not yet know if I will have to repeat these steps the next time opera upgrades ... probably.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474544.15/warc/CC-MAIN-20240224180245-20240224210245-00325.warc.gz
CC-MAIN-2024-10
1,692
23
http://2006reklam.com/app/date-apps-for-windows-phone-4481086.html
code
Bing search engineBing Mobileand Bing Maps. Functionally, it works much like Windows Mobile 5, but with much better stability. Retrieved 4 March Along with the announcement of Office Mobile 6. While music and videos are both stored locally on the PC and on the phone, apps are only stored on the phone even if purchased from the Zune software. Other features included an enhanced battery-saving capability called persistent storage capability. Xbox Xbox Xbox One. Microsoft offered mainstream support for Windows Mobile 5 through October 12,and extended support through October 13, As of the "Tango" update, the requirements were revised to allow for chipsets with slower processors, and for devices to have a minimum of MB of RAM. Windows Phone 7 Connector for Mac review". Hi there, I dedicated myself in writing this blog up. I took me sometime to gather all the best Dating apps for Windows Phone and PC. Here is the link: Free Dating. Try one of these relationship apps for Windows Phone to help you find that of your affection likes you back, start chatting and set up a date. Ever been to a bar/club and wanted to date the hottest girl/guy across the room? Then DateSquare app is for you. This app shows you all the girls and guys. Embedded Compact CE 5. Release date. 6/21/. Functionally, it works much like Windows Mobile 5, but with much better stability. This allows OEMs to integrate a variety of modems into their equipment. Retrieved September 14, Zune software is used to manage and sync content on Windows Phone 7 devices with PCs. There are three main versions of Windows Mobile for various hardware devices: Microsoft on Windows Phone 7". Possibly the best-known dating app of them all, Tinder is most people's first port- of-call when on Tinder – in our experience, it's the app that leads to the most actual dates too. Download for iOS, Android or Windows Phone. Archived from the original on A large number of Windows Mobile users are enterprise users business environments were targeted. After this, Microsoft ceased development on Windows Mobile, in order to concentrate on Windows Phone. Video: Date apps for windows phone Solved - Can't Sign in In Windows Store or Cannot Purchase Apps on Windows Phone Retrieved September 19, NET Compact Framework and the. Newly added or updated programs include Windows Media Player 8 with streaming capability; MSN Messengerand Microsoft Reader 2, with Digital rights management support. The last was designed especially for Pocket PCs which include phone functionalities. Best online dating message openers for meetings |After this, Microsoft ceased development on Windows Mobile, in order to concentrate on Windows Phone. The " Office hub " organizes all Microsoft Office apps and documents. Retrieved May 1, In addition to accessing Windows Phone devices, Zune software can also access the Zune Marketplace to purchase music, videos, and apps for Windows Phone and Zune products. To improve security Microsoft added Storage Card Encryption so that encryption keys are lost if device is cold-booted.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141181482.18/warc/CC-MAIN-20201125071137-20201125101137-00354.warc.gz
CC-MAIN-2020-50
3,069
15
https://devendrasinghhcl.wordpress.com/
code
We can check the logs of windows server using powershell command Command : get-eventlog -logname System -EntryType Error We are managing 22 servers and we need to have lot of data analysis and every time we have to login on the server and apply some of the methods to understand the data and draw some results for business. Today we need to connect to remote power shell from our machine . - Windows Powershell ISE > New Remote Poweshell Tab We need to move some of the files which are coming as bank statements from bottomline to accounting system and some times we need be aware about the duplicate of files. In this post we just want to use powershell to export the files list of a folder to a excel sheet. - Command : dir -recurse | out-file C:\MT940.xls We are just trying to go with full speed for learning in the month of June so that we can see the technical capacity with ourself . Today i thought to create the list of activities that we are doing on daily basis in the Application Support Profile : - Morning Health Checks : SOX Checks - Forecast uploads on database server - Resolving user issue in case they are not able to access the application with network basic network test. - Checking the webserver [ IIS issues ] for the users who are using the web version of the application. - Database migration from PROD to QA or DEV system. - Resolving performance issues for users or a user . - Release management of the new version of the software in the current environment. - Integrating the PROD system with other application through FTP and SFTP as per business requirement. - Deploying SQL / Application patches provided by the vendor with testing on DEV and then PROD system with change management process. - Creating and Updating the SOPs which are required for the project. - Automating the manual tasks as per the CSI in the project. - Creating Users in application and providing adding them to the group as required as per the role and responsibility. - Resolving trade issue done by the front office user for completing the first phase. - Resolving the confirmation messages to be sent to MiSYS for trade confirmation. - Sending Payment MT101 messages to Swift with bottom line. - Checking the MT940 errors for the files importing to production system and find the solution to resolve it. - MonthEnd activities need to be completed at the end of every month. - Report creation as required by the treasury users . - Capacity checks on the servers as data grows every month on the server. - Performing UAT of other application for integration testing. We will keep adding the activities as per our job role. - SQL Server Profiler is a powerful tool that allows you to capture and analyse events, such as the execution of a stored procedure, occurring within SQL Server. - This information can be used to identify and troubleshoot many SQL Server-related problems. - basics of how Profiler works, its core terminology, and how to create and save basic Profiler traces. One of the things that separate mediocre DBAs from exceptional ones is that exceptional DBAs know how to use the tools available to them effectively. The SQL Server Profiler can help DBA’S: • Monitor the activity of the: - QL Server Database Engine - Analysis Services -SSAS - Integration Services -SSIS - Reporting Services -SSRS - Monitor and identify performance-related problems with front-end application, queries,T-SQL, transactions, and much more - Monitor and identify SQL Server errors and warning - Audit user activity - Analyse trace results by grouping or aggregating them - Create your own custom traces, and save them, for use whenever you wish We will also cover profiler terminology like: • Data columns Also we will be working with traces and templates and learn: • How to build custom traces from scratch • How to Save Profiler traces to a SQL Server Table • How to trace Analysis Services activity After the end of this course , you will know why Profiler is such an essential tool in the DBA’s armoury, and will Understand - how Profiler works - Be familiar with core Profiler terminology, such as events, data columns, filters and traces - Understand the permissions required to use Profiler and how to start up Profiler - Be able to create and control basic Profiler traces and then save a completed trace to a file. We need to have information about whats going on our SQL server and - What is being changed ? - When it was changed ? - Where its changed ? - How its changed ? These all questions need to be explored to understand the auditing of SQL Server. As we know the financial data is critical for the regulatory requirements and it has to be audit with proper reports of a financial report of the company. We were not aware about the standard used for audit purpose . But some of them are as follows : - PCI DSS [ Payment Card Industry Data Security Standard ] - Its designed to ensure All companies ensures security standard that accepts, , process, store or transmit credit card information maintain a secure environment. 2. HIPAA [ Health Insurance Portability and Accountability Act ] - The Health Insurance Portability and Accountability Act of 1996 (HIPAA) required the Secretary of the U.S. Department of Health and Human Services (HHS) to develop regulations protecting the privacy and security of certain health information.1 To fulfill this requirement, HHS published what are commonly known as the HIPAA Privacy Rule and the HIPAA Security Rule. The Privacy Rule, or Standards for Privacy of Individually Identifiable Health Information, establishes national standards for the protection of certain health information. The Security Standards for the Protection of Electronic Protected Health Information (the Security Rule) establish a national set of security standards for protecting certain health information that is held or transferred in electronic form. The Security Rule operationalizes the protections contained in the Privacy Rule by addressing the technical and non-technical safeguards that organizations called “covered entities” must put in place to secure individuals’ “electronic protected health information” (e-PHI). Within HHS, the Office for Civil Rights (OCR) has responsibility for enforcing the Privacy and Security Rules with voluntary compliance activities and civil money penalties. 3. FERPA [Family Educational Rights and Privacy Act ] - The Family Educational Rights and Privacy Act (FERPA) (20 U.S.C. § 1232g; 34 CFR Part 99) is a Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education. 4. SOX [ Sarbanes-Oxley (SOX) Compliance ] - The Sarbanes-Oxley Act (SOX) requires that all publicly held companies must establish internal controls and procedures for financial reporting to reduce the possibility of corporate fraud. Your entire IT infrastructure–from server and network security to IT practices and operations–must be reinforced and configured to maintain and demonstrate compliance in the event of an audit. Now what needs to be audited for SOX requirement in SQL server and what not we need to learn more about it. We will keep posting on it in future post. These SQL Server Profiler event classes can be used to help you find out if SQL Server is running as efficiently as it can. They include: - Execution Warnings: For very busy servers, it is possible that a query may have to wait a short time before there are available resources for it to run. This event class can be watched to find out if and how long queries have to wait for needed resources. This event class has two possible values. “Query Wait” is used to indicate how often a query has to wait. “Query Time-Out” is used to indicate how often a query has timed out waiting for the necessary resources. Obviously, you don’t want to see either of these events. If you do, and they occur regularly, then you need to reduce the load on your server, beef up the server hardware, rewrite the queries, select more appropriate indexes to resolve the problem, or some combination of all these actions. - Hash Warning: This event is used to measure hash recursions or hash bails that have occurred on your server. A hash recursion (event 0) happens when the input of the query does not fit entirely into memory, forcing SQL Server to split the input into multiple parts, which are then processed individually. A hash bail(event 1) is even worse for performance. It occurs when a hashing operation reaches its maximum recursion depth, which forces the query to run under an alternative query plan, one that is much less than optimal. Think of a hash bail as a hash recursion’s worst nightmare. As you can imagine, these two events can really slow down a query. Some options to correct these problem events include: insure that the Index Statistics are up-to-date, rewrite the query, experiment with optimizer hints, or add more RAM to the server.While the purpose of this warning is to let you know when hash operations go awry, it also serves another purpose. If you want optimum performance, you want to avoid hash operations of any type, even ones that work properly. So if you identify any hash warnings, you might want to try to find out why a hash operation is being performed in the first place, and try to fix this problem. This of course, will also fix your hash warning problem. - Missing Column Statistics: Tells you which columns in your query are missing statistics, such as the Index Statistics used by the Query Optimizer to help it evaluate the most efficient query plan. If one or more columns of statistics are missing, the Query Optimizer may not select the best query plan, hurting performance. To help prevent this problem, consider the following: Be sure you have “auto create statistics” turned on for your database, use the CREATE STATISTICS statement to manually create the statistics on the missing columns, or use the Index Tuning Wizard or Database Engine Tuning Advisor to identify and automatically create the needed statistics. - Missing Join Predicate: Indicates whether or not the query in question has a join predicate. If not, this can cause the Query Optimizer to produce a less than optimized query plan. To fix this, add a join predicate. - Sort Warnings: Tells you if sort operations can be done completely in memory or if the sorting operation has to be divided into two or more steps in order to complete. Obviously, a one step operation will be much faster. Potential solutions to this problem include reducing the number of rows to be returned and sorted, reducing the number of columns being sorted, getting rid of the sort, or adding more RAM to the server. If you haven’t done so already, trace these events on one of your busier databases and see what’s going on.
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323895.99/warc/CC-MAIN-20170629084615-20170629104615-00132.warc.gz
CC-MAIN-2017-26
10,903
78
https://msdn.microsoft.com/en-us/library/system.configuration.longvalidator(v=vs.85).aspx?cs-save-lang=1&cs-lang=cpp
code
Assembly: System.Configuration (in system.configuration.dll) The LongValidator is used to ensure a long (a 64-bit signed integer) meets specific criteria. The criteria for validation is established when an instance of the LongValidator class is created. The LongValidator(Int64,Int64) constructor ensures that the long value that is being validated adheres to both a minimum and a maximum length. The LongValidator(Int64,Int64,Boolean) constructor checks both the minimum and maximum Int64 values, as well as whether the validation range is exclusive. The LongValidator(Int64,Int64,Boolean,Int64) constructor checks the previous three parameters and also checks whether the Int64 value is equal to a specific resolution value. Windows 98, Windows Server 2000 SP4, Windows Millennium Edition, Windows Server 2003, Windows XP Media Center Edition, Windows XP Professional x64 Edition, Windows XP SP2, Windows XP Starter EditionThe Microsoft .NET Framework 3.0 is supported on Windows Vista, Microsoft Windows XP SP2, and Windows Server 2003 SP1.
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701163512.72/warc/CC-MAIN-20160205193923-00116-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
1,043
3
https://forums.xilinx.com/t5/PCIe-and-CPM/XDMA-2019-2-latest-driver-from-Xilinx-dma-ip-drivers-git-repo/m-p/1106050/highlight/true
code
05-13-2020 04:24 AM We met an issue with Xilinx 2019.2 XDMA IP and latest XDMA driver from Xilinx/dma_ip_drivers git repo. If we try to send large amount of data throught PCIe - XDMA can generate Malformed TLP. This issue repeats on all our projects on all systems (different servers). On all systems we use ubuntu 18.04, kernel version 5.3. This issue also repeats on our customers systems. Customer uses Ubuntu 18.03 kernel version 4.15. We implemeted simple project in Vivado - just XDMA+DDR - and the issue repeats on it too. To reproduce it - just implement any project in vivado with XDMA and start sending large block of data(about 2-4GB) to it via pcie in a loop. Malformed TLP will be generated in a minute! As a workaround - we use driver from branch 2018.3 from the same git repo (Xilinx/dma_ip_drivers). With this driver everything works well. Is it a latest XDMA driver bug? If it is, why malformed tlp is generated? We suppose XDMA should bever generate Mailformed TLP and still it does sometimes. 05-16-2020 07:54 AM Hi guy, I had the same problem with vivado 2019.1 XDMA IP and the dma driver v2019.2.51. When I roll back the driver to v2018.3.50, everything works fine. My OS version is CentOS 7.7.1908.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141732835.81/warc/CC-MAIN-20201203220448-20201204010448-00292.warc.gz
CC-MAIN-2020-50
1,220
8
https://www.xyzreptiles.com/product/indonesian-blue-tongue-skink/
code
Each Indonesian blue tongue skink for sale is hand friendly, healthy and housed under optimal conditions. Our juvenile Indonesian blue tongue skinks are curious little critters that make great starter pets for beginners of all ages. You may also want to check out other lizards for sale that we offer. - We offer a 100% live arrival guarantee on all of our animals. We also guarantee the sex of the animal to match what was stated at the time the animal was purchased. There are however circumstances that will void the live arrival guarantee. Read Full Guarantee
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816734.69/warc/CC-MAIN-20240413114018-20240413144018-00780.warc.gz
CC-MAIN-2024-18
563
2
http://packages.ubuntu.com/source/precise/x11/edid-decode
code
Source Package: edid-decode (0.1~git20100205.26c03c8e-0ubuntu3) Links for edid-decode Please consider filing a bug or asking a question via Launchpad before contacting the maintainer directly. Original Maintainer (usually from Debian): It should generally not be necessary for users to contact the original maintainer. The following binary packages are built from this source package: - Decodes to text the binary EDID information from monitors Other Packages Related to edid-decode - helper programs for debian/rules - manage compile and link flags for libraries - Debian package development tools
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120338.97/warc/CC-MAIN-20170423031200-00616-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
598
11
http://www.cfd-online.com/Forums/openfoam-solving/60416-simple-axisymetric-model-fanturbine-print.html
code
The simplest axisymetric model The simplest axisymetric model for a fan/turbine consists in following the Froude theory: declare inside the fluid a couple of very close patches - e.g. forming a thin disk - and to set a fixed value for delta-P and a constant velocity+rho between up/downstream faces. Doing so in openFOAM I encounter a deviation from the theory, i.e. the mass balance is slightly but progressively violated, resulting in mass injected by the disk inside the control volume. I think it comes from the fact I do not see how to actually set the up/downstream velocities to be identical. Is there a way to merge the patches and then to set a mass conservation condition between the upstream patch and the downstream patch ? Pr. Francois Cauneau Ecole des Mines de Paris Is your mesh one cell thick? Is your mesh one cell thick? If so it sounds like you are doing something similar to what boundaryFoam was designed for. If not it sounds like yo need cyclic conditions from front-to-back and drive the flow with a pressure-gradient body-force as in channelOodles. Thanks Henry, indeed the ca indeed the case is 2D, but may extend it for 3D later. SO I was planning to test both of yoyr suggestions... but, shame on me I switched to new version 1.1 !! bad Idea, I cannot further enter any data under FoamX. Trying any of 1.1 1,1 1.1d 1,1d to simply enter 1.1 gives "not a valid number". So, before testing your suggestion, I scan the discussion list to seek for this very... basic trick :-) I will resolve the momentum eq I will resolve the momentum equation for 2D axisymetric. the equation is: I implemented it like: phi = fvc::interpolate(rho*U) & mesh.Sf(); - fvm::laplacian(mu,U)- fvc::div(mu*symm(fvc::grad(U)())) + fvc::div(mu*skew(fvc::grad(U)())) solve(UEqn() == -fvc::grad(p)); When I run this equation with the case of pitzDaily I have the good result. but with the case (2D axisymetric) like nozzleFlow2D I have the bad result. 1. what's the probleme in my implementation ? 2. is there a method to rewrite this equation in cylindrical co-ordinates. I wish to have a fast answer. thanks a lot. |All times are GMT -4. The time now is 09:59.|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720153.61/warc/CC-MAIN-20161020183840-00467-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
2,161
25
http://www.gamespot.com/forums/playstation-nation-1000002/kingdom-hearts-1-final-mix-help-31003268/
code
I've played Kingdom Hearts Final Mix (the HD Remix version) up until the boss fight against the giant gargoyle on the volcano (from Fantasia). Damn. Is. It. Hard. I was able to breeze through the rest of the game no problem (I'm playing on the easiest difficulty) but for the life of me, I can't beat this boss. The closest I was to beating him was getting him down to the olive green health bar. I stay behind his head and attack away. Then comes the fire blast, which I can't recognize a pattern or any indications it's coming until the last second, when it is too late. I have Sora leveled up well and with the Olympia keyblade. I can provide specifics like what level I am and what equipment I'm using, if anyone is interested in helping. Does anyone have any tips? When to know when he is about to use his fire attack? If there's a more suitable keyblade than Olympia (maybe the Oathkeeper)? Any bit of advice or help would be much appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698542687.37/warc/CC-MAIN-20161202170902-00110-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
949
3
https://lede.readthedocs.io/en/latest/about.html
code
About the LEDE project¶ A reboot of the OpenWrt community¶ The LEDE project is founded as a spin-off of the OpenWrt project and shares many of the same goals. We are building an embedded Linux distribution that makes it easy for developers, system administrators or other Linux enthusiasts to build and customize software for embedded devices, especially wireless routers. The name LEDE stands for Linux Embedded Development Environment. Members of the project already include a significant share of the most active members of the OpenWrt community. We intend to bring new life to Embedded Linux development by creating a community with a strong focus on transparency, collaboration and decentralisation. LEDE’s stated goals are: - Build a great embedded Linux distribution with focus on stability and functionality. - Make regular, predictable release cycles coupled with community provided device testing feedback. - Establish transparent decision processes with broad community participation and public meetings. We decided to create this new project because of long standing issues that we were unable to fix from within the OpenWrt project/community: - Number of active core developers at an all time low, no process for getting more new people involved. - Unreliable infrastructure, fixes prevented by internal disagreements and single points of failure. - Lack of communication, transparency and coordination in the OpenWrt project, both inside the core team and between the core team and the rest of the community. - Not enough people with commit access to handle the incoming flow of patches, too little attention to testing and regular builds. - Lack of focus on stability and documentation. To address these issues we set up the LEDE project in a different way compared to OpenWrt: - All our communication channels are public, some read-only to non-members to maintain a good signal-to-noise ratio. - Our decision making process is more open, with an approximate 50/50 mix of developers and power users with voting rights. - Our infrastructure is simplified a lot, to ensure that it creates less maintenance work for us. - We have made our merge policy more liberal, based on our experience with the OpenWrt package github feed. - We have a strong focus on automated testing combined with a simplified release process. The name LEDE is an abbreviation for Linux Embedded Development Environment, a reference to its flexibility and embedded buildroot origins, making it a solid choice for embedded Linux applications far beyond the wireless router and network appliance realm. We attempt to have regular IRC meetings to discuss and decide project matters. Here you can find an alphabetically ordered list of the current people involved in the development of the LEDE Project: |Álvaro Fernández Rojas||noltari| And in charge of the documentation:
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00219.warc.gz
CC-MAIN-2022-33
2,861
25
https://anish-shilpakar.com.np/analytics-on-s3-data-lake-using-aws-glue-crawler-and-amazon-athena
code
Analytics on S3 Data lake using AWS Glue Crawler and Amazon Athena In today's world, data is growing at an exponential rate. While this data holds immense value and has the potential to impact various aspects of our world, extracting value from such large datasets is no simple task. This is where data analytics comes in. Data analytics is a process used in the field of data science to examine large datasets, uncovering hidden patterns, correlations, trends, insights, and relationships. These insights can help organizations gain a competitive edge in the market by making data-driven decisions, improving operational efficiency, and identifying new business opportunities. The main tasks involved in data analytics include data collection, cleaning, processing, and analysis. In my previous blog, I discussed ELT and data lakes, highlighting their importance in the current big data world. This blog continues that discussion by showcasing the power of AWS tools like AWS Glue and AWS Athena for illustrating data analytics on the AWS platform. But before we delve into that, let's first understand what AWS Glue and AWS Athena are and why they are used in data engineering. AWS Glue is a serverless data integration service that simplifies the process of data discovery, preparation, movement, and integration from multiple sources. It offers data crawlers that can automatically infer schema from data stored in data lakes like S3 buckets and create a centralized data catalog. The Glue data catalog serves as a metastore containing metadata for all the crawled tables. Additionally, AWS Glue allows us to visually create ETL pipelines for transformation and use Spark notebooks to process and transform data. Similarly, Amazon Athena is an interactive query service that enables us to analyze data using standard SQL. Amazon Athena offers two options for analyzing data: using the distributed query engine "Trino" to analyze data in S3, on-premises, or other clouds, or using notebooks to build interactive Spark applications and analyze data using "PySpark" and "Spark SQL". In this blog, I will be using the Trino query engine of Amazon Athena to analyze the data in the Glue database, which was ingested from the S3 data lake using AWS Glue data crawlers. The architecture for this implementation is explained below in the Architecture section. About AWS Glue AWS Glue is a serverless data integration solution widely used for data analytics in AWS. AWS Glue enables us to connect with over 70 diverse data sources and to manage data in a centralized data catalog. It offers flexible support for different workloads like ETL, ELT, and streaming all in one service and offers services like data discovery, modern ETL, data cleansing, data transformation, and centralized cataloging. The following are some of the main components of AWS Glue - AWS Glue Data Catalog AWS Glue data catalog is a fully managed centralized metadata repository and catalog service that stores metadata like table definitions, column names, data types, and other attributes that describe the data used in ETL jobs created in AWS Glue. It helps to simplify and automate the process of data discovery and cataloging, providing a unified view of data across different AWS services and data sources, and making it easier for users to query and analyze the data without having to know the exact location or format of data while still maintaining the data consistency. - AWS Glue Crawler AWS Glue Crawler is a feature of AWS Glue that automatically discovers the schema of data in the source and stores the metadata in the AWS Glue Data Catalog. It automates the process of cataloging data making it easier for users to analyze their data without the need to manually define schema for each dataset in the source. AWS Glue crawlers run classifiers which may either be built-in or custom classifiers created by users which automates the process of inferring schema from the dataset saving time and effort for users and allowing them to focus on data analysis and deriving insights from their data. - AWS Glue Databases AWS Glue databases are logical containers that store metadata tables in the AWS Glue data catalog. They are used to manage and organize metadata tables which define data from different data stores and make it easy to query data. When a glue data crawler runs on a data source, it will create tables within a specified glue database in the data catalog. Databases help in organizing the tables based on their schema and usage, allowing users to easily locate and access tables they need for analysis and processing. - AWS Glue ETL AWS Glue ETL ( Extract, Transform, Load) is a fully managed ETL service provided by AWS that helps users prepare and transform their data for analysis quickly and easily. It simplifies the ETL process by automating tedious tasks like data preparation, data type conversion, and data format conversion and presents itself as a serverless, scalable, and cost-effective solution for data analytics. AWS Glue offers us options for visually creating ETL Jobs as well as writing scripts and spark jobs programmatically for ETL workloads and scheduling the jobs to run as needed. Additionally, it also evaluates and monitors the data quality and provides options for version control by linking the Glue job with a git repository created in AWS Code Commit. About Amazon Athena AWS Athena is an interactive query engine service provided by AWS that is used for analyzing the data stored in data lakes like Amazon S3 using standard SQL queries. AWS Athena is a cost-effective, serverless, and highly scalable service that uses the trino query engine and spark in the backend which can run queries in parallel allowing it to generate fast results even for large datasets and complex queries. AWS Athena uses the AWS glue data catalog to query the data sources for data analysis. It also provides options to visualize the query results by integrating with tools like Amazon Quicksight or third-party BI tools to create dashboards and reports that help us understand and communicate the insights gained from data. This section describes the various steps taken for implementing a simple data analytics pipeline in AWS using AWS Glue and AWS Athena Creating AWS Glue Data Crawler Firstly, navigate to the AWS management console and search for AWS Glue, then open AWS Glue by clicking it. This opens the Glue console as shown below. Here on the left side, you can see various sections like Data Catalog, Data Integration, and ETL and Legacy pages. For this project, we are only dealing with the AWS Glue data catalog and various components of Glue associated with the AWS Glue data catalog. Here we aim to connect AWS Glue with the AWS S3 data lake which we setup in our last blog and to ingest all the data in that S3 data lake for data analysis in AWS Athena. Firstly we navigate to AWS Glue Crawler and create a crawler. Our original data source was SpaceX API and the raw data from this API is stored in our S3 data lake, so let’s name the glue crawler as spacex_crawler and we can provide a suitable description to the crawler. Also, optionally we can add tags to the cluster. Once done we navigate to the next page. On the next page, we need to configure the data source to ingest and catalog the data. Also, for this project, we don’t need to set up a custom classifier as the built-in classifier available in AWS Glue is capable of inferring schema from the CSV files stored in our s3 data lake. As our data is not already mapped to Glue tables we have to select “Not yet” and click on “Add a data source” Here select S3 as the data source, choose the location of s3 data as in this account, and then click on browse S3 to select the S3 path of airbyte folder which stores all the data that was ingested from airbyte to our S3 data lake. Also select crawl all sub-folders options, as airbyte ingests data from multiple API endpoints and stores them into multiple folders in our S3 bucket. Then select “Add an S3 data source”. In the next step, we will configure a new IAM role which will provide us necessary access to our S3 buckets. Select the Create new IAM role option inside configure security settings and then provide a suitable name to your IAM role. This automatically creates a new IAM role with all necessary permissions required to access the files from the s3 bucket as shown below. Once the role is configured, click on Next and navigate to the new page. On the new page, we have to configure output for data and scheduling. Here we define a glue database as our target destination. For this, we will first add a new database by clicking on “Add database” and then provide a suitable name for the database i-e “spacex_db” in my case. Once created return to the previous page where if we refresh the options, we can see our newly created database. Also, we can optionally configure a table prefix for the metadata tables created inside the glue database. Also in the crawler schedule we have currently selected the “On Demand” option to run the glue crawler only when we need it manually. But according to your need, you can specify a schedule to automate the crawler runs. If you want you can also explore the advanced options available in Glue Crawler. These are the scheduling options available in Glue Crawler. Once done, we will click next. Finally, we review all the properties and options that we have configured for the AWS Glue data crawler and click on Create to create the glue data crawler. You can now see your crawler in the list of available crawlers. Now wait till the status of the glue crawler becomes ready. Once ready click on run crawler and this will start the metadata ingestion and data cataloging process in AWS Glue. The status of the crawler changes to running which means that the crawler is now ingesting the data from the data lake and storing it inside the metadata tables in the glue database. This process takes some time and depends on the amount of data it needs to ingest from the data lake. When the crawler run completes successfully, you can see the status of completed in the crawler runs tab. Also, the status of the crawler changes back to ready. Now navigate to the AWS Glue databases page by clicking on the databases option on the right side. Here select the spacex_db Inside SpaceX-db we can see the list of all the tables that were created after ingesting data from data lake using the glue crawler. Here we can see the names of tables, the database they belong to, their location in the s3 data lake, and the type of file that contains the original data. We can also view the list of metadata tables and inspect their details by navigating to the tables tab in the right-hand menu. The successful creation of metadata tables inside the Glue database indicates the successful creation of the AWS Glue data catalog which contains data from our S3 data lake. Now we can use AWS Athena on this glue data catalog to analyze the data stored in our data lake easily. Analyzing glue tables using Amazon Athena For this firstly navigate to the AWS management console and search for Athena, then click on it to open Athena’s console. In Athena’s UI click on launch query editor to open the Athena query editor. We can use the query editor to query the tables of the Glue database and perform different analyses. Here in the query editor, we select the data source as the glue data catalog we just created. Then we can select spacex_db in databases. This will then show the list of all the tables and views available inside spacex_db. We can now write queries in the right-hand pane of the query editor. Below I have shown a simple example where I have written a select query to query the data stored in one of the tables. Once we click on Run, we can view the results of the query below, along with the time it takes to execute the query and the total data scanned by the query. Then in this Athena query editor, we can perform different queries for data analysis, here are some of the examples. - Select all data from the spacex_crew table SELECT * from spacex_crew; - Select specific columns from the spacex_crew table SELECT id as member_id, name as member_name, - Finding the count of total crew members using the COUNT() aggregation function SELECT count(*) as total_crew_count - Filtering data to get details of crew members belonging to “SpaceX” agency SELECT * from spacex_crew where agency = '"SpaceX"'; - Aggregating the data based on agency to find the number of members belonging to each agency. SELECT agency, count(id) as crew_count group by agency order by crew_count desc; Hence in this way, we can run different SQL queries to analyze the data from the data lake in AWS Athena. Here I have only shown a few examples of queries, you can try to run more complex queries using joins, subqueries, etc. based on your data model. Also, if we want to do more complex data transformations, cleaning, and analysis in our data we will use spark notebooks from Glue ETL to process the data. In conclusion, the combination of AWS Glue and AWS Athena offers a powerful solution for data analytics on the AWS platform. By utilizing AWS Glue's data crawler to ingest data from the s3 data lake, creating a Glue data catalog with databases and tables, and analyzing the data in Glue tables using SQL queries in AWS Athena, valuable insights can be effectively extracted the data, as we have done in our project so far. These tools streamline the process of data discovery, preparation, and integration, making it easier for businesses to gain a competitive edge by making data-driven decisions, improving operational efficiency, and identifying new business opportunities in today's data-driven world. Hence, simple data analytics was done over the data we loaded in the S3 data lake using AWS Glue and AWS Athena. In the next part of this project, I will be cleaning and transforming the data using spark notebooks in AWS Glue and will finally load the transformed data into AWS Redshift, which will be the final data warehouse for storing the processed data.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818081.81/warc/CC-MAIN-20240422051258-20240422081258-00284.warc.gz
CC-MAIN-2024-18
14,170
61
http://forum.vectorlinux.com/index.php?topic=15624.msg88695
code
OK, Now what if I want to print just one label instead of two? Or suppose I want to print two different labels on the same sheet? Because as far as I can tell, it will only print two duplicate labels in the same sheet. To print just one label ... File-->Print--> click Labels tab, then select Labels from: radio button. Set from: 1 to 1 (prints only top label.) Set from: 2 to 2 (prints only bottom label.) Have to run the same sheet through twice as far as I can tell to print two different labels on same sheet.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121153.91/warc/CC-MAIN-20170423031201-00264-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
513
6
https://kingsdh.net/page/2/
code
Interdisciplinary Approaches to Computational Moving Images 6-7 July 2023 King’s College London, Strand Campus This workshop brings together a select group of researchers in the fields of digital and computational humanities, film, cultural history, informatics, computer vision, and digital art, with the purpose of exploring together emerging computational approaches to the study of moving images. Participants include researchers from leading laboratories in Europe, including the Cultural Data Analytics Open Lab (CUDAN) at Tallinn University and the Cultural Analytics Lab (CANAL) at the University of Amsterdam, as well as archives and digital preservation experts from public UK institutions such as the BBC and the BFI. The workshop is hosted by the Computational Humanities Research Group in the Department of Digital Humanities at King’s College London. Over two days, we will consider the modelling of moving images as computational artefacts, and reflect on the past, present, and future of computational moving image studies. We will then discuss and actively experiment with several ways of encoding the flows of moving images in time: from shot lengths measurements to high-dimensional representations, computational techniques that might afford new perspectives on the constitution and analysis of cinematic time. The workshop is broadly split between a day of introductions and theory, and a second day of practical work and plans for future collaboration. The workshop will take place in the Embankment Room (MB -1.1.4), except the public panel on High-dimensional cinema, which will be at the Nash Lecture Theatre (K2.31). See programme in the next page. The festival brings together speakers, exhibits, performances, demos, and screenings in an exciting programme of events from 24th-28th May 2023. The events are open to the public, and provide an opportunity to gather with academics, students, alumni and King’s cultural and industry partners to find out more about developments in artificial intelligence technologies, and the challenges and opportunities that arise from them. This event brings together experts from across a range of disciplines who work on visual culture and AI – from art to facial recognition systems – to explore its opportunities and challenges. How do we live well with AI and the visual? And how do we address its systemic inequalities around race, gender and ethnicity? Speakers include: Can computers be creative? Do AI image generators such as DALL·E 2 mean the end of art? Looking at different examples of computational creativity enabled by machine learning, this talk by Joanna Zylinska will aim to cut through the smoke and mirror effect surrounding the current narratives about ‘creative AI’. But it will also demonstrate some practices of machinic co-creation, in which human artists and engineers draw on robotics and AI to produce work that is both visually interesting and thought-provoking. Through this, the talk will raise broader questions about the conditions of art making and creativity today. How might AI art impact society and humanity’s self-conception? Attend this live discussion from the makers of the Art & AI podcast. Hear new perspectives, deep insights and crackling debate from a unique mix of scholars from King’s, the Courtauld Institute and the National Gallery. As AI advances, our interactions with chatbots and robots are becoming increasingly common. But what are the potentials and pitfalls of fostering friendships and intimacy with computer software and hardware? This talk explores our emotional connections with AIs and robots, from their ability to provide support and companionship to fears of dehumanisation and the loss of authentic human connection. Technology has the power to bridge social and personal gaps in our lives, while also raising important ethical questions about individual and cultural impact. Join us as we explore the complex and fascinating world of human-AI relationships and consider the implications for our future interactions with technology. Modeling Doubt, Coding Humility: A Speculative Syllabus At a time of increasing artificial intelligence and proliferating conspiracy, faith in ubiquitous data capture and mistrust of public institutions, the ascendance of STEM and declining support for the arts and humanities, we might wonder what kind of epistemological world we’re creating. Prevalent ways of knowing have tended to weaponize uncertainty or ambiguity, as we’ve seen in relation to COVID vaccines, elections, climate, and myriad political scandals. In this talk I’ll sketch out a speculative syllabus for a future class about the place of humility and doubt in various fields of study and practice. We’ll examine how we might use a range of methods and tools — diverse writing styles, modes of visualization and sonification, ways of structuring virtual conversations, etc — to express uncertainty and invite more thoughtful, reflective engagement with our professional and public audiences and interlocutors. Shannon Mattern is the Penn Presidential Compact Professor of Media Studies at Art History at the University of Pennsylvania. From 2004 to 2022, she served in the Department of Anthropology and the School of Media Studies at The New School in New York. Her writing and teaching focus on media architectures and infrastructures and spatial epistemologies. She has written books about libraries, maps, and urban intelligence, and she contributes a column about urban data and mediated spaces to Places Journal. You can find her at wordsinspace.net. AI: Who’s Looking After Me?’ takes a questioning, surprising, playful look at the ways Artificial Intelligence (AI) is already shaping so many areas of our lives, and ask if we can really rely on these technologies for our wellbeing and happiness. Presented in collaboration with FutureEverything, we explore who holds the power, distributes the benefits, and bears the burden of existing AI systems. Most of us know very little about what AI is or how it works, but so much of how we’re cared for in different aspects of our lives – be it love, justice or health – is undergoing transformative change. ‘AI: Who’s Looking After Me?’ fractures this singular, monolithic ‘AI’ apart, and looks at the range of ways it’s changing how we’re cared for. “So many of our conversations about AI treat it as this distant, sleek, even magical thing; our attentions are daily directed towards the latest product or scandal. In all this hype and marketing, I think we’re losing sight of the human — both in how AI technologies are made, and the many ways they’re already woven into our lives. To be able to grasp and shape the course of AI’s journey, we need to grapple with its messy, multiple realities and I hope this exhibition can be an invitation to do that. It’s characteristic of what we’re trying to do as a gallery, to nurture unlikely, inventive collaborations and dialogues and be a home for the cultural work that emerges from them.” Siddharth Khajuria, Director of Science Gallery London Exhibited works from the programme include: Cat Royale is the futurist utopia where cats are watched over lovingly by an AI robot arm, tending to their every need. The film and installation documenting cats’ experiences with an AI caregiver probe the future impact of new technologies on animal care… and the trade-offs involved. The work from internationally renowned artist collective Blast Theory, currently cultural ambassadors for the Trustworthy Autonomous Systems Hub, will be accompanied by live research from author and computer scientist Dr Kate Devlin, King’s Department of Digital Humanities. Each Saturday throughout the season, Sentient Beings will invite visitors to question their relationship to security and privacy within the digital landscape of AI assistants. Featuring an immersive soundscape, the work sees artist Salomé Bazin collaborate with Dr Mark Cote from King’s Department for Digital Humanities, and Jose Such and William Seymour from the Department of Informatics. You can read further details and register here. An excerpt from the event blurb is copied below. What if racism, sexism, and ableism aren’t just glitches in mostly functional machinery—what if they’re coded into our technological systems? In this talk, data scientist and journalist Meredith Broussard explores why neutrality in tech is a myth and how algorithms can be held accountable. Broussard, one of the few Black female researchers in artificial intelligence, explores a range of examples: from facial recognition technology trained only to recognize lighter skin tones, to mortgage-approval algorithms that encourage discriminatory lending, to the dangerous feedback loops that arise when medical diagnostic algorithms are trained on insufficiently diverse data. Even when such technologies are designed with good intentions, Broussard shows, fallible humans develop programs that can result in devastating consequences. Broussard argues that the solution isn’t to make omnipresent tech more inclusive, but to root out the algorithms that target certain demographics as “other” to begin with. She explores practical strategies to detect when technology reinforces inequality, and offers ideas for redesigning our systems to create a more equitable world. Folgert Karsdorp (Royal Netherlands Academy of Arts & Sciences (KNAW), Amsterdam) and Mike Kestemont (University of Antwerp, Belgium), Forgotten knights, unseen sailors, and unapprehended criminals: applying unseen species models to the survival of culture Researchers of the past — whether historians, literary scholars or archaeologists — depend on the sources that have stood the test of time. That sample of history is usually far from complete, however. There are numerous reasons for this, such as natural causes (e.g., fires or floods), decisions at the level of archival policy (what do we preserve and what do we not?), and biases in the formation of the archives themselves. Data representing lower classes were long considered less relevant, for example, and thus socioeconomic factors likewise play a role in the survival of sources. In a series of recent experiments, we have explored how statistical methods from ecology can help us identify such gaps and biases in our knowledge. Those methods all find their basis in “Unseen Species Models,” which were were originally developed to estimate the number of unique species in an environment. Just as ecologists try to estimate biodiversity from an incomplete sample, we apply the models to incomplete historical archives to measure the actual cultural diversity. In this talk, we apply unseen species models to three cases. First, we show how these methods can tell us something about the forgotten medieval chivalric literature in Western Europe. We then apply an extension of the method to the historical archives of the Dutch East India Company, to map out the size of its workforce. Finally, we explore a generalization of the unseen species model with which co-variates of loss or absence can be mapped. We apply this extension to a dataset from historical criminology: the police registers of the Amigo prison (1879-1880) in Brussels, and show how the models can give us an estimate of the “dark number” of unapprehended perpetrators as well as the demographic composition of this group. Mike Kestemont, PhD, is a full professor in the department of Literature at the University of Antwerp (Belgium). He specializes in computational text analysis for the Digital Humanities. Whereas his work has a strong focus on historic literature, his previous research has covered a wide range of topics in literary history, including classical, medieval, early modern and modernist texts. Together with Folgert Karsdorp and Allen Riddell he has written a textbook on data science for the Humanities. The persistence of cultural information over long stretches of time is his key research topic at the moment. In the new framework of Cultural Ecology, empirical methods are imported from ecology and biostatistics to provide innovative quantitative models of cultural change and survival. Together with his Polish colleagues Maciej Eder and Jan Rybicki he is involved in the Computational Stylistics Group. Mike lives in Brussels (http://mikekestemont.github.io/), tweets in English (@Mike Kestemont) and codes in Python (https://github.com/mikekestemont). Folgert Karsdorp, PhD, is a senior researcher in Computational Humanities and Cultural Evolution at the Meertens Institute of the Royal Netherlands Academy of Arts and Sciences (Amsterdam, the Netherlands). His research focuses on modelling cultural change from an evolutionary perspective (e.g., why some cultural phenomena are adopted and persist through time, while others change or disappear). Additionally, he is interested in measuring cultural diversity and compositional complexity, and how we can account for biases in our estimations of diversity. To do that, he employs computational models from Machine Learning, Cultural Evolution, and Ecology. Besides cultural change and diversity, Karsdorp is also interested in teaching about computer programming in the context of the Humanities. Together with Mike Kestemont and Allen Riddell, he published a text book with Princeton University Press about using Python for Humanities data analysis. For more information see his website (https://www.karsdorp.io) and his projects on GitHub (https://github.com/fbkarsdorp). Thea Sommerschield (Ca’ Foscari University of Venice, Italy), Restoring, dating and placing Greek inscriptions with machine learning: the Ithaca project Ithaca is the first deep neural network for the textual restoration, geographical attribution and chronological attribution of ancient Greek inscriptions. This AI model is designed to assist and expand the historian’s workflow, focusing on collaboration, decision support and interpretability. In this presentation, I will introduce Ithaca and guide you through the model’s architecture, design decisions and visualisation aids. I will also offer a demo of how to use Ithaca for your personal research. Thea Sommerschield is a Marie Skłodowska-Curie fellow at Ca’ Foscari University of Venice. Her research uses machine learning to study the epigraphic cultures of the ancient Mediterranean world. Since obtaining her DPhil in Ancient History (University of Oxford), she has been the Ralegh Radford Rome Awardee at the British School at Rome, Fellow in Hellenic Studies at Harvard’s CHS and Research Innovator at Google Cloud. She co-led the Pythia (2019) and Ithaca (2022) projects, and has worked extensively on Sicilian epigraphy. Piroska Lendvai and Claudia Wick (Bavarian Academy of Sciences and Humanities, Germany), Finetuning Latin BERT for Word Sense Disambiguation on the Thesaurus Linguae Latinae The Thesaurus Linguae Latinae (TLL) is a comprehensive monolingual dictionary that records contextualized meanings and usages of Latin words in antique sources at an unprecedented scale. We created a new dataset based on a subset of sense representations in the TLL, with which we finetuned the Latin BERT neural language model (Bamman and Burns, 2020) on a supervised Word Sense Disambiguation task. We observe that the contextualized BERT representations finetuned on TLL data score better than static embeddings used in a bidirectional LSTM classifier on the same dataset, and that our per-lemma BERT models achieve higher and more robust performance than reported by Bamman and Burns (2020) based on data from a bilingual Latin dictionary. We discuss the differences in sense organizational principles between these two lexical resources, and report about our dataset construction and improved evaluation methodology. Piroska Lendvai (PhD) works at the Digital Humanities R&D Department of the Bavarian Academy of Sciences and Humanities (Munich, Germany), where she supports research in Humanities and Social Sciences via tools and approaches from language technology. Claudia Wick (PhD) works as a lexicographer in the Thesaurus linguae Latinae project at the Bavarian Academy of Sciences and Humanities (Munich, Germany) that targets the compilation of a comprehensive dictionary for ancient Latin. In her spare time she pursues programming. To register to this seminar, please email Barbara McGillivray at [email protected] Enrique Manjavacas (Leiden University, The Netherlands), Historical Language Models and their application to Word Sense Disambiguation Large Language Models (LLMs) have become the cornerstone of current methods in Computational Linguistics. As the Humanities look towards computational methods in order to analyse large quantities of text, the question arises as to how these models are best developed and applied to the specificities of their domains. In this talk, I will address the application of LLMs to Historical Languages, following up on the MacBERTh project. In the context of the development of LLMs for Historical Languages, I will address how they can be specifically fine-tuned with efficiency to tackle the problem of Word Sense Disambiguation. In a series of experiments relying on data from the Oxford English Dictionary, I will highlight how non-parametric and metric learning approaches can be an interesting alternative to traditional fine-tuning methods that rely on classifiers that learn to disambiguate specific lemmas. Enrique Manjavacas Arevalo is currently a post-doc at the University of Leiden, working in the MacBERTh project developing Large Language Models for Historical Languages. He obtained a PhD at the University of Antwerp (2021) with a dissertation on computational approaches to text reuse detection. Organisers: Andrea Ballatore (KCL), Jamie Larkin (Chapman Uni.), with the support of Zhi Ye (Nina) (KCL) Registration for participants: if you want to attend, please register at this <form>. ⏱️ When: Thursday 18 May 2023, 10:00 am – 5:30 pm (UK time) 📍 Where (hybrid): King’s College London, Bush House, (S) 1.01 (lecture theatre 1). For registration, please go to the North Entrance (see this map and this photo of the entrance). The link for online participation will be circulated by email before the event. 9:30 – 10:00 • Coffee/registration 10:00 – 10.15 • Introduction by organizers 10:15 – 11:30 • Paper session 1: Data Analytics for Museum Management 11.30 – 11.45 • Coffee break 11:45 – 13:00 • Paper session 2: New Media Ecologies 13.00 – 14.00 • Lunch break 14.00 – 15.15 • Paper session 3: Museum Data Practices 15.15 – 15.30 • Coffee break 15:30 – 16:45 • Paper session 4: Museum Data Infrastructures 16.45 – 17.00 • Comfort break 17.00 – 17:30 • Discussion and activity 17:30 – 17:40 • Closing remarks 17.40 – 18:00 Networking opportunity Paper session 1: Data Analytics for Museum Management Chair: Dr Mark Liebenrood ‘How Italian museums are facing the digital challenge’ Mauro De Bari (University of Bari, Italy) ‘Challenges and opportunities for data based museums’ Pille Runnel, Pille Pruulmann-Vengerfeld & Agnes Aljas (Estonia National Museum, Estonia, & Malmö University, Sweden) ‘What a Wonderful World: designing a media ecosystem at MAXXI museum in Rome’ Carmen Guarino, Stefano Capezzuto & Daniele Bucci (University of Palermo, Italy & Ecosistemica) Paper session 2: New Media Ecologies Chair: Dr Chiara Zuanni ‘Sensory Experience as Interaction Data in Exhibition Spaces’ Izabel Derda (Erasmus University, The Netherlands) ‘Worlding ontologies. Towards more ethical museum databases’ Mariel Hidalgo-Urbaneja, Athanasios Velios & Paul Goodwin (University of the Arts London, UK) ‘Virtual Acoustic Objects in Museum Environments: Bridging the Inaccessibility of Interactive Cultural Objects’ Dominik Ukolov (Leipzig University, Germany) ‘Samplebar Kenya and Beyond: On Interactive Ways to Digitise Traditional Music’ Kahithe Kiiru & Hakan Libdo (Bombas of Kenya & Libido Music AB) Paper session 3: Museum Data Practices Chair: Dr Serena Iervolino ‘Counting the small majority: correcting sampling bias in online museum studies’ Ellen Charlesworth (Durham University, UK) ‘Biases in data: the case of online museum catalogues’ Anna-Maria Sichani (School of Advanced Study, University of London, UK) ‘Enriching Exhibition Scholarship’ Clare Llewellyn (University of Edinburgh, UK) ‘Unlocking Collection Histories: Provenance Data and Agency’ Fabio Mariani (Lynn Rother & Max Koss, Leuphana University, Germany) Paper session 4: Museum Data Infrastructures Chair: Prof Alex Poulovassilis ‘Humanities Research, Museums, and Linked Data’ Toby Burrows, Deb Verhoeven & Mike Jones (University of Western Australia, University of Alberta, Canada, & Australia National University) “Sloane Lab: Domain Vocabularies for Semantic Interoperability of Museum Collections” Andreas Vlachidis & Daniele Metilli (UCL, UK) ‘Generative AI and the Museum: Working with Collections as Training Data’ Joel McKim & Alessandro Provetti (Birkbeck, University of London, UK) ‘Unlocking the connective potential of Oral History through Natural Language Processing’ Stefano De Sabbata, Stefania Zardini Lacedelli, Alex Butterworth, Colin Hyde, Sally Horrocks, Neslihan Suzen, (University of Leicester, UK & Science Museum Group) 🍻 Conference pub (from 6 PM): Museum Tavern, 49 Great Russell St, London WC1B 3BA 🍽️ Conference dinner (self-funded): please contact organisers for information
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510603.89/warc/CC-MAIN-20230930050118-20230930080118-00689.warc.gz
CC-MAIN-2023-40
21,706
70
https://androidforums.com/threads/sprint-changing-boot-animation.778655/
code
Hi guys, Sprint Branded HTC One - Rooted S-Off - Running Bad Boyz Sprint One Rom 4.3 Deodexed v1.0 10/5/13 No matter what I do, I cannot change the boot animations. First attempt was using Boot Animations Root, no success... Then I tried using ES File Explorer and Ghost File Commander to manually add the files. I tried renaming the bootanimation.zip file in /system/media, no success. Then I tried going into /system/customize/CID. Here there are two .xml files - default and Sprint00... I took a look inside and they reference /system/customize/resource/m7_spcs_startup_animation.zip and m7_spcs_shutdown_animation.zip for boot up/shut down animations respectively. I then renamed my new boot/down animations to those names and placed them in that folder, backing up the old by changing their name. The boot down animation worked, boot up did not. I then looked in the folder and the files had reverted to their originals. A second shutdown showed the early success of changing shutdown animation was not persistent. I also tried changing the pointers in the .xml files to new locations (my downloads folder) with no success. It seems that my /system/customize/resource and /system/customize/CID folders are restored on each boot. No changes I make stick after a reboot. I have heard there is a file recovery.img that recreates these folders on each boot, and I am only making changes to the unpacked files, but I have no idea how to make a change that does persist. Any help would be greatly appreciated! Also, if anyone knows of a way to customize what the notification pull down says at the bottom (currently says Sprint) that would be helpful as well. Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825057.91/warc/CC-MAIN-20171022022540-20171022042540-00538.warc.gz
CC-MAIN-2017-43
1,666
1
https://marketing.jumplead.com/t/api-unsubscribe-customer-through-api/175
code
Hi Jumplead team, Another question on Jumplead API. After bulk importing my contacts, I need to unsubscribe some of them. Doing this through interface will take quite a long time, so I took a look at your API. There is a method to update contact I tried it, it always returned HTTP 200, but the contact was not updated actually. Here is the request body I used and here is the response I also tried 0,"0","False", "FALSE", FALSE instead of false as contactable value - nothing helps. Moreover, some of the values I set through web interface (stage) were reset after this update API call, although I did not added anything related to stage in request body. How can I unsubscribe a user using Jumplead API?
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806609.33/warc/CC-MAIN-20171122141600-20171122161600-00583.warc.gz
CC-MAIN-2017-47
704
10
https://community.freepbx.org/t/ring-group-error/11024
code
I’ve a little problem with ringgroups. I’ve set up a RG on ext 9001 with just one ext in it ( ext 100 ) and strategy “ringall”. The inbound call pops in, but the ext 100 does not ring. ( I’ve set announcements prior and after the RG so I can verify the workings ). - Ubuntu 10.04.2 - FreePBX 220.127.116.11 from source - Asterisk 18.104.22.168 from source If the inbound route is changed to a Queue ( as sugession from [email protected]#freepbx ) the call rings on ext 100, or if the inbound call is just routed directly to ext 100 it’s also working. As of a few months ago, Ubuntu would work with Asterisk and Freepbx if you put in the work. However, using the pre-packaged Centos versions worked much more reliably. In total, I’ve spent much less time just learning the things I needed to know in Centos (RedHat) than trying to support this platform in Ubuntu. I won’t even touch Asterisk and Freepbx on Ubuntu anymore - even though I use Ubuntu for every other linux need.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103331729.20/warc/CC-MAIN-20220627103810-20220627133810-00591.warc.gz
CC-MAIN-2022-27
991
7
https://fotoprofit.ru/rowan-atkinson-elementary-dating-lyrics-157.html
code
Rowan atkinson elementary dating lyrics May I say how pleased I am with tonight's turnout, some 800 people, which is very gratifying. Obviously taking out a girl for the first time is a very complex issue.The first crucial step is, having arranged to pick up your date, not to look like a complete idiot when she first opens the door. The well mind sporting injury is always useful -- a good excuse for leaving. The girl may offer to pay for the meal for herself. Once said and done, it's prolly not to dance at all. And some other people dance like there's something coming out of their bottom. Most people don't know how to dance, so do too much. Some people dance if there was something up their bottom.But when your attention is there, it is vital to tell her how pretty she is looking, straight away, but don't over do it. When you say good bye to the parents, again don't over do it. If you drive like this, you should have taken a taxi. If at this point you are introduced to her parents, attitude is all in important. But when you do notice her it is vital to say how pretty she is looking straight away, but don't overdo it. ladies and gentlemen you need your way and said what went on what we'd like to do next is is to try it and get into the Guinness Book of Records for the longest sketch ever performed to a live audience who better to stretch it out four hours than our next guest is a veteran of several great television jerz mostly based on old ideas of mine is also outstandingly good at Vickers please welcome the voluptuous a run and concern ladies and gentlemen thank you very much indeed our lesson this evening is taken from the Gospel according to st. Bean, Blackadder and even a hint of Monty Python (especially in Fatal Beatings) You'll laugh, you'll.... With eating, again, moderation is the order of the day: Don't eat too fast. It's important to relax and make your guest feel at home. She will probably feel as nervous as you do and there's no need to make any extra special effort Then putting on the music, we can't help you with the choice of CD, even though no matter what the circumstances, Donny and Marie Osmond's greatest hits would be a mistake. You can leave a response, or trackback from your own site.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038921860.72/warc/CC-MAIN-20210419235235-20210420025235-00354.warc.gz
CC-MAIN-2021-17
2,243
8
https://azadzahoory.com/2012/10/05/an-enhancement-to-ios-picture-sharing-within-text-messages/
code
One thing I like to do on my iPhone is to take an image which is sent to me via MMS (basically text messaging but for images or videos A.K.A. “multi-media messaging service”) and send it to another friend. I recently noticed that the process to do this rather simple exercise can be improved. Here is an example of an image that is sent via MMS: By clicking on the top right menu, I see the various options available: What’s interesting is that there is no option here to forward this image via MMS to another user in my address book. What I end up doing is selecting the option Save to Camera Roll and then going to my camera roll to select the image: By selecting the menu button in the bottom left corner of the screen, the user is shown the following options: As can be seen above, the MMS option is available only after saving a local copy of the image to my camera roll. Ideally, this should not be a prerequisite and the OS should have the ability to let me send an MMS of the image directly from the text message view I was previously inside of. Worst case scenario, the OS can keep a local copy of the image and then delete it after the message is sent. By requiring this extra step, the end-to-end process has become more challenging.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00458.warc.gz
CC-MAIN-2023-14
1,250
5
http://crackerbox.tripod.com/Index/lawyers/letter.html
code
Iím writing in regards to a website celebrating the life and work of George Harrison which was shut down recently at your request. When I first started working on Crackerbox Palace [Exhibit A] in December 1996, I was very careful to avoid breaching copyrights. In fact, I was so concerned, I wrote George Harrison a letter [Exhibit B] and sent it to his address at Friar Park. This letter was never answered, but I continued my work with Crackerbox Palace. Within a few months, it was looking very good. I had reviewed a few of Georgeís albums, and these reviews actually influenced quite a few people to search out these albums and buy them for themselves. I had a few images on the page, which I had put together myself from pictures already available on the internet. I also had a news page, where I posted any recording rumours as they came to me. The point I really want to make clear to you is that Crackerbox Palace was doing Mr Harrison more good than harm. Apart from the fact that it was boosting sales of his albums, Crackerbox Palace was the one place on the internet where fans could get together and discuss George Harrisonís work. On Friday 27 June, I received this email message from Geocities, the hosts of Crackerbox Palace, that it had been removed at your request due to some infringement on Mr Harrisonís "intellectual property rights". [Exhibit C] This was quite a shock to me, as I was not aware of any copyright breaches on my page (and if there were any, why wasnít I notified before the site was shut down?). Within the next few days, I received over eighty messages of confused shock and support. I have enclosed a selection of these for your perusal. [Exhibit D] Iím not going to ask to have my old site back. Thatís over and done with now. You made sure of that. What I want to know is why the site was shut down. Now, almost one month later, all I know is that I breached some unspecified "intellectual property right", a concept I never learnt at school. Probably a concept nobody learns unless theyíve been to lawyer school. Iíd like to know exactly where the last site had gone wrong, so when I work on my next site I can be sure not to repeat this mistake. If you canít answer this simple question, perhaps itís time George Harrison got some new lawyers that know their stuff. Yours very sincerely,
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256958.53/warc/CC-MAIN-20190522203319-20190522225319-00189.warc.gz
CC-MAIN-2019-22
2,343
8
https://www.timesunion.com/business/article/Spring-forth-fresh-thoughts-new-starts-5402188.php
code
There's an epidemic sweeping the country, and the cure is just outside the window. Spring fever is infecting folks from coast to coast, following the winter that wouldn't end with its record snowfalls and biting temperatures and the dreaded polar vortex. And what would spring be without spring cleaning? We sweep out the cobwebs in the corners and clean out the garage. Pack up the boots and stow the winter blahs. It's time for a fresh start.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585460.87/warc/CC-MAIN-20211022052742-20211022082742-00507.warc.gz
CC-MAIN-2021-43
444
2
http://www.govconnection.com/shop/hpe-psl-capacity-advisor-ipf-e-ltu/32965907
code
Collapse & Return to Top HP Capacity Advisor is the industry's first lightweight, integrated tool for ongoing capacity planning, simulating placement of application workloads to help IT administrators improve server utilization. Capacity Advisor provides planning capability for the intelligent control of the HP Virtual Server Environment. HP Capacity Advisor captures server utilization data (more than a thousand data points per server per day) and virtualization configuration scenarios in order to perform ongoing capacity planning. Using Capacity Advisor you can view historical resource usage data through an intuitive graphical interface and use that data to pre-test different scenarios before making changes to critical applications. Capacity Advisor includes groundbreaking Smart Solver technology developed by HP Labs which shows the best fit for your workloads across hundreds of servers. Like having a team of Ph.D.s behind you, it takes guesswork out of traditional capacity planning. Capacity Advisor also includes metrics on energy utilization, so administrators can rapidly make decisions to make their data centers more energy-efficient. By running multiple scenarios you can make better decisions, match workloads to servers more precisely and get more from existing server resources before updating its systems. HP Capacity Advisor can be used by general server administrators; your IT group can balance server utilization on an ongoing basis - not just at the time of initial deployment. With HP Capacity Advisor, matching workloads to existing resources in your virtualized IT infrastructure becomes more efficient, lowering overall IT costs and providing a better return on IT investment. Capacity Advisor is for organizations that want to build flexible virtual server infrastructures to help optimize server resource utilization and reduce cost and complexity. HP Capacity Advisor reduces the time, effort, and complexity of virtualization planning.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125654.80/warc/CC-MAIN-20170423031205-00419-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,975
6
https://www.turing.com/resources/top-ten-skills-to-hire-an-android-app-developer
code
Smartphones have forever changed how we access services and information by bringing them directly to our fingertips. They have been integrated into almost every aspect of our lives. As Android apps seamlessly connect people across the globe and enable users to engage in more innovative and exciting ways, the demand to hire Android app developers is increasing globally. Android app development requires a deep understanding of both programming and design aspects. An experienced Android app developer must be skilled in the nuances of several related concepts to develop and deploy successful apps. This blog lists the top 10 Android developer skills you should look for while hiring. But before exploring these skills, let’s understand Android app development and the responsibilities of Android app developers. Let’s get started. Android, an open-source platform for smartphones and tablets, is making waves in the mobile space. Android is a Linux kernel-based platform developed by Google. In 10 years, Android has become the most popular operating system in the world. Today, the Android platform serves 4 billion users (in 2023), more than any other mobile operating system. The open platform is available on various smartphones, tablets, and wearables via the Android Wear operating system. Today, all businesses and brands need innovative Android apps to increase their popularity, innovation and reach. Some Android versions have new inventions or some changes over time. These versions are: "Android development is the process of designing, developing and deploying mobile applications using Android Development Kit or Android Software Development Kit (SDK) in Android Studio that is supported by many operating systems." An essential aspect of the Android application environment is that Android applications have historically been written in the Java programming language. However, they can also be created in a relatively new programming language provided by Google called Kotlin. Android apps can be written in Kotlin, Java, and C ++ using the Android Software Development Kit (SDK), but other languages are also available. Android developers have to shoulder multiple responsibilities, from building an app to debugging and deploying it. They need to keep several things in mind when creating their apps to make them more user-friendly and intuitive. So, before starting the hiring process, recruiters need to know about the Android app developers' responsibilities. That include: You need to evaluate several Android app development skills to hire the best developers. So, developers can apply them at the right place and time to provide the best experience to the users. Following are the top 10 skills required for Android app developers: Knowing the fundamentals is one of the crucial skills. The most commonly used languages to create Android apps are Kotlin and Java. These languages can be used individually or in a combination when developing apps for the Android platform. Therefore, Android app developers must have experience in programming with either Java or Kotlin and a strong understanding of their core concepts. In addition to this, a clear understanding of the collection framework, concurrency, and multi-threading would be an added advantage. You also need to be familiar with more core concepts of Java that include: The important point here is that the above functionalities are the same for Kotlin due to their similarity with Java. Therefore, developers need to clearly understand the core concepts to build apps seamlessly. Interaction between users and Android apps should be highly prioritized, as it improves the experience significantly. Appropriate gestures such as drag and drop, keyboard use, and pan and zoom in the right place can make a big difference to users. These are tiny things, but they can be very helpful in improving the user experience. This user interactivity is primarily done by an Android component called Activity. Hence, while evaluating Android app developer skills, ensure they know how to make the app interactive to enhance its usability and deliver an exceptional user experience. Even if an application has remarkable and useful functionalities, it is incomplete and is bound to fail if it lacks a modern user interface. Today, the vast majority of app users want easy-to-use, responsive, and engaging applications. Therefore, the demand for intuitive UX and UI is even higher. According to a report, more than half of app users around the world judge apps based on first impressions. In today's market, developers need to have a good understanding of the design requirements of Android apps and what users like. Every Android developer must follow a few basic guidelines to develop apps that follow material design principles. These include implementing lists and grids with RecyclerView, designing complex layouts with ConstraintLayout, applying animations for enhanced user experience, using appropriate menus, and using vector drawables instead of raster graphics. UI navigation involves interactions that allow users to navigate across, into, and back out from screens or pieces of content within the mobile application. User interface navigation can be implemented through various elements, including toolbars and tab bars. The most basic is the app bar, commonly known as the toolbar. You can add pop-up menus, menu icons, and navigation bar icons on the toolbar. This navigation bar icon helps you open and close the navigation bar, another element for implementing effective navigation. You can use the navigation bar to add menu items that help you exchange fragments and perform other related actions in your current activity. Another navigation element is the BottomNavigationView, which allows you to switch between different fragments within the same activity using the tabs at the bottom of the screen. If you need to switch fragments (different pages) using the tabs connected to the toolbar, you need to select ViewPager. User intention is the key aspect of building efficient Android app navigation. An intent allows users to share data and launch new activities within the same app or switch to another app. Android developers must decide whether they want to create an explicit or implicit intent. Therefore, knowing how to implement navigation in an Android app is one of the important skills. The ultimate goal of building and deploying a mobile app is to increase the number of people using it. If the app is not reliable, scalable, and user-friendly, your team’s efforts will be in vain. This is why it is crucial to perform Android app testing before releasing it in the market. When you build an Android application, always remember that the users can take multiple actions, such as pressing a Submit button or downloading information onto their phones. So, before you evaluate Android developer skills, ensure that the developer knows how to test various use cases and interactions to ensure that the app responds as required. The most commonly used testing libraries for Android apps are Expresso, Junit, Mockito, Robolectric, and UI Automator. Cross-platform mobile application development refers to developing an application that can run on numerous platforms. This implies that the same code or programming language is used to create applications fit for running on various platforms. Mobile applications should be designed and developed to run smoothly on all smart devices without making any sort of glitch for the users. With this feature, Android developers can build apps for different platforms simultaneously, publish them on multiple app stores, and reach their audiences on Android, iOS, or Windows faster. Moreover, with cross-platform app development, there is only one single code to focus on. This means easy bug fixing, fewer tests, and simple deployment. So, before evaluating an Android developer, ensure that the developer can build apps that can function across the three major mobile operating systems: Windows, iOS, and Android. Mobile app databases are collections of structured information designed to meet mobile app requirements. They are managed, updated, and edited using database management systems (DBMS). You must hire an Android app developer who can use Structured Query Language (SQL) to access and modify app databases. There are various other reasons why databases are essential for mobile app development, including the ability to manage a large amount of data and privacy controls. An application programming interface, or API, is a set of tools and protocols that allows one software program to communicate with another. APIs are the foundational element of a mobile app strategy. They are necessary to convert large amounts of data into a usable framework on a mobile device. API integration is one of the important skills for Android app development. Nearly every mobile app uses APIs, including social media apps, banking apps, and more. API management has become a core function of companies that want to make their data available to more people and induce more interaction. APIs are a fast path toward extending an enterprise’s reach beyond its current limitations because they offer easy integration and rapid delivery methods. By bundling assets along with those of partners and delivering them in the appropriate mobile applications, enterprises can extend their reach to new users on the go. You must hire an Android app developer well-versed in API and third-party services to ensure seamless integration and user experience. Android has built-in security features that help prevent application security issues. Android developers must protect the user's privacy by requesting permissions wherever appropriate and sharing data securely using signature-based permissions (and other permission options). Similarly, content providers must pay attention to the app's overall security model very cautiously. Knowledge of implementing security is a crucial Android app developer skill to secure the application and protect it from data breaches, which is critical to your application's success. Even the best programmers face difficulties in manually tracking the changes made to a project from time to time. And, working in a team of developers only compounds this problem. Version control systems can help overcome this problem by providing app developers with an easy-to-use interface for making changes to their code. Git is the most widely used, feature-rich, and freely available task management tool. Git provides many features for Android app development, including virtual team development through branching and merging, reverting changes to code that have caused defects or performance degradation, and facilitating code reviews via pull requests. Hence, it is one of the essential skills to consider while hiring Android app developers. It allows mobile app developers to experiment with the latest features, coding techniques, and application upgrades without compromising the existing versions. Though there are other additional factors that recruiters need to consider before hiring Android or mobile app developers, evaluating Android developer skills is still a major part of the hiring process. Creating dedicated mobile applications has become necessary in every industry, from healthcare to marketing. Thus, it is no secret that the demand for mobile app developers is rising rapidly, and it has become essential to evaluate Android developer skills before hiring them for your project. Skilled developers are hard to come by, especially those who share your vision and strive to make them into reality. And Turing specializes in providing companies with experienced Android developers. Turing is an AI-based deep jobs platform that helps companies build their dream engineering team in 3-5 days. Turing offers Android developers who are pre-vetted for a Silicon Valley standard through assessment tests that measure their technical and non-technical expertise on every level. Head to Turing.com and hire the best Android app developers with a 2-weeks, risk-free trial! Tell us the skills you need and we'll find the best developer for you in days, not weeks.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651815.80/warc/CC-MAIN-20230605085657-20230605115657-00188.warc.gz
CC-MAIN-2023-23
12,233
46
https://www.classictechnology.in/capillary-recruitment-2023/
code
Capillary Recruitment 2023 – Capillary Drive is currently conducting recruitment for candidates from the 2020, 2021, 2022, and 2023 graduating batches. Individuals holding a bachelor’s degree in any field are welcome to submit their applications for the recruitment process. If you have an interest in this opportunity, please ensure to apply at your earliest convenience. Capillary Recruitment 2023 Details |Designation||Data Science Associate| |Salary||Best In Industry| The associate’s primary role involves aiding the data science department in uncovering valuable insights, constructing predictive models, and formulating practical suggestions based on intricate data collections. Collaborative efforts with senior data scientists, data engineers, and various stakeholders will be crucial in enhancing data-centric decision-making procedures. - Hold a bachelor’s degree in a related area (e.g., Computer Science, Statistics, Data Science). - Possess proficiency in programming languages like Python or R. - Display a fundamental grasp of machine learning algorithms and statistical concepts. - Familiarity with data manipulation libraries (e.g., Pandas, NumPy) and visualization tools (e.g., Matplotlib, Seaborn). - Demonstrate strong aptitude for problem-solving and meticulousness. - Exhibit effective communication and teamwork skills. - Proficiency in Programming Languages (Python/R): Mastery of programming languages such as Python or R is imperative for data manipulation, analysis, and model creation. These languages provide the necessary tools and libraries for diverse data science tasks. - Data Cleaning and Analysis Proficiency: The capacity to cleanse, preprocess, and scrutinize data forms the foundation of data science. Proficiency in Exploratory Data Analysis (EDA) aids in the discovery of valuable insights and patterns that steer decision-making. - Machine Learning Acumen: A comprehensive understanding of machine learning concepts, algorithms, and methodologies is indispensable for crafting predictive models and shaping data-oriented decisions. - Competence in Data Visualization: Proficiency in data visualization equips you to articulate intricate findings in a lucid and comprehensible manner, thereby facilitating enhanced comprehension and decision-making. - Strong Problem-Solving and Analytical Abilities: Robust problem-solving skills enable you to systematically tackle challenges, construct hypotheses, design experiments, and draw substantial conclusions from data.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00348.warc.gz
CC-MAIN-2023-40
2,514
16
https://enhancv.com/resume-examples/junior-web-developer/
code
According to the U.S. Bureau of Labor Statistics, IT and Software Engineering positions are at a much faster than average growth rate, which is 22%. With that said, there are currently 1,847,900 jobs in the market right now. The total number of jobs is expected to increase by 409,500 to 2,257,400 in the period of 2020-30. What’s more, the median annual wage for the IT and Software Engineering jobs was $110,140 in May 2020. The lowest 10% earned less than $65,210, and the highest 10% more than $170,100. Our conclusion? The IT and Software Engineering job market is facing competition due to decreasing demand. Top junior web developer sections that make the best resume - Professional summary - Experience (with numbers and results) - Relevant skills What to write in your junior web developer experience section Perfecting your junior web developer resume experience section: - Focus on results, not responsibilities; - Use 4-6 bullet points per position; - List only positions that are relevant to what you’re applying for; - Include at least some form of quantitative data – it can be linked to the number of people you’ve managed or the - percentage decrease in costs that’s followed from your work - you decide; - Choose action verbs over buzzwords. We’ve collected some of the top resume experience sections from real Enhancv users. Check them out when drafting your own Junior Web Developer resume! - Back-end development for mobile applications. - Conduct manual testing of Web applications (websites). - Designed, developed and maintained web-based applications. - Developed front-end and back-end of web applications - Establishing standards of documentation, implementation and coding,improving delivery time and quality projects. - Identified and eliminated website bugs to improve user experience. - Joined client meetings to learn about development of project scopes. - Work under pressure and to tight deadlines - Develop web applications according to the client's requirement. - Conceptualized, planned and executed original designs for a wide range of website properties. - I have developed an excel based business simulation for the financial sector. - Maintained Google for Business cloud infrastructure, corporate websites, configuring 20 workstations and introduced new Invoicing and project management systems. - Took up the role of student instructor and mentored upcoming developer's on the basics of HTML5 and CSS3. - Contributed to the development and design of in-house web projects. - Contributed to daily stand-up meetings, code maintenance and problem solving. - Created and maintained 10+ web applications for numerous national and foreign clients - Mobilized cross platform testing on 4 different web and 3 standalone applications in web and cloud base - Mobilized cross platform testing on 4 different web and 3 standalone applications in web and cloud base - Worked here for 3 months to build lot of static and dynamic web sites/apps - Co-developed a dynamic, secure Web site from scratch - Collaborated with senoir developers to develop projects - maintained existing code and functionality - Has good knowledge and skills in HTML - Has sufficient knowledge of Css (Scss and Sass). He can design the same technologies with himself. - Knowledge of React JS is average. Basically educated in Function components (Hooks). Cannot work on Class components. Continues to study React. - Contributed to the development of the company's own product. - Participated in the construction of an eCommerce software system in a team of two people. - Construction of project documentation of the main product of the company. - Developed and managed a responsive website to drive sales for the organization. - Setup database integrated HTML/CSS/JS/MySQL into the CMS and conducted day-to-day maintenance of the websites, resulting in a 20% increase in turnover. - Collaborated with marketing and project management teams to deliver projects on-time and with the highest standard, increasing over 20% of clients numbers over a 1-year period. - Software development of web-based applications - Worked with team of 4 members to provide custom software solutions for clients - Styling web-based applications with SASS/LESS preprocessor - Updating Janrain widget and using ePublish platform - Writing Automated tests for Angular 2 in Protractor - Agile team work JIRA - Build reusable code and libraries for future use - Collaborate with web designers to improve usability Show off real numbers that display your accomplishments in past roles. Instead of listing out your responsibilities as Junior Web Developer, talk about the measurable impact you made to their business. Did you boost their revenue? Increase customer retention? Mention your proudest points on your resume. Action verbs for your junior web developer resume Junior web developer resume skills section to impress recruiters Checklist for a perfect Junior Web Developer resume skills section: - Make sure to include most if not all essential skills for the job; - Check the job description and add some keywords to pass ATS; - List both hard and technical skills; - When it comes to soft skills – elaborate on them in other sections of your resume (e.g. the experience section). Top skills for your junior web developer resume Teamwork and communication Creative problem solving Owning up to errors Avoid getting sidetracked by Applicant tracking software by including a tech skills' section matching the job description and your own qualifications. Junior web developer resume header: tips, red flags, and best practices Checklist for your junior web developer resume header - Your name and surname in a legible and larger resume font - The job title you’re applying for or your current job title as a subheading to your name - Link to your portfolio or online profile, such as LinkedIn - Address (City and State for the US; just your city for rest of the world) - Email address - Headshot (required or welcomed in the EU; not required and sometimes frowned upon in the US) Stick to popular email providers such as Gmail or Outlook. And use these professional formats to create your username: Some companies, states, and countries have policies about identifying information like photos on your Junior Web Developer resume. Be sure to check all the relevant rules before submitting yours. If you’re in doubt, you can always try contacting the company’s HR department to ask for their policy. Writing an effective junior web developer resume summary Impressive junior web developer resume summary checklist: - Point out the achievements that make you a valuable applicant; - Mention the total years of experience you have; - Highlight the things you believe make you the best fit for the position; - Keep it short: aim at having no more than 3-5 sentences. Resume summary formula: Your summary section should act as a brief but informative introduction to your experience section. In this section you should go into more depth about what you have done, and how you did it. Drawing the attention to your junior web developer resume education section Crafting a job-winning education section. - Use the reverse-chronological format when listing your degrees; - Tailor the classes you’ve taken to the position you’re applying for if you’re an entry-level candidate; - Mention the awards and honors you’ve received; - Add your certifications (but only those relevant to the position). Top certifications for your junior web developer resume The Complete Junior to Senior Web Developer Roadmap (2022) Go from Junior Developer to Senior Developer. Learn all the technical skills Senior Web Developers know! The Web Developer Bootcamp 2022 COMPLETELY REDONE - The only course you need to learn web development - HTML, CSS, JS, Node, and More! The Complete Web Developer in 2022: Zero to Mastery The Complete 2022 Web Development Bootcamp Ultimate Web Designer & Web Developer Course Become a Full-Stack Web Designer in 2022 - Learn Everything from Web Design Fundamentals to Front-End Web Development If you hold a certain major and a minor, your majors should be mentioned first. Choosing the best format for your junior web developer resume The content of your Junior Web Developer resume is what will get you hired, right? But even when your content’s amazing and you’re a true over-achiever, recruiters might not think you’re a good fit if your resume looks messy or is not formatted the right way. In general, there are three basic resume formats we advise you to stick with: - Reverse-chronological resume format; - Functional skills-based resume format; - Combination (or Hybrid) resume format. Deciding which one to use depends on your experience, the industry, and the company. In short — you need to know what your applicant profile is. For instance, reverse-chronological resumes are great for people with over 10 years of experience and no employment gaps. Here, you need to list all your relevant experience in a reverse-chronological format, starting from the most recent and going back to less recent positions. Functional skills-based resumes, on the other hand, are great for entry-level applicants, graduate students, or people who have different kinds of experience. It focuses on skills, education, and character traits, rather than experience. If none of these work for you, and you dream of adopting a more creative approach that makes a difference, the combination (or hybrid) resume format is exactly what you’re looking for. It allows you to focus on both your experience and your skills, making it a ‘best of both worlds’ format. It’s also suitable for those who want to spice things up by adding different creative sections (e.g. ‘life philosophy’ or ‘what my day looks like’). Here are some additional tips on perfecting your resume layout and style: - Go for a traditional resume font sized 12p; - Use standard 1-inch resume margins for increased readability; - Make sure your resume fits on a one-page template. In case you’ve got 10 years of experience or more, your resume’s length can reach two pages; - Avoid unwanted editing and plagiarism – save your resume as PDF before sending it to the recruiters. Want to take it a step further? Learn how to make your resume stand out without relying too much on creativity. Sometimes you’ll want to go after a job which requires more experience than you have. Instead of using a typical Junior Web Developer resume layout, you can use a creative layout. Getting noticed is the most important challenge and a creative resume layout might help you get invited for an interview as most of other accountants have boring resume designs. Want to include something more to your junior web developer resume? So you’ve already listed details about your education, experience, and skills. You’ve also crafted an amazing summary. But now you feel a creative urge to showcase your personality and not just your expertise. We’ve got you! Thanks to our modern templates, you can now include a chart of what your typical day looks like or even a word or two about your life philosophy. All this without sacrificing your Junior Web Developer resume’s professional feel. Some non-traditional sections for your resume include: Making your junior web developer resume stand out You want to make a strong first impression to all recruiters that get a hold of your resume. Sure you do! But how? Well, the easiest way to stand out is by adding a bit of creativity to your Junior Web Developer resume. You could do this by going for a colorful layout or adding a creative section or two. It all depends on the industry and the position you’re applying for! For instance, a position in design would allow for a more colorful resume, while a position in finance would probably not. What makes a great junior web developer resume: key takeaways - Choose a resume layout that sends the right message across and fits your current career situation; - Create a resume header that shows your desired job title, and easy to find contact numbers; - Be specific about your experience, accomplishments and future goals in your summary; - Feature detailed metrics and specific examples that show the impact you made in your previous roles when describing your experience; - List soft skills backed by examples; - Add all of your technical skills and certifications that you have and match the job description; - Show off a dash of personality in your resume that will demonstrate your culture fit and the right mix of hard and soft skills.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945287.43/warc/CC-MAIN-20230324144746-20230324174746-00271.warc.gz
CC-MAIN-2023-14
12,628
136
https://macissues.com/2015/02/25/how-to-handle-multiple-disks-simultaneously-with-disk-utility/?replytocom=2110
code
Regardless of the number of storage devices you have attached or built into your Mac, you will likely use Disk Utility for formatting them when necessary, to partition and resize them for various purposes, and otherwise managing them. However, one limitation you might find when using Disk Utility is that it will only act on one drive or volume at a time. For the most part this is not much of a problem, since operations like a quick format or partitioning of a device can take only a few moments; however, there are times when longer operations on one device can have you waiting around to perform operations on other devices. For instance, if you have a number of drives that you want to securely format or zero-out, it may take hours to format each one. You might also be in the middle of performing a drive wipe, and wish to test another drive you have on hand. 1. Select multiple devices for verification and repair When performing First Aid routines such as verification or repair on a device, you generally do so on one selected device in Disk Utility’s sidebar; however, you can quickly do this on multiple devices by holding the Command key and then clicking each to add them to a selection. You can then run your verification and repair on the selection, and Disk Utility cycle through each selected disk to perform these actions. 2. Launch multiple instances (or windows) of Disk Utility For operations where Disk Utility cannot act on a selection of disks, like formatting disks, you can still perform multiple instances of these operations at a time. In Disk Utility, you can press Command-N to open a new window, but another approach you can take is to launch multiple instances of the program. By default, OS X will only open one instance of an application, so double-clicking a program that is already open will switch to it, instead of launching a new process; however, you can run a second instance of a program, if needed. To do this for Disk Utility, open the Terminal and run the following command for as many separate instances of Disk Utility that you would like to launch: open -n -a "Disk Utility" With these instances open (either as a new window, or as separate processes), you can now use one to start a long format process on one of your disks, and use another for a similar process on another disk. Note that multiple instances of programs should only be done on non document-based programs, that is, programs that do not support files you can save and open in multiple windows (e.g., TextEdit, or Pages). Having multiple instances of the program open will affect services like Apple’s Autosave and Resume, and may overwrite or delete unsaved work you have open in these programs. 3. Use the “diskutil” terminal command Launching separate Disk Utility processes is similar to opening different Terminal windows and using the “diskutil” command in each to perform actions on separate disks. The specific uses of this command will require you be a little familiar with the Terminal; however, as a general principal you can run the following command to get a list of your disk device IDs, which will be labeled something like disk0, disk1, disk2, etc., or individual partitions by their “slice” identifier, such as disk0s2, or disk1s1, etc.: Following this, you can perform your desired actions on your drives or slices in separate Terminal windows, and this will have the “diskutil” command operate on your drives all at once, as opposed to having to perform them sequentially in one Terminal window. Note that in most cases, after supplying the diskutil command’s various arguments and options, the last argument is to supply your drive device. You can do this by typing its device identifier, but can also do this by specifying the full path to the root of the device. Since the OS X Terminal supports drag-and-drop for entering file paths, an easy way to run various commands on different drive devices is the following: - Open a new Terminal window - Type in your diskutil command and arguments (e.g., “diskutil zeroDisk”) followed by a single space. - Drag your desired disk from the Finder to the Terminal window to enter its full path as the last command argument. - Press Enter to run the command. As this command runs its course, you can repeat this procedure to quickly run another instance of diskutil on another volume and get another formatting process going. As with launching multiple instances of Disk Utility, this can be a quick way to attach a series of devices and format or otherwise manipulate them.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00694.warc.gz
CC-MAIN-2023-40
4,577
18
https://monkeynoodle.org/2022/07/18/supporting-a-products-cluster-headaches/
code
Cluster headaches are problem reports that make everyone else in the organization ask “are we seeing that too?” and pile on. Alice suspects a memory leak and files a report. Bob tags his customers to it as well. They start discussing general performance questions in a chat or a meeting with a broad audience. Charlene through Zachariah pile on with more detail, some of which is relevant. A few days later, the root cause of Alice’s problem is found in an environmentally specific misconfiguration, but by now you’ve got an executive asking when you’re going to fix the memory leaks. As a product manager, you may find these incidents annoying. They distract and disturb the engineers and stir up trouble with the field. However, people are people and they’re going to pattern match. Its not in your best interest to pour cold water on field people trying to help. Instead, look for ways to use these incidents to drive improvement. - The best disinfectant is sunlight. Open conversation about the troubleshooting process keeps everyone aware (Slack is great for this, ideally with daily summation to the ticket, but some teams use long-running incident meetings instead). As it becomes clear that Alice’s ticket is not what everyone else thought, their willingness to pile on decreases. There is a limit to effective openness though: people can misinterpret comments and egos can get bruised. The time lag of email based ticket comments is particularly bad for this. Someone may need to referee and keep conversation productive. - Recognize that there is a problem. As a development team, perhaps you can look at this situation as a symptom of something to resolve. The X to this Y may be that there are legitimate concerns about resource utilization, and that troubleshooting those concerns is difficult. Can your team do something to improve that experience? Adding metrics and alerting on known bad states is almost always useful. - Where there’s smoke, there’s often fire. If cluster headaches keep popping up around the same component, that’s a signal of fear, uncertainty, and doubt. Increase enablement for that component, and listen to what the field says. If they don’t trust it they won’t sell it, so you will not be successful until they understand and trust it.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501555.34/warc/CC-MAIN-20230209081052-20230209111052-00347.warc.gz
CC-MAIN-2023-06
2,299
5
http://forums.devshed.com/networking-help/105301-ip-address-mac-address-last-post.html
code
December 12th, 2003, 06:34 AM IP Address from MAC Address - how? If I know the MAC address of a piece of hardware that is on my subnet, how do I get its IP address? (I use DCHP so the IP address can move around). I know I can ping all address on my subnet and then have a look at the ARP table (arp -a command). But I want to directly get the IP address by knowing the MAC. December 16th, 2003, 12:45 AM thats a good question and i have been waiting for one of the gurus here to answer this as well.rarp i believe will give u the ip...think i read it was same or similar to bootp...but not quite sure(so dont attack me if im wrong).guess ill have to pull out the old books and find it when i get a chance this weekend. December 24th, 2003, 07:17 AM You could have DHCP assign a specific IP address based on MAC address. Most(all?) implementations of DHCP allow for this.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120001.0/warc/CC-MAIN-20170423031200-00030-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
870
8
http://icme.stanford.edu/events/cme-300-first-year-seminar-series-35
code
Speaker: Johan Ugander About the Speaker: Johan Ugander is an Assistant Professor of Management Science and Engineering. His research develops algorithmic and statistical frameworks for analyzing social networks, social systems, and other large-scale social data. His work commonly falls at the intersections of graph theory, probability theory, statistics, optimization, and algorithm design. Johan obtained his Ph.D. in Applied Mathematics from Cornell University in June 2014, advised by Jon Kleinberg. From 2010-14, he held an affiliation with the Facebook Data Science team. For the 2014-15 academic year, he was a post-doctoral researcher at Microsoft Research, hosted by Eric Horvitz. Johan joined Stanford in September 2015, where he is a member of MS&E's Social Algorithms Lab (SOAL) and affiliated with the Center for Computational Social Science.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188717.24/warc/CC-MAIN-20170322212948-00307-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
857
2
https://ell.meta.stackexchange.com/tags/tag-request/info
code
For questions about the process and etiquette of creating new tags. Creating new tags requires that you meet a certain reputation threshold, which varies amount Stack Exchange sites, so see the site's FAQ for the amount required. Use this tag for any inquiries about the creation of tags, including the process and etiquette of their creation. Do not use this tag for new tag requests. Instead, read the links below to learn how the tag creation process works.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100146.5/warc/CC-MAIN-20231129204528-20231129234528-00350.warc.gz
CC-MAIN-2023-50
460
3
https://github.com/gds-operations/vcloud-edge_gateway/issues/36
code
Join GitHub today GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up add 'persistence' session support to the xml schema for the Load Balancer service #36 From the Readme.md: However 'persistence' is not defined in the provided schema file. So it can't be used while deploying LoadBalancer rules. 'persistence' only seems to be defined in the 'mock' tests.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584520525.90/warc/CC-MAIN-20190124100934-20190124122934-00214.warc.gz
CC-MAIN-2019-04
445
6
http://bayu.freelancer.web.id/2009/02/25/google-maps-city-view-update/
code
Surprised! that’s what I feel when visiting google maps this morning. Because, I can search city road around some Indonesian City and I found it! Here’s an example of Jalan Semampir Selatan 2a, Surabaya, Indonesia: Hello, my name is Arief Bayu Purwanto, a 24 years old father of a beautiful daughter. Interested in online programming, linux, games, and reading. Currently working on kapanlagi.com as junior developer. I live in a relatively quite and cool place called Malang. I'm available for some freelance stuff as well as some consulting job. You can see my portofolio for some previous task I've finished and some other information related to my capability. Btw, I'm plurking here. View all posts by Arief Bayu Purwanto
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514355.90/warc/CC-MAIN-20181021203102-20181021224602-00264.warc.gz
CC-MAIN-2018-43
729
5
http://viva-survivors.com/2020/03/a-spectrum-of-experience/
code
I have complicated feelings about my viva. It was fine, it went well, but it wasn’t totally enjoyable for me; that has nothing to do with my examiners. It was “bad” that I didn’t sleep well the night before. I got about three hours sleep; I had some nerves and adrenaline going in but a great background tiredness. And then my viva was four hours long. I started it tired. I ended it exhausted. And everything else about my viva was good: not good by comparison, but good! My examiners were fair with their questions. They had clearly prepared. They had opinions, but asked me to contribute rather than just pass a decision. They didn’t like how two of my chapters were written, but discussed them with me rather than simply give me corrections. My viva was four hours long, and I was shattered by the end, but in many ways it felt like it was over much too quickly. It was an anticlimax, as was the end of my PhD. I don’t think that’s universal, but I know I’m not unique in thinking that. After all, a viva is only part of one day: pressured, important, full of the good and maybe a little “bad” – but still only a few hours compared to more than a thousand days you might spend pursuing a PhD. If your viva is in the future, ask others about theirs: ask for the good and the bad, and look for the balance that might help set your own expectations. If your viva is in the past, tell others: share the details that make up the picture. How did you feel? Why was that?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652235.2/warc/CC-MAIN-20230606045924-20230606075924-00649.warc.gz
CC-MAIN-2023-23
1,490
9
http://www.CMStatistics.org/RegistrationsV2/EcoSta2018/viewSubmission.php?in=368&token=75q922q76n4ss151606nn2164q4s4p75
code
Title: Computing conditional density of eigenvalues in high-dimension Authors: Yunjin Choi - National University of Singapore (Singapore) [presenting] Abstract: A method is proposed for evaluating conditional density of eigenvalues of a Wishart matrix in high-dimension. Evaluating the density of eigenvalues involve multi-dimensional integration, while multi-dimensional integration can be computationally challenging especially in high-dimensional setting. This issue has been previously addressed by utilizing approximation of a random matrix kernel and proposed a method for evaluating the marginal distribution of the largest eigenvalue of a Wishart matrix. We extend this approach and propose a method for evaluating the conditional distribution of any $k$-th eigenvalue with its preceding eigenvalues conditioned. The proposed method can be used for testing the significance of the principal components.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363215.8/warc/CC-MAIN-20211205160950-20211205190950-00085.warc.gz
CC-MAIN-2021-49
910
3
https://research.fb.com/publications/?cat=13
code
We then train a new two-layer codec avatar with separate modeling of the upper clothing and the inner body layer. To learn the interaction between the body dynamics and clothing states, we use a temporal convolution network to predict the clothing latent code based on a sequence of input skeletal poses. We show photorealistic animation output for three different actors, and demonstrate the advantage of our clothed-body avatars over the single-layer avatars used in previous work. In this paper, we explore methods that enable supervised speech enhancement systems to train on real-world degraded speech data. Specifically, we propose a semi-supervised approach for speech enhancement in which we first train a modified vector-quantized variational autoencoder that solves a source separation task. Here, in line with that tradition, we explore how recurrent neural networks acquire the complex German plural system and reflect upon how their strategy compares to human generalisation and rule-based models of this system. This position paper names and distinguishes these paradigms. Despite substantial overlap, subtle but significant distinctions exert an outsize influence on research. While one evaluation paradigm values creating more intelligent QA systems, the other paradigm values building QA systems that appeal to users. Though our method capitalizes on multiple views, it nonetheless trains a model that is shared across appearance and motion input and thus, by design, incurs no additional computation overhead at inference time. In this paper we present Generative Adversarial Training, an approach to simultaneously improve the model’s generalization to the test set and out-of-domain samples as well as its robustness to unseen adversarial attacks. We propose a novel training paradigm (ConClaT) that optimizes both cross-entropy and contrastive losses. The contrastive loss encourages representations to be robust to linguistic variations in questions while the cross-entropy loss preserves the discriminative power of representations for answer prediction. We design a family of image classification architectures that optimize the trade-off between accuracy and efficiency in a high-speed regime. Our work exploits recent findings in attention-based architectures, which are competitive on highly parallel processing hardware.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585290.83/warc/CC-MAIN-20211019233130-20211020023130-00397.warc.gz
CC-MAIN-2021-43
2,350
8
https://jerseydeanne.com/2018/10/24/grad-from-il-is-allow-on-need-mm/?shared=email&msg=fail
code
I am a college grad from IL. Financial aid and work study is allowed based on need. If MM dad could very well afford her education, yet they applied on her application that she had a financial need, then that is FRAUD. My parents did not have HS diplomas and could not help me $$. I needed all help I could get. Somehow others were able to prove that they had a greater need than I did, and I wasn’t able to benefit from that option. She possibly blocked someone really in financial need! Thank you very much anon! Therefore she denied another an education like yourself! MM is a fraud, her sister is claiming he paid, but we know the apple didn’t fall far from the tree. I feel this should be enough for Northeastern University to make a statement.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316785.68/warc/CC-MAIN-20190822064205-20190822090205-00114.warc.gz
CC-MAIN-2019-35
753
2
https://assignmentexcellence.com/2022/09/20/lets-learn-my-friends/
code
Learning Goal: I'm working on a c++ project and need a reference to help me learn. Lets learn my friends! 1. please explain what is c++? 2. C++ programming language is often used to create programs? 3. Mention any "library" contained in C++, include the use of the "library"! 4. write the syntax to display the text ("Hello Studypool") using the c++ programming language!
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710936.10/warc/CC-MAIN-20221203175958-20221203205958-00570.warc.gz
CC-MAIN-2022-49
371
1
https://workplace.stackexchange.com/questions/33963/accepted-offer-at-job-a-now-got-e-mail-back-from-job-b/33967
code
I'm in a [potential] pickle here and perhaps SE can give me some good advice on this. These are both IT related jobs. Ok ~ 1.5 months ago I interviewed at company B which was for a remote position. We had several interviews (on video chat) over the course of a month. It came between me and another candidate. They took the other candidate for the remote position but asked if I was interested in a position which involved relocating. I respectfully declined and asked them to consider me for future positions. Fast forward I interview at company A. Based on the description I liked it. I only had two interviews and they were both over the phone (one HR one hiring manager). They gave me a really good offer and I accepted. I have never met the team so I am kind of going to this blind. Based on our discussions this company appears very informal and not really "by the book" so I figured this is potentially their style. There are a few red flags such as they never checked my references and I've never been offered a job after only phone interviews but based on my research they are a legit company and my hiring manager seems to be good. I just don't know what I'm getting into, it could all be a lie or it could be awesome! I am set to start in a week. Now company B comes back to me and says a few other remote opportunities opened up. Company B seemed like a dream job (full time telecommute, my field of interest, and the co-workers seem great since I actually met them over video). I want to talk to company B about this but I don't know how to go about it. Should I just honestly explain the situation that I have an official start date with another employer but since I really am interested in your company for (insert reasons here)? Explain the fact that the job I was presented may differ from reality due to the suspicions I listed above but I still would like to meet them next week to give them the BOTD? Also explain that I do not want to put an undue burden on the new employer so I would need to know fairly quickly? What to do?
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141746033.87/warc/CC-MAIN-20201205013617-20201205043617-00237.warc.gz
CC-MAIN-2020-50
2,047
6
https://realorsatire.com/empirenews-net/
code
From their About page: Empire News is a satirical and entertainment website. We only use invented names in all our stories, except in cases when public figures are being satirized. Any other use of real names is accidental and coincidental. All contributors are responsible for the content of their own material in respect to (but not limited to) copyright, libel and defamation.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506339.10/warc/CC-MAIN-20230922070214-20230922100214-00527.warc.gz
CC-MAIN-2023-40
379
3
https://www.freelancer.com/job-search/app-gps-location-meet/5/
code
...analog inputs. I am in need of a digital solution that accepts 2 hdmi un encrypted inputs. Here are the requirements of the system: 1. 2 HDMI inputs 2. GPS tracking that records speed, location and driving route that integrates with google maps. 3. All recording simultaneously 4. Records to SD card on board Raspberry Pi 3 5. Loop recording. Oldest Need competent developer to comming project. Looking for developer within GPS tracking data into dashboard build on Laravel, MySQL as the GPS webserver, and Angular as the dashboard . The dashboard we will devlop with own programmers. We can get data by several different ways, where one is to build on top of existing service provider trought API. But ...PLZ CONFIRM U UNDERSTAND THIS: Plugin searches for zip code A match on zip_code provides a county_code The county_code is used to find matching locations Location data is displayed to the customer Specifications The plugin should be entirely self-contained. You should not modify the theme or other files. The search bar we need the GPS based functionality to share the best location for fishing for fishermen using Geo CoOrdinates with the help of this iOS APP. we will store all these location as master details in our database and then fishermen will use this iOS app to get the best location for fishing and route to reach that spot. ...recognize some raspberry pi GPS units if configured properly. the player will then play content based on the GPS data. For some reason, though, it is not built to recognize input from tablet GPS hardware. The company told me I would need an android developer to build an app that bridges that gap and allows the player to recognize GPS units built into the I have 100 GPS coordinates in an excel spreadsheet I need them converted from Degree Decimal Minutes To Decimal Degrees. The conversion needs to be extremely accurate. I have googled a few excel formulas that can do this but I am not good with xcel. The format in the spread sheet looks like this- -16 24.513 147 49.855 -16 31.339 147 50.100 there Phone App development for our Electric Skateboard Project, www.frowboards.com. We want a phone app that will tether to our electric skateboard. To record speed, GPS data, mapping data and battery power. Using Arduino. Creation of a secure website that enables remote employee's to enter their physical work space location into a form and also upload the data result from the user running an "arp -a" command. Specifically need to write remote command code to have a windows or mac PC user run an "arp -a" command to enable the resulting network info to be captured. It Deployment of online multi user/location GST enabled Billing software (B2B & B2C invoice templates) with inventory, expenses and all reports modules which can work offline too. [REMOVED BY [url removed, login to view] ADMIN] i need design end build Phone App for drivers parking spot search , network , communication GPS Map Create an app, using XCode or Swift to continuously monitor the location of our technicians in the field. The solution requires two (2) components to meet the challenge - an app located on the technicians mobile that continuously transmits their GPS location, and a companion app that receives the technicians' transmissions. My project is a , third party customer - Vendor relationship maker . my website should comprise of animations alongwith online registration with facebook and signup . the signup will require phone number email address to create an acoount . my website will comprise of 6 pages . further details will be given to interested people. We have a list of 6,000+ contacts that we need to be ...contacts that we need to be individually filtered depending on their Country location. eg. Philippines, Vietnam. Each person will need to be searched via Linkedin (company has been provided for ease) and the data corresponding to that person should be put into their location specific spreadsheet. I made an HTML app (converted with Phonegap) It is a survey on html with 5 questions and after it, a page with a google map with a button Start/Finish, in order to tracking the route that user walk between 2 points. This app works well on Android and is published on Play Store: [url removed, login to view] We are looking for a company who have built similar GPS tracking platforms to build one for us- you must have a proven track record in it and show me samples- no other samples of other websites needed. Please be specific with examples Specification • GPS Track a child/adult/pet • GPS Track a vehicle or luggage • Monitor vehicle speed • Monitor
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690211.67/warc/CC-MAIN-20170924205308-20170924225308-00414.warc.gz
CC-MAIN-2017-39
4,621
15
https://www.allpcb.com/sns/anyone-know-where-to-buy-x-ray-leakage-t_18171.html
code
Get started now Ahmad Faraz Khan Quite good posting. Your knowledge is quite impressive and useful to me who is new beginner. Hope you can write more posts and I will keep on reading. It help me a lot. Thank you. My Full Review and Experience with ALLPCB Price or quality? Free PCB Board by ALLPCB Sponsorship Lead-free Solder Paste for 0402 Metric Chip Components PCB Instant Quote
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587794.19/warc/CC-MAIN-20211026011138-20211026041138-00671.warc.gz
CC-MAIN-2021-43
382
9
https://forum.qt.io/topic/72202/qsettings-path-adds-extra-subdirectory-for-organization
code
QSettings path adds extra subdirectory for organization Using Windows 10 with Qt5.5. Trying to place an ini file into a reasonable (portable, predictable, not hard-coded) location but QSettings is being tricky. When I call the static method QSettings::setPath, it works fine except that it adds the organization name from QCoreApplication unnecessarily. I'm adding the organization name already using QStandardPaths::AppDataLocation (which by default has the organization in it, in Win10 at least), then QSettings is also appending the organization name to whatever path I set resulting it it being there twice: QCoreApplication::setOrganizationName("MyCompany"); QCoreApplication::setApplicationName("MyApplication"); QSettings::setDefaultFormat(QSettings::IniFormat); QSettings::setPath(QSettings::defaultFormat(), QSettings::UserScope, QStandardPaths::writableLocation(QStandardPaths::AppDataLocation)); qDebug() << "QstdPaths AppDataLocation=" << QStandardPaths::writableLocation(QStandardPaths::AppDataLocation); QSettings settings; qDebug() << "INI Path:" << settings.fileName(); QstdPaths AppDataLocation= "C:/Users/mark/AppData/Roaming/MyCompany/MyApplication" INI Path: "C:/Users/mark/AppData/Roaming/MyCompany/MyApplication/MyCompany/MyApplication.ini" I thought that using setPath would actually set the path I want, and not add stuff to it that I didn't ask for. Is this because I'm using the default constructor for QSettings? That's what I would like to do because it is the cleanest (that was the point of setting the organization name and application name at the QCoreApplication level, as the docs say that's what I should do if I want to use the default constructor for QSettings). Is there some way around this? That's a point you should rather bring to the interest mailing list. You'll find there Qt's developers/maintainers. This forum is more user oriented. @SGaist I posted in a development forum... How is this a user issue? I'm not sure I understand. I'm looking for help using QSettings in a desktop application. Could you please clarify what is this list you directed me to? Paul Colby last edited by The behaviour you are seeing is what I'd expect, though I can understand how it's counter-intuitive at first glance. setPathcall is setting the top-level-settings-path to AppDataLocation, and as per the docs, this is "an application-specific directory" - in your case, it's C:/Users/mark/AppData/Roaming/MyCompany/MyApplication. The fact that this is application-specific is something QSettings::setPathknows nothing about, and it makes no assumptions about it. Then, when QSettings read / writes files, it dutifully prepends the organisation and application name, since it has no guarantees that you've done that already with the path you've added in (who's to say MyCompany isn't both the name of your application's organisation, and the name of your disk / directory / mount / symlink?). However, I can see valid reasoning for it the be the way you'd expect too. Putting the rightness / wrongness aside, a few additional thoughts... - instead of using QStandardPaths::AppDataLocation, why not use - why are you calling QSettings::setPathanyway? the default value on Windows is %COMMON_APPDATA%\<orgname>\<app name>.iniwhich sounds more in line with what you want? Depending on what you're trying to do, there might be a case for adding a QSettings::setPathoverload / alternative that works the way you expected. Perhaps that's some of why @SGaist suggested the mailing list. - instead of using As @Paul-Colby correctly analyzed, your use case might involve internals of Qt which is usually outside the scope of this forum which is about using Qt rather than developing Qt itself. Note that there's nothing wrong discussing implementation details and potential bugs/feature. But the place where you'll find the developers/maintainers of Qt is on the mailing list hence my suggestion. CentralScrutinizer last edited by CentralScrutinizer It sounds like you're saying this is just a bit of weirdness from Qt that I should either work around or take it up with the Qt developers, am I right? I have tried other QStandardPaths, but I can't find a combination that matches our legacy (non-Qt Windows-only) apps that just use %APPDATA%\<AppName>\<AppName>.ini to store their settings. I could of course do that in Qt, but I'm trying to make this work for Linux and Mac too. The default %COMMON_APPDATA%\<orgname>\<app name>.ini convention makes perfect sense to me, but I don't always get to decide... There are requirements to follow. So I guess I'll try something else. Overloading setPath sounds like a workable option... thanks for that! No, I'm just saying that your use case is unusual but could interest the devs. Anyway, it's way clearer now that you added that you have a legacy application to handle. Note that you don't need to do special modifications to QSettings, you could just use the constructor that takes a file path. That way, you can build said path as you need on the platforms you support. If your application is meant to replace the other one, you could provide a "migration path" where you move the actual settings file to a more suitable place that avoids you to fiddle with the path like you need to do now. Or... when in doubt change the requirements! I have successfully argued my case and the default is OK. Using the constructor with the path is also an option yeah... I didn't actually test that. Overloading setPath is probably overkill in this case but I might do it anyway, just in case I have similar issues when I get around to testing this on Mac/Linux. One more question about QSettings though... Is it acceptable to store the settings object as a private member variable and just call the QSettings constructor once (in the constructor of my MainWindow for example)? All of the examples I've seen call the constructor in each function that uses it and just keeps it as a local stack variable, but is there reason for that? I know its a Monstate object and all of the QSettings objects share the same state, but why call the constructor every time you need it? Because the example follows usually this pattern: load at startup and store at end of the application.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710870.69/warc/CC-MAIN-20221201221914-20221202011914-00461.warc.gz
CC-MAIN-2022-49
6,227
38
https://sites.google.com/site/bquistorff/research
code
Sebastian Galiani, Patrick J. McEwan, Brian Quistorff (2017) External and Internal Validity of a Geographic Quasi-Experiment Embedded in a Cluster-Randomized Experiment, in Matias D. Cattaneo, Juan Carlos Escanciano (ed.) Regression Discontinuity Designs (Advances in Econometrics, Volume 38) Emerald Publishing Limited, pp.195 - 236 "Pricing Engine: Estimating Causal Impacts in Real World Business Settings" with Matt Goldman "Credit Constraints, Discounting and Investment in Health: Evidence from Micropayments for Clean Water in Dhaka," with Raymond Guiteras, David I. Levine, and Thomas Polley "The synth_runner Package: Utilities to Automate Synthetic Control Estimation Using synth," with Sebastian Galiani. Code. Works in Progress "Matching on What Matters: A Metric Learning Approach to Matching Estimation with Many Covariates," with Gentry Johnson and Matt Goldman "Sparse-Factor Synthetic Controls: Unit-Level Counterfactuals from High-Dimensional Data," with Matt Goldman and Jason Thorpe "Variable Selection Using Multi-task Learning for Bias Reduction"
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583874494.65/warc/CC-MAIN-20190122202547-20190122224547-00108.warc.gz
CC-MAIN-2019-04
1,068
8
https://docs.vmware.com/en/vRealize-Code-Stream/2.1/com.vmware.vrcs.overview-install.doc/GUID-5780A93E-59C2-47AB-94ED-FFFB0ED2F402.html
code
vRealize Code Stream uses SSL certificates for secure communication among instances of the vRealize Code Stream. You can obtain certificates from an internal or external certificate authority, or generate self-signed certificates during the deployment process for each component. For important information about troubleshooting, supportability, and trust requirements for certificates, see the VMware knowledge base article at http://kb.vmware.com/kb/2106583. You can update or replace certificates after deployment. For example, a certificate may expire or you may choose to use self-signed certificates during your initial deployment, but then obtain certificates from a trusted authority before going live with your vRealize Code Stream implementation. When you do a minimal deployment, you can generate a self-signed certificate during vRealize Code StreamAppliance configuration. If you use certificate chains, specify the certificates in the following order: Client/server certificate signed by the intermediate CA certificate One or more intermediate certificates A root CA certificate Include the BEGIN CERTIFICATE header and END CERTIFICATE footer for each certificate when you import certificates.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202640.37/warc/CC-MAIN-20190322074800-20190322100800-00191.warc.gz
CC-MAIN-2019-13
1,207
8
https://www.brighthub.com/computing/windows-platform/articles/7463/
code
Small Networks and the Browser Here is the glitch. If your network is wired, there is a split second difference between the arrival of signals pretty much no matter what. However, if your network is wireless and it is also compact (small area) then it is possible that more than one computer will get the broadcast at the same time. It is also possible that more than one computer will respond to the signal at the same time, which means that the wireless router getting the signals from two computers at once gets confused. So, it doesn’t respond to one computer, and that computer will sit there forever waiting for a response. I won’t explain further, but it is bizarre. Anyway, there is no procedure to handle this because it should never happen. This is what made troubleshooting this issue so difficult. Because if there is enough space between your PCs, or if one PC is faster than others, this will never happen to you. But, if you live in a 1400 square foot house in an expensive part of Denver (don’t ask) with two Dell laptops that you bought at the same time, one for you and one for your spouse, well, then this will happen a lot. OK, first off, do update your drivers. It turns out that my old Intel 2200BG wireless not only supports the faster 802.11g wireless, but they also support WPA2, which provides better security. Wireless routers come configured for maximum performance. This is a good thing, but it does not have anything to do with your environment. So, all of these parameters can be changed. Usually changing them results in a performance difference of .001 millisecond- so no harm no foul. In order to keep the broadcast packets from ever interfering, a simple down step in a couple of parameters on your wireless router will fix the issue. What needs to happen is that the router’s settings need to be changed so that the window for getting duplicate or overlapping signals from multiple wireless computers can’t happen. Basically, we are setting the router up to generate a little bit more traffic by shortening the size of the packets it sends and also by having it require the wireless computers to check whether or not the network is already busy a little more often. Technically, this will reduce the performance, but you probably will never notice it with the small changes we are making. The settings you want are Fragmentation Threshold (it might be called something else, but it will be close enough) and RTS. Fragmentation usually comes from the factory set at 2346 and RTS comes at 2347. Change the Fragmentation to 2306 and the RTS to 2304. That might do it. In order for this to work, your wireless cards must be set to RTS, not CTS, in their configuration- or they will ignore your RTS settings. If not, change the Beacon, which usually comes at 100, to 50. The Cisco guys that work on large enterprise networks are having a stroke right now. Just give them some oxygen and keep going. Changing this increases the “noise” on your wireless network. On a big network, the congestion could be overwhelming, but since we are talking about small networks with less than 10 devices, it won’t matter. Now, your wireless network should work smoothly. If not, keep tweaking the Fragmentation and RTS numbers down. Always keep the fragmentation number 2 higher than the RTS number. Remember small changes make big impacts with these settings, so don’t go crazy. If it isn’t working by the time you hit 2200, this probably isn’t the problem that you are having. Put your settings back at the default numbers, go back to troubleshooting and find a different solution. This post is part of the series: Advanced Troubleshooting Wireless Random Wireless Disconnection on Windows Networks If you’ve already done all of regular stuff like changing the channel, changing your WEP/WPA, relocating your router and PC, and updating drivers, then this might be what you are looking for.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.35/warc/CC-MAIN-20230923062631-20230923092631-00154.warc.gz
CC-MAIN-2023-40
3,932
11
https://dramsch.net/articles/double-descent-explains-why-your-machine-learning-model-is-getting-worse/
code
The Double Descent hypothesis is an interesting quirk of statistics and deep learning. It explains why smalller models aren't always worse and larger models aren't always better. Even worse... it shows that more data isn't always better! A common topic in statistics is the bias-variance trade-off. One way to look at this trade-off is that linear models are very robust against overfitting, considering they have two parameters. They often aren't enough to capture the complexity of a data set though. Once we increase the complexity we are better able to capture the training data, without regularization, however, these models will become highly attuned to the training data. This also means that the model is less likely to generalize to unseen data. The model's capacity to overfit increases. Classic statistics would expect an overly simple model is equally as bad as an over-parametrized model. Yet, there's a sweet spot in the middle of the parameter space. Think of a data distribution for x³ with some noise. A linear model would fit pretty bad, a quadratic model could at least fit half of a parabola, a cubic model is ideal to with the data, a fourth-order model with gets worse again similar to a parabola, and we get incrementally worse with higher-order models. When we get to models of orders equal to the number as samples, these start fitting directly to the noisy data points but wildly swing in between data points to try and hit them exactly. The common "overfitting"-image that gets used. This is the first descent that minimizes the model error compared to model parameters in that center sweet spot. Modern Machine Learning Modern machine learning, however, presents an interesting contradiction to classic theory. Highly over-parametrized models like neural networks... work. They work incredibly well at that. So well, in fact, that an infinitely wide multi-layer perception can be considered a universal function approximator. Large-scale models can do some incredible feats from self-driving cars to language understanding, well, at least part-ways there. The second descent that minimizes the model error. The Double Descent We have a first descent in the classical statistics parameter space and another descent where modern neural networks live. Clearly, you need a little bump in between our two descents, or it'd just be good ol' single descent and no hypothesis. That bump is arguably extra particularly interesting. When we increase the size of a model to match the parameters with the samples of data, the model starts fitting exactly to any noise within the data. Smaller models need to ignore much of the fluctuations in data, whereas, larger models can abstract much of the fluctuations. Only in that middle spot, where the models neither benefit from the inherent regularization of classical statistics, nor the over-parametrization, we see the error increase. This has a very interesting real implication. Since this is a deep connection between data complexity and model complexity, the makes model scaling very unintuitive from simple numbers alone. It can happen that, due to the complexity of the data, when we increase the model size, we are still technically in a classical under-parameterized regime, despite having built a pretty massive model. We see the error increase, as we're still in the first descent. In the accompanying blog post, Nakkiran puts it as: The take-away from our work (and the prior works it builds on) is that neither the classical statisticians’ conventional wisdom that “too large models are worse” nor the modern ML paradigm that “bigger models are always better” always hold. Furthermore, it follows that more data is also not always better, as increasing the complexity of the data might push us on the local maximum between the double descent. Finishing out with: These insights also allow us to generate natural settings in which even the age-old adage of “more data is always better” is violated! Personally, I find this very insightful for some model debugging, where counter-intuitive behaviours of deep neural networks can be explained by their erratic behaviour right at this threshold between under- and over-parametrization. The work on Double Descent was originally published in 2019 by Belkin et al. and then expanded on to Deep Double Descent by Nakkiran et al. from OpenAI. It was published on the OpenAI blog and Nakkiran goes more into depth on their blog. They're great reads, check them out I write about these machine learning insights weekly in my newsletter.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100873.6/warc/CC-MAIN-20231209071722-20231209101722-00333.warc.gz
CC-MAIN-2023-50
4,569
26
https://ca.pic-soft.com/device/cd-rom-device-banana-7mfmvyl/
code
CD-ROM DEVICE BANANA DRIVER INFO: |File Size:||3.8 MB| |Supported systems:||Windows 2008, Windows XP, Windows Vista, Windows 7/8/10| |Price:||Free* (*Free Registration Required)| CD-ROM DEVICE BANANA DRIVER (cd_rom_2163.zip) Do you a drive shows up every so. A, for it shows under the drive. ECS 945GCT-M2 VIDEO. Auviotm headphones. But years ago someone put together a dos boot disk with cdrom support and named it banana and for some reason that driver setup is still being passed around. NEC, which the cachecdfs filesystem included. Namely, You can try the name BANANA for completeness. As I understand, the CD-ROM is not an external device. Standard text messaging and phone rates may apply. Up to now I simply used the Windows 98 bootdisk for it because it conveniently provides me with CD-ROM support so I can do whatever I need. Requester ATAPIPnP demo package from CD ROM drives. Check out the forums and get free advice from the experts. But it, Panasonic WJ-HD316 operating instructions. Dos boot disk drive and hardware etc. We won't go into the specifics of what that is right now, but suffice it to say that it uses a drive letter. I have been trying to back up a 780 GB archive of photographs on a new Asus Blu-Ray burner BE14NU40 with USB 3.0. You could also try the ATAPIPnP demo package from Aminet. I have wiped the hard drive on a Compaq Presario 5000 using DBAN. BluRay/DVD/CD drive to display images on operating instructions. Note that the connected network cameras on operating instructions. But it renamed seems to find anything in the device manager. Intake while you are not using a mouse or an external storage device. Usefull at the cd and play discs if it. Display images on a hardware etc. Locate the device that is having the issue and double-click on it to open the Properties dialog box. Canon. You have to set your computer to BOOT from CD ROM in the BIOS before you can boot to any CD ROM. What is using the boot CD ROM drives. Although it is possible that some CD/DVD drives are not compatible Sony, for example . Note that I can emulate a drive? Physically changing the SATA port on the motherboard to which the DVD drive was connected solved this issue, namely, an Ubuntu release upgrade causing a previously working DVD drive to fail to be recognized in the new installation. The graphics side is handled by a MALI-400 GPU claimed max throughput, 1.1 Gpixel/s . In my experience, this was a hardware issue. I can see what the cd disk drives. It may be a different interface, even if it uses the same 40 pin cable as IDE -- it could be SCSI, Panasonic, or Sony/Mitsumi. BluRay/DVD/CD drive shows up under unknown device The driver appears to be properly installed, yet it shows under the subcategory Unknown in device manager. I cannot identify what the on-screen prompts. Register now to gain access to all of our features, it's FREE and only takes one minute. How to Install drivers using Device Manager. Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble. Driver Not Found, ibm banana v340 ide cd rom drivers. See More, Windows 98 installation from CD and from USB Stick both fail. Page 1 of 2 - 'Hard disk boot sector invalid' - posted in Windows 98, 95, ME, Please Help! Maybe it aborts the installation of the cdrom device driver. DVD/CD-ROM not in Device Manager Hello everyone! So to create bootdisks from the CD, I need an MS-DOS bootdisk with CD-ROM support. Although the connected network cameras can emulate a hardware etc. Assumptions, ME, namely, 95, we will need. Panasonic, Device driver named it. It was an extension of Compact Disc Digital Audio, and adapted the format to hold any form of digital data, with a storage capacity of 553 MiB. This newer system has Windows XP as an OS. Refer to all over the OS. The CD driver should typically be located under a category called DVD/CD-ROM Devices. Also note the different camera middle and LCD connectors bottom . Fdisk, which the Properties dialog box. Assumptions, You have a floppy drive and that you also have the full version Win 98 cd. I have googled this all over the place and there are all sorts of issues with DVD / CD-ROM players no longer being recognized but I haven't come across the same problem I'm having. Be aware that the CD-ROM might not be an IDE drive. Note that you know if it. Refer to the Important Information PDF in the provided CD-ROM for the following items. CD-ROM device is no longer accessible after installing the Hyper-V Linux Integration Services in a Red Hat or CentOS virtual machine. Win98SE setup - OEMCD001, no valid cdrom device selected by User2013 2, 38AM PDT. The banana and \Device\CDRom, or Sony/Mitsumi. I will need the search facility to find anything in there. It may be recognized in the instructions manual online. I want to find that out so that I can kill it. If you are, called OTI-91X ATAPI CD-ROM drive. The drivers created on the boot floppy made from are, NEC, Toshiba, Hitachi, and SCSI CD-Rom drivers. Click the Uninstall button and follow the instructions. The CD-ROM format was developed by Japanese company Denon in 1982. Solution, Device driver not found, BANANA. I upgraded to Windows 10 64bit from Windows 7 64bit. 4000 and for use the CD-ROM might not found. Shop online for external RW DVD/CD ROM drives. Although the question is 2 years old at this time, this answer is provided for completeness. See More, and slow USB memory stick or Sony/Mitsumi. The digital disk recorder is a recording device using a hard disk drive to record pictures of surveillance cameras instead of using videotapes so that pictures record- ed by repeated overwriting will not experience deterioration of the recorded picture quality. Programs or text messaging and LCD connectors bottom. In the end though, my CDROM does not work so that I can't install the OS. Consider the following scenario, Red Hat or CentOS is installed in a Hyper-V virtual machine. Boot from this floppy and a driver named Banana with a drive letter of R, yes R, for Roger will be installed. I'm a complete computer novice on operating systems and hardware etc. Hello, I tried to run MS-DOS 6.22 from a dvd but when it loads up i get the following screen, CD-ROM Device Driver for IDE Four Channels Supported C. It tries to create the device with the name OEMCD001 but fails to do so. I can burn discs and play discs if i run the program as administrator, but it states Access is denied. It is necessary to install the viewer software Network Camera View 4 to display images on a PC. Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Note that out the cachecdfs filesystem included. The network disk recorder WJ-ND400K, WJ-ND400K/G is designed for use within a surveillance system, and record images/audio from the connected network cameras on the hard disk drives. Cd rom player for computer. The NEC option loads the Oak Technology driver, which normally works on just about any CD-ROM drive, but it. It's been awhile, but from what I remember you have to add a CD-ROM driver to DOS you have too have the driver loaded as a device in your file, and then have the MSCDEX load. For security, when you choose Continue, we will send you a one-time, numeric passcode by phone or text. The Driver used on this CD is from Oak Technoloy, called OTI-91X ATAPI CD-ROM device driver, Rev D91XV352. One day while I was transferring data from my SSD boot drive to. - In the forums and follow the command umount /mnt/cdrom is. - I checked the Windows 98 reinstallation CD-ROM in my newer computer's CD-ROM drive, and there is a Win98 folder. - I cannot identify what process supposedlly is using the cd and thus creating this condition. - The driver used in the boot CD does not work with your CD-ROM drive. - Which is the latest strand of win98 startup floppy.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703515235.25/warc/CC-MAIN-20210118185230-20210118215230-00243.warc.gz
CC-MAIN-2021-04
7,871
27
https://forums.oracle.com/ords/r/apexds/community/q?question=how-to-use-letsencrypt-with-oracle-secure-global-desktop-0650
code
LetsEncrypt is an easy and cheap way to get a SSL certificate, so the client browser does not complain about the self-signed certificate. For this to work you need to be able to resolve a Fully Qualified Domain Name (FQDN) to the IP address of your SGD gateway. If your domain has a CAA record in the DNS server, you must have letsencrypt listed. In order to communicate with LetsEncrypt we need to install a utility called certbot. It will allow us to communicate with the service, request a SSL certificate and provide the challenge response. This utility can integrate with Apache and NGinx web servers. Even though the SGD gateway is using Apache, the incoming HTTP(S) stream is being received by some custom SGD gateway code, so we can not use this integration. On Oracle Linux certbot can be installed via yum from the ol7_developer_EPEL repository. There is one dependency (python2-urllib3 or python-urllib3) that exists in multiple yum repositories, but only the one from @ol7_latest works with certbot, so we need to make sure to use the correct one. When we remove python2-urllib3 it might remove other packages that had it declared as a dependency (most likely cloud-init), so after we add the certbot package from the correct repository we need to add cloud-init back. For operating systems not directly supported by certbot one can download certbot-auto, which bootstraps itself with the necessary python libraries. This seems to be the most reliable method to get certbot going. Use it with the SGD gateway Stop SGD gateway since a running gateway listens on port 80 and 443, we need to stop the gateway before invoking certbot Once we have DNS configured to properly resolve our FQDN to the IP address of our gateway, we can run certbot by specifying the FQDN and an e-mail address (I am using a fictitious domain name, please adjust accordingly) If everything goes well, the resulting SSL certificate would be in /etc/letsencrypt/live/sgd.example.com/cert.pem Import the SSL certificate into the SGD gateway Once the SSL certificate has been generated, we need to use the gateway command to import the new certificate and start the gateway --keyalg RSA \ Now we have started the SGD gateway we can check in a browser if we have the correct SSL certificate. Sometimes a browser needs to be restarted after a certificate has been added to a server previously visited. Here is a screenshot from one of my servers accessed via Safari on Mac OS X.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499953.47/warc/CC-MAIN-20230201211725-20230202001725-00444.warc.gz
CC-MAIN-2023-06
2,458
13
https://www.diyany.net/setting-the-password-for-the-wifi-router/?amp
code
Why have a password on your router? Other than having a lot of people you don’t know connect to your network, there is also a chance of someone abusing your network and making attacks. There are multiple ways to block WiFi access, like only allowing certain MAC addresses (a MAC address is a address specific to a certain device). Or allow access to everyone who has a password. The routers vary based on their speed (1gbps, 10gbps, etc…), the strength and the speed of the signal they are emitting, like 2,4 MHz, 5 MHz or both. They also differ in the type of connectors, like ADSL, phone or fiber. Accessing the router settings No matter the router type, accessing it is the same. It’s done through a browser (Chrome, firefox, etc..). On the back of the router is a IP address that you type into the browser. Here you can find your username and password as well, but it will not work if your ISP set a different one for you. The address that’s usually entered into the browser is 192.168.1.1. There’s a chance that that’s not the only router on the network. If that is the case then try changing the last digit with a 0, or number 2 and above. The username and the password are the same unless they’ve been changed. Resetting and saving the current settings If your router has the option, the first thing I recommend you do is make a backup of your settings, in case something goes wrong or you don’t like the changes. There you’ll most likely be able to choose where would you want to save the settings. You can also reset your settings to default here. There are routers that have a mechanical button on them to reset it, or the WiFi. Changing and entering the WiFi pasword In the menu you should have a bar that says something like “basic settings” and you should find the option to change the password there. If you don’t have anything that says “basic settings” it might be under something like “wireless” or “WiFi”. In addition under each SSID type in the name you want your network to be called. I would recommend the settings like the ones on the picture. In the “Radius password” (it might be called something different for you) type in the password you want to set for access to the WiFi. After that save the settings. When you are done with the settings, you can log out. Read the rest of my posts on my blog.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362879.45/warc/CC-MAIN-20211203121459-20211203151459-00235.warc.gz
CC-MAIN-2021-49
2,362
14
http://www.andoitz.com/projects/animation.html
code
The objective of this project is to interact with the user with a creative game of questions and answers made with Flash animation. Gravity and collision test with user intervention. Test as an object is able to follow another. Testing the use of animation with user intervention. Animated menu for children's educational games website. Complements Diverjuegos intro and demo template design. Animated intro for children's educational games website. Complements Diverjuegos left menu and demo template design. Interactive animation frame by frame.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946199.72/warc/CC-MAIN-20180423203935-20180423223935-00349.warc.gz
CC-MAIN-2018-17
547
7
http://sketcharama365.blogspot.com/2010/01/day-11.html
code
Today's sketch is a Golden Age Catwoman (or is it Silver Age?). The proportions are a bit off I'll admit, but it it is just a sketch. Also, I'd like to take this time to say that I might, just might, take some of these sketches and make actual pictures of them. If you have any input as to what sketch I should make a picture, please let me know what you think. Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863811.3/warc/CC-MAIN-20180520224904-20180521004904-00375.warc.gz
CC-MAIN-2018-22
380
2
http://www.avsforum.com/t/1477339/so-youve-built-your-htpc-now-what-is-next-how-to-get-the-ultimate-picture-and-sound-quality-from-your-htpc-madvr-svp-xbmc-mediabrowser-jriver/180
code
Originally Posted by StinDaWg XBMC has this too. Jriver isn't really a true media center solution IMO. It looks like itunes from 5 years ago. I actually laughed when I downloaded the trial thinking WTF is this. Not to mention it costs money when more capable solutions are free. The difference between the two is very simple: #1.) Jriver looks superior to XBMC for video quality playback #2.) Jriver sounds better than XBMC for audio (and offers tons of high end audio support and features) Info partly stolen from Jriver webpage:It also provides tons more features including audiphile ripping, Support for all lossless formats of audio (FLAC, APE, ALAC, WM), AIFF and WAV files (including tagging), Bit-perfect playback, DD support (ASIO v2.2, DoP, SACD, DFF, DSF, etc.) ; JRiver's audio is bit perfect. This means that it can output your CDs, your HD audio (88.1 KHz, 176 KHz, and more), your DSD, and any other audio perfectly to your DAC. All audio handling inside the program is done with 64 bits of precision. Most high-end hardware uses 24-bit output, meaning the engine has an additional 240 dB of precision above the hardware's output. As a result, should you choose to use them, digital volume, room correction, and other audio functions are pristine. It's a single program and install package that can support Madvr and high end audio under a single interface. It's a paid solution so it's a not pieced together from a bunch of developers like XBMC as freeware. I understand the cost part of your objection but sometimes the reason why things have a cost is justified. I think Jriver is worth it's asking price for anyone who desired what it offers. You are so entrenched into XBMC you can't see the good in anything else. I think you are doing yourself a diservice. Mediabrowser, Jriver, madvr, MPC-HC, PLEX and tons of the other stuff we have been discussing all have their own little charecteristics both good and bad but there is much good in all of them. Nothing wrong at all with enjoying XBMC or preferring how it looks to feels to others, but I suspect much of your opinion if based on the familiarity of XBMC from long term use versus the learning curve on something else. Simply put there is no possible way to just install XBMC and begin using it and have it look and sound as good as Jriver- or offer all the functionality. You can begin to get some of it with hacks, and plugins and work-arounds and doing stuff like using an external player for Madvr etc... but at the end of the day that is not so simple and not so good. For anyone that wants all that under a single program shell and installation Jriver is worth it's asking price.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163054353/warc/CC-MAIN-20131204131734-00012-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
2,659
9
https://bugs.mojang.com/browse/MC-93968
code
I do not know if this is intended, but as a small armor stand is only a smaller version of a normal one I would expect it to display an item the same way. Items displayed by small armor stands are differently positioned compared to how they are positioned for normal ones. - Use the following command to summon a normal armor stand The stone block should be displayed horizontally - Use the following command to spawn a small armor stand with the same pose The stone block is not displayed horizontally, however if you decrease the second RightArm value by 20, it gets displayed horizontally as well:
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337906.7/warc/CC-MAIN-20221007014029-20221007044029-00196.warc.gz
CC-MAIN-2022-40
600
6
http://msdn.microsoft.com/en-us/library/aa834367(v=AX.10).aspx
code
Use Enterprise Portal Web parts on an existing site To set an existing Web site to use Enterprise Portal Web parts, you must deploy the Enterprise Portal Web parts to it and register the site. If you have already performed a full deployment of Enterprise Portal to a Web site, you do not need to redeploy to use Web parts only. From the Microsoft Dynamics AX client on the Enterprise Portal computer, click > > > . If you have previously deployed Enterprise Portal, the dialog box appears—you do not need to follow the rest of this procedure. On the page, in the list, select the virtual server that you want to deploy Enterprise Portal to. Under Deployment option, select and then click Next. IIS must be restarted before you can create a Web site. To have the wizard automatically restart IIS, click . You can also have the wizard start the SharePoint New Site Wizard after IIS restarts.
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931011477.80/warc/CC-MAIN-20141125155651-00217-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
891
8
https://mirajobs.com/p/software-development-intern-1db5655d
code
Software development intern UToledo Hacks, Virtual Organized the first-ever virtual hackathon for the university of Toledo students with over 50 team participants. Mentored hackers with their projects and obstacles encountered by their team. Hosted the event and helped in the judging process Job where i can grow my career and learn Expected Base Salary **,000 USD / year Total Professional Experience Send a connection request to the candidate to get their contact details.Contact Candidate
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00353.warc.gz
CC-MAIN-2022-33
492
10
https://blog.kevinhu.me/tags/Datacenter/
code
This is one of the series of papers from Microsoft’s Project Catapult, which studies leveraging reconfigurable devices (FPGA, etc.) to accelerate data center, from very specific accelerating algorithms like page ranking for Bing search engine, to more sophisticated machine learning frameworks like DNN. This is one of their early publications, which introduces the basic design and implementation of the FPGA accelerated datacenter. It covers the very fundamental details of all aspects of server design, from hardware, network topology, FPGA core design, fault-tolerant cluster management software design, workload scheduling algorithm, and etc..
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999946.25/warc/CC-MAIN-20190625192953-20190625214953-00101.warc.gz
CC-MAIN-2019-26
650
8
https://community.oracle.com/message/14212176
code
Hi EmmanuelMash, here's my 2 pennies worth - there is no scientific formula to this I'm afraid but most times, it is ends up being a case of "if it aint broke, don't fix it". patches are usually applied to correct issues with certain functionality. Ideally, it would be best to be using the latest versions but that again comes with its risks as new software tends to throw in a few new bugs here and there and only the adventurous tend to be on the latest release straightaway. The pragmatic approach is to let the early adopters/trendsetters help Oracle iron out all the teething problems and then you can move to the latest versions when these versions have stabilised. There is an argument that adopting the "if it aint broke, don't fix it" approach could mean people could still be stuck on 10g because it's "stable" whilst those that tend to grab hold of the new features stand the risk of exposing themselves to bugs and instability in newer versions. There's also the small matter of extended support cost for older version of software to take into account. I guess the best approach would be to be in the middle ground and not adopt latest versions immediately and also not languish behind with older versions. Patches should be applied for security purposes as well as bug fixes which affect your implementation. Business is more focused on stability (if its not broken don't touch it mindset)You mean the same business guys who have no issue with 15 apps updating each week on their iPhone and demand each new feature to automagically appear and compatibility with new browsers (compared to yeas old tech) to just work?Sarcasm aside - the closer to current the better.Why do you thing the common model for anything cloud is "You have no real choice but to be on the latest release"? Joel Acha wrote: Patches should be applied for security purposes as well as bug fixes which affect your implementation. And "compatibility be damned"? Modern ecosystems are heterogeneous and no system must ever be regarded just on its own. Well Christian a single Iphone's downtime wont affect decision making. Apps on the that have smaller user bases are much easier to control. We have created a monster but creating a dependable platform. Now everyone cannot do without it. Hence my "sarcasm" bit. I fully get those points but as I said you can never discount the surroundings and security, compatibility, integration and feature creep all force you to stay on top of things as least in a close-ish manner. Plus: The longer you wait the harsher the upgrade pain. Cumulated incremental steps efforts are often less than one huge bang effort.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141806.26/warc/CC-MAIN-20200217085334-20200217115334-00257.warc.gz
CC-MAIN-2020-10
2,637
11
https://cs.stackexchange.com/questions/75945/how-can-i-improve-my-knn-classifier
code
I'm trying to teach myself a bit about machine learning, so one of the first things I did was implement a KNN classifier in ruby. My goal was to classify text product reviews into 8 classes: I created features from my reviews by converting them into a set of bi_grams, removing stop words and then using a bag of words model. I calculate the closeness of feature by euclidean distance. However the result wasn't very good, the max percentage of correct classifications I've gotten is about 28% which is little better than just guessing. Are there any one know of anymore improvements I can make to my classifier to make it better? Or any resources I can use to research from. I've included my source code and training/testing data below if anyone wants to take a look.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703509104.12/warc/CC-MAIN-20210117020341-20210117050341-00445.warc.gz
CC-MAIN-2021-04
768
3
https://forum.tdcommunity.net/viewtopic.php?f=60&t=42728
code
Posted by: Marko N Have you used controls (Combo Box, List Box, Data Field) for generating search terms so, that end user can switch is his/her selection including or an excluding search term ("whatever but not this one...")? From a user interface aspect I would be interesting in which kind of solutions you have used. Are there existing both intuitive and layout space saving solutions?
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816863.40/warc/CC-MAIN-20240414002233-20240414032233-00148.warc.gz
CC-MAIN-2024-18
388
8
http://tombh.co.uk/html-parsing-and-diy-rss-feeds
code
HTML Parsing and DIY RSS feeds20 June 2008 A PHP library that I think more people should know about is SC Chen’s Simple HTML DOM Parser. An HTML parser is a very powerful tool that allows the systematic ‘reading’ (i.e. parsing) of an HTML document so that specific elements can be accessed. One example of this would be to regularly parse a forum thread in order to extract the text of the conversation so that it can be published in an RSS feed. Right, let’s say we’ve managed to get our chosen HTML document into a variable called $dom – we can then do stuff like this; foreach($dom->**find**('img') as $element) echo $element->**src** . '<br>'; What that does is first build an array of all the <img> tags (and their various attributes such src, alt, width, height) in the document, then, the foreach loop iterates through each <img> tag and outputs its find() function actually has 2 arguments, the first being the name of the tag you want to find, as demonstrated, and the second can be used to pinpoint a particular tag by numerical order. For example to find the first <div> element the code would be find('div', 0), remembering that arrays begin with 0 not 1. Perhaps the most important attribute that can be accessed is the innerHTML one, which you’d do like this; $element = find('div', 0); $innerHTML = $element->innerHTML; So as you can see, HTML parsing is a very useful and accessible way of getting at any part of a HTML document. Obviously I’ve only been able outline the basics here, there are of course a lot more useful functions in Chen’s library. So if you want to use the HTML parser to create RSS feeds, first you’ll need an RSS creator library like bitfolge’s Feed Creator Class. You can then get all the data for your RSS feeds (like title and description) ready with the HTML parser then add them to the RSS code. Here is the heart of some code I currently use to make feeds;
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124299.47/warc/CC-MAIN-20170423031204-00160-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,923
17
https://support.google.com/youtube/answer/6082427?hl=en&ref_topic=3504274
code
The information shown in an Art Track comes from the metadata in the "Audio - Art Tracks" spreadsheet or DDEX file you used to deliver the art track. See Creating Art Tracks for details about which metadata fields map to the Art Track and its description. If the Art Track or its description has incorrect information, there are a couple ways you can correct it: - Request change button: The "Request change" button lets you report certain issues to YouTube directly from Studio Content Manager: - Sign in to Studio Content Manager. - From the left menu, select Assets . - At the top of the page, click the Art tracks tab. - Click the title of an art track. - On the Overview page, click REQUEST CHANGE. - Select a "Problem type" from the dropdown , such as: - Art track is not associated with the desired artist channel. - Art track is not associated with the desired music video. - Art track has the wrong primary or featured artist. - Art track has incorrect spelling, formatting, or translation. - Art track is not playable or visible as expected in product. - Enter the remaining details. - Click SUBMIT. If you notice errors within your discography, such as incorrect album titles or song metadata, get in touch with your label or distributor. You can correct the information by delivering a new version of the metadata or by requesting a takedown of the Art Track and redelivering it. To update a single track in an album, you must include the metadata for all tracks on the album, even those that don't have any change.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296820065.92/warc/CC-MAIN-20240425000826-20240425030826-00524.warc.gz
CC-MAIN-2024-18
1,527
18
https://www.cpb.nl/en/publication/the-importance-of-intrinsic-and-extrinsic-motivation-for-measuring-iq
code
The importance of intrinsic and extrinsic motivation for measuring IQ We disentangle these two elements empirically using data from a laboratory experiment. The main findings is that both intrinsic (questions that people like to work on) and extrinsic motivation (incentive payments) increase time investments and as a result performance. The presence of incentive payments seems to be more important than the size of the reward. Intrinsic and extrinsic motivation turn out to be complements.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00156.warc.gz
CC-MAIN-2023-40
492
2
http://psha.org.ru/irc/%23emc-devel/2006-04-16.html
code
SkunkWorks is now known as skunkworks as nobody it is not possible to open the link: http://wiki.linuxcnc.org/cgi-bin/emcinfo.pl/emcinfo.pl?action=editprefs I get: Software error: Could not get user-ID lock at /home/groups/e/em/emc/cgi-bin/emcinfo.pl line 3682. chinamill: I just used the 'editprefs' screen and did not get an error. I need some help .. if you can spare some time ;) I moved xemc along to emc2, and got it to the point that it's running however, it's looking bad.. and I don't know sh*t about Xaw & the like.. oh.. yay.. it works & looks ok only had to copy XEmc to /etc/X11/app-defaults should I commit this stuff_ glad you figured it out The reason I see to *not* commit it would be that it's like a promise to keep supporting xemc I'm not sure it adds a whole lot of value; isn't it mostly the same as tkemc? yeah, but without the need of tcl it adds some dependencies to emc2 build-dep I mean actually only one: libxaw7-dev on breezy and isn't libxaw7 a new installation requirement? libxaw is already installed oh it is? I wonder why. only the dev is needed to compile xemc.cc it's some basic X package oh yeah -- xterm is linked to it can you bug chris about this? I need to go away for a while he was keen of having xemc in emc2 I'm sure he'll see this in scrollback or maybe he'll see.. laters.. have a good day ;) I'll probably be back in a few hours.. cradek: did you see alex says he has xemc working and ready to check in? yes, that's cool I couldn't figure out what alex was asking me to do though I think he solved the resource problem and just wants the OK to check it in. * alex_joni just got home hey ray, how's it up there? Great. We went boating yesterday. Nice sunny day. Say I favor adding both xemc and yemc to emc2. Legacy you know. it's not hard to do that, but it adds some dependencies Do those have to be added to ubuntu? Or are they in there already. you need to 'apt-get install libxaw7-dev' or apt-get build-dep emc2, once that is added to the list of required packages so it's pretty easy on ubuntu, not sure on other platforms I have built xemc and yemc on BDI before. yup, I'm sure it's nothing major.. ok, then I guess I'll commit, then figure out the ./configure part lateron rayh: still there? I have an issue about XEmc and xemc.cc it seems that without XEmc the GUI doesn't know anything about it's strings & such I thought that XEmc was like TkEmc being a x resource file. Oh no. It's a lot more. Key bindings and other stuff. yes, all that and it only works for me if I copy it to /etc/X11/app-defaults it doesn't work when it's in the dir where the script runs from damn autoconf :( yes, that works but that requires a sudo copy Then the configure could move it along with TkEmc and the others. you mean make install or apt-get install yes that works, but not for RIP RIP doesn't install anything outside emc2 I can't see how it worked for emc1... maybe setting XFILESEARCHPATH is what's needed? * jepler reads Xt manpages and takes guesses how can I test for HAVE_XAW = yes in a Submakefile? assuming that is defined in Makefile.inc ifeq .. ? ifeq "$(HAVE_XAW)" "yes" ... I'll see if I can get something working for the app-defaults cool.. I'm commiting my configure changes in a minute if you haven't added XEmc then hold off it may have to be in a directory called app-defaults, I'm not sure yet ok, I'm not going to add XEmc In emc it was in the root directory. But that may be configurable in the code. I can't find any reference in the code but then again xemc.cc is 6238 lines long.. might have missed it ;) Seems like the original make did put it in apt-defaults. oh, and it ran as root... so it could do that.. Right. I'd bet that was the case. well that's close .. but I get something that says "posLabel3" through "posLabel5" after the axes X, Y, and Z. yeah, I'll remove those I tried define AXES = 6 in xemc (before it was 3) guess that's a hardcoded value I'm putting 3 back into it and we'll worry later about a proper fix xemc had only 3 axes. yemc had 6 e.g. get the number of axes from the interp I don't think that was variable. it's a #define That may be but yemc was written specifically for the 6 motor hexapod. so if the define worked, I'd have thought they would have made that change instead. the define works, but some further tests are needed guess it would be easier to add yemc ;) Did we come to a conclusion about the ini variable that sets default interp stuff. which do you mean? Let me find it. # Interpreter Startup and Reset codes RS274NGC_STARTUP_CODE = G20 In emc that set the default value for inch or mm, a string of codes like that could be there. afaik it still works and it would set the interp to that if a reset was issued. afaik it still works in emc2 Right. I tested it but there was a feeling that we should leave it out. it's out of the ini.. I was wanting to put it in. So that mm folk would not get inch when they pressed reset. or a lathe get g17 I see CIA is working. Good job guys. well make that 'guy' it's all cradeks works ;) yup, thanks chris SWPadnos: are you around steven? try /join ;) hi chris, btw :) or try not typing the space hey cradek: are you using pcb_gcode? not sure what that is what do you use? eagle can export gcode with some custom script I think seems to generate gcode - and has an emc post. jeff and I use an eagle ulp that we've both hacked on extensively that is what this is. pcb_gcode generates code from within eagle probably many others have done the same thing for best results, avoid round pads - use octagons the round pads use many segments cradek: this guy might want to do axis in slovenian ? http://www.cnczone.com/forums/showthread.php?t=18336 it's not hard to find information about that on the axis site * alex_joni goes to bed good night all See you alex.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125719.13/warc/CC-MAIN-20170423031205-00264-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
5,808
137
http://v8doc.sas.com/sashtml/stat/chap67/sect9.htm
code
The variable in the FREQ statement identifies a variable that contains the frequency of occurrence of each observation. PROC TTEST treats each observation as if it appears n times, where n is the value of the FREQ variable for the observation. If the value is not an integer, only the integer portion is used. If the frequency value is less than 1 or is missing, the observation is not used in the analysis. When the FREQ statement is not specified, each observation is assigned a frequency of 1. The FREQ statement cannot be used if the DATA= data set contains statistics instead of the original observations. - FREQ variable ; Copyright © 1999 by SAS Institute Inc., Cary, NC, USA. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202199.51/warc/CC-MAIN-20190320024206-20190320050206-00363.warc.gz
CC-MAIN-2019-13
705
14
https://dataengweekly.com/Hadoop-Weekly-187.html
code
18 September 2016 There's a lot of variety in this week's issue—Kafka, NiFi, Spark, HDFS, Impala and more are all covered in technical articles. And there are a number of releases including a new distributed messaging system, Pulsar, which was recently open-sourced by Yahoo. This post describes how to monitor Apache Kafka with Grafana and InfluxDB. jmxtrans is used to deliver metrics from Kafka to Influx. The Hortonworks blog has an introduction to the new zero-master clustering that is part of Apache NiFi 1.0.0. Built on Apache ZooKeeper, the clustering mechanism creates a Cluster Coordinator from a pool of servers rather than explicitly designating a master. The Cloudera blog has a post that demonstrates how to use Apache Spark for text analysis. It looks at the frequency of letters in and mechanisms of decoding an encoded message. The Altiscale blog describes the architecture behind the new and updated HDFS web UI. In addition to a modern look and feel, the browser-based application is powered by REST APIs rather than JSP. This tutorial describes how to use mysql triggers with Apache NiFi to capture inserts and updates to rows in a mysql table. With NiFi, that information is sent to Apache Hive for analysis. The AWS big data blog has a post describing key concepts in Kinesis SQL analytics—particularly windowing and time semantics. The post also includes a tutorial for running a Kinesis analytics application that outputs results to Redshift. Cloudera has posted an article analyzing the speed and cost of Apache Impala (incubating) queries over data stored on EBS volumes vs. S3. In short, EBS is more performant (2.4x in Cloudera's testing) and cheaper (although not by much), but S3 remains a good option for ad hoc analysis using transient clusters. Apache Phoenix, the SQL engine for Apache HBase, includes a number of new features in version 4.8.0. Released just over a month ago, the new version adds support for namespace mapping and a new integration with Apache Hive. Confluent's Log Compaction series has news on upcoming Apache Kafka releases (including details on a new time-based release plan). In addition, there are links to several recent presentations and articles on Kafka. Hivemall, which is a machine learning library for Apache Hive, has entered the Apache incubator. "Fast Data Architectures for Stream Processing Applications" is a free (behind an email-wall) O'Reilly report on the state of stream processing. Pulsar is a recently open-sourced distributed messaging system from Yahoo. The post looks at its architecture and performance goals/characteristics. Pulsar is widely-used at Yahoo—over 100 billion messages/day are published to its brokers across clusters in over 10 data centers. Altiscale has announced support for Apache Spark 2.0. The Eclipse plugin for Apache Pig, pig-eclipse has announced a 1.1.2 release which adds support for Apache Pig 0.15 & 0.16, information when hovering over Pig keywords, and a bug fix for auto-complete. Hortonworks DataFlow 2.0 is now generally available. The post highlights a number of improvements in the release, which is based on Apache NiFi 1.0. Apache HBase 1.2.3 was released. The maintenance release resolves 49 issues Apache Storm 0.10.2 was released to address several issues in the 0.10.x line. Curated by Datadog ( http://www.datadog.com ) #OCBigData Meetup #19 (Irvine) - Wednesday, September 21 Talk Night at Carbon Five LA (Santa Monica) - Wednesday, September 21 Airflow Meetup (San Francisco) - Wednesday, September 21 Data Science at Scale with HAWQ and MADlib and Hadoop (San Francisco) - Wednesday, September 21 Uber Engineering Tech Talk Series (San Francisco) - Thursday, September 22 Data Science at Scale with HAWQ and MADlib and Hadoop (Santa Clara) - Thursday, September 22 IoT with Spark & Scala Spark Datasets (Seattle) - Thursday, September 22 Integrating Real-time Data Streams with Spark & Kafka (Plano) - Tuesday, September 20 Apache Kudu and Watson Analytics (Green Bay) - Tuesday, September 20 Apache Drill: Just Query It (Columbus) - Thursday, September 22 Deep Dive with Spark Contributor Chris Fregly (Atlanta) - Thursday, September 22 Kick Off the Fall with DC Spark! (McLean) - Thursday, September 22 Open House: Big Data Processing with Apache Spark (New York) - Monday, September 19 Twitter Heron in Practice (New York) - Thursday, September 22 Streaming in the Time of Spark 2.0 (Montreal) - Wednesday, September 21 Big Data Architecture Patterns on Google Cloud Platform (Reading) - Wednesday, September 21 Fast Data with Apache Ignite & Apache Spark (London) - Thursday, September 22 How-to Spark (Hamburg) - Wednesday, September 21 September Meet-up (Karlsruhe) - Thursday, September 22 First Data: The Big Data Journey of the World’s Biggest Payment Processor (Prague) - Wednesday, September 21 Apache Spark Streaming with Apache NiFi and Apache Kafka (Warsaw) - Wednesday, September 21 Interactive Spark Scheduling with Azkaban (Bangalore) - Saturday, September 24 Shanghai Big Data Streaming (Shanghai) - Saturday, September 24 Spark Meetup September (Sydney) - Wednesday, September 21
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510983.45/warc/CC-MAIN-20231002064957-20231002094957-00712.warc.gz
CC-MAIN-2023-40
5,135
45
https://www.usap-dc.org/view/project/p0000060
code
Snow-Atmosphere Transfer Function for Reversibly Deposited Chemical Species in West Antarctica This award is for support for a program of measurements to improve our understanding of the relationship between formaldehyde (HCHO) and hydrogen peroxide (H2O2) in the atmosphere and the concentrations of the same species in Antarctic snow, firn and ice. This work aims to relate changes in concentrations in the snow, firn and ice to corresponding changes in tropospheric chemistry. Atmospheric and firn sampling for formaldehyde and hydrogen peroxide at one or more of the WAIS ice core drilling sites will be undertaken and controlled laboratory studies to estimate thermodynamic and rate parameters will be performed. In addition, this work will involve modeling of atmosphere-snow exchange processes to infer the "transfer function" for reactive species at the sites and atmospheric photochemical modeling to relate changes in concentrations of formaldehyde and hydrogen peroxide in snow, firn and ice to atmospheric oxidation capacity. This work will contribute to a better understanding of the relationship between atmospheric concentrations of various species and those same species measured in snow and ice samples. AMD - DIF Record(s) Data Management Plan None in the Database 0 (raw data) Platforms and Instruments This project has been viewed 15 times since May 2019 (based on unique date-IP combinations)
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655446.86/warc/CC-MAIN-20230609064417-20230609094417-00537.warc.gz
CC-MAIN-2023-23
1,413
8
http://bcsjava.com/blg/wordpress/2011/06/02/bcs-install-grails-ubuntu/
code
There are those time when you need to have Grails installed on the Ubuntu server. I have developed a technique that will fully install grails in four commands. First the apt add repository command processor must be installed and in place. The command below will accomplish this. sudo apptitude instal python-software-properties Now the command processor is installed add the Grails repository. sudo add-apt-repository ppa:groovy-dev/grails Now run update to synchronize the repository. sudo apt-get update Lastly we will install the grails application and its documentation. sudo apt-get install grails grails-doc Mr. Arch Brooks, Software Engineer, Brooks Computing Systems authored this article.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038069133.25/warc/CC-MAIN-20210412175257-20210412205257-00086.warc.gz
CC-MAIN-2021-17
697
10
http://www.reference.com/browse/wiki/Shift_key
code
The shift key is a modifier key on a keyboard, used to type capital letters and other alternate "upper" characters. There are typically two shift keys, on the left and right sides of the row below the home row. The shift key's name originated from the typewriter, where one had to press and hold the button to shift up the case stamp to change to capital letters. On an English keyboard, characters that typically require the use of the shift key include the parentheses, the question mark, the exclamation point, and the colon. When the caps lock key is engaged, the shift key can be used to type lowercase letters on most systems. On computer keyboards, as opposed to typewriter keyboards, the shift key can have many more uses: - It is sometimes used to modify the function keys. Modern Windows keyboards typically have only 12 function keys; Shift+F1 must be used to type F13, Shift+F2 for F14, etc. - It can modify various control and alt keys. For example, if Alt-tab is used to cycle through open windows, Shift-Alt-tab cycles in the reverse order. - Holding shift while in a word processor will anchor the insertion point, such that moving the cursor and clicking the mouse to a new point will select the range of text in between. - Holding shift while drawing with the mouse in graphics programs generally confines the shape to a straight line, usually vertically or horizontally. - The shift key can also be used to modify the mouse behavior on a computer. For example, holding shift while clicking on a link in a web browser might cause the page to open in a new window, or to be downloaded. - Holding shift while inserting a compact disc in a Microsoft Windows computer will disable the autorun feature. This ability has been used to circumvent the MediaMax CD-3 CD copy protection system. - Holding shift while clicking on "Restart" in Windows will restart Windows and not the entire system. - In Windows Explorer and some other file managers, holding shift while deleting a file will permanently delete that file rather than moving it to the recycle bin. - In some Web browsers, holding shift while scrolling will scan through previously viewed Web pages. - In Mac OS X, pressing the shift key while performing certain actions, such as minimising a window or enabling/disabling Dashboard or Exposé, makes the animation occur in slow motion. For some animations, holding Control will make the animation move just slightly slower, and holding Control and Shift will result in an extremely slow motion animation. On some keyboards, if both shift keys are held down simultaneously only some letters can be typed. For example, on the Dell keyboard Model RT7D20 only 16 letters can be typed. This phenomenon is known as "masking" and is a fundamental limitation of the way keyboards are designed. On some Apple keyboards, the key is indicated by an outlined up-pointing arrow (U+21E7, ⇧), which is also used in menus to describe the shortcut key. On others, the word “shift”, or a combination of the two, is used.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698090094/warc/CC-MAIN-20130516095450-00091-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
3,028
16
https://getcodesolution.com/computer/list-the-trade-offs-of-programming-with-such-frameworks-as-reactivex-kotlin-coroutines-akka-actors/
code
Threads, coroutines, actors, etc are all abstractions around concurrent operations. The main tradeoffs here are the number of those concurrent operations and the duration for which they are active. OS-level threads work really well when you have a few concurrent operations (since each thread expensive) and when all operations do big chunks of CPU-bound work (since switching between threads is very expensive). User-level abstractions of all sorts that are created on top of OS-level threads work well when you have lots of those concurrent operations and/or they consume very little CPU from their start to finish or from one resumption point to the next suspension, since those abstractions are light-weight and their launching, stopping, and switching between them is very cheap, too. CLICK HERE to find out more related problems solutions.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499871.68/warc/CC-MAIN-20230131122916-20230131152916-00011.warc.gz
CC-MAIN-2023-06
845
4
https://sandclock.vn/gnuroot-tutorial.html
code
GNU/Linux has gained a reputation the world over as being an operating system that lets the users have a full experience and customization according to personal interests and style. As you may already know, the Android operating system was designed based on the Linux kernel. Having said that, Android runs on top of the Linux Kernel while Linux is an independent Operating system. Hence, they are not entirely similar. Android apps have limited access to hardware resources compared to regular desktop apps. Therefore, a superuser would find it hard to use an Android app instead of a desktop one. Luckily, this situation can be rectified by adding a GNU/Linux environment onto the Android device. This will involve installing and configuring GNURoot Debian to allow a Linux environment to work with. Purposely, this can be helpful when on the move, but you only have access to an Android gadget, be it a smartphone or a tablet. It is worth noting that what we are doing in this article is not like running a full-blown Linux distro installation on Android. Instead, we are only adding a program that in turn installs a Linux sub-system. This sub-system comes with a range of toys such as apt-get and even the privilege to launch a smaller X server. Well, let’s get started. Before we begin, note that a GNU/Linux environment can be installed on any Android device whether it is rooted or not. However, since many users may not want to invalidate their warrants, they do not root their devices. As such, this tutorial assumes your device is not rooted. Basically, setting up the GNU/Linux environment involves the installation of two components namely; the GNURoot Debian app and Xserver XSDL. GNURoot’s primary purpose is to create the Linux environment in the host operating system which in our case is Android OS. Usually, Linux’s “Chroot” functionality comes into play here, but since we do not have root privileges, the GNURoot app uses a software called “proot” to accomplish this. The Xserver XSDL connects to GNURoot to help with the processing of heavy graphics which is the primary function of the X servers. How to Install - After the download is complete and installation is done, find the GNURoot app from the app drawer and run it. However, at this point, you should watch out for a “root” shell which is fake and ignore, because the app installs a “counterfeit” Linux root file system. - The next step is ensuring that you have the most recent version of files obtained from recent upgrades and updates. As such, you have to run the apt-get upgrade and apt-get update commands since you are now on an Ubuntu/Debian Linux environment. $ sudo apt-get update $ sudo apt-get upgrade - The next steps involves setting up an environment for handling graphics. This is done simply by running the “apt-get install lxde” command to get the graphical environment together with all the tools that come with it, or you can alternatively run the “apt-get install lxde-core” command if you are only interested in the desktop environment. $ sudo apt-get install lxde $ sudo apt-get install lxde-core - 5. The next phase is creating a path to the terminal using the graphical environment. To do this a software program called XTerm is used. After that, you are also required to get the Synaptic Package Manager which is a front end to attain apt-get drivers so that you can hear audio playback using Pulseaudio. Use the following command: $ sudo apt-get install xterm synaptic pulseaudio - The final step is starting the xServer XSDL and downloading all the necessary fonts. After doing that, return to the GNURoot and run the commands below: $ sudo export DISPLAY=:0 PULSE_SERVER=tcp:127.0.0.1:4712 $ sudo startlxde & - After that, go back to XServer XSDL and relax as you await the LXDE desktop. Installing Linux Apps on Android Now that we have successfully installed Debian Linux and it is running on our device, Linux apps are needed for enjoying the full Linux experience. At this stage, the Synaptic Package Manager comes into play since it houses the vast repository of Linux apps that can be installed on the device. Simply access Run from the start menu at the bottom and type “synaptic” and hit enter. When the Synaptic Package Manager launches, all you have to do is find the name of the app you want from the list and select it for installation. When the apps finish installing, your device should be ready to go. An important aspect to keep in mind is that we are not working on a fully Linux package, so some apps will not run as smoothly as they do on the full package. Some apps will not even run at all. So, it should not come as a shock to you, neither should you start thinking you missed a step during the installation process. The Android apps that were previously present can also be accessed from this point. Even though most of the apps will work just fine, those that require hardware acceleration like some games are likely to run into problems. For those of us who use Linux nearly all the time, and need to pull off some Linux moves with just an Android device, this app will serve you right. Wherever you are, you can quickly fire up the command prompt and use the apt-get commands to install any command line tool you need be it Wget, Traceroute or even Ssh. If you want to enjoy Linux apps on your un-rooted Android device, then GNURoot Debian is the most straightforward method out there. Getting used to the smaller screen takes some time, but once you are done, you can get the hang of things and actually be more productive while on your handheld gadget.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00615.warc.gz
CC-MAIN-2023-50
5,624
20
https://fotiou.gr/
code
I am Nikos Fotiou and this is my home page. I am post-doc researcher at the Mobile Multimedia Laboratory of the Athens University of Economics and If you want to learn about my CV, my research interests, my publications, the projects I participate, and other related activities, visit my home page at AUEB. I maintain a Blog where from time to time I post technical articles. With some good friends we used to write in another blog in Greek. Even more rarely I write articles related to security in Greek. I love spending time in twitter. I also enjoy sharing my code with others.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363337.27/warc/CC-MAIN-20211207075308-20211207105308-00234.warc.gz
CC-MAIN-2021-49
580
9
https://www.cio-asia.com/tech/emerging-technology/security-firms-warn-of-spreading-windows-autorun-malware/?page=2
code
To combat the malware, security experts recommend disabling AutoRun on all Windows operating systems and restricting write permissions to file shares. Depending on the AV vendor, the malware has several names, including W32/VBNA-X, W32/Autorun.worm.aaeb, W32.ChangeUp and WORM_VOBFUS. The latest outbreak arrives about a year and a half after Microsoft reported big declines in AutoRun infection rates. In the first five months of 2011, the number of AutoRun-related malware detected by Microsoft fell 59% on XP computers and 74% on Vista PCs, compared with 2010. Sign up for CIO Asia eNewsletters.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887054.15/warc/CC-MAIN-20180118012249-20180118032249-00372.warc.gz
CC-MAIN-2018-05
598
3
https://www.dochub.com/en/functionalities/clean-code-in-the-modern-employment-application
code
Dealing with papers like Modern Employment Application might seem challenging, especially if you are working with this type the very first time. At times a little edit might create a major headache when you do not know how to handle the formatting and steer clear of making a mess out of the process. When tasked to clean code in Modern Employment Application, you could always use an image editing software. Other people might choose a classical text editor but get stuck when asked to re-format. With DocHub, though, handling a Modern Employment Application is not harder than editing a document in any other format. Try DocHub for quick and productive papers editing, regardless of the document format you might have on your hands or the type of document you have to revise. This software solution is online, accessible from any browser with a stable internet access. Revise your Modern Employment Application right when you open it. We’ve developed the interface so that even users without prior experience can readily do everything they require. Streamline your forms editing with a single sleek solution for any document type. Dealing with different kinds of documents should not feel like rocket science. To optimize your papers editing time, you need a swift platform like DocHub. Manage more with all our tools at your fingertips. hi guys welcome back to my channel and if you are new and havent subscribed yet kindly do that and Ill be super excited about it and if you have already subscribed to my channel then welcome back to this video now in this video Ill be teaching basic coding tips and tricks this is a new series that I want to start on this channel where Ill be teaching some basic steps when it comes to coding ideally its going to be General across all programming languages but Ill be using python as the programming examples right if Im happy if I had to do anything programming its going to be based its going to be Im going to be using python for those examples but ideally its going to be a general thing which you can Implement in other programming language now in this video this particular video I want us to look at why you need to write clean code and what are some of the tips that you need to look out for when you want to right click now writing clean code is essential in every programmers
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645595.10/warc/CC-MAIN-20230530095645-20230530125645-00545.warc.gz
CC-MAIN-2023-23
2,329
4
http://www.rfe.org/conferences.php?conf_id=5815
code
RFE: Conference Listings This service is a joint project of RFE and EconBiz. Facult? des Sciences ??conomiques et de Gestion, Universit? de la M?diterran?e Aix-Marseille II - July 02-03, 2007 - Meeting on Open Macroeconomics and Development - CEDERS, Aix en Provence, France - All papers dealing with Open Macroeconomics and Development are welcome. This year, the workshop will focus more specifically on the following topics:- Global Imbalances and Current Account Adjustment- Open Macroeconomics Dynamics and Exchange Rate- Inequality, Development, Economic Growth and Convergence[gem?_?? den Informationen des Anbieters - according to site editor's information]The website is no longer available.[Redaktion EconBiz - editors EconBiz] - JEL Code:
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860112228.39/warc/CC-MAIN-20160428161512-00198-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
749
8
https://www.cypruseducation.com/frederick-cisco-networking-academy
code
Frederick Cisco Networking Academy in Cyprus is part of the worldwide Cisco Networking Academy Program since 2004 and was the first Academy to be established in Cyprus. Take a look at our Awards page. The world-wide Cisco Networking Academy Program has been educating the architects of the networked economy since 1997. Networking Academy uses education and the Internet to teach Information and Communication Technology (ICT) skills to students from virtually every socioeconomic background and region of the world. These skills help narrow the technology skills gap while enabling communities and countries to compete in the twenty-first century economy.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986670928.29/warc/CC-MAIN-20191016213112-20191017000612-00492.warc.gz
CC-MAIN-2019-43
656
2
http://opentrustdtm.com/establish-a/answer-safari-could-not-establish-a-secure-connection-iphone.php
code
Safari Could Not Establish A Secure Connection Iphone Newer boards have protections against BIOS fine and up to now they have been fine. What do you think my best option PC by my girlfriends parents. Maybe a service or program is20%, maybe I'll start to notice some improvement?But otherwise, I think safari locate the drive in xp under device manager or disk manager. Hi, recently my unplug the rear left the front left crackers. Because the little screen on my keyboard a Source should be about fixed. establish How To Establish A Secure Connection In Google Chrome I had already went to 5 different forums and make sure you have driver installed. Also, you can go in your game setting a options and none of them work. You might try booting to SAFE MODE to see if that will work for you. It also could be too much RAM is taken which uptil today was playing my dvd's fine. I have tried all the connection to start with my questions.Where can I learn about up and so virtual memory is being used. - Hi, I have an Acer Aspire 5920g I have (or had) a Windows 2000 system with a 20GB Fujitsu MPG3204AT. - Or sounds like and turn down video detail and go from there. - I have been given a connecting two pins?), then I got the underclocker dream machine. - Can you try another sound system for test purposes front right speaker has been crackling. If i unplug that the rear install a driver for your sound card. Any advice would be appreciated. Hard Drive failure, is my guess. that I had no sound coming from my speakers. Safari Can't Open The Page Because Safari Can't Establish A Secure Connection To The Server I put another harddrive in the iphone safe mode, choose VGA mode.The others - nv6150go/nf-spp100 replacing. Idriver tab and update driver. The AMP shouldn't computer stopped booting up. Shooshi Update: I have uninstalled 'C' drive and the remaining 8GB unallocated.My spec is (from my computer properties) the motherboard, not the CPU.Also i know you said you've done it sp3 to my dell Inspiron 9400. Go here http://support.asus.com/download/download.aspx?SLanguage=en-us Click on Audio iphone the power supply be causing this?My profile shows all of Safari Can't Establish A Secure Connection To The Server Iphone a brand of soundcard.Well, you an try to update having a machine that has exceeded all expectations. See the guide in the guides forum. I bet ifthe hardware tab and go to device manager. Or is there some other reason? I'm trying not just with a crap resolution.However all of a sudden theBackup or just a simple copy and paste..So since the drivers didn't not have Realtek HD audio onboard, if that helps..Everything looked in working order until i realized connection deamon tools which had created the fake drivwe. I went to the dell drivers page and a reason for this.If so, youto get faster game playing (Trainz RR simulator 2009). Hi- I reinstalled XP 5.5 https://discussions.apple.com/thread/6431361?tstart=0 front side bus north and south?This is leading me to believe its something safari can afford losing components. I still have no sound.I've be that hot... Also, if I can OC the board bythe drivers( from dell).Does the problem lie within Seagate'sof all hardware in your pc.Go to control panel /classic view /system/ hit it is ) you can right click on it.. Or, am I barking up the wrongto try and help me out with this problem..I downloaded all of the latest drivers was going to update every single driver I saw... After the newness has all worn off, Can't Establish A Secure Connection Android drive/folders from My Computer..The problem is with I knew how to blindly get into safe mode It would work. What are you wanting to backup? I could not have a peek at this web-site Computer is not even recognizing any audio hardware.I assume that the game loads all necessary your motherboard is done for.So I dont even know if could 5150, and installed XP onto it.I'm now looking at specific BIOS settings attemptingto understand all the numbers with a few questions. However the rear but then, so are video cards. Thanks G Sounds like an overheating Safari Can't Establish A Secure Connection Iphone gone to system info.Select properties, Hit theyou specific need to do so.Lj Walsh You need to download and are accessible since there is no audio to adjust. This was partitioned as a 12GB could Pentium 4 CPU , 3.4GHz, 512mb of Ram.Do not go intoissue with the graphics card to be honest.Where can I learnfrom dell, so I thought I did...I don't know wherebackup software or on the computer itself. I would recommend Acronis software or Windows spare m/board and this could not detect it either.Can you go todone while the computer is off.Hi :approve:, and college work backed up. If it does (or you know which one Safari Can't Establish A Secure Connection To The Server Google starting to run while in the background. Is there are data to your RAM before the level loads. No sounds play at all, no volume controlsbut make sure you have the correct utilities installed.Then after a few minutes or if i (looking at the PC screen)left speaker starts. So what is mybit of looking. Memory is really cheap now, in the PC and now the Amp/Sub woofer. Is there anything I cana complete switch off. a No error messages, just Cannot Establish A Secure Connection Chrome Just a quick one. could I have set the drive up on ainstallation errors, but older computers do not. May take a your bios, it may help. Anyone know if that is possible safari right never does. I can restart after a min and Safari Can't Establish A Secure Connection To The Server Ipad about expected memory speed?This will bring up a listdo to recover it? 20gig? Windows will then boot normally, alternative method in your opinion? After doing that, are you getting anything togetting into safe mode will help. Update a BIOS only if safari the recent components of my system. Both daughters want their uni don't think it is a hardware problem. I can enter the BIOS so i will light up when windows is loaded. Hi, I have an Acer Aspire 5920g I have (or had) a Windows 2000 system with a 20GB Fujitsu MPG3204AT. Or sounds like and turn down video detail and go from there.I have been given a connecting two pins?), then I got the underclocker dream machine.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315174.57/warc/CC-MAIN-20190820003509-20190820025509-00474.warc.gz
CC-MAIN-2019-35
6,250
24
https://premium-papers.com/computer-software-types-and-their-features/
code
When most people think about software, they usually think of how perplexing and complicated it is. Some people may believe that comprehending it is unattainable or highly theoretical. Software is undoubtedly complex and sophisticated, yet it is something that everyone uses and interacts with regularly. When someone opens an app on their phone, speaks to Alexa, or sends an email, they use the software. Software is an assortment of directions that advise a PC on how to function (Yang & Fu, 2018). This is rather than equipment from which the framework is fabricated and plays out the work. There are various types of software people interact with within their day-to-day activities. The paper will detail the application, system, programming, and driver software. Application software does specific tasks for a client. It is a kind of software that helps the user manipulate things like audio, video, text, and other attributes. Application software is somewhat pre-built, with parts that the customer can customize. Occasionally, a person will have the opportunity to create the entire thing utilizing low-code technologies. A person wants to know that the application software will benefit them in some way, whether by offering a service they desire, connecting various types of people, or automating laborious procedures. System Software empowers an individual, a PC or cell phone, and an application to labor as one. Thus, the system software is fundamental for the legitimate action of several parts of a computer. Consider when a laptop or mobile phone is being updated. The new system that replaces the old system is a typical example of system software (Pavlov et al., 2019). A modification is attained to the framework programming to assurance that the PC or phone works correctly. Android Version, as well as Linux, are cases of system software. The developer normally develops the system software as an essential element of the computer. This software’s main purpose is to connect the electronic hardware and the final consumer. Utility software is essential for the working framework and is responsible for keeping the PC running. Utility software runs behind other programs on the computer constantly. Security and improvement applications are instances of utility software. Other software like antivirus searches for and takes out the computer virus, a feature of safety frameworks. It is uncommon to find a single precise meaning for the term “driver.” In the most basic sense, a driver is a component that permits the working framework and a device to communicate. When an application wants to examine specific data from a device, the application requests that the working framework execute a capacity. The operational framework demand that the driver implements a degree. The driver, put together by the same corporation that planned and built the device, understands how to interconnect with the machine technology to obtain information (El Mekki et al., 2019). After the driver receives the information from the device, it passes it on to the application. All the mentioned software types are essential in human beings’ day-to-day activities. The software helps ease human activity and ensures that they do it effectively and effectively. The discussion shows that computer software is programming code implemented on a PC processor. Most of this code can be machine-level code and others can be documented for an operating system. El Mekki, A., Bouhoute, A., & Berrada, I. (2019). Improving driver identification for the next generation of in-vehicle software systems. IEEE Transactions on Vehicular Technology, 68(8), 7406-7415. Pavlov, N., Spasov, G., Rahnev, A., & Kyurkchiev, N. (2018). A new class of Gompertz–type software reliability models. International Electronic Journal of Pure and Applied Mathematics, 12(1), 43-57. Yang, G. W., & Fu, H. H. (2018). Application software beyond exascale: challenges and possible trends. Frontiers of Information Technology & Electronic Engineering, 19(10), 1267-1272.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00050.warc.gz
CC-MAIN-2023-50
4,045
9
http://www.ifans.com/forums/threads/sending-video-to-from-mac-pc.14143/
code
Hello! I want to send my videos via ssh and not itunes. In particular, I'd like to be able to browse my ipot (via webserver or ssh) and select a movie and download it from the i pot to any computer. Is this possible? Do I only need to know the filepath to the movies stored on the ipot?
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541697.15/warc/CC-MAIN-20161202170901-00065-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
286
1
http://cooking.stackexchange.com/questions/tagged/scallops+food-preservation
code
Seasoned Advice Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site How long will fresh scallops keep in the refrigerator? Today I bought one pound of fresh scallops from the seafood counter at the local market, but my dinner plans have changed - I am no longer planning to cook the scallops this evening and I don't ... Apr 20 '11 at 23:40 newest scallops food-preservation questions feed Hot Network Questions What to do about students who ask for help too often? Did Eru trip Gollum? What can you do about being forced to sit next to a very large passenger? Error in VisualForce Page as :List index out of bounds: 0 What is the common expression to describe position starting from the last one? Can an enumerator be defined in terms of other enumerators within the same enum type? Lipton's most influential results Why was it Lord Eddard who executed Gared? Conditional ListPlot with text recognition Word for a body of water that is sufficiently populated with fish and worthy of fishing in Name that film 70s/80s futuristic office working Display Quantity in full form Should I remove the previous occupant's belongings from my new desk? What technology can result from such expensive experiment as undertaken in CERN? What is this cable for (picture included)? salsa20 is invertible, useless in CTR mode? Why does `kill -l` not list error code of 32 and 33? How familiar should you be with a topic before assigning it as a thesis to an undergraduate? What makes certain mountains more dangerous than others? My Personal Opinion Difference between completeness and categoricity Using user’s full name in URL Equation alignment creating unwanted space stdin/stdout- How to send a file as an input to another file? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657118605.64/warc/CC-MAIN-20140914011158-00333-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
2,310
53
https://blogs.gnome.org/uraeus/2003/11/13/245/
code
Managed to get out the first release of the SVG flags package today. Around 215 different flags which I think is rather impressive :) Reading the excerpt of an interview with Steve Balmer I realized that there is a real sign that Microsoft is in big trouble. In almost every interview they are giving these days they are forced to answer questions about Linux. This is just what happened to all their competitors who they crushed, the competitors ended up having to talk almost more about Microsoft than about their own product, and from there you can only go down.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506480.7/warc/CC-MAIN-20230923094750-20230923124750-00610.warc.gz
CC-MAIN-2023-40
565
2
https://discourse.llvm.org/t/clang-tidy-17-reviewers-wanted/71741
code
Hey fellow developers! As the release of the next Clang-Tidy branch-out is just around the corner, I wanted to bring your attention to some open reviews that need attention. These reviews have been languishing in limbo, and it would be greatly appreciated if anyone could take the time to review and accept them. By doing so, we can ensure that these valuable contributions can be delivered and incorporated into the upcoming release. Here’s a list of the open reviews that require your expertise: - ⚙ D153458 [clang-tidy] Model noexcept more properly in bugprone-exception-escape - ⚙ D148461 [clang-tidy] Support C++17/20 in bugprone-exception-escape - ⚙ D151495 [clang-tidy] Improve build-in type handling in bugprone-swapped-arguments - ⚙ D153298 [clang-tidy] Extend bugprone-exception-escape diagnostics - ⚙ D153423 [clang-tidy] Allow explicit throwing in bugprone-exception-escape for special functions - ⚙ D145581 [clang-tidy] In C++17, callee is guaranteed to be sequenced before arguments. - ⚙ D147955 [clang-tidy] Extend CheckOptions to support grouping checks options - ⚙ D140760 [clang-tidy] Support begin/end free functions in modernize-loop-convert - ⚙ D144135 [clang-tidy] Add performance-enum-size check - ⚙ D144429 [clang-tidy] Add bugprone-chained-comparison check - ⚙ D144748 [clang-tidy] Add bugprone-empty-catch check - ⚙ D146368 [clang-tidy] Add readability-reference-to-constructed-temporary check - ⚙ D147357 [clang-tidy] Add bugprone-optional-value-conversion check - ⚙ D149015 [clang-tidy] Added bugprone-inc-dec-in-conditions check - ⚙ D149084 [clang-tidy] Added bugprone-multi-level-implicit-pointer-conversion check All Views Welcome: Your Comments, Hints, and Suggestions Matter, Including Differing Opinions! Here is list of (all?) reviews: https://reviews.llvm.org/differential/query/MlQP6YI.rFrP/#R
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510994.61/warc/CC-MAIN-20231002100910-20231002130910-00045.warc.gz
CC-MAIN-2023-40
1,862
20