url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://software.intel.com/en-us/forums/adobe-premiere-plugin-using-intel-media-sdk-20/topic/285251
code
I don't even know where to go to ask this a clue was found on the error message. The error was in a black ( dos ?) box and stated this: OMP: Error #15: Initializing libiomp5md.dll, but found libiomp5mt.lib already initialized. OMP: Hint: This may cause performance degradation and correctness issues. Set environment variable KMP_DUPLICATE_LIB_OK=TRUE to ignore this problem and force the program to continue anyway. Please note that the use of KMP_DUPLICATE_LIB_OK is unsupported and using it maay cause undefined behavior. For more information, please see http://www.intel.com/software/products/support/. So I came here as suggested. I was trying to add photos to my profile on Catholic Match. catholicmatch.com
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589710.17/warc/CC-MAIN-20180717105812-20180717125812-00445.warc.gz
CC-MAIN-2018-30
713
6
https://www.reddit.com/user/pankaj_kumar
code
A interesting tale of how modifying a code-snippet for a particular usecase makes it not-so-good for another usecase. though resig's entry did win the contest, i believe he actually started jquery with dean edward's entry (that built off of resig's). (http://dean.edwards.name/weblog/2005/10/add-event/) edwards used an integer counter for the hash key, thereby avoiding the problems discussed in this article. jquery does the same, with the 1.1.3 version now using attachEvent/addEventListener when available. Yep. Dean Edward's solution is much better. Thanks for bringing this to my notice. His previous blog post says: Note: I have comments disabled due to heavy comment spam. If you do have something interesting to say then send me an email at [email protected] and I will post your message. Sorry for the non-functional comment link in my blog posts. I was running an old version of MovableType (3.14) and it didn't offer good protection from comment spam. In any case, I just finished an upgrade to MovableType-3.33 and enabled the comment link. Got to know about this reddit thread through Kartik's mail.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948588251.76/warc/CC-MAIN-20171216143011-20171216165011-00441.warc.gz
CC-MAIN-2017-51
1,126
7
http://spacestars.xyz/archives/364
code
Supernacularfiction Cultivation Chat Group – Chapter 1649 – The tree desires tranquility, yet the wind keeps blowing cub stupid read-p3 Novel–Cultivation Chat Group–Cultivation Chat Group Chapter 1649 – The tree desires tranquility, yet the wind keeps blowing tasteful wrist Older person Scarlet Heaven Sword stated, “To amount of money it, in the up-to-date condition, your seven tiny golden cores have got all already become a ‘Golden Central Structure, and they’re all for the Gold Core’s Next Stage [Purple Wonderful Core]. At this point, just the very last finis.h.i.+ng contact can certainly make these small great cores all change into ‘l.u.s.trous Fantastic Cores’ from the 3rd Stage. Only your way of life-certain whale center is on the Very first Level ‘Solid Glowing Core’. And for that reason, you should certainly be looking at what Golden Central Constitution to attract with your whale primary.” “…” Scarlet Heaven Sword. Piece of music Shuhang’s feelings were actually really good, and also this thought about his turned out to be that he or she was obviously a gentleman of love. “Ally? Not an invitation to supply me being a buddy?” Song Shuhang appeared dazed. There were one other new method? Music Shuhang compressed his chin, and explained, “The very first notion will be to attract the elderly people with the ‘Nine Provinces # 1 Group’ plus some senior citizens who are essential for me. I am going to blend by using the ‘Ancient Heavenly Community Composition’ and my very own farming practical experience. For example, Mature Scarlet Paradise and Senior citizen Scarlet Heaven Sword, I am going to also sketch yourself on my wonderful core at that time.” It simply so occurred that he acquired not managed to paint the ‘Ancient Perfect Metropolis Composition’ on any of his small gold cores, so he can transform and right it onto his living-bound wonderful core. the crooked way tarot “Wah, wonderful!” Girl Kunna exclaimed. “Ventriloquism!” With folks rooting for her, the virtuous lamia was positioned in a very good state of mind. Senior citizen Scarlet Heaven Sword explained, “Yeah.” As a result, the Dragon Community might be the essential. Piece of music Shuhang’s ideas were definitely top notch, this also thought of his demonstrated that he or she had been a mankind of love. Cultivation Chat Group “…” Scarlet Paradise Sword. One of the more popular types involving this group of people was the [Fourth Sage in the thousand yrs] Daoist Priest Horizon, who professed so that you can share 12 months of his energy with only a peek, and several years of his energy together with the boost connected with an arm. Even as it is in idea, a tiny great fingers suddenly came out out of skinny fresh air and grabbed it. Piece of music Shuhang smiled lightly. “At that time, of course I am going to also increase someone to my well being-sure golden core!” He needed try using a distinctive approach to accomplish an imaginative counsel from the aging adults in the team plus the Nine Provinces Number One Party, and after that decorate them on their own life-sure gold primary. “!!!” Song Shuhang. “…” Piece of music Shuhang. glacier national park montana airport The corners of Piece of music Shuhang’s jaws twitched. “Fairy Anticipating a Promise, can you generate Senior Scarlet Heaven Sword very first? We still had a couple of things to talk about.” “Wah, impressive!” Young lady Kunna exclaimed. “Ventriloquism!” how to disappear completely meaning Tune Shuhang reacted, “Yes.” Older Scarlet Paradise Sword stated, “Yeah.” “Wait, I’ll go and have a look at it once more.” Track Shuhang quickly closed up his eyeballs and moved into the Inner Eyesight declare. Then, her mental health electricity obeyed Piece of music Shuhang, and authorized itself to always be directed out. Very little Yinzhu and Woman Kunna applauded extensively. Then, the proprietor of that small fretting hand exposed her little jaws, and swallowed Scarlet Heaven Sword in one mouthful. Over the following time, there was clearly thunderous applause inside the room. “Wait, I’ll go and take a look at it just as before.” Piece of music Shuhang quickly closed up his eyes and entered the Inner Appearance status. Whenever they really desired to drag it, it might be best for them to just get methods to stop the tribulation after they ended up for the l.u.s.trous Great Main Realm. The Great Worm Lich This kind of epiphany wasn’t like Chinese cabbage. Who was aware when this sort of option will come yet again in case you gifted up the ability to carry out your ‘finis.h.i.+ng touch’ once it made an appearance? “…” Song Shuhang. Having said that, is it which the dialect on the Black colored Dragon World possessed caused some literary variations right after remaining translated? The finis.h.i.+ng contact was the most significant cerebrovascular event. If one wished to achieve this stroke, some time, site, and unity had been all challenging and main reasons.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945323.37/warc/CC-MAIN-20230325095252-20230325125252-00587.warc.gz
CC-MAIN-2023-14
5,107
40
https://www.computer.org/csdl/trans/ts/2005/06/e0495-abs.html
code
Issue No. 06 - June (2005 vol. 31) DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TSE.2005.69 Richard W. Selby , IEEE Software reuse enables developers to leverage past accomplishments and facilitates significant improvements in software productivity and quality. Software reuse catalyzes improvements in productivity by avoiding redevelopment and improvements in quality by incorporating components whose reliability has already been established. This study addresses a pivotal research issue that underlies software reuse—what factors characterize successful software reuse in large-scale systems? The research approach is to investigate, analyze, and evaluate software reuse empirically by mining software repositories from a NASA software development environment that actively reuses software. This software environment successfully follows principles of reuse-based software development in order to achieve an average reuse of 32 percent per project, which is the average amount of software either reused or modified from previous systems. We examine the repositories for 25 software systems ranging from 3,000 to 112,000 source lines from this software environment. We analyze four classes of software modules: modules reused without revision, modules reused with slight revision (< 25 percent revision), modules reused with major revision (\geq25 percent revision), and newly developed modules. We apply nonparametric statistical models to compare numerous development variables across the 2,954 software modules in the systems. We identify two categories of factors that characterize successful reuse-based software development of large-scale systems: module design factors and module implementation factors. We also evaluate the fault rates of the reused, modified, and newly developed modules. The module design factors that characterize module reuse without revision were (after normalization by size in source lines): few calls to other system modules, many calls to utility functions, few input-output parameters, few reads and writes, and many comments. The module implementation factors that characterize module reuse without revision were small size in source lines and (after normalization by size in source lines): low development effort and many assignment statements. The modules reused without revision had the fewest faults, fewest faults per source line, and lowest fault correction effort. The modules reused with major revision had the highest fault correction effort and highest fault isolation effort as well as the most changes, most changes per source line, and highest change correction effort. In conclusion, we outline future research directions that build on these software reuse ideas and strategies. Index Terms- Software reuse, software measurement, software metrics, software faults, software changes, mining software repositories, large-scale systems, experimentation, empirical study. R. W. Selby, "Enabling Reuse-Based Software Development of Large-Scale Systems," in IEEE Transactions on Software Engineering, vol. 31, no. , pp. 495-510, 2005.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864391.61/warc/CC-MAIN-20180622104200-20180622124200-00245.warc.gz
CC-MAIN-2018-26
3,096
6
https://comm.support.ca.com/kb/cannot-use-dsm-explorer-message-timeout-amm003004/kb000004237
code
The solution is to delete the bad queries. 1. Get the list of bad queries. select query_uuid,count(*) as cnt from ca_query_def_contents group by query_uuid order by cnt desc 2. Get the name of the specific bad query Select * from CA_QUERY_DEF where QUERY_UUID=SPECIFIC-UUID-FROM-ABOVE 3. Remove the bad Queries. There are 2 ways to do this: A. Thru SQL: Delete from CA_QUERY_DEF_CONTENTS WHERE QUERY_UUID=SPECIFIC-UUID-FROM-ABOVE B. Thru the GUI Go to DSM Explorer and delete the Query manually *** If the Query is used by a Policy or Group, then you will need to delete the Policy or Group first ****
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578528430.9/warc/CC-MAIN-20190419220958-20190420002958-00290.warc.gz
CC-MAIN-2019-18
601
13
https://www.linuxhelp.com/questions/qemu-kvm-could-not-open-disk-image-centos-6-8-x86-64-bin-dvd1-iso-permission-denied
code
qemu-kvm: could not open disk image /CentOS-6.8-x86_64-bin-DVD1.iso: Permission denied Got the shown error when creating new virtual machine from command-line. Am using CentOS as main machine with KVM hypervisor and configured bridge network too. qemu-kvm: -drive file=/root/Documents/CentOS-6.8-x86_64-bin-DVD1.iso,if=none,media=cdrom,id=drive-ide0-1-0,readonly=on,format=raw: could not open disk image /root/Documents/CentOS-6.8-x86_64-bin-DVD1.iso: Permission denied I have given full permissions to that directory but still its Denied.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571284.54/warc/CC-MAIN-20220811103305-20220811133305-00133.warc.gz
CC-MAIN-2022-33
539
4
https://pixelcarrotstudio.com/cars-3-driven-to-win-ps4-gameplay-lightning-mcqueen-vs-jackson-storm-hard-mode/
code
►Become a Member – Since so many have requested this specific race. Here it is. Since I already made a video for Jackson Storms race, I didnt want to upload another one with similar scenario. So i upped the ante and Chose to play this on hard mode, and It was pretty hard. Storm never makes a mistake and I got really lucky at the end. Stay tuned for more! I will be posting trophy guides, gameplay videos, and boss videos for games coming in the future. Most of them I will be getting early, so if you’d like to stay tuned, subscribe. Subbing helps grow the channel and is much appreciated. If you guys enjoyed this or found it helpful, a like would go a long way to help the channel. If for any instance you did not like the video, hit the dislike and please leave a comment as to why you did not like it. Constructive criticism gives me feedback and helps me improve for the future. Thanks for watching my content, and take care guys! *Using the Elgato Game Capture HD to record videos at 720p 60 fps. Using Sony Vegas Pro for editing and voice overs. #Cars3 #Cars3DrivenToWIn #Cars
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100227.61/warc/CC-MAIN-20231130130218-20231130160218-00018.warc.gz
CC-MAIN-2023-50
1,091
9
https://static-bugzilla.wikimedia.org/bug1458.html
code
Last modified: 2005-02-04 00:38:46 UTC Previewing edits seems to have somehow actually SUBMITTED them: # 07:42, 2005 Feb 3 (hist) (diff) User:J'raxis (Added "missing" notice, Arabic # 07:40, 2005 Feb 3 (hist) (diff) User:J'raxis (Added "missing" notice, Arabic # 07:39, 2005 Feb 3 (hist) (diff) User:J'raxis (Added "missing" notice, Arabic # 07:37, 2005 Feb 3 (hist) (diff) User:J'raxis (Added "missing" notice, Arabic # 07:36, 2005 Feb 3 (hist) (diff) User:J'raxis (Added "missing" notice, Arabic # 07:36, 2005 Feb 3 (hist) (diff) User:J'raxis # 07:35, 2005 Feb 3 (hist) (diff) User:J'raxis (Added "missing" notice, Arabic Each of these other than the topmost was caused by me previewing. I believe I previewed it more times than what you see here, so preview isn't ALWAYS causing an actual submit. I'm not sure if this is reproduceable, as I don't want to make a mess of any page histories trying to reproduce it. [This is NOT a duplicate of bug 1263, which I submitted some time ago, about dupe entries showing up in page histories, although it may be related: the server was being extremely slow while I was previewing.] Additionally, is there any way this edit history can be cleaned up? Ironically, I was in the process of adding a note to my user page about why I've disappeared from Wikipedia recently: because of the difficulty in editing anything without the server being impossibly slow, logging me out in the middle of an edit thus not attributing the edit to me, or creating dupe entries. Now with this ridiculous-looking mess made of my user history, if it can't be fixed, I'm thinking of calling it quits completely. Could be a problem with post data being cut off partway through, missing the submission info that indicates it's a preview. That's consistent with for instance this diff: Will take a look... Yeah, that's probably it. I think I hit stop a few times during the previews because it was being so slow. Perhaps not having wpSave as the default action would be a good idea in a future version of MediaWiki. wpSave as default also has the mildly irritating effect of causing a premature submit if one accidentally hits enter in the summary box, something I've also done a few times. [Mildly OT, but where do I ask about having a Sysop cleanup this revision history? Last time I had a request like this, I eventually found some help pages at either Wikipedia proper or the Meta site that said to email a Sysop who has DB write access, but I never got responses from those whom I emailed.] I've made a fix to force preview mode if the form submission is incomplete (indicated by wpEdittime, the very last field on the form, not being set). I believe this should be sufficient to prevent saves on partial form When the submission is complete, save needs to be implicitly assumed when neither wpSave nor wpPreview is present in order to allow saving by hitting enter from the summary box or checkboxes. (This is intentional, as every other form submission on the web works like that.) I'll clean up those stray entries from the database shortly... *** Bug 610 has been marked as a duplicate of this bug. *** Have removed the reported bogus intermediate revisions from 7:35 through 7:40. I wonder if this bug could be related to #275: Page or section content duplication on edit conflict with self.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594209.12/warc/CC-MAIN-20200119035851-20200119063851-00021.warc.gz
CC-MAIN-2020-05
3,318
45
https://tfmfootball.com/ambien-pharmacy-valium-online
code
Looking for a ambien? Not a problem! Enter Site >>> http://newcenturyera.com/med/ambien <<< Discreet Package Low Prices 24/7/365 Customer Support 100% Satisfaction Guaranteed. Tags: buy ambien online uk how to purchase ambien cheap ambien pills in australia buy brand ambien cheap online pharmacy ambien generic ambien approved in usa ambien buy cod buy online cheap ambien purchase ambien no doctor good generic brand for ambien where to purchase next ambien how to buy ambien buy ambien in victoria buy ambien cr without prescription ambien without prescription in lithuania can i buy ambien 24 hour ambien buy online ambien dissolve tongue buy quick-dissolving ambien cr generic price ambien online lopid purchase soma order ambien paypal without rx ambien online purchase in australia want to order ambien ambien buy cialis ambien without prescription in delaware order ambien online pharmacy ambien where to order next ambien buy ambien no prescription cod can i order ambien ambien without prescription in america price comparison ambien ambien order online buy valium on line ambien generic ambien in australia pharmacy valium ambien online zolpidem generic ambien buy ambien soft in australia how to order ambien cheap cod ambien ambien same day delivery buy ambien generic online cheap fedex ambien mail order ambien in australia want to buy ambien discount online ambien in australia photo ambien generic ambien online without prescription usa ambien online vicodin purchase soma where can i buy ambien overnight delivery on ambien temazepam cheap ambien cod ambien kennedy prescription ambien without prescription in montana want to purchase ambien can i purchase ambien http://simplerx.top/ambien buy ambien cheap in australia where to buy next ambien buy ambien brisbane ambien fed ex cheap buy ambien overnight generic ambien no prescription ambien stillnox without prescription ambien 5mg generic buy ambien in quebec Medications including Ambien, Unisom and Lunesta can come with many unwanted side effects. Thus it is important that the psychiatrist ask about the alcohol abuse history in a very non-judgmental and non-threatening manner. Many people reported they may have no memory before going to sleep because of having Ambien before sleeping. Could Ambien have been one of several causes from the Tiger Wood's accident. For diagnostic purposes, it can possibly be prudent to carry off on meds generally speaking, so long as the pt is not too sick, e. I doubt that Ledger's family, friends, and fans would agree, either. I was prescribed Ambien (Zolpidem) for my persistent bouts with insomnia. Take antibiotics for example, they rob the gut of friendly bacteria be a catalyst for side effects such as diarrhea, cramps, indigestion, bloating and, ironically, infections. It can also help us cope with some difficult challenges. **Avinca-pain in fibromyalgia, musle spasms , neck subluxation. Zopiclone is the medical approved medication that's safe to use but it is possible to also prefer some other guideline before its consumption. Overlapping of statistics in Death by Medicine may occur using the Institute of Medicine (IOM) (6) paper that designates "medical error" as including drugs, surgery, and unnecessary procedures. Vibrations resonate collectively, just like tuning forks. Lunesta is really a viable option to Ambien with which we have had more success. Antidepressants usually are not considered drugs of "abuse" as people usually do not do drug-seeking behavior to have them, but when someone suddenly stops an SSRI depressant, they could possibly have physical withdrawal symptoms such as head spins, nausea, etc. With sleep aids, this is just not usually a problem since the user visits bed immediately after having a pill. Many prolonged their addiction simply because they felt they needed to in order to sleep. Receive 15% off and Free Shipping (inside contiguous continental United States) when you buy a case of either.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662587158.57/warc/CC-MAIN-20220525120449-20220525150449-00371.warc.gz
CC-MAIN-2022-21
3,963
1
http://ecoiner.org/busan-bitcoin-price-2013.html
code
^ Iansiti, Marco; Lakhani, Karim R. (January 2017). "The Truth About Blockchain". Harvard Business Review. Harvard University. Archived from the original on 18 January 2017. Retrieved 17 January 2017. The technology at the heart of bitcoin and other virtual currencies, blockchain is an open, distributed ledger that can record transactions between two parties efficiently and in a verifiable and permanent way. Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! Bitcoin can be used to book hotels on Expedia, shop for furniture on Overstock and buy Xbox games. But much of the hype is about getting rich by trading it. The price of bitcoin skyrocketed into the thousands in 2017. Every transaction is a file that consists of the sender’s and recipient’s public keys (wallet addresses) and the amount of coins transferred. The transaction also needs to be signed off by the sender with their private key. All of this is just basic cryptography. Eventually, the transaction is broadcasted in the network, but it needs to be confirmed first. As with other cryptocurrencies, the validity of each ether is provided by a blockchain, which is a continuously growing list of records, called blocks, which are linked and secured using cryptography. By design, the blockchain is inherently resistant to modification of the data. It is an open, distributed ledger that records transactions between two parties efficiently and in a verifiable and permanent way. Unlike Bitcoin, Ethereum operates using accounts and balances in a manner called state transitions. This does not rely upon unspent transaction outputs (UTXOs). State denotes the current balances of all accounts and extra data. State is not stored on the blockchain, it is stored in a separate Merkle Patricia tree. A cryptocurrency wallet stores the public and private "keys" or "addresses" which can be used to receive or spend ether. These can be generated through BIP 39 style mnemonics for a BIP 32 "HD Wallet". In Ethereum, this is unnecessary as it does not operate in a UTXO scheme. With the private key, it is possible to write in the blockchain, effectively making an ether transaction. EthereumPrice.org was developed by Ether0x in March 2016 to allow users to easily track the price of Ethereum both historically and in real-time. The platform has since evolved to include several fiat currencies (EUR, GBP, JPY and others) as well as price data for a number of Ethereum ERC20 tokens and other blockchain currencies. More recently, prediction data from Augur was also added to provide insight into the future price expectations of the Ether market. Price data is currently sourced from multiple exchanges with the weighted average price of these assets being calculated by CryptoCompare.com. For more details on the weighted average calculation, see our FAQ. Cryptocurrencies have been compared to Ponzi schemes, pyramid schemes and economic bubbles, such as housing market bubbles. Howard Marks of Oaktree Capital Management stated in 2017 that digital currencies were "nothing but an unfounded fad (or perhaps even a pyramid scheme), based on a willingness to ascribe value to something that has little or none beyond what people will pay for it", and compared them to the tulip mania (1637), South Sea Bubble (1720), and dot-com bubble (1999). The New Yorker has explained the debate based on interviews with blockchain founders in an article about the “argument over whether Bitcoin, Ethereum, and the blockchain are transforming the world”. Many uses have been proposed for Ethereum platform, including ones that are impossible or unfeasible. Use case proposals have included finance, the internet-of-things, farm-to-table produce, electricity sourcing and pricing, and sports betting. Ethereum is (as of 2017) the leading blockchain platform for initial coin offering projects, with over 50% market share. According to the European Central Bank, the decentralization of money offered by bitcoin has its theoretical roots in the Austrian school of economics, especially with Friedrich von Hayek in his book Denationalisation of Money: The Argument Refined, in which Hayek advocates a complete free market in the production, distribution and management of money to end the monopoly of central banks.:22 All of those factors make mining cryptocurrencies an extremely competitive arms race that rewards early adopters. However, depending on where you live, profits made from mining can be subject to taxation and Money Transmitting regulations. In the US, the FinCEN has issued a guidance, according to which mining of cryptocurrencies and exchanging them for flat currencies may be considered money transmitting. This means that miners might need to comply with special laws and regulations dealing with this type of activities. ^ "Bitcoin: The Cryptoanarchists' Answer to Cash". IEEE Spectrum. Archived from the original on 4 June 2012. Around the same time, Nick Szabo, a computer scientist who now blogs about law and the history of money, was one of the first to imagine a new digital currency from the ground up. Although many consider his scheme, which he calls "bit gold", to be a precursor to Bitcoin Bitcoin is pseudonymous rather than anonymous in that the cryptocurrency within a wallet is not tied to people, but rather to one or more specific keys (or "addresses"). Thereby, bitcoin owners are not identifiable, but all transactions are publicly available in the blockchain. Still, cryptocurrency exchanges are often required by law to collect the personal information of their users. We are always looking for feedback on the platform and user suggestions are regularly included in future releases of this price tracking software. The website is currently undergoing development to include price data from all ERC20 tokens as well order book data, blockchain usage data and more. We endeavour to keep the site simple to use with clear data visualizations that help investors stay abreast of the latest Ethereum price movements. We are determined to keep this webapp free from intrusive advertising; please share this website and its content! Bitcoin is a digital asset designed to work in peer-to-peer transactions as a currency. Bitcoins have three qualities useful in a currency, according to The Economist in January 2015: they are "hard to earn, limited in supply and easy to verify." Per some researchers, as of 2015, bitcoin functions more as a payment system than as a currency. Ethereum is also being used as a platform to launch other cryptocurrencies. Because of the ERC20 token standard defined by the Ethereum Foundation, other developers can issue their own versions of this token and raise funds with an initial coin offering (ICO). In this fundraising strategy, the issuers of the token set an amount they want to raise, offer it in a crowdsale, and receive Ether in exchange. Billions of dollars have been raised by ICOs on the Ethereum platform in the last two years, and one of the most valuable cryptocurrencies in the world, EOS, is an ERC20 token. The first decentralized cryptocurrency, bitcoin, was created in 2009 by pseudonymous developer Satoshi Nakamoto. It used SHA-256, a cryptographic hash function, as its proof-of-work scheme. In April 2011, Namecoin was created as an attempt at forming a decentralized DNS, which would make internet censorship very difficult. Soon after, in October 2011, Litecoin was released. It was the first successful cryptocurrency to use scrypt as its hash function instead of SHA-256. Another notable cryptocurrency, Peercoin was the first to use a proof-of-work/proof-of-stake hybrid.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540488620.24/warc/CC-MAIN-20191206122529-20191206150529-00063.warc.gz
CC-MAIN-2019-51
7,751
15
https://about.imtranslator.net/how-to/how-to-imtranslator-for-opera/
code
ImTranslator applications can be run using shortcut keys. You can use the hotkeys to launch ImTranslator application, to make translations, or to perform other tasks. List of default hotkeys for ImTranslator for Opera To translate a selected text: - hold the shortcut keys BEFORE or AFTER text selection The translation will appear instantly, either in ImTranslator window, Pop-up bubble or inline. Shortcut keys customization ImTranslator shortcuts are fully customizable, and can be defined for each translation application using Options. To set preferred hotkeys, go to Options and choose the application tab to make desired changes. The fastest way to access Options is to right-click ImTranslator button on the toolbar. To change the hotkeys: - click inside the Shortcuts field where you want to make changes - enter new hotkeys - after a short delay the new shortcut key appear - click Save options to keep your changes You can use the following keys: Ctrl, Alt, Shift, A-Z, 0-9 in any combination, but no more than three keys. Please keep in mind that some key combinations cannot be assigned, as they are used by the Opera browser. Settings identical hotkeys for different tasks is not allowed, as it will result in shortcut conflict. If the new key combination has been already reserved, the alert message will appear. In this case you need to choose other key combinations. You can also temporarily deactivate hotkeys if desired by clearing the checkbox next to the hotkey title. After Saving hotkeys, you will be redirected back to the application tab. Some hotkeys fields include the clear button. Clicking on this button removes the hotkeys and replaced by None. This mode allows you to activate translations on mouse selection. Note: this translation mode is not recommended. It may interfere with other tasks where making text selection with the mouse is implemented.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500365.52/warc/CC-MAIN-20230206212647-20230207002647-00800.warc.gz
CC-MAIN-2023-06
1,882
24
https://amazon.developer.forums.answerhub.com:443/questions/3691/defining-slot-for-numeric-input.html
code
Attachments: Up to 2 attachments (including images) can be used with a maximum of 512.0 KiB each and 1.0 MiB total. No one has followed this question yet. Validating Requests Are From Amazon Cloud Service (certificate pinning) Hello World in Python? Comodo CA Limited cert is not recognized by Alexa.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573849.97/warc/CC-MAIN-20220819222115-20220820012115-00725.warc.gz
CC-MAIN-2022-33
300
5
http://pay-me-to-do-your-project65282.dsiblogger.com/2361281/rumored-buzz-on-pay-me-to-do-your-homework
code
Iraqi passport holders ought to submit an application for a vacationer visa at a Peruvian consulate ahead of coming to Peru. So you're able to't get a visa on the airport. As there isn't a Peruvian diplomatic mission in Iraq the Foreign Ministry in Lima endorses acquiring in contact with a consulate closest to your house state. When you are intending to perform official small business while in the place, Certainly You should apply for a company visa; no matter should you keep an hour, daily, every week or a month. i donts know why in china peru embassy and consulate so lazy as under no circumstances provided the real facts as i asking some concern Truthfully I do not know either. The airport states on their own Internet site about passengers in transit the following : In order to avoid any possible problems when entering Peru, I'd get in contact with the nearest Peruvian consulate. Actually I'm not 100% sure and usually assumed (!) that you've got to enter in a certain time after the visa is issued, however the visa itself only commences with coming into the region. I attempted to come across any data over it on all federal government web pages I know, but couldn't uncover a solution. Hi I am Ali from Qatar, I analyze inside the United states and my friends and i made a decision to shell out our trip in Lima and Machu Picchu for per month so, I see that Qataris are necessary to Have a very visa prior to we head to Lima even further then more, can we submit an application for a visa on the internet or the closest Peruvian consulate inside the States? My boyfriend's visa will probably be sixty days overdue whenever we leave. We are hoping to depart as a result of Ecuador, fork out the high-quality, and after that return by means of Ecuador 2 months later to catch our flight away from Lima. Is that this doable? Will he be permitted to re-enter regardless of whether he overstayed his time right here by two months? You didn't mention cellular phones site here on your list of approved items, I have an apple iphone is always that alright? Can also I carry medication meant for a relative? I want to know what is the method to extension of Organization visa immediately after expired of Peruvian A number of Business enterprise visa hola, como esta vd. ? espero que este muy bien. yo me llamo Naveen, vivo en Nueva Delhi, Inida. llevo tres años estudiando la lengua español de la universidad de delhi y ahora estoy estudiando maestro en español. mi novia vive en peru y queremos casarnos. yo quiero viajar a peru y quiero pasar el resto de mi vida ahi con mi novia. pero es doable ? no se nada es que nunca he viajado afuera de mi pais. tengo muchas dudas sobre el viaje y quiero que vd. But the situation we have been obtaining now's, we don't have a peru embassy in Nigeria to protected a visa. is there any way we can easily apply directly to Peru to acquire a visa for her, considering that she is supposed to become there within the stated time period? Is a company visa essential in the event of attending a health care convention. And does the celebration organizer need to have a company visa? The Thoughts will provide to not only get you begun on your investigate project and also build a foundation for actually completing it.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742338.13/warc/CC-MAIN-20181115013218-20181115035218-00532.warc.gz
CC-MAIN-2018-47
3,268
14
https://educommunity.minecraft.net/hc/en-us/profiles/394640500072-Magno-Pinheiro
code
Where in Minecraft, can i export worlds ? I use Ipad Air to play. Hello Minecraft Team :) When i click in the Menu a see this Ok, but when i click in My activities will go to My request dont go to my activities.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679516047.98/warc/CC-MAIN-20231211174901-20231211204901-00030.warc.gz
CC-MAIN-2023-50
211
4
https://www.templatesell.com/item/quality-construction-free-wordpress-theme/
code
Are you looking for All Product Plan? TemplateSell is now offering all product plan with huge discount. Purchase it today!Buy All Product Plan Now! Quality Construction is free and elegant WordPress Theme with an attractive and modern design. This theme is easy to use and responsive theme with colorful design and stunning flexibility. This theme is capable of tackling the overall needs of all construction websites including business and others. Check this awesome Free WordPress Template now and start developing your WordPress website. Quality Construction can also be used for business and corporate websites. The advanced theme options and available various widgets with drag and drop features will help to customize your site as you need. If you are looking for a highly crafted template, Quality Construction will be the best choice for you. Check theme documentation and details about theme author here. == Changelog == = 1.0.4 - November 06 2019 = * Extend compatibility to WordPress 5.3.0 = 1.0.3 - September 12 2019 = * Extend compatibility to WordPress 5.2.3 = 1.0.2 - August 18 2019 = * Validated Readme File * Added wp_body_open() on body * Fixed esc_attr issues on metabox = 1.0.1 - August 16 2019 = * Change url of Update to pro Button * Fixed minor design issues = 1.0.0 - August 10 2017 = * Fixed Sidebar Issue in Mobile Device. * Add Field for Slider View More Button * Add Hide/Show Sticky Menu Option * Add Woocommerce Images Popup Function ## 0.0.9 - July 03 2017 ## * Fixed Sidebar Tree Listing CSS Problem * Mobile view : WooCommerce btn cannot click issue fixed ## 0.0.8 - May 17 2017 ## * Fixed sidebar issue on post details page. * Add primary color on menu active and hover as well as on anchor link. * Add Hide/Show Breadcrumbs on Home Page. * Add Header Image ## 0.0.7 - April 28 2017 ## * Updated Theme URI and Author URI. ## 0.0.6 - April 25 2017 ## * Fixed GPL Version Licensed issue. * Fixed post_class() issue. * FIxed sanitize issue. ## 0.0.5 - April 22 2017 ## * Fixed our work isotope issue. * fixed miner design issue. ## 0.0.4 - April 21 2017 ## * Fixed sanitize and escaping Issues. * Add css and js on specific page in dashboard. * remove multiple used of get_theme_mod and used fucntion for that. * Fixed all the issues from reviewer. ## 0.0.3 - April 11 2017 ## * Apply widget_title filter in Widget. * Add Prefix on function. ## 0.0.2 - April 09 2017 ## * Change customizer to widget * Change screenshot * fixed design issue * Add WooCommerce ## 0.0.1 - March 02 2017 ## * Submitted to WordPress The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653608.76/warc/CC-MAIN-20230607042751-20230607072751-00256.warc.gz
CC-MAIN-2023-23
2,791
6
https://www.clientexec.com/members/knowledge-base/getting-started~81/cpanel-initial-setup~351
code
First, you need to configure the plugin in ClientExec's server section. Go to Settings -> Products -> Servers. Now you need to add your cPanel server by clicking "Add Server". Add Server Menu Server Name: Friendly name, How you will see it inside ClientExec. Hostname: Found in your WHM, Networking Setup >> Change Hostname >> Current Hostname (Ex. server.yourdomain.com) Shared IP: Found in your WHM, Server Configuration >> Basic cPanel & WHM Setup >> "The IP address (only one address) that will be used for setting up shared IP virtual hosts." Box Maximum # of Accounts: Set this to 0(unlimited) unless limited by your Host. Stats URL: Not Mandatory (Click Here) If you wish to set this up. Normally these will be your main domain's name servers, but if you are unsure you can check: Server Configuration >> Basic cPanel & WHM Setup >> Nameservers These will be used for dedicated IP's for your customers, this allows you to show the correct information to your customers inside CE and your Welcome Emails. Username: The same username you use when logging into WHM.(VPS Owners is normally "root") Access Hash: With newer versions of cPanel, the Access Hash is deprecated. An API Token can be used in this field instead, which can be found at "Manage API Tokens" in WHM. Use SSL: Recommended, this will allow you to send all data with encryption. Failure E-mail: Anytime there is an error received from cPanel, it will be sent to this email. (Ex. Username already taken!) Next step is that we need to allow your products to use the cPanel server we just created. In your ClientExec admin area, click: Settings >> Product >> Products. Sort your list by the Product Group that will be using cPanel. Now, you need to setup your packages to utilize the server you just setup. Click on Settings >> Products >> Products Now choose the first product you will be using with cPanel, Example: Basic Package. This will be assuming you have setup your packages already. Now click on the Advanced & Plugin Settings tab. Click the box, and choose the drop-down option that says cPanel or whatever title you put in the server name field. For the Package Name, you need to enter it To check the exact package name you can go to: Main >> Packages >> Edit a Package inside WHM. *Note. You do NOT need to fill out any of the info below the package name UNLESS it is indeed a reseller package. If you wish to have the package created automatically after the Order Processor service has been ran, go back to the General Tab and check the "Automatically Activate package?" box. *Note. For more information about the Order Processor service and other services available please visit, (Service Plugins) Please keep in mind you will need to repeat this process for each package that will be using the cPanel server.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494852.95/warc/CC-MAIN-20230127001911-20230127031911-00441.warc.gz
CC-MAIN-2023-06
2,793
28
https://lists.debian.org/debian-devel/1998/12/msg02126.html
code
Re: GPL v LGPL for libraries Alex Yukhimets <[email protected]> wrote: > Very true. Commmercial application can be released under other *free* > license though (NPL comes to mind). It is a concern for Debian then, > isn't it? And it looks like _GPL'd library_ has something against > this *free* piece of software. Do you see nay positive thing in this > situation? And this is the major point that is being discussed here > - unfriendliness of GPL'd libraries to the non-GPL'd (but otherwise > free) software. Which, IMHO make them antagonistic to many forms of > free software, and consequently non-free. The DFSG does not require that all free software be combinable with all other free software in a single work. Perhaps that is a mistake? This might be a sign that we have a definition of "freedom" which is in some way vulnerable to proprietary manipulation.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257651007.67/warc/CC-MAIN-20180324210433-20180324230433-00241.warc.gz
CC-MAIN-2018-13
864
15
http://iphoneus.org/faq/does-ios-7-iphone-have-new-emojis.html
code
To anyone who has the beta version Does Ios 7 iphone have new emojis? I can't tell if there are new ones, but there are certainly a lot of them. If you want, you can actually install the beta yourself if you register your device's UDID with a developer account through a site like http://udid.in/.It's $5, and then you can try out the new OS before everyone else. That's how I got it running on my 4S.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283301.73/warc/CC-MAIN-20170116095123-00076-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
401
3
https://kb.crossware365.com/categories/article/KA-01257/en-us
code
When company disclaimers are added to emails using policies, the disclaimer is added to the email as it is sent using the Lotus Notes client. As Crossware Mail Signature has no knowledge of the company disclaimer, the signature is appended AFTER the disclaimer. To resolve the issue, a Forward Reply String Metadata document can be used to help detect the start of the disclaimer and insert the signature in the correct place. Determine the string needed to detect the start of the disclaimer The Forward Reply String needs to be unique but also small, if the string is too long, the Notes client may add a carriage return/ line feed to the string, which can make to difficult to construct the string. In the policy document the following disclaimer has been created. Create a Metadata Document The following Metadata document can be used find the following disclaimer and insert the signature into the correct place.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662593428.63/warc/CC-MAIN-20220525182604-20220525212604-00123.warc.gz
CC-MAIN-2022-21
917
8
https://forum.arduino.cc/t/how-to-sniff-commands-send-over-uart-i-think/125650
code
Hi guys, I’m new to this whole Arduino world. But I’ve got a project underway now and I’m stuck more or less at the beginning. Some background info: About 6 years ago, a high-end branch of a certain car audio company produced a line of equipment which was intended to be used as a single system. This included the main receiver (CD head unit) and some audio processors which communicated digitally by a 12 pin proprietary cable and a cable called “DVD audio” which is just firewire. (The fire wirewas for transmitting 5.1 signal I believe.) The branch was dismissed due to lack of consumer interested and a hurting American economy. So support and development for these audio processors effectively ground to a halt and the company has expressed no interest in booting it back up again (I know this because I have some acquaintances inside the company). The processors are really fantastic so I would like to use them in my vehicle. But the head unit has become dated. And unfortunately, the processors ONLY work with the ONE deck that the company released before they disbanded. So what does this have to do with my project? Well, I would like to use an Arduino to replace the old head unit, and allow myself to connect more modern units to my audio processors. The first thing I want to be able to do is simply communicate with the processors and send basic commands. I expect that there is an initial handshake between the deck and processors and I have also determined a couple of things about the cable itself. The cable contains 9 wires. There are two twisted pairs, and the rest are untwisted. Unfortunately, I wasn’t able to see anything of value when I hooked my portable O-Scope to the wires, so I decided to connect the wires to the RCA inputs of an old amplifier I had lying around. From this, I was able to identify some things that “sound” digital, and some wires which are carrying audio. Blue/Green twisted pair. These wires appear to be transmitting digital “commands” to the audio processor. There are digital-sounding “packets” that play when I reduce or increase the volume by a notch, when I mute the stereo, or when I commit a speaker configuration change (Time alignment, crossover settings, levels, etc) from the deck. There is also an approximately 2 second, digital-sounding packet that “plays” when the system is first powered up. This is why I suspect that there is a handshake or some initial configuration which I will need to take care of. Blue/Brown twisted pair. These wires play very, very faint audio which does not change in relation to the volume control on the deck. So I suspect these are somehow sending raw L/R sound to the processor. Not sure though. Red 1 - sits at about 4.3vDC Red 2 - sits at about 4.3vDC Green - This wire also plays audio, though it is considerably louder than the audio output from the Blue/Brown pair. Orange - 4.3vDc White - Haven’t identified any signal on this wire. The cable is grounded using the outer part of the connector. The first thing that piques my interest is the Blue/Green pair. I would like to somehow “sniff” those wires and see the data that is being sent down the line. Can anyone please advise me in how to proceed. Is this even doable? Attached are pictures of the cable end for reference, and of the wires that I have tapped on to the internal wires of the cable.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363659.21/warc/CC-MAIN-20211209030858-20211209060858-00465.warc.gz
CC-MAIN-2021-49
3,386
19
https://vox.veritas.com/t5/Enterprise-Vault/Verify-all-items-are-archived-before-disabling-and-deleting/td-p/869461
code
We have several mailboxes of employees that are no longer with the company and we would like to delete those mailboxes from the Exchange server and remove the users object from Active Directory. How do we verify that all messages are archived? Is there a documented process on how to perform this task when a employee leaves the company? I am not sure there is a documented way, couldnot find it quick. Below is what I used to do in the past: Create a mailbox archiving policy, call it 0dayarchiving. Set the Archiving Rules to Archive based on age, archive items when older than 0 days. Decide if you also want to archive Deleted and Draft items (set required value in Advanced tab). Set Archiving Actions to Delete item after archiving, select archive unread items. DESELECT Create shortcut. If you really want everything, then in messageclasses tab, select all messageclasses. Then tab shortcut deletion, set Delete shortcuts after 1 day, and delete orphaned shortcuts. OPTIONAL: create a desktop policy, uncheck all in the Options tab. Create a Provisioning Group, assign the 0dayarchiving mailbox policy (and optionally the desktop one). Set the PG to top of the list (rightclick Provisioning Groups in Console, properties, then use Move Up to move the PG to the number 1). Define how to select moved users (on account bases, put them in a group or a DL). Define that selection to the PG. Run provisioning. Sync mailboxes from the Mailbox Archiving task. Run mailbox archiving task manually. It might be you need to run it several times to clear out a mailbox. Eventually, the mailboxes should be empty. To verify, you can either export the mailbox to a PST, and examine that in Outlook (rightclick, properties, advanced, foldersize), or open the mailbox using the VSA, and examine it from there. If you do an item count using Exchange Powershell, be advised you will have at least 3, and possibly 10 items. These are the EV hidden messages, which don't archive. When mailbox is empty, disable the mailbox for archiving in EV. Then delete mailbox/account
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817688.24/warc/CC-MAIN-20240420214757-20240421004757-00866.warc.gz
CC-MAIN-2024-18
2,059
9
https://www.iottechtrends.com/highly-valid-certifications-for-iot-learners/
code
It’s no secret that the Internet of Things is taking off, and with this explosive growth comes new jobs. From creating new devices to managing security, new jobs are popping up around IoT all the time. Whether you’re looking to change careers or just level up in your current one, adding IoT skills to your skillset can’t hurt. Learning IoT is one thing, but proving what you know is another. That’s why you may want to look into a certification to demonstrate your IoT skills. Good online feedback is important to reassure you that you’re picking a useful and legitimate online course, and hIOTron passes the test. The Indian company sells its own IoT products, and has been involved with various major development projects, reinforcing its credentials. It’s a company that’s involved in IoT at all scales on a day-to-day basis, so you know the training you get from them is relevant. The company offers three types of courses – Basic, Advanced and End-to-End. It will teach you plenty of things ranging from smart city automation to learning how to use SBCs like the Raspberry Pi and Arduino to set up IoT architecture. It’s a mix of theoretical and practical training, with the courses ranging from 40 to 60 hours. You’ll receive a free IoT hardware kit to give you everything you need for the hands-on modules. 2. UCI Intro to Programming IoT It’s always reassuring to find a course that’s hosted by an established and well-regarded university. UCI (University of California, Irvine) offers an excellent beginners’ course that will teach you how to design and program IoT devices using the popular Arduino and Raspberry Pi platforms. It’s a three-month beginner-level course that’s undertaken entirely online. The UCI doesn’t just give out these certifications for free, though, and you’ll need to complete a hands-on project for every specialization you undertake here. The specific courses within this specialization include an intro to IoT and embedded systems, C programming, and interfacing with the Arduino and Pi platforms. You’ll learn some Python programming, too, as well as putting all your skills to good use by building your own test systems. 3. Microsoft Professional Program for Internet of Things The Microsoft Professional Program for Internet of Things is one of many such programs that the company offers. To do this, it has teamed up with online education provider EdX. The program walks you through every aspect of IoT, from programming devices to data analytics. Even IoT architecture design and business planning are covered. The program consists of eight courses, each of which has its own certificate of completion. If you don’t want to learn, you can take the courses for free, but you won’t get a certificate. If you want the certificate of completion, the cost is $99 per course. Each course lasts four weeks. The time needed ranges from three to four hours a week for most courses to six to nine hours per week for the final course. 4. Cloud Credential Council Internet of Things Foundation Certification The Internet of Things Foundation certification from Cloud Credential Council is aimed at system administrators, software engineers, and application developers. It covers concepts and terminologies, the basic building blocks, security, and more. The easiest way to complete the certification is to opt for self-study and pass the final exam. This method costs $349 for the course materials. You get an ebook, exam voucher, practice questions, and even a mock exam. Self-study is expected to take sixteen hours, while the final exam lasts sixty minutes. 5. IoT Inc Certified IoT Professional Program The Certified IoT Professional Program by IoT Inc is the most expensive certification on this list, but you’ll learn a lot in obtaining it. The certification consists of three courses made up of 45 modules and 163 individual lessons. In addition to the IoT basics, you’ll learn the purpose of IoT tech. You’ll also learn why virtualization is important and different IoT architectures. The various modules cover hardware, software, analytics and Big Data, and cybersecurity. For the complete IoT Inc Certified IoT Professional Program, you’ll pay $1,199, though there is a 30-day money-back guarantee. There are add-ons available as well. An audio version of the program is available for $599, and a thirty-minute session with an instructor is available or $400. IoT Inc doesn’t give a time estimate for the certification. Given the sheer size of the course materials, we’re assuming the time commitment is probably as much as or more than any other certification on this list. You can absolutely get a job in IoT without a certification, but in most cases it can’t hurt to have one. If you just want to make sure you have the knowledge you need, take a look at our list of technical skills you need to be successful with IoT projects. Get the best of IoT Tech Trends delivered right to your inbox!
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500813.58/warc/CC-MAIN-20230208123621-20230208153621-00636.warc.gz
CC-MAIN-2023-06
4,989
24
https://samsarjant.com/blog/2008/06/progress-probability-play/
code
I implemented probability look-ahead play today and aam currently testing it. The biggest problem is that it takes much longer to do stuff. The algorithm is like this: – The current piece is evaluated in every position as per normal but its value is now made up of fractions of field values after the next piece has dropped. The fractions come in as 1/7 (7 pieces) or whatever the agent has observed the field as. The problem here is that with the old strategy, the current piece was in every possible position (N). However, this new strategy does that and again with the next 7 pieces. So the new algorithm now takes N*N*7. Where N = 17, the original strategy is 17 steps, whereas the new strategy is 2023 steps. That’s 119 times slower than the original algorithm. This strategy is likely to get better results, but it takes too long to be useful. In 2-piece Tetris, it will be very useful, because the agent knows what the next piece will be. So this will not be further explored until after the competition. The next idea is now to use the y-height of the field to determine if a position is game ending.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818374.84/warc/CC-MAIN-20240422211055-20240423001055-00202.warc.gz
CC-MAIN-2024-18
1,112
7
http://taggi.cse.unsw.edu.au/FAQ/Gitosis/
code
What is it?Git is a fast, scalable, distributed revision control system. For the purpose of this document, the owner of the shared git repository is called 'shared user'. Other users who are granted access to the 'shared user' account are called 'end users'. Gitosis is a helper program that allows a 'shared user' account to host Git repositories and give 'end users' different access levels to them using SSH and SSH keys. From the README file: gitosis aims to make hosting git repos easier and safer. It manages multiple repositories under one user account, using SSH keys to identify users. End users do not need shell accounts on the server, they will talk to one shared account that will not let them run arbitrary commands. End users can then 'clone' a copy from the master and run git related commands on the local copy per usual to manage file or directory objects within the repository. Where git is not installed on a given server, it would not be possible to access shared git repositories set up under gitosis. The README file for gitosis (at /usr/share/doc/gitosis/README.rst.gz) explains how to set up a gitosis service running from a special account directory. Instead, most people at CSE will use their own account to host their Git repositories. This will require a more specific setup, described below. gitosis and git packages are installed on CSE login servers and most lab machines, allowing access to shared git repositories via these servers. Documentation also mentioned that the shared user account doesn't need to have a password, but does need to have a valid shell for SSH to work. Quick Start Guide Create Admin Key and Initialise GitosisYou can use an existing SSH key but access can be easier to manage with a distinct key that you use just for Gitosis: ssh-keygen -f ~/.ssh/gitosiskeyThis creates keyfiles in your .ssh/ directory: gitosiskey, gitosiskey.pub. This is the key you use for admin operations on your Gitosis service. Initialise Gitosis: gitosis-init < ~/.ssh/gitosiskey.pubThis creates directories gitosis/, repositories/. It also sets entries in your ~/.ssh/authorized_keys file to run gitosis-serve when someone uses an SSH key you've associated with Gitosis. Admin AccessYou now have admin access to your Gitosis service using the admin key you created above. Make sure the key is registered in your SSH agent before you do the next bit. If you are logged into an account other than the 'shared user' account then you can do this: git clone [email protected]:gitosis-admin.git… where shared-user is the account you ran gitosis-init in above. This gives you a copy of the configuration files for Gitosis. SSH keys for access will be called keys/<username>.pub and there is a gitosis.conf file where you can configure who has access to what. Accessing a Gitosis service in your CSE account when you are using your CSE account is tricky as ssh won't default to using the key file linked to Gitosis. Instead it will log you straight into a shell. So, the workaround would be to create a wrapper script for SSH. Create a file ~/bin/gitosis-ssh.sh: #!/bin/sh KEYFILE=~/.ssh/gitosiskey if ssh-add "$KEYFILE"; then ssh -o HostbasedAuthentication=no -i "$KEYFILE" "$@" else echo No ssh-agent running. Cannot git-ssh. >&2 exit 1 fiThen use it with git commands with the GIT_SSH environment variable set: export GIT_SSH=/path/to/gitosis-ssh.shThen you can access the gitosis-admin repository. For other Git repositories in your account you can use Git on them directly rather than going via SSH and Gitosis. Adding New Users and AccessTo add new users: - clone the gitosis-admin repository to your current login. - Add a file keys/<username>.pub. This should be the SSH public key to person wants to use. - Authorize <username> to readonly/writeable repositories as needed (or just authorize the group @all) See next section for an example. - Edit the settings as you wish, commit and push. Once you push, Gitosis will immediately make your changes take effect on the shared-user account. Create New RepositoryTo create new repositories, just authorize writing to an 'end user' and git-push the configuration change and a new project. From the README file: For example: let's assume your username is jdoe and you want to create a repository myproject. In your clone of gitosis-admin, edit gitosis.conf and add: [group myteam] members = jdoe writable = myprojectCommit that change and push using the admin key. Then create the initial commit and push it: mkdir myproject cd mypyroject git init git remote add myserver [email protected]:myproject.gitDo some work, git add and commit files git push myserver master:refs/heads/masterThat's it. If you now add others to members =, they can use that repository too. ConfigurationHighlighted below are few areas of configuration worth noting: - gitosis relies on SSH keys to allow end users to share git repositories hosted under a shared user account. Public key entries inserted by gitosis are restricted to allow only certain commands to run. They are appended to the <shared user>/.ssh/authorized_keys. Any existing keys in the <shared user>/.ssh/authorized_keys file would be left intact. Below is a typical default key entry (of type DSA) inserted by gitosis: command="gitosis-serve <username>@<server>",no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty ssh-dss [ ...<public key code>...] <username>@<server>Note the 'gitosis-serve' command is relative and should be modified to full path '/usr/bin/gitosis-serve' for added security. command="/usr/bin/gitosis-serve <username>@<server>",no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty ssh-dss [ ...<public key code>...] <username>@<server>Apart from that, unless you know what you're doing, the inserted key entries must NOT be modified in other ways otherwise security can potentially be unnecessarily compromised due to intentional/unintentional changes. End user's public key is copied to <shared user>/repositories/gitosis-admin.git/gitosis-export/keydir without the .pub extension. To grant an end user access to the shared user's repository, just add the end user's public key to the keydir folder, and then give the user permissions by modifying gitosis.conf (see next). gitosis configuration lives in <shared user>/repositories/gitosis-admin.git/gitosis.conf Here can specify access control (eg. readonly, read/write) of end users to each shared repository. [group developers] members = todd bill writable = project1 project2 [group webguys] members = travis chris readonly = project1In this instance, travis and chris only have read access to the project1 repository, whereas todd and bill have full write access to project1 and project2. Precautions & Good PracticesDue to possible security risks associated with SSH keys, usual care should be exercised including the following: As far as possible only public keys associated with local CSE accounts should be used, not those created from remote like from home PCs etc. This should be true in general not just those end user accounts who intend to use gitosis. Due to the way course class accounts are set up, they are NOT to be used for hosting shared git repositories. See further details in Taggi page SSH authorized keys for course class accounts. - Normal group accounts (see taggi page Group accounts for further details) belonging to Utility class are typically set up for file sharing and/or web hosting within a user group and either with nologin (no SSH access) or with SSH access. Those with nologin access are not suitable for hosting shared git repositories since a valid login shell is required for SSH to work. In this case, should you think otherwise and have a burning case to use the group account for shared git repositories, please consult Systems Support to discuss the best way forward. Each local copy of git repository would be owned by the respective end user, so disk quota would be charged against the end user's account and subjected to whatever constraints and behaviours in the usual way. The same applies to the shared copy of git repository under gitosis which is owned by the shared user. In any case, it's important to allocate enough disk space to cover the anticipated usage for both the shared user account and the end user accounts. - For configuration variables that can apply globally such as daemon in the gitosis config file gitosis.conf, extra care should be exercised as all repositories are affected. Where supported, per-repository scope should be used instead wherever possible for better control and minimising unnecessary 'side-effects'. - See readme and others in /usr/share/doc/gitosis. - Git related man pages eg. git(1), git-clone(1), gittutorial(7), gittutorial-2(7), etc.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646914.32/warc/CC-MAIN-20180319120712-20180319140712-00566.warc.gz
CC-MAIN-2018-13
8,767
43
https://help.sap.com/saphelp_smp235/helpdata/en/6a/0430d0845f1014a7a6c3af56f5fa72/content.htm?no_cache=true
code
and maintain a URL definition associated with an SAP Solution Manager instance for each application in the landscape. This endpoint is used to upload the business transaction XML generated by the client device platforms in an end-to-end trace - In the left navigation pane, select Configuration. - In the right administration pane, click the General tab. - From the menu bar, select Components. - Select Solution Manager and - In the Solution Manager Component Property dialog, enter the URL associated with the appropriate SAP Solution manager.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401641638.83/warc/CC-MAIN-20200929091913-20200929121913-00395.warc.gz
CC-MAIN-2020-40
545
9
https://discourse.vvvv.org/t/remove-duplicates-in-a-spread/13778
code
I’d like to know what the best way is the to get rid of the duplicates in a spread. I’m using the Leap pack and wanted to track only the index finger(s). If one hand is presented all is fine, 3x3Dvectors represents the index finger. If two hands are presented then instead of 6x3Dvectors I have 12. So, I’d like to remove all the duplicates. Any help appriciated! how about a simple GetSpread(Spreads) to just take out the first hand? that should do :) 1st of all a finger has 4 bones so 4x3D vector, but you can getslice individual finger objects before they’re being split so you don’t have to deal with vector count and other shenanigans in the latest alpha we have a leap implementation with left/right hand and all fingers as individual objects. might be what you are looking for… @mrboni: no it is based on the previous sdk @mrboni: i have an orion implementation, it’s working great, i’ll probably push it to github today or tomorrow I bet you do! Look forward to trying it. Thanks muchly @motzi> I’m rookie in v4 but as I wrote in the post I managed to take both index fingers (with GetSlice / GetSpread) :) @microdee> you were right, much easier to filter out the index finger with FingerList and Finger nodes, then to understand the vector count. So back to the original question “removing the duplicates”. As far as I know GetSlice / GetSpread can’t do it, specially when you don’t know the index of them. But Occurence(Vector3D) did it! My question was lame and not so clear, sorry about that and thanks for the replies.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510100.47/warc/CC-MAIN-20230925215547-20230926005547-00359.warc.gz
CC-MAIN-2023-40
1,558
16
https://pub.dev/packages/dart_code_metrics
code
dart_code_metrics 5.7.6 dart_code_metrics: ^5.7.6 copied to clipboard Software analytics tool that helps developers analyse and improve software quality. Dart Code Metrics # This package has been discontinued and is no longer maintained. To continue using Dart Code Metrics, visit our website to purchase a license https://dcm.dev/pricing/. If you were a Dart Code Metrics contributor, you can receive a special license. Feel free to contact [email protected].
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100602.36/warc/CC-MAIN-20231206162528-20231206192528-00274.warc.gz
CC-MAIN-2023-50
460
6
http://portlandsoccerplex.com/39764893-getting-started-with-git.html
code
This is part of the Software Engineering for iOS learning path. View path. Who is this for? Beginner developers for any platform that want to know Git basics. No prior source control knowledge is required. - repositories (local and remote) - pushing to a remote repo - cloning a repo Part 1: Getting Started with Git Learn what source control is and why we use it. Learn what a repository is and how to create one. Clone a Repository Learn how to create a new GitHub account and clone a remote repository. Create a Branch Learn what branching is and why you would create one. Learn how to merge changes from a branch. Learn how to create a pull request and why they’re used. Learn how conflicts can occur with multiple collaborators and how to resolve them. Learn what the staging area is in Git and why we use it. Learn how to use the command line with Git. Learn how to use .gitignore and why you would want to ignore files from your project. Let’s review everything you’ve learned in this course about Git.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818740.13/warc/CC-MAIN-20240423192952-20240423222952-00658.warc.gz
CC-MAIN-2024-18
1,015
20
http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=69171&copyownerid=95044
code
DMSVIVA 2018 : The 24th International DMS Conference on Visualization and Visual Languages Call For Papers CALL FOR PAPERS The Twenty Fourth International DMS Conference on Visualization and Visual Languages (DMSVIVA2018) will be held at Hotel Pullman, Redwood City, San Francisco Bay, USA from June 29 to 30, 2018. The theme of the conference is soft computing in visualization and visual languages. CONFERENCE WEBSITE: ksiresearchorg.ipage.com/seke/dmsviva17.html The conference organizers seek contributions of high quality papers, panels or tutorials, addressing any novel aspect of sentient multimedia systems that significantly benefits from the incorporation/integration of multimedia data (e.g., visual, audio, pen, voice, image, etc.), especially in visual languages and distance education technologies, for presentation at the conference and publication in the proceedings of DMSVIVA2018. Both research and case study papers or demonstrations describing results in research area as well as industrial development cases and experiences are solicited. The use of prototypes and demonstration video for presentations is encouraged. SPECIAL ISSUE OF JOURNALS: Selected Papers from DMSVIVA2018 will be published as special issues of the Journal of Visual Languages and Computing (JVLC) and the Journal of Visual Languages and Sentient Systems (VIVA). The Int'l Conference on Software Engineering and Knowledge will be held at the same hotel from July 1 to July 3, 2018. Authors are welcome to contribute papers and attend both conferences. The hotel has made available for these limited dates (6/29 - 7/3/2018) to DMSVIVA 2018 attendees a discount rate of $109 US dollars per room, per night, single/double occupancy, including free WiFi in hotel room and discounted parking, not including sales tax. For other days prior to or after the conference period, the hotel will provide best available rate. INFORMATION FOR AUTHORS: Papers must be written in English. An electronic version (PDF format) of the full paper should be submitted using the following URL: https://www.easychair.org/conferences/?conf=dmsviva2018. When submitting, select the main conference DMSVIVA17 or one of the special tracks. Manuscript must include a 200-word abstract and no more than 8 pages of double column text (including figures and references). All submissions must not be published or under consideration for publication in a journal or in a conference with proceedings. Papers will be evaluated based on originality, significance, technical soundness and clarify of exposition. Depending upon the results of evaluation a paper may be accepted as regular paper (10 pages), short paper (7 pages) or technical notes (1 page and demo/poster presentation). DMSVIVA2018 Conference Secretariat 156 Park Square, Pittsburgh, PA 15238, USA Paper submission due: March 14, 2018 Notification of acceptance: April 20, 2018 Early registration deadline: May 10, 2018 Camera-ready copy: May 10, 2018
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488525399.79/warc/CC-MAIN-20210622220817-20210623010817-00212.warc.gz
CC-MAIN-2021-25
2,972
45
https://www.indiedb.com/news/schwarzwald-on-greenlight
code
Schwarzwald is now on Steam Greenlight, and waiting for your up votes. For the Greenlight campaign, I have also created a new, quite extensive, gameplay video: This shows all the features of the current build in three games of various stages - early game, mid-game and late game. It explains many of the features and how to play. Check it out and if you like what you see, remember to vote for the game on Steam Greenlight:
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817253.5/warc/CC-MAIN-20240419013002-20240419043002-00094.warc.gz
CC-MAIN-2024-18
423
3
https://repository.tcu.edu/handle/116099117/7236
code
The Social Significance and Meaning of Snake Companionship This paper will explore the world of human-snake interaction and human relationships that are derived from associations with snakes. Through ethnographic analysis, "thick description," and grounded theory, I will explore what it means to have a snake as a companion animal and the social consequences of snake ownership. I will also categorize snake owners based on levels of objectification and empathy or anthropomorphism in their interactions with snakes as well as discuss the ways in which snake owners commonly manage their stigmatized status in society. Finally, I will investigate the epistemological challenges with "knowing" snakes or possessing "snakeness" as snake owners attempt to form meaningful relationships with their companion animals.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474360.86/warc/CC-MAIN-20240223021632-20240223051632-00570.warc.gz
CC-MAIN-2024-10
813
2
http://www.amazon.ca/Bread-Machine-Cookbook-Rathmell-German/dp/1558670254
code
I recently upgraded my old National bread machine to a state-of-the-art Zojurushi and thought I'd reward my myself by purchasing this well-recommnded book. First, the size: it's *tiny*--more like a field guide. This can be a plus, in some instances, but it sure lacks an air of authority, in this case, and probably won't wear well. On the other hand, the typeface is clear and bold, which is useful. All recipes are presented in three columns for "small," "medium," and "large" loaf sizes. Recipes do not include ingredient weights, which are essential (especially for flour), as any proper baker knows. This lack undoubtedly contributed to the problems I (and other reviewers) had obtaining consistent results from this book. There are quite a number of jarring typos (e.g., "broiche") which also undercut the book's credibility. I tried several of the recipes at various loaf sizes. Most recipes required adjustment of liquid or dry ingredients, not such a big deal. But, the results were generally insipid, to my taste buds. There are certainly better books out there, or better yet, check out some of the websites that are proliferating for this genre. All in all, not a cookbook I'd reach for again.
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119646269.50/warc/CC-MAIN-20141024030046-00239-ip-10-16-133-185.ec2.internal.warc.gz
CC-MAIN-2014-42
1,205
5
http://www.backtrack-linux.org/forums/showthread.php?t=54598&mode=hybrid
code
I have followed this tutorial http://www.backtrack-linux.org/forum...ad.php?t=43665 When i used grub 2 i could fix the "black screen" problem after startx, with adding startx to /root/.bash_profile in combination with editing the line with "i915.modeset=1" after "text splash vga" in /boot/grub/grub.cfg After I downgraded to grub legacy, I have the "black screen" problem again I can't edit the grub because there is no such line with "text splash vga". Also it tells me some error with "i915" on the purple screen.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123560.51/warc/CC-MAIN-20170423031203-00022-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
516
6
http://codebrane.com/blog/?m=200407
code
First step on the road to Guanxi-dom was to build a webapp and build Apache Axis into it, rather than have the Guanxi system sitting inside Axis as a JWS or normal web service. To install Axis is simple. To build it into an existing webapp is just as simple. Doing this gives you complete control over your site, with separate apps for SOAP/SAML and reporting/monitoring and admin. Along the way, I read the sample chapter from Java Development with Ant, on calling web services from Ant. Impressive. Knocked me socks off so it did! You can use a build.xml to call a remote service to get it’s WSDL, download it and feed it into Axis tools to generate Java stubbs to call the service. You then just tie it together with a few lines of code and you’ve got an instant web service client. I’ve listed some interesting resources at the end of this entry. The next step is to integrate the Internet2 openSAML implementation into Siva to make it Guanxi. Some interesting resources: shibb 1.3 is on the way: Shibboleth 1.3 draft The point of Guanxi, from a Siva perspective is to shibbolethise Siva. What does that mean? At the moment, Siva is a toolkit that can be downloaded and plugged in to an institution’s development infrastructure. It’s a jar that provides all the functionality that’s needed, among other things, to manage and query various directories, such as Novell NDS. It can only be used by a compiled app using the jar directly. What if the attribute part of Siva were SAMLised and made into a web service? Using the Internet2 implementation of the SAML protocol, extending if necessary and using that to accept shibb-type attribute requests, the point being to aggregate attributes from various stores within an institution and resolve namespace conflicts. Public keys are the key. Automatic registration of an institution’s key on the Siva side would allow that institution to then sign attribute requests and send SAML messages direct to another institution’s Siva. It could be extended to allow inter-institutional account maintenance, if that’s pratical or indeed needed. Haven’t really thought out the use cases yet so I can’t dismiss it out of hand. Where would a lightweight profile fit within shibboleth? Here’s a use case: - joebloggs@uhi logs in to a remote Bodington instance at Leeds. There’s a potential clash of users here as there’s already a joebloggs enrolled at Leeds and with an account on the Leeds Bodington instance - joebloggs@uhi must append his domain to the his local username : Login = [email protected] - Leeds Bodington, which has the Siva authenticator module installed, detects the presence of the domain on the username - The Leeds Siva authenticator then negotiates attributes via SAML from the UHI lightweight “origin” web service - Attribute requests are signed, so I would propose that each service at an institution that is Siva enabled should have it’s own public/private key pair. This would allow finer control of what services can request attributes and can allow an institution to prevent rogue systems from contacting remote Siva instances. Well, they could still contact but the remote Siva would refuse as the registered key would not match what was presented. - Using SAML signed assertions, the two Sivas would communicate to provide Leeds with attributes about the UHI student - These attributes could then be stored temporarily within the Bodington session as XML, ready to be passed to the authoriser which checks to see if the student has enough attribute defined privileges to continue It’s shibboleth compliant in that a Siva SAML web service will accept signed attribute requests from either a remote Siva or a standard shibboleth system. Siva can handle creating users and, if AD is set up correctly, their home directories. It all works nicely. However, AD states that you can’t set a user’s password at creation time, you have to go back in and modify it. Also, it’s not as easy as Novell, where you can just connect using plain text and set the password. Well, you can set the password at creation time on Novell eDirectory, so you don’t have to worry about going back in to change it. In AD, you have to connect over SSL, using a root certificate issued by the server and the password must be quoted and Base64 encoded into the bargain. That’s some amount of security considering it’s Microsoft! Normally this wouldn’t be a problem but we’re talking about Microsoft here and there’s a bug that stops this dead in it’s tracks: JNDI fails to work for AD The same code that works on Novell, to connect and bind, fails on AD. Sheesh, what does a man have to do get open source to talk to Microsoft products? You can see what’s happening in the dump: Thread-2, WRITE: SSLv2 client hello message, length = 98 Thread-2, received EOFException: error Thread-2, handling exception: javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake Thread-2, SEND TLSv1 ALERT: fatal, description = handshake_failure Thread-2, WRITE: TLSv1 Alert, length = 2 Thread-2, called closeSocket() main, handling exception: javax.net.ssl.SSLHandshakeException: Remote host closed connection during handshake Thread-1, called close() Thread-1, called closeInternal(true) AD gets a hello message during a handshake and it blows up. I don’t hold out much hope for the fix that Microsoft recommond on the AD side as one of the admins has tried it apparently and it’s still not working. Most of the LDAP and Novell funtionality of SivaUtils is controlled by XML. I’ve now created schema documents for all the XML documents that LDAP and Novell accept. You can see them here Had to upgrade to Xerces 2.6.2 to get the JAXP 1.2 validation features. After much gnashing of teeth and pulling of hair, finally got the origin running under Apache 2 and Tomcat 5 on MAC OS X. One of the prerequisites is to build opensaml. It’s very easy, just use Ant on the build.xml it comes with. Pity the same can’t be said for the origin. I had to comment out all the test targets from build.xml as the file is full of syntax errors. Perhaps an Ant version problem, not sure at the moment. Anyway, that gives you shibboleth.war in the /dist directory. Now, this gave me mucho trouble: they must go in TOMAT_HOME/common/endorsed. I thought I’d done that as I found them there but they were actually older versions! Jeez, what a mess that caused. All sorts of class loader problems centred around org.opensaml.XML.parserPool.registerSchema. It necessitated a trip into class loader land and how tomcats sets up parent/child loaders. Anyway, I’m now trying to figure out what a defaultRelyingParty is as it’s now barfing on that configuration element in origin.xml – but at least it’s a configuration problem now and not some horrendous build/deply mess
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705575935/warc/CC-MAIN-20130516115935-00077-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
6,883
44
https://support.hanwhavisionamerica.com/hc/en-us/articles/115013416128-WAVE-Changing-the-OS-of-your-WAVE-System
code
WAVE is a 100% cross-platform software. It can support Windows, Linux, MacOS, and ARM-based-Pi. If an OS change is required on a system: - Login to the WAVE Media Server using the WAVE Desktop client - Click the Main Menu Button, navigate to System Administration and then click Create Backup... - Copy all the backup files and store them to an external drive or storage. - Reinstall your system with a new OS. - Install proper version of the WAVE server and the client to your system. - Login to the newly installed WAVE Media Server via WAVE Desktop client - Click the Main Menu Button and navigate to System Administration, then click Restore from Backup... Notice: This migration will discard the motion chunks (for Smart Search), Audit Log and Event Log. The logs listed above will not be migrated. Migrating System Metadata: The migration of metadata between OS platforms may pose a risk of losing data which you hoped to retain. Be sure to create backups of all database files and consult with WAVE Support before attempting to perform this migration. [From Linux to Windows as an example] - Stop the server - Fully copy the folders: - Copy and save all archives from every single disks (you can just legacy the HDDs and use them on a new system as well) - Save all license keys. - Install the proper version of WAVE on Windows. - After installation, please first Stop the Server. Additionally, make sure that previously Linux servers are not active to avoid server conflict. - Open the file etc/mediaserver.conf, copied from the Linux server, and find the serverGuid parameters. - Execute regedit.exe on Windows Machine. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Hanwha\WAVE Media Server Find key guidIsWAVEID and set it to no. Find key serverGuid and set it as the value you found in Linux configuration file from Step #7. Change key systemName if it's needed. - Open C:\Windows\System32\config\systemprofile\AppData\Local\Hanwha\WAVE Media Server and delete all the files in that folder. - Paste the copied files to C:\Windows\System32\config\systemprofile\AppData\Local\Hanwha\WAVE Media Server It should include: - ecs.sqlite -- main DB - mserver.sqlite -- DB with Audit Trail, Event Log, Bookmarks etc. - record_catalog -- folder with motion data - ssl -- folder with ssl certificate - Connect all the storage drives. If archive was recorded to /opt/Hanwha/mediaserver/var/data, copy /opt/Hanwha/mediaserver/var/data/hi_quality and /opt/Hanwha/mediaserver/var/data/low_quality to an empty disk. - Place the folders inside of WAVE Media. If WAVE Media is not found, create one. - Make sure that all WAVE Media on each storage drives contain only high_quality and low_quality. All db and .ref files should be deleted. - Start the WAVE Server. And then login using the WAVE Desktop client, and Rebuild the archive index. - Old storage drives list can be seen in Storage list in the Client. Try to delete them from UI. If you can't, please, contact WAVE Tech support. - Issue a license reactivation request on WAVE Support Portal, and provide us the new HARDWAREID. Then reactivate the licenses again to enable recording.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00803.warc.gz
CC-MAIN-2023-50
3,128
38
https://expatriates.stackexchange.com/questions/889/how-are-foreign-savings-current-accounts-taxed-in-us
code
When moving to the US on a H1B or L1 visa, how are savings and current accounts in Europe taxed? Are the interest on them taxed? What about changes of exchange rate between USD/GBP/EUR from one year to the next? If you're resident for tax purposes (which you are when you're on H1B/L1, except for may be the first/last years) they're taxed exactly as if they were in the US. You might not get 1099 from the bank (though some foreign banks do issue 1099 to US persons), but that is irrelevant to your tax obligations. The interest is taxed in the year received. Currency fluctuations do not affect the interest taxation. You calculate the interest in USD based on the exchange rate in the day the interest was paid, and pay taxes based on the USD value. Don't forget your FBARs (form 114) and FATCA forms, and don't forget to check the checkbox on Schedule B (line 7). Pay attention: not reporting foreign accounts, especially if there's income (like interest income) may cost you dearly. $10000 per year per account for failing to file form 114, for example.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511717.69/warc/CC-MAIN-20231005012006-20231005042006-00098.warc.gz
CC-MAIN-2023-40
1,058
5
https://it.toolbox.com/blogs/darmour/is-architecture-heavy-weight-110805
code
A common comment I hear regarding architectural work is it's "HEAVY WEIGHT". The implication is it takes too long, is hard to do, is not responsive to/for business and technical needs, and does not return appropriate value. This is not a uniform experience, but given the state of several IT organizations I have seen, it is at least somewhat typical. Sometimes the comments are: "Why don't you just get started?" Or, "Why aren't you working yet (writing lines of code)?" And finally, "What are we going to get out of this?" Most people don't see or understand the benefit of developing logical structures on which technology is actually built. Also, it is assumed that Architecture is done all upfront and takes along time thus making it a critical path activity. On the contrary, Architecture does not require a single pre-defined block of time before downstream activities can occur. It can evolve as requirements become clearer and technology choices grow or change. This approach is somewhat synonymous with the current "popular" idea of refactoring. All that being said, there are architectural efforts and then there are ARCHITECTURAL EFFORTS. You can imagine one of these being heavy and cumbersome. For example, during a consulting engagement at a state agency there was a project needing a data design. In this organization, the "data" group is isolated, one-dimensional in outlook and consideration, and protective of their domain in a non-participatory way. Asking for a design and getting a response felt like submitting a request through a narrow slit in an iron door and camping out (like youth waiting to buy concert tickets) without a sense of response time, quality, and sufficiency of the design. This is a case of "heavy" architecture. This experience exhibits: 1) isolation from enterprise endeavors, 2) lack of customer service, 3) lack of timeliness and 4) non-productive and ineffective use of the organization's technology capabilities. The overall architecture, including governance, is lacking. Another example, is a CIO talking with his resource manager and when told an architect will be assigned to an effort makes a face and says, "they (the architects) always over design." This means 1) architecture takes too long and 2) only produces the most elegant outputs without consideration for project circumstances and constraints (not appropriate and not usable). In both cases, I see a failure not of architecture pre se, but rather the architectural process. The architectural process can be a positive and coalescing function or fragmenting one (and everything in between). I see three activities and outputs from architectural work. Briefly they are: 1) Clarification of requirements - Architecture is a translation level from business requirements to technical frameworks, capabilities, constraints, and committed to initiatives/directions. The lack of clear requirements makes subsequent activities difficult and often uncertain. It can in it's worst case lead to a technology delivery which does not meet all the business needs and nuances. 2) Define architectural boundaries - This is a task I don't often see happening or acknowledged. This leads me to wonder if this is properly understood and treated with the importance it's due. This idea has been explored by others and has been called "Convergent Architecture". My thoughts may not be an exact mapping to those ideas, but here goes. From a set of business requirements it is important to develop/derive a set of business and functional processes to accomplish the goals. These are not necessarily self-evident. There are analytic exercises expounding and enumerating the processes and why they exist (their importance). Processes need defined interfaces and more importantly the content and structure of the exchange data. Therefore, a process has a set of technology and functional needs to support the encapsulated functions, the interface(s), and the content and structure of the exchanged data. These needs are mapped to the enterprise's technologies, their capabilities, including the heritage of past and on-going efforts and initiatives. For instance, given a process need to check incoming transactions against a set of outgoing transactions - what technologies are available to do this kind of work. Is this an application effort, is their middlewear available for this, how has this type (category) of activity accomplished today. This exercise, of mapping the processes to the enterprise technology domain gives structure and commonality to the implementations in the enterprise over time. The interface definitions require understanding of the exchanged information: is it simply variables, data sets, or entities with context. In the final analysis, this means that some processes are best implemented using a particular set of technologies representing the best choice available to the enterprise. Now people/organizations concerned only with specific domains or singular/skewed approaches have difficulty with this activity. Processes could be implemented with one technology/approach or another. However, which is best suited to in the circumstances and for the enterprise strategically. I have found the clear and consistent mapping of processes (business and functional), with well defined interfaces and robust exchange data structures, to the technology layers is difficult for many to understand and/or accept. It is this activity or those similar to this that determine if reusable resources are developed, existing assets leveraged, and repeatable processes reinforced. I will write a whole entry about the architectural process and talk about this in more detail. 3) The last activity is to produce the architectural specification. I find that at this point most of the difficult work has been finished. Regardless, this activity seems relatively straightforward - apply the best principles and practices to a design or framework for the application and technology. Architectural work can run parallel with requirements gathering and development. This is especially true once some parts or all of the architectural boundaries are set. Architectural work is not and does not need to be a critical path activity. The first two activities require a different approach and model to architecture than simply being a technology architect in J2EE, .NET, Oracle, or some other technology/platform. In fact, these require skills that are much different than a simple technology architect, though technology architects sometimes are able to contribute to clarifying requirements. Clarification of requirements entails the ability to understand the business on it's own terms and have a real discourse regarding their concerns and consequences of business process choices. Usually, this requires some domain understanding of the business and/or the ability to pull out the logical consistencies in discussions if not familiar with the domain. The next activity is unusual in that it requires not just understanding technology in specificity but rather in the strengths and weaknesses of the different parts of the technology stack. To develop robust interfaces and data exchange structures means understanding of the business exchanges across the technology stack, such as distribution of business processes across applications, characteristics of transactions (long term, synchronization, …), etc. An understanding of the policies, procedures, and governance in the IT organization is another knowledge component. To produce an architectural boundary specification requires consistent and coherent distribution of business and functional processes. This leads directly to well defined IT assets/components. This second architectural activity is in my opinion necessary to producing reusable results and effective service implementations. It is the crucial component of a "Convergent Architecture". I have rambled quite a bit. I will return to some of these thoughts and break them out in more detail later. Thanks for listening. Of course, … be careful out there.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823738.9/warc/CC-MAIN-20181212044022-20181212065522-00496.warc.gz
CC-MAIN-2018-51
8,074
1
http://security.stackexchange.com/questions/tagged/risk-analysis+trust
code
Information Security Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Is this much distrust really necessary? In IT Security and computer power users there seems to be an excessive amount of distrust. They don't do anything or use anything because of this distrust, or use what seems like an excessive amount ... Sep 20 '11 at 17:20 newest risk-analysis trust questions feed Hot Network Questions how to make blocks like "redstone" working in a minecraft-like game when the block is very far-away from your character Automatic calling system: "Press star" or "Press asterisk"? Evolved forms in evolution How to determine what instructions a process is executing? Is it typical to provide a lot of information for public transport systems in Japan? Why was the first compiler written before the first interpreter? How did they take photos of Jupiter? Performance of compiled functions (Project Euler No14) How to react to a reviewer’s comment when he is completely right, but you do not like the consequences? replace lines in a text with matching text If clones contain all the same genetics: Is there any difference in abilities of clone commanders compared to clone troopers? Is `-` used only with cd? Rearrange pixels in image so it can't be recognized and then get it back How to write test coverage for private method in controller? Simple Masking/Stencil in the VSE Should I accept an invitation to give a talk on dated work? How can I test out my equipment before a backpacking trip? Why are gels used for digital photography? How does a language expand itself? Who has the higher authority, the pilot in command or ATC? Tikz: how to plot arcsec and arccos? Why is it that if I count years from 2011 to 2014 as intervals I get 3 years, but if I count each year separately I get 4 years? Why do people pray to the Stranger? About an identity which gives immediate proof of the permanent lemma more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510270399.7/warc/CC-MAIN-20140728011750-00044-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
2,494
53
https://www.odesk.com/o/jobs/job/_~01bcf3c76c0bde30b3/
code
I need a program that can analyze and automatically extract certain data from a text file, or from a list of information on the internet. The text files have a bunch of information but we only need certain field titles to be scanned and automatically imputed into an excel sheet so we can then do a mail merge on the files. Skills: software-development, data-collection, data-conversion Other open jobs by this client - Hourly – Virtual Assistant
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394023865019/warc/CC-MAIN-20140305125105-00043-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
448
5
https://www.codeproject.com/Articles/15786/Fundamentals-of-Sound-How-to-Make-Music-out-of-Not
code
In this article, we'll look at how sound waves work and interact with each other, as well as how to represent waveforms in PCM WAVE format (*.wav). Then we'll build on that understanding to create a class that generates musical tones, which will allow us to create whole songs from scratch. Example code is included in the source download, which will generate clips from two of the most beautiful pieces of music ever written: Bach's "Minuet in G" and Salt -n- Peppa's "Push It." Sound waves: the basics When physical things interact, the interaction causes a vibration. That vibration travels through the air as a wave. If that wave has a size and shape that the ear can detect, then we call it "sound." For a more complete and scientific definition of sound, you should probably look at an encyclopedia or something, but for our purposes, we'll define sound as any physical vibration that you can hear. Different types of sound waves Arguably the simplest type of sound wave is the sine wave. It generates a pure tone, which sounds kind of like a tuning fork or an old Atari video game. Different wave shapes produce different tones, even if they're the same pitch. For example, you can hear the difference between a xylophone and a clarinet, even if they're both playing middle C. Here are some common simple wave shapes and their names: How a speaker works (more or less) In order to understand how we're going to generate sound, you first need to understand roughly how a speaker works. I'll give a very simple overview here, but if you want a little more depth, you should check out this article at HowStuffWorks.com. A speaker is made up of a movable cone called a diaphragm (shown in black), mounted in a stationary container called a basket (shown in gray). The diaphragm is fitted with an electromagnet at its base, and the basket is fitted with a permanent magnet. By applying an electrical charge on the electromagnet, we can make it repel the permanent magnet. Conversely, by reversing the charge, we can make it attract the permanent magnet. In short, we can make the diaphragm move forward and backward. But how does this create sound? Let's look at another example. In this example, we're feeding a sound wave to the speaker. The hardware converts the sound wave to an electrical signal so that at the peak of a sound wave, the speaker diaphragm is pushed out. Similarly, at the bottom of a wave, the diaphragm is pulled in. When the motion of the diaphragm follows the pattern of the recorded sound wave, it creates a vibration in the air which very closely matches the recorded wave. That vibration ends up being the sound that we hear. This is, more or less, how a speaker works. Wave file internals Okay, now that we have a rough understanding of how sound works, let's try making our own. We'll be creating PCM wave files for this purpose because it's a very easy-to-understand format. A wave file is made up of two segments: the header segment and the data segment. The header contains information about the file's sample rate, bits per sample, number of channels (mono or stereo) and is well-documented. My code handles the formatting of the wave header for you, so we'll be focusing mostly on the data section in this article. Let's look at how a wave file stores its data. We'll start with an actual sound wave: In order to save this as a wave file, we slice the wave up into a bunch of little segments. We then take a sample of the wave position in each of the segments, like this: We save each of the positions in order. Then when we read them out again, we can build a very close approximation of the original sound wave. It will look something like this: Each sample position is stored as a number. For CD-quality audio, samples are stored as 16 bit numbers. This means that a sample at the very top of the graph will be 32,767, a sample at the bottom of the graph will be -32,768 and a sample in the middle will be 0. In addition, the smaller the slices we create, the more samples we'll end up with, and so the better the reproduction of the original wave will be. CD quality audio stores 44,100 samples per second. So if we were to create a 1-minute CD-quality wave file, it would be made up of the wave header followed by 2,646,000 16-bit numbers. A note about stereo All of the numbers listed so far have been for a single channel, which is to say, "mono." Wave files can also contain stereo sound by saving two separate channels, one for the left and one for the right. Of course, storing twice as many channels requires twice as much space, so one minute of full CD quality audio really requires 5,292,000 16-bit numbers, 2,646,000 for the left channel, and 2,646,000 for the right. This works out to about 10 megabytes per minute. Wave files are big. Using the code The tone of a sound wave is determined by its frequency, which is the number of times per second that it completes an up-and-down cycle. For example, middle C has a frequency of about 261.626 Hz or cycles per second. As we already know, CD-quality audio uses 44,100 samples per second. So, if we want to generate a CD-quality middle C, we have to create a waveform that repeats itself every 169 samples. 44,100 samples per second / 261.626 cycles per second = 168.56 samples per cycle. The following code will show you how to generate a 5-second middle C using the using (WaveWriter16Bit writer = new WaveWriter16Bit(new FileStream("c:\\test.wav", FileMode.Create), 44100, false)) double frequency = 261.626; double samplesPerCycle = writer.SampleRate / frequency; int totalSamples = 5 * writer.SampleRate; Sample16Bit sample = new Sample16Bit(false); for (int currentSample = 0; currentSample < totalSamples; currentSample++) short amplitude = 32000; double sampleValue = Math.Sin(currentSample / samplesPerCycle * 2 * Math.PI) * amplitude; sample.LeftChannel = (short)sampleValue; That may seem like a lot of work just to generate a single tone. Luckily, all that functionality is wrapped up in the SongWriter class. Using the SongWriter class, we can easily generate entire songs. Here's how to generate the first part of "Twinkle, Twinkle, Little Star:" using (SongWriter writer = new SongWriter(new FileStream("c:\\test.wav", FileMode.Create), 90)) Now before we continue, think about what we've just done here. Essentially, we've taken fine-grained control over our computer's speakers and we've manually positioned them (44,100 times per second) to create a physical vibration that, when it reaches our ears, sounds like "Twinkle, Twinkle, Little Star." We've just taken some elementary physics and trigonometry, and we've used them to create a children's song out of nothing at all. That's pretty cool. But what if I want to play chords? We've seen how to generate a sound wave that produces a tone, but what if we want to produce multiple tones at the same time? How can we generate multiple overlapping sound waves in a single wave file? Well, here's an interesting piece of acoustics trivia. Any two individual sound waves can be combined into a single sound wave that encompasses both of them. Let's have a look at what I mean. Let's say that you want to play a C note and a G note together. The two sound waves will look something like this: Now, let's slice them up and sample their positions: Notice that each slice has a sample for the first wave and one for the second wave. Now, for each slice, we just add the two samples together. It'll create an entirely new wave that sounds just like the two original waves combined. The resulting wave comes out looking like this: It's weird-looking, but when you play it, it'll sound just like the two original sounds played together. Once again, the SongWriter class does the heavy lifting for you as far as combining the notes, so you don't have to sweat the details. If you wanted to generate the melody of the 3 Stooges' "Hello" song, it'd look like this: using (SongWriter writer = new SongWriter(new FileStream("c:\\stooges.wav", FileMode.Create), 180)) writer.DefaultVolume = 5000; writer.CurrentBeat = 4; writer.CurrentBeat = 8; A word of caution Every time you add another voice to the wave, the maximum height of the wave increases. Remember that for a 16-bit wave, the highest valid point is 32,767 and the lowest valid point is -32,768. So, if adding a wave will result in a wave which has a point higher than the maximum or lower than the minimum, an overflow condition will occur. The resulting wave will sound terrible. So, choose your volume carefully to make sure that your wave always stays within the 16-bit boundaries. What practical value does any of this have? Apart from impressing the ladies, it probably has no practical value at all. Also, in the interest of full disclosure, I'll admit that it doesn't even impress the ladies very much. It's slow, processor-intensive, and the resulting music sounds much more like a stylized test of the Emergency Broadcast System than it does a piano. However, it's a very interesting application of the science of acoustics. It's also an opportunity to understand a little more about sound waves and sound files, and above all, it's just kind of cool. That right there is justification enough, as far as I'm concerned. Can I write a wave file to a memory stream and then play it in-memory? Yes. You have to be careful how you go about it, though. A wave file won't play until its header gets written. The WaveWriter class doesn't write the header information until you call Dispose() on it. By default, closing a WaveWriter object also closes its underlying stream. In the case of a MemoryStream, this renders it unusable. So, what we need is a way to dispose of the WaveWriter or SongWriter object without disposing of the stream that it has been writing to. In the latest version of the library, I've added constructor overloads to the WaveWriter and SongWriter classes. These allow you to specify that the underlying stream should not be closed. Here's a simple example of how to play middle C from a MemoryStream: using (MemoryStream stream = new MemoryStream()) using (SongWriter writer = new SongWriter( stream.Position = 0; using (System.Media.SoundPlayer player = Okay, so the Dead Fish Wave is not generally accepted as one of the common simple waves. It's actually something that my mom made up and drew freehand when I called her and told her about what I was working on. I haven't yet converted it to an actual sound file, but it's on my list of things to do. It's worth mentioning, though, that I have no reason to believe that the resulting sound will at all resemble the sound of an actual dead fish. Where should I go for more information? Of course, Google and Wikipedia are both good starting points. However, if you're looking to jump in head-first, I suggest that you read "The Physics and Psychophysics of Music: An Introduction" by Juan G. Roederer. Unless your local bookstore is much cooler than mine, you'll have to special order it. It's well worth it, though, if you're looking to sink your teeth in. Do you have the samples from "Minuet in G" and "Push It" available for download? Sure. If you don't want to download and build the code yourself, you can download the clips in MP3 format. Here's Minuet in G and here's Push It. Enjoy. - October 1, 2006 - Initial release - May 29, 2007 - Added support for generating in-memory wave files
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587623.1/warc/CC-MAIN-20211025030510-20211025060510-00204.warc.gz
CC-MAIN-2021-43
11,388
66
https://answers.yahoo.com/question/index?qid=20201201031417AAsX7ma
code
Does being a software engineer have good future prospects? - Michael MLv 62 months ago There is a lot of software engineering positions that have been created India and other countries by large corporations to reduce the expense of custom software development, however it has done little to decrease the salary of software engineers in the U.S. Fewer people are going into software engineering in the U.S. and it's causing a shortage of software engineers. I started 23 years ago in software engineering and I firmly believe that there will continue to be a need in the U.S. for the foreseeable future. There is also a common argument that software engineering will be replaced by some form of AI or ML in the future. I understand AI better than most people, having built my own ANNs. This will not happen anytime soon, and software engineering will be one of the last to go. I can make a strong argument for AI someday replacing any current job role in every industry. If you are thinking about going into software engineering because you like it and you think you'll be good at it, please go for it. - Anonymous2 months ago In India, yes. In the US and UK, not so much.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703513062.16/warc/CC-MAIN-20210117143625-20210117173625-00666.warc.gz
CC-MAIN-2021-04
1,171
8
https://builtwithdot.net/project/1495/system-io-isolatedstorage
code
"Provides classes that allow the creation and use of isolated stores.Commonly Used Types:System.IO.IsolatedStorage.IsolatedStorageFileSystem.IO.IsolatedStorage.IsolatedStorageFileStream When using NuGet 3.x this package requires at least version 3.4." "Unity interception enables you to effectively capture calls to objects and add additional functionality to the target object. Interception is useful when you want to mod…" "MailBody is a library for generating transactional html emails by using a fluent interface. It allows developers to quickly create transactional html e-mail, straight fr…" "Application Auto Scaling is a general purpose Auto Scaling service for supported elastic AWS resources. With Application Auto Scaling, you can automatically scale your A…" "This package is part of the Azure Mobile .NET Server SDK and provides authentication features. To learn more about Azure Mobile, go to https://azure.microsoft.com/mobile." Hello, I'm Corstiaan. I'm a .net developer from the Netherlands and I manage BuiltWithDot.Net. I created this site as a place where developers working with .net technology can showcase their projects and inspire other developers. There's so much you can build with .net these days that I thought it would be nice to have a corner of the web dedicated to the breadth of .net. Enjoy! Get weekly updates about new projects built with .net tech No spam. Unsubscribe any time.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178347293.1/warc/CC-MAIN-20210224165708-20210224195708-00394.warc.gz
CC-MAIN-2021-10
1,421
9
https://sparky-projects.co.uk/
code
Welcome to my Home After several years of using Googlesite, I decided it was time for my own domain I hope you like my new home, please feel free to browse the information on this site. To go with this site i have a You Tube channel, while i try to respond to any questions, i am not always notified, so if you have asked a question and haven't had an answer in a reasonable time, then please hop into discord or my forum. This is a site that documents all my projects. I have great interest in high voltage, Audio and Visual, and many other things. Please take the time to read this site, you will most likely find something of interest in some of your projects, I'm not just documenting my successes, but also my failures, but each failure is a learning process, just be careful you don't do the ultimate failure, [read any and all warnings] if you intend playing with voltages, even low voltage can kill in certain circumstances. This site may change as time goes by. You may freely link to any content or page. You may not hotlink any images etc You may copy any snippet of information providing you credit me with the creation
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817382.50/warc/CC-MAIN-20240419074959-20240419104959-00142.warc.gz
CC-MAIN-2024-18
1,131
8
https://iloginto.com/vlsc-login/
code
The login for Licensing.Microsoft.com has been found and verified. The Volume Licensing Service Center gives you access to download product keys. The VLSC login page is listed online. Please confirm you are using the correct VLSC login. If the entry online is empty, then at the time of adding the login to VLSC in our database nothing was found. If there is a entry online then at the time this archive login page for Licensing.Microsoft.com was created, the login page was: The Licensing.Microsoft.com login page meta data has been listed online for your convenience. You can compare this data to the real login page when you arrive in order to verify you are using the correct login for the VLSC website. Welcome to Microsoft Next Generation Volume Licensing Manage your Volume Licenses, download licensed products, and access product keys in one centralized location. Enter your Microsoft account email address and password, then click sign in. We do not archive the keywords for VLSC or any other listing in our archives at this time due to the lack of modern websites using them anymore. Licensing.Microsoft.com Domain to IP Address: In order to compare the real login to Licensing.Microsoft.com to an invalid page or to an updated sign-in for VLSC if the website is offline or has been redesigned, we have taken a snapshot of what the VLSC login page appeared as at the time of the archive and listed it online: You can rate the login page for Licensing.Microsoft.com if you would like. Please rate only once based on the look, functionality, and style of the VLSC sign-in area of the website. Tech Name: MSN Hostmaster Tech Organization: Microsoft Corporation Tech Street: One Microsoft Way, Tech City: Redmond Tech State/Province: WA Tech Postal Code: 98052 Tech Country: US Tech Phone: +1.4258828080 Tech Phone Ext: Tech Fax: +1.4259367329 Tech Fax Ext: Tech Email: [email protected] Name Server: ns2.msft.net Name Server: ns5.msft.net Name Server: ns4.msft.net Name Server: ns1.msft.net Name Server: ns3.msft.net More VLSC Login Resources: licensing.microsoft.com is hosted by Microsoft
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703528672.38/warc/CC-MAIN-20210121225305-20210122015305-00348.warc.gz
CC-MAIN-2021-04
2,097
30
https://jordifierro.com/taddapp-text-to-image-editor
code
Taddapp is an Android application that allows you to add text to images. It’s very easy to use and also very fast (you can open, edit and share an image with less than 10 clicks and 30 seconds). What is innovative and different from other apps is that this one has the fonts already setup, so the user doesn’t have to configure them (that makes the app easier and faster too). Furthermore, the fonts are pretty and carefully designed and there are lots of them. Thus, the app can be used in very different contexts, image types and styles, there are infinite combinations. After this brief introduction, I’m going to summarize the project history from inside: The idea was born a couple of years ago and our purpose was to develop the project as an experiment to learn, before starting something bigger. We were just my designer friend David Mundo and me. The idea was simple but we gave it an innovative touch with the fonts setup (apart from the usability and agility distinctions). We started developing the product and launched a prototype, which the user seemed to like. Nevertheless, after a few months the statistics became flat. We used to work on Taddapp in our free time so after releasing a few bug-fixing updates we had to put the project aside. A year later, people was still using the app so we decided to get back to work. We didn’t want to implement new features but to improve what we’ve done by adding more and better fonts, fixing some errors and improving the generated image quality. Finally, in September 2015, we launched Taddapp 2.0, which was also welcomed by the users and is still used today (around 5k unique users per month). The main goal of the project was to learn and I can say we have achieve it. Not only to learn about development and design stuff, but about creativity, UX, product, user testing, lean project management, analytics, release, community management, marketing… Although it is not a really successful project, we have enjoyed the process, we have reached our goals, we have made it and the most important thing: we use it and we are glad of it!
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334855.91/warc/CC-MAIN-20220926082131-20220926112131-00439.warc.gz
CC-MAIN-2022-40
2,106
7
https://www.medwelljournals.com/abstract/?doi=ajit.2007.902.906
code
Abstract: This study discusses the software process improvement through Secured Development Lifecycle (or SDL), a process adopted for the development of software that needs to withstand malicious attack. The process encompasses the addition of a series of security-focused activities and deliverables to each of the phases of software development process. These activities and deliverables include the development of threat models during software design, the use of static analysis code-scanning tools during implementation and the conduct of code reviews and security testing during a focused `security push`. S. Chitra and M. Rajaram , 2007. Software Process Improvement Through Secured Development Lifecycle . Asian Journal of Information Technology, 6: 902-906.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511284.37/warc/CC-MAIN-20231003224357-20231004014357-00567.warc.gz
CC-MAIN-2023-40
765
2
https://noelrappin.com/tags/gwt/
code
It’s not exactly part five of the four part GWT series, but it is closely related. Please check out my newest article on IBM Developerworks: Simplify Ajax development using Cypal Studio for GWT. I actually wrote this a few months ago, when the tool was still called Googlipse, and the final publication was delayed a bit while I rechecked all the code and instructions, and changed the name throughout. One note: it seems as though the GWT 1. Sorry for not mentioning this earlier, but part three of the GWT series is now up on the IBM site at: http://www-128.ibm.com/developerworks/opensource/library/os-ad-gwt3/ This one is about remote procedure calls, and I’m pleased with how it turned out. I just got the proofs for the fourth and final article in this series, about deployment. I expect it to be online Tuesday, Feb 27th at: http://www-128.ibm.com/developerworks/opensource/library/os-ad-gwt4/ The second part of my IBM Developerworks series on Google Web Toolkit is now online at http://www-128.ibm.com/developerworks/library/os-ad-gwt2/. This one focuses mostly on the Derby database, and features a really quick and dirty database-to-Java conversion tool. Enjoy. I’m happy to announce that Part One of my four part series on using Google Web Toolkit is now available at: http://www-128.ibm.com/developerworks/opensource/library/os-ad-gwt1/ This part focuses on creating a GUI front-end using GWT. In case you wonder about the lead time on these things, it was originally written in August, and slightly updated right before it was published. I think that the future part of the series will appear monthly. The next one is about using the Derby database as your back-end.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571993.68/warc/CC-MAIN-20220814022847-20220814052847-00241.warc.gz
CC-MAIN-2022-33
1,686
4
https://www.c5owners.com/sinclair-c5-forum/topic/127/x-pod-lcd-display-firmware
code
Okay here are the steps to download the Arduino software and to upload it to the Arduino Mega board for the display. 1. Navigate to http://arduino.cc/en/Main/Software and scroll down to the download links and download the Windows Installer file (http://arduino.googlecode.com/files/arduino-1.0.5-windows.exe 2. Locate the Arduino install folder (Mine is on the desktop, as you've used the installer yours will probably be here: C:\Program Files (x86)\Arduino ) and open the libraries folder and unzip the following attachments and place them in this folder: There will be other libraries in the folder, these do not matter as long as you have the 3 folders circled in Red installed there: 3. Download the C5_TouchV2.zip file and extract it somewhere. I usually have a folder called Arduino in the My Documents folder but you can put it where you like. 4. Start the Arduino editor: 5. Connect the Arduino Mega to the computer using the USB. Wait a moment whilst it installs the device drivers. 6. When the Arduino has been recognised and the drivers installed. Select the correct COM port for the Arduino from the Tools -> Seria Port menu: * Your COM port number will be different but it should be the only one in the list so select it. 7. Ensure the correct board is set in the Tools -> Board menu. You want the Arduino Mega 2560: 8. With those setting set, it's time to open the project up. Use the File -> Open menu to open up the project that you unzipped from C5_TouchV2.zip. If you placed the Zip in the My Documents -> Arduino folder then you can open it by selecting File -> Sketchbook -> C5_TouchV2: 9. When opened the program will appear and will look like this: 10. Now you're ready to upload to the Arduino. Simply click the Upload button: It will take a minute or so to upload, during this time the LED's on the Arduino will flash. Do not disconnect whilst it's uploading. When the uploading is complete you can disconnect the Arduino from the PC. The bar at the bottom of the Window will say "Done Uploading": posted on: 08/09/2013 07:23:34
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.17/warc/CC-MAIN-20231205105136-20231205135136-00248.warc.gz
CC-MAIN-2023-50
2,053
17
http://intodarkness.eu/manualne-zaczepianie-ls-2013.html
code
Download link is brokenThis mod may not be published on other sitesThis mod has been submitted with an invalid download linkThis edit was unallowed. Are you an original author of this mod? Your nick / name your email reason. Gallery, description, script for manual attaching all implements, cutters and trailers (on approach). # # This is a sample hosts file used by Microsoft TCP/IP for Windows.#idx ; which could also be written this way, using a trick that's come to be known as the Schwartzian Transform: my @sorted map _- 0 sort a- 1 cmp b- 1 map uc ( ds S 0) @data; If you need to sort.#20 Prison Tycoon, see, Introversion Softworks Prison Architect is actually not the first lockem.# existing text.bashrc file.#19 Dungeon Keeper, upending fantasy roleplaying genre conventions, Dungeon Keeper tasks the player with building and defending a mighty dungeon against invading heroes.#3 Best and Cutest Cat Vines Compilation 2014/2015.#8 Recettear, turning preconceived notions about genre on its head, this Japanese gem has the player run an item shop in a random RPG town.#3: Fun, San Diego-style : Have a blast at our opening night networking party held aboard the USS Midway aircraft carrier (All-Access attendees).
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590443.0/warc/CC-MAIN-20180719012155-20180719032155-00120.warc.gz
CC-MAIN-2018-30
1,221
5
https://paloma-blue.com/products/montauk-sandal-emerald
code
This timeless yet stylish flat sandal design transcends summer shoe trends to work season after season. A simple shape to work with any resort outfit, the leather and snake material which wraps around the ankle gives them flare and sophistication. Whilst a rubber sole heel base adds durability for a hardworking resort wardrobe. - Wrap Strap detail requires no fastenings - Water snake and leather upper - Non-slip rubber sole and heel for durability
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250609478.50/warc/CC-MAIN-20200123071220-20200123100220-00178.warc.gz
CC-MAIN-2020-05
451
4
http://flurrygamestudios.com/maps.html
code
Take a look for yourself I have designed the following maps with Unity3d Level Editor. The work you see here is all done by myself and I am the sole developer behind these maps and my project. Take a look at my Battle Royale Map I have created. My maps are designed with creativity and realistic scenarios. I really believe in the player feeling involved. Players should recognize the level of detail a level designer spends working on their map. Take a close look at the level layouts as well to see how the gameplay will unfold to players. Mapping is something that is crucial to a game, What would a game be without levels and environments? Nothing. Level Designing is something I am strongly passionate about. My work here is very important to me. I hope anyone who sees this will be impressed.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125936969.10/warc/CC-MAIN-20180419130550-20180419150550-00342.warc.gz
CC-MAIN-2018-17
798
2
https://www.thepythonquiz.com/questions/257/what-is-the-output-of-the-code-snippet-below-def-testij-ifi0-return-j-else-return-testi-1ij-printtest47/
code
The quiz where the difficulty automagically adapts to the player's Python knowledge This is a question page. You can use this page to bookmark a question. Start a new quiz! def test(i,j): if(i==0): return j else: return test(i-1,i+j) print(test(4,7)) The function will continue to call itself until i becomes 0. i and j will respectively become 4 and 7, 3 and 11, 2 and 14, 1 and 16. Eventually, 17 is returned. (programiz.com/python-programming/recursion) Question difficulty: 🔵🔵🔵🔵🔵
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656737.96/warc/CC-MAIN-20230609132648-20230609162648-00158.warc.gz
CC-MAIN-2023-23
498
5
http://searchsoa.techtarget.com/answer/Receiving-XML-from-a-SAS-Web-service
code
Receiving XML from a SAS Web service I am working with Visual Studio.NET and SAS. To communicate to SAS from the Web application, you use a CGI program called broker.exe. You post the variables to the broker file, and SAS returns the results. The HTML to format the results in a report can be written to the browser by writing additional SAS code. I would like to create a Web service that would receive the variables and pass them to the broker, which would pass them to SAS. SAS can return XML to the Web service, but how would I receive the XML from the Web service to display on the browser? It sounds like you already have a Web service in the form of the CGI script. Your problem splits into two. (1) how to get variables into broker.exe and (2) how to get XML back. For (1) you can mimick what a Web browser does with a form submitted to the cgi-script i.e. send a HTTP POST request to broker.exe. For (2) you need to look at what form broker.exe currently returns data in. If it is a formatted HTML page you many need to scrap out the bits you want in the XML. If it already is XML then it will most likely be coming back as a mime type text/xml and your HTTP posting program can pick it up easily as the This was first published in July 2003
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609538022.19/warc/CC-MAIN-20140416005218-00270-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,250
12
https://jarvis.bot/getting-started
code
A quick overview to get you going Getting Started with Jarvis Jarvis has heaps of great features to help you stay connected with your community in or out of your Live Stream. This getting started guide gives you an overview of some of Jarvis' core features, unpacks some of the language we use and covers the steps required to get you up and running with full Twitch and Discord integration. Getting Started with Twitch Jarvis has some great features to support your stream, like chat moderation, song requests via Spotify and an overlay you can add to OBS. Before you can do any of these, you must first connect Jarvis to your Twitch account. Using the 'Connect via Twitch' button above, connect Jarvis to your twitch account by signing in with your twitch credentials via Twitch.tv. Once you've signed in, you'll be redirected to the Streamer Dashboard, but with that one step, you're ready to get started with Jarvis! Using Twitch Commands There are heaps of great built-in commands to help you promote what's important to you, commands to moderate your community and for your mods to help manage your stream (like updating the game you're playing or the stream title right from chat). But, sometimes you will want to create your own commands To get started creating your own commands you need to know the syntax and some of the markup When invoking a command from Jarvis we use the ! symbol to identify a command from a regular word. To create your own commands you need to use the jarvis and the add keywords, plus the command and text that command represents. All together that might look like !jarvis add !social https://twitter.com/jarvisontwitch so that every time someone in your Twitch chat uses !social Jarvis will return the link to Twitter. You can find out more about the Twitch commands by visiting the Commands Page or using !commands in twitch chat to pull up the commands list at any time. Plus! If you have created your own custom commands, you will also see a third tab with all the commands you've created for your chat. We decided not to use the keyword command for creating commands because lots of people run multiple bots together, and we don't want to cause both bots to trigger at the same time. A quick note: Commands have mandatory ( < >) and optional ( [ ]) values that need to be included to make them work. Oh! One more thing, you don't need to use the brackets when using the commands in Twitch or Discord. Getting Started with Discord Get stream announcements and other perks to keep your community conencted between streams. From the menu or the Steam Dashboard sidebar select the Connect Discord Bot for the invitation link for Jarvis. Set the permissions for your server and you're ready to go. Configuring Stream Announcements Configuring stream announcements for your stream, members of your community, or people you follow is easy. Get started in 2 steps. - To get started use the !notifycommand in the text-channel you want to recieve notifications in — something like "Announcements" is usually a good pick. !follow <channel_name>for any twitch streamer (e.g. !follow rushisc). You can subscribe to notifications for as many streams as you like. That's it! You're setup and ready to start getting notifications. For more commands and features, check out the commands page.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945248.28/warc/CC-MAIN-20230324051147-20230324081147-00407.warc.gz
CC-MAIN-2023-14
3,317
34
https://saddlebagsally.com/2019/07/15/jbl-vs-regular-cardo-speakers-my-thoughts/
code
I install the Cardo JBL speakers and record what they sound like (with my cameras audio) to see if we can tell a difference. The JBL speakers are louder for sure, and when I put the helmet on, there seems to be more base coming through. You can also pick a sound profile by scanning the QR code in the package that comes with them to customize the speakers even further. 😘 Give the video a thumbs up if you enjoyed it, and subscribe for more motovlogs in the future! ❤️❤️❤️ ►My social media: @anti_parallali ►If you want to support the channel…❤️ 👉Check out my bikelife DNA keychain on http://bit.ly/Moto-Minds-Keytag Gloves Ladies version: http://amzn.to/2vxSljv Riding pants: http://amzn.to/2uDwgBf ►Get my Motovlogging Equipment: GoPro Session: http://amzn.to/2vVtNSD External microphone – http://amzn.to/2fGJFBJ Mic adapter cable for GoPro: http://amzn.to/2vCNLPt Yi4k+ camera: http://amzn.to/2uDz2Gs) Mic adapter cable for Yi4k: http://amzn.to/2vD0gKE Helmet front mount: http://amzn.to/2vCGWNB 3M Tape for camera mounts: http://amzn.to/2vyc9Dx I love riding motorcycles (#bikerchick 😉 )and uploading motovlogs or vlogs about topics that matter to me. My goal is always to leave you feeling better, smarter, happier, or more empowered than when you started watching this video. Thanks to my sponsors Cardo Scala Rider: http://bit.ly/CardoScalaRider MotoMinds YT channel: http://bit.ly/MotoMindsYT Intro music by Clozee – Mountain Legends Track: Lost Sky – Dreams [NCS Release] Music provided by NoCopyrightSounds. Free Download / Stream: http://ncs.io/DreamsYO
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027318952.90/warc/CC-MAIN-20190823172507-20190823194507-00337.warc.gz
CC-MAIN-2019-35
1,604
23
https://people.dsv.su.se/~jpalme/ietf/web-email.html
code
|The MHTML standard allows: ||But use today only: ||How to do this: |Existing web pages to be sent unchanged via e-mail, using the new Content-Location ||Use Content-ID for links between HTML text and in-line images, all mailers do not yet (April 1998) support Content-Location. ||Most mailers today (April 1998) produce Content-ID links to images if you use the text editor of the mailer to produce your messages. |Images can either be sent as parts of the message, or referenced from their web locations. ||Include images as part of the message, do not reference their web addresses. ||Edit the message with the editor built into the mailer. In Outlook Express and Netspace 4: Paste the image into the text you are writing. In Eudora 4: Save the image in a GIF file. Drag the file icon into the text you are writing. Do not paste the image into an Eudora 4 message, Eudora will put the image in a format which many other mailers cannot read. |All kinds of HTML features can be sent in e-mail. ||Avoid advanced HTML features unless they are essential for your message. ||Do not use any other HTML tags than the following: <b>, <i>, <underline>, <nofill>, <param>, <html>, <pre>, <smaller>, <bigger>, <center>, <flushleft>, <flushright>, <fontfamily>, <color>, <paraindent>, <h1>, <h2>, <h3>, <h4>, <h5>, <h6>, <em>, <strong>, <cite>, <address>, <title>, <head>, <body>, <blockquote>, <code>, <kbd>, <var>, <samp>, <tt>, <br>, <hr>, <a>, a <href>, <p>, <ul>, <ol>, <li>, <menu>, <dl>, <dt>, <dd>, <base href> In particular, do not use style sheets, tables or background colors or images. |The same message can be sent in the same message in both plain text and HTML format. The receiving mailer will only show the HTML version, if it supports HTML, otherwise it will only show the plain text version. ||Netscape, Outlook Express and Eudora (version 4.0.1) all allow you to produce and receive messages in this format. Be sure to get Eudora 4.0.1, since Eudora 4.0 does not support this feature. ||Outlook Express sends in this format by default. Netscape and Eudora 4.0.1 allows you to send in this format. |Filled in forms can be sent either via e-mail or HTTP. ||Since some e-mail readers read their e-mail off-line, it may be better to use the "mailto:" URL as the submission format for forms to be filled in by e-mail recipients. A disadvantage with "mailto:" is however that it will often not work for computer shared between several people, or where the user has not correctly initialized his browser with his e-mail address. ||Start forms with the HTML construct: FORM ACTION= "mailto:some-suitable-email@address" |The full ISO 8859-1 character set can be used in messages, and also other character sets if you specify them. ||Unusal (8-bit) character may not be handled correctly in HTML messages with some ||It is better to use the HTML encodings of unusual characters. For example, use "Ö" instead of "Ö" for the German character "O with two dots".
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00712.warc.gz
CC-MAIN-2023-23
2,960
48
http://wiilovemario.com/Playing+the+Orginal+Super+Mario+Bros+on+your+PC%2C+Mac+and+Nintendo+DS
code
Playing the Original Super Mario Bros on your PC, Mac and Nintendo DS After playing countless hours of the New Super Mario Bros., you kind of jones a bit for the original Super Mario Bros. We've put together a little guide on how to get the original Super Mario Bros on your PC, Mac or Nintendo DS. Let's start off with the Nintendo DS since its a sweet portable unit and it would feel like home for Mario to be on some new Nintendo hardware. First you're going to need some sort of Nintendo DS storage device - we're going to use the R4DS (any other compatible unit will do). Next you're going to need the NES emulator for the Nintendo DS and the Super Mario Bros game rom. The game rom will be a little tricky to acquire as it's not legal to distribute. We've written a little post on how to find roms using Google. You could also head over to this site and download one of the modified Super Mario Bros roms. It's basically the same exact game with a few different graphical changes that people have made. Ok, so now that you have the Nintendo DS NES emulator and Super Mario Bros rom, lets get started! Getting the original Super Mario Bros onto your Nintendo DS: - Plug your microSD into your computer - Copy the nesDS.nds onto the microSD - Create a directory called 'ROMS' on your microSD (this is optional, it just makes it more organized if you plan on adding more NES games) - Copy the Super Mario Bros game rom into the ROMS directory you just created. - Plug the microSD back in your storage device (we're using the R4 Revolution for DS). - Boot up your DS and launch nesDS.nds - Once nesDS has booted, you'll see the contents of your microSD on the bottom screen of your DS. Select the ROMs directory you created and within there you'll see the original Super Mario Bros. Click on the Super Mario Bros rom and you'll be on your way back to 1985 nostalgia. nesDS has a bunch of cool features like Save State where you can save your game anywhere and resume it later. My favorite feature is sort of a Rewind button. The left paddle button acts like a rewind.. so if you die in Super Mario Bros, just press the left paddle and the game will rewind what you just played. Just let go where you'd like to resume. It's sort of cheating, but what the heck! Getting the original Super Mario Bros onto your PC: - Download the NES emulator for PC, Jnes (v0.6) - Unzip and run the .exe - Load the Super Mario Bros. rom up and play! Getting the original Super Mario Bros onto your Mac: - Download the NES emulator for MAC, Nestopia (v1.4.0) for OS X - Double Click on the 'nestopia-140.dmg' file. - Load the Super Mario Bros rom file.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118743.41/warc/CC-MAIN-20170423031158-00313-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,634
20
http://lists.contesting.com/pipermail/tentec/1998-March/004406.html
code
[TenTec] Buying a TT OMNI VI+ Thu, 05 Mar 1998 16:57:32 -0600 I guess I want some email.... But, here is my questions. I am new to this reflector because I want to find out more about the OMNI-VI+. I've been asking around on other reflectors about this rig. I am not overjoyed by the current crop of Japanese rigs with their fancy DSP only stuff...or over price gizmos and gadgets. So, I am looking at the Omni-VI+ So, anyone out there want to tell me why I should sell the 850 and buy one? FAQ on WWW: http://www.contesting.com/tentecfaq.htm Administrative requests: [email protected]
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00431.warc.gz
CC-MAIN-2023-50
597
11
http://mails.dpdk.org/archives/dev/2015-December/030758.html
code
[dpdk-dev] [PATCH v5 1/3] vhost: Add callback and private data for vhost PMD yuanhan.liu at linux.intel.com Thu Dec 24 04:51:05 CET 2015 On Wed, Dec 23, 2015 at 11:00:15PM +0100, Thomas Monjalon wrote: > 2015-12-23 10:44, Yuanhan Liu: > > On Tue, Dec 22, 2015 at 01:38:29AM -0800, Rich Lane wrote: > > > On Mon, Dec 21, 2015 at 9:47 PM, Yuanhan Liu <yuanhan.liu at linux.intel.com> > > > wrote: > > > > > > On Mon, Dec 21, 2015 at 08:47:28PM -0800, Rich Lane wrote: > > > > The queue state change callback is the one new API that needs to be > > > > added because > > > > normal NICs don't have this behavior. > > > > > > Again I'd ask, will vring_state_changed() be enough, when above issues > > > are resolved: vring_state_changed() will be invoked at new_device()/ > > > destroy_device(), and of course, ethtool change? > > > > > > > > > It would be sufficient. It is not a great API though, because it requires the > > > application to do the conversion from struct virtio_net to a DPDK port number, > > > and from a virtqueue index to a DPDK queue id and direction. Also, the current > > > implementation often makes this callback when the vring state has not actually > > > changed (enabled -> enabled and disabled -> disabled). > > > > > > If you're asking about using vring_state_changed() _instead_ of the link status > > > event and rte_eth_dev_socket_id(), > > No, I like the idea of link status event and rte_eth_dev_socket_id(); > > I was just wondering why a new API is needed. Both Tetsuya and I > > were thinking to leverage the link status event to represent the > > queue stats change (triggered by vring_state_changed()) as well, > > so that we don't need to introduce another eth event. However, I'd > > agree that it's better if we could have a new dedicate event. > > Thomas, here is some background for you. For vhost pmd and linux > > virtio-net combo, the queue can be dynamically changed by ethtool, > > therefore, the application wishes to have another eth event, say > > RTE_ETH_EVENT_QUEUE_STATE_CHANGE, so that the application can > > add/remove corresponding queue to the datapath when that happens. > > What do you think of that? > Yes it is an event. So I don't understand the question. > What may be better than a specific rte_eth_event_type? The alternative is a new set of callbacks, but judging that we already have a set of callback for vhost libraray, and adding a new set to vhost pmd doesn't seem elegant to me. Therefore, I'd prefer a new eth event. More information about the dev
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986688826.38/warc/CC-MAIN-20191019040458-20191019063958-00184.warc.gz
CC-MAIN-2019-43
2,522
46
http://dblp.uni-trier.de/db/conf/dagstuhl/P7351.html
code
Dagstuhl Seminar Proceedings: Formal Models of Belief Change in Rational Agents 2007 : A logical formalism for the subjective approach in a multi-agent setting. : Semantic structures for one-stage and iterated belief revision. : Probability Logic and Logical Probability. : Propositional Relevance through Letter-Sharing: Review and Contribution. : A blueprint for deontic logic in three (not necessarily easy) steps. : Measuring Ranks via the Complete Laws of Iterated Contraction.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794868316.29/warc/CC-MAIN-20180527131037-20180527151037-00440.warc.gz
CC-MAIN-2018-22
482
8
https://forum.manager.io/t/start-date-in-cloud-edition/47398
code
I am facing a problem when setting the opening balances, especially for suppliers and customers, and when reviewing the topics, I found that the start date must be chosen, but I do not find this option in the program properties. Is there a way to put the transactions with the customer or supplier that took place before the start of the financial period How did you go with the approach described in the guides, specifically: There are also more specialized Guides on starting balances for customers and suppliers. For the record, start date is not a setting. It is just the date you start using Manager b Manager is a perpetual accounting application. As long as you did not set a lock date you can enter anything at any date in history. As @Tut says therefore there is no need for a start date as it would be the date of the earliest entry you make. I want to close the current period and start a fresh one with same inventory items &clients profiles is there any way to import all (inventory items & client’s profiles) or I must add it again one by one
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00212.warc.gz
CC-MAIN-2023-40
1,058
6
https://math.dartmouth.edu/~m46s20/homework.php
code
- The homework assignments will be uploaded on Mondays together with the new part of the script. - You are supposed to work on and submit the homework assignments in teams of 2 or 3 persons. - Your team have to submit it's solutions on Canvas until 6 am of the subsequent Monday (so approximately one week later). - Please upload your solutions as a single PDF file. This PDF can either be a LaTeX document or a scan of your solutions (no photos, please). If you don't have access to a scanner, there are many apps with which you can scan one or multiple pages using, for instance, your mobile phone's camera. Personally, I prefer the Dropbox app. - Once a week (probably on Wednesdays), I will set up a private Zoom meeting with every team (roughly 30 minutes). During these meetings, you will get feedback on your homework and you will have the opportunity to consult me regarding the material in the script as well as the next homework assignment.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499967.46/warc/CC-MAIN-20230202070522-20230202100522-00398.warc.gz
CC-MAIN-2023-06
950
5
https://community.juniper.net/answers/communities/community-home/digestviewer/viewthread?GroupId=121&MID=70942&CommunityKey=3f850801-038e-4123-b639-82ed4eb777ec&tab=digestviewer
code
I've got a strange problem with my EX4550 I get an error saying that the storage is full. Show system storage displays this root@ex4550-sheehan> show system storagefpc0:--------------------------------------------------------------------------Filesystem Size Used Avail Capacity Mounted on/dev/da0s1a 340M 129M 183M 41% /devfs 1.0K 1.0K 0B 100% /dev/dev/md0 68M 68M 0B 100% /packages/mnt/jbase/dev/md1 5.8M 1.1M 4.2M 21% /packages/mfs-fips-mode-powerpc/dev/md2 2.9M 2.9M 0B 100% /packages/mnt/fips-mode-powerpc-12.3R5.7/dev/md3 9.0M 4.4M 3.9M 53% /packages/mfs-jcrypto-ex/dev/md4 12M 12M 0B 100% /packages/mnt/jcrypto-ex-12.3R5.7/dev/md5 8.1M 3.5M 4.0M 47% /packages/mfs-jdocs-ex/dev/md6 6.2M 6.2M 0B 100% /packages/mnt/jdocs-ex-12.3R5.7/dev/md7 43M 39M 700K 98% /packages/mfs-jkernel-ex/dev/md8 108M 108M 0B 100% /packages/mnt/jkernel-ex-12.3R5.7/dev/md9 12M 7.9M 3.6M 69% /packages/mfs-jpfe-ex45x/dev/md10 22M 22M 0B 100% /packages/mnt/jpfe-ex45x-12.3R5.7/dev/md11 17M 12M 3.2M 79% /packages/mfs-jroute-ex/dev/md12 38M 38M 0B 100% /packages/mnt/jroute-ex-12.3R5.7/dev/md13 12M 7.2M 3.6M 66% /packages/mfs-jswitch-ex/dev/md14 21M 21M 0B 100% /packages/mnt/jswitch-ex-12.3R5.7/dev/md15 14M 9.5M 3.4M 73% /packages/mfs-jweb-ex/dev/md16 25M 25M 0B 100% /packages/mnt/jweb-ex-12.3R5.7/dev/da0s3e 239M 239M -18.8M 109% /var/dev/md17 126M 12K 116M 0% /tmp/dev/da0s3d 702M 138K 646M 0% /var/tmp/dev/da0s4d 116M 154K 106M 0% /config/dev/md18 118M 22M 87M 20% /var/rundbprocfs 4.0K 4.0K 0B 100% /proc/var/jail/etc 239M 239M -18.8M 109% /packages/mnt/jweb-ex-12.3R5.7/jail/var/etc/var/jail/run 239M 239M -18.8M 109% /packages/mnt/jweb-ex-12.3R5.7/jail/var/run/var/jail/tmp 239M 239M -18.8M 109% /packages/mnt/jweb-ex-12.3R5.7/jail/var/tmp/var/tmp 702M 138K 646M 0% /packages/mnt/jweb-ex-12.3R5.7/jail/var/tmp/uploadsdevfs 1.0K 1.0K 0B 100% /packages/mnt/jweb-ex-12.3R5.7/jail/dev Which seems to indicate the problem lies somewhere in the /var directory du -h in /var shows this root@ex4550-sheehan:RE:0% du -h2.0K ./.snap2.0K ./bin2.0K ./crash2.0K ./cron/tabs4.0K ./cron2.0K ./db/entropy2.0K ./db/ext2.0K ./db/fsad2.0K ./db/gtpcd2.0K ./db/certs/common/key-pair2.0K ./db/certs/common/local2.0K ./db/certs/common/certificate-request2.0K ./db/certs/common/certification-authority2.0K ./db/certs/common/crl 12K ./db/certs/common4.0K ./db/certs/system-key-pair4.0K ./db/certs/system-cert 22K ./db/certs2.0K ./db/commit-queue306K ./db/help2.0K ./db/leases2.0K ./db/scripts/commit2.0K ./db/scripts/event2.0K ./db/scripts/op2.0K ./db/scripts/lib 10K ./db/scripts2.0K ./db/zoneinfo2.0K ./db/persistent_mac2.0K ./db/dhcp_snoop386K ./db4.0K ./etc/filters2.0K ./etc/ssl-/local2.0K ./etc/ssl-/peer2.0K ./etc/ssl-/certificate-authority8.0K ./etc/ssl-2.0K ./etc/ssl/local2.0K ./etc/ssl/peer2.0K ./etc/ssl/certificate-authority8.0K ./etc/ssl2.0K ./etc/ssl+/local2.0K ./etc/ssl+/peer2.0K ./etc/ssl+/certificate-authority8.0K ./etc/ssl+228K ./etc2.0K ./etcroot/ssh 98K ./etcroot2.0K ./home/b4.0K ./home2.0K ./log/ext2.0K ./log/ggsn/gtppcdr4.0K ./log/ggsn2.0K ./log/flowc/failed4.0K ./log/flowc1.2M ./log2.0K ./mfs/var/tmp 82K ./mfs/var/shmipc/if-rtsdb 84K ./mfs/var/shmipc 88K ./mfs/var 90K ./mfs2.0K ./run/ext2.0K ./run/named2.0K ./run/ppp154K ./run2.0K ./sw/pkg4.0K ./sw2.0K ./tmp/.snap2.0K ./tmp/vi.recover2.0K ./tmp/install2.0K ./tmp/pics2.0K ./tmp/gres-tp2.0K ./tmp/rtsdb 14K ./tmp4.0K ./root2.0K ./empty2.0K ./account2.0K ./at/jobs2.0K ./at/spool6.0K ./at2.0K ./backups2.0K ./transfer/config4.0K ./transfer2.0K ./heimdal106K ./jail/etc4.0K ./jail/run2.0K ./jail/tmp/uploads4.0K ./jail/tmp116K ./jail2.0K ./mail2.0K ./msgs2.0K ./named2.0K ./preserve2.0K ./validate2.0K ./logical-systems2.0K ./rwho2.0K ./spool/lock2.0K ./spool/lpd2.0K ./spool/mqueue2.0K ./spool/opielocks2.0K ./spool/output/lpd4.0K ./spool/output 14K ./spool2.0K ./yp2.0K ./rundb/.snap2.0K ./rundb/private 10K ./rundb/sdb/shmem520K ./rundb/sdb 22M ./rundb 24M . Which doesn't appear to match in terms of size used Earlier I did have a 230-240Mb httpd.log in /var/log which I deleted - but it doesn't appear to have made a difference in the reported size. Does this require a restart of the switch to update? Switch is running 12.3R5.7 and has been up for 818 days, so it's probably due a reboot. Any help would be greatly appreciated Have you tried request system storage cleanup ? Yes, tried that. root@ex4550-sheehan> request system storage cleanupPlease check the list of files to be deleted using the dry-run option. i.e.request system storage cleanup dry-runDo you want to proceed ? [yes,no] (no) yes fpc0:--------------------------------------------------------------------------error: Rotating files failed: newsyslog: log_trim: fclose: No space left on devi ce Is the response from this command. I assume you get the same error without the dry run option attempting the actual clean up. I would agree that a restart is a next good option to see if the issue clears or at least releases whatever locks are preventing the storage cleanup from working. I would rather manually delete old logs and then try request system storage cleanup again. % rm /var/log/*.gz With full filesystem there is risk that switch will not come up. if someone still has the same issue try this: du -sk /var/* | sort -nr | head It finds files which was not clearly removed.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178385984.79/warc/CC-MAIN-20210309030723-20210309060723-00524.warc.gz
CC-MAIN-2021-10
5,301
24
http://climdyn.usc.edu/projects/6_accede/
code
Abrupt Change in Climate and Ecosystems J.E.G. is involved in an international project led by NAU’s Nick McKay to address the following scientific questions: 1) Where are the tipping elements in Earth’s climate and ecosystems? 2) What are the dynamics of ecosystems-climate feedbacks that drove rapid desertification in subtropical North Africa 6,000 years ago? And 3) where can climate models with realistic forcings simulate changes comparable to those observed? The Abrupt Change Toolkit, written in R, is the essential output as of writing (October 2021) Support for ACCEDE is provided by the Belmont Forum via the National Science Foundation.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646144.69/warc/CC-MAIN-20230530194919-20230530224919-00353.warc.gz
CC-MAIN-2023-23
651
4
http://frontend.spiceworks.com/topic/471321-the-perils-of-chatting-xp-eol-with-users?from_forum=4590
code
Its not the End Of Life that bothers me, its the fact that Windows Vista was Crap, which led users to get New Computers with XP installed as recently as 2010. Now they have a 4 - 5 year old computer with an unsupported OS. Those are the people who are the most angry, and I understand why. Computers bought in 2007 - 2009 (pre-windows 7) were forced to use XP in order to get good performance and compatibility of their computer. And now, to have the OS no longer be supported, its just harsh! M$ should give Windows 7 away for free to all people who bought a computer after 2007 that came with Windows XP. There was nothing wrong with Vista, other than negative hype and OEMs selling under-powered computers, any "issues" were fixed by service packs. Also, if they bought a computer in the Vista era, they got Vista with an XP downgrade, they still have a Vista license and can move to that for $0. Obviously a moot point because it's history but I have to say, I've seen this said I can't count how many times and I always have to disagree. Vista got the negative hype it deserved. Do a side by side with Vista on the same exact hardware compared to Windows 7 and you will see a difference. Not clean install, both completely patched up. Windows 7 is much faster. Vista was a turtle. :) Good example I can give you. On a clean install that I ran all updates on I did a side by side with some Vostro 320's (I believe that was the model number). I installed Quickbooks 2013 on them both. What took about 18 minutes to complete on Windows 7 took 33 minutes on Windows Vista. Identical hardware. Same memory, same drive, etc. I then reformatted the Vista machine and installed and updated 7 on it. Installed QB in about 19 minutes. Only difference, Vista. Sorry, just had to vent that... Back to the topic... I've told clients for months about the XP EOL and they just gave me that blank stare like I was speaking another language. I explained there would be no more updates and that as new security holes were found they would not be fixed. I think most people really have no idea what updates are even for. They seem to think it's just something Microsoft does to annoy them. But sure enough when MSE started to notify them it was ending they freaked out and called me. Maybe MS should roll out a late night patch that puts a huge box on the screen tomorrow morning for XP that says "Your computer needs replacement, call your IT guy!". :)
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662573053.67/warc/CC-MAIN-20220524142617-20220524172617-00008.warc.gz
CC-MAIN-2022-21
2,439
10
https://atom.io/packages/wordpress-dictionary
code
Snippets of all WordPress functions, filter hooks and action hooks for Atom editor. Run the following command: apm install wordpress-dictionary Alternatively go to Atom > Preferences > Packages and search for See Release Notes Good catch. Let us know what about this package looks wrong to you, and we'll investigate right away.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710771.39/warc/CC-MAIN-20221130192708-20221130222708-00512.warc.gz
CC-MAIN-2022-49
328
7
http://www.sattvhelp.com/forum/all-other-openbox/27548-skybox-f5-channel-list.html
code
skybox f5 channel list? is it possible to get a channel list for this box and if so where can i obtain it from.... Originally Posted by melttc as far as im aware the list for the x5 is the same, you can get it hear:http://www.sattvhelp.com/forum/showt...box-openbox-x5 there are some Difference in the way you nav round the f5, this is from Memory and may differ?? ( iv not got the box any more ) goto systemsetup, on next screen scroll down to edit channel push right on remote control, scroll down to load DB hit ok, it should pop up with the usb drive, hit ok again then look for the list then hit ok and you should be sort'd if that dont work let me know. hope this helps Originally Posted by slyboxhd DONT put an X5 List on and F5 they are different. An f3 list will work and so will an m3 list. Here is one for u i think someone needs to confirm that the f5 and x5 files are either the same or different... bit of conflicting info going on in a few threads that ive read. as far as im aware the f5 and x5 have totally different files so they wont work on each others boxes... Thanks for your concern m8 I dont have any experience with any off the mentioned boxes, have you got both I would appreciate your help if you do thanks will give this a shot soon Originally Posted by colly sorry this took so long i dont have this box anymore but willing to help :) as iv said i dont have this box anymore and stand buy wot i post'd but add that you must delete all fav names before you load list and have to say colly has a point that f3 28.2e channel list will work with f5 BUT DO NOT PUT ANY F3 MULTIY CHANNEL LIST ON ANY F5 AS WILL BRICK YOUR BOX, with these box's there any to much straight forward with them and thats why im only getting back about this. thanks to AJ, lutz, mtn for clearing this up and big thanks for the channel list to sute ALL THAT CAN ONLY BE FOUND HEAR!Mast 16-03-2013.rar the floor is open! i have experience of the f5,,, and found out that the f5 and x5 do indeed use different channel list formats. Originally Posted by cuebase the f5 uses a TP_PROG.dbs format list and the x5 uses a .bin file. probably best not to mix them up lol. so SKYBOX F5 OPENBOX ETC USES = TP_PROG.dbs SKYBOX X5 OR ANY BOX ENDING IN X? WILL USE A = .BIN FILE. problem with these boxes is if you just upgrade the channel list that mixes up the favs names which isnt the end of the world but a pain. the best way to do it is to update the whole image which allready has a channel list built in, as that keeps everything hunky dory but of course you would still need a working cline or nline then. which i would hope the user backed up before the upgrade of the image. heres a guide i wrote for another forum (sorry mods) but it might be helpful to some of you guys here... any links probably wont work as i just copied the whole thing from one of my stickies on another forum. so use as a guide only. when i first got one of these boxes and opened the parcel the box when first powered up had the menu on screen and it said no channels, so i had to go through the menus to find the sattellite installation menu, in there i added astra to the list of sats then had to go to channel search to do a scan, this dragged all the astra channels in then i had to stick a channel list and my gift line on the box as well as configure the network stuff... ive tried to include everything i have had to do below... hopefully its pretty close to how it really is!! link to list deleted how do I put this list on to my box? Firstly, before any upgrade you should always backup! How do I backup? Make sure your USB is plugged in then navigate to; > Menu > Tools > Dump by USB > Change Dump Mode to "Misc File" > Click on "Select and Dump" > Select "TP_PROG.dbs" so it has a tick next to it then press yellow to "Dump onto USB", this will backup your channel list. > To backup your Server/Gift whatever you want to call it just select the "CCcam.cfg" or newcamd.list file instead of "TP_PROG.dbs". to back up the entire image choose image in the menu then dump to usb > The required backup should now be on your usb stick, make sure to move it to your pc or be careful not to delete it. Will updating my channel list effect my server settings etc? No, your channel list is the only thing that's affected but it's always wise to backup just in case as problems can happen. This is for channel lists only, firmware updates erase everything. Why are my favourites not named correctly? Favourites only retain their name if you upgrade a whole image, for channel list upgrades you'll need to manually change them in the Openbox menu with your remote. how do i rename the favorites? note similar for other boxes too, but if your menu is slightly different use a little trial and error it will be similar: Select favourites edit > red button group > select satellite > select channel and highlight with ok button > press fav button This will display favourites group lists > move down to group required > press change button to right > press ok button i could go on and list slightly different methods for each box but this is long enough as it is, and the variations will not be too dissimilar to the above for your box. How do I edit the order of the favourites? The only simple way would be to use SetEditHD100, the program isn't free but It'll let you make 25 changes before it stops working. The file is corrupted, not found or won't download Have you unzipped it? If that's not the issue try downloading with a different browser/device, make sure your zip program is working correctly or use a different USB stick. Some HD channels won't tune in or have low signal. You might need to do a transponder/full scan to try & find a duplicate channel with a stronger signal, if that doesn't work I'd change the firmware & if you're still having issues you might need to slightly realign your dish (not recommended if you don't know what you're doing). Which boxes is this list compatible with? Skybox/Openbox S9, S10, S11, S12, F3, M3,, F4, F5 AnD NEWER BOXES, basically any box that uses the same file format (.dbs) to add a cline or nline: Turn on F5, let it boot up and put USB in the back Using remote control, press Menu ---> Network Local Settings type 6666 on remote and a hidden menu called camds should show up in the network menu, do not go into the network menu completeley just have it showing on screen before typing 6666 Select Camds Setup -->ok ---> mgcam Client Setup --> ok Select Update Files by USB Select newcamd.list (which is your Nline that is installed on the root of your USB) Then you have options to Add or Read or Cancel add this then exit and reboot. the line is added and activated by doing it this way. for cccam or clines change the above to cccam client etc etc to check network settings. go back into network menu click on network settings, you want ethernet to be active (green) make it active if it isnt, if it wasnt the box will reboot, your not done yet! when rebooted go back into network menu and choose network set up again, now choose under ethernet settings/menu, go into here and turn dhcp to on, save and exit. reboot again. your box should now connect to the net and decrypt the channels for you. please note, please read the whole of above before attempting any updates, there are other tutorials which will help you to update too, it might be wise to read through a few so you get the jist of how easy it is before you start, any changes to boxes can make them not run well or crash so follow the back up advise above,, you cant blame anyone but yourself for not doing this! updates are not always good for boxes,,, use the above info at your own risk... i have personally updated many boxes both image wise and channels and never really had any major problems. as noted above the favs sometimes change name when you update them into your box so you will have to manually rename them. Nice post quavis very much apprciated hope you visit us often i dont see why not.... im usually about somewhere on the net annoying people lol... seen a few interesting places to visit on your forum and just read i can use links to other forums too,,, thats good makes a ncie change to see. Originally Posted by cuebase Tags for this Thread
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718309.70/warc/CC-MAIN-20161020183838-00265-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
8,254
83
https://indulgencezine.com/is-exipure-safe-to-use/
code
Is Exipure Safe To Use Exipure is an all-natural dietary mix that sustains healthy weight management by converting white fat into brown fat. This supplement makes use of a special means to eliminate additional fat in the body that is or else split and makes a person exceptionally overweight.Is Exipure Safe To Use The conversion of white to brown fat is made possible utilizing all-natural ingredients with tested medicinal advantages. Absolutely nothing inside Exipure is obtained from untrusted or artificial sources; as a result, it brings no wellness risks. This supplement is presently up for sale at a special affordable rate online. Diet plan tablets are preferred for many reasons, yet individuals favor using diet regimen tablets because they desire an effortless weight-loss experience. The normal suggestion of fat burning includes adhering to a restrictive diet plan as well as indulging in strenuous exercise. While these two can help in most cases, there are additionally chances for them to be inefficient, as weight gain reasons vary in every person. Sometimes, even the most renowned diet strategies fail to work, or it is unaffordable for individuals to hire a personal trainer or take out time for workout on a daily basis.On the other hand, using diet plan tablets and anticipating the body to lose weight on its own audios very easy, plus diet tablets set you back less than a weight management surgical treatment, so individuals prefer to use them. Exipure is among the current enhancements in the diet regimen tablets that are chosen these days. In spite of being a brand-new item, it is receiving a warm welcome, mainly because it has actually helped individuals attain their target weight without triggering a monetary problem. But the threat of attempting a brand-new item remains the same, specifically for a person who has never attempted a nutritional supplement before.Is Exipure Safe To Use How to be sure if it is risk-free to use? What are its components and also where to acquire Exipure? Find out done in this Exipure review. REQUIREMENT SEE: “Essential Brand-new Exipure Record Will Surprise You – Have To See This Before Buying” What Is Exipure? Exipure is a weight loss supplement constructed from all-natural components with medically shown advantages. It results from years-long study on medical plants, intending to find the best alternatives for natural weight loss. Is Exipure Safe To Use As plants have been utilized for hundreds of years in various therapies, researchers think some of them can also help versus weight problems. In this effort to discover these plants, they came up with eight exotic active ingredients, each contributing in losing undesirable fats. As stated on exipure.com, this supplement works equally well on men, females, and individuals that determine themselves apart from this binary category. It is a non-prescription formula, but only those that are 18 years and also over can utilize them. Exipure is available in capsule form, and there are 30 of them in each bottle. This one container is to be consumed in one month, ideally, as well as the very best results are observed within a couple of months. Although the supplement sector has lots of similar products, weight-loss with Exipure is one-of-a-kind. It works by changing the common white fat to brown fat, also called brown adipose fat. The all-natural components inside this supplement help in this conversion, and also the body loses a great deal of calories during this conversion. One of the most vital and one-of-a-kind quality of Exipure is that it goes inside the body and targets the main source of weight gain. It works to enhance metabolic rate and also control anxiety and also swelling inside the body. Furthermore, Exipure is a US-made item prepared in an FDA-approved and also GMP-certified facility. The end product is checked with a third-party research laboratory for top quality as well as safety and security. There are least chances of it going wrong and also bringing up an unwanted effect. Continue reading to understand more concerning Exipure action, components, as well as pricing. Exipure Ingredients List The main internet site of Exipure states eight unique active ingredients inside this formula. These components are picked after going through thousands of studieson each, verifying them a suitable option for this formula. They are gotten from numerous locations, as well as there is no certain info on each ingredient’s area in particular. Right here is a list of all Exipure components and also their effects on the body. - Perilla: the first name in Exipure ingredients is perilla, also called beefsteak plant. There are many studies validating its impact on cholesterol levels, as it stabilizes the HDL and also LDL levels as well as aids in brown fat formation. Some of its substances additionally offer cognitive benefits and enhance brain-to-body sychronisation. - Divine Basil: following is Holy Basil, a component with proven medicinal benefits. It relieves stress and anxiety, and inflammation, the two biggest triggers of a sluggish metabolism. Is Exipure Safe To Use It likewise clears the body from contaminants, waste products, and also mobile waste, keeping ideal metabolic problems for the body. - White Korean Ginseng: Exipure tablets also include Panax ginseng or Oriental ginseng, which offers unrivaled power to the body. This power helps the body run its functions in spite of reducing weight, and there is no lethargic or weak feeling experienced by the body. - Amur Cork Bark: not as popular as other components, yet amur cork bark supplies metabolic benefits that make weight management very easy. Is Exipure Safe To Use It alleviates bloating, diarrhea, aches, nausea, windiness, and also various other problems that prevail in obese individuals. - Quercetin: Following on this listing is quercetin, a component offering advantages for high blood pressure, heart health, and also vessel health. Some research studies additionally confirm its function in boosting immunity, delaying aging, and renewing body cells, keeping them young for a long time. - Oleuropein: occasionally referred to as Olea Europaea, oleuropein reduces the fat cells, helping them change to brown fat while losing a lot of energy made use of to sustain cellular tasks. It even more boosts cholesterol levels, high blood pressure, sugar levels, and lipid profile, avoiding many health and wellness problems. - Berberine: an additional name in the Exipure ingredients listing is berberine, which is packed with anti-inflammatory antioxidants. It assists remove the body from contaminants, removing cost-free radicals and also mobile wastes that occasionally hinder metabolic process. It sustains healthy and balanced digestion, and with quercetin, it melts much more fat in less time. - Resveratrol: the surname in Exipure active ingredients is resveratrol, an antioxidant typically found in grapes. It provides a number of health and wellness benefits, one of which is to lower cholesterol levels, prevent plaque development, and clear contaminants. All these active ingredients are obtained from pure high quality resources, and nothing among them can trigger any side effects in the body. Review what Exipure assesses from clients as well as their shocking discoveries have to state about this supplement. Is Exipure Safe To Use Is it truly worth investing money on? Look into this in-depth record which will certainly surprise you. Exactly how Does The Exipure Solution Job? Gaining weight has ended up being much easier because of the altered way of living as well as dietary habits. Not just grownups, yet more youthful as well as older individuals are likewise victims of weight problems now, and also these fads are increasing each year. Is Exipure Safe To Use The wellness experts are very concerned over these obesity fads, recommending individuals move to a healthier way of life. Yet it is frequently not a choice, and for some reason, people often tend to seek faster ways to make it take place. Exipure is a weight loss nutritional formula developed with metabolic-boosting herbs. According to the business, it helps alter the white fat cells to brownish fat, making them more useful and also healthy for the body. There is a lot of clinical evidence suggesting BAT is linked with weight problems. The manufacturers of the Exipure fat burning supplement have actually used this information and developed a formula that utilizes natural components to elevate brown fat levels. For people who do not know concerning brownish adipose tissues, it is a type of fat that just turns on when the weather is chilly. It melts, providing warm to the body, that makes cold temperature level bearable for it. Do not perplex this brown fat with the normal fat, additionally called white fat, as it lugs more mitochondria in its cells, making this fat melt more energy release. This process sheds a multitude of calories, maintaining the body heated, energized, as well as causing weight management. Where To Buy Exipure? Cost, Price Cut as well as Refund Plan Exipure is presently in supply and also offered for instant distributions. The only means to obtain your hands on this supplement is via its official site (exipure.com), as it is not available anywhere else. You can put the order online, straight, and also your order will certainly reach your doorstep within a few days. Do not rely on any online or neighborhood supplier selling Exipure supplement for fat burning. Is Exipure Safe To Use The business has no companions, and also there are high opportunities of various other business utilizing its name to sell their phony products. Constantly pick the main internet site over the random online shops to make your acquisition. The real rate of the Exipure supplement is almost $200, however it has minimized it to $59 only, as a part of promos, to make sure that increasingly more people can know about it. Right here are the complete pricing information. - Obtain one container of Exipure (one month supply) for $59.00 just (Plus shipment charges). - Obtain 3 containers of Exipure (90 days supply) for $49.00 per bottle (Plus delivery costs) + Bonus items. - Obtain 6 containers of Exipure (180 days supply) for $39.00 per container (Free shipment) + Perk things. Although it is much better to get only one bottle initially and buy more later, after utilizing it for a couple of days. But Exipure might not be available all the time, as it is a prominent item with high need. The company can just manufacture a restricted supply, and restocking could take a few months. Consequently, it is much better to purchase 3 or 6 bottles to begin a weight management journey. You can constantly order even more bottles when offered as well as proceed using them for as long as you require. It is also crucial to note that Exipure Australia, NZ, Canada, UK, and customers from other countries around the globe should likewise place their orders on the official website mentioned above. Exipure Reimbursement Policy. Exipure features a 100% complete satisfaction warranty as the business is ready to refund the full order worth, if this item fails to satisfy your assumptions. There is no minimum or maximum to get this offer and all orders bought via the main site will instantly be a part of this reimbursement plan. The business relates to client contentment as its top concern and prepares to birth a loss, if Exipure falls short to accomplish its pledges. The time needed to get this refund is 180 days, or 6 months, that is enough to judge this supplement. The firm has an active client support group ready to assist brand-new and also existing users. Contact the consumer care to understand the procedure of reimbursements. Likewise, do not discard your made use of or empty Exipure containers, as you might be asked to send them back to the firm as a receipt. Do not trust sources other than the official site to obtain your Exipure order as this reimbursement policy does not use on containers purchased from unapproved sources. The refund demands received after passing this 180-day restriction will be rejected by the business, so keep a track of this time. Directions To Make Use Of Exipure Supplement. Using Exipure is no various than utilizing multivitamins, and also you only need a glass of water to consume it. The everyday dose is just one pill, and also taking a higher dose is purely prohibited. Is Exipure Safe To Use There is no set time to take this daily dosage, as well as you can take it at any time of the day. Nevertheless, it is much better to take care of a time to consume it to make sure that you do not fail to remember or miss the day-to-day dose. The results appear within 3 to 6 months, yet it can be utilized for longer than 6 months, as well, as it has no side effects to supply. Though individual outcomes may vary, Exipure is for everybody, regardless of weight, however very overweight people may take more than six months to reach their target weight. Absolutely nothing inside Exipure has an addicting possibility or withdrawal impact, as well as you can use it over and over without stressing over anything. Others who are only a few pounds over their target weight will only see adjustments in a couple of weeks. The time needed to reveal the outcomes relies on the body’s ability to reply to various active ingredients, as well as no two bodies share the same functions. Do not use Exipure if you are uncertain regarding its use, or talk to a doctor to read more about supplement safety and security. Exipure Reviews – The Verdict. To sum up, Exipure seems a potent weight-loss supplement, with straight advantages for the metabolism. It uses a healthy way to lose weight, which is why the results of the Exipure supplement are longer and much better. Actually, they continue to be the exact same after you stop making use of the supplement and also preserve the results with fundamental nutritional modifications and also exercise. All orders are secured with a 180-day money-back guarantee, during which you can choose to obtain a refund of your order if it falls short to help you in weight loss. Do not take more time since Exipure is marketing fast, as well as there are only restricted containers left. Visit the official site to validate your order before the supply sells out. ( LOW STOCK ALERT) Click On This Link to Acquire Exipure From The Official Website While Supplies Last. Exipure Real Reviews: Frequently Asked Questions (FREQUENTLY ASKED QUESTIONS). What is The Correct Time to Take In Exipure? There is no standard time to utilize this supplement, and also the individual can take it as per his comfort. The company makes certain there is no sedative component; consequently, Exipure does not affect the resting cycle. Is Exipure Safe To UseHowever, it is best to take it throughout the first half of the day so that it has all the time to activate BAT conversion. Is Exipure Suitable For Every Person? Based on the details shared online, Exipure has a 100% natural formula without any GMO components, soy, and gluten in it. It is also without unnecessary chemicals, fillers, binders, as well as chemicals that might make an item unsuitable for long-lasting usage. The formula is best for individuals in their middle ages, taking care of excessive weight with no time to diet preparation or workout. How Much Weight Can One Lose with Exipure? The quantity of fat burning can be different for various individuals, as well as there is a standard for this weight loss. One can shed more weight in less time by eating Exipure diet tablets in a healthy and balanced, low-calorie diet regimen and also an energetic lifestyle. Can You Get An Allergy From Exipure? Exipure has no risk of adverse effects as well as allergies, as well as it is uncommon to have allergies with medical ingredients, in general. There are no complaints from the customers, as well as no user reported an allergic reaction after utilizing this formula. If an individual has a history of food-borne allergic reactions, it is better to speak with a medical professional ahead of time for a risk-free weight-loss experience. Exactly How To Call Exipure Business? The company has an active consumer assistance line to help with brand-new and also existing consumers. Is Exipure Safe To Use All the orders are shielded with a 180-day money-back offer that can be availed by contacting the team. Right here is exactly how to contact them. Email: [email protected] Residential Phone Calls: 1 (800) 390 6035. International Phone Calls: 1 (208) 345 4245.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337853.66/warc/CC-MAIN-20221006155805-20221006185805-00050.warc.gz
CC-MAIN-2022-40
16,653
66
https://forums.developer.nvidia.com/t/problem-with-allocating-big-buffer/19857
code
I’ve bought a GTX 460 2Gb card and working with CUDA. I’ve got a problem. I cant allocate a buffer bigger than 700 mb. If for example I allocating a small buffers with size of 8kb - I’m succeeding to fill all video memory. But I just cant allocate buffer bigger than 700. First I was thinking that this is some kind of driver bug (i.e. driver allocate a piece of memory for other application somewhere in the middle). But this seems to be too silly for driver. So what can be the reasons? - Can a piece of video memory be BAD and marked as broken by driver - so driver doesnt allocate this memory? How to check this? - I’m using OpenGL interoperability - can this be the case? Althought - the first thing I do - is allocated this big buffer, and only than - allocate OpenGL resources. So it dont look like a case. - Or may be it’s a bug in driver? - Some other CUDA restriction? - Anything else? P.S. Windows Aero disabled - all programs except Visual Studio closed…
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400238038.76/warc/CC-MAIN-20200926071311-20200926101311-00758.warc.gz
CC-MAIN-2020-40
978
10
https://sanet.st/blogs/training4all/_d_game_development_with_javascript_and_css_create_a_memory_game.2900390.html
code
This post was published 3 years ago. Download links are most likely obsolete. If that's the case, try asking the author to reupload. MP4 | Video: AVC 1920x1080 | Audio: AAC 48KHz 2ch | Duration: 7 Hours 43M | 1.21 GB Genre: eLearning | Language: English In this course you will learn How to design game logic for games and implement it as code How to make the game intelligent and interesting by introducing a randomization element into it and making it unpredictable even for the programmer How to set up the skeleton of a web app or web game using HTML5 How to design a sophisticated 2D game using advanced CSS and CSS3 concepts How to build a fully featured timer for your game How to make CSS3 card flipping work using CSS3 transitions and CSS3 transformations. Logical problem solving How to create completely customized popup boxes (you can use this knowledge in a number of other projects as well) How to build a score display for your game that dynamically updates itself. The basics of HTML5 & CSS3 (I'll explain the concepts as we code the project) Front-end design and development By the end of the course, you'll be one step closer to creating web-based 2D games and front-end web apps like a pro. You could even try creating other web apps and games from the concepts you learn in this course. Blog Please check my blog to get more stuff every day! Newest course ==>> Training for all <<== Newest course Huge book blog ====>> Books <<==== Huge book blog Latest OS ===>> Share for Progressive <<=== Latest OS Best Graphics ===>> GraphicsNo1 <<=== Best Graphics
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710926.23/warc/CC-MAIN-20221203075717-20221203105717-00166.warc.gz
CC-MAIN-2022-49
1,572
22
https://www.ddo.com/forums/showthread.php/425026-A-Gathering-of-Guides-A-Travelogue-of-Tools?goto=nextoldest
code
I finally have my first toon ready to heroic TR. I know that there is a comprehensive guide on "how to" TR, but is there any such guide that covers the strategy of the process? Should I have a final toon type in mind to plan for this TR and future? Should I continue further into epic and epic TR? FYI - my toon is a human 18 ranger/ 1 rogue/ 1 fighter that fell into the dex based trap, although seems to work fine for most heroic quests. +2 and +3 tomes for all abilities, but dexterity which has a +5. Currently using the Shiradi destiny path. Mostly a solo player (part of the reason for the rogue splash), but have run with a few PUGs. I have a nice variety of scimitars and bows (vorpal, disruption, banishing, smiting) to use based on the adventure. I was thinking of TR into an elf ranger to take advantage of the dex, but I know that the damage support for dex is not there, so I'm not fully commited to that path. If I would have to pick a final class, I think I would want this toon to end as a ranger.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736682922.49/warc/CC-MAIN-20151001215802-00252-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
1,013
3
https://forum.unity.com/threads/what-is-the-easiest-visual-scripting-tool-there-is-for-unity.758411/
code
A Unity ID allows you to buy and/or subscribe to Unity products and services, shop in the Asset Store and participate in the Unity community. Calling all New Unity users! Join the Halloween Mods Showcase Challenge until October 31. Discussion in 'Getting Started' started by ZeRAM, Oct 10, 2019. You can look at some youtube videos and you will get an idea of how to use them. There is also unity native visual script but that will not be the easiest for now, because its all dots based and you will need to learn new terminology. Honestly the hard part won't be the visual scripting tool. It'll be wrapping your head around the programming concepts that come with any programming or scripting language regardless of whether it's text-based or graphical-based. Playmaker. Easiest to use and more tutorials and more stuff you can find for it. If you only care for "ease to use", then go with Playmaker. Your question requires someone to have used all of them, and more than likely that person doesn't exist. Just try a few with good reviews and decide for yourself. PlayMaker is the one discussed the most, and is well regarded, so I'd start there. All of them and none of them. Any answer you receive to this won't be applicable to you because it's not a fact question but rather an opinion question. Which tool is easiest is completely dependent on the user. What I considered to be the easiest won't necessarily be your easiest. To know which one is easiest for you you need to try all of them yourself. One well know, favourite and scince 10 years around, is Playmaker. You can try it, if you want (Because you asked: which is easiest.). As other mentioned, there is, there will be a "native Vis. Scripting" module, inside Unity. So i think its better if you start with the native one.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986682037.37/warc/CC-MAIN-20191018104351-20191018131851-00089.warc.gz
CC-MAIN-2019-43
1,788
12
https://dotnet.microsoft.com/en-us/platform/upgrade-assistant/tutorial/install-upgrade-assistant
code
In your command prompt, run the following command to install the upgrade-assistant tool: In your terminal, run the following commands to install the upgrade-assistant tool: dotnet tool install -g upgrade-assistant Installing this tool may fail if you've configured additional NuGet feed sources. Use the --ignore-failed-sources parameter to treat those failures as warnings instead of errors: dotnet tool install -g --ignore-failed-sources upgrade-assistant Now you're ready to run the tool. To upgrade your project, run the following command: upgrade-assistant upgrade <Path to csproj to upgrade> The tool also supports additional options. For full tool usage information, see the upgrade-assistant readme on GitHub.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100290.24/warc/CC-MAIN-20231201151933-20231201181933-00387.warc.gz
CC-MAIN-2023-50
717
8
https://www.sunarlim.com/2007/05/flash-db/
code
Flash does not give native support for connecting to database (DB). There are many variations of how to do this, especially to MySQL. The most simple is by using XML and PHP. I always prefer to use the most easy one (as I’m not a real programmer) even it would add the server requirements. Amfphp is the answer for me. It is a remoting service, a term which I did not understand at all at first. To make it simple, it translates all the hard coding into very short lines in your ActionScript and PHP files. This is all what you need to know/have to start learning: - Intermediate knowledge in Flash ActionScript - Basic knowledge in PHP (know the syntax and how to initialize connection to MySQL) - Can set up MySQL DB (I use PHPMyAdmin) - Know basic SQL queries Then go download the files on their site. They also provide nice to tutorials on how to install and set it up for the first time. Tips: You might also want to google around to look for some example of using it. Here’s one site that I remember: www.flash-db.com.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710218.49/warc/CC-MAIN-20221127073607-20221127103607-00002.warc.gz
CC-MAIN-2022-49
1,028
9
https://www.making-beaded-jewelry.com/making-jewelry-with-beads.html
code
Making Jewelry with Beads Beads Strung on Beading Wire with Lobster Claw Clasp Hi there! I love your website. I am interested in making a long chain of beads with a charm at the end (like a good luck charm). What would you recommend that I use at the top to hold it together?
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525863.49/warc/CC-MAIN-20190718231656-20190719013656-00397.warc.gz
CC-MAIN-2019-30
275
4
https://www.names.co.uk/support/2967-website_builder_unpublish_a_website.html
code
Website Builder Unpublish a Website Un-publishing your site will make it no longer visible on the internet. While the site will no longer be publicly visible, you will still be able to make edits to your site and your site subscription payment will continue. You can republish your site at any time to make it live and publicly available. To view the guide for Website Builder Unpublish a Website click here.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107897022.61/warc/CC-MAIN-20201028073614-20201028103614-00158.warc.gz
CC-MAIN-2020-45
408
3
https://experienceleague.adobe.com/en/docs/experience-platform/collection/permissions
code
Permission management for data collection in Experience Platform Data collection in Adobe Experience Platform is comprised of several different technologies which work together to collect and transfer your data. Access to these technologies is controlled through granular role-based permissions in Adobe Admin Console. This guide shows you how to manage permissions for data collection features. In order to configure access control for data collection, you must have administrator privileges for an organization that has a product integration with Adobe Experience Platform Data Collection. The minimum role that can grant or withdraw permissions is a product profile administrator. Other administrator roles that can manage permissions are product administrators (can manage all profiles within a product) and system administrators (no restrictions). See the article on administrative roles in the Adobe Enterprise administration guide for more information. This guide assumes you are familiar with basic Admin Console concepts like product profiles and how they grant product permissions to individual users and groups. For more information, see the Admin Console user guide. The relevant permissions for Data Collection are provided through two product designations in Admin Console: Adobe Experience Platform and Adobe Experience Platform Data Collection. The sections below outline the permissions provided under each product along with descriptions of the specific capabilities that they grant access to. Adobe Experience Platform permissions Permissions under Adobe Experience Platform include access to datastreams, identities, schemas, and sandboxes. For steps on how to configure Adobe Experience Platform permissions, see the access control user guide. Adobe Experience Platform Data Collection permissions Permissions under Adobe Experience Platform Data Collection control access to tags and event forwarding capabilities, including properties, extensions, and environments. For steps on how to configure Adobe Experience Platform Data Collection permissions, see the section below. A user’s assigned property rights only apply to the properties they have been granted access to through this permission category. Manage permissions manage Permissions for data collection are managed through two product designations: Adobe Experience Platform and Adobe Experience Platform Data Collection. Refer to the subsections below for steps on how to manage the relevant permissions under each product in Admin Console: Manage permissions under Adobe Experience Platform manage-platform From the Permissions area in Adobe Experience Platform select the role that you want to edit. In order to access data collection features, you must enable all permissions in the Sandboxes, Data Modeling, Identity Management, and Data Collection categories. See the access control UI guide for detailed instructions on managing Platform permissions. Manage permissions under Adobe Experience Platform Data Collection manage-collection To manage these permissions, log in to Admin Console and select Products from the top navigation, then select Adobe Experience Platform Data Collection. Select or create a product profile The next screen shows a list of available product profiles for Data Collection under your organization, the default profile being Default Data Collection All Access. You can choose to edit the default product profile if you wish, or you can select New Profile to create one. If you have multiple roles or user groups in your organization that require different levels of access, you should create a separate product profile for each of them. Edit permissions for the product profile edit-permissions When editing permissions for a profile, available permissions are listed in the left column while those that are included in the profile are listed in the right column. Select the listed permissions to move them between either column. Permissions are organized into categories. To switch between categories, select the desired category from the left navigation. Select Save once you have finished configuring permissions. The product profile view reappears with the added permissions reflected. Assign users to the product profile assign-users To assign users to the product profile (and grant them the profile’s configured permissions), select the Users tab, followed by Add user. For more information on managing users for a product profile, see the Admin Console documentation. This guide covered the available permissions for Data Collection and how to manage them through Admin Console. For more information on managing permissions for other Adobe Experience Platform capabilities, refer to the access control documentation.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818740.13/warc/CC-MAIN-20240423192952-20240423222952-00060.warc.gz
CC-MAIN-2024-18
4,746
31
https://www.experts-exchange.com/questions/21921133/Edit-existing-properties.html
code
I have installed the trial version of Photoshop CS2 so that I am able to edit some web templates that I have downloaded that were created using Photoshop. I normaly use Fireworks to do my graphics editing, but the layers do not import correctly using Fireworks so I thought I'ld give Photoshop a go. I have spent 3 hours searching the help file and various on line tutorials but can't seem to get an answer to a simple question. I want to edit the properties of an existing gradient rectangle. i.e. change the colours. Where can I find the existing properties to edit? I can add a gradient overlay that changes the colours but I thought that I should be able to edit the existing properties.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867417.71/warc/CC-MAIN-20180526112331-20180526132331-00096.warc.gz
CC-MAIN-2018-22
691
1
https://www.noao.edu/perl/abstract?2014A-0523
code
PI: Robert Bassett, Swinburne University of Technology, [email protected] Address: Swinburne Centre for Astrophysics and Supercomputing, Mail number 31, PO Box 218, Hawthorne, Victoria, 3122, Australia CoI: Karl Glazebrook, Swinburne University of Technology CoI: David Fisher, Swinburne University of Technology CoI: Roberto Abraham, University of Toronto CoI: Ivana Damjanov, Harvard-Smithsonian Center for Astrophysics Title: Local Counterparts to High-Redshift Turbulent Galaxies: What are the Stellar Kinematics? Abstract: We aim to measure the stellar kinematics of 4 low redshift turbulent, clumpy disks with the GMOS IFU. Recent observations of high redshift galaxies show that gaseous disks in high redshift (z 2) galaxies are turbulent. The source of this turbulence remains an open question. A possible scenario is that turbulent disks are fed by streams of cold gas, flowing along cosmic filaments, which drive the large H-alpha velocity dispersions and clumpy star formation observed (for example by the SINS survey). However, the recent discovery of low redshift disk galaxies with clumpy-high velocity dispersion disks shows that galaxies with similar properties to high-z clumpy disks can exists in absence of cold flows, therefore an alternate driver for turbulence seems likely to explain, at least these nearby galaxies. A contrasting scenario is that the turbulence is driven by feedback from extreme star formation originating from a thin stellar disk. These nearby star forming disks are very rare, yet they provide an oppurtunity to study clumpy disks with techniques which are impossible at high redshift (due to both resolution and surface brightness dimming). Here we propose one such study, to measure the stellar kinematics from Balmer absorption lines. If the stars and gas have similar velocity dispersion, this would favor externally driven turbulence by gas accretion (a rare thing in the low redshift Universe); conversely if the gas and stars have different dynamics then this would suggest that internally driven turbelence from feedback is a plausible scenario. We currently have GMOS IFU observations of two disk systems, and we propose here to extend our sample. To identify galaxies as disks we use lower resolution IFU emission line kinematics from AAO, surface photometry from UKIDSS and SDSS, and Halpha maps from Hubble Space Telescope. National Optical Astronomy Observatory, 950 North Cherry Avenue, P.O. Box 26732, Tucson, Arizona 85726, Phone: (520) 318-8000, Fax: (520) 318-8360
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823168.74/warc/CC-MAIN-20171018233539-20171019013539-00877.warc.gz
CC-MAIN-2017-43
2,539
9
https://www.ruby-forum.com/t/when-why-should-i-unit-test-validations/180646
code
I run into this question each time I add a validation to my model. Should I add a unit test for that validation? On the one hand, I’ve heard/read the philosophy: “Q: What should I test? A: Only the stuff you care about working”. On the other hand I’ve heard/read, “You don’t need to test methods provided by Rails – they are already tested by the test suite included with the framework.” If I put this in my model: Then I feel like I should write a unit test like test_name_should_be_unique. But then that feels like I’m testing the framework. If I’ve gone through the trouble of adding the validation to my model, then it feels like I should go through the trouble of testing the code I added to my model. Equivalently, if you’re in the TDD/BDD driven camp, if I care about the behavior that the name should be unique, I should write a test in which I try to add 2 records with the same name field, verify the test fails, add the validation to my model, and verify the test passes. At this point, I start to think… DRY. Why should I write substantially the same tests for every field in each model for which I care that the field is unique (or present, or has a numericality, Are there test helper methods such as #test_uniqueness_of, or #test_presence_of? I’ve never seen such functions, which makes me think that they’re not important or useful enough for anybody (other than myself) to have written and used. Since I have never had a good idea that wasn’t replicated 100 times on the internet already, I tend to think these sort of helper functions aren’t a good idea. So I ask why not? What am I missing? You received this message because you are subscribed to the Google Groups “Ruby on Rails: Talk” group. To post to this group, send email to removed_email_[email protected] To unsubscribe from this group, send email to For more options, visit this group at
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653183.5/warc/CC-MAIN-20230606214755-20230607004755-00478.warc.gz
CC-MAIN-2023-23
1,901
32
http://users.telenet.be/koen.vandamme1/tcl_tools/bwidgets/_index.htm
code
Tcl/Tk comes with an interesting but limited set of built-in widgets. Many people have written extensions that offer sets of additional widgets not found in the Tk distribution. Some of these extensions (such as BLT) are written in C or C++ and require recompilation of the Tk core. Others are written in pure Tcl (Scwoop, to name one popular set) so they can be used without recompiling anything. BWidgets is probably the most popular pure Tcl widget set for Tk. When I downloaded BWidgets and started playing with them, I started wondering about their implementation. In particular, I wanted to find out how to write my own BWidget, for example a BWidget canvas with composite items, drag and drop, and canvas scaling. So I set out to look for documentation on BWidgets, and found hardly any. There is a good paper by Jos De Coster, which scratches the surface, but I wanted to delve deeper into the guts of the BWidgets. After looking around with no result, I decided to use the BWidgets code itself to find answers to my questions (hey, this is open source after all, right?). In the paper below, you can find out what I discovered. It's not much, and I still have a lot of questions about some of the details, but it's a starting point.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530553.34/warc/CC-MAIN-20220519235259-20220520025259-00456.warc.gz
CC-MAIN-2022-21
1,241
19
https://www.packtpub.com/books/content/ress-%E2%80%93-idea-and-controversies
code
(For more resources related to this topic, see here.) The RWD concept appeared first in 2010 in an article by Ethan Marcotte (available at http://alistapart.com/article/responsive-web-design). He presented an approach that allows us to progressively enhance page design within different viewing contexts with the help of fluid grids, flexible images, and media queries. This approach was opposed to the one that separates websites geared toward specific devices. Instead of two or more websites (desktop and mobile), we could have one that adapts to all devices. The technical foundation of RWD (as proposed in Marcotte's article) consists of three things, fluid grids, flexible images, and media queries. Illustration: Fluid (and responsive) grid adapts to device using both column width and column count Fluid grid is basically nothing more than a concept of dividing the monitor width into modular columns, often accompanied by some kind of a CSS framework (some of the best-known examples were the 960 grid system, blueprint, pure, 1140px grid, and elastic), that is, a base stylesheet that simplifies and standardizes writing website-specific CSS. What makes it fluid is the use of relative measurements like %, em, or rem. With changing the screen (or the window), the number of these columns changes (thanks to CSS statements enclosed in media queries). This allows us to adjust the design layout to device capabilities (screen width and pixel density in particular). Images in such a layout become fluid by using a simple technique of setting width, x% or max-width, 100% in CSS, which causes the image to scale proportionally. With those two methods and a little help from media queries, one can radically change the page layout and handle this enormous, up to 800 percent, difference between the thinnest and the widest screen (WQXGA's 2560px/iPhone's 320px). This is a big step forward and a good base to start creating One Web, that is, to use one URL to deliver content to all the devices. Unfortunately, that is not enough to achieve results that would provide an equally great experience and fast loading websites for everybody. The RESS idea Besides screen width, we may need to take into account other things such as bandwidth and pay-per-bandwidth plans, processor speed, available memory, level of HTML/CSS compatibility, monitoring color depth, and possible navigation methods (touch screen, buttons, and keyboard). On a practical level, it means we may have to optimize images and navigation patterns, and reduce page complexity for some devices. To make this possible, some Server Side solutions need to be engaged. We may use Server Side just for optimizing images. Server Side optimization lets us send pages with just some elements adjusted or a completely changed page; we can rethink the application structure to build a RESTful web interface and turn our Server Side application into a web service. The more we need to place responsibility for device optimization on the Server Side, the closer we get to the old way of disparate desktops and mobile web's separate mobile domains, such as iPhone, Android, or Windows applications. There are many ways to build responsive websites but there is no golden rule to tell you which way is the best. It depends on the target audience, technical contexts, money, and time. Ultimately, the way to be chosen depends on the business decisions of the website owner. When we decide to employ Server Side logic to optimize components of a web page designed in a responsive way, we are going the RESS (Responsive Web Design with Server Side components) way. RESS was proposed by Luke Wroblewski on his blog as a result of his experiences on extending RWD with Server Side components. Essentially, the idea was based on storing IDs of resources (such as images) and serving different versions of the same resource, optimized for some defined classes of devices. Device detection and assigning them to respective classes can be based on libraries such as WURFL or YABFDL. It is worth noting that both of these approaches raised many controversies. Introducing RWD has broken some long-established rules or habits such as standard screen width (the famous 960px maximum page width limit). It has put in question the long-practiced ways of dealing with mobile web (such as separate desktop and mobile websites). It is no surprise that it raises both delight and rage. One can easily find people calling this fool's gold, useless, too difficult, a fad, amazing, future proof, and so on. Each of those opinions has a reason behind it, for better or worse. A glimpse of the following opinions may help us understand some of the key benefits and issues related to RWD. "Separate mobile websites are a good thing" You may have heard this line in an article by Jason Grigsby, Css media query for mobile is fool's gold , available at http://blog.cloudfour.com/css-media-query-for-mobile-is-fools-gold/. Separate mobile websites allow reduction of bandwidth, prepare pages that are less CPU and memory intensive, and at the same time allow us to use some mobile-only features such as geolocation. Also, not all mobile browsers are wise enough to understand media queries. The preceding controversy is just a part of a wider discussion on channels to provide content on the Internet. RWD and RESS are relatively new kids on the block. For years, technologies to provide content for mobile devices were being built and used, from device-detection libraries to platform-specific applications (such as iStore, Google Play, and MS). When, in 2010, US smartphone users started to spend more time using their mobile apps than browsers (Mobile App Usage Further Dominates Web, Spurred by Facebook, at http://blog.flurry.com/bid/80241/Mobile-App-Usage-Further-Dominates-Web-Spurred-by-Facebook), some hailed it as dangerous for the Web (Apps: The Web Is The Platform, available at http://blog.mozilla.org/webdev/2012/09/14/apps-the-web-is-the-platform/). A closer look at stats reveals though, that most of this time was spent on playing games. No matter how much time kids can spend playing Angry Birds now, after more than two years from then, people still prefer to read the news via a browser rather than via native mobile applications. The Future of Mobile News report from October 2012 reveals that for accessing news, 61 percent mobile users prefer a browser while 28 percent would rather use apps (Future of Mobile News, http://www.journalism.org/analysis_report/future_mobile_news). The British government is not keen on apps either, as they say, "Our position is that native apps are rarely justified" (UK Digital Cabinet Office blog, at http://digital.cabinetoffice.gov.uk/2013/03/12/were-not-appy-not-appy-at-all/). Recently, Tim Berners-Lee, the inventor of the Web, criticized closed world apps such as those released by Apple for threatening openness and universality that the architects of the Internet saw as central to its design. He explains it the following way, "When you make a link, you can link to anything. That means people must be able to put anything on the Web, no matter what computer they have, what software they use, or which human language they speak and regardless of whether they have a wired or a wireless Internet connection." This kind of thinking goes in line with the RWD/RESS philosophy to have one URL for the same content, no matter what way you'd like to access it. Nonetheless, it is just one of the reasons why RWD became so popular during the last year. "RWD is too difficult" CSS coupled with JS can get really complex (some would say messy) and requires a lot of testing on all target browsers/platforms. That is or was true. Building RWD websites requires good CSS knowledge and some battlefield experience in this field. But hey, learning is the most important skill in this industry. It actually gets easier and easier with new tools released nearly every week. "RWD means degrading design" Fluid layouts break the composition of the page; Mobile First and Progressive Enhancement mean, in fact, reducing design to a few simplistic and naive patterns. Actually the Mobile First concept contains two concepts. One is design direction and the second is the structure of CSS stylesheets, in particular the order of media queries. With regard to design direction, the Mobile First concept is meant to describe the sequence of designs. First the design for a mobile should be created and then for a desktop. While there are several good reasons for using this approach, one should never forget the basic truth that at the end of the day only the quality of designs matters, not the order they were created in. With regard to the stylesheet structure, Mobile First means that we first write statements for small screens and then add statements for wider screens, such as @media screen and (min-width: 480px). It is a design principle meant to simplify the whole thing. It is assumed here that CSS for small screens is the simplest version, which will be progressively enhanced for larger screens. The idea is smart and helps to maintain a well-structured CSS but sometimes the opposite, the Desktop First approach, seems natural. Typical examples are tables with many columns. The Mobile First principle is not a religious dogma and should not be treated as such. As a side note, it remains an open question why this is still named Mobile First, while the new iPad-related statements should come here at the end (min-width: 2000px). There are some examples of rather poor designs made by RWD celebrities. But there are also examples of great designs that happened, thanks to the freedom that RWD gave to the web design world. The rapid increase in Internet access via mobile devices during 2012 made RWD one of the hottest topics in web design. The numbers vary across countries and websites but no matter what numbers you look at, one thing is certain, mobile is already big and will soon get even bigger (valuable stats on mobile use are available at http://www.thinkwithgoogle.com/mobileplanet/en/). Statistics are not the only reason why Responsive Web Design became popular. Equally important are the benefits for web designers, users, website owners, and developers. This article, as discussed, covered the RESS idea, as well as the controversies associated with it. Resources for Article: - Introduction to RWD frameworks [Article] - Getting started with Modernizr using PHP IDE [Article] - Understanding Express Routes [Article]
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917124297.82/warc/CC-MAIN-20170423031204-00088-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
10,525
32
https://www.saschawillems.de/blog/2021/02/19/vulkan-hardware-capability-viewer-now-available-on-ios/
code
New target platform - iOS Thanks to a contribution by the fine folks at LunarG, the Vulkan Hardware Capability Viewer is now also available on Apple’s iOS based devices. Adding the fifth supported platform, which means that the app is now available on almost every device supporting Vulkan. I have also unlocked the iOS for the database so you can now filter and search through Vulkan data for all iOS devices present in the database. As with Mac OSX, iOS along with MoltenVK plays an important role for the Vulkan® Portability™ initiative. The iOS version can be downloaded from the Apple store and should run on current iPhone and iPad devices as well as Mac OS devices with the M1 chip. The changes have also been merged into the github repository.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178357935.29/warc/CC-MAIN-20210226175238-20210226205238-00370.warc.gz
CC-MAIN-2021-10
756
5
https://www.artblocks.io/marketplace/collections/ode-to-penrose-by-umatha
code
Ode to Penrose is a celebration of the natural beauty of aperiodic tilings, especially of the ones discovered by Sir Roger Penrose. These tilings lie at the intersection of complex mathematical problems and gorgeous visual aesthetics arising from finite amounts of simple objects. This project introduces novel ways to use Penrose tiles. Unlike in traditional deterministic usage of these tiles, stochasticity plays a very important part of the script. Randomness can affect things like the total amount of the tiles used, their orientation, coloring, and size. Familiar patterns can be witnessed in some outputs and yet they are completely absent in others. Despite this, perhaps surprisingly, each output could be completed into a traditional Penrose tiling without erasing any lines.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817184.35/warc/CC-MAIN-20240417235906-20240418025906-00023.warc.gz
CC-MAIN-2024-18
786
2
http://www.wral.com/Roanoke-Rapids/Pizza/Little-Caesars/14719985/
code
Out & About WRAL & Yelp Reviews Monty Monty Monty Monty! Great customer service. Love that guy in there!! Best little Ceasers I've been too! Little Caesar's is a great choice if you want pizza and want it quickly. The large cheese pizza, large pepperoni pizza, deep dish pepperoni, and crazy bread... (more) Please sign in to add a review. Event Data Provided by Eventful
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886102393.60/warc/CC-MAIN-20170816191044-20170816211044-00152.warc.gz
CC-MAIN-2017-34
371
6
https://cdn.nsoftware.com/help/IFF/qt/SFTPServer_p_SFTPConnectionRemotePort.htm
code
The RemotePort shows the TCP port on the remote host through which the connection is coming. int GetSFTPConnectionRemotePort(int iConnectionId); The SFTPConnectionRemotePort shows the TCP port on the remote host through which the connection is coming. The connection must be valid or an error will be fired. The ConnectionId parameter specifies the index of the item in the array. The size of the array is controlled by the SFTPConnectionCount property. This property is read-only and not available at design time.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522556.18/warc/CC-MAIN-20220518215138-20220519005138-00403.warc.gz
CC-MAIN-2022-21
514
6
http://blog.krisvandermast.com/CategoryView,category,PopFly.aspx
code
Just read this on the blog of Somasegar: Popfly is a tool and social network that provides a fun and easy way to build and share mash-ups, gadgets, Silverlight experiences, and Web pages using pre-built “Blocks” that connect to online services. I asked for an invitation as they're not giving much away at the moment. Funny thing when I visited the site was to see someone I knew: Steven Wilssens, a Belgian developer and MVP that went working for Microsoft since last year. Update: I just found out about this video on Channel9: PopFly
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218203515.32/warc/CC-MAIN-20170322213003-00596-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
540
4
https://nikolska.ru/updating-multiple-tables-in-oracle-5063.html
code
Updating multiple tables in oracle They learn about declaring variables, trapping exceptions and they also learn to declare and control cursors.In class students learn to develop, execute and manage PL\SQL stored program units like procedures, functions, packages and database triggers. At this skill level, OCA has the foundation of knowledge that will allow him/her to act as a entry-level database administrator or application developer. As a Oracle Certified Associate, you will cultivate industry-supported skills and credentials that you will be able to transfer to future employment opportunities.With your OCA certification, you will be able to demonstrate and promote the fact that you have the necessary skills to do your job effectively and you are certified by Oracle Coprporation the leader in Database Management Systems.The following tables show the exams and the corresponding courses for OCA.This course introduces students to the fundamentals of SQL using Oracle Database 11g database technology.In this course students learn the concepts of relational databases and the powerful SQL programming language.As the number if distinct values increases, the size of the bitmap increases exponentially, such that an index with 100 values may perform thousands of times faster than a bitmap index on 1,000 distinct column values. Also, remember that bitmap indexes are only suitable for static tables and materialized views which are updated at nigh and rebuilt after batch row loading. The real benefit of bitmapped indexing occurs when one table includes multiple bitmapped indexes. The creation of multiple bitmapped indexes provides a very powerful method for rapidly answering difficult SQL queries. However, combining these indexes together in a query can provide blistering response times a lot faster than the traditional method of reading each one of the 20 million rows in the base table. This course provides the essential SQL skills that allow developers to write queries against single and multiple tables, manipulate data in tables, and create database objects. The students also learn to use single row functions to customize output, use conversion functions and conditional expressions and use group functions to report aggregated data. Demonstrations and hands-on practice reinforce the fundamental concepts.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657147917.99/warc/CC-MAIN-20200714020904-20200714050904-00058.warc.gz
CC-MAIN-2020-29
2,336
9
https://grcacademy.io/nist-800-53/controls/sa-15-7/
code
Require the developer of the system, system component, or system service [Assignment: organization-defined frequency] to: - Perform an automated vulnerability analysis using [Assignment: organization-defined tools]; - Determine the exploitation potential for discovered vulnerabilities; - Determine potential risk mitigations for delivered vulnerabilities; and - Deliver the outputs of the tools and results of the analysis to [Assignment: organization-defined personnel or roles]. Automated tools can be more effective at analyzing exploitable weaknesses or deficiencies in large and complex systems, prioritizing vulnerabilities by severity, and providing recommendations for risk mitigations.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510454.60/warc/CC-MAIN-20230928194838-20230928224838-00257.warc.gz
CC-MAIN-2023-40
695
6
http://anekdotas.info/search?q=Select%20in%20join%20oracle
code
Link for all dot net and sql server video tutorial playlists Link for slides, code samples and text version of the video Can we join two tables without primary foreign key relation Yes, we can join two tables without primary foreign key relation as long as the column values involved in the join can be converted to one type. ID column in Departments table is not the primary Key and DepartmentId column in Employees table is not the foreign key. But we can still join these tables using ID column from Departments table and DepartmentId column from Employees table, as both the columns involved in the join have same data type i.e int. Select Employees.Name as EmployeeName, Departments.Name as DepartmentName join Departments on Departments.ID = Employees.DepartmentId The obious next question is, if primary foreign key relation is not mandatory for 2 tables to be joined then what is the use of these keys? Primary key enforces uniqueness of values over one or more columns. Since ID is not a primary key in Departments table, 2 or more departments may end up having same ID value, which makes it impossible to distinguish between them based on the ID column value. Foreign key enforces referential integrity. Without foreign key constraint on DepartmentId column in Employees table, it is possible to insert a row into Employees table with a value for DepartmentId column that does not exist in Departments table. The following insert statement, successfully inserts a new Employee into Employees table whose DepartmentId is 100. But we don't have a department with ID = 100 in Departments table. This means this employee row is an orphan row, and the referential integrity is lost as result Insert into Employees values (8, 'Mary', 'Female', 80000, 100) If we have had a foreign key constraint on DepartmentId column in Employees table, the following insert statement would have failed with the following error. Msg 547, Level 16, State 0, Line 1 The INSERT statement conflicted with the FOREIGN KEY constraint. The conflict occurred in database "Sample", table "dbo.Departments", column 'ID'.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584519757.94/warc/CC-MAIN-20190124080411-20190124102411-00583.warc.gz
CC-MAIN-2019-04
2,099
15
http://web-stage.metacpan.org/pod/Tree::Path::Class
code
- COPYRIGHT AND LICENSE Tree::Path::Class - Tree for Path::Class objects use Tree::Path::Class; use Path::Class; my $tree = Tree::Path::Class->new( dir('/parent/dir') ); my $child = Tree::Path::Class->new( file('child/file') ); $tree->add_child($child); print $child->path->stringify; # /parent/dir/child/file You can find documentation for this module with the perldoc command. The following websites have more information about this module, and may be of help to you. As always, in addition to those websites please use your favorite search engine to discover more resources. The default CPAN search engine, useful to view POD in HTML format. The AnnoCPAN is a website that allows community annotations of Perl module documentation. The CPAN Ratings is a website that allows community ratings and reviews of Perl modules. The CPANTS is a website that analyzes the Kwalitee ( code metrics ) of a distribution. The CPAN Testers is a network of smokers who run automated tests on uploaded CPAN distributions. CPAN Testers Matrix The CPAN Testers Matrix is a website that provides a visual overview of the test results for a distribution on various Perls/platforms. CPAN Testers Dependencies The CPAN Testers Dependencies is a website that shows a chart of the test results of all dependencies for a distribution. Please report any bugs or feature requests through the web interface at https://github.com/mjgardner/Tree-Path-Class/issues. You will be automatically notified of any progress on the request by the system. The code is open to the world, and available for you to hack on. Please feel free to browse it and play with it, or whatever. If you want to contribute patches, please send me a diff or prod me to pull from your repository :) git clone git://github.com/mjgardner/Tree-Path-Class.git Mark Gardner <[email protected]> This software is copyright (c) 2014 by eBay Enterprise. This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400250241.72/warc/CC-MAIN-20200927023329-20200927053329-00683.warc.gz
CC-MAIN-2020-40
2,037
20
https://forum.dero.io/t/wallets-available-for-dero/1171
code
DERO currently has wallet options for all platforms. There is a secure browser based wallet , a CLI wallet for pretty much every imaginable platform, GUI wallet for ( Windows, Linux or MacOS ) and the DeroMask mobile DERO Wallet . Pick a wallet, download and go! Secure Browser Based Wallet The DERO browser based wallet is a fully functional in browser GUI wallet that performs all cryptography locally . What does that mean? It means that your private keys never leave your machine and your funds are not stored on a 3rd party server. Your private key is never shared to perform any functions. The browser based wallet only uses an external server to download the wallet source files and connect to the daemon. It is also possible to connect the browser based to a locally ran daemon, if you choose. DERO’s web wallet is secure , easy to use and convenient . Offical DERO web wallet — https://derowallet.io/ The DERO GUI wallet is easy to use and quick to sync . It connects to a remote daemon by default, so it doesn’t need a local daemon to operate. It’s functionality is essentially the same as the browser based wallet. The CLI wallet is very easy to use. DERO has developed an option based menu system that makes using a CLI easy. Just start the daemon and open the wallet. Simple as that. Even though, the menu based system is very robust, there are still some start option commands that come in handy. Personally, I think the ‘–remote’ flag comes in handy very often. This command will start the wallet using remote node, no need to run a daemon locally. It defaults to the official DERO daemon right now but you can choose your own as well. - Windows - - or Linux/Mac - DERO CLI Wallet [— Windows , Linux , FreeBSD and MacOS If you are installing a local node and want to download the blockchain first, try blockchain.dero.network. Bootstrap files are updated daily. Written by @Kryptoid
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655878639.9/warc/CC-MAIN-20200702080623-20200702110623-00055.warc.gz
CC-MAIN-2020-29
1,913
16
https://support.omnidocs.com/hc/en-us/articles/9062269236113-Broken-Cross-Reference-Tool
code
Base extensions provides allows us to automatically detect broken cross references within a document, highlight these to a user and allow them to easily correct them within the document. The tool essentially works by indexing every field code of type REF_ along with the bookmark that it refers to. It then checks for the existence of these bookmarks within the document. Where they do not exist, the cross reference will be broken. Using the tool: - Select the Broken Cross-references functionality option from the ribbon. - The user will be presented with the following dialog. If no broken cross-references are found, the user will be informed, and all buttons will be de-activated: - The Next and Previous buttons allow the user to browse between all the broken references that have been identified. NOTE that when only one exists, these buttons are de-activated. - Selecting the Update button simply updates the cross-reference in the document. This will result in the cross-reference displaying as Error! Reference source not found. - Selecting the Insert button will present the user with the standard word Cross-referencing dialog: Information on the standard use of this dialog can be found here. - The user then has the option to select the correct paragraph to reference to and after selecting insert the cross-reference will be updated appropriately. - NOTE that the user will need to close the Cross-Reference dialog after inserting. Not doing so before returning to the cross-reference tool dialog in incorrect cross refences being inserted.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.26/warc/CC-MAIN-20240227121318-20240227151318-00020.warc.gz
CC-MAIN-2024-10
1,555
10
https://digbysblog.blogspot.com/2010/06/glenn-beck-blacks-dont-own-mlk.html
code
Oh, and "too many" have gotten lazy and distorted Martin Luther King's ideas. Yep that's Beck, the most idiotic man in the media. Well almost. Wingnuts everywhere are having a hard time understanding what's wrong with that comment: @DanFosterNRO offensive b/c Beck wrong 2 say blacks think that or b/c blacks DO own MLK? I guess it just doesn't occur to these people that any discussions of "owning" an African American civil rights icon are, by definition, offensive. To then derisively tell blacks that they don't own him and then in the next breath say they have gotten "lazy" and distorted his ideas is so obviously outrageous that I have to think they are being purposefully obtuse. This isn't political incorrectness, it's just plain old crude stupidity. Please listen to the whole thing. It's unintentionally hilarious in the places that aren't hideously offensive.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662515466.5/warc/CC-MAIN-20220516235937-20220517025937-00479.warc.gz
CC-MAIN-2022-21
872
5
http://apache.sys-con.com/node/40240
code
|By Shari Jones|| |August 17, 2001 12:00 AM EDT|| This second of a two-part series on JDOM examines in greater detail what it takes to use JDOM to perform some common tasks. In particular, I'll illustrate how to create JDOM documents, read JDOM documents from various sources (including SAX and DOM), output to various sources, and how to use JDOM with XSLT. The overview of JDOM discussed in Part 1 (XML-J, Vol. 2, issue 7) revealed that JDOM bridges the gap between inconsistencies in DOM parser APIs via adapters. It also takes SAX and DOM to the next level in terms of ease of use, by compensating for the weaknesses of these APIs when it comes to XML document manipulation. Part 1 explored the JDOM API and the packages and classes that are most significant for developing in JDOM. The main components of a JDOM document that were defined in Part 1 are critical prerequisites for understanding this article. Creating a JDOM Document JDOM documents can be created in two ways - from scratch or from some other input source, such as an XML document, a series of SAX events, or a DOM document. First, we'll discuss how to create a JDOM document in memory from scratch, and then, in the next section, we'll address how to output that document in various different formats. After we create a JDOM document and show how to output its content, we will demonstrate how to input an existing XML document, a series of SAX events, or a DOM document, and convert it into a JDOM document, which is the second option for creating a JDOM document. Creating a JDOM Document in Memory Let's begin by creating a JDOM document in memory, from scratch. Since JDOM was written with the Java developer in mind (keeping as close to Java standards as possible), creating a new JDOM document in memory is straightforward for Java developers. To create a JDOM document in memory using the core JDOM classes, Document and Element from the org.jdom package, use the following code: Document doc = new Document( new .setText("Hello World!") ); This creates, in memory, a bare bones JDOM document and stores it in the variable doc. That's all there is to it. Next, we'll look at outputting this document to the screen, so we can see what it looks like in XML. Outputting JDOM Documents After creating a JDOM document, it can be output using one of three primary ways: 1. org.jdom.output.DOMOutputter: As a DOM document 2. org.jdom.output.SAXOutputter: As a sequence of SAX events 3. org.jdom.output.XMLOutputter: As an XML document to a file or an output stream As part of the org.jdom.output package, XMLOutputter outputs a JDOM document to an output stream, such as the screen, or to a file. Alternatively, the SAXOutputter or DOMOutputter classes, also of the org.jdom.output package, can be used to output the JDOM document as a series of SAX events or as a DOM document, respectively. In Listing 1, we illustrate output using XMLOutputter to output to the standard output stream, System.out, which by default is the screen when running in a DOS/UNIX command window. When a JDOM document is output as an XML document, it's output as one or two long lines of XML code unless you specify otherwise. This is fine if it's being sent to another application or system for processing, and is actually the most compact. However, it makes it very difficult to read and see the structure. To format the XML output to improve readability - by humans, not computers - we can specify a couple of parameters when creating the XMLOutputter. The first parameter defines the level of indentation - usually as a sequence of spaces - and the second is a Boolean value that, if set to true, causes new lines to be added to the output. Here's an example: outputter = new XMLOutputter(" ", We use this approach in our HelloWorld example shown later in the article. Note that since XMLOutputter contains methods to output a JDOM document to a java.io.OutputStream as well as to a java.io.Writer, you can use the same approach whether outputting to a file, an output stream (such as across a network), to the screen, or to any other form of Writer or OutputStream. Other output methods in XMLOutputter allow you to output just parts of the JDOM document such as CDATA sections, comments, elements, entities, and processing instructions. We talked about each of these components in Part 1. The JDOM document created as described in the last example will be output to the screen. The code required is in Listing 1. To compile this file, first ensure that you have set up your Java environment correctly for use with JDOM. Your CLASSPATH must include the xerces.jar file found in the lib subdirectory of your JDOM distribution. The xerces.jar file should be followed in the CLASSPATH by the jdom.jar file from the build subdirectory of your JDOM distribution. Next, to compile the HelloWorld.java file, type the following code: After the HelloWorld.java file compiles, run the HelloWorld application using: This produces the following output: <?xml version="1.0" encoding="UTF-8"?> <root-element>Hello World!</root-element> The root-element tag is from the code defined in the HelloWorld.java file, specifically from the line that instantiates a new Element. Here is the code that defines the name of the new Element. The text "Hello World!" also was defined in the code in the HelloWorld.java file and by the call to the setText method. The following code defines the text for the root element: new Element("root-element").setText("Hello World!") As you can see, using JDOM, it's possible to produce perfectly valid XML output with little prior knowledge of XML. This was one of the original goals of JDOM. Outputting Using DOMOutputter We just saw how to output a JDOM document as an XML file. Using DOMOutputter, we can output a JDOM document as a DOM document. This is useful when interfacing with another application or system that expects a DOM document as its input. The following lines of code show how to create and use DOMOutputter to output a JDOM document, doc. DOMOutputter outputter = new DOMOutputter(); outputter.output( doc ); In addition to outputting JDOM documents, DOMOutputter also provides methods that allow you to output JDOM elements and attributes. See the JDOM API documentation for details. Outputting Using SAXOutputter We just saw how to output a JDOM document as an XML file and as a DOM document. The final way to output a JDOM document is as a sequence of SAX events. This is useful for interfacing with applications or components that handle a series of SAX events. When constructing a SAXOutputter, you must specify a SAX content handler (actually an org.xml.sax.ContentHandler) as a minimum. You then have the option of specifying a SAX error handler (org.xml.sax.ErrorHandler), DTD handler (org.xml.sax.DTDHandler), and entity handler (org.xml.sax.EntityHandler) after you have created the SAXOutputter object. The following lines of code show how to create and use SAXOutputter to output a JDOM document, doc. SAXOutputter outputter = new SAXOutputter( contentHandler ); outputter.output( doc ); After creating a SAXOutputter object, you need to invoke the output() method to pass the JDOM document object you want to output to the outputter. Inputting to JDOM Documents Earlier in this article we saw how to create a JDOM document from scratch. Another way of creating a JDOM document is to read an XML document or input stream (using a SAX parser), or input a DOM document. Again, we will use an output stream to output the JDOM document. To input an XML file, input stream, or DOM document as a JDOM document, use the SAXBuilder or DOMBuilder classes, respectively, from the org.jdom.input package. Inputting Using SAXBuilder Perhaps the most common means of building a JDOM document is to use SAXBuilder. SAXBuilder uses a SAX parser to parse an XML input file or input stream. Building a JDOM document using SAXBuilder is a two-step process. In step one, you need to create a new instance of a SAXBuilder object. Next, invoke one of the build methods for reading the XML input and building a JDOM document object. Four different constructors are available for creating a new SAXBuilder object, the primary one using the default SAX parser as determined by JAXP. Validation is turned off. It can be enabled and disabled after the construction of a SAXBuilder object by using the setValidation() method. The other three constructors allow more control over whether or not validation is enabled or disabled and in choosing an alternate SAX parser. After creating a SAXBuilder object, other methods are available that allow us to initialize it with a custom DTD handler, Entity resolver, XML filter, and error handler. Once we have instantiated a new SAXBuilder object, we can use it to build a JDOM document. There are seven different publicly accessible build methods available. The main differences between the seven build methods lie in where the XML input is to come from. It can come from a variety of sources, including one specified by a java.io.File, java.io.InputStream, java.io.Reader, a URI specified as a java.lang.String, or a java.net.URL. SAX parsers tend to be the first choice over DOM parsers because of their speed when reading in XML and generating a JDOM document. If you prefer not to use the default SAX parser with SAXBuilder, you can always substitute a third-party SAX parser. Simply pass the name of the SAX Driver class to the SAXBuilder constructor when creating the builder. Make sure that the classes required by the alternate parser are available in your CLASSPATH. SAXBuilder will then use the specified SAX parser to build a JDOM document. Inputting Using DOMBuilder An alternative to the SAXBuilder is the DOMBuilder. The DOMBuilder class is intended to allow us to build a JDOM document from a preexisting DOM document. It uses basically the same steps as when using SAXBuilder. First, create a new instance of a DOMBuilder object. Next, invoke one of the build methods to read the XML input and build a JDOM document object. To create a new DOMBuilder object, four different constructors are available. The default constructor creates a new DOMBuilder using the default DOM parser - as specified by the default JAXP parser, or a JDOM default if not. Validation is turned off. The default constructor with no validation suffices for most purposes, but the other three constructors allow for greater control when selecting a DOM parser. They also allow you to enable or disable validation. After creating a DOMBuilder object, use one of the DOMBuilder.build methods to build a JDOM document from an existing DOM document object. This build method is just like the SAXBuilder.build methods except that it takes an org.w3c.dom.Document object as a single argument for its input. In addition, DOMBuilder contains a build method that allows you to construct a JDOM element object directly from a DOM element (org.w3c.dom.Element) object. The DOMBuilder class is intended primarily as a way of generating a JDOM document from a preexisting DOM document. The DOMBuilder class contains three additional DOMBuilder.build methods, each of these taking a single argument - either a java.io.File, java.io.InputStream, or a java.net.URL - and building a JDOM document from a file, input stream, or URL, respectively. These other methods are provided as a means of cross-checking the SAXBuilder.build methods, which is the recommended parser for XML parsing. Generating a JDOM document using a DOM parser is slow, hence the SAX parser recommendation. The only possible exception to not using a SAX parser (via the SAXBuilder class) is if you are trying to validate the correct operation of the SAXBuilder class. Working Together: JDOM and XSLT One of the more common questions posted to the JDOM-interest discussion list centers on using JDOM with XSLT. There are several ways to do this. Below we look at one such way using a couple of classes from the JDOM-contrib repository. Now that we have seen how to create, input, and output a JDOM document object, let's see how to feed it into an XSLT processor to transform one JDOM document into another. XSLT Transformations Using JDOMResult and JDOMSource The example described later assumes that you have downloaded and installed the JDOM-contrib files from the JDOM Web site. Refer to Part 1 of this series for details on downloading and installing JDOM. The JDOM-contrib files contain two classes intended to make using JDOM with XSLT quite straightforward. These are JDOMResult and JDOMSource. You can access these, provided the JDOM-contrib.jar file is (or its classes are) in your CLASSPATH. In addition to the JDOM-contrib files, this example also makes use of classes from the Java API for XML Processing (JAXP) 1.1. In Listing 2 there's a transform method - in the class XSLTDemo - that takes a JDOM document and the name of an XSLT file, then using JDOMResult and JDOMSource, transforms it according to the instructions in the given XSLT file. The transform method then returns the resulting JDOM document. I thank Laurent Bihanic for this example, and the contribution of JDOMSource and JDOMResult to the JDOM-contrib repository. Family Matters: Working with Children One of the useful features of JDOM is that it allows developers to add and remove elements with a single line of code in its simplest form. For example, developers can create a child element from one line of code instead of requiring a factory method to create it for them after requesting it. However, more business logic may need to be added for greater functionality. Once you have a JDOM document, you'll want to traverse it and possibly manipulate certain elements. JDOM makes manipulation of child elements as easy as manipulating a Java 2 List. To obtain a list of child Elements belonging to a given element, use one of the getChildren methods: List children = element.getChildren(); List children = element.getChildren ( name ); List children = element.getChildren ( name, namespace ); These methods return a list of child elements belonging to the Element, element. If no children exist, the returned list will be empty. Any changes to the returned list object will automatically be reflected in the underlying JDOM document. Since each of these methods return a Java 2 List object, then adding, removing, and reordering children are performed using native Java 2 List operations. For example, to create a new child Element and add it as the second child to a list, use something like the following: Element newChild = .setText("new child element"); children.add( 1, newChild ); Note that since the first item in a list is numbered 0, then the second item has an index of 1. Hence, the above code adds the newChild element as the second child in the list, children. Similarly, to remove the first element (index 0) from the list, use the following: children.remove( 0 ); The change is automatically reflected in the associated JDOM document, and the first child will be removed from the document. As another JDOM code safety check, JDOM validates the document structure, making sure you don't have duplicate nodes above and below a child, which would result in an infinite loop. In other words, JDOM overrides the add and remove methods and makes sure there's only one parent for each child element and that that same child does not exist in a conflicting position on the tree. This two-part series on JDOM examined in detail how this open-source Java API simplifies XML document manipulation when compared with the previous alternatives. It also describes how JDOM interacts with existing APIs for document manipulation, such as SAX and DOM. JDOM's tight, Java-centric design makes XML document creation, manipulation, transformation, and parsing a no-brainer for Java developers. In these articles, we explored the purpose that JDOM serves in filling in the gaps where SAX and DOM fail in XML document manipulation. We also explored the JDOM API in depth, then in Part 2 we demonstrated how to use the API to perform common tasks such as inputting and outputting JDOM documents, as well as how to use JDOM with XSLT. JDOM recently was accepted as a Java Specification Request (JSR-102) by the Java Community Process (JCP). As such, expect to hear a great deal more about JDOM in the future as it continues to be embraced by the Java community. Special thanks to Steven Gould for sharing his expertise in JDOM and working so diligently with me on this series. 1. JDOM: www.jdom.org 2. JDOM discussion lists: www.jdom.org/involved/lists.html 3. Java API for XML Processing (JAXP): http://java.sun.com/xml/xml_jaxp.html 4. The Collections API for JDK 1.1: www.java.sun.com/products/javabeans/infobus/ 5. For an alternative way of using JDOM with XSLT, see "Using JDOM and XSLT: How to Find the Right Input for Your Processor," IBM developerWorks, March 2001, by Brett McLaughlin (www-106.ibm.com/developerworks/xml/library/x-tipjdom.html). The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data professionals... Dec. 3, 2016 11:00 PM EST Reads: 4,131 "Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Dec. 3, 2016 11:00 PM EST Reads: 949 Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da... Dec. 3, 2016 09:30 PM EST Reads: 1,599 As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter... Dec. 3, 2016 06:15 PM EST Reads: 1,513 "IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dec. 3, 2016 05:30 PM EST Reads: 4,045 Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id... Dec. 3, 2016 05:15 PM EST Reads: 2,138 @GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter. Dec. 3, 2016 05:15 PM EST Reads: 2,001 Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and... Dec. 3, 2016 03:15 PM EST Reads: 3,224 Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products... Dec. 3, 2016 02:45 PM EST Reads: 529 The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ... Dec. 3, 2016 02:45 PM EST Reads: 715 Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr... Dec. 3, 2016 02:15 PM EST Reads: 6,957 More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar... Dec. 3, 2016 02:00 PM EST Reads: 483 20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Dec. 3, 2016 01:30 PM EST Reads: 2,131 Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou... Dec. 3, 2016 01:15 PM EST Reads: 634 "ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Dec. 3, 2016 01:00 PM EST Reads: 331 Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open. Dec. 3, 2016 01:00 PM EST Reads: 1,876 Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa... Dec. 3, 2016 12:45 PM EST Reads: 741 Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine. Dec. 3, 2016 12:45 PM EST Reads: 1,956 Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor... Dec. 3, 2016 12:15 PM EST Reads: 1,512 We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does... Dec. 3, 2016 11:30 AM EST Reads: 857
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541214.23/warc/CC-MAIN-20161202170901-00366-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
27,086
147
https://ps3.wonderhowto.com/how-to/format-external-hdd-for-ps3-using-windows-vista-356351/
code
How to Format an external Hdd for a PS3 using Windows Vista There's always a need for extra memory. More memory means being able to play more games and download more movies or music without worrying about space. In this video tutorial you'll find out just how to do that, by formatting an external hard drive for a PS3 using Windows Vista. Enjoy!
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424945.18/warc/CC-MAIN-20170725002242-20170725022242-00402.warc.gz
CC-MAIN-2017-30
346
2
http://www.donationcoder.com/forum/index.php?topic=17915.0
code
I've been using 3rvx for some time now, and it's awesome. The layout of 3rvx (the simple mac-like one) is very, very nice. I would like to know what keys are pressed. I've created pictures of which need to be displayed after a keypress. This could be runned next to 3rvx. But maybe we can start from scratch? I've created the Play and Pause thing that bumps up already: Also custom hotkeys should be aply-able for different volume commands, like control - volume down for wave volume. Anybody with me? Edit: I mean keys like: Play/Pause (did not realize those are 1 key), Next, Previous, Stop, Volume Up, Volume Mute, Volume down. The fancy UI is needed, I'm keen on eyecandy
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986648343.8/warc/CC-MAIN-20191013221144-20191014004144-00233.warc.gz
CC-MAIN-2019-43
675
7
https://www.oden.utexas.edu/people/12/
code
Jon M. Bass earned his Ph.D. in engineering mechanics from The University of Texas at Austin. He is assistant vice president of research and the associate director at ICES, a role that allows him to help manage the day-to-day operations of the Institute. In addition, he is a member of the Multiscale Modeling Group led by Professor J. Tinsley Oden, contributing to ICES’ multi-scale modeling research. During his tenure in industry, Bass functioned as principal investigator and/or project manager on research projects in fluid, thermal, and structural mechanics. Additionally, he participated in commercial software development. In July 2003, he was selected as the first deputy director of ICES, and in 2007 assumed the role of assistant vice president of research. His current research interests include computational fluid and solid mechanics, multiscale modeling, dynamic data-driven application systems, hp-adaptive finite element methods, and scientific computing. Since joining ICES, he has participated in a number of research projects, including “A Computational Infrastructure for Reliable Computer Simulations” (NSF), “Adaptive Multi-Scale Modeling Based on Goal-Oriented Error Estimation and Control” (DOE), and “A Dynamic Data-Driven System for Laser Treatment of Cancer” (NSF). Bass is an associate fellow of the American Institute of Aeronautics and Astronautics. Email: [129, 194, 216, 268, 207, 116, 118, 118, 146, 143, 218, 269, 244, 131, 116, 132, 77, 198, 201, 270] Office: POB 4.434
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578765115.93/warc/CC-MAIN-20190426093516-20190426115516-00168.warc.gz
CC-MAIN-2019-18
1,519
6
https://clearwatercm.com/glossary/soft-costs/
code
Any indirect development costs (i.e. not labor or materials). These costs range from architecture and engineering fees to project management and developer fees and can affect hard costs significantly (e.g. an architect’s efficient building design may reduce the need for structured parking hard costs). Soft Costs are also referred to as Indirect Costs.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100452.79/warc/CC-MAIN-20231202203800-20231202233800-00255.warc.gz
CC-MAIN-2023-50
355
1
http://www.quakelive.com/forum/showthread.php?30470-Clans-and-Pro-Subscriptions&s=ffc1f4cd2c1c2f0d308914d6856c0188&p=252593
code
Clans and Pro Subscriptions I'm about to let my pro subscription expire tonight. My question is will the clan I started and the members in the clan be disbanded once my pro subscription expires? I was doing some research and I couldn't find an exact answer. I think it will after some time if you don't give another subscriber the leadership but I'm not sure either. There are a few guys who are pro already so I'll discuss transferring maybe. I was only going to take about a 2 week break with subscription anyways however.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737875203.46/warc/CC-MAIN-20151001221755-00127-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
524
4