url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://adamconkey.github.io/publication/latent_multiobject/
code
Objects rarely sit in isolation in everyday human environments. If we want robots to operate and perform tasks in our human environments, they must understand how the objects they manipulate will interact with structural elements of the environment for all but the simplest of tasks. As such, we’d like our robots to reason about how multiple objects and environmental elements relate to one another and how those relations may change as the robot interacts with the world. We examine the problem of predicting inter-object and object-environment relations between previously unseen objects and novel environments purely from partial-view point clouds. Our approach enables robots to plan and execute sequences to complete multi-object manipulation tasks defined from logical relations. This removes the burden of providing explicit, continuous object states as goals to the robot. We explore several different neural network architectures for this task. We find the best performing model to be a novel transformer-based neural network that both predicts object-environment relations and learns a latent-space dynamics function. We achieve reliable sim-to-real transfer without any fine-tuning. Our experiments show that our model understands how changes in observed environmental geometry relate to semantic relations between objects.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474617.27/warc/CC-MAIN-20240225135334-20240225165334-00151.warc.gz
CC-MAIN-2024-10
1,337
1
https://marketplace.visualstudio.com/items?itemName=OPP.omt&utm_source=www.vsixhub.com
code
OMT & ODT Language Support README Like any serious programming language OMT deserves its own syntax highlighting. We gathered the best people in the fields of semantics, regular expressions and syntax highlighting coloring psychology. They then worked around the clock for two years to develop this extremely exciting extension. The highlighter is based on the YAML syntax highlighting textmate bundle. From this we removed some of the unnessary parts and added the OMT specific items. At the moment most of the language features get some sort of color. Also take a look at all the snippets that are available, they cover most of OMT & ODT. For example adding an ontology: Add the folowing setting to your Preferences: To easily restart VSCode use After you restart VSCode OMT files should have a little OMT label in the bottom right of your screen. If you notice any problems or have suggestions for improved highlighting you can add an issue on Github.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710685.0/warc/CC-MAIN-20221129031912-20221129061912-00464.warc.gz
CC-MAIN-2022-49
954
8
https://help.nextdns.io/t/60h08hv/increase-in-latency
code
Increase in Latency Something has recently happened that is causing NextDNS to resolve a lot slower than it used to. Previously it was closer to Cloudflare or Google's latency of sub-10ms, but now it's over 20 and sometimes 40ms. Currently using ASUS-Merlin with DoT, works fine except resolving is a lot slower... any ideas? For easier viewing since png previews aren't supported Looks like for some reason my East Coast resolver has been moved from Atlanta to Dallas... is there something wrong with the Atlanta server? Previously I was resolved to vultr-atl, but now resolving to vultr-dal... thanks! I've definitely been noticing this. My pc is insanely fast to the point that normally web browsing appears instant, but lately the dns resolution time has been slowing down, impacting this. (Or you can use DNS Benchmark - steve gibson to see the same thing objectively) You probably want to use that over a ping test, since pinging isnt truly measuring query response latency. NextDNS steering just doesn’t work if you are using a device they don’t support. I had this same issue on my ASUS router. I am in Qatar so should be connecting to sub 30 ms servers in the UAE and Saudi Arabia yet their steering was sending me to Australia which is >300 ms! This was not just affecting the resolving time, it was also resolving to very distant CDN endpoints on suboptimal routes causing incredibly slow speeds connecting to iCloud for example. I was getting sub 1 Mbps on my 1 Gbps connection! What I ended up doing is making a list of nearby servers by resolving NextDNS server hostnames on ping.nextdns.io and used their IPs in the DoT setup field instead of the AnyCast IP NextDNS shows on the setup page. My fix is definitely not something I would recommend if you don’t like troubleshooting every now and then. I say this because if they ever change the servers and these IPs are not longer functional you’ll have to collect the new ones. I’ve been using this setup for a few months now though and so far no issues. I setup Technitium to act as a caching proxy infront of next dns (and it can be configured to use most of the blocklists nextdns does), way faster now. https://technitium.com/dns/ Also checked my dns suffix list to make sure it wasnt sending multiple dns queries out. Posting this update here as users in Dallas are reporting an increase in latency as well... East Coast and still resolving to Dallas instead of Atlanta... Noticing significant lag recently as well in the Seattle area. - 10 mths agoLast active
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102612.80/warc/CC-MAIN-20231210155147-20231210185147-00187.warc.gz
CC-MAIN-2023-50
2,538
19
http://www.annanowa.com/2019/07/01/how-do-you-reset-a-u2f-fido-2-security-key-that-is-locked-out/
code
I was locked and blocked out by Microsoft after too many incorrect PIN attempts using my USB Security Key FIDO2 to access my Microsoft Account. Had to use the backup procedure. Anyway, does anyone know how to reset such a key? It is not a Yubikey but one made by HyperSecur, Titanium Pro 2 model. I cannot seem to find any info on this topic. Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141735600.89/warc/CC-MAIN-20201204101314-20201204131314-00507.warc.gz
CC-MAIN-2020-50
350
2
https://jobs.theguardian.com/job/6916502/javascript-developer/?LinkSource=PremiumListing
code
- Under the supervision of Senior Developers and Tech Leads you will ensure that code is well scoped, monitored, documented, and testable. - Tacing bugs across the web stack helping to ensure the correct team knows about issues that arise. - If responsibility for the bug falls within your team you will ensure that suitable tests are set up to avoid future regressions. - Work with your team to review both your own and other's code before it goes through a final QA process and into production. - You will work with client side code. - However, due to our close work with other development teams you will need to be able to understand how our front end ad tech systems fit into the larger environment and interact with the server side systems. - Support build, test, and continuous integration systems that enable the effective delivery of the advertising framework. What do I need to succeed? - Experience of version control systems, ideally Git. - Ability to work effectively within a team, there are a lot of systems to learn and the experience your team members can share with you will be invaluable. - Understand the importance of testing to ensure quality. - You are able to design and implement relevant tests to ensure bugs are caught before making it to production. - Understand the basics of how a web page and its assets are delivered and rendered. - Ability to communicate technical information to non-technical people as needed. - Excited about the prospect of working on a variety of systems and technologies. - You should be adaptable and comfortable moving between different components and systems. Desirable skills and experience - JS frameworks (React, Angular, etc) - Experience and understanding of the strengths of functional programming - RxJS/StreamsNode JS - Browser development tools - Understand the basics of caching for high traffic services. Have some projects of your own you can share and talk us through We are Future We have big ambitions to transform media and change people's lives. Together, we connect people to their passions through the high-quality content we create and the innovative technology we pioneer. Future is the name behind market-leading brands across technology, gaming & entertainment, music and special interests. We're dedicated to creating loyal fans of our brands, and the number is growing all the time. Our global reach is huge with over 250 million consumers across 180 + brands. But that's not enough! We continue to add to our portfolio and restlessly look to innovate and push the boundaries of what can be done. We are developing leading-edge proprietary technology which is disrupting the media marketplace. This is a fun and creative place to work with endless opportunities to forge a career. We believe in teamwork that transcends location, so we don't have a Future HQ but a globally connected workforce. Every kind of talent is celebrated here as long as you share our ambitions to be bold and innovate, making Future a global success story.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525973.56/warc/CC-MAIN-20190719012046-20190719034046-00423.warc.gz
CC-MAIN-2019-30
3,014
27
http://opensource.sys-con.com/node/3099981
code
|By Marketwired .|| |June 4, 2014 11:00 AM EDT|| SAN FRANCISCO, CA and PHOENIX, AZ -- (Marketwired) -- 06/04/14 -- ForgeRock Inc., the leading open platform provider of identity relationship management (IRM) solutions, announced today that it has launched the ForgeRock One Technology Partnership Program with nine new members. The company made the announcement at the First Annual America's Identity Relationship Management Summit being held at the Arizona Biltmore in Phoenix, Arizona. Joining the program are authentication providers CertiVox, Duo Security, Encap Security, inWebo, Nok Nok Labs and Toopher; cloud development platform solutions providers Canonical and Exadel; and behavioral analytics provider Guardian Analytics. Through these partnerships, ForgeRock has started working more closely with innovation leaders focused on delivering tightly integrated IRM solutions for helping organizations build stronger customer relationships by driving more dynamic engagement across any application, device or thing. These partnerships not only provide enterprises with more flexibility and accelerated time to market, but also unparalleled tools for securely extending customer reach, while simultaneously protecting brands from malicious online activity. ForgeRock has created a disruption in the industry as more organizations are looking for ways to roll out more dynamic services to customers, prospects, partners and suppliers, with the end goal of deepening engagements and growing revenue streams. The ForgeRock One Technology Partnership Program will enable customers of the fastest-growing identity platform vendor to deploy IRM solutions across vertical industries, including education, finance, government, healthcare, insurance and other industries. The partnership will also enable customers to extend their business reach -- through the cloud, the Internet of Things, mobile devices, customer portals, social platforms and the web. "Our agile, flexible, lightweight and scalable IRM solution facilitates increased access to external audiences. IRM provides advantages over legacy IAM solutions, shifting the focus from simply threat prevention to extending business reach and driving new consumer-facing platforms; IRM also directly impacts revenue growth," said Rich Link, vice president of business and corporate development, ForgeRock. "The launch of this new program underscores the commitment by our technology partners, who share a common vision of providing a simple and secure solution to manage customer interactions across any device or environment." The ForgeRock One Technology Partnership Program With more people, devices and things being assigned identities across networks, organizations of all sizes will require IRM services that are simple, flexible, scalable and interoperable with other solutions to help them rapidly verify identities and access privileges as well as enable them to reduce operational and security risks. To help our customers meet these challenges head on, ForgeRock has launched its first technology partner program. The partnerships we have developed with selected identity technology providers as well as leading IT infrastructure and application providers allows us to offer tightly integrated joint solutions to our customers to help them optimize their identity investments, deploy new capabilities via integrated solutions, and accelerate time to market. The benefits of the program for our technology partners include the opportunity to work with key technical resources on solution integration and testing, collaboration on joint marketing and GTM initiatives and the ability to promote product interoperability with ForgeRock's Open Identity Stack. Canonical's Juju enables devops to configure, manage, deploy and scale cloud environments efficiently with best-practice Charms and charm bundles on any public, private or hybrid cloud all from a powerful GUI or the command-line. "Identity is a foundational element required for rolling out mobile and cloud applications. Our partnership with ForgeRock extends the Juju platform to include next generation identity relationship management charms, making it simple for developers to instantly identity enable any mobile or cloud application," Maarten Ectors, director, cloud strategy at Canonical. CertiVox's M-Pin Strong Authentication Platform enables ForgeRock's customers to make strong 2-factor authentication the centerpiece of their mobile and IOE strategy. M-Pin's fully supported integration with ForgeRock strongly authenticates customers' employees, audiences and devices anywhere, to any application or web site simply from any M-Pin enabled mobile app. "CertiVox and ForgeRock have partnered to enable IRM deployments with an elegant and coherent strong authentication technology that embraces mobile devices to establish trust in online identities, devices and transactions with maximum privacy. Our M-Pin platform removes the vulnerability associated with user name and passwords entirely and, yet makes the end user experience much simpler. Working closely with ForgeRock, customers benefit from the usability, security and scalability required for innovative mobile strategies for employees, audiences and devices to enable high compliance and new revenue opportunities," Brian Spector, CEO, CertiVox. Duo Security provides cloud-based two-factor authentication to protect more than 4,000 organizations from security breaches. "Identity management and strong authentication have always been complementary. The need for both technologies has only increased as businesses adopt more applications. Whether these apps are hosted on-premises or in the cloud, Duo Security provides ForgeRock customers with the assurance they need to protect users from account takeover and data theft," Brian Kelly, principal product marketing manager, Duo Security. "Teaming up with ForgeRock further supports our vision to speed mobile innovation in the enterprise and enrich the user experience. The combination of our cloud-based mobile application development platform paired with ForgeRock's end-to-end identity relationship management platform, provides developers with an accelerated method for integrating next generation identity services into mobile, social, enterprise and cloud applications," Lev Shur, vice president, technology consulting, Exadel. Guardian Analytics is a leading provider of user-based behavioral analytics, protecting millions of accounts, billions of online sessions and trillions in financial assets. Hundreds of businesses rely on Guardian Analytics' solutions to prevent unauthorized access and activity in customer and corporate systems by detecting when legitimate credentials are used for malicious purposes. "The marriage of Guardian Analytics and ForgeRock is a unique combination to help organizations deliver business critical services while also mitigating risk from criminal and unauthorized activity. The combined solution eases the concerns of our customers in the face of continually evolving attacks that attempt to overtake accounts to steal financial, personal or corporate information. Our ability to detect malicious activity and ForgeRock's ability to rollout dynamic identity relationship management capabilities helps ensure customers are secure and have a great online and mobile experience," Craig Priess, founder and vice president, products, Guardian Analytics. inWebo is a SaaS provider of identity protection solutions that uniquely provides a frictionless multi-factor authentication directly from the browser on any device, with no specific action required from the users for the added security. "Identity protection and Identity relationship management go hand-in-hand. That's why we're elated to be working with ForgeRock. This is a win-win situation for our customers as we enable them to build secure access for their customers and partners to the web, mobile, cloud and IT systems," Didier Perrot, CEO, inWebo Development. Encap Security is the world's only dedicated software-based, banking-grade authentication provider. "We're thrilled to join ForgeRock's Partner Ecosystem as a charter member. Our patented multi-factor authentication technology is a unique in that it can secure PCs, mobile devices and tablets with banking-grade security whilst delivering a seamless and intuitive experience to users. We share ForgeRock's vision and are united in enabling great customer and partner engagement as well as service adoption through pioneering technology," Thomas Bostrøm Jørgensen, CEO, Encap Security. Nok Nok Labs is an innovator in modern authentication and a founding member of the FIDO Alliance. "We're delighted to be working together with ForgeRock to safeguard online identities and deliver richer services to customers and partners with IRM. This will allow ForgeRock customers to take advantage of existing FIDO Ready authentication solutions in the marketplace. As a founding member of the FIDO Alliance, we also welcome their decision to join the alliance and look forward to their contributions," Rajiv Dholakia, vice president, products, Nok Nok Labs Inc. Toopher provides invisible, location-based multifactor authentication solutions designed around user behavior and powered by location awareness on mobile devices. "ForgeRock's innovation in IRM made this a very attractive relationship for us. Working with ForgeRock enables us to jointly deliver a solution for businesses that maximizes security and removes barriers for mobile and web based payments and other sensitive interactions to improve the user experience," Josh Alexander, CEO and co-founder, Toopher. - ForgeRock Blog on the Partner Ecosystem (http://forgerock.com/forgerock-partners-up/) - ForgeRock One Partnership Program (http://forgerock.com/partners/become-a-partner/) - ForgeRock Customers (http://forgerock.com/customers/) - ForgeRock Open Identity Stack (http://forgerock.com/what-we-offer/open-identity-stack/) - ForgeRock Identity Relationship Management (http://forgerock.com/irm/) - ForgeRock on Twitter (https://twitter.com/ForgeRock) - ForgeRock on Facebook (www.facebook.com/pages/ForgeRock/101648653214231) ForgeRock creates identity relationship management solutions for the modern Web including public cloud, private cloud, hybrid cloud, and enterprise and mobile environments. ForgeRock products support mission-critical operations with a fully open-source platform. The ForgeRock Open Identity Stack powers solutions for many of the world's largest companies and government organizations. For more information and free downloads, visit www.forgerock.com or follow ForgeRock on Twitter at www.twitter.com/forgerock. SYS-CON Events announced today that AIC, a leading provider of OEM/ODM server and storage solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. AIC is a leading provider of both standard OTS, off-the-shelf, and OEM/ODM server and storage solutions. With expert in-house design capabilities, validation, manufacturing and production, AIC's broad selection of products are highly flexible and are configurable to any form factor or custom configuration. AIC leads the industry with nearly 20 years of ... May. 3, 2015 02:45 AM EDT Reads: 5,691 SYS-CON Events announced today that Vicom Computer Services, Inc., a provider of technology and service solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. They are located at booth #427. Vicom Computer Services, Inc. is a progressive leader in the technology industry for over 30 years. Headquartered in the NY Metropolitan area. Vicom provides products and services based on today’s requirements around Unified Networks, Cloud Computing strategies, Virtualization around Software defined Data Ce... May. 3, 2015 02:00 AM EDT Reads: 2,366 How is unified communications transforming the way businesses operate? In his session at WebRTC Summit, Arvind Rangarajan, Director of Product Marketing at BroadSoft, will discuss how to extend unified communications experience outside the enterprise through WebRTC. He will also review use cases across different industry verticals. Arvind Rangarajan is Director, Product Marketing at BroadSoft. He has over 19 years of experience in the telecommunications industry in various roles such as Software Development, Product Management and Product Marketing, applied across Wireless, Unified Communic... May. 2, 2015 04:00 PM EDT Reads: 2,407 As we approach the next @ThingsExpo, to be held June 9-11 at the Javits Center in New York, my thoughts naturally turn to the Internet of Things. The IoT is a leviathan—in the best possible sense of the term—that will sweep up most everything in the ocean of data and technology being created today and tomorrow. But rather than try to grasp all of its possible uses, for today I'm looking at “just” the Industrial Internet part. I just read a long paper co-authored by Tim Berners-Lee about the possibility of describing a “web science,” that is, discipline that combines the study involved ... May. 2, 2015 04:00 PM EDT Reads: 605 The best mobile applications are augmented by dedicated servers, the Internet and Cloud services. Mobile developers should focus on one thing: writing the next socially disruptive viral app. Thanks to the cloud, they can focus on the overall solution, not the underlying plumbing. From iOS to Android and Windows, developers can leverage cloud services to create a common cross-platform backend to persist user settings, app data, broadcast notifications, run jobs, etc. This session provides a high level technical overview of many cloud services available to mobile app developers, includi... May. 2, 2015 04:00 PM EDT Reads: 2,210 Enterprise IoT is an exciting and chaotic space with a lot of potential to transform how the enterprise resources are managed. In his session at @ThingsExpo, Hari Srinivasan, Sr Product Manager at Cisco, will describe the challenges in enabling mass adoption of IoT, and share perspectives and insights on architectures/standards/protocols that are necessary to build a healthy ecosystem and lay the foundation to for a wide variety of exciting IoT use cases in the years to come. May. 2, 2015 12:30 PM EDT Reads: 1,097 The IoT Bootcamp is coming to Cloud Expo | @ThingsExpo on June 9-10 at the Javits Center in New York. Instructor. Registration is now available at http://iotbootcamp.sys-con.com/ Instructor Janakiram MSV previously taught the famously successful Multi-Cloud Bootcamp at Cloud Expo | @ThingsExpo in November in Santa Clara. Now he is expanding the focus to Janakiram is the founder and CTO of Get Cloud Ready Consulting, a niche Cloud Migration and Cloud Operations firm that recently got acquired by Aditi Technologies. He is a Microsoft Regional Director for Hyderabad, India, and one of the f... May. 2, 2015 12:00 PM EDT Reads: 2,375 SYS-CON Events announced today that B2Cloud, a provider of enterprise resource planning software, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. B2cloud develops the software you need. They have the ideal tools to help you work with your clients. B2Cloud’s main solutions include AGIS – ERP, CLOHC, AGIS – Invoice, and IZUM May. 2, 2015 12:00 PM EDT Reads: 4,303 SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides private all-in-one social intranets allowing workers to securely collaborate from anywhere in the world and from any device. Social, mobile, and easy to use. MangoApps has been named a "Market Leader" by Ovum Research and a "Cool Vendor" by Gartner... May. 2, 2015 11:00 AM EDT Reads: 4,229 SYS-CON Media announced today that @ThingsExpo Blog launched with 7,788 original stories. @ThingsExpo Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @ThingsExpo Blog can be bookmarked. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. May. 2, 2015 11:00 AM EDT Reads: 3,261 The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on Twitter at @MicroservicesE May. 2, 2015 11:00 AM EDT Reads: 2,734 SYS-CON Events announced today that robomq.io will exhibit at SYS-CON's @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. robomq.io is an interoperable and composable platform that connects any device to any application. It helps systems integrators and the solution providers build new and innovative products and service for industries requiring monitoring or intelligence from devices and sensors. May. 2, 2015 11:00 AM EDT Reads: 2,730 Wearable technology was dominant at this year’s International Consumer Electronics Show (CES) , and MWC was no exception to this trend. New versions of favorites, such as the Samsung Gear (three new products were released: the Gear 2, the Gear 2 Neo and the Gear Fit), shared the limelight with new wearables like Pebble Time Steel (the new premium version of the company’s previously released smartwatch) and the LG Watch Urbane. The most dramatic difference at MWC was an emphasis on presenting wearables as fashion accessories and moving away from the original clunky technology associated with t... May. 2, 2015 11:00 AM EDT Reads: 2,725 SYS-CON Events announced today that Litmus Automation will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Litmus Automation’s vision is to provide a solution for companies that are in a rush to embrace the disruptive Internet of Things technology and leverage it for real business challenges. Litmus Automation simplifies the complexity of connected devices applications with Loop, a secure and scalable cloud platform. May. 2, 2015 11:00 AM EDT Reads: 2,478 As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being software-defined – from our phones and cars through our washing machines to the datacenter. However, there are larger challenges when implementing software defined on a larger scale - when building software defined infrastructure. In his session at 16th Cloud Expo, Boyan Ivanov, CEO of StorPool, will provide some practical insights on what, how and why when implementing "software-defined" in the datacenter. May. 2, 2015 11:00 AM EDT Reads: 2,341 There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immediate and actionable interpretation of events as they happen. Another aspect concerns how to deliver ... May. 2, 2015 11:00 AM EDT Reads: 5,439 WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations. May. 2, 2015 10:45 AM EDT Reads: 4,112 So I guess we’ve officially entered a new era of lean and mean. I say this with the announcement of Ubuntu Snappy Core, “designed for lightweight cloud container hosts running Docker and for smart devices,” according to Canonical. “Snappy Ubuntu Core is the smallest Ubuntu available, designed for security and efficiency in devices or on the cloud.” This first version of Snappy Ubuntu Core features secure app containment and Docker 1.6 (1.5 in main release), is available on public clouds, and for ARM and x86 devices on several IoT boards. It’s a Trend! This announcement comes just as... May. 2, 2015 10:45 AM EDT Reads: 2,094 The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons. In the IoT vision, every new "thing" - sensor, actuator, data source, data con... May. 2, 2015 10:30 AM EDT Reads: 5,123 SYS-CON Events announced today that CodeFutures, a leading supplier of database performance tools, has been named a “Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. CodeFutures is an independent software vendor focused on providing tools that deliver database performance tools that increase productivity during database development and increase database performance and scalability during production. May. 2, 2015 10:00 AM EDT Reads: 3,885
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430448949970.43/warc/CC-MAIN-20150501025549-00014-ip-10-235-10-82.ec2.internal.warc.gz
CC-MAIN-2015-18
22,449
72
https://wiki.apache.org/tomcat/ContributorsGroup?action=diff&rev1=6&rev2=5
code
Reorder. The list is from the last 90 days of change log. Add Emetic, as asked in "Monitoring Tomcat" thread on users@ |Deletions are marked like this.||Additions are marked like this.| |Line 9:||Line 9:| Contributors with permission to edit the Tomcat wiki – read, write, delete and revert pages or individual changes. To be added to this group, please send a brief request with your Wiki username to the Tomcat developer list or Tomcat user list, see mailing lists page.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948530841.24/warc/CC-MAIN-20171213201654-20171213221654-00646.warc.gz
CC-MAIN-2017-51
474
5
https://absenteereality.wordpress.com/2015/07/02/this-bricklaying-robot-can-build-a-house-in-two-days/
code
An engineer in Perth wants to mechanize one of humanity’s oldest jobs. His robot is named “Hadrian,” after the Roman Emperor who built a wall in Northern Britain, and it can lay 1,000 bricks an hour. With a building plan programmed in, it calculates the location of each brick, then uses its 28-foot-long arm to them in place and secures them with mortar. Once set up, Hadrian is supposed to work for 24 hours straight, it’s manipulator arm placing bricks fast enough to construct a house every two days, or about 150 houses a year. Hadrian promises to deliver accuracy to within one hundredth of an inch. Carried by truck, the robot is powered by either a generator or local power sources.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875148163.71/warc/CC-MAIN-20200228231614-20200229021614-00460.warc.gz
CC-MAIN-2020-10
698
2
https://ch.mathworks.com/matlabcentral/answers/470053-usage-of-internalheatsource-from-pde-toolbox-heat-transfer
code
I'm trying to simulate the heat transfer behaviour of a layer stack of materials where one of the inner layers is a metal which is heated by the flow of current. The heater material is thinner than the others so it's inside (wrapped by) the whole geometry which is made of rectangles. I'm trying to use internalHeatSource to generate the heat inside the geometry but the obtained result has no sense. In the following commands you can see how I have used it. The bottom edge of the layers is at 25ºC. No matter the value specified for the source, the result is always around 25ºC. if (obj.TransientState == 0) elseif (obj.TransientState == 1) Also, I have a doubt: The value for the InternalHeatSource is temperature or Heatflux? Has anyone used InternalHeatSource for a similar purpose? Could you give any advise? Thank you in advance for your help.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251783342.96/warc/CC-MAIN-20200128215526-20200129005526-00202.warc.gz
CC-MAIN-2020-05
852
7
http://www.labsphoenix.com/make-a-file-read-only.html
code
Making your document a read-only file means that the document can be read or copied but not modified. The problem is that sometimes on mistake I edit the Back-Up files. Now open the saved file again. In Windows, you can set or unset the read-only for files and folders to give files write protection. Option 2: Mark as Read-Only To make a Word document read-only, you can change an attribute on the file in Windows: Step 1: Close the Word document. Case 4: Worksheet and Workbook structure is locked and read only While your excel file is read only and you know it is because worksheet and workbook structure is protected, it will be easy or difficult to disable read only. When you will open the file, you will get a dialog box like the following picture. If the read-only file is not password protected If the read-only excel file is made without any password, you can easily disable the read-only from the file. This method returns true if the file is writable otherwise returns false if the file is read-only. Another method is to restrict formatting and editing. Now check if you have accomplished what you wanted to. Now, I want to make this file Read Only. That means the other users can not change the content of such files but they can only read them. Note: If you only want to recommend users to open the Excel file as read-only, without protecting it, don't enter a password and check Read-only recommended. If you pass false, it will make file as read-only. You can even limit formatting styles that can be used in the document. When a file ex: text file is set as read-only, the file can no longer be altered since it no longer allows write permission. When you click on the file for opening, Password dialog box will pop up. So, you go to the Save As option and save the file with a new name or new location if you want to keep the file name same as the read-only file. My name is Mitch Bartlett. Restrict formatting and editing The following are the steps for a second method for helping to stop content reviewers from accidentally modifying your document. I will show here two ways to disable the read-only from an Excel file. Hope this information is helpful. He was awarded the Knight Foundation scholarship to Northwestern University's Medill School of Journalism. Keep in mind that people may be able to copy data from the spreadsheet to another spreadsheet or file, and then edit it there if they wish to do so. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. How To Make Read-only File Writable Again In Java? But I think some options you have used to set excel workbook read only, would be able to remove this setting always. Now in this article, I will list several possible cases that make your workbook and worksheet read only and introduce how we can do to remove read only status from Excel file. In this post, we will explore some of the options available. Select ThisWorkbook for the file you wish to make Read-only. It's a single folder containing the files. If you pass true, it will make file as writable. In the Save As dialog box, you will get Tools option at the bottom right corner of the dialog box. I want to restrict my users from modifying the file. Then just opening the excel file is a difficult thing, not to say removing read only mode in excel file. Introduction to Linux - A Hands on Guide This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. If you wish to thank me, please do so by as she is in a battle against Cancer. Some files may be important and some files may not be so important. It means: to make the read-only file editable, the user s must have the password. By this way, the Word 2016 document is also marked as Read-Only. If you want to save the workbook, you need to save the workbook with a new name or in a different location. It says: the file is reserved by someone. Now if you make any change in the read-only workbook, you will not be able to save the workbook. Step 4: In the Start Enforcing Protection dialog, enter and re-enter password to protect the Word document. Save excel file and read-only mode would be removed from excel file. So I want to prevent myself writing into some files into folder. We can make read-only file writable again in java. Generally, you'll need to set a password that will need to be entered to make changes to this file. Usually, if you share an Excel spreadsheet with someone, that person is able to freely edit the spreadsheet. Malicious users can edit the file and remove the password. Your workbook is read-only now. So, your file is saved as Read-Only. Click on the Read Only button to open the file as read-only. Memorize the password or store it in a safe place, such as in a secure password manager program. So, when you click on a read-only Excel file password protected to open it, Password dialog box will appear. You will still be able to save your changes to the file as a new file though. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. If you need to reset your password,. Registration is quick, simple and absolutely free.
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999040.56/warc/CC-MAIN-20190619184037-20190619210037-00263.warc.gz
CC-MAIN-2019-26
5,345
10
https://law.stackexchange.com/questions/87655/can-a-mobile-app-save-data-about-a-user-without-a-user-giving-the-permission
code
Maybe. European regulations (GDPR, ePrivacy) do not distinguish between web apps and mobile apps. For both, the core points are: Processing of personal data needs a clear purpose and legal basis as specified by GDPR. That legal basis may be “consent”, but doesn't have to be. Other common legal bases include necessity for fulfilling a contract, or a legitimate interest. Accessing or storing information on the users device needs consent, unless the access/storage is strictly necessary for a service explicitly requested by the user. While this part of the ePrivacy Directive is known as the “cookie law”, it is entirely technology-neutral, and applies to mobile apps as well. It doesn't matter here whether the information in question is personal data. Unfortunately, there is some mismatch between these criteria, so it can happen that ePrivacy requires consent (because some storage is not strictly necessary), even though no consent would be required by GDPR. But in your presented scenarios, it is likely that no consent would be necessary. In short, if storage is necessary for something that the user wants to do (whether indicated through explicit consent or more implicitly), you can do it. Consider the case of settings/preferences, like a dark mode toggle that is stored client-side. GDPR aspect: the dark mode preference is likely to be personal data, since it relates to the user. The purpose of storing this information is to respect the user's preferences across pages/sessions, leading to a less annoying user experience. Since this is entirely in line with the user's interests, it is likely that an Art 7(1)(b) necessity for fulfilling a contract with the user could be an appropriate legal basis (with the contract in question being the terms of service). Alternatively, it might be possible to argue that remembering this preference is in the user's own legitimate interest. ePrivacy aspect: Client-side storage is not strictly necessary for providing a dark mode feature. But once the user indicates a preference, it should be possible to argue that it is now strictly necessary to remember that preference by storing this preference on their device, for example with a cookie, or a settings database. Caveat: ePrivacy also regulates later access to this information. So we can only use the dark mode preference to select dark/light mode, not to infer whether the user is a new or recurring user. So for this scenario, it is quite possible to argue that we can store some information client-side without having to ask for consent. What if we want to store the settings server-side instead? This would require us to still store some kind of client identifier or session ID client-side, so that the correct settings can be retrieved from the server. The analysis would generally remain unchanged, but the GDPR's data minimization principle would nudge us towards storing everything client-side instead – avoiding the need to generate a client identifier that could be abused for tracking/profiling. If the client identifier were used for tracking or analytics, that would not be strictly necessary and would require consent per ePrivacy. However, user logged into a server already need a session ID or other stable ID. Then, storing user preferences server-side using this existing ID would probably not raise any ePrivacy issues, and would likely be fine from a GDPR perspective as well. In particular, server-side preference storage for logged-in users might be necessary to provide features such as cross-device settings sync, if that is part of the service being offered. Where web apps and mobile apps differ is not so much the regulatory framework, but the degree of control the user has. For web apps, users have strong ability to inspect what is stored and processed, and to control/modify the capabilities of the web app via privacy settings, plugins, and developer tools. Improper tracking is often made quite visible by blocking/filtering add-ons like uBlock Origin or browser-integrated features. This has led to an environment where many web apps have an imperfect but decent approach to compliance, for example by showing consent dialogues. Similar pressure doesn't exist in the mobile space, where users cannot as easily inspect what an app is doing. Correspondingly, typical privacy practices are often far worse in the mobile space. Pressure to comply comes mainly from the operating system APIs (such as Apple's change to enforce consent on a technical level before an app can access the device's advertising ID), and through app store review guidelines.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817253.5/warc/CC-MAIN-20240419013002-20240419043002-00305.warc.gz
CC-MAIN-2024-18
4,603
16
https://www.datateach.ai/course/datateachai-py01-2020c1
code
Our flagship offering is a self-faced online course on Python. It provides both basic theoretical understanding and practical hands-on programming. This course is designed from the bottom up, assuming that you do not have any prior programming knowledge and experience. In this course, you will be able to learn to write programs in Python using the loops, conditional statements, etc. You will also understand the other building blocks of programs such as functions or methods. In addition to this, you will learn about exceptions, classes, file handling and operations, and many other important topics related to Python programming. Also, you will be able to learn some advanced programming concepts which are object-oriented programming concepts including inheritance. The other topics include an introduction to iterators, recursion, the concept of searching and sorting. After completing this course, you will be able to: The course can be taken by: All students who are pursuing professional graduate/post-graduate courses related to computer science / Information Technology. All computer science teachers/faculties who wish to acquire new skills. All working professionals, who wish to enhance their skills.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704799741.85/warc/CC-MAIN-20210126104721-20210126134721-00284.warc.gz
CC-MAIN-2021-04
1,215
7
https://gnomecoder.wordpress.com/2012/02/28/luz-project-source-code-guide-goes-online/
code
I’ve put the start of a guide to Luz’s source code online. It contains information about how Luz, which is written in Ruby (slow!) achieves 60+ FPS (fast!), and lots more about the how and why of Luz. The document allows comments, so please let me know your thoughts!
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195532251.99/warc/CC-MAIN-20190724082321-20190724104321-00132.warc.gz
CC-MAIN-2019-30
271
2
https://goodvpnxantnl.netlify.app/henness43898vos/how-to-get-proxy-settings-sofy.html
code
Nov 15, 2017 The auto proxy detection system works by downloading a file called wpad.dat from the host wpad. First confirm this host exists from a command prompt: ping wpad. If it doesn't exist, you may have to put the correct DNS suffix. In the same command prompt, type. ipconfig /all. To use a proxy on the Linux command-line, you can set the environment variables http_proxy, https_proxy or ftp_proxy, depending on the traffic type.. These proxy server settings are used by the almost all Linux command-line utilities, e.g. ftp, wget, curl, ssh, apt-get, yum and others. Jul 07, 2020 · Home Windows Windows Could Not Detect this Network’s Proxy Settings. Windows Could Not Detect this Network’s Proxy Settings. July 7, 2020. Facebook. Twitter. The instructions in this document will add information for the proxy settings of the network, where PhenixID server is installed. We will make changes to the file start-PhenixID.sh (Linux), phenixidserver.vmoptions (Windows) and phenixservice.vmoptions (Windows). So please make sure that you have a recent copy/backup of this file/files. • Under Manual proxy setup, switch off: Use a proxy server, then click on Save. • On Windows 8.1 and older Windows versions, this will open the Internet Properties window. In the Connections tab, click on LAN settings. • Uncheck the box next to Use automatic configuration script. • Under Proxy server, uncheck the box next to Use a proxy Click the “Advanced” icon at the left side of the Preferences window, click the “Network” tab at the top of the window, and then click the “Settings” button under Connection. You can select four different proxy options here. By default, Firefox is set to “Use system proxy settings”. How To Check the Proxy Server Settings on Your Computer To set up proxy for Microsoft Edge, do the following. Open the Settings app. Go to Network & internet -> Proxy. On the right, you will see all the required settings related to proxy configuration. The options are as follows. Automatically detect settings - this option will allow Windows 10 to guess if there is a proxy server and how to use it. May 09, 2020 · 8) But if the IP address and the port number are not the same, do not check use this proxy server for all protocols, enter the IP address and port manually for each protocol. 9) Click on Ok and the Tor Browser will work using the proxy server. Hope with this, you have learnt How to change the proxy settings of the Tor Browser Browser. To get started on proxy settings in chrome, first of all open up the settings window. For that, you can use the customize and control menu located towards the top right side of the screen or use the address bar on top to access the settings page.Move the cursor on top and click on the address bar. I'm in need of finding the proxy settings in IE in order to set up RCUrl. The settings cannot be displayed in IE (the hospital administrators have "greyed" out the entire box). Proxy Settings. Controls the operation of the proxy server that is the core of Charles. Ports. The proxy server operates on two ports, one for the HTTP proxy and on for the SOCKS proxy. The defaults for these are usually fine. You may need to change them if you have something already using one of the ports on your system. Use system proxy settings: Choose this if you want to use the proxy settings configured for your operating system. Manual proxy configuration: Choose this if you have a list of one or more proxy servers. Ask your system administrator for the configuration information. Each proxy requires a hostname and a port number. If the same proxy name and Oct 26, 2017 · Proxy/Firewall client software is specific to the brand of proxy server that you are using. Microsoft Forefront Threat Management Gateway (TMG) 2010 is an example of a proxy server that can use client software to control proxy settings. Proxy/Firewall client software that is installed as a LSP driver will not work in Windows 8 with any Modern
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663016373.86/warc/CC-MAIN-20220528093113-20220528123113-00189.warc.gz
CC-MAIN-2022-21
4,000
6
https://knielsen-hq.org/w/25-years-of-open-source/
code
Today I realised that I have been programming for 25 years. Quite an anniversary! Of course, it does not really feel like that long, probably because a bit more than the first half of the time was really ‘just for fun’, as a kid’s hobby and later during University. I also realised that right from the beginning and through all the years I have had the Open Source mindset, even though I did not learn about Free Software until much later. I believe there are two reasons: - I love reading source code. - I hate the wasted effort when code could be reused, but is not. Right from the start I have been reading code. This was when software was distributed as BASIC listings in magazines that one would manually type into the computer. And I remember reading and modifying the dis-assembly of machine code programs, getting ‘infinite lives’ in games and learning the techniques they used to produce their state-of-the-art graphics. I doubt there was ever a great novelist that did not learn from reading lots of literature. And I believe the same is true for coding, great programmers learn from reading lots of code. And as soon as I could, I moved towards more portable languages and platforms, wanting my code to be used and reused as much as possible. I distributed my first GPL’ed program 17 years ago (XFH), after getting Internet access at the University. It is the same mindset that made me decide to join MySQL, really. Previously, I worked with applications on top of Oracle. Now in many ways, Oracle sucks less than most other software. But it is not free software. When we started using MySQL (version 4.1 beta I think), I was really pleased with it. While Oracle had some advantages in terms of features and usability, MySQL had the advantage of being Open Source, and to me that made them about equal. And improving MySQL features and usability seemed rather more feasible to me than getting Oracle open-sourced. So I wanted to contribute my skills towards the first of these goals. Improving MySQL, enabling the use and reuse of the code by me and others. And getting to know the source code of the M in LAMP. On to the next 25 years of Open Source, I guess …
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710829.5/warc/CC-MAIN-20221201153700-20221201183700-00496.warc.gz
CC-MAIN-2022-49
2,186
12
https://thedarktrumpet.com/security/2020/05/29/why-yubikey/
code
What is the Yubikey The Yubikey is a small device, connected through USB or Lightning, that can provide a number of useful security-related operations. This is something I’ve used for awhile now, but only recently been using it for far more than in the past. Some benefits of the Yubikey include: - Ability to assign a pin over your password (PIV), for dealing with your computer. - The ability to store GPG keys onto the device (useful for signing, encrypting, and so on) - Used as an OTP (dual factor) authentication option for websites. I’ll talk about each of these below, the motivation for why I use it, and how it can benefit you. Before I describe the features of the Yubikey, one core concept is worth going over and that’s a fundamental when it comes to authorization when it comes to a computer, application, or the like. Human authentication relies on one of three different methods to identify the person is, who they say they are: - “Something you know” - Most commonly a password - “Something you have” - Hardware authentication - “Something you are” - Fingerprint/face/etc Most authentication solely relies on the first of these options, but increasingly common is 2-factor authentication. What this means is the ability to have 2 of the 3 options above. This concept is crucial to understanding how the Yubikey can help you. Ability to assign a pin over a password (PIV) “Personal Identity Verification” (PIV) , is a hardware authentication mechanism that helps with verifying identity when logging into a system. This feature is supported on all major operating systems. The Yubikey can act as a PIV. From the authentication guides in the introduction, this is a combination of: - Something you have - The Yubikey itself. - Something you know - The pin to allow authentication against the Yubikey In my opinion, this is better than the Biometric options (Hello ID, Fingerprint, etc). The reason for this is because Biometric options, solely, rely on a single form authentication (Something you are). While this is better than a password (due to key loggers, side channel attacks - to a degree, and the like), it’s still one form. Furthermore, exploits were found on Biometric authentication where people could unlock the device The Yubikey supports pin codes of varying lengths (you get to choose), and the pin does get locked out if you attempt, and fail, too many times. For both the standard key, and the admin key, it’s 3 times each. So, 6 guesses total and the device is locked out and requires a reformat (which wipes everything off) . It’s considerably more secure, in my opinion. My motivation for using a Yubikey for this, besides what’s listed above, is to protect against Keyloggers. When my machine boots up, I enter in a very long password. That gets me into the system. From then on out, all my authentication to administrative functions is done with the Yubikey inserted. Remove the Yubi key allows for password reentry, which I won’t use as policy (only on fresh reboot). Ability to store GPG keys onto the device. GPG stands for “GNU Privacy Guard”, and is an implementation, and expansion to PGP (Pretty Good Privacy), and is used for a number of tasks: - Signing Emails - In a world where emails are spoofed, accounts being taken over, and the like - it’s nice to be able to verify the sender of the email is who they say they are. - Authentication Into Systems - GPG keys can be used to authenticate into remote servers using SSH/SFTP/etc. - Encryption and Decryption - The ability to encrypt files either for one’s own purpose, or to accept encrypted files from others which you can decrypt with your key. I honestly wish more people used GPG than do currently. It’s a greatly way to verify a person, and to exchange files. Furthermore, it can be used to encrypt information before it goes into the cloud. Because you own the key, and if generated properly, can be more assured that others won’t get into your files. Largely speaking, people will never receive an email from me that isn’t signed. I make my public key accessible to everyone . GPG is largely secure, if setup and verified properly - but local security may not be fully secure. That’s where Yubikey comes into play. The Yubikey can store your GPG private keys (up to a limit). For me, personally, I store my master’s public key (non-expiring) on the key, plus 3 subkeys. The 3 subkeys are my signing (emails, git), encrypting (files/folders/loopback), and authentication (ssh/sftp/scp) keys. These are private subkeys and they expire every year. On each machine where my Yubikey is used at, my public keys for these are trusted as ‘ultimate’. The private keys cannot be read from the Yubikey. This protects your private keys. Proper generation of GPG keys is incredibly important. I won’t go into too many details here, but there’s a good guide that goes over it in great detail. The very very high level summary of this is: - Generate your GPG keys offline, on a dedicated OS/host. USB Keychain booting an OS is a good way to do this. Keep it off your primary workstation. - Keep your master private key as secure as possible. A LUKS-encrypted drive with an incredibly strong password would be a good option. Do not share this key with anyone. - On the YubiKey, the private keys that exist on it are only the expiring subkeys, which can be revoked through commands with your Master private key if anything gets stolen. - Your private key(master, or subkeys) should not exist on any workstation, including the one that generates said key. Only your public keys, trusted as “ultimate”. - The Yubikey pin (user/admin) are under the same restrictions as the PIV (but different pins). 3 times each, and the device will need to be reset. I definitely recommend checking out the guide for more setup instructions. I’ll likely write more about this in the future. My motivation in using the Yubikey is pretty much the above. My non-expiring private key is tightly protected, and something I never want to regenerate (unless we can provide greater than 4096bit in the future). Given where it’s at now, it’d be too insecure/annoying to attach/use for signing - so the subkeys exist. But, I also want to protect the private keys for those. Plus, I use multiple machines, the Yubikey just needs to be inserted and as long as gpg is setup, the rest largely works without too much effort. Used as OTP OTP stands for “One Time Password” , and is used as a secondary authentication mechanism on a different device to help verify a user (Meets the conditions of “What you know”, and “What you have”). Cell phones are largely closed source, and have security concerns. These concerns aren’t far from what I listed in the PIV section, but also bad is that the visibility we as consumers have in the devices is far less than what we have in normal operating systems. Even in closed source systems, you can determine what’s running, if a firewall is enabled, if viruses are being scanned, and malware being mitigated. Cell phones don’t offer that same level of transparency. Also, given it’s always connected to the internet, and so many own a cell phone, makes them great targets for hackers. It’s a lot of trust into companies that give us little/no visibility into the underlying system. Yet, dual factor is still a very useful feature when logging into services. The Yubikey has a few OTP options that provide an alternative to the use of a cell phone/authenticator: - Yubico OTP can be used with some websites. This feature allows you to, instead of using your phone for dual factor auth, to touch your Yubikey to log into a web service after a password is provided. - OATH can be used much like the programs Microsoft Authenticator, Google Authenticator, and the like. The Yubikey Neo has NFC capabilities where it can be read from the phone, and the other Yubikeys have various inputs that can be inserted into the phone. Furthermore, all of them can be read on the computer - which allows, as long as the Yubikey is inserted, to read the OATH authentication codes from the computer without the aid of a cell phone. - Another useful feature is Challenge-response , which can be used to add 2-factor auth (in a light way, mind you), to KeypassX databases . My motivation for using this is simply lack of trust with the phone. I don’t want to always have to have my phone with me (and often times don’t), and instead rely on the Yubikey. The NFC version of the Yubikey also has the ability to be scanned by the cell phone, if needed, which would display the codes on your phone if you don’t have your computer with you. Furthermore, the Yubikey has Lightning, USB-A, USB-C, and combinations of them if you’d rather plug it into your phone. The above is a very, very high level of the Yubikey and only scratches the surface for what you can do with it. This is how I use it. Over time, I’m planning on creating more in-depth articles that talk about setup and security concerns surrounding a lot of the concepts listed above. - 1: https://www.yubico.com/ - 2: https://www.cs.cornell.edu/courses/cs513/2005fa/NNLauthPeople.html - 3: https://piv.idmanagement.gov/elements/ - 4: https://www.forbes.com/sites/daveywinder/2019/11/02/smartphone-security-alert-as-hackers-claim-any-fingerprint-lock-broken-in-20-minutes/ - 5: https://www.techtimes.com/articles/244958/20190810/someone-finally-hacks-face-id-but-should-you-be-worried.htm - 6: https://developers.yubico.com/yubikey-piv-manager/PIN_and_Management_Key.html - 7: https://gnupg.org - 8: https://thedarktrumpet.com/dthole.gpg.md - 9: https://github.com/drduh/YubiKey-Guide - 10: https://en.wikipedia.org/wiki/One-time_password - 11: https://developers.yubico.com/OTP/OTPs_Explained.html - 12: https://developers.yubico.com/OATH/ - 13: https://www.yubico.com/products/services-software/personalization-tools/challenge-response/ - 14: https://keepassxc.org/docs/ - Search for “YubiKey”, about 2/3rd down the page.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00208.warc.gz
CC-MAIN-2023-50
10,064
57
http://rowlandoflaherty.com/
code
Recently I wrote a guest blog for Octopart about the MOOC I was recently involved in. You can read the blog here. Today the Control of Mobile Robots course I am helping instruct goes live on Coursera. The course goes over the theory to make a mobile robot move in desirable ways (e.g avoiding obstacles). The course has both a simulator Sim.I.am (created by JP de la Croix) and a hardware component, the QuickBot, created by me.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818337.62/warc/CC-MAIN-20240422175900-20240422205900-00234.warc.gz
CC-MAIN-2024-18
428
2
https://www.hireitpeople.com/jobs/30667-test-engineer
code
Job Seekers, Please send resumes to [email protected] - Perform Web & native apps UI testing, functional testing, integration testing, end to end testing - Work closely with stakeholders to successfully integrate testing into the project, discuss test coverage and impact on other related applications or any logical issues. - Participate in all Agile ceremonies - grooming sessions, daily stand-up meeting, backlog refinement meeting, provide story points - Identify automation use cases using Selenium webdriver & Java; develop automation plans to implement automated regression suites to improve the test coverage - Work in conjunction with the product owners, developers and testing team to ensure that applications meet requirements and are of high quality - Handle projects integrating multiple applications in various technology stack - Should be well versed and should be able to contribute towards Test planning, test strategy and compiling various test status reports - Should be able to Assign, execute, monitor and report on test progress - Coordinate, control, manage and resolve conflicts with experience on Onsite-Offshore model - Communicate / Liaison with all stakeholders Technical Skills: TestRail, JIRA, Salesforce, UI Testing, POSTMAN, Selenium, Java, C#, Python, Oracle database systems. Education: Education: Bachelor’s degree or equivalent in Computer Science or equivalent in a related field or a foreign equivalent is required closely related field with relevant experience
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950422.77/warc/CC-MAIN-20230402074255-20230402104255-00549.warc.gz
CC-MAIN-2023-14
1,514
13
https://helpcenter.enalyzer.com/hc/en-us/articles/6684267379474-Conditions
code
Conditions are useful when you want to send respondents down different survey paths based on variables like question responses or background information. Depending on how respondents answer certain questions, they will take different routes through the survey. Conditions are added to the question that should be shown if the condition is fulfilled. For example, if you want to show questions to employees in the Marketing department, the conditions are added to the set of questions. To add conditions, all you have to do is: - Select the question to which you want to add the condition and click settings. - Click the add condition button. - Select the question or background variable for the condition. - Select the response option. This is the response option the respondent has to select to be directed to the specified question, i.e. this is the condition. - When you're done, click add. Add as many conditions as you need. These will be AND conditions, which means that all conditions have to be fulfilled for the question to be displayed to the respondents. - Your conditions will now appear under your question settings. - You are always able to see which questions contain conditions from the survey content overview. They are marked with the survey element number that the condition is based on: - Go to your survey, and click on the question whose condition you want to delete. - Click on settings. - Scroll to the bottom, under conditions, to see a list of the conditions this question has. - Click on the remove icon () next to the condition you want to delete and it will be deleted immediately.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711376.47/warc/CC-MAIN-20221209011720-20221209041720-00341.warc.gz
CC-MAIN-2022-49
1,610
15
https://lists.ufl.edu/cgi-bin/wa?A3=ind1905&L=SOCNET&E=Quoted-printable&P=2121925&B=--_000_6191936077C7C641A351A901E51A3AF3473217D9MBXP02dsmanacuk_&T=text%2Fhtml;%20charset=Windows-1252
code
Social Network Analysis Summer School Courses methods@manchester Summer School 1-12 July 2019 University of Manchester Limited Places Available methods@manchester is delighted to be holding its annual Summer School from 1-12 July 2019. The Summer School offers a range of specialised courses covering a variety of topics that are particularly relevant to postgraduate and early career research in humanities. The selection includes software training as well as qualitative and quantitative methods analysis. The course content is based on approaches from across the various schools in the Faculty of Humanities at the University of Manchester, as well as external experts. The award winning Andy Kirk is delivering a new data visualisation course for us this year. Each Summer School course will run for one week, delivering four days of content to a five-day timetable (Monday afternoon to Friday lunch-time). - Introduction to Social Network Analysis using UCINET and Netdraw (1-5 July 2019) - Advanced social network analysis (8-12 July 2019) Further information on the courses is set out below. Full details about the methods@manchester Summer School are available Introduction to Social Network Analysis using UCINET and Netdraw (1-5 July 2019) This is an introductory course, covering the concepts, methods and data analysis techniques of social network analysis. The course is based on the book "Analyzing Social Networks" by Borgatti et al. (Sage) and all participants will be issued with a copy of the book. The course begins with a general introduction to the distinct goals and perspectives of social network analysis, followed by a practical discussion of network data, covering issues of collection, validity, visualisation, and mathematical/computer representation. We then take up the methods of detection and description of structural properties, such as centrality, cohesion, subgroups and positional analysis techniques. This is a hands-on course largely based on the use of UCINET software and will give participants the experience of analysing real social network data using the techniques covered in the workshop. No prior knowledge of social network analysis is assumed for Advanced social network analysis (8-12 July 2019) An introduction to statistical analysis of networks and some advanced concepts building on the introductory course. To benefit fully from the course requires a basic knowledge of standard statistical methods, such regression analysis. The course aims to give a basic understanding of and working handle on drawing inference for structure and attributes for cross-sectional data. A fundamental notion of the course will be how the structure of observed graphs relate to various forms of random graphs. This will be developed in the context of non-parametric approaches and elaborated to the analysis of networks using exponential random graph models (ERGM) and permutation tests. The main focus will be on explaining structure but an outlook to explaining individual-level outcomes will be provided. The participant will be provided with several hands-on exercises, applying the approaches to a suite of real-world data sets. We will use the stand-alone graphical user interface package [TS1] and R as well as other specialist sna software Eg Visone and UCINET. In R we will learn how to use the packages ‘sna’ and ‘statnet’. No familiarity with R is assumed but preparatory exercises will be provided ahead of the course. Tel: 0161 275 4269
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00474.warc.gz
CC-MAIN-2022-33
3,494
28
https://lists.mysql.com/mysql/129358
code
At 9:33 +0200 1/8/03, Octavian Rasnita wrote: >I've read the following in a MySQL book: > A special case of record deletion occurs when you clear out a table >entirely using a DELETE with no WHERE clause: > DELETE FROM tbl_name; > In this case, the sequence counter may be reset to 1, even for table types >for which values normally are not reused (MyISAM and InnoDB). For those >types, if you wish to delete all the records while maintaining the current >sequence value, tell MySQL to perform a record-at-a-time delete by including >a WHERE clause that specifies some trivially true condition: > DELETE FROM tbl_name WHERE 1 > 0; >Well, I've tried that sql statement, but the auto_increment point of start >was not reset to 1. Note that the text in question says *may* be reset to 1. To reset it for sure, use the statement at the top of page 558. :-) >I use MySQL 4.05 under Windows 2000. >Teddy's Center: http://teddy.fcc.ro/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123318.85/warc/CC-MAIN-20170423031203-00180-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
928
17
https://community.netapp.com/t5/ONTAP-Discussions/FAS2552-with-DS4243-Shelf-ADP/td-p/124049
code
I just converted my FAS2552 to CDOT and in the process of upgrading to 8.3. I would also like to do ADP to efficiently use the SAS drives on the internal shelf. I will be using this KB to do the ADP https://library.netapp.com/ecmdocs/ECMP1636022/html/GUID-CFB9643B-36DB-4F31-95D4-29EDE648807D.html My question is, what will happen to my external disk shelf disks, will it be partioned too? Or is ADP only for the internal shelf. Of course i dont want my external disk shelf disks to be partioned because it will be a waste of space. ADP is only for internal disks and SSD. But it makes sense to disconnect shelves while performing initialization just in case. the key sentence in the KB article is "For entry-level platform models, only internal disks are partitioned." The FAS2552 system is classed as an entry-level platform. I assume that internal disks are the disks in shelf 0. If you subsequently add disks to a raid group that contains partioned disks, ONTAP will partition the new disks. Other than that, there is no way that I'm aware of that you cam manually partition disks. Hope this helps, Live Chat, Watch Parties, and More!
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570977.50/warc/CC-MAIN-20220809124724-20220809154724-00754.warc.gz
CC-MAIN-2022-33
1,138
11
https://forum.nengo.ai/t/nengo-fpga-connection-error/2062
code
I am using Nengo-FPGA with DE1 board and trying to run some examples from Nengo. However, I received a connection error with the basic example as well as GUI examples. The details is as followed: RuntimeError: Received the following error on the remote side <10.162.177.236>: Traceback (most recent call last): File "/opt/nengo-de1/nengo_de1/single_pes_net.py", line 206, in <module> run() # Run the __name__ == __main__ case by default (wrapper function) File "/opt/nengo-de1/nengo_de1/single_pes_net.py", line 202, in run File "/opt/nengo-de1/nengo_de1/single_pes_net.py", line 43, in main nengo_data = NengoData(arg_data_file) File "/opt/nengo-de1/nengo_de1/nengo_data.py", line 15, in __init__ self.sim = arg_data["sim_args"].item() File "/usr/lib/python2.7/site-packages/numpy/lib/npyio.py", line 235, in __getitem__ File "/usr/lib/python2.7/site-packages/numpy/lib/format.py", line 650, in read_array array = pickle.load(fp, **pickle_kwargs) ValueError: unsupported pickle protocol: 3 OSError: [WinError 10038] An operation was attempted on something that is not a socket INFO:<10.162.177.236> SSH connection closed Can anyone help me to see what’s wrong with the python code/my connection? Thanks in advance. Hi @muratisik, and welcome to the Nengo forums! If you are running just the built in NengoFPGA examples, then they should work. From what I can tell of your output, it looks like the error is on the DE1 board itself. That being the case, can you ensure that you are using the latest NengoFPGA SD image for the DE1? Also, if you can tell me what kind of setup you have (what OS is your host computer, what python version you are running on your host computer, etc.), I can attempt to replicate your setup locally and see if I run into the same issue. Thank you for your response. I’m indeed using the latest NengoFPGA SD image. I even reuploaded the SD image for the DE1 just to be sure. However, the problem still persists. I’m running the setup on a Windows 10 PC with Anaconda, Python version 3.8.8, Nengo version 3.2.0, NengoFPGA version 0.2.3.dev0. Thanks for the updated information. I do have a Windows10 setup I can use, and will try and replicate the issue locally. I’ll keep you updated with my findings. I have identified the issue, and it’s going to take a while to implement a proper fix, but I have figured out a temporary solution (just to get it working). Here’s how: - Create a new conda environment - Install numpy < 1.17: conda install "numpy<1.17" - Navigate to the NengoFPGA code repository, and install it (this is as per the online docs): pip install -e . - (This is the important step): Install matplotlib < 3.5: pip install matplotlib<3.5 - Now you can install everything else. e.g., pip install nengo nengo-gui jupyter The thing that was causing the issue is the version of NumPy installed in your environment. NengoFPGA currently has an upper bound of v1.17 for NumPy, and the latest version of matplotlib overwrites this version (installing the latest), which causes this issue. I am working on a more permanent fix that removes the NumPy version dependency, but that will take a while to code and test. Note that any Python package that enforces a version restriction on NumPy will cause this issue, so you will need to identify and downgrade any of those Python packages. I’ve only identified matplotlib so far since that is really the only package in the installation instructions above that cause this. @muratisik, I’ve updated the NengoFPGA codebase to remove the NumPy version limit, so the installation instructions in the NengoFPGA documentation should work in all cases now. - Create a new Conda environment - Clone (or pull from) the NengoFPGA repository - Navigate to the NengoFPGA code repository and do pip install -e . - Install all of the other packages you want ( This indeed fixed the problem that we have. Thank you very much for the quick update.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662584398.89/warc/CC-MAIN-20220525085552-20220525115552-00427.warc.gz
CC-MAIN-2022-21
3,924
43
https://wiki.owasp.org/index.php/Testing_for_SSL-TLS_(OWASP-CM-001)
code
Testing for SSL-TLS (OWASP-CM-001) This article is part of the OWASP Testing Guide v3. The entire OWASP Testing Guide v3 can be downloaded here. OWASP at the moment is working at the OWASP Testing Guide v4: you can browse the Guide here Due to historic export restrictions of high grade cryptography, legacy and new web servers are often able and configured to handle weak cryptographic options. Even if high grade ciphers are normally used and installed, some server misconfiguration could be used to force the use of a weaker cipher to gain access to the supposed secure communication channel. Testing SSL / TLS Cipher Specifications and Requirements The http clear-text protocol is normally secured via an SSL or TLS tunnel, resulting in https traffic. In addition to providing encryption of data in transit, https allows the identification of servers (and, optionally, of clients) by means of digital certificates. Historically, there have been limitations set in place by the U.S. government to allow cryptosystems to be exported only for key sizes of, at most, 40 bits, a key length which could be broken and would allow the decryption of communications. Since then, cryptographic export regulations have been relaxed (though some constraints still hold); however, it is important to check the SSL configuration being used to avoid putting in place cryptographic support which could be easily defeated. SSL-based services should not offer the possibility to choose weak ciphers. Cipher determination is performed as follows: in the initial phase of a SSL connection setup, the client sends the server a Client Hello message specifying, among other information, the cipher suites that it is able to handle. A client is usually a web browser (most popular SSL client nowadays), but not necessarily, since it can be any SSL-enabled application; the same holds for the server, which needs not be a web server, though this is the most common case. (For example, a noteworthy class of SSL clients is that of SSL proxies such as stunnel (www.stunnel.org) which can be used to allow non-SSL enabled tools to talk to SSL services.) A cipher suite is specified by an encryption protocol (DES, RC4, AES), the encryption key length (such as 40, 56, or 128 bits), and a hash algorithm (SHA, MD5) used for integrity checking. Upon receiving a Client Hello message, the server decides which cipher suite it will use for that session. It is possible (for example, by means of configuration directives) to specify which cipher suites the server will honor. In this way you may control, for example, whether or not conversations with clients will support 40-bit encryption only. SSL Testing Criteria Large number of available cipher suites and quick progress in cryptoanalysis makes judging a SSL server a non-trivial task. These criteria are widely recognised as minimum checklist: - SSLv2, due to known weaknesses in protocol design - SSLv3, due to known weaknesses in protocol design - Compression, due to known weaknesses in protocol design - Cipher suites with symmetric encryption algorithm smaller than 112 bits - X.509 certificates with RSA key smaller than 2048 bits - X.509 certificates with DSA key smaller than 2048 bits - X.509 certificates signed using MD5 hash, due to known collision attacks on this hash - TLS Renegotiation vulnerability The following standards can be used as reference while assessing SSL servers: - NIST SP 800-52 recommends U.S. federal systems to use at least TLS 1.0 with ciphersuites based on RSA or DSA key agreement with ephemeral Diffie-Hellman, 3DES or AES for confidentality and SHA1 for integrity protection. NIST SP 800-52 specifically disallows non-FIPS compliant algorithms like RC4 and MD5. An exception is U.S. federal systems making connections to outside servers, where these algorithms can be used in SSL client mode. - PCI-DSS v1.2 in point 4.1 requires compliant parties to use "strong cryptography" without precisely defining key lengths and algorithms. Common interpretation, partially based on previous versions of the standard, is that at least 128 bit key cipher, no export strength algorithms and no SSLv2 should be used. - SSL Server Rating Guide has been proposed to standardize SSL server assessment and currently is in draft version. Black Box Test and example In order to detect possible support of weak ciphers, the ports associated to SSL/TLS wrapped services must be identified. These typically include port 443, which is the standard https port; however, this may change because a) https services may be configured to run on non-standard ports, and b) there may be additional SSL/TLS wrapped services related to the web application. In general, a service discovery is required to identify such ports. The nmap scanner, via the “–sV” scan option, is able to identify SSL services. Vulnerability Scanners, in addition to performing service discovery, may include checks against weak ciphers (for example, the Nessus scanner has the capability of checking SSL services on arbitrary ports, and will report weak ciphers). Example 1. SSL service recognition via nmap. [root@test]# nmap -F -sV localhost Starting nmap 3.75 ( http://www.insecure.org/nmap/ ) at 2005-07-27 14:41 CEST Interesting ports on localhost.localdomain (127.0.0.1): (The 1205 ports scanned but not shown below are in state: closed) PORT STATE SERVICE VERSION 443/tcp open ssl OpenSSL 901/tcp open http Samba SWAT administration server 8080/tcp open http Apache httpd 2.0.54 ((Unix) mod_ssl/2.0.54 OpenSSL/0.9.7g PHP/4.3.11) 8081/tcp open http Apache Tomcat/Coyote JSP engine 1.0 Nmap run completed -- 1 IP address (1 host up) scanned in 27.881 seconds [root@test]# Example 2. Identifying weak ciphers with Nessus. The following is an anonymized excerpt of a report generated by the Nessus scanner, corresponding to the identification of a server certificate allowing weak ciphers (see underlined text). https (443/tcp) Description Here is the SSLv2 server certificate: Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: md5WithRSAEncryption Issuer: C=**, ST=******, L=******, O=******, OU=******, CN=****** Validity Not Before: Oct 17 07:12:16 2002 GMT Not After : Oct 16 07:12:16 2004 GMT Subject: C=**, ST=******, L=******, O=******, CN=****** Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (1024 bit) Modulus (1024 bit): 00:98:4f:24:16:cb:0f:74:e8:9c:55:ce:62:14:4e: 6b:84:c5:81:43:59:c1:2e:ac:ba:af:92:51:f3:0b: ad:e1:4b:22:ba:5a:9a:1e:0f:0b:fb:3d:5d:e6:fc: ef:b8:8c:dc:78:28:97:8b:f0:1f:17:9f:69:3f:0e: 72:51:24:1b:9c:3d:85:52:1d:df:da:5a:b8:2e:d2: 09:00:76:24:43:bc:08:67:6b:dd:6b:e9:d2:f5:67: e1:90:2a:b4:3b:b4:3c:b3:71:4e:88:08:74:b9:a8: 2d:c4:8c:65:93:08:e6:2f:fd:e0:fa:dc:6d:d7:a2: 3d:0a:75:26:cf:dc:47:74:29 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Comment: OpenSSL Generated Certificate Page 10 Network Vulnerability Assessment Report 25.05.2005 X509v3 Subject Key Identifier: 10:00:38:4C:45:F0:7C:E4:C6:A7:A4:E2:C9:F0:E4:2B:A8:F9:63:A8 X509v3 Authority Key Identifier: keyid:CE:E5:F9:41:7B:D9:0E:5E:5D:DF:5E:B9:F3:E6:4A:12:19:02:76:CE DirName:/C=**/ST=******/L=******/O=******/OU=******/CN=****** serial:00 Signature Algorithm: md5WithRSAEncryption 7b:14:bd:c7:3c:0c:01:8d:69:91:95:46:5c:e6:1e:25:9b:aa: 8b:f5:0d:de:e3:2e:82:1e:68:be:97:3b:39:4a:83:ae:fd:15: 2e:50:c8:a7:16:6e:c9:4e:76:cc:fd:69:ae:4f:12:b8:e7:01: b6:58:7e:39:d1:fa:8d:49:bd:ff:6b:a8:dd:ae:83:ed:bc:b2: 40:e3:a5:e0:fd:ae:3f:57:4d:ec:f3:21:34:b1:84:97:06:6f: f4:7d:f4:1c:84:cc:bb:1c:1c:e7:7a:7d:2d:e9:49:60:93:12: 0d:9f:05:8c:8e:f9:cf:e8:9f:fc:15:c0:6e:e2:fe:e5:07:81: 82:fc Here is the list of available SSLv2 ciphers: RC4-MD5 EXP-RC4-MD5 RC2-CBC-MD5 EXP-RC2-CBC-MD5 DES-CBC-MD5 DES-CBC3-MD5 RC4-64-MD5 The SSLv2 server offers 5 strong ciphers, but also 0 medium strength and 2 weak "export class" ciphers. The weak/medium ciphers may be chosen by an export-grade or badly configured client software. They only offer a limited protection against a brute force attack Solution: disable those ciphers and upgrade your client software if necessary. See http://support.microsoft.com/default.aspx?scid=kben-us216482 or http://httpd.apache.org/docs-2.0/mod/mod_ssl.html#sslciphersuite This SSLv2 server also accepts SSLv3 connections. This SSLv2 server also accepts TLSv1 connections. Vulnerable hosts (list of vulnerable hosts follows) Example 3. Manually audit weak SSL cipher levels with OpenSSL. The following will attempt to connect to Google.com with SSLv2. [root@test]# openssl s_client -no_tls1 -no_ssl3 -connect www.google.com:443 CONNECTED(00000003) depth=0 /C=US/ST=California/L=Mountain View/O=Google Inc/CN=www.google.com verify error:num=20:unable to get local issuer certificate verify return:1 depth=0 /C=US/ST=California/L=Mountain View/O=Google Inc/CN=www.google.com verify error:num=27:certificate not trusted verify return:1 depth=0 /C=US/ST=California/L=Mountain View/O=Google Inc/CN=www.google.com verify error:num=21:unable to verify the first certificate verify return:1 --- Server certificate -----BEGIN CERTIFICATE----- MIIDYzCCAsygAwIBAgIQYFbAC3yUC8RFj9MS7lfBkzANBgkqhkiG9w0BAQQFADCB zjELMAkGA1UEBhMCWkExFTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTESMBAGA1UEBxMJ Q2FwZSBUb3duMR0wGwYDVQQKExRUaGF3dGUgQ29uc3VsdGluZyBjYzEoMCYGA1UE CxMfQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcyBEaXZpc2lvbjEhMB8GA1UEAxMYVGhh d3RlIFByZW1pdW0gU2VydmVyIENBMSgwJgYJKoZIhvcNAQkBFhlwcmVtaXVtLXNl cnZlckB0aGF3dGUuY29tMB4XDTA2MDQyMTAxMDc0NVoXDTA3MDQyMTAxMDc0NVow aDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDU1v dW50YWluIFZpZXcxEzARBgNVBAoTCkdvb2dsZSBJbmMxFzAVBgNVBAMTDnd3dy5n b29nbGUuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC/e2Vs8U33fRDk 5NNpNgkB1zKw4rqTozmfwty7eTEI8PVH1Bf6nthocQ9d9SgJAI2WOBP4grPj7MqO dXMTFWGDfiTnwes16G7NZlyh6peT68r7ifrwSsVLisJp6pUf31M5Z3D88b+Yy4PE D7BJaTxq6NNmP1vYUJeXsGSGrV6FUQIDAQABo4GmMIGjMB0GA1UdJQQWMBQGCCsG AQUFBwMBBggrBgEFBQcDAjBABgNVHR8EOTA3MDWgM6Axhi9odHRwOi8vY3JsLnRo YXd0ZS5jb20vVGhhd3RlUHJlbWl1bVNlcnZlckNBLmNybDAyBggrBgEFBQcBAQQm MCQwIgYIKwYBBQUHMAGGFmh0dHA6Ly9vY3NwLnRoYXd0ZS5jb20wDAYDVR0TAQH/ BAIwADANBgkqhkiG9w0BAQQFAAOBgQADlTbBdVY6LD1nHWkhTadmzuWq2rWE0KO3 Ay+7EleYWPOo+EST315QLpU6pQgblgobGoI5x/fUg2U8WiYj1I1cbavhX2h1hda3 FJWnB3SiXaiuDTsGxQ267EwCVWD5bCrSWa64ilSJTgiUmzAv0a2W8YHXdG08+nYc X/dVk5WRTw== -----END CERTIFICATE----- subject=/C=US/ST=California/L=Mountain View/O=Google Inc/CN=www.google.com issuer=/C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/OU=Certification Services Division/CN=Thawte Premium Server CA/[email protected] --- No client certificate CA names sent --- Ciphers common between both SSL endpoints: RC4-MD5 EXP-RC4-MD5 RC2-CBC-MD5 EXP-RC2-CBC-MD5 DES-CBC-MD5 DES-CBC3-MD5 RC4-64-MD5 --- SSL handshake has read 1023 bytes and written 333 bytes --- New, SSLv2, Cipher is DES-CBC3-MD5 Server public key is 1024 bit Compression: NONE Expansion: NONE SSL-Session: Protocol : SSLv2 Cipher : DES-CBC3-MD5 Session-ID: 709F48E4D567C70A2E49886E4C697CDE Session-ID-ctx: Master-Key: 649E68F8CF936E69642286AC40A80F433602E3C36FD288C3 Key-Arg : E8CB6FEB9ECF3033 Start Time: 1156977226 Timeout : 300 (sec) Verify return code: 21 (unable to verify the first certificate) --- closed Example 4. Testing supported protocols and ciphers using SSLScan. SSLScan is a free command line tool that scans a HTTPS service to enumerate what protocols (supports SSLv2, SSLv3 and TLS1) and what ciphers the HTTPS service supports. It runs both on Linux and Windows OS (OSX not tested) and is released under a open source license. [user@test]$ ./SSLScan --no-failed mail.google.com _ ___ ___| |___ ___ __ _ _ __ / __/ __| / __|/ __/ _` | '_ \ \__ \__ \ \__ \ (_| (_| | | | | |___/___/_|___/\___\__,_|_| |_| Version 1.9.0-win http://www.titania.co.uk Copyright 2010 Ian Ventura-Whiting / Michael Boman Compiled against OpenSSL 0.9.8n 24 Mar 2010 Testing SSL server mail.google.com on port 443 Supported Server Cipher(s): accepted SSLv3 256 bits AES256-SHA accepted SSLv3 128 bits AES128-SHA accepted SSLv3 168 bits DES-CBC3-SHA accepted SSLv3 128 bits RC4-SHA accepted SSLv3 128 bits RC4-MD5 accepted TLSv1 256 bits AES256-SHA accepted TLSv1 128 bits AES128-SHA accepted TLSv1 168 bits DES-CBC3-SHA accepted TLSv1 128 bits RC4-SHA accepted TLSv1 128 bits RC4-MD5 Prefered Server Cipher(s): SSLv3 128 bits RC4-SHA TLSv1 128 bits RC4-SHA SSL Certificate: Version: 2 Serial Number: -4294967295 Signature Algorithm: sha1WithRSAEncryption Issuer: /C=ZA/O=Thawte Consulting (Pty) Ltd./CN=Thawte SGC CA Not valid before: Dec 18 00:00:00 2009 GMT Not valid after: Dec 18 23:59:59 2011 GMT Subject: /C=US/ST=California/L=Mountain View/O=Google Inc/CN=mail.google.com Public Key Algorithm: rsaEncryption RSA Public Key: (1024 bit) Modulus (1024 bit): 00:d9:27:c8:11:f2:7b:e4:45:c9:46:b6:63:75:83: b1:77:7e:17:41:89:80:38:f1:45:27:a0:3c:d9:e8: a8:00:4b:d9:07:d0:ba:de:ed:f4:2c:a6:ac:dc:27: 13:ec:0c:c1:a6:99:17:42:e6:8d:27:d2:81:14:b0: 4b:82:fa:b2:c5:d0:bb:20:59:62:28:a3:96:b5:61: f6:76:c1:6d:46:d2:fd:ba:c6:0f:3d:d1:c9:77:9a: 58:33:f6:06:76:32:ad:51:5f:29:5f:6e:f8:12:8b: ad:e6:c5:08:39:b3:43:43:a9:5b:91:1d:d7:e3:cf: 51:df:75:59:8e:8d:80:ab:53 Exponent: 65537 (0x10001) X509v3 Extensions: X509v3 Basic Constraints: critical CA:FALSE X509v3 CRL Distribution Points: URI:http://crl.thawte.com/ThawteSGCCA.crl X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication, Netscape Server Gated Crypto Authority Information Access: OCSP - URI:http://ocsp.thawte.com CA Issuers - URI:http://www.thawte.com/repository/Thawte_SGC_CA.crt Verify Certificate: unable to get local issuer certificate Renegotiation requests supported Example 5. Testing common SSL flaws with ssl_tests ssl_tests (http://www.pentesterscripting.com/discovery/ssl_tests) is a bash script that uses sslscan and openssl to check for various flaws - ssl version 2, weak ciphers, md5withRSAEncryption,SSLv3 Force Ciphering Bug/Renegotiation. [user@test]$ ./ssl_test.sh 192.168.1.3 443 +++++++++++++++++++++++++++++++++++++++++++++++++ SSL Tests - v2, weak ciphers, MD5, Renegotiation by Aung Khant, http://yehg.net +++++++++++++++++++++++++++++++++++++++++++++++++ [*] testing on 192.168.1.3:443 .. [*] tesing for sslv2 .. [*] sslscan 192.168.1.3:443 | grep Accepted SSLv2 Accepted SSLv2 168 bits DES-CBC3-MD5 Accepted SSLv2 56 bits DES-CBC-MD5 Accepted SSLv2 40 bits EXP-RC2-CBC-MD5 Accepted SSLv2 128 bits RC2-CBC-MD5 Accepted SSLv2 40 bits EXP-RC4-MD5 Accepted SSLv2 128 bits RC4-MD5 [*] testing for weak ciphers ... [*] sslscan 192.168.1.3:443 | grep 40 bits | grep Accepted Accepted SSLv2 40 bits EXP-RC2-CBC-MD5 Accepted SSLv2 40 bits EXP-RC4-MD5 Accepted SSLv3 40 bits EXP-EDH-RSA-DES-CBC-SHA Accepted SSLv3 40 bits EXP-DES-CBC-SHA Accepted SSLv3 40 bits EXP-RC2-CBC-MD5 Accepted SSLv3 40 bits EXP-RC4-MD5 Accepted TLSv1 40 bits EXP-EDH-RSA-DES-CBC-SHA Accepted TLSv1 40 bits EXP-DES-CBC-SHA Accepted TLSv1 40 bits EXP-RC2-CBC-MD5 Accepted TLSv1 40 bits EXP-RC4-MD5 [*] sslscan 192.168.1.3:443 | grep 56 bits | grep Accepted Accepted SSLv2 56 bits DES-CBC-MD5 Accepted SSLv3 56 bits EDH-RSA-DES-CBC-SHA Accepted SSLv3 56 bits DES-CBC-SHA Accepted TLSv1 56 bits EDH-RSA-DES-CBC-SHA Accepted TLSv1 56 bits DES-CBC-SHA [*] testing for MD5 certificate .. [*] sslscan 192.168.1.3:443 | grep MD5WithRSAEncryption [*] testing for SSLv3 Force Ciphering Bug/Renegotiation .. [*] echo R | openssl s_client -connect 192.168.1.3:443 | grep DONE depth=0 /C=DE/ST=Berlin/L=Berlin/O=XAMPP/OU=XAMPP/CN=localhost/emailAddress=admin@localhost verify error:num=18:self signed certificate verify return:1 depth=0 /C=DE/ST=Berlin/L=Berlin/O=XAMPP/OU=XAMPP/CN=localhost/emailAddress=admin@localhost verify return:1 RENEGOTIATING depth=0 /C=DE/ST=Berlin/L=Berlin/O=XAMPP/OU=XAMPP/CN=localhost/emailAddress=admin@localhost verify error:num=18:self signed certificate verify return:1 depth=0 /C=DE/ST=Berlin/L=Berlin/O=XAMPP/OU=XAMPP/CN=localhost/emailAddress=admin@localhost verify return:1 DONE [*] done White Box Test and example Check the configuration of the web servers which provide https services. If the web application provides other SSL/TLS wrapped services, these should be checked as well. Example: The following registry path in Microsoft Windows 2003 defines the ciphers available to the server: Testing SSL certificate validity – client and server When accessing a web application via the https protocol, a secure channel is established between the client (usually the browser) and the server. The identity of one (the server) or both parties (client and server) is then established by means of digital certificates. In order for the communication to be set up, a number of checks on the certificates must be passed. While discussing SSL and certificate based authentication is beyond the scope of this Guide, we will focus on the main criteria involved in ascertaining certificate validity: a) checking if the Certificate Authority (CA) is a known one (meaning one considered trusted), b) checking that the certificate is currently valid, and c) checking that the name of the site and the name reported in the certificate match. Remember to upgrade your browser because CA certs expired too, in every release of the browser, CA Certs has been renewed. Moreover it's important to update the browser because more web sites require strong cipher more of 40 or 56 bit. Let’s examine each check more in detail. a) Each browser comes with a preloaded list of trusted CAs, against which the certificate signing CA is compared (this list can be customized and expanded at will). During the initial negotiations with an https server, if the server certificate relates to a CA unknown to the browser, a warning is usually raised. This happens most often because a web application relies on a certificate signed by a self-established CA. Whether this is to be considered a concern depends on several factors. For example, this may be fine for an Intranet environment (think of corporate web email being provided via https; here, obviously all users recognize the internal CA as a trusted CA). When a service is provided to the general public via the Internet, however (i.e. when it is important to positively verify the identity of the server we are talking to), it is usually imperative to rely on a trusted CA, one which is recognized by all the user base (and here we stop with our considerations; we won’t delve deeper in the implications of the trust model being used by digital certificates). b) Certificates have an associated period of validity, therefore they may expire. Again, we are warned by the browser about this. A public service needs a temporally valid certificate; otherwise, it means we are talking with a server whose certificate was issued by someone we trust, but has expired without being renewed. c) What if the name on the certificate and the name of the server do not match? If this happens, it might sound suspicious. For a number of reasons, this is not so rare to see. A system may host a number of name-based virtual hosts, which share the same IP address and are identified by means of the HTTP 1.1 Host: header information. In this case, since the SSL handshake checks the server certificate before the HTTP request is processed, it is not possible to assign different certificates to each virtual server. Therefore, if the name of the site and the name reported in the certificate do not match, we have a condition which is typically signalled by the browser. To avoid this, one of two techniques should be used. First is Server Name Indication (SNI), which is a TLS extension from RFC 3546; and second is IP-based virtual servers must be used. and describe techniques to deal with this problem and allow name-based virtual hosts to be correctly referenced. Black Box Testing and examples Examine the validity of the certificates used by the application. Browsers will issue a warning when encountering expired certificates, certificates issued by untrusted CAs, and certificates which do not match namewise with the site to which they should refer. By clicking on the padlock which appears in the browser window when visiting an https site, you can look at information related to the certificate – including the issuer, period of validity, encryption characteristics, etc. If the application requires a client certificate, you probably have installed one to access it. Certificate information is available in the browser by inspecting the relevant certificate(s) in the list of the installed certificates. These checks must be applied to all visible SSL-wrapped communication channels used by the application. Though this is the usual https service running on port 443, there may be additional services involved depending on the web application architecture and on deployment issues (an https administrative port left open, https services on non-standard ports, etc.). Therefore, apply these checks to all SSL-wrapped ports which have been discovered. For example, the nmap scanner features a scanning mode (enabled by the –sV command line switch) which identifies SSL-wrapped services. The Nessus vulnerability scanner has the capability of performing SSL checks on all SSL/TLS-wrapped services. Rather than providing a fictitious example, we have inserted an anonymized real-life example to stress how frequently one stumbles on https sites whose certificates are inaccurate with respect to naming. The following screenshots refer to a regional site of a high-profile IT company. Warning issued by Microsoft Internet Explorer. We are visiting an .it site and the certificate was issued to a .com site! Internet Explorer warns that the name on the certificate does not match the name of the site. Warning issued by Mozilla Firefox. The message issued by Firefox is different – Firefox complains because it cannot ascertain the identity of the .com site the certificate refers to because it does not know the CA which signed the certificate. In fact, Internet Explorer and Firefox do not come preloaded with the same list of CAs. Therefore, the behavior experienced with various browsers may differ. White Box Testing and examples Examine the validity of the certificates used by the application at both server and client levels. The usage of certificates is primarily at the web server level; however, there may be additional communication paths protected by SSL (for example, towards the DBMS). You should check the application architecture to identify all SSL protected channels. - RFC2246. The TLS Protocol Version 1.0 (updated by RFC3546) - http://www.ietf.org/rfc/rfc2246.txt - RFC2817. Upgrading to TLS Within HTTP/1.1 - http://www.ietf.org/rfc/rfc2817.txt - RFC3546. Transport Layer Security (TLS) Extensions - http://www.ietf.org/rfc/rfc3546.txt - www.verisign.net features various material on the topic - Vulnerability scanners may include checks regarding certificate validity, including name mismatch and time expiration. They usually report other information as well, such as the CA which issued the certificate. Remember that there is no unified notion of a “trusted CA”; what is trusted depends on the configuration of the software and on the human assumptions made beforehand. Browsers come with a preloaded list of trusted CAs. If your web application relies on a CA which is not in this list (for example, because you rely on a self-made CA), you should take into account the process of configuring user browsers to recognize the CA. - The Nessus scanner includes a plugin to check for expired certificates or certificates which are going to expire within 60 days (plugin “SSL certificate expiry”, plugin id 15901). This plugin will check certificates installed on the server. - Vulnerability scanners may include checks against weak ciphers. For example, the Nessus scanner (http://www.nessus.org) has this capability and flags the presence of SSL weak ciphers (see example provided above). - You may also rely on specialized tools such as SSL Digger (http://www.mcafee.com/us/downloads/free-tools/ssldigger.aspx), or – for the command line oriented – experiment with the openssl tool, which provides access to OpenSSL cryptographic functions directly from a Unix shell (may be already available on *nix boxes, otherwise see www.openssl.org). - To identify SSL-based services, use a vulnerability scanner or a port scanner with service recognition capabilities. The nmap scanner features a “-sV” scanning option which tries to identify services, while the nessus vulnerability scanner has the capability of identifying SSL-based services on arbitrary ports and to run vulnerability checks on them regardless of whether they are configured on standard or non-standard ports. - In case you need to talk to a SSL service but your favourite tool doesn’t support SSL, you may benefit from a SSL proxy such as stunnel; stunnel will take care of tunneling the underlying protocol (usually http, but not necessarily so) and communicate with the SSL service you need to reach. - testssl.sh http://drwetter.eu/software/ssl/ - O-Saft https://www.owasp.org/index.php/O-Saft can test for any cipher, independent of the underlaying SSL library (such as OpenSSL). - Nmap includes NSE scripts to test for SSLv2 (https://nmap.org/nsedoc/scripts/sslv2.html) and enumerating SSLv3/TLS ciphers (https://nmap.org/nsedoc/scripts/ssl-enum-ciphers.html). Additionally it can also detect Diffie-Hellman weaknesses (https://nmap.org/nsedoc/scripts/ssl-dh-params.html), Poodle (https://nmap.org/nsedoc/scripts/ssl-poodle.html) and even Heartbleed (https://nmap.org/nsedoc/scripts/ssl-heartbleed.html) - Finally, a word of advice. Though it may be tempting to use a regular browser to check certificates, there are various reasons for not doing so. Browsers have been plagued by various bugs in this area, and the way the browser will perform the check might be influenced by configuration settings that may not be evident. Instead, rely on vulnerability scanners or on specialized tools to do the job. - High-Tech Bridge - Online tool to verify SSL/TLS compliance with NIST SP 800-52 guidelines and PCI DSS requirements on any TCP port.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506399.24/warc/CC-MAIN-20230922102329-20230922132329-00026.warc.gz
CC-MAIN-2023-40
26,214
72
https://coursesity.com/course-detail/getting-started-with-google-kubernetes-engine-
code
You don’t have anycollection list yet. Create your first course collection. Sign in to add this course to your collection list. Press enter to see all results for "" Introduction to Kubernetes A Practical Guide to Kubernetes The Complete DevOps Engineer Course 2.0 - Java & Kubernetes
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496664469.42/warc/CC-MAIN-20191112001515-20191112025515-00280.warc.gz
CC-MAIN-2019-47
286
6
https://experienceleaguecommunities.adobe.com/t5/adobe-livecycle-questions/creating-a-subform-as-popup-dialog-alternative/qaq-p/163366
code
I managed to create a subform to be used as an alternative for Acrobat Dialog. Basically, its a popup to capture some data and append it to existing fields in the main form. I created the subform with solid background to ensure all other fields behind the form are not clickable. The only issue I am facing is that when the subform is made "visible", and though it is in front of all other objects of the parent form, yet when you hover over a field which is behind the subform, you could still see it is becoming visible, and you can click it, and edit such field. This behavior is actually confusing. Is it possible to make the fields behind the subform (popup) inaccessible? I just added a dummy button at the top of the subform, and made its background "None", added property access='protected' using XML view, cleared the caption and expand it to same size as the parent subform. It worked. I tweaked appearance to make it look like 3D window and now the popup is working like a charm. This was actually a solution to help us move away from Acrobat Dialog which doesn't work under HTML5. I hope this solution works well in HTML5 too.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038476606.60/warc/CC-MAIN-20210418103545-20210418133545-00512.warc.gz
CC-MAIN-2021-17
1,138
6
https://www.jquerycards.com/reference/andself/
code
Learn all about the jQuery function .andSelf(). Note: This function has been deprecated and is now an alias for .addBack(), which should be used with jQuery 1.8 and later. As described in the discussion for .end(), jQuery objects maintain an internal stack that keeps track of changes to the matched set of elements. When one of the DOM traversal methods is called, the new set of elements is pushed onto the stack. If the previous set of elements is desired as well, .andSelf() can help. Consider a page with a simple list on it: The result of the following code is a red background behind items 3, 4 and 5: First, the initial selector locates item 3, initializing the stack with the set containing just this item. The call to .nextAll() then pushes the set of items 4 and 5 onto the stack. Finally, the .andSelf() invocation merges these two sets together, creating a jQuery object that points to all three items in document order: [ <li.third-item>, <li>, <li> ].
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949181.44/warc/CC-MAIN-20230330101355-20230330131355-00302.warc.gz
CC-MAIN-2023-14
966
12
https://www.spigotmc.org/resources/movemenow.17/
code
Source : GitHub License : MIT Dependency : Yamler None ! This is a very simple plugin that will move a player whenever he gets kicked, depending on a whitelist or blacklist. mode can either be blacklist or whitelist. In blacklist mode, player will always be moved to default server unless his kick message contains one of the words/phrases in list. In whitelist mode, he will always be kicked unless his kick message contains one of the phrases in list. servername is the name of the server to kick to.Code (Text):mode: blacklist message is the message sent to the player when he switches server. It can be spanned over multiple lines using the following syntax : %kickmsg% will be replaced with the actual message as sent by the server.Code (Text): "This is the first line" "This is the third line" Good plugins requires caffeine : Move player on kick Great plugin, works kinda okay with Snap - would be great if you ported the plugin to Velocity, some folks have a different main server to a fallback server that also need blacklisting/whitelisting words and custom messages which MoveMeNow provides, but whatever..
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304515.74/warc/CC-MAIN-20220124054039-20220124084039-00018.warc.gz
CC-MAIN-2022-05
1,117
12
https://www.throughthefog.org/everyone-in-my-town-only-wants-me-to-save-them/
code
Small towns bring with them a measure of closeness between their inhabitants. Knowing all your neighbors and asking for favors is par for the course, But can these acquaintances ask for too much. What if they asked you to go Through The Fog? This Weeks Story is Everyone in my town only wants me to save them by ShortStory1 It Would be a huge help if you could follow/share Through The Fog On Social Media! for more episodes check us out online at throughthefog.org Through The Fog is presented by Flyover State Park Want to Support the Show? Who Wouldn't There is currently two ways. You can by Merch in the official Through The Fog Merch Store Or you can donate by Becoming a patron at patreon.com/fog_cast Either Way it is greatly appreciated!!! Through The Fog was Created Recorded and Edited by Haptic The Intro Theme was created by Kevyn Kerrivan Music Is From Youtube Studio, Story Blocks, Epidemic Sound, and Freesound.org Thanks so much for watching, and Keep your eyes on the fog.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499758.83/warc/CC-MAIN-20230129180008-20230129210008-00381.warc.gz
CC-MAIN-2023-06
990
13
http://freecode.com/tags/english?page=7&sort=vitality&with=&without=838
code
OpenXava is a framework to develop AJAX JavaEE/J2EE applications rapidly and easily. It allows you to define applications only with POJOs, JPA, and Java 5 annotations. It is feature rich and flexible. It generates JSR-168 portlet applications (Liferay, WebSphere Portal, Jetspeed, etc.). Excelsior JET is a Java VM enhanced with an Ahead-Of-Time (AOT) compiler and deployment toolkit. It is certified Java Compatible on Windows and Linux on Intel x86 hardware. The 64-bit version is in the works. Excelsior JET Optimizer transforms your classes and JARs into high-performance binary executables. Excelsior JET Runtime includes a licensed Sun implementation of the Java API and Excelsior's proprietary JVM, which is responsible for Java memory management, threading, synchronization, security, and JIT compilation of classes that could not be precompiled. The Excelsior JET Installation Toolkit makes it possible to prepare your optimized application for deployment to end-user systems. LiVES is a simple to use yet powerful video effects, editing, conversion, and playback system aimed at the digital video artist and VJ. It runs under Linux, BSD, Mac OS X/Darwin, IRIX, and openMosix. It is frame and sample accurate, can handle almost all types of video, and is fully extendable through plugins and the included plugin builder tool. It can also be controlled remotely using OSC. phlyMail is a groupware, webmailer, and PIM. It offers unlimited nested groups, unlimited POP3/IMAP profiles, quotas, an integrated address book, a calendar with multiple reminders and event repetitions, a file manager with an integrated WebDAV server, the ability to send faxes, SMS support (which lets you send SMS, get reminded of events via SMS, and get email notification via SMS), a bookmark manager, themes, and multilingual support. It uses either sendmail or SMTP to send email, and can handle MIME and SSL connections. Support for IDN (Internationalized Domain Names) is included. Through its modular design, it's easy to add completely new features as modules, which can be plugged into the system. Talend Open Studio for Data Quality helps you to profile your data. The ergonomic interface allows you to define metrics (indicators) and collect statistics on your data in a few clicks. It comes with a set of regular expressions that helps you to identify bad data. You can create your own regular expressions and use them in data profiling analyses. A lot of options exist for each indicator, which change the behavior of the indicator so that it gives you more pertinent information. Data quality options on indicators alert you when your data quality is not what you expected. Antivirus Live CD is a 4MLinux fork including the ClamAV scanner. It's designed for system admins who need a lightweight live CD with an antivirus scanner. Both Ethernet (including Wi-Fi) and dial-up (including fast USB modems) Internet connections are supported, to enable automatic updates of the virus signature database. All partitions are mounted automatically during boot so they can be scanned by ClamAV (the supported filesystems are: btrfs, ext2, ext3, ext4, FAT, HFS, HFS+, jfs, Minix, NTFS, ReiserFS, and XFS). Antivirus Live CD image is fully compatible with UNetbootin, which can be used to create an easy-to-use Antivirus Live USB. Zero Install is a decentralized cross-distribution software installation system. It allows software developers to publish programs directly from their own Web sites, while supporting features familiar from centralized distribution repositories such as shared libraries, automatic updates, and digital signatures. It is intended to complement, rather than replace, the operating system's package management. 0install packages never interfere with those provided by the distribution.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678693350/warc/CC-MAIN-20140313024453-00066-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
3,799
7
https://www.phonescoop.com/phones/p_forum.php?fm=m&ff=1142&fh=1923709
code
I am trying to get my phone to sync with my computer to back up my contacts and calendar. But I am having an issue with syncing it. I was trying to delete the hotmail email that is on the phone and it's not allowing me. Any one have any ideas about can be done???
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494936.89/warc/CC-MAIN-20230127033656-20230127063656-00780.warc.gz
CC-MAIN-2023-06
263
1
http://15418.courses.cs.cmu.edu/spring2016/lecture/progperf1/slide_014
code
It's helpful to think of the two extremes. If we have a granularity of N, then our problem is that one worker thread is doing all the work and we've essentially reverted back to the sequential program. On the other hand, we've already seen the problem with a granularity of 1, which is that we might get overwhelmed with the overhead of synchronization. In general, the trade-off is between synchronization cost and thread workload, where increasing granularity will decrease synchronization cost and increase thread workload while decreasing granularity will do the opposite. The trade-off is between synchronization cost and workload balance. We want to have enough amount of tasks to achieve a good workload balance. Also, we want to have minimum tasks to reduce synchronization cost. Another way we can think of granularity control as two extremes is static vs. dynamic assignment. Say we have N workers and we divide into exactly N large tasks. This is equivalent to static assignment and the way we divide the tasks is the problem of static assignment. The more tasks we create, the less of an issue uneven division of work is because dynamic assignment will handle allocating the different size tasks. However, the overhead costs to doing dynamic assignment also increases. Interestingly, it may be possible to sometime dynamically determine the granularity as well. In 15210's pasllab, there was a notion of cstmnt's which allow you to input a complexity function and some "magic" happens to determine when to run sequentially and when to run in parallel. Though this example is not exactly the same as determining the granularity of tasks, I can see there being some parallel (no pun intended). Are there libraries that do dynamic granularity control in the context of tasks? As mentioned above, a lot of optimization relies on the machine that its run on. In application, its not always known what machine will be running the code. How do programmers deal with this issue? In summary, we need to strike a balance between amount of work and amount of overhead while also considering the machine we're running on when deciding task size. More tasks is likely to lead to more evenly distributed work. We usually want the number of tasks to be some multiple of the number of processors because we want each processor to be doing roughly the same amount of work. However, if we have too many tasks then we start incurring the cost of scheduling the tasks and we don't get enough work done compared to the effort it took to assign the work itself. I think when programmers to remedy the problem of not knowing the machine the code will run on, the programmer can write code with multiple machines in mind and try to parametrize the things that will change with hardware like number of tasks, blocks, or threads. In choosing the task size we can think about mean and variance. We want the mean workload to be large, then we'll spend less time in context switching and synchronization overhead. On the other hand we want the variance of workload to be small, so that threads won't waste time waiting for heavy tasks to complete. In the case where we are grouping tasks together, choosing a task size is a trade-off: a larger task size results in a larger mean workload, but also larger variance. Is it possible that the system overrides the programmers work distribution and scheduling decisions if it feels that it is sub optimal and can come up with a better distribution and scheduling policy? @chuangxuean: I think the difficulty of that is that the system will need to predict the length of the work which is practically impossible.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663016949.77/warc/CC-MAIN-20220528154416-20220528184416-00368.warc.gz
CC-MAIN-2022-21
3,639
15
https://linguistics.stackexchange.com/questions/16893/does-syntactic-category-determines-position-in-the-sentence-and-the-position-in
code
Source: p 48, Syntax, A Generative Introduction (3 ed, 2012) by Andrew Carnie. The following is NOT a homework question as I am not studying Linguistics but I have endeavoured to evidence my effort. In section 1 of this chapter, it was claimed that we needed parts of speech to help us determine where in the sentence a word appeared. So for example, we know that verbs and adjectives in English don’t function as the subjects of sentences. Above we have given one test for part of speech category in terms of the word’s distribution in the sentence. Here’s something to think about. Have we created a circular argument: [1.] category determines position in the sentence and [2.] the position in the sentence determines category? Is this really circular? Does it matter? [p 47 states:] The part of speech of a word is determined by its place in the sentence [ie: Position] and by its morphology, not by its meaning. [2.] is true if only position, and NOT morphology, determines Syntactic Category. So [2.] is false in general. [1.] is false because Syntactic Distributions of different Syntactic Categories can overlap (q.v. third paragraph, p 50). But because a false premise implies anything, 1 ⇒ 2 and 2 ⇒ 1 are valid (but NOT sound) arguments. Ergo the argument above is circular. QED. Am I correct?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506027.39/warc/CC-MAIN-20230921105806-20230921135806-00459.warc.gz
CC-MAIN-2023-40
1,313
9
https://www.reference.com/pets-animals/good-setup-crested-gecko-ff8c781ee4568df
code
A good setup for a crested gecko consists of a suitable cage with a secure lid, a food dish, a water dish and plenty of places to hide. Most crested geckos thrive between 78 and 87 degrees Fahrenheit; depending on the temperature of a gecko's home, the habitat may require additional heating devices. A crested gecko needs to have sufficient room to exercise and explore. Hatchling crested geckos are comfortable in cages the size of a 10-gallon aquarium, while adults require cages that are about 20 gallons in size or larger. While aquariums make suitable cages, commercially produced reptile cages are also acceptable. Because crested geckos are arboreal lizards, their cages should be rather tall. A 20-gallon aquarium can be turned on its end to provide a taller cage; in such a situation, the lid becomes a door. Crested geckos require numerous hiding places to feel secure. As they are nocturnal, they may not be visible often during the daytime. Plastic or live plants make good hiding places and provide the gecko with surfaces from which it can lick water. The gecko's hiding spots need not be elaborate or natural looking; paper egg-crate material or paper towel rolls work well for this purpose.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583515555.58/warc/CC-MAIN-20181022222133-20181023003633-00344.warc.gz
CC-MAIN-2018-43
1,207
3
http://hkscyw.xyz/archives/7016
code
Gradelyfiction Let Me Game in Peace update – Chapter 1329 – Invincible Dodge handy touch recommendation-p2 Novel–Let Me Game in Peace–Let Me Game in Peace Chapter 1329 – Invincible Dodge grip dinosaurs “w.a.n.g Chan, do you find yourself able to keep?” Zhou Wen initially sought w.a.n.g Chan’s point of view. “It’s unattainable to completely get rid of the consequences. On the other hand, it’s simple enough to manage them slightly but not induce excessive hassle,” said Woman Supreme Yin confidently. “I wish to be.” w.a.n.g Chan was very opinionated. Zhou Wen took a very careful start looking and was immediately alarmed. It wasn’t a halo whatsoever, nevertheless the seventh bullet. It spun about the blood vessels-pigmented avatar with the performance of lighting, but it surely couldn’t effect its entire body. w.a.n.g Chan unveiled a style of frustration when she observed that. This remaining Zhou Wen somewhat depressed. The confident-get rid of bullets have been circling him, looking his life. A particular miscalculation could result in an irrevocable results. This is a burdensome stress. No one knew in the event the bullets would pierce the bloodstream-shaded avatar’s human body the very up coming following. Soon after going back to Globe, Zhou Wen very first forwarded w.a.n.g Lu a message, showing her not to bother with w.a.n.g Chan. He also described the typical problem. This has been also to begin with w.a.n.g Chan possessed read another person declare that her Human body of Bane was very good. This is unmatched. She increased her eye as she investigated Young lady Superior Yin using an concept loaded with antic.i.p.ation and fear of disappointment. A Chapter of Adventures “I would like to stay.” w.a.n.g Chan was very opinionated. The Calamity-standard gunshots sounded once more, nonetheless they still did not contact Zhou Wen. The bullets were dodged because of the Perfect Robe. Again, he spotted the Stainless steel Guards as well as Wonderful Challenge G.o.ds. Just as right before, Zhou Wen didn’t shift in any way. His Incredible Robe danced because he dodged each of the bullets. “It’s not possible to fully eliminate the influences. On the other hand, it’s simple enough to control them slightly and not induce far too much difficulty,” claimed Young lady Superior Yin with confidence. What Might Have Been Expected w.a.n.g Chan discovered a peek of discontent when she listened to that. Zhou Wen and w.a.n.g Chan have been overjoyed. w.a.n.g Chan knelt down and kowtowed to Lady Supreme Yin, before she could do so, she was elevated up by an imperceptible drive. Sad to say, there seemed to be no this kind of element like a benefit for achieving the Great Palace in-activity. It was actually pointless regardless of whether Zhou Wen arrived there. “It’s unattainable to totally take away the outcomes. Even so, it’s not so difficult to stop them slightly and not lead to far too much hassle,” explained Woman Supreme Yin confidently. Seeing that he had practically nothing exclusive regarding w.a.n.g Chan over the Moon and this there was no real danger, Zhou Wen got up and came back to Planet. Upon hearing that w.a.n.g Chan was good and may even be capable to avoid the power of calamity, w.a.n.g Lu had also been very happy. She even exhorted Zhou Wen being thorough. She was good on the side and Zhou Wen didn’t need to be concerned. Following returning to The planet, Zhou Wen first delivered w.a.n.g Lu a note, informing her not to concern yourself with w.a.n.g Chan. He also described the normal situation. Chance soon after shot—all six successive vaccinations skipped. None of them attack the blood stream-colored avatar’s body. With your a powerful dodging ability, it was simple enough to get to the Great Palace. Even a regular individual could finish the process. The crucial seventh chance is finally here… Am I Able To avoid it? Zhou Wen was extremely tense. what is the hardest higher Coming into this game once more, Zhou Wen summoned each of the Chance Friend Beasts, such as Invincible Lucky Legend. He wore whatever he could dress in and had whatever he couldn’t have on by his area to raise his valor. Zhou Wen didn’t leave behind since he stood there experimenting. He needed to know how many times he could dodge the shots with the aid of Invincible Fortunate enough Star and also other successful tools. He desired to know how likely it was subsequently to attain a very effect. “Don’t kowtow me. I still prefer to exist a few more many years.” Lady Supreme Yin turned into Zhou Wen and reported, “Take your gold apple and acquire lost as far as you could. Leave this fresh woman with me.” I dodged it… Zhou Wen found the Heavenly Robe proceed on its own. It yanked the blood-shaded avatar’s entire body aside, dodging the Calamity-level bullet. The results manufactured Zhou Wen even more joyful. After having a subsequent spherical of the seventh bullet, the Calamity-quality bullets still neglected to strike the blood flow-pigmented avatar covered because of the Incredible Robe. The other round’s seventh sure-eliminate bullet was like the 1st round’s absolutely sure-kill bullet. It constantly circled the our blood-decorated avatar’s physique, but it neglected to hurt the blood stream-decorated avatar. quantum leap multiverse transmigration Unexpectedly, Young lady Supreme Yin rolled her eye at him and claimed, “Are you dreaming? I only asserted that the feature of Bane is very precious, although i didn’t declare that one would definitely be very strong when they had a Bane figure. Let alone the Calamity-level, you people can’t even reach the Mythical…” I dodged it… Zhou Wen found the Incredible Robe shift by itself. It yanked the bloodstream-colored avatar’s human body to the side, dodging the Calamity-level bullet. Just after going back to The planet, Zhou Wen initial sent w.a.n.g Lu information, telling her not to think about w.a.n.g Chan. Also, he described the general scenario. With listening to that w.a.n.g Chan was great and might even be capable to quit the strength of calamity, w.a.n.g Lu had also been thrilled. She even exhorted Zhou Wen to generally be thorough. She was fine on the part and Zhou Wen didn’t need to be concerned. This was also initially w.a.n.g Chan had been told someone state that her Physique of Bane was decent. This has been remarkable. She increased her eyeballs as she looked at Woman Supreme Yin with an manifestation filled with antic.i.p.ation and nervous about discouragement. w.a.n.g Chan unveiled a style of discouragement when she heard that. Zhou Wen and w.a.n.g Chan ended up overjoyed. w.a.n.g Chan knelt down and kowtowed to Woman Superior Yin, before she could accomplish that, she was elevated up by an imperceptible drive. Golf shot just after shot—all six successive shots forgotten. Not one of them reach the blood-decorated avatar’s system.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711074.68/warc/CC-MAIN-20221206060908-20221206090908-00602.warc.gz
CC-MAIN-2022-49
6,993
42
https://pubmed.ncbi.nlm.nih.gov/11301035/
code
Although the timing of single spikes is known to code for time-varying features of a sensory stimulus, it remains unclear whether time is also exploited in the neuronal coding of the spatial structure of the environment, where nontemporal stimulus features are fundamental. This report demonstrates that, in the whisker representation of rat cortex, precise spike timing of single neurons increases the information transmitted about stimulus location by 44%, compared to that transmitted only by the total number of spikes. Crucial to this code is the timing of the first spike after whisker movement. Complex, single neuron spike patterns play a smaller, synergistic role. Timing permits very few spikes to transmit high quantities of information about a behaviorally significant, spatial stimulus.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297284704.94/warc/CC-MAIN-20240425032156-20240425062156-00533.warc.gz
CC-MAIN-2024-18
799
1
https://www.pulumi.com/ai/answers/coLynFauAm18PYzdeumkyp/deploying-ibm-business-automation-insights-on-azure-kubernetes-service
code
Deploy the ibm-business-automation-insights-dev helm chart on Azure Kubernetes Service (AKS)TypeScript To deploy the ibm-business-automation-insights-devHelm chart on Azure Kubernetes Service (AKS), you'll need to do several things: - Set up an AKS cluster where you'll deploy your applications. - Have the Helm CLI installed on your machine to handle Helm charts. - Have a Pulumi project set up to define the infrastructure needed to run the AKS cluster. Assuming you have the prerequisites such as Pulumi CLI installed and your Azure account configured, you will need to create a new Pulumi TypeScript project, add the necessary dependencies, and define the resources. In this explanation, I'll guide you through creating an AKS cluster using Pulumi and deploying the ibm-business-automation-insights-devHelm chart to it. Setting Up the AKS Cluster First, we use the azure-nativepackage to provision an AKS cluster. This package is directly mapped to Azure's APIs, giving us fine-grained access to Azure's resources. We define the cluster with required properties such as node size, number of nodes, and the Kubernetes version. Deploying the Helm Chart With the AKS cluster set up, we can deploy applications. We'll deploy a Helm chart using the Helm Release resource from the Pulumi Kubernetes provider. This provider allows us to interact with the Kubernetes API, so we can deploy Kubernetes applications and manage other Kubernetes resources. Let's go through the code to make this happen: In the code above, we start by creating a new Azure Resource Group. Then, an Azure AD application and service principal are created for AKS to interact with other Azure services under an identity. The next step is to create the AKS cluster with its properties such as node count, VM size, and Kubernetes version. After the AKS cluster is provisioned, we retrieve the kubeconfig which allows us to interact with the AKS cluster using Kubernetes commands. We then create a Pulumi Kubernetes provider using the obtained kubeconfig. This provider is used in the deployment of the Helm chart fetchOptsparameter should specify the Helm repository where the chart is located. Finally, we export the kubeconfig and Helm chart status, to be used for accessing the cluster and checking the deployment status respectively. This code will result in an AKS cluster ready for use, and with the ibm-business-automation-insights-devHelm chart deployed onto it. Keep in mind that you should replace placeholder values like ssh-rsa PUB_KEY_HERE adminuserwith appropriate values for your environment. Also, the valuessection in the Helm chart should be configured according to the specific needs of your deployment.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819067.85/warc/CC-MAIN-20240424045636-20240424075636-00169.warc.gz
CC-MAIN-2024-18
2,691
23
https://discuss.harness.io/t/overops-agent-jboss-logmanager-error/11644
code
After adding the OverOps agent JBoss fails to start with Failed to load the specific log manager class org.jboss.logmanager.LogManager or a similar Error message. Java 11 and newer JBoss/Wildfly Agent : any version Ensure that (the sequence is important): com.sparktale.bugtaleis added to -Djboss.modules.system.pgksargument (see example below) - OverOps is configured after the above Starting with JBoss EAP 7.4; you can use MODULE_OPTSto attach the OverOps agent which will ensure the correct sequence. -Xbootclasspath/aflag if still used Starting with jdk11, having JBoss logmanager on the boot classpath causes various problems, where the main one could be seen in: [MODULES-393] Make jboss-modules a Java agent and allow other agents to be set as module arguments - Red Hat Issue Tracker. As seen in the link above Redhat changed how they work and now instead of supplying the logmanager, through -Xbootclasspath/a flag they supply their own java agent which loads the modules for himself and other agents as well. These need to be configured correctly to work side by side with other agents.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653183.5/warc/CC-MAIN-20230606214755-20230607004755-00000.warc.gz
CC-MAIN-2023-23
1,097
15
https://devblogs.microsoft.com/dotnet/new-tutorial-for-migrating-applications-with-membership-and-user-profile-information-from-universal-providers-to-asp-net-identity/
code
New tutorial for migrating applications with membership and User Profile information from Universal Providers to ASP.NET Identity ASP.NET Identity is the new membership system for building ASP.NET applications. To learn more about ASP.NET Identity, please visit asp.net/identity The new tutorial explains how to migrate an application that uses Universal Providers for user and role management to the new ASP.NET Identity system. The tutorial also focuses on migrating user profile data created using Universal Providers. The approach mentioned to migrate profile data can be used in applications with SQL membership as well. In Universal Providers, the profile data is stored as serialized xml or binary data. Post migration, the profile data can be accessed as properties on the user class. Also serializing/de serializing profile information for each database transaction is prevented. Once the migration is completed, you can use the new features available in Identity: you can let users log in through their Google, Facebook, Twitter or Microsoft accounts, use OWIN authentication middleware, integrate user profile and application data, and so on. Feedback is welcome and do let us know if you hit issues during migration!
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00753.warc.gz
CC-MAIN-2023-40
1,228
4
https://support.primexinc.com/hc/en-us/articles/360053568393-Configure-how-frequent-logged-readings-are-sent-to-OneVue-Check-in-Interval
code
The Check-in Interval is the frequency a sensor connects to the facility's network to send its logged readings to OneVue. Also during each check-in, pending setting updates are downloaded to the sensor. For example, a sensor's Logging Interval may be set to every hour and its Check-in Interval is set to every 8 hours. With this configuration, every 8 hours the sensor device checks-in to OneVue and each of its hourly logged readings are sent to OneVue. Although the Check-in Interval sets how frequency logged readings at sent to OneVue, a sensor continuously monitors its sampled readings. When a sampled out of range reading is detected, the reading is automatically sent to OneVue. If a Primex device is solely operating on battery power, the Check-In Interval frequency does impact its battery life. Temperature, Temperature & Humidity, Differential Pressure Sensor: estimated 18 months of battery life with an 8 hour Check-In Interval, adequate wireless signal strength, and use of high quality lithium-ion batteries. If a check-in fails, all logged readings are stored in the sensor's non-volatile memory. A sensor device stores up to 4096 readings in its memory before it begins to overwrite the oldest reading. Check-In Interval must be equal to or greater than its Logging Interval. The Logging Interval sets the frequency readings are stored and logged in the non-volatile memory of the device. The following step begins by selecting the Monitored Asset assigned to the sensor, which is the recommended method. This ensures the correct sensor monitoring the asset is selected. Go to Monitoring > Monitored Assets. From the list, select the Monitored Asset link. Its profile is displayed. From the sensor type section, select the type of sensor (its assigned sensor). The sensor profile is displayed. Select the Gateway ID link of the sensor. The sensor gateway profile is displayed. Select Show Advanced Options. From the Check-In Interval drop-down menu, select the frequency logged readings are to be transmitted to OneVue. The Update Pending status is set to Yes when a setting change is scheduled to be downloaded to the device during its next check-in to OneVue. Setting changes take effect when downloaded to the device. Once downloaded, its Updating Pending status is set to No.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474674.35/warc/CC-MAIN-20240227085429-20240227115429-00844.warc.gz
CC-MAIN-2024-10
2,298
15
https://digibuo.uniovi.es/dspace/handle/10651/19686
code
Engineering the Biosynthesis of the Polyketide- Nonribosomal Peptide Collismycin A for Generation of Analogs with Neuroprotective Activity This research was supported by a grant (to J.A.S.) from the Spanish Ministry of Science and Innovation (BIO2009-07643) and the Plan Regional de Investigación del Principado de Asturias (PC10-05). N.V. was the recipient of a predoctoral fellowship of the Spanish Ministry of Science and Innovation (MICINN, FPI). We are very grateful to Carlos Olano for helpful discussions. We would like to thank Marcos Garcia Ocaña and ZFBiolabs (Madrid, Spain) for helping with the cytotoxicity and zebrafish assays, respectively. - Artículos
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711114.3/warc/CC-MAIN-20221206192947-20221206222947-00296.warc.gz
CC-MAIN-2022-49
670
3
https://acrobat.uservoice.com/forums/595576-acrobat-reader-for-android/suggestions/38606758-pdf-with-multimedia-files-inserted-do-not-work-on
code
pdf with multimedia files inserted do not work on android i have created a pdf with an audio file inserted using acrobat dc pro. when i try to use it on android with acrobat's standar app for read pdf files, i can not listen my audio text inserted into the pdf. If i use dropbox pdf reader all work fine. Is it a bug or is there a way to resolve this problem? Attached an example.
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703496947.2/warc/CC-MAIN-20210115194851-20210115224851-00491.warc.gz
CC-MAIN-2021-04
380
6
https://help.sealedenvelope.com/category/91-code-list
code
Questions about randomisation and code lists - What is the difference between a randomisation and code list? - What's wrong with using actual sealed envelopes? - How do I test a randomisation system? - What are dynamic methods of randomisation? - Why are kit codes not given out in list order? - What is a code list? - What is a randomisation list? - How do I link kit codes to IMP? - How do I randomise if I cannot access Sealed Envelope? - What format should the kit code be? - Who creates the code list? - What is a forced randomisation? - What fields should I include on my randomisation form?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104692018.96/warc/CC-MAIN-20220707124050-20220707154050-00039.warc.gz
CC-MAIN-2022-27
597
14
http://www.heathrowe.com/sequential-batch-renaming/
code
Here is a simple batch processing method using the File > Automate > Batch command that enables you to bypass the Action Process requirement so you can perform manual output sequential batch processing. Step 1: Create a ‘donothing’ Action - Go Window>Actions to bring the Actions Palette to the foreground. - Click the Create New Set icon at the bottom of the Actions Palette. - At the New Set prompt give it a user friendly name, I used ‘donothing’. - Click OK to commit the New Set changes. - The new ‘donothing’ set is now active and available in the Actions Palette. Next click the ‘Create New Action’ icon command. - Give the New Action a user friendly name, I used ‘donothing’ again. - Click the Record command option. - Notice the active red Record playback control at the bottom of the Actions Palette. - As indicated by the title, we don’t want this action to record anything so click the Stop playback control. But it will be used to by-pass the ‘Play’ feature within the ‘Batch’ dialog. Step 2: Perform Batch - Go File>Automate>Batch. - Set the Play:Set and Action to the ‘donothing’ ones created earlier. - For sake of this example I used Source : Folder and clicked the Choose… command to locate a folder of images. - I then set the Destination : Folder and clicked Choose… for the new batch items to be saved to. (In my case in a folder on my Desktop). - In the File Naming section I set to 2 Digit Serial Number from the drop list. - Then set Starting Serial# to 01. Then click OK to batch process. Note: Supplying the Play feature with such a ‘donothing’ action you will be prompted with ‘Save As’ dialog for each batch process. To avoid the Save As dialog you may prefer ready made Action from the Production Set, entitled Save As JPG Medium as captured below. Below is the before batch (left) and after batch (right).
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891546.92/warc/CC-MAIN-20180122232843-20180123012843-00596.warc.gz
CC-MAIN-2018-05
1,881
21
https://3dprinterchat.com/tag/3d-printing-ins-science/
code
Today I'm going to show you some different uses of 3d printing in science. Well, 3D printing isn't only to print the Eiffel Tower. Print organs and bones Organs - 3d printing in science The first time that I heard about 3D-printers was in… Sign in / Join Recover your password. A password will be e-mailed to you.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827097.43/warc/CC-MAIN-20181215200626-20181215222626-00326.warc.gz
CC-MAIN-2018-51
315
8
http://dba.stackexchange.com/questions/tagged/replace+floating-point
code
Database Administrators Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site How to prepare a date and double for a mysql replace statement? I have a MySql table with three columns: CU VARCHAR(3) DA DATETIME VA DOUBLE I need to execute several REPLACE into mytable (CU, DA, VA) values("ABC", mydate, myval) statements from Java. mydate is ... Apr 24 '12 at 22:16 newest replace floating-point questions feed Hot Network Questions Obtain values of a section of a file What's the consequence of having a short IV? Is one mode better in that case? Is it possible to learn theory without sight reading? Is it considered Lashon Hara if someone alludes to a place's faults while focusing on a place's merits? Is it bad to offer alternative solutions without recommending them? Why does research cost so much money? What is the logical reason for bullying Spock? Can humans survive without consuming life? Make MapIndexed listable Calculating sum value The Symbols vs. The Letters is the bankruptcy of exchange markets possible? How to generate random points in a region? Is it common to provide digital notes (slides or handwritten) for students? How can I delete everything after the first column in Notepad++? How do I preserve coloured output when piping to `less -R`? Table of results is not closing from above Do I need a Reset Switch? Presence of planets in Milky Way and other galaxies Advancing to a senior position in my software career Why does void in C mean not void? Stack Exchange Stock Exchange ~ Revised Uncertainty Principle Intuition What means > in the shell? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500824990.54/warc/CC-MAIN-20140820021344-00220-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
2,162
53
https://forum.uipath.com/t/can-we-insert-header-in-excel-using-build-data-table-without-inserting-data/228893
code
can we insert header in excel using build data table without inserting data You can. Just write the empty datatable to a worksheet using a Write Range activity and ensure that the Add Headers option is checked. It seems as though you have this written correctly, as long as DtProcessReport is the same datatable shown in the screenshot. but I am getting object reference null error.Because data table not contain any value.if I pass static value like 1 then it work fine.But I want without data Ah, in that case, what if you make the column header names the first row of the datatable and uncheck Add Headers? but the think is I am executing same file multiple time then it create multiple rows. because I am processing huge data almost 20 k records.So I run this for 2 hour then stop so on.it create multiple header in between records.if you did not understand let me know.I will again explain you Do you mean that later in the code you populate the table and use it to insert more data into the spreadsheet? If so, and you no longer need the headers, you can remove the row you inserted with the headers immediately after you’ve put it into the workbook. yes I done this this not working for me just give me 30 mint I will try again and update you yes after remove row it remove excel but in data table record exist Use the Clear Datatable activity, not the Excel remove row. this will delete all data Your datatable was empty at first. If you clear the data after you’ve inserted this one row and then remove it, that’s all it should remove. You should not remove anything else. If need be, you can use a Filter Datatable activity to remove anything where the first column element equals “Source”.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402132335.99/warc/CC-MAIN-20201001210429-20201002000429-00429.warc.gz
CC-MAIN-2020-40
1,710
13
https://www.littlefroginnovations.com/services/php-developer.html
code
Finding the right PHP developer can be a challenge. Give us a call today to see if we can help you on your project. We work direct or with you as a sub contractor on your project and all the work is physically done in our Colorado Springs, CO based office. We do not outsource our programming to foreign countries. Our senior programmer has been programming PHP since 2001 and has worked on projects in excess of 2000 hours all the way down to simple 20 minute scripts. PHP is a widely-used open source programming lauguage that allows a programmer to create very complex web based scripts such as ecommerce shopping carts, time trackers, auction websites, and more. Because PHP is open source, it means development costs are much lower, and because its popularity its easy to code in. This brings the cost savings to you.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668682.16/warc/CC-MAIN-20191115144109-20191115172109-00054.warc.gz
CC-MAIN-2019-47
822
4
http://www.oreillynet.com/cs/user/view/cs_msg/17690
code
||Gentoo Linux Reloaded| Response to: Installation is medieval I have a gateway solo5300 laptop with no cdrom, but good internet access. Is it posible to do an installation from packages visible over the internet or off my hard drive? Hear us Roar
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657136896.39/warc/CC-MAIN-20140914011216-00250-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
247
4
http://systemideveloper.com/summit/cancellationPolicy.html
code
We understand that on occasion your plans may change, so you may substitute another person in your place at any time. Alternatively if neither you or a substitute can attend the conference, you may apply 100% of your registration fee to a future System i Developer event for a period of 12 months from the start date of the current conference. Since we must make financial guarantees to the hotel and other vendors based on conference registrations in advance of the conference, if the substitution or future event credit options above do not suit you, the following policies apply: - Up to two weeks before the conference you may cancel your registration and receive a full refund minus a handling fee of $75. - Within two weeks of the conference you will receive a refund of 50% of the conference fee paid. Cancellations must be received in writing or via email no later than the dates listed above.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118743.41/warc/CC-MAIN-20170423031158-00357-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
901
5
https://www.gallantgames.com/posts/22/360idev-git-talk
code
As I’ve mentioned before, I will be speaking at 360iDev. I do have a few announcements about that. With just a few days to go and many attendees also reading iDevBlogADay, I hope you will forgive this post not being all that developerish. My talk has taken a slightly different angle than the original proposal, and for those wondering whether to come to my talk or not, here is some more information. In preparing my talk, it became obvious that a different presentation on Git was needed. I really wanted to focus on things that you cannot get by just hitting Google — or at least not easily. This talk will be technical, though not hard to understand. There are nearly 200 slides. I will take you on a deep dive inside Git, how it works, how it thinks about your project. I will show you why it is fast and powerful on the operational level. Then with that foundation I’ll take you into workflow and organization. I believe this is the right approach to demystifying and really “getting” Git. I’m not going to spend much time on using Git or getting it set up. There will be no boring command line demos. I’ll touch on a few things, but that stuff is all available online. If you DO need help with using Git, I will be happy to talk to you at any time during the conference to help you get set up or answer questions. If I don’t know something off the cuff, I’ll find an answer and get back to you. I recently had an opportunity to give a beta version of this talk at my local CocoaHeads. One developer commented that although he had been using Git for a while, this talk revolutionized how he thought about it and prompted lots of discussion with his team. Based on further feedback, I tried to strip out or trim down any less interesting part to get it streamlined. I’m really excited to give this talk at 360iDev and I hope you’ll join me for it. If you do miss it, you can always get the session video after the fact. The slides will be available on this blog. Here are a few more reasons to attend: The awesome guys at Fournova have generously allowed me to give away a free copy of Tower to an attendee. They’ve also provided some stickers, Git cheat sheets, and a coupon code for 10% off during the conference. As if that isn’t enough, GitHub have provided a pile of stickers and a free month of their Micro hosting plan. Regardless of your interest in Git, please come up and introduce yourself — I’d love to meet you. See you there!
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511361.38/warc/CC-MAIN-20231004052258-20231004082258-00605.warc.gz
CC-MAIN-2023-40
2,474
13
http://jisforjavascript.com/2018/08/
code
Well I finally did it, this project was probably the hardest that I have faced so far, getting your head around the challenge and the idea of AI was super stressful and actually made me walk away from freeCodeCamp for quite a while, if anything I would suggest that people tackle Simon before taking this bad boy on (although now with the new update to FCC that isn’t even necessary). I will say that this is a very basic AI version of the project using a random number generator to calculate the computers next move, I couldn’t seem to get my head around the MinMax algorithm that everyone is talking about on the forum and I really just wanted to get some runs on the board, so if you are up for a challenge, my game isnt it. Hopefully somewhere down the line I can come back to it and make it a little tougher than playing against your 3 year old sister. As for advice regards the project I would say just start from the ground up, make a simple two player version first so you can get your head around the project and from there you can start working on creating an AI to play against. This is a real challenge and its easy to get stressed out but if you work slow and look for advice around the place you can build yourself a decent little program. All the best.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501066.53/warc/CC-MAIN-20230209014102-20230209044102-00118.warc.gz
CC-MAIN-2023-06
1,271
4
http://www.crosswire.org/pipermail/sword-devel/2002-August/015166.html
code
[sword-devel] Beta S bug Mon, 5 Aug 2002 00:16:41 +1200 > Okay, I'm pretty behind in all the bug reports, so forgive me if this has > been reported already. > LDs (and possibly other modules) with a ~ in the module name cause an > error on load. The error reads: "LexDictRTFERaf~en" is not a valid > component name. (ERaf~en is the module name.) I think we need > to convert > the ~ to __ or such rather than leaving it alone, when creating this (I've read the other emails in this thread too) I reported it a while ago... Minimum fix is to use something else (eg _ )in the section within the .conf file. It works if the file names and directories continue to contain ~. A simple regex can switch all the .conf files at once when a new standard is
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814292.75/warc/CC-MAIN-20180222220118-20180223000118-00426.warc.gz
CC-MAIN-2018-09
748
14
http://www.dbforums.com/showthread.php?1615199-Report-backcolor-not-working
code
putting the code into the on format of the Detail report But what I can't get going. when i have it in the sub report runing the subreport by then self are ok but when i run the master with the sub in it it does not can some point to the right help file hope this help See clear as mud the aim is store once, not store multiple times Remember... Optimize 'til you die! Progaming environment: Access based on my own environment: DAO3.6/A97/A2000/A2003/A2007/A2010 VB based on my own environment: vb6 sp5 ASP based on my own environment: 5.6 VB-NET based on my own environment started 2007 SQL-2005 based on my own environment started 2008 MYLE YOUR PASSWORD IS JUST LIKE YOUR TOOTHBRUSH DON'T SHARE IT.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171632.91/warc/CC-MAIN-20170219104611-00468-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
701
11
https://stackoverflow.com/questions/5133423/enum-data-type-for-liquibase
code
I'm currently working on a liquibase.xml file to create table table_a. One of my fields is <column name="state" type="ENUM('yes','no')"> I'm using postgresql as my DBMS. is there anything like enum data type? I've read in this like http://wiki.postgresql.org/wiki/Enum that postgresql doesn't have such data type. CREATE TYPE function is used to create this data type. I still don't know how to make it in liquibase though.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585215.14/warc/CC-MAIN-20211018221501-20211019011501-00707.warc.gz
CC-MAIN-2021-43
423
5
https://mail.python.org/pipermail/python-list/2009-October/555155.html
code
Checking a Number for Palindromic Behavior gherron at digipen.edu Mon Oct 19 00:56:38 CEST 2009 Benjamin Middaugh wrote: > Thanks to everyone who helped with my query on reversing integers. I > have one more simple problem I'm having trouble solving. I want to > check a number for palindromic behavior (reading the same backwards > and forwards). So if I have an integer 1457 it can tell me this is not > the same from both ends but 1551 is. I think the simplest way would be > to work inwards from both ends checking digits for equality, but I > don't know enough (yet) to do this. > All help is much appreciated. This problem (and the OP's previous problem) are probably homework problems. If so, it was unethical for the student to ask for a solution here, and it was careless of several responders to provide a solution. Let's not make the same mistake this time. Gary Herron, PhD. Department of Computer Science DigiPen Institute of Technology More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255536.6/warc/CC-MAIN-20190520021654-20190520043654-00514.warc.gz
CC-MAIN-2019-22
988
20
https://www.tr.freelancer.com/projects/matlab-mathematica/implementation-paper-voltage-envelop/
code
In the concerned paper, voltage envelop detection based on Prony Analysis and Hilbert transform is introduced. I need to get the exact same results from the paper (especially Table I, Table II, and Figure 1, Figure 2). The algorithm is required to be implemented in the exact same manner, as shown in the paper and the exact same results are expected. The paper is to be implemented on matlab and the delivery of the code is required on the urgent basis. Bu iş için 7 freelancer ortalamada ₹9762 teklif veriyor Hi. I am very good in Matlab and think will be able to do this. Regards............................. Dear Client, I have used Hilbert along with energy and zero crossing to segment human speech into words. I read the paper and I can help you to solve it. I have master degree in digital signal processing. I have don Daha Fazla Hello, I can do your project 100%. I can do this project. I am working on many field wireless technologies such as Cognitive radio, WSN, MANET, VANET, Ad-Hoc networks, LTE, Standard Protocol, wireless sensor network, Daha Fazla Hi I have a masters degree in statistical signal processing and pattern recognition. I have used Hilbert transform before for RADAR signal processing and ultrasonic communication. I am very well known to the mathemati Daha Fazla Hi, I believe that I can implement this algorithm for you. I have a long experience in working with signal processing, either using Matlab and Python. In my Master Thesis I have worked with Hilbert transform and al Daha Fazla I am working in image processing from past two years. I have implemented six to seven papers from IEEE in these days. I have placed a bid by actually knowing the work and complexity involved. If I find the paper simple Daha Fazla
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592001.81/warc/CC-MAIN-20180720232914-20180721012914-00031.warc.gz
CC-MAIN-2018-30
1,755
9
https://community.openhab.org/t/civildusk-time-offset/120848/2
code
OpenHAB Version 3.0.1 How do you set up a rule to turn on a light 30 minutes before CivilDusk, say? I am moving over from HomeSeer, and this seems like it should be simple to do. Although it seems easy to do it at CivilDusk, I can’t figure out how to add an offset using either the UI or the “Code” window like I see in some OpenHAB 2 examples in code. Suggestions?
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.91/warc/CC-MAIN-20211020055136-20211020085136-00343.warc.gz
CC-MAIN-2021-43
371
2
https://www.cerberusftp.com/blog/correct-ipaddress-range-from-cidr/
code
In Cerberus FTP Server version 13.1, we are correcting how we convert a given Classless Inter-Domain Routing notation (CIDR) to the corresponding IP Address range. CIDR use in Cerberus Cerberus Admin Console has two places where administrators use CIDR notations to specify IP Address ranges. i) Firewall Controls: IP Firewall Management As shown above in Firewall Controls : IP Firewall Management, administrators may use CIDR notation to allow or deny access to the FTP server based on IP address. The CIDR will be converted to a contiguous range of IP addresses and added to the IP Manager list. ii) User Manager section In the constraints tab for a user, the CIDR is used to specify Allowed IP Addresses for that user. Please refer to Adding a New User for more details on how to use this section. What was the issue with IP Address Range calculation Prior to version 13.1 Cerberus FTP Server always considered the IP address which was part of a CIDR notation as the starting point of the range and IP addresses were calculated accordingly. As shown above, the IP Address range from “10.0.40.5” to “10.10.40.20” is calculated based on the CIDR “10.0.40.5/28”. The starting address above should have been 10.10.40.0 and the range should have been 10.10.40.0-10.10.40.15. In version 13.1, this issue has been resolved and ranges are now properly computed. Tips: There are many third-party online tools that can be used to check the range of IP Addresses against a given CIDR value. These may be used to verify whether your CIDR matches desired network behavior. Potential production impacts An upgrade to version 13.1 or later may impact the list of IP Addresses generated from a given CIDR. Administrators should consider potential user access issues due to these changes. User constraints under the User Management section are more likely to be affected as the CIDR is utilized directly unlike the IP Firewall management section, which stores IP Address range in simple range format. (Please refer to the example snapshots above). If an IP address which was part of the expected list gets excluded due to the fix above, administrators can always use other options for providing an IP range such as simple range format or entering a single address. For example, in the image below, if an administrator wanted to retain the IP addresses beyond 10.10.40.15 after using CIDR “10.10.40.0/28” due to the new calculation, they can provide those range using simple range format, such as “10.10.40.16-10.10.40.20,” or with a single address, such as “10.10.40.21”. As always, we look forward to hearing how our customers use Cerberus and any additional improvements that would help make Cerberus FTP Server better. We would love to hear your feedback.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511406.34/warc/CC-MAIN-20231004184208-20231004214208-00302.warc.gz
CC-MAIN-2023-40
2,769
18
https://www.perlmonks.org/?node_id=992594
code
|P is for Practical| Re^4: perllVm: A Linux test of how Perl and LLVM would work together.by flexvault (Monsignor) |on Sep 09, 2012 at 15:24 UTC||Need Help??| ...at a few percentage points improvement from clang optimizations versus gcc optimizations I re-read your post, and just to clarify what I was talking about. The 15% improvement was comparing the original Perl5.16.0 compiled with '-O2' and the new Perl5.16.0 (perllvm) compiled with '-O3', and not the incremental re-running of the script. But now I realized I compared '-O2' to '-O3' ( which could be the cause of any increase). So I went back and compiled 'GCC' with '-O3', but the Perl 'Configure' changed it to '-O2', so I couldn't compare apples to apples anyway. 'Configure' did allow the '-O3' with 'clang' but not with 'GCC'. I looked at the 'Configure' and it would have to change to add the 'jit' parameters as well, but until I get some feedback from the LLVM developers, it would be a waste of time. "Well done is better than well said." - Benjamin Franklin
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864256.26/warc/CC-MAIN-20180621172638-20180621192638-00039.warc.gz
CC-MAIN-2018-26
1,029
9
https://allisonburtch.github.io/watching-you/
code
Watching You: A Love Story Watching You is an installation in three parts. - Viewers watched a video, entirely from surveillance cameras, about the artist as a cop. 2. At the ITP Winter Show, viewers were told that they were currently being surveilled. 3. In exchange for me deleting one of their images from my computer, I would trade them an honest emotion – any sort of feeling, not necessarily about what they just watched, but just a personal emotion. I was surprised by the honesty I received. Many people didn’t care if I deleted their picture. Watching You is documented here. BfBifocals, a working group of designers and artists. College Art Association, CAA Conference. TRANSMEDIATION. February 13-16, 2013. New York Hilton. Artist talk, Eyebeam, Art/Sec(urity) meetup, March 2013.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104597905.85/warc/CC-MAIN-20220705174927-20220705204927-00210.warc.gz
CC-MAIN-2022-27
795
9
https://forum.solidworks.com/thread/100587
code
This issue could be associated with corrupt materials. Please try the following workaround: 1. Copy and paste the material into a new custom material library (.sldmat). 2. In the material dialog, change the 'Default failure criterion' drop down menu option to 'Unknown', then Save the material 3. Reapply the material to each appropriate component in each study, directly through the Apply/Edit Material command in the Simulation Study Tree (not by allowing the material to carry over from SOLIDWORKS). Please let me know if it helps.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532050.7/warc/CC-MAIN-20190421180010-20190421202010-00240.warc.gz
CC-MAIN-2019-18
534
6
https://issues.apache.org/jira/browse/LUCENE-3024
code
Public signup for this instance is disabled. Go to our Self serve sign up page to request an account. Tom hit a new long/int overflow case: http://markmail.org/thread/toyl2ujcl4suqvf3 This is a regression, in 3.1, introduced with LUCENE-2075. Worse, our Test2BTerms failed to catch this, so I've fixed that test to show the failure.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817043.36/warc/CC-MAIN-20240416031446-20240416061446-00431.warc.gz
CC-MAIN-2024-18
332
4
https://www.techrepublic.com/resource-library/whitepapers/deciphering-network-community-structure-by-surprise/
code
Deciphering Network Community Structure by Surprise The analysis of complex networks permeates all sciences, from biology to sociology. A fundamental, unsolved problem is how to characterize the community structure of a network. Here, using both standard and novel benchmarks, the authors show that maximization of a simple global parameter, which they call Surprise (S), leads to a very efficient characterization of the community structure of complex synthetic networks. Particularly, S qualitatively outperforms the most commonly used criterion to de ne communities, Newman and Girvan's modularity (Q). Applying S maximization to real networks often provides natural, well-supported partitions, but also sometimes counterintuitive solutions that expose the limitations of their previous knowledge.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804666.54/warc/CC-MAIN-20171118055757-20171118075757-00787.warc.gz
CC-MAIN-2017-47
800
2
https://discourse.llvm.org/t/nvptx-adjust-data-layout-according-to-llvms-change/45580
code
I’m curious, is it safe to change an alignment i128 type for NVPTX target? I made a patch to the LLVM backend and added -i128:128 into data layout. But after it became that LLVM and Clang layouts are different and error is thrown at Clang side: backend data layout ‘e-i64:64-i128:128-v16:16-v32:32-n16:32:64’ does not match expected target description ‘e-i64:64-v16:16-v32:32-n16:32:64’ Could you please help with advice, can I just make another patch for Clang to modify the layout? Won’t it break any backward compatibility? Thanks a lot, There could be some backward compatibility issues with linking new IR files with old IR files (because you’re increasing the alignment requirements for i128), but often no more than other ISAs when new SIMD instructions are added, etc. For the NVPTX backend, this might be a concern if it affects anything in libdevice (the bitcode library that is shipped with CUDA in bitcode form), otherwise, I don’t think it is a concern. In general, however, I think you should just update Clang. -Hal I didn’t find any evidence that libdevice has anything related to i128’s. And seems, in general, i128 numbers are not very popular in CUDA programming Thanks for the advice!
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446708010.98/warc/CC-MAIN-20221126144448-20221126174448-00672.warc.gz
CC-MAIN-2022-49
1,224
9
https://www.unix.com/man-page/debian/1/nova
code
NOVA(1) User Commands NOVA(1)NAME nova - Command-line interface to the OpenStack Compute API. nova [ --username USERNAME ] [ --apikey APIKEY ] [ --url AUTH_URL ] <subcommand> nova is a command line interface to the OpenStack Compute API. Retrieve server actions. Show or edit the backup schedule for a server. Delete the backup schedule for a server. Boot a new server. Immediately shut down and delete a server. Retrieve server diagnostics. Print a list of available 'flavors' (sizes of servers). Display help about this program or one of its subcommands. Create a new image by taking a snapshot of a running server. Delete an image. Print a list of available images to boot from. Share an IP address from the given IP group onto a server. Stop sharing an given address with a server. Create a new IP group. Delete an IP group. Show IP groups. Show details about a particular IP group. List active servers. Pause a server. Reboot a server. Shutdown, re-image, and re-boot a server. Rename a server. Rescue a server. Resize a server. Confirm a previous resize. Revert a previous resize (and return to the previous VM). Resume a server. Change the root password for a server. Show details about the given server. Suspend a server. Unpause a server. Unrescue a server. Show or edit a child zone. Add a new child zone. Delete a zone. Get this zones name and capabilities. List the children of a zone. Defaults to env[NOVA_USERNAME]. Defaults to env[NOVA_API_KEY]. Defaults to https://auth.api.rackspacecloud.com/v1.0 or env[NOVA_URL] if defined. See "nova help COMMAND" for help on a specific command. nova February 2011 NOVA(1) Check Out this Related Man Page nova_ajax_selinux(8) SELinux Policy nova_ajax nova_ajax_selinux(8)NAME nova_ajax_selinux - Security Enhanced Linux Policy for the nova_ajax processes Security-Enhanced Linux secures the nova_ajax processes via flexible mandatory access control. The nova_ajax processes execute with the nova_ajax_t SELinux type. You can check if you have these processes running by executing the ps command with the -Z qualifier. ps -eZ | grep nova_ajax_t The nova_ajax_t SELinux type can be entered via the nova_ajax_exec_t file type. The default entrypoint paths for the nova_ajax_t domain are the following: SELinux defines process types (domains) for each process running on the system You can see the context of a process using the -Z option to ps Policy governs the access confined processes have to files. SELinux nova_ajax policy is very flexible allowing users to setup their nova_ajax processes in as secure a method as possible. The following process types are defined for nova_ajax: Note: semanage permissive -a nova_ajax_t can be used to make the process type nova_ajax_t permissive. SELinux does not deny access to per- missive process types, but the AVC (SELinux denials) messages are still generated. SELinux policy is customizable based on least access required. nova_ajax policy is extremely flexible and has several booleans that allow you to manipulate the policy and run nova_ajax with the tightest access possible. If you want to allow all daemons to write corefiles to /, you must turn on the daemons_dump_core boolean. Disabled by default. setsebool -P daemons_dump_core 1 If you want to enable cluster mode for daemons, you must turn on the daemons_enable_cluster_mode boolean. Enabled by default. setsebool -P daemons_enable_cluster_mode 1 If you want to allow all daemons to use tcp wrappers, you must turn on the daemons_use_tcp_wrapper boolean. Disabled by default. setsebool -P daemons_use_tcp_wrapper 1 If you want to allow all daemons the ability to read/write terminals, you must turn on the daemons_use_tty boolean. Disabled by default. setsebool -P daemons_use_tty 1 If you want to deny any process from ptracing or debugging any other processes, you must turn on the deny_ptrace boolean. Enabled by setsebool -P deny_ptrace 1 If you want to allow all domains to use other domains file descriptors, you must turn on the domain_fd_use boolean. Enabled by default. setsebool -P domain_fd_use 1 If you want to allow all domains to have the kernel load modules, you must turn on the domain_kernel_load_modules boolean. Disabled by setsebool -P domain_kernel_load_modules 1 If you want to allow all domains to execute in fips_mode, you must turn on the fips_mode boolean. Enabled by default. setsebool -P fips_mode 1 If you want to enable reading of urandom for all domains, you must turn on the global_ssp boolean. Disabled by default. setsebool -P global_ssp 1 The SELinux process type nova_ajax_t can manage files labeled with the following file types. The paths listed are the default paths for these file types. Note the processes UID still need to have DAC permissions. SELinux requires files to have an extended attribute to define the file type. You can see the context of a file using the -Z option to ls Policy governs the access confined processes have to these files. SELinux nova_ajax policy is very flexible allowing users to setup their nova_ajax processes in as secure a method as possible. STANDARD FILE CONTEXT SELinux defines the file context types for the nova_ajax, if you wanted to store files with these types in a diffent paths, you need to execute the semanage command to sepecify alternate labeling and then use restorecon to put the labels on disk. semanage fcontext -a -t nova_ajax_exec_t '/srv/nova_ajax/content(/.*)?' restorecon -R -v /srv/mynova_ajax_content Note: SELinux often uses regular expressions to specify labels that match multiple files. The following file types are defined for nova_ajax: - Set files with the nova_ajax_exec_t type, if you want to transition an executable to the nova_ajax_t domain. - Set files with the nova_ajax_tmp_t type, if you want to store nova ajax temporary files in the /tmp directories. - Set files with the nova_ajax_unit_file_t type, if you want to treat the files as nova ajax unit content. Note: File context can be temporarily modified with the chcon command. If you want to permanently change the file context you need to use the semanage fcontext command. This will modify the SELinux labeling database. You will need to use restorecon to apply the labels. semanage fcontext can also be used to manipulate default file context mappings. semanage permissive can also be used to manipulate whether or not a process type is permissive. semanage module can also be used to enable/disable/install/remove policy modules. semanage boolean can also be used to manipulate the booleans system-config-selinux is a GUI tool available to customize SELinux policy settings. This manual page was auto-generated using sepolicy manpage . SEE ALSO selinux(8), nova_ajax(8), semanage(8), restorecon(8), chcon(1), sepolicy(8) , setsebool(8)nova_ajax 14-06-10 nova_ajax_selinux(8)
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711394.73/warc/CC-MAIN-20221209080025-20221209110025-00036.warc.gz
CC-MAIN-2022-49
6,808
107
http://www.bikeforums.net/folding-bikes/728518-brompton-s-type-larger-front-bags-print.html
code
The rule with the S-type is that only the S-bag fits as larger bags interfere with cables, or something like that. Is that an iron rule or is it possible to use larger bags? There looks to be enough room to me but perhaps brake lever clearance over the top of something like the folding basket would be an issue. . . in which case perhaps cables would snag? Or perhaps the S stem projects forward enough to touch the top of a larger front bag? Anyone tried it?
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464050955095.64/warc/CC-MAIN-20160524004915-00136-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
460
2
https://www.crowdforecastr.org/2021/05/11/uk-challenge/
code
On May 24th 2021 the official UK Crowd Forecasting Challenge, hosted by the epiforecast group at the London School of Hygiene & Tropical Medicine will begin. Predicting how Covid-19 may spread is an important but difficult task - and we need your help! The UK is at a critical moment. We have a successful vaccination campaign underway. However, at the same time new variants are emerging and spreading, which means easing restrictions comes at a risk.The coming weeks may hold important lessons for other countries coming out of lockdown. Many of these things are hard to model and hard to predict… which is why your help will be invaluable! Over the course of 12 weeks, we’ll collect and score your personal predictions (forecasts) of the number of Covid-19 infections (which have been reported) and the deaths resulting from Covid-19 in the United Kingdom. The most accurate forecasters will receive a cash prize of up to 100 GBP. Forecasts created through this competition will contribute to an ongoing research project about the value that crowd (public) forecasts can bring to public policy. After they have been quality checked, a summary of all the forecasts will also be submitted to the European Forecast Hub, a project created by the European Centre for Disease Prevention and Control to collect Covid-19 predictions. Therefore, you have a chance to make a real world impact through your forecast by providing valuable insights to policy makers and public health officials through the European Forecast Hub. You can learn more about the background of this project in the about section at the end of this document. Then you just create an account. All you need to provide is a username and a password (and your email address, if you want to win a prize). Once you create a user account, you will be given a random ID which links all your forecasts to you. Read more about how we handle your data here. In addition there will be a public leaderboard. You can either decide to appear on the leaderboard with your username, or you will be assigned a random pseudonym. You will be automatically entered into the competition once you submit your first forecast for the UK (in the app you can submit forecasts for up to 32 European countries, but only forecasts for the UK will be counted for this competition). The competition runs over the course of twelve weeks. Every week between Sunday 12pm UK Time and Monday 8pm UK time we will collect your weekly forecast. Ideally you should submit a forecast every week, but you don’t have to. You can miss a week or join part-way through the 12 week challenge. If this happens, you will be placed in the middle of the leaderboard for the weeks that you have missed (This does not mean you get the average of all forecasts, but instead you get a score that ranks in the middle of all scores for that date). The competition will run from Monday 24th May 2021 until Monday 16th August 2021. In order to join the contest from the beginning, you will need to submit your first forecast before 8pm on Monday 24th May. You will be asked to predict (forecast) both: - the number of Covid-19 infections and - the deaths resulting from Covid-19 in the United Kingdom which you think will occur in the next 1-4 weeks.. Covid-19 infections in the sense of this competition means the number of of people who test positive for Covid-19, as reported every week by the UK Government. The number of deaths means the number of people who died within 28 days of receiving a positive test result for Covid-19, as reported by the UK Government. There are two ways you can make a prediction: You can use the ‘classical’ forecasting app or the new Rt forecasting app (more on these two below). If you use both app to make a forecast in one week, we will count these as separate forecasts, so in order to maximise your chances of winning, we highly encourage you to make a forecast using both apps! Forecasts from the two apps are independently eligible for a prize. So if you make a forecast using both apps, you have two chances at winning instead of only one (more on how exactly we score the predictions below). Within the weekly forecasting period from Sunday 12pm to Monday 8pm UK time you can update and resubmit your forecasts as often as you like. For every app, we will only count the latest forecast (closest to the 8pm deadline). If you, for example, made 2 submissions with the classical app and 3 submissions with the Rt forecasting app on May 16 2021, then we will take the latest classical app submission as well as the latest Rt app submission and score these. - 1st prize: 100 GPB - 2nd prize: 50 GBP - 3rd prize: 25 GBP After the competition we’ll contact you to about how to pay the prize money to you. You need to submit at least one forecast for both measures (number of Covid-19 infections and number of deaths resulting from Covid-19 in the UK) to be eligible to win a prize. In order to receive a prize, you must provide your contact details (either by providing your email address in the app user account, or by sending a message to epiforecasts [at] gmail.com if you don’t want to register your email address on the app. See more on how we use your data here. While you may make two forecasts each week (one with either app) to increase your chances, you are allowed only one account. You can resubmit and correct your weekly forecast as often as you like. For each app, we will only count the most recent eligible forecast, i.e. the latest forecast that still meets the Monday 8pm deadline. There are two different forecast apps that work slightly differently. With the ‘classical’ forecasting app you are asked to predict future Covid-19 infections and the number of deaths resulting from Covid-19 directly. With the Rt forecasting app, you will be asked to predict the reproduction number R, which will then be converted into a forecast of Covid-19 infections and deaths for you. Here are the details: Using this app, you will predict Covid-19 cases and deaths directly. The prediction has two components: the “median” prediction and the “uncertainty” around the median. The “median” is the value where you believe that there is exactly a 50:50 chance that the true value will be either higher or lower than that point. You should simply treat it as your best estimate for what is going to happen. You can specify the median value either by typing in a value, or by dragging around the corresponding points on the app. The “uncertainty” captures how certain you are of your forecast. In the app, it is represented through a value called ‘width’. Greater width means more uncertainty. The exact numerical interpretation of the width value is not very helpful nor intuitive. We therefore recommend looking at the forecast and the uncertainty around it (which is marked in green) to decide what value is appropriate. One thing to make sure of, is that uncertainty increases over time. Whenever you change any of the values in the app you need to press the ‘Update’ button in the app to reload the visual representation of the forecast. If you’re satisfied with your forecast, you can press ‘Submit. Here are some more detailed instructions on how to use the app including a short video demonstration. Using this app, you will predict R (the average number of people that every infected person will infect in turn). This is the R value that you’ve heard a lot about in the media in recent months (in the app name it is called Rt to make clear that R varies over time t). Predicting R works similarly to making a forecast with the classical forecasting app: you specify a median value and your uncertainty around it, then press ‘Update’. Your predicted R values will automatically be converted to Covid-19 infection and deaths using a so-called ‘renewal equation’ common in epidemiology (the study of diseases). You can read more about the very technical details of R and the renewal equation here. When you press ‘Simulate’ you can visualise the number of reported infections that would result from your current R forecast. However, the app won’t show you the corresponding forecast for the number of deaths resulting from Covid-19 so you’ll have to trust the renewal equation to produce sensible results. There is some inherent uncertainty in the estimation of R even for values in the past. This is because it takes time for infections to be recorded and reported. We therefore cannot know exactly how many infections there were at a certain point in the recent past and how many people those infected people have infected. In the app, you will therefore be asked to ‘predict’ values not only in the future, but also two weeks in the past. A dashed vertical line shows you the current date. Remember, using both apps will always be an advantage for you as you have two chances at winning a prize! More information about the different forecasting apps and a short instructional video can be found here. Any information (data) you like! Forecasts will be marked by comparing them to the “ground truth data” used by the European Forecast Hub. Even though different data sources may differ slightly, the ground truth data is the data the European Forecast Hub team has decided to treat as ‘the truth’. Currently, this ground truth data on numbers of COVID 19 infections and deaths is provided by the UK Government and presented by Johns Hopkins University in the United States. Yes! Simply make a new prediction (forecast). The weekly forecast must be submitted between Sunday 12pm UK time and Monday 8pm UK time. Within that period from Sunday to Monday you can update and resubmit your forecasts as often as you like. We will only count the latest forecast (closest to the 8pm deadline). We very much appreciate your interest in this project, but unfortunately you can only have one account per person. The way we mark and score your forecasts means regular participation during the 12 week period helps your score. But you can start submitting forecasts at any time during the 12 week competition or even miss a week. If you are not able to submit a forecast before the 8pm Monday deadline on a given week, you will be placed in the middle of the leaderboard for the week(s) you have missed. Simply write an email with your username to epiforecasts [at] gmail.com We use a scoring system which guarantees that nobody can cheat and everyone is encouraged to provide their best possible forecast (prediction). We’ll combine your predictions for: 1. The number of Covid-19 infections and 2. The number of Covid-19 deaths to give you an overall score. Your ranking will be based on the “weighted interval score” (WIS) of your forecasts. The ‘score’ is negatively oriented, meaning that a lower score is better. You can think of the weighted interval score as a ‘penalty’ for being less than perfect. The weighted interval score is the sum of three components (i.e. three different types of penalties): “overprediction”, “underprediction” and “sharpness”. Overprediction and underprediction are penalties that occur if the true observed value falls outside of the range of values deemed plausible by your forecast. If you make a very uncertain forecast, the range of plausible values is larger and you are less likely to get penalties for over- and underprediction. The “sharpness” term on the other hand penalises you for being overly uncertain. This means that you need to finely balance the line between being too uncertain (you get a sharpness penalty) and too confident (you get over- and underprediction penalties if your forecast is off). To make forecasts of deaths and reported infections more comparable, we will first take the logarithm of your forecasts and the “ground truth data” and then calculate the weighted interval score using these. If you miss a week and don’t provide a forecast on a given forecast date, you will be assigned the median score of all participants who submitted a forecast on that day. If you make a forecast using only one of the two apps, your score for the other app will be the same as the score for the app you used. The UK Covid-19 Crowd Forecasting Challenge is part of an ongoing research project by the epiforecasts group at the Centre for the Mathematical Modelling of Infectious Diseases of the London School of Hygiene & Tropical Medicine in collaboration with Public Health England (PHE) and Imperial College, London. Crowd (public) forecasts in the past were often able to beat model-based approaches when it comes to predicting the number of Covid-19 infections and deaths. Over the past few months we have used our two forecast apps to collect crowd forecasts from a small group of participants, first in Germany and Poland and now across 32 countries in Europe. These forecasts have been submitted to the European Forecast Hub and the German and Polish Forecast Hub. In both countries, our crowd forecasts were among the top models (predictions) submitted (see this paper about the German and Polish forecasts or the evaluation of the European Forecast Hub forecasts). We therefore believe that crowd forecasts can be a valuable contribution to public policy and want to expand our approach to other members of the public. While we know that crowd (public) forecasts can provide immense value, there are also many open research questions we want to answer. - What is the best way to combine individual forecasts together that will perform better than its individual parts? - How consistent are forecasters in their ability to forecast? In particular, we want to look into a radically new way of forecasting. In addition to forecasting Covid-19 deaths and infections directly, forecasters will have the option to use the new Rt Crowd Forecast App. The app can be used to predict R, (the average number of people which a single infected individual will infect in turn). The R value gives an indication of whether Covid-19 infections will go up or down in the future. The predicted R path will then be mapped to Covid-19 infections and deaths using a ‘renewal equation’. We hope this will be a way to combine the strengths of human forecasters (predicting a trend) with the benefits of computer models (dealing with the complex specifics of epidemiological modelling). We look forward to your participation!
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587794.19/warc/CC-MAIN-20211026011138-20211026041138-00404.warc.gz
CC-MAIN-2021-43
14,422
53
https://airwalkreply.com/kubernetes-when-not-to-use-it-and-when-to-use-it
code
This article should help you to decide if you are ready to use Kubernetes and whether it’s the right platform to use for your application. What is Kubernetes? Kubernetes is a portable, extensible, open-source platform for managing containerised workloads and services, which facilitate both declarative configuration and automation. Kubernetes services, support and tools are widely available, and it has a large, rapidly-growing ecosystem. The name Kubernetes originates from Greek, meaning helmsman or pilot. K8s (as an abbreviation) results from counting the eight letters between the “K” and the “s”. Kubernetes combines running production workloads at scale with best-of-breed ideas and practices from the community. Google open-sourced the Kubernetes project in 2014 (see 15 years of Google’s experience for more information). Historically, organisations ran applications on physical servers. Typical challenges of using physical servers are: - No easy way to define resource boundaries, leading to allocation issues in which one app consumes what it requires and starves other apps of the resources that they require to perform adequately. - Scaling in any direction (up or down) is difficult and costly. To scale up often means financial outlay for new equipment and the cost/through-life-support that this involves. To scale down typically leads to under-utilised resources, which is not cost effective. Virtualisation was developed to address many of the cost and performance bottlenecks of physical hardware and introduces efficiencies by allowing you to emulate multiple servers, otherwise known as Virtual Machines (VMs). These isolated VMs are configured to share the same hardware resources (CPU, memory, storage, networking), ensuring that you can effectively manage resource allocation and balance performance utilisation across multiple applications on the same physical hardware. Virtualisation also addresses the issue of scalability. Adding, removing, and moving workloads becomes a very simple process, as does sharing workloads across disparate hardware. Each VM runs a full Operating system (OS), and full stack of components, on top of virtualised hardware. Each VM has the same costly lifecycle-management issues as their physical counterparts e.g. OS upgrade and patching, access control, performance and logging. Long before containerisation, server virtualisation was the most efficient way of running applications. However, it always comes with some resource overhead if you need to maintain a lot of servers because you must run a whole OS, including the kernel. The ancestor of containerisation chroot has been around since Unix (version7) was released in 1979. Isolating a running process from the root filesystem and effectively simulating a root directory was typically know as chroot jail. Containerisation enables a lightweight platform that shares the OS with other containers. Like a VM, a container has its own filesystem, share of CPU, memory, process space, and more. Furthermore, it is decoupled from the underlying infrastructure, making it portable across clouds and OS distributions. Sharing a kernel has its drawbacks. I will attempt to cover this in detail in a separate article focused on Container Security and Platform hardening. I mention it here so you can bear it in mind. The risks are fairly well understood, and there are plenty of resources on the internet that dive into more detail. Having said that, some of the more obscure mitigations are dependent on your environment and can only be identified following assessment by an experienced Security Practitioner. If you have containerised applications, you are ready to consider using Kubernetes to run your workloads. When NOT to use Kubernetes If you do not have the buy-in of Senior Stakeholders, stop here! Building out a containerisation platform is an expensive undertaking. In the short term, many companies find that they are financing both the AWS infrastructure in addition to the original on-premises infrastructure. In the medium term, and as confidence grows, the original infrastructure can be shut down and decommissioned, and perhaps the datacentre can be exited altogether. If you do not have a Capacity Plan, stop here! Before you set about building any new platform, you will need to understand the short-term and medium-term demands at the very least (long-term projections can help at this stage too). This is critical to ensure that you do not have to stop to redesign and redeploy some of your infrastructure. DNS is a typical example of this. Using a Capacity Plan, you can also begin to put together a financial forecast and begin to understand the Total Cost of Ownership (TCO). The TCO can vary greatly, so it’s a good idea to contrast and compare your container platform options to make the most cost-effective decision. If you are not familiar with Agile Delivery Practice, or ready to adopt a DevOps culture, stop here! To make the platform cost effective, you will need to understand how to make the most out of what you have, and where and how the saving can be driven from. This will involve driving out any old processes and so, if you are not ready to adopt the culture or are resistant to change, you will not easily realise the potential cost saving and optimisation that the platform can offer. Kubernetes enables the speedy commissioning of code into a live production environment. With the fast turnaround of development efforts and low operational overhead, you will make the most effective use of its capability. Without this culture shift, you will find yourselves using Kubernetes in much the same way as you managed your previous infrastructure and will never realise any cost saving. Do not use Kubernetes if you do not have trained engineers who can manage the platform. Tinkering with manifests can result in undesired consequences. Knowing what you are doing here is key to any successful outcome. When to use Kubernetes If your application can be containerised, and you have addressed concerns outlined in the above section - "When NOT to use Kubernetes" - then read on. Bear in mind that this was by no means an exhaustive list; depending on your specific use case, there may well be other reasons. When starting out with Kubernetes it is important to understand the capabilities, as each will require some forethought which can help to shape your configuration. Kubernetes provides you with: - Service discovery and load balancing: Kubernetes can expose a container using the DNS name or using an IP address. If traffic to a container is high, Kubernetes can load balance and distribute the network traffic so that the deployment is stable. - Storage orchestration: Kubernetes allows you to automatically mount a storage system of your choice, such as local storages, public cloud providers and more. - Automated rollouts and rollbacks: You can describe the desired state for your deployed containers using Kubernetes, and it can change the actual state to the desired state at a controlled rate. For example, you can automate Kubernetes to create new containers for your deployment, remove existing containers and adopt all their resources to the new container. - Automatic bin packing: You provide Kubernetes with a cluster of nodes that it can use to run containerised tasks. Declaring to Kubernetes how much CPU and memory (RAM) each container needs enables the Scheduler to dynamically assess and fit containers onto your nodes to make the best use of your resources. - Self-healing: Kubernetes restarts containers that fail, replaces containers, kills containers that do not respond to your user-defined health check, and does not advertise them to clients until they are ready to serve. - Secret and configuration management: Kubernetes lets you store and manage sensitive information, such as passwords, OAuth tokens and SSH keys. You can deploy and update secrets and application configuration without rebuilding your container images, and without exposing secrets in your stack configuration. Of course, this all depends entirely on your implementation. Not all Kubernetes platforms are equal and unless you know what to look for, you may select a Kubernetes platform that cannot support secure secrets. One of the most powerful features of Kubernetes is its ability to orchestrate the workload using declarative configuration. However, to fully utilise this capability your application must adhere to a few rules based loosely on the 12-factor-app checklist: - Your containerised application must be able to start quickly, minimising the rolling upgrade time. Databases and other slow-starting service that relies on strong consistency storage is not recommended for running on Kubernetes. Similarly, monolithic applications do not fit as they usually have a very large codebase and dependency, which means bloated container images, slow pull and start. - Your containerised application must have readiness and liveness http/tcp endpoints for Kubernetes to probe. These allow Kubernetes to determine if the service is healthy or not and whether a restart is required to restore the service. An http/tcp request failure to the liveness endpoint will result in a container restart. The readiness endpoint purpose is to ensure that incoming requests will only be routed to this container when the application is ready. The readiness probe is useful for an application reload; for example, if a feature switch has been turned on and the application is alive, but it needs a bit of time without any requests being routed to it so that it can reload the feature-switch configuration from the database. - Start-up health probe should be configured for a slow-starting application. The aptly named start-up probe delays both the readiness and the liveness probes until the application starts. The container will be killed if the start-up probe fails after the allocated time. - Your containerised application should support graceful shutdowns when SIGTERM is received. It should complete any ongoing requests before terminating. If the application doesn’t handle SIGTERM, Kubernetes will forcefully terminate it with SIGKILL. - The application should be stateless. Any state should be managed externally ideally using a PaaS for a queue or messaging service or a database. A stateless application is one that doesn’t persist application or session-related data locally. Local data persistence should be treated as "code smells" and tackled by refactoring it to be external. There are exceptions to this rule; for example, databases. Running databases on Kubernetes is possible, but they need to handle the fact that pods are designed to be mortal. This means that the databases need to gracefully handle a shard failure, replication failure and failover. - Reliance on environment variables for your application configuration are facilitated by Kubernetes ConfigMaps and Secrets. This increases security and makes environment separation a breeze. - Stream your application logs to stdout so you don’t have to deal with log files and stale file handlers. Make sure your observability platform supports the aggregation of these logs. We find that fluentd is prevalent in this space. If you have applications that are somewhere close to this, you are just about ready to onboard. How many clusters do I need? There is no simple answer to this as it depends on cost, what your organisation model looks like, and how many different teams and applications and services you have. One thing to consider with a single-cluster-multiple-apps approach is that you will have to start thinking about namespaces, Role-Based Access Control (RBAC) and network segregation, as well as the operational cost this may add due to the additional tooling and policy definition. All of this sounds great, of course, but it is only achievable if you know what you are doing with it. Going back to my earlier point about avoiding the use of Kubernetes unless you have trained engineers who can manage the platform - in addition to engineers who can manage BAU operations, you will also need Architects and Security professionals to assist you with your infrastructure. You should adopt a compliance framework and use tooling such as Airwalk Airview in order to mitigate any risks attributed to unsolicited or malicious configuration changes. Introducing guardrails as early possible is key to a successful outcome. Starting an undertaking like this without them can, and almost always does, introduce risks that cannot be confidently remediated without a complete rebuild from scratch. You have a capacity plan, you understand the financials, and you understand how to containerise your applications. But choosing a Kubernetes platform is not an easy decision. You might like to read another of our blogs - Selecting a Cloud Service Provider - before taking your next step. Airwalk Reply has designed and deployed Kubernetes infrastructure, controls and pipelines for some of the world’s largest organisations. Contact us for more information about our Kubernetes consulting services, advice or assistance.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100989.75/warc/CC-MAIN-20231209233632-20231210023632-00135.warc.gz
CC-MAIN-2023-50
13,164
49
https://www.srooltheknife.com/2011/08/
code
A friend asked me for help with getting the sample here: http://www.mat.ucsb.edu/a.forbes/blog/?p=245 to work on the iPhone. Since I had no experience with OpenGL ES 2 shaders, I thought it would be a good chance to get my hands dirty and learn something about it. I am still not an expert (far from it), so take it all with healthy skepticism. This is an interim report, just to let you know the basics are working and provide with the sample code. So the code is available here: http://iroth.net/prog/PingPong.zip In addition to the article that was the inspiration of this, I could have not made this work without the help of the great tutorials of Ray Wenderlich and in particular this series of two: One more thing - there seems to be some black triangle artifact in the upper left corner I still was unable to understand. If any of you find out - please comment below... And while at it, here are some books that really help me get up to speed on iPhone game programming:
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297292879.97/warc/CC-MAIN-20240425094819-20240425124819-00616.warc.gz
CC-MAIN-2024-18
977
7
https://backstage.forgerock.com/knowledge/kb/article/a59431948
code
The following error is shown in the browser when accessing the resource protected by the agent: redirect_uri_mismatch The redirection URI provided does not match a pre-registered value. You are then redirected to the login URL, which is in a similar format to this example URL: Upgraded to, or installed Web Agents 5.x. CDSSO improvements in Agents 5 means CDSSO is the only SSO mode used by agents; it is achieved using the OAuth 2.0 protocol and the oauth2/authorize endpoint. See Release Notes › Major Improvements for further information. Where there is a mismatch between the protocols used to access the resource and the one the agent is configured against (for example, you are accessing a resource with a URL that uses the https protocol but you configured your agent with a URL that uses the http protocol), the hidden OAuth2 agent does not understand the redirection URL and prevents access as a security precaution. This issue can be resolved by setting the root URL for CDSSO to the redirection URL in the following format: protocol://host:port/. For the example URL shown in the Symptoms section, you would specify the following root URL: You can set the root URL for CDSSO using either the console, Amster or ssoadm: - Console: navigate to: Realms > [Realm Name] > Applications > Agents > Web > [Agent Name] > Global > Agent Root URL for CDSSO and specify the redirection URL. Amster: follow the steps in How do I update property values in AM (All versions) using Amster?with these values: - Entity: WebAgents - Property: cdssoRootUrl ssoadm: enter the following command: $ ./ssoadm update-agent -e [realmname] -b [agentname] -u [adminID] -f [passwordfile] -a sunIdentityServerDeviceKeyValue=agentRootURL=[redirectionURL]replacing [realmname], [agentname], [adminID], [passwordfile] and [redirectionURL] with appropriate values.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525402.30/warc/CC-MAIN-20190717201828-20190717223828-00039.warc.gz
CC-MAIN-2019-30
1,844
14
https://www.muffwiggler.com/forum/viewtopic.php?t=217370
code
| br>EDIT: Figured it out already. I'm a modular noob trying to get the OT to sync with the Hexinverter... It is receiving constant MIDI signal and the clock looks to be synced as the main LED on the right is blinking. I can't seem to get any of the gates to trigger though, so I can sync the rest of the clocks, mainly the 4ms SWN. I'm quite sure this is more of an Octatrack problem than a HI problem as it has the stock sysex which is: listed here. I can't seem to figure out how to set up these OT MIDI channels to send gate to the HI. Any help is appreciated! br> br>
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027319724.97/warc/CC-MAIN-20190824041053-20190824063053-00394.warc.gz
CC-MAIN-2019-35
572
5
http://cowboyszone.com/threads/the-ticket-on-line.68894/
code
Discussion in 'Off-topic Zone' started by Sportsbabe, Oct 30, 2006. Anybody having trouble with the streaming? Yep, looks like a heavy traffic day. Yep, have had trouble all day with it...it's been pretty much unlistenable at times. Yeah it's been cutting in and out all day. It's the Romo-effect... consequences include a Bledsoe-like lag... apparently moxie takes up a lot of bandwidth. I am... but that's because it's blocked by the office's filter Thats because your not the "Network Guy" : You're right.... are you "the network guy?" Can you help me circumvent the filter?? I was having problems too. It seems to be all better now.
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320130.7/warc/CC-MAIN-20170623184505-20170623204505-00266.warc.gz
CC-MAIN-2017-26
636
11
http://yeadeal.com/inside-saudi-arabias-gilded-prison-at-riyadh-ritz-carlton-bbc-news
code
Dozens of prominent Saudi figures are being held at Riyadh’s Ritz-Carlton hotel. Many names are still secret, but the list is said to comprise at least 11 princes. It is part of an anti-corruption drive by the young Crown Prince, Mohammed bin Salman. The BBC’s Lyse Doucet was the first journalist to be allowed inside the hotel. She was given access by Saudi authorities. Please subscribe HERE http://bit.ly/1rbfUog World In Pictures https://www.youtube.com/playlist?list=PLS3XGZxi7cBX37n4R0UGJN-TLiQOm7ZTP Big Hitters https://www.youtube.com/playlist?list=PLS3XGZxi7cBUME-LUrFkDwFmiEc3jwMXP Just Good News https://www.youtube.com/playlist?list=PLS3XGZxi7cBUsYo_P26cjihXLN-k3w246
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156418.7/warc/CC-MAIN-20180920062055-20180920082055-00119.warc.gz
CC-MAIN-2018-39
684
6
https://www.tr.freelancer.com/projects/xml-net/reading-xml-file-updating-records/
code
I have a simple xml file which have some information which is read in C# and need to store in database tables. Greetings, I have and understand and idea what your requirement is. and i have experience more than 6 years in this technology in Designing, and development. I understand your need and requirement, so I am Daha Fazla 59 freelancers are bidding on average ₹2335 for this job Hello, I have ready code available. just required to customize as per your XML. thanks Kalpesh I can help in your project, please check PMB and our ratings/reviews to get idea of our experience. Please let me know if you have any queries. Hi, I'm a freelancer from India. I've more than 5 yrs experience in .net with both C# and VB. I've done this feature earlier with some desktop application. I can assure you that I'll satisfy you 100%. Looking forward f Daha Fazla I am having around 6 year of experience and i am ready to do your work. Let me know your concern. Understood your requirements completely and available to start right now. Having 6 years development experience in .NET technologies I am ready to do it now. Just send me a sample of the XML file and the connection string for your database. Hi. please let me help you. im ready to do this in C#. read xml & store data to sql Hi, Could you give me xml file? Which database do you use? How is structure of database? Hi Sir,I can help you with your [url removed, login to view] see PM andrew We have a compatible team to help you out... We can do it for you within a day and with high precision... You will just have to give me sample XML file and tell me in which database you want to store in MySql or Sql Daha Fazla
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257649961.11/warc/CC-MAIN-20180324073738-20180324093738-00199.warc.gz
CC-MAIN-2018-13
1,669
13
https://modellierung2018.wordpress.com/programm/tutorials/abstract-tutorial-emoflon/
code
eMoflon: A Tool for Building Tools Lars Fritsche, Géza Kulcsár (TU Darmstadt) eMoflon is a model-based meta-CASE framework, which allows users to build their own solutions for modern MDE scenarios. Particularly, eMoflon supports meta-modeling and unidirectional as well as bidirectional model transformation. In this tutorial, those major functionalities of eMoflon are presented using a case study of object-oriented refactorings. Model-Driven Engineering (MDE) is a software engineering principle, which tackles the challenges of complex and long-living software systems by treating architectural and behavorial system models as an inherent part of the software product. Nowadays MDE scenarios pose challenges of increasing complexity to software engineers, incorporating multiple models as well as diverse model engineering tasks: - (T1) model-based specification of application domains, - (T2) integration and evolution of models and - (T3) verification and preservation of consistency between models which represent different system aspects but share some semantic features. Particularly, while model evolution is often described by unidirectional model transformation, model integration and consistency requires the use of bidirectional synchronization With the increasing popularity of MDE, a number of industrial as well as academical tools have appeared to facilitate the specification and transformation of models, relying on well-founded techniques such as meta-modeling and model transformation. Regarding the technical foundations, the Eclipse Modeling Framework (EMF) has become a de-facto standard for developing MDE tooling. However, the large majority of prevalent tools focuses on a single aspect of MDE-related activities like model creation or transformation, while not providing a holistic approach addressing each facet of the MDE process. In this tutorial, we present eMoflon (http://emoflon.org/), a model-based meta-CASE framework. Using eMoflon, we demonstrate how to specify EMF-conform meta-models as well as unidirectional and bidirectional transformations of EMF models. All features are shown and discussed on the example of a real-world case study of model-based object-oriented refactorings. In particular, the refactoring case study is used in this tutorial to highlight the aforementioned major functionalities of the eMoflon suite: - (T1) How can we represent the right abstraction over an object-oriented program using eMoflon and EMF-based meta-modeling techniques? - (T2) How can we specify correct refactoring rules over our custom-tailored program model by using the SDM model transformation language in eMoflon? - (T3) How do we preserve the consistency of refactored models to the original code base and how do we propagate changes in the source code or the program model to the other side using bidirectional model transformation in eMoflon? The tutorial is aimed at model engineers of any experience level who are interested in a multi-purpose meta-CASE tool for tackling diverse challenges posed by the modern MDE landscape, within a single, flexible framework. - Metamodeling with eMoflon - Unidirectional model transformation using Story-Driven Modeling - Bidirectional model transformation with Triple Graph Grammars - Case study of model-based object-oriented refactorings Lars Fritsche is a doctoral student at the Real-Time Systems Lab at the Technical University of Darmstadt. His research interests are concurrent engineering and bidirectional model transformation. Géza Kulcsár is a doctoral student at the Real-Time Systems Lab at the Technical University of Darmstadt. His research interests are the semantics of controlled graph transformation and its application for model transformation.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863277.18/warc/CC-MAIN-20180520092830-20180520112830-00454.warc.gz
CC-MAIN-2018-22
3,751
21
https://pc.net/helpcenter/change_laptop_battery_charging_threshold
code
How do I change the battery charging threshold on my laptop? Answer: Laptops are portable machines and therefore most people run their laptops off battery power more often than AC power. That means the laptop battery must be charged on a regular basis. But repeatedly charging the battery can reduce the overall life of that battery. Therefore, some computers allow you to set a "charging threshold" that will only charge the battery once it falls below a certain level. By default, most laptops charge the battery when the charge falls below 95% or 96%. Therefore, if you leave your laptop plugged in to a power source and don't use it for several days, it may initiate a charge several times to top off the battery at 100%. If you set the charging threshold to something lower, like 80% for example, the laptop would initiate the recharge less often, potentially prolonging the life of your battery. Setting the battery charging threshold Since manually setting the battery charging threshold is a rather advanced option, there is no way to configure this setting on many laptops. Your ability to set the charging threshold is actually dependent on the hardware, since the charging is controlled by a hardware component. If your computer supports custom battery charging settings, you can modify the threshold using a control panel or software utility. For example, some Lenovo laptops include a "Power Manager" utility that allows you to change the charging threshold. Sony VAIO machines often include a "VAIO Control Center" that allows you to do the same thing. If you use Windows and your computer does not have a custom battery management tool, there is no way to modify the battery charging threshold. If you use a Mac, there is also no way to override the default settings. While this may seem like bad news, the good news is that modern batteries last much longer than laptop batteries from only a few years ago. Therefore, custom charging settings are not as important and may have little effect on the life of your battery.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00889.warc.gz
CC-MAIN-2023-50
2,035
6
https://forums.hak5.org/topic/8739-reverse-ssh-with-ubuntu-and-windows/
code
Joerg Posted March 20, 2008 Share Posted March 20, 2008 After googling I found out that this question is documented, but even after using the same code I can't get it to work (maybe because I used ssh yesterday for the first time). I want to connect to a virtual Windows XP machine with my ubuntu machine. I installed the openssh-server on ubuntu, forwarded the port 22 on my router and created a dyndns hostname. On the Windows XP machine, I'm using PuTTy. So, Ubuntu is the server, and Windows the client. I want Windows (PuTTy) to connect to Ubuntu (ssh-server) and create a tunnel so I can use this connection to execute some shell commands. So here's what I tried: Executed code - Windows (plink is the command line tool of putty) plink.exe -R -N 2048:localhost:22 [email protected] I get an connection, enter my username and password of my ubuntu machine. Executed code - Ubuntu ssh -p 2048 username.of.windows@localhost I get an "ssh_exchange_identification: Connection closed by remote host " error ? I added "sshd : ALL" to /etc/hosts.allow, but it doesn't seem to help. Hmm, does anyone has a solution, and, is it actually possible to have a windows shell under linux/ubuntu? Quote Link to comment Share on other sites More sharing options... Join the conversation You can post now and register later. If you have an account, sign in now to post with your account.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00623.warc.gz
CC-MAIN-2023-14
1,387
3
https://www.sysgo.com/press-releases/terex-ok-to-choose-pikeos-for-its-excavator-product-line
code
PikeOS has been ported to the Pentium M-based PIP10 hardware from MPL. For the Terex project, PikeOS has been configured to provide two different partitions, one running legacy code on a POSIX® API, and the other running new applications on Linux. The C++ compiler, existing C++ programs as well as the Terex math library have been utilized for the POSIX® personality on PikeOS. New functionality available for Linux can be added and executed in the Linux partition. Both partitions are independent and securely protected from each other so that new Linux components can not interfere with the existing software. „It is a great advantage that we can reuse our legacy code together with new technologies.“ explains Alois Pöttker, Head of Research & Development at Terex O&K. „In this project, we rely on the experience of SYSGO with safety-critical applications.“ PikeOS provides an operating system platform for embedded systems, where multiple virtual machines can run simultaneously in a secure environment. The secure virtualization technology allows multiple operating systems to run applications of different levels of criticality. One key concept in PikeOS is the division of system resources into subsets referred to as partitions. Each partition is a virtual machine environment with its allocated quota of memory, I/O devices and CPU time that can be used by the software running within the partition. The system software guarantees that resources allocated to one partition are completely protected from use or modification by software of another partition. PikeOS is an innovative product providing an embedded systems platform where multiple virtual machines can run simultaneously in a secure environment. The secure virtualization technology allows multiple OS APIs to run concurrently on one machine, e.g. an ARINC-653 application together with Linux. The PikeOS microkernel architecture allows it to be used in cost sensitive; resource constrained devices as well as large, complex systems. The simplicity and compactness of the PikeOS design result in real-time performance that competes head-to-head with conventional proprietary RTOS solutions. More information at www.sysgo.com/pikeos
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476374.40/warc/CC-MAIN-20240303111005-20240303141005-00466.warc.gz
CC-MAIN-2024-10
2,215
4
https://mangafast.net/read/live-dungeon/
code
Live Dungeon. Live Dungeon is an old MMORPG. With 5 notebook PCs, Kyotani Tsutomu wanted to finish the game before the service ended, but then he was sent to another place. Tsutomu resurrected the White Mage who had once been his favorite in games. They tried to conquer the dungeon to find the key to escape from this world.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038087714.38/warc/CC-MAIN-20210415160727-20210415190727-00605.warc.gz
CC-MAIN-2021-17
325
1
http://blog.360dgrs.nl/ride/b-52-bomber-electric-bike
code
A 5.2kW DC brushless motor and 9-speed sequential gearbox push this silent off-roader to 50 mph. And it’s truly meant for the rough stuff: 8 inches of wheel travel up front and ten in the back guarantee you’ll be tackling craggy dirt hills with aplomb for around 50 miles per charge. Note that this is a bicycle with pedals, not an actual dirt bike. Craziness. All handcrafted in Australia by Stealth.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218187945.85/warc/CC-MAIN-20170322212947-00043-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
405
1
http://windowssecrets.com/forums/showthread.php/116375-Reducing-color-palette-from-16M-gt-256-optimized
code
Results 1 to 2 of 2 2009-03-13, 07:37 #1 - Join Date - Jul 2001 - Terneuzen, Netherlands - Thanked 0 Times in 0 Posts Over the years, when I use pictures in documents (Word, PowerPoint, Email etc.); I always first crop them followed by re-sizing to 'normal' dimensions (which gives me more and more gain now that digital camaras grow to 8Mpixel and more). Then I reduce the color palette from 16M colors to 256 colors. The trick for this last step is to create the 256-color palette from the colors in the original picture. If one does that, the final picture is almost identical to the original but much, much smaller (the last step give an extra factor 3: 16M is3 bytes, 256 is one byte) . If you now, copy and paste-special the picture, the result always looks great and professional but can be up to 30 times (!) smaller sometimes than the "switch-my-brains-off-and-copy-and-paste-what-I-see" option. For the palette reduction I always use PaintShopPro. A friend of mine doesn't have that program and needs to optimize a document with 20-25 pictures that is now 92Mb (!) [picture compression does not help...]. Question: is there a freeware tool out there that takes a TIF (or BMP) [JPG won't work as these have 16M colors by definition] and reduces to 256 colors using the optimized palette? 2009-03-13, 08:27 #2 - Join Date - Mar 2001 - St Louis, Missouri, USA - Thanked 1,125 Times in 986 Posts [quote name='ErikJan' post='765220' date='13-Mar-2009 07:37'][/quote] Check out the popular, Irfanview. Don't forget to check out the plugins too.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119361.6/warc/CC-MAIN-20170423031159-00352-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,548
16
https://community.oracle.com/customerconnect/discussion/482877/agent-desktop-active-chat-text-size-change
code
Agent Desktop - active chat text size change SummaryAgent Desktop - Need help with chat text size change One of our chat agent having issue reading chat text. The size of chat text is very small and not readable. This issue is started for her a week back. Anyone knows how to increase size of active chat text in RightNow desktop client? Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662517245.1/warc/CC-MAIN-20220517095022-20220517125022-00525.warc.gz
CC-MAIN-2022-21
356
4
https://ideas.sophos.com/forums/428821-sophos-central/suggestions/43303953-add-policy-option-undefined-for-fine-grain-policy?edit=1
code
Add policy option: undefined for fine-grain policy stacking For policies would appreciate option to "not define" so that individual items can use default policy. Example: default policy blocks all peripherals and then add policy to allow wireless only leaving the others undefined. Another policy that only allows bluetooth. Now computers added to both policies gain both wireless and bluetooth while computers on 1 policy only gain that 1 option. Current setup would require 3 policies (wireless, bluetooh, both) to accomplish similar and this quickly gets out of hand when there is need for multiple variations.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988882.7/warc/CC-MAIN-20210508121446-20210508151446-00419.warc.gz
CC-MAIN-2021-21
613
2
http://kk1l.com/passband.html
code
Passband Analysis on my TS-850 Thanks to Gary E. Bold, ZL1AN, for his help and the original idea to do this! These are passband plots of the response of my TS-850 to noise tuned in on an inactive frequency. I connected the output of my headphone jack through a matching transformer to the soundcard of my computer. I recorded the audio with various filter and control settings, then did a Fourier Transform on the sound file. Don't pay attention to the absolute dB scale shown. The measurements are relative to oneanother only. You cannot conclude insertion losses, etcetera from this data. It's kind of for entertainment purposes only :) If you would like to see how your rig compares. Then send me a recording! I can't promise a rapid turn around time, but I will get to it. Here is what you do: - Download the shareware sound recording program "GoldWave" from http://www.goldwave.com - Run GoldWave on your computing platform - Open a "New" file set for 10 seconds of 16 bit mono recording with either 8K or 16K sample rate (make sure you tell me which!) - Tune to an empty frequency and record the noise Save the recording in MATLAB (.MAT) format Zip up the recordings and send them to me with a description of each file Bear in mind that this is an overall measurement. The effects of a speaker and microphone will be included if you do not record directly to the sound card. This is okay, but it will bias the plot to some extent. It is likely that the low frequency behavior shown in my plots is due to the action of the matching transformer I have inline between the rig and the computer. - Set the recording level correctly - Make sure the recordig level stays 'in the green' - Alternatively in the frequency display keep the baseline at a minimum and the passband peak at a I have a full compliment of four filters installed. The "first" IF (8.83MHz) has a choice of no filter, 6KHz stock, 2.7KHz stock, 2.1KHz InRad, or 400Hz InRad filter. The "second" IF (455KHz) has a choice of 12KHz stock, 6KHz stock, 2.1KHz InRad, or 400Hz InRad filter. A plot comparing the overall response of just the CW filters. I include using the slope tune controls to modify the width to about 250Hz. A plot comparing the overall response of slope tuning to modify the width to about 250Hz with both the cascaded 400Hz filters and the 2.1KHz filters. I include the unmodified 400Hz pair for A plot comparing the overall response of just the SSB filters. I include a 'no filter' comparison with just the stock 6KHz filters cascaded. An expanded version of the previous plot. Use this plot to compare the filter skirts. A plot showing the effectivness of the notch filter. The depth is pretty good, but the slope in not. TS-850 versus Ten-Tec Omni-D It's not a fair fight, but I am comparing anyway! Comparisons between my current TS-850 and the Ten-Tec Omni-D I previously owned. The TS-850 is set for 500Hz pitch. The Omni-D is centered at 750Hz. Comparisons between my current TS-850 and my previously owned Ten-Tec Omni-D. Return to Main page.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652494.25/warc/CC-MAIN-20230606082037-20230606112037-00259.warc.gz
CC-MAIN-2023-23
3,036
44
https://freemusicarchive.org/music/Ergo_Phizmiz/The_Exterminating_Angle/A_Crick_in_the_Neck
code
You came this way: Home > Ergo Phizmiz > The Exterminating Angle > A Crick in the Neck A Crick in the Neck by Ergo Phizmiz Released:May 25th, 2015 Four new electronic compositions by Ergo Phizmiz. 02. A Crick in the Neck (02:50)
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402088830.87/warc/CC-MAIN-20200929190110-20200929220110-00788.warc.gz
CC-MAIN-2020-40
228
5
https://lists.clearlinux.org/hyperkitty/list/[email protected]/message/6KYOOJ6O5HJ6EYDETWT47DCTYP7GU7U7/
code
On 14.04.2020 21:48, Douglas, William wrote: On Tue, Apr 14, 2020 at 2:09 AM Alexey Budankov > Hi Clr-dev Team, > As Clear Linux kernel is close to latest and greatest mainline kernel version > does Clear Linux kernel supply support for hardware Perfmon features available > on newest e.g. Intel CPUs so that the features accessible, for examples, via > Linux Perf or other Perf based tools? I take your question to mean do we add any patches/configuration options for new Intel hardware to performance monitoring tooling. I am not aware of anything we are doing to differentiate compared to the default settings upstream projects provide in the monitoring space. Thanks for clarification. So simply speaking everything that is merged into the mainline and stable kernel releases gets into Clear kernel source tree and eventually released as Clear kernel package update.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572221.38/warc/CC-MAIN-20220816060335-20220816090335-00276.warc.gz
CC-MAIN-2022-33
870
15
https://coderanch.com/t/603694/careers/Advice-job-figure-passion-years
code
I am a newbie. So, it is obvious that jobs wont come easily or wont come at all initially. I am looking for companies where i can work and get a few hints & tips from experienced developers when needed, so that i can do some good work and develop my skills in the process. Paid position is nice to have, but not necessary. I can try open source projects, but they won't teach me corporate culture and workplace politics/dynamics like a real company job. Thats why i prefer companies instead of open source. I regularly write custom cover letters faking interest and vision (I have passion, I am impressed by your company...blah blah), everything else being true. How the hell is everyone supposed to know what they want to be in 5 years from now and have a goal? How am I even supposed to figure out a goal? I like so many things - web development, java backend,...malware analysis and creation too ! (tears of joy meme) and mobile app development. Right now, I just want a job to learn java (dont care if its mobile, backed, swing gui), I will decide later if i hate it or like it. People in the industry change jobs because they prefer other roles, besides others things like location, benefits etc. Sometimes, it take them a while to realize that they wanted something else. Thats not such a bad thing. Its ok if you have not defined your whole career path well and will figure out things along the way. Why do some employers expect this vision and well-defined plan from the get go? Why don't they look at it like - hey! this guy has potential, has some skills and can do the job. We are hiring him for a junior position with low level responsibilities. So, why does his passion matter at this stage? Lets see what he can accomplish and then put him in a department where he will excel and add value to the company. Java Newbie with 72% in OCJP/SCJP - Super Confused Jobless Programmer. I am a "newbie" too. Please verify my answers before you accept them. To answer your question of figuring out a passion, a lot of people never get that one right. I, for example was extremely passionate about fixing motorcycles, but it wasn't a rewarding career (Of course, I could be a master at the skill and be hired at big races. But my passion wasn't porting engines and making faster bikes, I was just too passionate to prolly fix a burnt clutch plate). So the next 'passion' I had was religion. I never found God. Then my next passion became Java. Now am too bogged down by the newest features and the necessity to keep up with them. So first, if you know you will figure out the passion in 5 years, good luck. Most companies have near about dud heads in the recruitment process. If the tech guy is fine the HRs is stupid. If the HR is smart the tech guy is stupid. I would say you just need to keep faking your interest in how high the company's vision is (now which company does not survive only for profits !). Its all about the money in the end. But most firms have to bring in these abstractions of apparitions in the form of social responsibility etc. And they expect the same from the candidates applying.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488273983.63/warc/CC-MAIN-20210621120456-20210621150456-00155.warc.gz
CC-MAIN-2021-25
3,110
8
https://mail.python.org/pipermail/spambayes-dev/2004-February/002456.html
code
Bolt at telus.net Tue Feb 17 19:24:40 EST 2004 I love how SpamBays works, but I have a suggestion.............. When I find SPAM that was not caught by Spam Bays, it would be great if there was an option that I could set so that when I click on the "Delete as Spam" button, it actually moved the item to the Deleted Items folder instead of the Spam folder (where I have to go and manual delete the items anyway - I suspect that this is a MS Outlook issue). Anyway, keep up the great work. -------------- next part -------------- An HTML attachment was scrubbed... More information about the spambayes-dev
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864139.22/warc/CC-MAIN-20180621094633-20180621114633-00066.warc.gz
CC-MAIN-2018-26
604
12
http://stackoverflow.com/questions/12975724/finding-the-size-assigned-by-the-malloc-function
code
Let us say that I let the user specify the number of bytes to be passed to an int *x using the malloc function. Is there a way to determine the actual number of bytes that were assigned to the integer? There is no portable way. The language standard doesn't provide any means to do that. Each implementation needs to keep track of the sizes of the that allows you to get at the number of usable bytes allocated for the passed-in pointer, but that is often larger than the number of bytes requested in the
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645167592.45/warc/CC-MAIN-20150827031247-00332-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
504
4
https://www.quickbase.com/exchange/example-report-from-many-to-many-relationships/2388
code
EXAMPLE - Report from Many-to-Many Relationships This is an example app to answer the query in this comunity question: https://quickbase-community.intuit.com/questions/1167189-how-to-create-a-report-tracking-the-current-location-of-a-foster It uses many-to-many table relationships, and displays a report on the intermediate "join" table. Specifically - in this example, the report displays the current locations of the Pets. You can use a similar structure to record Transfers of Assets from Place to Place - and then to display the current locations of the Assets. Be the first to review this app!
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704835583.91/warc/CC-MAIN-20210128005448-20210128035448-00363.warc.gz
CC-MAIN-2021-04
599
3
http://meta.stackexchange.com/questions/151939/how-do-you-get-ambiguous-tags-on-stackoverflow-handled
code
Stack Overflow has a tag sys which was probably started for the Python module named sys. Alternatively, it could have been started for the ASP.NET namespace Sys. In any event, it is being used for both, which doesn't seem right. It is also being selected by C and C++ programmers, probably as an abbreviation for "system", and by people using the Oracle database. Is it valid to have a tag being used for incongruous things and if not, how do you bring that to someone's attention?
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049277475.33/warc/CC-MAIN-20160524002117-00047-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
481
5
https://rdrr.io/github/mastoffel/sealABC/man/make_genepop.html
code
outputs a data.frame with genepop format so far, the input is the standard format for the bottleneck analysis, i.e. first column "id", second column "pop", third column "cluster", all following columns are loci (two columns per locus). "id" and "cluster" will be deleted and "pop" will be kept for the formatting. Add the following code to your website. For more information on customizing the embed code, read Embedding Snippets.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144979.91/warc/CC-MAIN-20200220131529-20200220161529-00194.warc.gz
CC-MAIN-2020-10
430
4
https://www.baua.de/EN/Tasks/Research/Research-projects/f2407.html
code
The Job Demands Resources (JDR) models, a concept well established in psychosocial research, suggests that demands and resources are differentially important for health depending on the specific occupation considered, and that these job-specific demands and resources interact accordingly (Bakker and Demerouti 2007). Partly inspired by Goldthorpe's employment relation theory (2000) we investigate whether specific psychosocial demands and resources differentially predict poor mental health (ie. burnout and depressive symptoms) in various occupational settings. Among manual workers we hypothesize that the demands "work pace" on the one hand and the resource "control" on the other hand interact as risk factors for mental health. Regarding office workers, we hypothesize that the demand "amount of work" on the one hand and the resources "social support from colleagues" and "quality of leadership" on the other hand interact as risk factors for mental health. Regarding workers dealing with other people (e.g. customers, students, patients), we hypothesize that the demand "being subjected to offensive behaviour" on the one hand and the resources "social support from colleagues" and "quality of leadership" on the other hand interact as risk factors for mental health. These hypotheses will be tested on data from the cross-sectional S-MGA study and the longitudinal lidA study with 4,500 and 4,000 employees, respectively. In both datasets, information on mental health, demands, resources and occupational sector are available. By means of linear regressions, possible interactions will be investigated. Unit 3.2 "Mental Workload and Mental Health"
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662573053.67/warc/CC-MAIN-20220524142617-20220524172617-00492.warc.gz
CC-MAIN-2022-21
1,658
4
https://jobs.github.com/positions/75180814-9cb0-4326-b388-9ff7ae267426
code
Full Time / Remote (LA, CA, WA, TX, MD, OH) You enjoy programming for complex data platforms with transactional workflows and zero tolerance for errors. We believe that happy people produce better results for themselves and the collective team. We believe and value empowering people to work on something they enjoy — thus applicants likely would want to have an interest in serving campaigns, churches, ministries, non-profits, and schools. Programmers work on our Product team as part of the Engineering team. We're rooted in Southern Louisiana but operate as a remote-first company that supports our team living in Texas, California, Washington, Ohio, Maryland, and Florida. We've got an old fashioned commitment to honor and excellence in what we do, and our customer-first hospitality is described as welcoming, courteous, helpful, respectful, and kind. We're the type of people whom you count on to do what is right and have your back.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896374.33/warc/CC-MAIN-20200708031342-20200708061342-00063.warc.gz
CC-MAIN-2020-29
943
4
http://diplomaterv.vik.bme.hu/en/Theses/Multimedia-hangposta-keszitese-beagyazott
code
Effective communication nowadays, in the era of cross-continent multinational companies, is crucial for efficient operation. The multimedia mailbox service is mostly used in the financial sector, where global teams work with an as much as 8 to 12 hours timezone difference. With the service, the traders can record the market open team meeting for their other colleagues so they are also kept up to date. This, however, is usually a costly product with high operational and computing cost. This renders the solution an unreachable luxory for smaller companies. The goal of my dissertation was to implement a similar system using open source solutions, which is capable of running even on an embedded system with low The completed system is implementing the basic functions - including the IVR (Interactive Voice Response) phone menu and its extension, the web based administration panel - while using featherweight hardware compared to a corporate server park. The system can serve a user base (10-15 simultaneous users) fitting a smaller company's needs.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526888.75/warc/CC-MAIN-20190721040545-20190721062545-00111.warc.gz
CC-MAIN-2019-30
1,055
4
https://www.dmxzone.com/support/32763/topic/64479/
code
With a server connect source one can cache the data. Now I've got a AppConnect page thats reads in quite a large JSON file. There are several functions on the page that need the same data again and again but due to the complexity of special PHP functions, the page needs a hard reload when the user choose a different function. So the JSON file gets read in every time after a reload. So it would be great if somehow I can cache this data. Any suggestions if this can be done within AppConnect?
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335469.40/warc/CC-MAIN-20220930113830-20220930143830-00409.warc.gz
CC-MAIN-2022-40
494
2
http://www.videoforums.co.uk/threads/13374-bizarre-clip-behavior
code
I'll try and explain the best I can... I'm working with Elements 3.0. For this example, I'm using only two still images (jpeg). One as a background, one with a figure surrounded by green, which I eliminate with the green screen key. I have the figure in front gradually increase in size using motion. Now, with the 'figure' motion keys in place, I drop the green screen key on it, and as soon as I make a setting change, 'poof', the image (figure) is a good 200% larger than it should be (Im guessing, it's huge and rather random). Rendering doesn't help to get rid of whatever glitch this is. If I adjust the motion even slightly, it immediately shrinks to the proper size...but only on that particular frame. The rest of the famess are still bloated. I've had the same issue with a movie clip, but am currently working only with stills. It very much 'seems' to be related to the color keys, but I've no clue why? Or how to fix it. Very frustrating. I don't recall any such issue with 2.0, though I 'could' be mistaken. I fully uninstalled that before "upgrading" (kinda wish I hadnt now). Any ideas would be greatly appreciated!
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719465.22/warc/CC-MAIN-20161020183839-00340-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
1,130
7
http://forums.androidcentral.com/general-help-how/356927-can-i-change-firmware-myself.html
code
Can I change the firmware myself ? Totally new to smart phones sorry. 14month ago I bought a Defy plus JCB from TheOrder,co,uk over the internet with a manufacturers 2 year guarantee, I had lots of soft/firmware problems with it so I contacted Motorola. They say it is a Swiss version with Italian firmware,that this can cause the problems I am having and they cannot help me (I will remember this for next time I buy a phone) and to contact the supplier. TheOrder,co,uk say they only bought the businesses in Feb so can't help and to contact the previous owner of the business, who is not replying to Emails. Is it possible for me to change the firmware from Italian to Uk myself ? It never crossed my mind to check the system version which is45.0.2310.MB526.Retail.en.IT If it is possible I will have to have a good read up on how to do it. Thanks for any help - 01-25-2014, 06:38 PM #2 Re: Can I change the firmware myself ? Hope this helps and saves anyone in my position a lot of searching about. I downloaded "RSDlite" to my computer and unzipped it. I downloaded the correct firmware (very important) from Motorola as a "SBF" file and unzipped it (to my computer) Tick USB debugging and Unknown sources in settings/applications on the phone. Plug phone in to computer with USB lead and set to USB in phones pull down menu. Open RSDlite and let it find your phone then in RSDlite search for the unzipped firmware on your computer. Turn off phone completely and restart with the volume up button pressed in (hold volume button in until you get a black bootloader screen) then release. Press start in RSDlite program and you will see the progress. wait until it says it is going to reboot and as it does press the volume up button it will go back to the boot loader screen and RSDlite should say "pass" Then restart phone as normal. Worked perfectly for me everything is working and I now have the correct firmware. Not to bad for a complete novice with smart phones ! - By coggz77 in forum Samsung Galaxy Tab 3Replies: 5Last Post: 01-28-2014, 08:03 PM - By Mark Zagotti in forum AT&TReplies: 5Last Post: 01-25-2014, 10:05 AM - By Cenetri in forum Sprint Epic 4GReplies: 0Last Post: 01-24-2014, 11:25 PM - By adiva45 in forum AT&T Galaxy Note 2Replies: 0Last Post: 01-24-2014, 08:25 PM
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280086.25/warc/CC-MAIN-20170116095120-00425-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
2,289
24
https://www.conicet.gov.ar/new_scp/detalle.php?keywords=&id=20881&inst=yes&articulos=yes&detalles=yes&art_id=939890
code
INSTITUTO ARGENTINO DE NIVOLOGIA, GLACIOLOGIA Y CIENCIAS AMBIENTALES Unidad Ejecutora - UE Can a natural experiment be used as a tool to design partial cutting regimes? The decline of Austrocedrus chilensis forests, an example AMOROSO, MARIANO; LARSON, BRUCE Journal of Forest Research Año: 2010 vol. 15 p. 38 - 38 The forests of Austrocedrus chilensis in Argentina suffer mortality from what is locally known as mal del ciprés. This disturbance usually appears as aggregations of dead trees of varying sizes. The mortality process seems unpredictable and regeneration establishment is variable under these conditions. The highly variable mortality rates results in a natural experiment that allows the correlation of overstory mortality with regeneration rate. This correlation should then make it possible to estimate the regeneration success which would follow after different levels of partial cutting, allowing the purposeful direction of the regeneration process. We collected data from eight Austrocedrus chilensis- dominated stands and reconstructed overstory mortality over time and correlated it to the regeneration recruitment. Mortality showed two patterns: increasing continuous mortality over time, and pulses of important basal area loss in short periods. Overstory mortality had an effect on the recruitment and composition of the regeneration by allowing different species establishment depending on the degree of mortality. By quantifying mortality basal area and recruitment over time we calculated estimates that can provide partial cutting guidance. Partial cuttings would then, allow the purposeful direction of the regeneration process. Stand reconstruction studies provided a useful tool to help designing regeneration systems using a natural experiment. Some specific management implications for symptomatic A. chilensis forests are given.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657143354.77/warc/CC-MAIN-20200713064946-20200713094946-00262.warc.gz
CC-MAIN-2020-29
1,866
7