url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
http://www.wyzant.com/tutorsearch?z=93534&d=40&kw=geometry | code | Lancaster, CA 93535
Second Year Calc Math Tutor
I am currently a High school senior and I'm in the top of my classes. I'm taking 3 AP (advanced placement) classes. I'm in the highest math class, calculus BC (second year), and I'm the most advanced in understanding the material, along with being one of the top... | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776404630.61/warc/CC-MAIN-20140707234004-00061-ip-10-180-212-248.ec2.internal.warc.gz | CC-MAIN-2014-23 | 313 | 3 |
https://evolutionnews.org/tag/proteins/page/3/ | code | Some reviews that try to make a book look bad are so ill-informed and malicious that they actually make a good book look better.
The core difficulty for some scientists who read Michael Behe’s book is also the key idea at its heart.
An attribute of a good sci-fi story is that it should open new vistas for the imagination while, at the same time, not requiring the reader to put up with the preposterous.
Michael Behe correctly interpreted a paper by Liu et al. and followed its methodology, whereas his critics, Lents and Hunt, did not.
Lenski agrees that the beneficial mutations seen in his Long Term Evolution Experiment are overwhelmingly degradative or loss-of-function ones. | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573176.51/warc/CC-MAIN-20190918024332-20190918050332-00269.warc.gz | CC-MAIN-2019-39 | 684 | 5 |
https://lightrun.com/answers/cytoscape-cytoscape-js-improve-styling-for-selected-elements | code | Improve styling for selected elementsSee original GitHub issue
My issue is that I can’t find a way to properly highlight selected nodes. I can change the appearance of the label and of the node individually but I need to style the outline of the two together.
Feature request 1: Support
outline styling for a
Feature request 2: Support a visible selection box around the selected objects.
It is feature 1 that I need the most, feature 2 is a nice to have.
The result would be:
I took this styling from Visio:
- Created 8 years ago
- Comments:10 (5 by maintainers)
Top GitHub Comments
Thanks! That’s pretty close to what I need!
but I’d need two more things:
- Make the outline a rectangle (to follow the shape of the node)
- Be able to set a border style and have no fill color.
That would allow me to do what I originally asked. It is possible?
By the way, thanks a lot for your support. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819668.74/warc/CC-MAIN-20240424143432-20240424173432-00714.warc.gz | CC-MAIN-2024-18 | 894 | 17 |
http://lists.andrew.cmu.edu/pipermail/info-cyrus/2007-March/025532.html | code | deliver command line options
beer at freakmail.de
Wed Mar 21 07:59:54 EST 2007
i'am using cyrus-imapd version 2.2.12 on suse linux 9.3. in my setup
procmail calls deliver which works pretty well.
my man page of deliver says
deliver [ -C config-file ] [ -d ] [ -r address ]
[ -f address ] [ -m mailbox ] [ -a auth-id ]
[ -q ] [ userid ]...
deliver [ -C config-file ] -l
are possible options. but often i see -e as option in scripts and
explanations in the internet.
is it obsolete or do i have a special version or is my man page incomplete?
More information about the Info-cyrus | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382920/warc/CC-MAIN-20130516092622-00061-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 578 | 14 |
http://mailman.qos.ch/pipermail/logback-user/2013-March/003753.html | code | [logback-user] Groovy config and debug
Christian.Lipp at xion.at
Wed Mar 20 09:26:57 CET 2013
I would like to know if it is possible to enable Logback debug output via Groovy DSL.
The corresponding XML is:
The online translator doesn't translate the debug option and when I look at https://github.com/qos-ch/logback/blob/master/logback-classic/src/main/groovy/ch/qos/logback/classic/gaffer/ConfigurationDelegate.groovy I think there is no handling of debug, but I am not sure.
This question is also documented in http://stackoverflow.com/questions/15153662/logback-configuration-in-groovy-and-different-class-paths-in-gradle-idea , but only as part of the post.
Kind regards, CL
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Logback-user | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668896.47/warc/CC-MAIN-20191117064703-20191117092703-00215.warc.gz | CC-MAIN-2019-47 | 793 | 11 |
https://forum.gethashing.com/t/wts-ghx-02-btc-each/2471 | code | Check out the title. I have bought and sold here before. PM or post if interested
How many are you selling?
I am selling 78
I’ll buy .04 BTC worth. Where shall I send BTC?
Sorry, I was AFK. I pm’ed you an addy
I’ll buy a few this sunday if there is some left. Probably for 0.2 to 0.3 btc.
can buy 14
I’ll buy whatever you’ve got left. Please PM me.
If bitcointraderyul comes through i have literally 1 left otherwise I have 15
Did you sell all of your coins? If so I can close this thread. Let me know.
Ooops. I did not scroll up far enough I guess. LOL
@diesel286 You still selling, or do you want me to close this now?
I actually have 1…any takers?!
I’ll take it. PM me with BTC address
Smooth transaction. Thanks! | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039744750.80/warc/CC-MAIN-20181118221818-20181119003818-00220.warc.gz | CC-MAIN-2018-47 | 730 | 15 |
https://help.sap.com/doc/d9c75eebcfa840c8a4aa4b0e6a8136de/3.0.15/en-US/440421436f03101491149dd4fbeb03fd.html | code | Indicate if the state uses the Fail follow-up transition type.
public boolean supportsFailTransition ()
ReturnsFalse - does not support fail transition by default
When set to true the state editor will display the Fail dropdown UI control listing all the possible states to chose from. <p> When returning true, the processing method(s) should have at least one condition that returns <code>continueFail()</code>.
The recommended best practice is for states with database or external web service calls to handle errors from these calls using the continueFail() follow-up transition.
Used by: state editor | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497171.9/warc/CC-MAIN-20200330150913-20200330180913-00117.warc.gz | CC-MAIN-2020-16 | 603 | 6 |
https://www.sourcecell.com/RichardKasperowskiProfile.html | code | Richard Kasperowski - Profile
Richard Kasperowski’s expertise is on high-performance teams. Richard is a keynote speaker and the author of The Core Protocols: A Guide to Greatness. He leads clients in building great teams that get great results using the Core Protocols, Agile, and Open Space Technology. Richard teaches the class Agile Software Development at Harvard University.
"I've been Agile-ing since the book XP Explained came out. I started as a 12-year-old with a home computer, writing code for fun. I became a developer, team lead, architect, manager, ... When my colleagues-friends and I used the XP ideas, we wrote our best code ever. I added on Scrum as I became interested in awesome teams, not just awesome individual tech skills. And that led to my interest in emotional intelligence and other factors for high-performance teams in general." -- Richard commenting on his Agile and technical background
Follow him on Twitter at @rkasper, read more about him at www.kasperowski.com, and email him at [email protected].
"A solid introduction to building great teams for great results by introducing intentional culture design and practical methods for doing so. - Oluf Nissen, Scrum Master and Agile Coach The class was informative. It is a great way to form a relationship with the team and focus on how to make things happen." - Maniel Shah, Software Engineer
"A wonderful session promoting positive change and healthy communication. I enjoyed the challenge to investigate without including personal bias." - Stephanie Dukes
"Richard made me conscious of a new possibility of how to engage teams to be awesome." - Robert Franklin
"Wonderful session, very informative, practical and tangible, with lots of takeaways. Richard knows his stuff!" - Raghu Challapilla, Agile Coach
"Great info--engaging presenter. Can't wait to try these principles with my team and read more about Core Protocols." - Joan Burg, Scrum Master | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945292.83/warc/CC-MAIN-20230325002113-20230325032113-00378.warc.gz | CC-MAIN-2023-14 | 1,937 | 9 |
https://rpl-as-ucl.github.io/rpl-seminar/speakers/ | code | Mehmet Dogar Object manipulation with physics-based models, University of Leeds (School of Computing)
I am an Associate Professor at the School of Computing, University of Leeds, UK. My research focuses on robotic object manipulation, and I lead a group of researchers at Leeds on this topic. I am a Fellow of the EPSRC and the Alan Turing Institute. I am an Area Chair for the RSS conference, and an Associate Editor for the IEEE Robotics and Automation - Letters (RA-L). Previously I was a postdoctoral researcher at CSAIL, MIT. I received my PhD in 2013 from the Robotics Institute at CMU.
Farbod Farshidian Combining Model-based and Learning-based Frameworks for Motion Planning and Control of Robotic Systems, ETH Zurich (Robotic Systems Lab)
Dr. Farbod Farshidian (he/him) is a senior scientist at Robotic System Lab, ETH Zurich. He received his MSc. in electrical engineering from the University of Tehran, Iran, in 2012 and his Ph.D. from ETH Zurich, Switzerland, in 2017 on motion planning and control of legged systems. His research focuses on mobile robots’ motion planning and control, intending to develop algorithms and techniques to enable these robotic platforms to operate autonomously in real-world applications. His expertise covers optimization-based control, reinforcement learning, motion planning of legged systems, and mobile manipulators.
Vassilios Tsounis DeepGait: Planning and Control of Quadrupedal Gaits using Deep Reinforcement Learning, ETH Zurich (Robotic Systems Lab)
Vassilios Tsounis (he/him) received a Diploma degree in electrical and computer engineering from the National Technical University of Athens, Greece, in 2014. After a brief internship at the European Space Agency and working in the industry over 2014-15, he joined the Robotic Systems Lab, at ETH Zürich, Switzerland, as a Research Assistant and later a Doctoral Researcher. His research interests include machine learning and control as applied to the perception and locomotion of quadrupedal robots.
Matias Mattamala On physical, algebraic, geometric and probabilistic descriptions in robotics, University of Oxford (Oxford Robotics Institute)
Matias Mattamala completed a B.Sc, Ing. Civil and M.Sc in Electrical engineering at the Universidad de Chile. He developed a visual-proprioceptive SLAM system for humanoids for his master degree, and was a member of the UChile RoboCup SPL team. Currently he is a PhD student at the Dynamic Robot Systems (DRS) group at the Oxford Robotics Institute (ORI) supervised by Prof. Maurice Fallon. He is working toward the development of long-term visual navigation systems for dynamic quadruped robots. His research interests include computer vision and state estimation, as well as mathematical methods and geometry in robotics.
Prof. Yannis Smaragdakis Why Do a PhD and How to Pick an Area, University of Athens (Dept. of Informatics)
Yannis Smaragdakis (born 1972 in Athens, Greece) is a Greek American computer scientist and Professor at the National and Kapodistrian University of Athens as well as an Adjunct Professor at the University of Massachusetts Amherst. He is known for his work in Software engineering and Programming languages. In software engineering, he is noted for his invention of the concept of Mixin Layers in his PhD Thesis and his formation of Yannis's Law of Programmer Productivity which, by analogy to Moore's law, posits that Programmer productivity doubles every 6 years. In programming languages, he is noted for his work in Pointer analysis and serving Object-Oriented Programming, Systems, Languages & Applications (OOPSLA) as Program Chair in 2016 and Conference Chair in 2019.
Prof. Eftratios Gavves The Machine Learning of Time: Past and Future, University of Amsterdam (QUVA Deep Vision Lab)
Dr. Efstratios Gavves is an Associate Professor with the University of Amsterdam in the Netherlands, Scientific Director of the QUVA Deep Vision Lab, and an ELLIS Scholar. He is a recipient of the ERC Career Starting Grant 2020 and NWO VIDI grant 2020 to research on the Computational Learning of Temporality for spatiotemporal sequences. Also, he is a co-founder of Ellogon.AI, a University spinoff and in collaboration with the Dutch Cancer Institute (NKI), with the mission of using AI for pathology and genomics. Efstratios has authored several papers in the top Computer Vision and Machine Learning conferences and journals and he is also the author of several patents. His research focus is on Temporal Machine Learning and Dynamics, Efficient Computer Vision, and Machine Learning for Oncology.
Prof. Kostas Alexis Field-hardened Resilient Robotic Autonomy, Norwegian University of Science and Technology (Department of Engineering Cybernetics)
Kostas Alexis obtained his Ph.D. in the field of aerial robotics control and collaboration from the University of Patras, Greece in 2011. His Ph.D. research was supported by the Greek National-European Commission Excellence scholarship. After successfully defending his Ph.D. thesis, he was awarded a Swiss Government fellowship and moved to Switzerland and ETH Zurich. From 2012 to June 2015 he held the position of Senior Researcher at the Autonomous Systems Lab of ETH Zurich, leading the lab efforts in the fields of control and path planning for advanced navigational and operational autonomy. During summer 2015 he moved to the Computer Science & Engineering Department of the University of Nevada, Reno where he got tenured in 2020. Since Fall 2020 he moved to the Department of Engineering Cybernetics at the Norwegian University of Science and Technology as a Full Professor. He is the founder and director of the Autonomous Robots Lab (https://www.autonomousrobotslab.com/) involving more than 15 researchers and conducting research in the domain of autonomy, perception, planning and control. Dr. Alexis' research has received multiple awards, includes the world record in unmanned aircraft endurance, and has been funded by a variety of sources including DARPA, NSF, DOE, USDA, NASA, the European Commission, the Norwegian Research Council the private sector and other sources.
Prof. Cristina Piazza New Perspectives in the Design and Control of Bionic Limb, Technical University of Munich (TUM)
Cristina Piazza is currently Professor for Healthcare and Rehabilitation Robotics at the Technical University of Munich (TUM). She received her PhD in Robotics at University of Pisa, Italy before moving to to Chicago (USA) where she worked as a Postdoctoral Researcher at the Department of Physical Medicine and Rehabilitation, Northwestern University and the Regenstein Foundation Center for Bionic Medicine, Shirley Ryan AbilityLab (former Rehabilitation Institute of Chicago). Her main research interests include the design and control of soft artificial limbs for robotic and prosthetic applications. She has also experience in designing and conducting clinical trials with amputee subjects.
Dr. Alperen Acemoglu 5G Telesurgery, Italian Institute of Technology (Advanced Robotics Lab)
Alperen Acemoglu received his B.Sc. degree in Mechanical Engineering from Istanbul Technical University, Turkey, in 2012 and M.Sc. degree in Mechatronics Engineering from Sabanci University, Turkey, in 2014. During his master’s studies, he worked on bio-inspired microswimmers which are aimed to be used in biomedical applications such as targeted drug delivery and opening clogged arteries. He received his Ph.D. degree in Bioengineering and Robotics from Istituto Italiano di Tecnologia (IIT) and Universita` Degli Studi di Genova, Italy, in 2018. During his Ph.D. studies, he worked on developing a compact magnetic laser scanner to enable the high-speed laser scanning and non-contact laser tissue ablations in hard-to-reach surgical sites. Currently, he is a postdoctoral researcher in Biomedical Robotics Laboratory, Department of Advanced Robotics, IIT. His research interests include medical robotics, 5G telesurgery, laser microsurgery, magnetically-actuated micromanipulators, and microswimmers.
Dr. Michael Everett Reliability in Robot Learning: Developing resilient autonomous systems for society, MIT (Aerospace Controls Lab)
Michael Everett is a Postdoctoral Associate at the MIT Department of Aeronautics and Astronautics and conducts research in the Aerospace Controls Laboratory. He received the PhD (2020), SM (2017), and SB (2015) degrees from MIT in Mechanical Engineering. His research addresses fundamental gaps at the intersection of machine learning, robotics, and control theory, with recent emphasis on developing the theory of safe and robust neural feedback loops. His works have been recognized with numerous awards and covered by major media outlets.
Dr. Justin Yim Saltatorial Locomotion on Terrain Obstacles, Carnegie Mellon University (Robomechanics Lab)
Justin Yim is a Computing Innovation Fellow at Carnegie Mellon University working with Aaron Johnson. He received his Ph.D. in Electrical Engineering at the University of California, Berkeley advised by Ronald Fearing in 2020. He received a B.S.E. and M.S.E. from the University of Pennsylvania.
Dr. Joao Bimbo Contact Sensing for Robot Grasping, Yale University (The GRAB lab)
Joao Bimbo is currently a Postdoctoral Associate at the GrabLab in Yale University. He obtained his PhD in Robotics at King's College London, before moving to the Italian Institute of Technology in Italy. His main research interest are in robot grasping and tactile sensing. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510498.88/warc/CC-MAIN-20230929054611-20230929084611-00840.warc.gz | CC-MAIN-2023-40 | 9,466 | 24 |
https://salesforce.stackexchange.com/questions/14539/how-are-sites-partner-portal-customer-portal-and-communities-different-from-ea?noredirect=1 | code | Communities is pretty much a self contained product used for managing external parties and providing collaboration through Chatter and the like. Customer portal was primarily a mechanism for exposing data to your customers with authentication, Parter Portal was aimed at data related to partners who might be collaborating on opportunities etc.
Although sites could leverage the login mechanism of customer portal (and I guess now Communities) they are a more general way of exposing VisualForce pages to the world as opposed to pre-built native functionality. Sites can expose pages without any authentication, and are generally the better option if you need to build a bespoke interface. Our website (www.spkeasey.com) is an example of using sites in this manner, it's all built in Visualforce.
This quesiton is somewhat open ended, but I think it has merit as it does affect Salesforce developers and admins, as such I've marked this question and answer as community wiki.
If you want to share data with your partners then Communities is now the way to go as Partner Portal has been retired as of the Summer '13 Release:
Starting in Summer ’13, the partner portal is no longer available for organizations that aren’t currently using it. Existing organizations continue to have full access. If you don’t have a partner portal, but want to easily share records and information with your partners, try Communities.
Existing organizations using partner portals may continue to use their partner portals or transition to Communities. Contact your Salesforce Account Executive for more information. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474784.33/warc/CC-MAIN-20240229035411-20240229065411-00675.warc.gz | CC-MAIN-2024-10 | 1,601 | 6 |
https://sandbox.finalparsec.com/Blog/ViewPost/a-star-visualization | code | See a few video examples of a Unity program that visualizes A* pathfinding in a user friendly way with a tracing option.
Here is a small program that I made for a parallel class project during my first semester of graduate school. At the end of the class project, I decided to continue work on it in order to improve path quality, be more user friendly, and introduce a tracing option.
The program visualizes Sequential A* and Parallel New Bidirectional A* (PNBA).
The biggest achievement of this program is the implementation of the PNBA algorithm as described in PNBA*: A Parallel Bidirectional Heuristic Search Algorithm. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00143.warc.gz | CC-MAIN-2023-50 | 624 | 4 |
http://soft-matter.seas.harvard.edu/index.php?title=Hydrodynamic_metamaterials&oldid=12517 | code | Hydrodynamic metamaterials are microfabricated structures that have can be used to manipulate particles to flow along particular paths. They are analogous to traditional optical materials, except rather than modifying the propagation of electromagnetic light waves, these metamaterials modify the propagation of particles through a microfluidic channel.
One class of hydrodynamic metamaterials is an asymmetric array of posts placed within a microfluidic flow channel. The posts are oriented vertically, while flow occurs in the horizontal plane. The asymmetry arises, because each subsequent column of posts is vertically offset from the previous column by a small distance. As a result, the rows of posts are at an angle, α, relative to the direction of flow. Small particles and molecules follow the streamlines of fluid through the channel, and propagate in the direction of flow. Large particles the asymmetry of the channel, and propagate at an angle α relative to the flow direction.
These properties can be exploited to build devices. The figure on the left shows a hydrodynamic metamaterial with two different asymmetric post arrays. Particles entering this metamaterials are focused into a streamline along the center of the channel. The focused stream of particles can be collected and removed, while excess solvent is removed.
It is also possible to separate particles based on size to remove unwanted dirt or debris, to collect cells of various kinds, or to sort cells according to their phenotype.
- Morton, K.J., Loutherback, K., Inglis, D.W., Tsui, O.K., Sturm, J.C., Chou, S.Y., & Austin, R.H. "Hydrodynamic metamaterials: Microfabricated arrays to steer, refract and focus streams of biomaterials." Proc. Nat'l Acad Sci. (2008), 105(21), 7434-7438. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104205534.63/warc/CC-MAIN-20220702222819-20220703012819-00120.warc.gz | CC-MAIN-2022-27 | 1,768 | 5 |
https://github.com/daveliu | code | Hide content and notifications from this user.
Contact Support about this user's behavior.
ios app for ruby-china
Rails asset pipeline integration for Ueditor
a rails plugin handle multi photos uploaded, based on the paperclip plugin.
Forked from mojombo/clippy
Clippy is a very simple Flash widget that makes it possible to place arbitrary text onto the client's clipboard. This is Chinese version
Seeing something unexpected? Take a look at the
GitHub profile guide. | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323730.30/warc/CC-MAIN-20170628185804-20170628205804-00211.warc.gz | CC-MAIN-2017-26 | 468 | 9 |
http://linlog.skepticats.com/entries/2006/02/Playing_with_prelink.php | code | Well, I finally got up the courage to try prelink today. OK, so it's more like I said, "Oh, what the hell," but the outcome is the same. I installed prelink from the Ubuntu repositories and ran it.
If you've not heard of it, prelink is a tool that, well, prelinks your binaries. I'm not exactly an expert on shared libraries, but my understanding is that it basically does the work of the dynamic linker ahead of time. So, instead of the linker relocating libraries at run-time, it's already done. The net result is that programs load faster. This is supposed to be especially true of C++ programs, as they apparently make the loader do a lot of work.
I heard of prelink some time ago, but was always a bit wary of it. I'm a bit wary of anything that modifies system files. But I read through a thread on it at Ubuntu Forums, and there seemed to be few people who had problems, so I decided to give it a go. I also read the documentation and saw that prelink has an uninstall option and that it should cause libraries to revert to their normal loading if, for some reason, prelinking fails. That eased my mind a little.
It's only been a few hours, but so far I haven't been disappointed. I haven't actually timed application start-up with and without prelinking, but KDE applications are definitely loading faster. I don't know if they're loading in half the time, as some people claimed, but the difference is definitely noticable. In particular, I noticed that Kontact is coming up much faster. Also, Konqueror is loading up with almost no wait. Basically, things are now starting in what feels like the right amount of time. I know my Sempron 2500 with 512MB of RAM isn't exactly a high-end system, but it's got enough horse power that I shouldn't have to wait three seconds for the file manager to start up. And now I don't.
You can reply to this entry by leaving a comment below. You can send TrackBack pings to this URL. This entry accepts Pingbacks from other blogs.You can follow comments on this entry by subscribing to the RSS feed. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705310619/warc/CC-MAIN-20130516115510-00065-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 2,042 | 5 |
https://swcarpentry.github.io/managing-research-software-projects/17-tdd/ | code | Test Driven Development
OverviewTeaching: 10 min
Exercises: 30 minQuestions
How can figure out what my code is supposed to do?
How can I stay focused on building what I actually need to?Objectives
Define test-driven development and explain the rationale for it.
Write unit tests to define what what a simple function is supposed to do.
- Test-driven development (TDD)
- Write a handful of tests that don’t even run because the code they are supposed to test doesn’t exist yet.
- Write just enough code to make those tests pass.
- Clean up what’s just been written.
- Commit it to version control.
- Advocates claim that writing tests first:
- Focuses people’s minds on what code is supposed to so that they’re not subject to confirmation bias when viewing test results
- Ensures that code actually is testable
- Ensures tests are actually written
- Evidence backing these claims is contradictory
- Empirical studies have not found a strong positive effect
- But many productive programmers believe in it
- So maybe we’re measuring the wrong things…
First, the Tests
assertstatements, write half a dozen tests for each of the following functions.
- Compare your tests to those written by your neighbors. What errors did they test for that you didn’t? What would your tests catch that they missed?
- Where did you interpret requirements differently? I.e., where would a function pass one of your neighbors’ tests but fail one of yours or vice versa?
- Non-Decreasing Sub-Lists
- Given a list of numbers, return a list of the sums of each non-decreasing sub-list. For example, if the input is
[1, 2, 3, 3, 1, 5, 6, 3, 1, 2, 3], the output should be
[9, 12, 3, 6].
- Rectangle Overlay
- Given two rectangles, each defined by the four values [x0, y0, x1, y1], return the rectangle representing their overlap. Assume all coordinates are integer. For example, if the inputs are
[0, 0, 2, 2]and
[1, 1, 5, 3], the output should be
[1, 1, 2, 2].
Test-driven development (TDD) is the practice of writing tests before writing code.
Writing tests first helps clarify the intent and interface of the code to be written.
Empirical evidence for TDD’s benefits is unclear, but many programmers find it very useful. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158279.11/warc/CC-MAIN-20180922084059-20180922104459-00450.warc.gz | CC-MAIN-2018-39 | 2,217 | 36 |
https://community.spiceworks.com/topic/94925-ipsec-vpn-tunnel-won-t-pass-network-traffic | code | Okay, so I've got a weird scenario here. We have a client with 2 locations in the DFW area: main location in Dallas, and a satellite office in Grapevine. Because of the way they're setup, we have to use a VPN tunnel for server and printer connectivity.
Here's the issue:
When I setup a Branch Office VPN tunnel on both firewalls (WatchGuards at both locations) using a Bonded-T1 connection at the main office and FiOS at the satellite location, I can get the tunnel to initiate, but it will NOT pass traffic. If you watch the traffic monitors on the Watchguards, it shows as having SENT traffic, but not receiving any.
Now, the main location has a backup DSL line. If I setup the WatchGuard in the main location to connect from the DSL in Dallas to the Fios in Grapevine, the VPN connection initiates and passes traffic.
I get the same result whether or not NAT-T is enabled or disabled when doing the T1 to FiOS. It'll initiate, but not pass traffic.
I've spoken with the T1 provider and they swear up and down that there's nothing in their network that could be causing the issue, nor do they have any idea what may be the problem. I've done some nmap testing to check whether ports are open on routers that the traffic traverses (traceroute to identify routers between the two locations), but the results seem a bit cryptic to me and nothing stands out. Does anyone here have any thoughts on it?
I would double-check your routes and access-lists/firewall policies on both sides.
Does the Watchguard have tools that will allow you to see how far the packets go? THis will help you concentrate on the appropriate location and interface.
Think Unified is an IT service provider.
Nothing is statically set on the firewalls as far as routes go, and no access lists are in use. (Basically just a very simple small business setup...nothing fancy networking wise...unrouted networks, no VLANs, no access lists, no dynamic routing protocols in use...just a single /24 network at each location).
I literally can delete out all the VPN tunnels there are, create them using default settings (basically just enter IP addresses and a PSK and change nothing else), and the tunnel will work just fine through the DSL line.
I don't think that the WatchGuard offers any sort of packet tracing tool. Perhaps someone else may know better about it?
What type of Watch guards are you using? Do you have any other VPN tunnels or is the only one and its not working.
Is your tunnel setup for network to network or a host to host?
Which CPE do you got for each pipe, the unit bringing up the pipe? The FiOS unit is probably an Actiontec, I'm assuming that you are using AT&T for the DSL in Dallas so there are a few different ones, the T1 could be anything from a Adtran to Cisco.
Might be transversing NAT funny over the T1. If the connection nails up, it's probably got nothing to do with the pipe. | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886133032.51/warc/CC-MAIN-20170824043524-20170824063524-00204.warc.gz | CC-MAIN-2017-34 | 2,878 | 16 |
https://people.maths.bris.ac.uk/~ea19261/index.html | code | I am a Research Associate at the School of Mathematics in the University of Bristol, where I work with Patrick Rubin-Delanchy on researching Bayesian and machine-learning-based analysis of super-resolution microscopy data.
In particular, I am currently investigating:
- cluster detection and fibre analysis, and
- graph-based embedding.
I gave a seminar about my current work here:
- Fibre analysis for super-resolution microscopy data, Data Science Seminar Series: Institute of Statistical Mathematics, Japan and University of Bristol, UK, September 2020. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00508.warc.gz | CC-MAIN-2022-33 | 556 | 6 |
https://www.erlang.com/topic/1-6916/ | code | Does anyone know how to put a cell or cells into trace (Ericsson system)? And where to download them from (which directory if it is pre-set in OSS)? No RNO, MRR, FOX, NOX should be considered. I do not know what is the difference between them at all (call trace and cell trace), because in Motorola system call trace files are actually a result of putting a cell into trace, however in Ericsson only “cell trace” is mentioned and nothing about call trace files.
I am working with Ericsson GSM and also Nortel GSM. With the Ericsson I have the ability to run MRR, FAS, and NCS. The Nortel system has the ability to run Call path Traces and Call traces. Due to the manufacture of our specific MSC we have lost some of the functionality for for the RNO products. I dont know if Ericsson has the ability to run Call path Traces or Call Traces. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00721.warc.gz | CC-MAIN-2023-14 | 843 | 2 |
http://www.dbforums.com/showthread.php?1687295-Building-MQTs-gt-deadlock | code | I have 3 Tables:
1. Table_01 --> fact table
2. Table_02 --> fact table
3. Table_03 --> dimension table
Building of MQT_Table_01 and MQT_Table_02
I have successfully built a MQT on Table_01. The computing of MQT on Table_01 involved Table_03. It means, in order to build Table_01, db2 needs to read Table_03. MQT for Table_02 needs also Table_03
I recognize, if I paralelly build MQT_Table_01 and MQT_Table_02, db2 runs into deadlock. I thought, it might be because of the parallel read transactions in Table_03. But is it really the reason? I am thinking, if db2 just reads, it should be okay? There is no exclusive lock, isnt it? | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121216.64/warc/CC-MAIN-20170423031201-00426-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 630 | 7 |
http://jobs.pythonweekly.com/jobs/python-django-developer-3/ | code | Full-Time Python (Django) Developer
NOTE: This job listing has expired and may no longer be relevant!
Austin, TX based SAAS company is seeking a Python Django Developer. We are tackling complex application development and looking to find similar highly capable developers.
•Web MVC development experience – Django preferred – 2+ years
•Python development experience – 2 + years
•Desire to build disruptive technologies
Preferred but not Required:
•SciPy / NumPy
•Node.js, Backbone.js, ExtJS, Jquery
How to Apply
email resumes to [email protected] | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122619.71/warc/CC-MAIN-20170423031202-00433-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 575 | 11 |
http://mylifeinchacala.blogspot.com/2007/03/if-you-are-thinking-of-coming-to.html | code | CHACALA BUDGET RENTALS for photos and contact information
for almost all the rentals in Chacala, including info about camping and long-term rentals.
For more info about Chacala about taking the bus or taxi from the P.V. airport, go to
A word of caution. Chacala is built on a slope, and the streets are either dirt or cobblestone, except for one paved road uphill from town. Almost all rentals have steps, and require some climbing. There are a few that don't. If you have mobility problems, that's something to consider. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592420.72/warc/CC-MAIN-20180721071046-20180721091046-00517.warc.gz | CC-MAIN-2018-30 | 521 | 4 |
https://szabgab.com/what-does--if-it-aint-broke-dont-fix-it--really-mean.html | code | I keep hearing and reading this nice proverb if it ain't broke, don't fix it. The latest appearance was in response to Shlomi Fish suggesting that some Ancient Perl code should be replaced by Modern Perl code.
I am not saying that every piece of code should be rewritten every 6 months but in my understanding that sentence actually translates to let's wait till it breaks and then panic.
I think people who say that sentence are afraid that the new version will break something. Sure there is always a chance that a change introduces an error but if we are afraid to touch the code what will happen when later on we encounter a case where it does not work? For example if we need to use it in a new environment. Will we have the courage to change the code then? How much will it cost in money, time, and lost sleep?
I think we have been trying to teach ourselves that we should have really good test coverage of our code and then we can easily refactor it and get rid of technical debt. So why do we keep hearing that sentence?
Published on 2009-11-28 by Gabor Szabo | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711637.64/warc/CC-MAIN-20221210005738-20221210035738-00790.warc.gz | CC-MAIN-2022-49 | 1,067 | 5 |
https://www.britishpathe.com/video/tappitout/query/wildcard | code | The composer Herman Darewski introduces a new party game.
Note: Probably filmed in the Pathe studio.
Full titles read: "TAPPITOUT - Here's a novel little idea to try at one of your parties - devised by Herman Darewski, the famous Composer and Conductor."
Various shots of Herman Darewski introducing new party game. He taps out several well known tunes with a pencil on top of his piano including "God Save the King". | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522556.18/warc/CC-MAIN-20220518215138-20220519005138-00710.warc.gz | CC-MAIN-2022-21 | 417 | 4 |
http://www.tricki.org/tricki/help/stubs | code | What is a stub?
When creating or editing a Tricki article, one may mark it as a stub by ticking a checkbox on the edit form. Our working definition of a stub is that it is an article with no substantial mathematical content and with no links forward to any articles with substantial mathematical content. (That is, a parent of a non-stub is always a non-stub.) The thought behind this is that there are two directed graphs of interest on the Tricki: one with all articles, whether written or unwritten, and the other the set of all ancestors of articles with interesting content. The stub feature allows one to explore either of these trees with ease, because if an article is marked as a stub, then all links to that article are clearly marked as well, with a little leaf symbol .
Stub articles vs incomplete articles
One may also mark articles as incomplete, as discussed on the editorial markup page. The difference between a stub article and an incomplete article is that an incomplete article may very well contain interesting content while still being far from complete, whereas a stub is essentially guaranteed not to lead you to interesting information. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122739.53/warc/CC-MAIN-20170423031202-00216-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,161 | 4 |
https://sciencemediahub.eu/scientists/sven-schlarb/ | code | Sven Schlarb studied Humanities Computer Science at the University of Cologne where he got his PhD in 2006. After working as a software developer in Cologne and Madrid, he was working in international research projects in the fields of digital preservation, digitization, and applied natural language processing since 2008. Since 2014 he is working at the AIT Austrian Institute of Technology as a project manager, researcher, and developer in international research projects. His main research interest lies in the fields of data mining and applied natural language processing (NLP) in the domain of very large document collections and archives.
Scientist: Sven Schlarb
A scientist’s opinion: Interview with Sven Schlarb about responsible research and innovation in the EU
Interview with Sven Schlarb, scientist at AIT Austrian Institute of Technology GmbH. How is the Co-Change project contributing to research in your institution? Sven Schlarb: The Co-Change project combines researchers who think about ethical principles with projects that integrate these principles into their work. As such, responsible research, not only the monitoring function, is brought ... | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00213.warc.gz | CC-MAIN-2023-14 | 1,170 | 4 |
https://doaj.org/article/3825a91323824cc0947a02c0737be457 | code | For some complex systems with several controlled variables and with interaction between these controlled variables, one complex mathematical model is established to include lots of elements in the control matrix. In order to reduce the number of elements in the control matrix and increase real-time property in designing the unknown controllers, an idea of non-interaction property is introduced to simplify our mentioned closed loop system with many variables. To achieve the non-interaction property, some conditions are derived to guarantee one controlled input only influences one output. Based on this simplified model, the prediction error method coming from system identification field is applied to design the optimal controllers. The advantage of our prediction error method is that the optimal controller is a constant ratio of two polynomials. Finally one simulation example confirms our theoretical results. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585281.35/warc/CC-MAIN-20211019202148-20211019232148-00099.warc.gz | CC-MAIN-2021-43 | 920 | 1 |
http://evcombine.net/random/game/index.shtml?doom3 | code | Think back to 2004. There were two big titles in the First Person Shooter Genre released near the end of that year. These were Doom 3 and Half-Life 2. Doom was out in August, Half-Life in Novemeber. What do I remeber most about them? I remember the Doom system requirements looking at my computer and going "Yeah, right, dream on bub." I also remember Half-Life looking at the same computer and going "Sure, lets play." The load times were rather long, but the game was gorgeous and ran without lagging. I aso remember replacing that computer and having Half-life go "Hey, you can turn up the graphics options even higher now" and it was spectacular. On the new box Doom went "Ugh, you want me to play on that? All right, but crank the resolution and detail way down." It ended up looking like the original doom - except it crashed every time I interacted with a terminal in the game. I'm now on my third box since 2004, and finally Doom will run normally. And you know what? It looks like crap. I'm not comparing it to games that came out from 2005 on, I'm comparing it to Half-Life 2, which game out the same year. The people all look like they have square heads with faces that got hit by a shovel. Everything looks like it's made out of plastic, the flesh, the fabric, the metal, the rock, all looks like plastic. If this were Lego Doom that would be just fine. This however, is regular Doom. I'm sitting here thinking "What does this game need all those system resources for if it looks like this?" What they had tried to sell us what that it was some gorgeous photorealistic masterpiece that couldn't be realized on last gen hardware. It isn't. It is the purtid result of lazy programmers who didn't want to do the work needed to make it efficient. I haven't even gotten to the gameplay, this is just my visual impression.
It suffers from something in gameplay I like to call "not being fun". This is a severe disease that is almost universally fatal to the games which it afflicts. Fun is the only measure of value for a game. Doom 3 is a collection of cheap shots and artificial handicaps to cover for a ragingly stupid AI. Lets start with the old classic - the trapped powerups. After a few hours of gameplay, my reaction to seeing powerups is "What are they going to ambush me with this time?" Even if you've cleared the area, stepping into the space containing the powerup is a script trigger that spawns some set of enemies nearby - usually in melee range. It only worked once - when the script trigger instead caused the floor to fall and drop me into a group of zombies that I couldn't have swept from above. But there's still a problem with that - prior to my picking up the powerup the zombies were completely silent. Everywhere there is a zombie active in the area, you can hear it. They make a distinctive groaning sound. As I said, this was a classic move that harkens back to Doom's roots, so I'm not going to harp on it anymore. Instead, I'm going to harp on the lighting. Tell me, why does this game need so many system resources when my screen is 80-90% pitch black 80-90% of the time? And then there's the flashlight mechanics. As you should know by now, by default you can't use the flashlight at the same time as your weapons. Otherwise you would actually be able to see where you are shooting. And the flashlight when it's up doesn't even center on your crosshairs. It aims below and to the right of your crosshairs, lighting up a tiny circle in the lower right quadrant of the screen. Why? so you can't see an enemy and switch to a weapon to shoot it. Because if your light were centered of your crosshairs you could line up your shots by seeing your enemies. You can simulate this gameplay mechanic by putting your head in a duffel bag and trying to box one of your friends who is not similarly impaired.
Lastly there's the stunlocking. From what I can tell, enemies can stunlock the player by causing damage, but the enemies do not likewise stumble when they take damage from the player. Again, this is probably to compensate for the horrible AI, which I found myself routinely exploiting. I never felt any immersion, only annoyance. I could practically see where I tripped over the script triggers on the map. These same scripts are fond of spawning enemies behind me in areas I have very thoroughly cleared already. Another cheap shot. Lastly there's the obsession with ingame cutscenes. Pointless ones that happen whenever you stumble onto their trigger and leave you in the worst tactical position possible even when it's a movement pattern I'd never do as a player. When I enter a room, I sweep the corners, looking for consealed or otherwise waiting enemies and areas from which I could be ambushed. When I stumble onto a cutscene trigger, the PC strolls casually into the center of the room and sits there watching as six demons crawl out of the woodwork and pose rediculously. Okay, it's supposed to be menacingly, but I just don't see it. I'd have been shooting the moment they poked their ugly faces out of the vents.
What do I have to say that's good? Hrmm... I guess the voice acting was all right. But I wanted to shut that damn radio off from minute one. I don't need to hear these stupid random screams from NPCs I never met while trying to listen for the door code in an audio log while fending off an Imp. Oh yeah, that reminds me. If you miss the spoken code in an audio log, you have to play the entire *bleep*ing log over again to get the code. And they're ALWAYS at the end. There's no option to skip forward in the audio log, no fast forward, and no text annotations you can scribble just in case you forget what the code was. To make matters worse, there's no sense that at one time the facility had a logical layout. It always feels as though the path from point A to point B always went through hazards X,Y and Z, even when the facility was running normally. And is it me or are the zombies far more dense in population than the staff they supposedly came from? | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109893.47/warc/CC-MAIN-20170822031111-20170822051111-00057.warc.gz | CC-MAIN-2017-34 | 6,016 | 4 |
https://wiki.ubuntu.com/UnifiedUbuntuBranding?highlight=%28CategoryMarketing%29 | code | Product definition in an open source environment is challenging. Everything is bid and acceptance is voluntary. In the truest sense of Darwinism products live and die by the activity of their development, acceptance by the user population, or the lack thereof.
Distributions are built like Lego's where communities assemble finished products from a grab bag of kernels which include Linux, BSD, or Solaris and dress them in user interfaces called Gnome, KDE, and XFCE. The final product is cloned and engineered for platforms such as Intel-32, Intel-64, AMD, and PPC. As a testimony to the success of the Ubuntu community, their products have risen to a level where others are leveraging them into their own product lines.
All of these nuances and permutations add to the confusion and marketing chaos.
The world of Ubuntu is really a community which supports various products based on the Linux kernel. It's name sake product is a Linux kernel tailored with a Gnome user interface. Sibling products have evolved supporting the same kernel but different interfaces. In addition, specialty products have risen to support the education and server markets. The community is always in motion, the mix constantly changing and evolving, resulting in the unclear branding of Ubuntu Products.
Ubuntu is a Community of people (referred to as “Community”) and a special blend of Linux mated to the Gnome Desktop (referred to as “Ubuntu Desktop”). Although Kubuntu and Xubuntu are branded in a manner which segregates them from the others, to the new user it may be unclear that Kubuntu is really Ubuntu Linux mated to the KDE Desktop and Xubuntu is really Ubuntu Linux mated to the XFCE Desktop. In addition, branding for Ubuntu Server is absent and the new user may not understand Edubuntu is really the Ubuntu Desktop targeted toward schools and young children.
When we communicate the identity of Ubuntu products it is important the message is received intact and unblemished. In addition, the message must be succinct and delivered without reams of explanation. Failure to obtain these goals will alienate individuals who would otherwise be willing try the Ubuntu Desktop, Kubuntu, Xubuntu, Edubuntu, or Ubuntu Linux Server (collectively referred to as “Ubuntu Product”). As the desire of the community is to promote Ubuntu to a wider audience achieving this level of excellence is critical.
B.2 Current Branding Norms
The current branding norms for computer software is as follows.
Owner -> Product -> Category -> Subcategory
Successful software brands:
Microsoft -> Windows -> XP
Oracle -> Database -> 10g
Apple -> Mac -> OSX
Note: Microsoft, Oracle, and Apple are registered brand names.
Applying this pattern to Ubuntu produces the following:
Ubuntu -> Linux -> Gnome Desktop
Ubuntu -> Linux -> Gnome Desktop -> Education
Ubuntu -> Linux -> KDE Desktop
Ubuntu -> Linux -> XFCE Desktop
Ubuntu -> Linux -> Server
B.3 Current branding is discriminatory
The very fact Ubuntu refers to the Community and to the Ubuntu Desktop delivers the message the Ubuntu Desktop is the preferred product. The truth is every Ubuntu Product stands on equal footing and should be presented without prejudice.
B.4 Consistent definition lacking
The Ubuntu Desktop, Kubuntu, Xubuntu, and Edubuntu fail to deliver an accurate and consistent message describing their identity. An individual from the US may interpret the Edubuntu branding correctly and then mistakenly assume Kubuntu is directed toward K12 schools. To the highest degree possible the branding should be culture agnostic.
B.5 Logo synchronization
The Kubuntu and Xubuntu logos do an excellent job blending with the Community logo. However, what is the message? Does Kubuntu coexist harmoniously with the Ubuntu Desktop, or complete against it?
C. Use cases
The Hector Quintero Story
In the chaos which often occurs at the end of a school day, Hector Quintero hung with his friends and talked of the events of the day and other things that came to mind.
“I've switched my computer to Ubuntu”, boasts a friend, “and it is way cool”.
Interrupted by the unexpected arrival of the bus, the crowd begins to disperse and the small talk closes with an abrupt final comment.
“Hector, you should check it out!”
Hector spends a lot time at his PC doing school work and playing games. This Saturday was game day and he was taking a break from a difficult battle scene when he remembered the words of his friend and directs his browser toward the Ubuntu home page. Greeted by smiling faces, he is pleased by the clean professional look and his enthusiasm builds as he peers through the details.
Standing out like the head lines of a daily news paper the words “ubuntu”, “kubuntu”, “xubuntu” catch his attention and spike his curiosity.
“What is this all about?” he questions as he moves closer to his screen.
“Ubuntu is a complete Linux-based operating system ...” states the commentary.
“Linux, wow ... I've heard of that!” he responds.
Driven again by curiosity he clicks the community link.
“The Ubuntu community consist of individuals and teams ...” the editorial begins.
With a puzzle look he leans back in his chair to consider the meaning of that statement.
“I thought Ubuntu referred to the OS, not a group of people?" he murmurs.
Returning to the keyboard with a more distant posture, his eyes engage the screen, his mouse the kubuntu link.
“Kubuntu is a user friendly operating system based on KDE, the K Desktop Environment ...” begins the opening sentence.
“Now I am really confused, I thought Linux was the OS!” states Hector.
Fueled by his frustration the pace quickens as he navigates to the xubuntu page and not really sure of what to expect he begins reading below the headline.
"Xubuntu is a complete GNU/Linux based system with an Ubuntu base ....”
At this point the sounds bites and the head lines have run together blurring their definition and a frustrated Hector grumbles, “and what is an Ubuntu base?”
Pausing to reflect on the answer he chuckles with the response.
“Too much like home work!”
Ubuntu Internet Site
The Hector Quintero Story
- Re-brand Ubuntu Linux Gnome Desktop
- Re-brand Ubuntu Linux KDE Desktop
- Re-brand Ubuntu Linux XFCE Desktop
- Re-brand Ubuntu Linux Server Edition
- Re-brand Ubuntu Linux Education Edition
Scenario # 1
Retain the branding of current products to the highest possible degree.
To illustrate ...
32bit Ubuntu becomes Ubuntu Linux Gnome Desktop - 32bit
64bit Kubuntu becomes Ubuntu Linux KDE Desktop - 64bit
Scenario # 2
Re-brand all products to a new unified structure
To illustrate ...
32bit Ubuntu becomes Ubuntu Linux /g32
64bit Kubuntu becomes Ubuntu Linux /k64
Note: Scenario 1 & 2 are strictly to illustrate the point with the final decision
and brand name to be determined as a deliverable of this project.
- Create an unified branding template for all products
- Apply template to the current products
- Create artwork to reflect new branding, if required
- Create rollout campaign, press releases, etc.
G. Obstacles/Unresolved issues
- Each product team has been involved in the branding of their respected products and there is substantial momentum in the current branding. The constituency of these teams will need to agree and endorse the change.
- The process needs to be mindful of edeavors past and present. There may be Community endorsed initiatives at play which re-branding may harm.
- Ubuntu Book
- Distro Watch
H.1 Project Charter
H.2 Launchpad Specification
I. BoF agenda and discussion
Doc Version: 072661 | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400213454.52/warc/CC-MAIN-20200924034208-20200924064208-00436.warc.gz | CC-MAIN-2020-40 | 7,588 | 81 |
http://programmers.stackexchange.com/questions/tagged/visual-studio-2012+team-foundation-server | code | to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
How to access / query Team Foundation Server 2012 with Odata?
I've tried to find a solution for this for hours now, and I'm getting the same results in the end, asking me to install a lot of Azure and other stuff, plus running some example project .sln that I ...
Nov 5 '12 at 9:41
newest visual-studio-2012 team-foundation-server questions feed
Hot Network Questions
Why is an image called an "image"?
Get 5 by doing any operations with four 7
Would an Inquisitor's warband be dispatched to fight the taint of Xenos?
Is it normal for an advisor to expect >80 hour workweeks from PhD students, and threaten them with dismissal?
Do Frodo and Legolas have any discussion in the entire Lord of the Rings?
Best tool for interactively determining upslope and downslope areas on a DEM
Rosetta Stone Challenge: What's Average Anyways?
Evaluating a polynomial of degree 4, given some values of the polynomial
How to prevent the chicken breasts from drying out
Newly hire was terminated from previous company
scale an image inside a mask
Is there any performance difference in using a unique index on primary key?
Neutral alternative to "deny" to mean "assert the untruth [of a claim]"
interpolating function over dates
Lambda-Over-Lambda in C++14
Installing Ubuntu on a SSD and HDD system
How to disable VM from accidental startup in vSphere?
HTTP over HTTPS speed
Logistic Regression : How to obtain a saturated model
Does sorcery/black magic exist today?
Is a steak OK to eat if it fell down, but I cooked it afterwards?
How does a website remember not to store cookies?
What do you call a disgusting mixture you don't want to drink?
How can I draw circled integers with the same size by TikZ?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0 | s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922871.14/warc/CC-MAIN-20140901014522-00447-ip-10-180-136-8.ec2.internal.warc.gz | CC-MAIN-2014-35 | 2,325 | 52 |
http://www.magicmouse.com/h_beads_detail.html | code | Beads is a radical new language, to replace the entire HTML + CSS + JS + Framework stack, all done by a single language.
It's a concise, readable, super high level language that generates a single HTML file web app.
After downloading the .ZIP file, unpack the folder, and follow the instructions in the READ_ME quick start file. Current version is 0.56.
SDK includes both Macintosh and Windows executable versions of the compiler. Linux users, use the WINE environment to run the Windows EXE
Runs on a in-memory graph database.
Has a domain specific language that handles layout inside the language.
Compiles most projects in under 1 second.
Fault-tolerant architecture has closed arithmetic, and infinite loop protection.
Creates projects that are easy to maintain. Low levels of nesting throughout.
Your projects can be easily localized, as translation tables are supported for string literals.
First, pick a project type
Discus supports CD, DVD, jewel case, mini-cd, dvd case, audiocassette, VHS and even calling cards.
Next, select a background
With over 1000 backgrounds and over 750 MB of artwork, Discus has the most artwork
supplied of any labelling software.
A powerful bitmap paint layer
A full 24-bit paint layer is available for drawing custom shapes; particularly useful
for drawing behind text.
Powerful photo import features
Import photos and graphics, adjust their layering, opacity, darkness,
edge feather, corner roundness and more.
Flexible text handling
Choose from 8 text layouts including circular and spiral layout. Add glow, drop shadow and outline effects for
a professional touch.
Precision printing with no effort
Change paper layouts or printer selection without redesigning your label, and nudge the printout to get a perfect
Comprehensive template support
With over 2700 papers supported, and almost every known CD printer pre-programmed, Discus has the
widest possible output range. No other labeling software has a fraction of the versatility of Discus. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710869.86/warc/CC-MAIN-20221201185801-20221201215801-00851.warc.gz | CC-MAIN-2022-49 | 1,985 | 29 |
https://boards.greenhouse.io/carnegietechnologies/jobs/4262773002 | code | Carnegie Labs is the research and development division of Carnegie Technologies. It provides the innovation pipeline and incubation of cutting-edge technology solutions and services the company brings to market. Its innovations empower mobile operators, MSOs, telco operators, and enterprises with solutions that drive revenue and enhance end user experience. We are looking for smart, motivated, and skilled people who excel at creating new frontiers and want to change the world.
The RF Systems Integration Engineer will be work directly for the Head of System Integration and will work in conjunction with the hardware, software, QA, and operational field teams and be responsible for the system integration for wireless equipment and networks. The emphasis for this position is in indoor wireless network system primarily based on 802.11 WiFi, and 802.14 Bluetooth/BTLE, LoRa, GPS, and additional derivative technologies.
This person will be working primarily in the Carnegie Labs environment where new technology is developed and matured into our product line. This role will derive, evolve and ensure successful execution of test & validation plans for in-house hardware projects. You will help develop/execute R&D and mass production intent type testing hardware and software for in-house hardware projects, device characterization, calibration and test. Develop and maintain test plans/procedures/equipment. Troubleshoot and root cause, document, develop tests for known failure cases, and drive issues to closure
- 5+ years of systems integration and development in RF subscriber, home gateway, and access point products as well as end point subscriber products
- Deep experience with at least one of the following RF technologies: WiFi, Bluetooth, and indoor IoT technologies such as 802.13.4 ZigBee or LoRa
- Experience testing RF devices including BER /sensitivity measurements, transmit power/spectral mask measurements, and basic antenna pattern testing
- Experience in lab and production test automation
- Strong programming skills in C, C++, Python. Labview / Test-stand experience desired
- Design and create lab test systems in conjunction with HW, SW, and QA teams
- Design and create production test systems in conjunction with manufacturing operations teams
- Measure and debug radio protocol transactions. Capture and debug of protocol transactions as necessary
Academic and Professional Requirements
- Bachelor’s degree electrical engineering, with a master’s desired
- The position requires travel approximately 15% percent of the time – for engineering and customer field trials
- Authorization to work in the United States required | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232255944.3/warc/CC-MAIN-20190520121941-20190520143941-00222.warc.gz | CC-MAIN-2019-22 | 2,663 | 15 |
http://www.peppler.org/archive/sybperl-l/2000/9/6038.html | code | Up Prev Next
From: umesh at DBNA dot COM
Subject: Help with SQL Server 7 and datetime
Date: Sep 18 2000 3:05PM
I am in the process of upgrading from SQL server 6.5 to 7 and run into
a problem with datetime columns after upgrading my database. If I
"select" a column containing today's date, I get the date as "Jan 1
1900". The result is correct if I use the convert function.
This tells me that while the server has the right date, the
isql/sybperl programs are interpreting data incorrectly. Is there any
way to avoid the problem without changing the code on the client side? | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746386.1/warc/CC-MAIN-20181120110505-20181120132505-00450.warc.gz | CC-MAIN-2018-47 | 576 | 11 |
https://sourceforge.net/directory/natlanguage:italian/developmentstatus:planning/audience:sysadmins/ | code | The project is to develop an application for the general management of virtual networks with Dynamips, VirtualBox, PixEmulator, UML, Zebra, etc.
FAST OpenVPNGui is a grafical user interface written for OpenVPN Server and client. It allow fast administration of openvpn script. It can start as application or system service replacement for openvpn service wrapper.
CMSformE is a Content Management System devoted to being of the best quality and filled to the brim with features, while still maintaining a high level of speed.
2tools is a set of online CMS maintenance tools: just one click to migrate to/from different CMS; safe configuration settings to upgrade your CMS; easy Data movement to/from DBMS, databases or tables; SQL, XML, XSLT, PHP technologies. All tools are main
C.H.A.O.S. is a Linux distro made for clusters.
C.H.A.O.S. Linux is a distribution based on the Arch Linux operating system. It's a cluster oriented OS that does not providea graphical environment. Being based on standard Arch releases, this distro supports both i686 and x86_64 architectures. C.H.A.O.S. was created with a fixed main purpose: let admins get their cluster running in almost no time; despite having to manually install it on every node, the built-in textual installer will automate most of the process. More informations at official website, or extensive review at: http://linux.softpedia.com/get/Linux-Distributions/C-H-A-O-S-Linux-103444.shtml
An open source client to manage cloud hosting resources at Gandi.Net via the public API. Written in C++ with Qt4. Multi-language and cross-platform. Runs on Linux, MacOS X, and Windows.
Starting from an open archive content repository to an e-learning platform, backo provides an integrated web environment for organizations to manage the entire life cycle of knowledge creation, publication and dissemination.
BeRDP is a project dedicated to bringing the RDP protocol to the BeOS platform utilizing the rdesktop project.
An open source Web Portal Framework / Content Management System application written in ASP.NET / C# for the Windows OS platform and Linux MONO.
Djerba is an e-tourism extensible platform
Newsmap is a fully-customizable CMS that provides news by email and by web pages,basing on the specific interests, priorities and visiting recurrence of every single user. Mantained by a Student association of the CS University of Milan at www.dsy.it
The goal of this project is to create a collection of services to manage company's comunications. As e-mail, address book, chat, scheduling.
A revolutionary online multiplayer strategy game like Ogame, but with medieval fantasy environment. Powered with AJAX technology.
A client/server application to create a central repository for file names based to hash fingerprint of file.
FastFreeTextSearchFiles (fastfreetextsea) is a external, internal hard disk, USB flash pen, file indexer for Fast Free Text Search.
FindTheMind is a web application written in PHP intended to manage archiving of Magazine articles for future querying. It's not intended to be a repository of the articles themselves but rather a search engine to help find out a specific Magazine issue.
FlashNuke is a brand new CMS (Content Management System) based on Adobe Flash front-end built with Flex Framework. It supports skinning and plug-ins without recompiling. Supports accessibility too
IBEGLab Wiki è una raccolta di documentazione informatica
IPHurra is a web-based IP Address tracking and management system
Index Server Registry Authority - ubiquitous address validation for public access terminals. Point of query, verification/deny for Host-path.
Iptables Log Web is a simple Iptables log viewer based on a simple and light web interface written in PHP. It is possible to see statistics and make queries. It requires Ulogd and MySQL.
JB21 is a website admin tool, it has a built in file manager plus many other features, all in one easy to use location, Supporting all OS platforms you only need a webserver with PHP5.
JBoss Administration Console. Administration of JBoss App Serv will become easier. It will allow such functionality as deploying/undeploying applications. User friendly configuration of many JBoss components (e.g. Logging, Mail, JNDI, etc).
tool java to administer different distributions of database through dynamic interfaces, this tool allows insert, delete and update operations | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889617.56/warc/CC-MAIN-20180120122736-20180120142736-00741.warc.gz | CC-MAIN-2018-05 | 4,385 | 25 |
https://forum.level1techs.com/t/hw-monitor-confusing-temps/15101 | code | Can anyone tell me what "Temperature package" represents? I also get really confusing readings from this program and Speedfan. Speedfan shows my CPU sitting around 26c idle and 42ish under load, and goes red at 42c.
But in HW Monitor this "Temperature package" temp showed upwards of 100+c during Prime95 stress test.
I can fix almost any hardware issue but when it comes to software I have serious problems believing these readings. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662577259.70/warc/CC-MAIN-20220524203438-20220524233438-00676.warc.gz | CC-MAIN-2022-21 | 433 | 3 |
http://www.coderanch.com/t/569363/HTML-CSS-JavaScript/Infinite-Lazy-Loading-Image-Arrangement | code | File APIs for Java Developers
Manipulate DOC, XLS, PPT, PDF and many others from your application.
A friendly place for programming greenhorns!
Big Moose Saloon
Register / Login
Infinite Lazy Loading and Image Arrangement in YUI
Joined: Aug 01, 2005
Mar 05, 2012 00:12:57
We intend to use something similar to the Structure of www.pinterest.com
I need infinite lazy-loading along with horizonatal alignment.
Since we are using Liferay - we are expected to use either Icefaces or YUI.
anyone know of any such framework which abstracts the requirements above.
I agree. Here's the link:
subject: Infinite Lazy Loading and Image Arrangement in YUI
YUI listener problem
EJB lazy loading
How to visit lazy-loaded member outside Session scope?
Rich UI using J2ee
All times are in JavaRanch time: GMT-6 in summer, GMT-7 in winter
| Powered by
Copyright © 1998-2015 | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398456975.30/warc/CC-MAIN-20151124205416-00271-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 857 | 21 |
https://payforessaypapers.com/2021/06/15/write-an-app_ii/ | code | Let us start essays on nature vs nurture building an app. ensure every change you make on your website reflects instantly and automatically on your mobile app. read, write, and 7 problem solving tools edit from any computer college writing assignments any time. read tutorials, posts, and write an app insights from top rails energy conservation essay app experts sample business plan for fitness center and developers for free. in 2021, many app developers still see their app store page as the only channel literary essay peer edit to market their apps. build an entire rails application in just a single file that can be embedded in write an app other web pages or used to implement a microservice. real-time website-app sync sync your website write an app with your app in real-time. step 4: exercise – writing a uwp app 15 min. they offer graphical user interface coding, either the act of writing or customer writing the knowledge of how to write an argument research paper it, might hold you back from making an app, but these 10 app-building platforms get around that get the input of your title of a research paper marketing team as well. | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154127.53/warc/CC-MAIN-20210731234924-20210801024924-00362.warc.gz | CC-MAIN-2021-31 | 1,149 | 1 |
https://docs.netgate.com/pfsense/en/latest/menuguide/diagnostics.html | code | Items under the Diagnostics menu perform various diagnostic and administrative tasks.
- ARP Table
Displays a list of devices as seen locally by the firewall. The list includes an IP address, MAC address, Hostname, the Interface where the device was seen, and other related information.
See ARP Table.
Tests authentication to a defined RADIUS or LDAP server.
- Backup & Restore
Backup and restore configuration files.
See Backup and Recovery.
- Command Prompt
Execute shell commands or PHP code, and upload/download files to/from the firewall.
Use with caution
See Command Prompt.
- DNS Lookup
Executes a DNS lookup to resolve hostnames for diagnostic purposes, and to test connectivity to DNS servers.
See DNS Lookup.
- Edit File
Edit a file on the firewall filesystem.
- Factory defaults
Resets the configuration back to default. Be aware, however, that this does not alter the filesystem or uninstall package files; it only changes configuration settings.
- GEOM Mirrors
If the firewall contains a GEOM disk mirror, this page shows the status of the mirror and provides controls for managing the mirror.
- Halt system
Shuts down the firewall and turns off the power where possible.
- Limiter Info
Shows the status of any Limiters and the traffic flowing inside them.
- NDP Table
Shows a list of local IPv6 devices as seen by the firewall. The list includes an IPv6 address, MAC address, hostname (if known to the firewall), and the interface.
See NDP Table.
- Packet Capture
Perform a packet capture to inspect traffic, and then view or download the results.
See Packet Capture GUI.
Displays statistics about the packet filter, including general traffic rates, connection rates, state table info, and various other counters.
Displays a list of the top active connections by a selectable metric such as bytes, rate, age, etc.
Sends ICMP echo requests to a given IP address, sent via a chosen interface.
See Ping Host.
Reboots the firewall. This can take several minute to complete, depending on the hardware and enabled features.
Shows the contents of the routing table.
See Route Table Contents.
- SMART Status
Displays diagnostic information about disk drives, if supported by the hardware. Can also run drive tests.
Displays a list of processes on the firewall that are bound to network ports, listening for connections or making connections outbound from the firewall itself.
Shows the currently active firewall states.
- States Summary
Displays information about the state table, to see activity summarized by IP address.
- System Activity
Shows memory usage and a list of active processes and system threads on the firewall, the output is from
Displays and edits the contents of various firewall tables and aliases.
- Test Port
Performs a simple TCP connection test from the firewall to determine if a remote host is accepting connections on a specified port.
See Testing a TCP Port.
Trace the route taken by packets between this firewall and a remote system. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474852.83/warc/CC-MAIN-20240229170737-20240229200737-00175.warc.gz | CC-MAIN-2024-10 | 2,966 | 51 |
https://www.techrepublic.com/forums/discussions/malfunctioning-tab-key/ | code | Malfunctioning tab key.Locked
I have a user that is having a weird problem with their tab key. When she works in programs she can tab between fields. Then, all of a sudden, the tab key acts like the alt key is depressed and will start switching between open programs. If there isonly one program open, pressing the tab key switches to nothing and then back. The problem can be cleared and the tab key returned to normal by physically holding the alt key while pressing the tab key.
The problem is not specific to one program.It will manifest in any program she works with.
I have updated the OS (win98se) and replaced the keyboard. The system doesn’t have any anti-virus software but I’ve looked at the startup proccess and the \run\, \runservices\ keys in the registry and didn’t spot anything out of the ordinary.
Has anyone ever encounterd this problem before? If so, how did you correct it?
P.S. I know this is minor problem, but the user refuses to work on this computer until the error is corrected. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00421.warc.gz | CC-MAIN-2022-33 | 1,011 | 6 |
https://grouvytoday.com/google-home-review-google-assistant-in-the-home/ | code | Google have released a small yet powerful competitor to the likes of Amazons Echo in the form of the Google Home. The Home presents a promising view for the future of AI technology, but it is still lacking in some key areas. Join us as we unpack this latest entrant to the Google Ecosystem and find out whether or not Google have a hit on their hands.
DroidsUnpacked was established in 2016 to offer consumers a hands on look into the Australian Technology scene. Our aim is to provide content produced locally, in order to give our viewers insight into Australia’s position in the World of Technology, and where it is heading. Join us as we dive head first into the often confusing, yet amazing world of all things Tech, and try and provide the best local advice on where to spend your Dollary-doos!
Chipper Doodle – Electronic Light by Kevin MacLeod is licensed under a Creative Commons Attribution license ( | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886104560.59/warc/CC-MAIN-20170818024629-20170818044629-00483.warc.gz | CC-MAIN-2017-34 | 914 | 3 |
https://www.colegagnondesign.com/portfolio/arcane-plane/ | code | My Roles: Designer, Artist, Programmer, QA, Producer, Judge, Jury, Executioner
Arcane Plane is a short 2D puzzle-platformer that I created as a solo project for my Intro to Game Design class over about three months. The player, a young wizard trap ped in a magical chaos dimension, explores mysterious portals and collects magical abilities to help them solve puzzles, defeat enemies, and ultimately find their way back home. My main design goals were to blend combat and puzzle challenges into a seamless experience, and to allow the player a high degree of freedom with a customizable moveset and open-ended level and puzzle design.
Level Design Process
Arcane Plane is a semilinear game. As the player progresses, they gain access to new levels in the hub world, and they have some freedom to choose which levels to play. Note the numbered gates which open only after the player has gone through that number of levels, and obstacles such as the bottomless pit under Level 4 that require specific spell abilities to bypass.
Level 2 is a combat-oriented level that introduces two new enemy types and one new offensive spell– a lot to teach in such a small space! The enemies are arranged to present a challenge, but still allow the player a substantial degree of safety to observe their behavior before fighting them.
Level 4 introduces a new spell called Gravity Lock, which briefly locks the vertical position of everything on screen, then challenges the player to solve puzzles using it. They float over wide gaps, fit through passages of dangerous void blocks, and move a push block over a bottomless pit. Every obstacle in this level is an opportunity for the player to learn about their new spell ability. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816734.69/warc/CC-MAIN-20240413114018-20240413144018-00781.warc.gz | CC-MAIN-2024-18 | 1,714 | 6 |
https://www.coursehero.com/tutors-problems/Statistics-and-Probability/11637289-9-Alice-takes-4-white-2-red-and-3-blue-shirts-on-a-trip-On-the-fi/ | code | (9) Alice takes 4 white, 2 red, and 3 blue shirts on a trip. On the first day Alice will pick a shirt at random. What is the probability that she picks a red shirt?
(10) In a study of brand recognition, 984 consumers knew of Microsoft, and 19 did not. Use these results to estimate the probability that a randomly selected consumer will recognize Microsoft.
prob = ______________ (report as a decimal accurate to 3 decimal places)
(11) A poll showed that 67.3% of Americans say they believe that life exists elsewhere in the galaxy. What is the probability of randomly selecting someone who does not believe that life exists elsewhere in the galaxy?
prob = _________________ ( report as a decimal accurate to 3 decimal places)
(13) Armando buys a bag of cookies that contains 5 chocolate chip cookies, 5 peanut butter cookies, 7 sugar cookies, and 6 oatmeal raisin cookies. What is the probability that Armando randomly selects a peanut butter cookie from the bag, eats it, then randomly selects another peanut butter cookie? Express as a reduced fraction. | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593378.85/warc/CC-MAIN-20180722155052-20180722175052-00216.warc.gz | CC-MAIN-2018-30 | 1,056 | 6 |
https://wordpress.org/plugins/jigoshop-smart-send-shipping/installation/ | code | Jigoshop Smart Send Shipping
The Jigoshop Smart Send shipping plugin integrates Australian shipping cost calculations for 'Smart Send' online shipping.
- Upload the folder 'jigoshop-smartsend' to the '/wp-content/plugins/' directory
- Activate the plugin through the 'Plugins' menu in WordPress
- Under Jigoshop -> Settings -> Shipping, find the Smart Send section and fill out the required fields. You will need a Smart Send VIP account.
Requires: 3.4 or higher
Compatible up to: 3.5.2
Last Updated: 2013-1-24
Less than 10
Got something to say? Need help? | s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988048.90/warc/CC-MAIN-20150728002308-00082-ip-10-236-191-2.ec2.internal.warc.gz | CC-MAIN-2015-32 | 556 | 10 |
http://icraigt.com/2013/02/10/just-a-little-test/ | code | I’m just trying out the WordPress app on Android. It seems very well featured and, assuming this post shows up, does what I need it to (write and publish blog posts).
Clearly it’s early days but so far so good.
Craig Thornton (@icraigt), Geek Dad, husband of @linsthornton, Principal Engineer at JLR, tech addict. All views my own. | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573011.59/warc/CC-MAIN-20190917020816-20190917042816-00465.warc.gz | CC-MAIN-2019-39 | 335 | 3 |
https://community.tableau.com/thread/280910 | code | Cascade Filter function is wanted but will be available on 2018.3 or later only.
Here is a link to learn the way of "reset filter " even though it's quite troublesome.
"Enable Auto Update"
Thanks I'll take a look.
What auto update?
Is that available at the filter level? | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530253.25/warc/CC-MAIN-20190421060341-20190421082341-00532.warc.gz | CC-MAIN-2019-18 | 270 | 6 |
https://el.khanacademy.org/math/cc-eighth-grade-math/cc-8th-numbers-operations/cc-8th-scientific-notation/v/scientific-notation | code | Scientific notation examples
Scientific notation is a way of writing very large or very small numbers. A number is written in scientific notation when a number between 1 and 10 is multiplied by a power of 10. For example, 650,000,000 can be written in scientific notation as 6.5 ✕ 10^8. Δημιουργήθηκε από Σαλ Καν και CK-12 Foundation.
Θέλετε να συμμετάσχετε σε μια συζήτηση;
Μπορείς να διαβάσεις στα Αγγλικά; Κάνε κλικ εδώ για να δείτε περισσότερες συζητήσεις που συμβαίνουν στην αγγλική ιστοσελίδα της Khan Academy.
Δεν υπάρχουν αναρτήσεις ακόμα.
There are two whole Khan Academy videos on what scientific notation is, why we even worry about it. And it also goes through a few examples. And what I want to do in this video is just use a ck12.org Algebra I book to do some more scientific notation examples. So let's take some things that are written in scientific notation. Just as a reminder, scientific notation is useful because it allows us to write really large, or really small numbers, in ways that are easy for our brains to, one, write down, and two, understand. So let's write down some numbers. So let's say I have 3.102 times 10 to the second. And I want to write it as just a numerical value. It's in scientific notation already. It's written as a product with a power of 10. So how do I write this? It's just a numeral. Well, there's a slow way and the fast way. The slow way is to say, well, this is the same thing as 3.102 times 100, which means if you multiplied 3.102 times 100, it'll be 3, 1, 0, 2, with two 0's behind it. And then we have 1, 2, 3 numbers behind the decimal point, and that'd be the right answer. This is equal to 310.2. Now, a faster way to do this is just to say, well, look, right now I have only the 3 in front of the decimal point. When I take something times 10 to the second power, I'm essentially shifting the decimal point 2 to the right. So 3.102 times 10 to the second power is the same thing as-- if I shift the decimal point 1, and then 2, because this is 10 to the second power-- it's same thing as 310.2. So this might be a faster way of doing it. Every time you multiply it by 10, you shift the decimal to the right by 1. Let's do another example. Let's say I had 7.4 times 10 to the fourth. Well, let's just do this the fast way. Let's shift the decimal 4 to the right. So 7.4 times 10 to the fourth. Times 10 to the 1, you're going to get 74. Then times 10 to the second, you're going to get 740. We're going to have to add a 0 there, because we have to shift the decimal again. 10 to the third, you're going to have 7,400. And then 10 to the fourth, you're going to have 74,000. Notice, I just took this decimal and went 1, 2, 3, 4 spaces. So this is equal to 74,000. And when I had 74, and I had to shift the decimal 1 more to the right, I had to throw in a 0 here. I'm multiplying it by 10. Another way to think about it is, I need 10 spaces between the leading digit and the decimal. So right here, I only have 1 space. I'll need 4 spaces, So, 1, 2, 3, 4. Let's do a few more examples, because I think the more examples, the more you'll get what's going on. So I have 1.75 times 10 to the negative 3. This is in scientific notation, and I want to just write the numerical value of this. So when you take something to the negative times 10 to the negative power, you shift the decimal to the left. So this is 1.75. So if you do it times 10 to the negative 1 power, you'll go 1 to the left. But if you do times 10 to the negative 2 power, you'll go 2 to the left. And you'd have to put a 0 here. And if you do times 10 to the negative 3, you'd go 3 to the left, and you would have to add another 0. So you take this decimal and go 1, 2, 3 to the left. So our answer would be 0.00175 is the same thing as 1.75 times 10 to the negative 3. And another way to check that you got the right answer is if you have a 1 right here, if you count the 1, 1 including the 0's to the right of the decimal should be the same as the negative exponent here. So you have 1, 2, 3 numbers behind the decimal. That's the same thing as to the negative 3 power. You're doing 1,000th, so this is 1,000th right there. Let's do another example. Actually let's mix it up. Let's start with something that's written as a numeral and then write it in scientific notation. So let's say I have 120,000. So that's just its numerical value, and I want to write it in scientific notation. So this I can write as-- I take the leading digit-- 1.2 times 10 to the-- and I just count how many digits there are behind the leading digit. 1, 2, 3, 4, 5. So 1.2 times 10 to the fifth. And if you want to internalize why that makes sense, 10 to the fifth is 10,000. So 1.2-- 10 to the fifth is 100,000. So it's 1.2 times-- 1, 1, 2, 3, 4, 5. You have five 0's. That's 10 to the fifth. So 1.2 times 100,000 is going to be a 120,000. It's going to be 1 and 1/5 times 100,000, so 120. So hopefully that's sinking in. So let's do another one. Let's say the numerical value is 1,765,244. I want to write this in scientific notation, so I take the leading digit, 1, put a decimal sign. Everything else goes behind the decimal. 7, 6, 5, 2, 4, 4. And then you count how many digits there were between the leading digit, and I guess, you could imagine, the first decimal sign. Because you could have numbers that keep going over here. So between the leading digit and the decimal sign. And you have 1, 2, 3, 4, 5, 6 digits. So this is times 10 to the sixth. And 10 to the sixth is just 1 million. So it's 1.765244 times 1 million, which makes sense. Roughly 1.7 times million is roughly 1.7 million. This is a little bit more than 1.7 million, so it makes sense. Let's do another one. How do I write 12 in scientific notation? Same drill. It's equal to 1.2 times-- well, we only have 1 digit between the 1 and the decimal spot, or the decimal point. So it's 1.2 times 10 to the first power, or 1.2 times 10, which is definitely equal to 12. Let's do a couple of examples where we're taking 10 to a negative power. So let's say we had 0.00281, and we want to write this in scientific notation. So what you do, is you just have to think, well, how many digits are there to include the leading numeral in the value? So what I mean there is count, 1, 2, 3. So what we want to do is we move the decimal 1, 2, 3 spaces. So one way you could think about it is, you can multiply. To move the decimal to the right 3 spaces, you would multiply it by 10 to the third. But if you're multiplying something by 10 to the third, you're changing its values. So we also have to multiply by 10 to the negative 3. Only this way will you not change the value, right? If I multiply by 10 to the 3, times 10 to the negative 2-- 3 minus 3 is 0-- this is just like multiplying it by 1. So what is this going to equal? If I take the decimal and I move it 3 spaces to the right, this part right here is going to be equal to 2.81. And then we're left with this one, times 10 to the negative 3. Now, a very quick way to do it is just to say, look, let me count-- including the leading numeral-- how many spaces I have behind the decimal. 1, 2, 3. So it's going to be 2.81 times 10 to the negative 1, 2, 3 power. Let's do one more like that. Let me actually scroll up here. Let's do one more like that. Let's say I have 1, 2, 3, 4, 5, 6-- how many 0's do I have in this problem? Well, I'll just make up something. 0, 2, 7. And you wanted to write that in scientific notation. Well, you count all the digits up to the 2, behind the decimal. So 1, 2, 3, 4, 5, 6, 7, 8. So this is going to be 2.7 times 10 to the negative 8 power. Now let's do another one, where we start with the scientific notation value and we want to go to the numeric value. Just to mix things up. So let's say you have 2.9 times 10 to the negative fifth. So one way to think about is, this leading numeral, plus all 0's to the left of the decimal spot, is going to be five digits. So you have a 2 and a 9, and then you're going to have 4 more 0's. 1, 2, 3, 4. And then you're going to have your decimal. And how did I know 4 0's? Because I'm counting,, this is 1, 2, 3, 4, 5 spaces behind the decimal, including the leading numeral. And so it's 0.000029. And just to verify, do the other technique. How do I write this in scientific notation? I count all of the digits, all of the leading 0's behind the decimal, including the leading non-zero numeral. So I have 1, 2, 3, 4, 5 digits. So it's 10 to the negative 5. And so it'll be 2.9 times 10 to the negative 5. And once again, this isn't just some type of black magic here. This actually makes a lot of sense. If I wanted to get this number to 2.9, what I would have to do is move the decimal over 1, 2, 3, 4, 5 spots, like that. And to get the decimal to move over the right by 5 spots-- let's just say with 0, 0, 0, 0, 2, 9. If I multiply it by 10 to the fifth, I'm also going to have to multiply it by 10 to the negative 5. So I don't want to change the number. This right here is just multiplying something by 1. 10 to the fifth times 10 to the negative 5 is 1. So this right here is essentially going to move the decimal 5 to the right. 1, 2, 3, 4, 5. So this will be 2.5, and then we're going to be left with times 10 to the negative 5. Anyway, hopefully, you found that scientific notation drill useful. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649439.65/warc/CC-MAIN-20230604025306-20230604055306-00313.warc.gz | CC-MAIN-2023-23 | 9,500 | 6 |
http://www.linuxant.com/pipermail/hsflinux/2011q3/002499.html | code | [hsflinux] Problem using cnxtinstall.run with Debian Linux ForConexant HSF 56K Data/Fax Modem
chris at cvine.freeserve.co.uk
Fri Aug 12 12:02:50 EDT 2011
On Fri, 12 Aug 2011 10:29:50 -0400
"John A. Hart" <Jhart at customstaffing.com> wrote:
> Thanks again for the patch.
> Turns out that it was unnecessary.
> My Debian box needed the Build-Essentials package installed.
> Once that was installed, I was able to reinstall the
> linux-headers-2.6.32-5-686 package, the unzip package and the
> linuxant cnxtinstall.run package for the hsfmodem_7.80.02.06 without
> a hitch.
Debian stable is a long way behind the curve, so if you don't want to
patch the hsf driver it is probably a good choice if it really does
still use kernel 2.6.32. Of course, at some point debian stable will
move beyond 2.6.35.
More information about the hsflinux | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867050.73/warc/CC-MAIN-20180624180240-20180624200240-00233.warc.gz | CC-MAIN-2018-26 | 834 | 17 |
http://www.usaunitedsocceracademy.com/tryouts.htm | code | The requested webpage was not found. The webpage may no longer exist or may have been relocated or renamed.
Please make a new webpage selection from the navigation menu.
If necessary please contact the website webmaster listed within the Contacts webpage. Or please continue to explore the website utilizing the navigation menu. | s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394023864525/warc/CC-MAIN-20140305125104-00072-ip-10-183-142-35.ec2.internal.warc.gz | CC-MAIN-2014-10 | 328 | 3 |
http://it.afs.org/google-apps/what-is-google-apps/google-apps | code | So what about Google Apps in AFS? Which version do we use, how many user accounts do we have and what work has the IT Team done to integrate Google Apps into other AFS tools?
There are many different versions of Google Apps available, such as Standard, Educational, Non-Profit and Government.
In AFS we could have taken the Non-Profit version as we are a charitable organization. However, AFS International is a registered educational organization and this opened our horizons to the Educational edition, which we chose due to its more advanced feature set.
There is no theoretical limit to the number of user accounts that Google Apps can hold. Instead we request them from Google and they recently expanded our quota 29,000, with the potential to expand this number again with the agreement of Google. This means that AFS now has the basic tools to open access to board member and volunteers around the world, giving them their very own @afs.org email address and access to all of the tools contained within the suit.
Administration and AFS Global
The IT Team has worked hard to tie the administration of Google Apps into AFS Global, simplifying the account creation and deletion process and giving staff a single point through which to monitor account statistics.
These include the Google Apps Administration tab in the Person Record: | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123530.18/warc/CC-MAIN-20170423031203-00399-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,337 | 7 |
https://support.itead.cc/support/discussions/topics/11000011929/page/14?url_locale= | code | After Successful pairing and Renaming the device it does not connect to wifi and Green light keeps blinking, tried to delete and repair but no luck.
One device is connecting and another - Does not.... :(
Steve Christie: I reverted to tablet when my phone would simply not pair. I ahev never had a problem with my tablet connecting to the internet. I have a 4G sim + a fibre optic 50 mbps connection and a 100 mbps cable modem connection in my house. Bothe the internet connections are connected to 1200AC dual band routers.
I have no problem with the internet connection in the house, the problem was how many items could be connect to the router at a time. Most normal ac1200 type routers can only connect about a dozen devices at a time. My android tablets would connect, but they are a bit slow to change networks when they lose a network. The switches don't seem to tell them to revert back to the main network once the settings have been updated. So the tablets (my ones at least) didn't immediately notice that the local network the switch had been broadcasting was gone.
Much like a laptop, if you watch the network indicator on your laptop and turn your router off, it could be over a min before the network indicator shows the network missing. Phones seem to notice that quicker, probably because they are mobile and more used to changing networks.
I've also had the switches take 10 mins to work after they have been programmed. Normally they get programmed and work fine in a few seconds whilst you have the app open. But i have had occasions when they don't seem to connect, only to suddenly start working 10 mins later.
I have 3 phase power supply in my house. I have 3 POW-R2 devices connected to monitor the voltage AND to ensure that all the 3 phases are working. The 2 networks are connected to 2 different phases. PON & Modems are powered by different phases so I can always restart the supply to either since the Sonoff switches are connected to the other network.
Now what I find most strange is that if I have the Lan option switched on and the phone or my tablet connected to the Lan other than the switch I want to control then the command via the Internet takes a long time to have effect or does not work at all. . If the Lan option is off then it is fast. If the switch I want to control is connected to the same Lan as my phone or tablet the response is ULTRA FAST.
That is why I have repeatedly requested ITEAD people to make visible the SSID to which the switch is connected or its local IP address. Then I can very quickly switch the Lan my phone or tablet is connected to and get ultra fast switching response.
BTW as I had mentioned earlier I had to add a Zyxel travel router in the network to limit the number of switches connected to each router.
I've had similar problems changing from my D-Link router to a Huawei DG8041W.
All, yes all my non Sonoff devices connected to the new router once I changed the SSID and Password to that of my old router. They include several phones, Android and IOS, tablets, ipads, cameras, Google Home Mini, Amazon Echo, Laptop, IR transmitter (also ESP based as are the Sonoffs), Chromecasts and Firesticks.
So really why do Sonoff devices not do it too - This really must be sorted out before they can be recommended (I do like them though).
Anyway, mine wouldn't work even after deleting them properly from the old router (it still worked) and trying to reconnect them to the new router with the original SSID/Password. I've been struggling for 3 days so I can't remember what the symptoms were exactly.
Next step was to set up a second "guest" 2.5GHz wifi and connected my phone to that. I then started the process of pairing and it was working fine until I got part way through my devices when it started playing up and I couldn't pair any more. After a lot of effort I found that I could only get up to 7 devices (might have been 8, including my phone) connected and the next one would cause ALL devices already connected to go off-line. by keeping the numbers down I got all devices paired and sure enough, as I turned them on, all was good until number 8, whatever it was (I made sure it wasn't a particular device having a problem. If I had all the devices turned on and reset the router I could watch the Sonoffs connecting in turn until number 8 when all would fail. Turning some off would not let the remaining 7 reconnect without a router reboot. This may be something to do with the router!
So now, in addition to my original SSID/Password, which has all the well behaved devices on, I have 2 "guest" WIFIs with 5 devices on each. All seems well after a day of running. I daren't try to put them back on the original SSID in case it all kicks off again!
One other thing, when i enabled the first guest wifi the router started putting the Sonoffs onto a different IP subnet (?), namely 192.168.2.x, instead of 192.168.0.x where everything else is. I don't know if it mattered but I turned off the DHCP Secondary Address Pool to sort that out.
Hopefully Sonoff will put out new firmware to overcome all these issues but I won't hold my breath.
(8 x S26 sockets, 1 Bridge and 1 Dual switch board for my curtain closer)
Glad it was of some help mate.
Regards from sunny Suffolk UK.
I didn't know how low a number of devices you could have on some of these routers, i thought the limits were on traffic not devices, (They give you a hundred ip's). But i put a 5mp network camera up and my router started to struggle. It was only when i was looking on Amazon for an upgrade that i noticed that some of the manufactures are now stating how many devices their routers will connect to. Some of what you would think would be quite decent routers can only connect up to ten devices, so i can only assume if they are making a point of advertising ten devices, some others must be even less.
I bit the bullet and went with the Linksys WRT 32X. It was an expense, but so far in 3 odd months it hasn't skipped a beat. I don't know what the limit is on it, but i'm up to well over 50 at the moment all in including the 5mp camera.
I don't think there is a WiFi device limit for regular devices (not reached it yet, anyway), just the Sonoff devices.
I've always thought the routers you get from the ISP are a bit pants (I used to have a Netgear one but it's old now). Maybe one day I'll invest in a better one. I quite like the new Huawei one (from TalkTalk UK) as it lets me name each MAC address so I can tell what is connected at a glance.
If you look on Amazon now, a lot of the routers actually tell you how many devices can connect to it. Sometimes for routers that you would think were quite powerful, it can be as low as ten devices.
Now I must look into this router where I can actually name the device with each assigned MAC address to keep a track of which devices are connected. At the moment I am using "Wireless Network Watcher" from Nir Sopher to do this.
Last week when I have changed my router to TP-Link DECO X60 then I also face the same issue with sonoff POW. But yesterday I have fixed the issue. I have installed the old version of the eWeLink app then instead of using the SSID from DECO router, I have created a mobile hotspot on my old mobile and then they get paired successfully using quick pairing mode. Then I saw some firmware upgrade message and I immediately upgraded to the latest version. Then I am able to pair them with my original router.
Actually, I have turned off 5Ghz in the Deco App and then tried to pair Sonoff POW but it was not able to pair. My all other Sonoff basic, Mini, Pow R2, fan02 all were connected using the same router. Once I have upgraded the firmware then only I was able to connect POW with the DECO.
Just reconnect the original (old) wifi router, pair the device to it again, then delete it from the application (this will reset them to the factory settings) and then they will go to pair with the new wifi router. This solution has always worked for me. | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514121.8/warc/CC-MAIN-20210118030549-20210118060549-00720.warc.gz | CC-MAIN-2021-04 | 7,979 | 30 |
http://www.linuxquestions.org/questions/linux-networking-3/network-shortcuts-and-browsing-to-network-480082/ | code | Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
I'm not sure really if this is the proper location for this post.
It's network related sort of, but perhaps more related to the browsing to network locations.
I want to import my bookmarks usings lets say firefox bookmark manager, and I go to import, and I have shortcuts on my desktop to navigate to the smb shares, now in many distros I can simply select import, and then select the location and browse to desktop, then select my shortcut folder on the desktop and browse to my back up bookmarks on the server using smb shares, but in some distros it just says error, or something like error media/hda etc etc. And so I have to open the folder copy and paste my bookmarks to desktop, then use import manager and select that file from my local machine.
Also when the download manager comes up for downloading and I want to browse to the server location to save to ? server folder etc. I have this same problem. It won't browse to the server location using anything really nor the shortcuts to the server I have on my desktop?
So I'm wondering I guess why some distros can tackle this, and some cannot, I'm not sure why this happens, but it's been something I've not really been able to categories for support topic or a possible solution
Distribution: Mac OS X Leopard 10.6.2, Windows 2003 Server/Vista/7/XP/2000/NT/98, Ubuntux64, CentOS4.8/5.4
I don't see what the problem is. You just mount a samba share to somewhere like /mnt/windows. Then, just create a shortcut, or a softlink to the /mnt/windows. It will show up as if it was part or your LInux box. YOu can then just copy files directly from and to the /mnt/windows.
Well I can copy and paste files currently and smb shares are working as they should, however when using the download manager, or importing or exporting contacts, or bookmarks to or from the server, then the programs do not recognize the shortcut as a folder.
In other words I cannot navigate to the location of my saved files or bookmarks etc. in order to download to that location, or to import or export to a location within the shortcut
Example: shortcut to backupfiles on my desktop points to backup files on the server.
When opening that folder there is no problem, however when using downloads manager or saving a file from the net to a location on the server, the browser portion of the download manager does not open the shortcut folder, it seems to think it's just a file.
FYI i've since noticed that this is only true for shortcuts that point to a folder on the server that is a fat32 or ntfs drive
Anyhow I was not sure why or if there is a fix, but I was mainly curious as to what is the difference in some distros that do not have this problem and some that do. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125841.92/warc/CC-MAIN-20170423031205-00610-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 4,272 | 24 |
https://github.com/michaeltreat/Windows-Subsystem-For-Linux-Setup-Guide/blob/master/readmes/03_understanding_the_file_systems.md | code | Understanding the File Systems
NOTE: This page is undergoing an update and will change soon. - Mike Treat 2/14/19
Before we dive into how to use the Ubuntu App and WSL, lets talk about one of the most important things, which is knowing your File Systems
There are 2 files systems here:
- The Windows FS
- The Ubuntu FS.
It is very important to know which file system you are in.
- Open the Ubuntu app and type
pwd. Assuming you haven't changed anything yet, you'll notice that it says something like
/home/ means that you are in the Ubuntu FS.
cd ../../to bring you to the level above
/home/, then type
ls. This is the top-most level of the Ubuntu FS.
cd mnt/and then type
ls. You should see at least 1 directory, but possibly more. These directories are the names of your Windows Drives. Typically your hard drive is under letter
c, but this is where Ubuntu connects with your Windows FS.
cd <hard_drive_letter>, then
ls. This will now show you the top level of your hard drive. You may likely see some errors like
Cannot Read Symbolic Linkand
Permission denied. You can ignore these errors. Symbolic links are just shortcuts to files which Ubuntu cannot interpret, and keeping permissions as they are is highly recommended. You will likely never have a situation where you need to handle permissions between Windows and Ubuntu, as you will never need to edit or install any Windows system files with Ubuntu or vice versa.
You are actually in the Windows File System now as well! If you were to create a file here, you would be adding it to the Windows File System, and it would be a Windows file. This is important because one of the rules here is that while Ubuntu can read and write both Ubuntu and Windows files, Windows can only read and write Windows files, and read Ubuntu Files, but it cannot write Ubuntu files. Knowing which files belong to which FS is important because of this.
- Now type
pwdto bring you back to your root. Can you guess where it takes you? Back to your Ubuntu User's root. This is nice, but also kind of tedious since most of our work is going to be done on the Windows FS side, and typing cd
../../mnt/c/Users/<user>at the beginning of everything would get old fast. No worries though, the next section will show you a neat trick to make navigating between the two FS's much easier!
- Now that you are in your Ubuntu User's root, type
ls -ato show all hidden files. Notice that you have a
.profilefile. This is where your terminal's profile settings are stored. This is also an Ubuntu file because it is on the Ubuntu FS. You can't edit this file through Windows, or a Windows program or app, as it wouldn't work. You might see the changes show up in the file, but it will not be read correctly anymore.
In the off chance that you do need to edit a Ubuntu file then you should use the built in code editor called nano, or use the CLI to install a different one. Just remember that you cannot use a GUI here, so you must edit Ubuntu files through the command line.
Updating your Terminal
Click Next to update your Terminal's look and feel! | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669352.5/warc/CC-MAIN-20191117215823-20191118003823-00383.warc.gz | CC-MAIN-2019-47 | 3,070 | 30 |
https://enhancedketodiet.com/the-perfect-keto-muffin-recipe/ | code | The PERFECT KETO MUFFIN recipe
These BAKERY-STYLE KETO MUFFINS are big and beautiful, and absolutely delicious. Who knew that almond flour muffins could be this light and fluffy? Only 3.3g NET CARBS!
️ Printable Keto Muffin Recipe: https://alldayidreamaboutfood.com/keto-chocolate-chip-muffins/
The Ultimate Guide to Keto Baking: https://amzn.to/3BnIL2W
► SUBSCRIBE: https://www.youtube.com/c/AllDayIDreamAboutFood
► PRODUCTS USED
Good Sam Mini Chocolate Chips: http://l.thrv.me/ADIDAF4614goodsam-plate-chips-sugar-free
People’s Keto Chocolate Chips: https://amzn.to/3JoHgpc
Swerve Brown: https://amzn.to/3d2zhC0
Cookie Scoops: https://amzn.to/3zs5EBU
Parchment Muffin Liners: https://amzn.to/3zRIYw8
Disclaimer: product links may include affiliate links.
0:46 Whisk the wet ingredients
1:35 Add the sweetener
1:53 Add the dry ingredients
2:30 Mini Keto Chocolate Chips
3:11 Transfer to the muffin pan
4:12 Bake the muffins
4:23 Taste test
#ketomuffins #ketobreakfast #ketobaking
View original video by clicking here. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00144.warc.gz | CC-MAIN-2023-23 | 1,025 | 21 |
https://www.computing.net/answers/windows-xp/stack-overflow-line-864-and-6-only-happens-on-facebook/200484.html | code | |Defrag can't hurt but it won't help here.|
If it only happened a few days ago then try a restore point.
Not even sure what is running that is causing this error. http://support.microsoft.com/kb/145799
Worse comes to worse you may end up reloading it to OEM state. Get a good security suite on it and be sure to keep all MS updates on. Use a standard or limited user account at all times.
Hang up and live. | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281001.53/warc/CC-MAIN-20170116095121-00504-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 406 | 5 |
https://medium.com/highrisehq/slack-44e06b96bc31?ref=producthunt | code | We happen to use Slack very heavily as a team here at Highrise, and find ourselves constantly going back and forth between Slack and Highrise in our daily work. So we decided to build a quick integration to help save a few steps:
Once set up the integration will allow you to type the following commands in Slack:
Records previous conversation in that channel as a note associated with participating contacts in your connected Highrise account:
Of course this can be used internally with your team, but Slack can also be used for tracking chat conversations with leads or customers or candidates during recruiting. For anyone who communicates externally in Slack, you can now easily record that conversation to the contact in Highrise.
If you’re not communicating externally yet, but would like to, first you can set up Slack to allow potential leads to invite themselves to your account by using this plugin.
Then you can set up the Slack / Highrise integration by going to the Integrations tab in Highrise under My info — find more details here.
And if you want to see a video on the set up, our CEO, Nathan, put one together recently here.
But, that’s not all…
Adds a task in Highrise with the description you provide beyond ‘todo’. You can also specify !today, !tomorrow, !this-week, !next-week, or !later to bucket the task accordingly.
Lists up to 10 of the your Highrise tasks right in Slack, with a link back to Highrise if you need more. | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232259177.93/warc/CC-MAIN-20190526125236-20190526151236-00429.warc.gz | CC-MAIN-2019-22 | 1,458 | 10 |
http://www.kwintessential.co.uk/translators/cities/High%20Point/725 | code | Add your site here! Send an email to links @ kwintessential.co.uk
Translation service providers in or near High Point, North Carolina include:
|The Rose 3: Paurenfeindt's Wrath Cut longsword techniques
The 3rd video in our series on the Rose, in which there is an IMPORTANT INSIGHT for interpreters. 3 sequences from Andre Paurenfeindt, published 1531, from ...
|High Kick Girl - English Subtitled 2/9
PLEASE NOTE: I wrote these subs myself. My comprehension of Japanese is very low. To be perfectly honest, if I didn't understand a piece of dialogue at all I...
|dbdvrf #49 Debian Developer's Reference
http://packages.debian.org/sid/developers-reference - - is a good idea to send the document to the corresponding l10n mailing list, asking for a review. Once...
|3D to 4D shift
In physics and mathematics, the dimension of a space is roughly defined as the minimum number of coordinates needed to specify every point within it. For exa...
|Of Machines - Lost In Translation (lyrics)
Of Machines - Lost In TranslationLyrics to Lost In Translation :This is your way out of spaceA fool to fall for that lineFor those who hopedYou'd be everythi... | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395613.65/warc/CC-MAIN-20160624154955-00088-ip-10-164-35-72.ec2.internal.warc.gz | CC-MAIN-2016-26 | 1,146 | 12 |
https://bugzilla.mozilla.org/show_bug.cgi?id=733340 | code | Created attachment 603214 [details] history menu screenshot When I close or minimize last Firefox window but still have menu accessible (since I didn't close the app) icons for folders, saved searches, livemarks, default icons for unvisited livemark items, bookmarks and history placeholder icons (for unvisited sites or ones not providing own favicon) are all gone and associated text shifts left. Visited sites menu entries seem unaffected. Aurora 12.0a2 (2012-03-05) pl
I have seen this bug sometimes, it's some weird thing in the Mac native menubar implementation. All icons disappear with no appearent reason.
This is an ancient bug, going back at least to FF 2. And yes, it's assigned to me. But these days I generally only have time for much severer bugs, like topcrashers. So I don't know when I'll have time for it. | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948588251.76/warc/CC-MAIN-20171216143011-20171216165011-00429.warc.gz | CC-MAIN-2017-51 | 824 | 3 |
https://academicgurus.net/buy-essay-online-12575/ | code | Please read these two articles and then follow the instructions I posted in the images to write this essay. The two articles should be in the images. One is Economics focus is Santa a deadweight loss, the other one is Economics focus/ Chasing the dream.
Academicgurus.net is meant to assist students throughout their academic life by providing educational and sample writing materials. All products created by academicgurus.net are model assignments that can be used to prepare one’s own individual research. If customers opt to pass any of our products as their own, they do it at their own risk.
Payment & Security
+1 (940) 905-5542 | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303729.69/warc/CC-MAIN-20220122012907-20220122042907-00427.warc.gz | CC-MAIN-2022-05 | 636 | 4 |
https://mitpressbookstore.mit.edu/book/9780262048637 | code | A comprehensive introduction to automata theory that uses the novel approach of viewing automata as data structures.
This textbook presents automata theory from a fresh viewpoint inspired by its main modern application, program verification, where automata are viewed as data structures for the algorithmic manipulation of sets and relations. This novel “automata as data structures” paradigm makes holistic connections between automata theory and other areas of computer science not covered in traditional texts, linking the study of algorithms and data structures with that of the theory of formal languages and computability. Esparza and Blondin provide incisive overviews of core concepts along with illustrated examples and exercises that facilitate quick comprehension of rigorous material.
- Uses novel “automata as data structures” approach
- Algorithm approach ideal for programmers looking to broaden their skill set and researchers in automata theory and formal verification
- The first introduction to automata on infinite words that does not assume prior knowledge of finite automata
- Suitable for both undergraduate and graduate students
- Thorough, engaging presentation of concepts balances description, examples, and theoretical results
- Extensive illustrations, exercises, and solutions deepen comprehension
About the Author
Javier Esparza is Professor and Chair of Foundations of Software Reliability and Theoretical Computer Science at the Technical University of Munich and coauthor of Free Choice Petri Nets and Unfoldings: A Partial-Order Approach to Model Checking.
Michael Blondin is Associate Professor of Computer Science at the Université de Sherbrooke. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474674.35/warc/CC-MAIN-20240227085429-20240227115429-00148.warc.gz | CC-MAIN-2024-10 | 1,692 | 11 |
http://www.priroda.ru/yui/examples/connection/post.html | code | To construct a POST transaction using the Connection Manager, you will need to construct a data string as the POST message. The following code example provides a step-by-step approach to creating a simple POST transaction.
Load the YAHOO namespace and connection manager source file:
Construct an example of key-value string of username = anonymous and userid = 0:
Create a callback object to handle the response and pass an array of values to success and failure as the argument.
Call YAHOO.util.Connect.asyncRequest to send the request to post.php, and the PHP file will return the a readable output of $_POST via print_r(). The handleSuccess callback will print the response object's properties, including the server response data. | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178376006.87/warc/CC-MAIN-20210307013626-20210307043626-00341.warc.gz | CC-MAIN-2021-10 | 734 | 5 |
https://www.youtern.com/thesavvyintern/index.php/tag/learn-new-things/ | code | Promotions can be hard to come by. And they often take much longer than one would hope to actually happen.
So how do fast track a promotion?
As you work your way up the career ladder, you find yourself learning new skills and tasks regularly. So, why does it feel like some things are easier to learn than others?
It may not be what you learn, but how you learn it. Learning styles differ. It’s important to know how you learn best… | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514570830.42/warc/CC-MAIN-20190915072355-20190915094355-00416.warc.gz | CC-MAIN-2019-39 | 436 | 4 |
https://stanfordblack.com/2021/02/16/cloud-gcp-developer-world-class-fintech-greenfield-open-banking-gcp-buildout-2/ | code | A globally renowned Hedge Fund has a new opportunity for a Quant Python Developer to join their Core Quantitative Technology and Analytics Engineering team. This group focuses on complex computer science in their quest to foster highly efficient trading strategies, remaining at the top of the Systematic Investment space.
A world-class FinTech is looking for the top Cloud Developers in the city to lead a flagship project for one of the most highly funded projects and GCP buildouts in the city, underpinning an entirely new open banking platform. They are looking to completely challenge the status quo of off-prem financial platforms and lead the evolution of solving the most complex problems to date in an entirely cloud-native environment.
This is a massive strategic digitalisation project in one of the most agile outfits in London who are rapidly expanding their Hybrid Cloud Infrastructure platform, only using the latest technologies in the Cloud / GCP / Docker / Kubernetes space.
This is an opportunity to bring forward your technical expertise in a modernised Cloud environment to directly affect the crux of a strategic initiative for a market-leading FinTech giant in London. You will be able to bring forward innovative solutions to help them through this crucial phase of greenfield development and be part of an expert group of passionate Developers to work on mission-critical real-time applications.
- Strong background in Cloud / GCP / Docker / Kubernetes /Microservices / Terraform environment (5+ years).
- Strong fundamentals in Computer Science, Mathematics or Engineering related degrees.
- Passionate developer with an appetite for the advancement of technology to be at the core of strategic business initiatives.
- Drives agile and best practices and values clean and extremely well-tested code.
- Market leading compensation for permanent positions and competitive bonuses.
- Strong appreciation for work-life balance with an appreciation for culture-driven values.
- Flexible working – working from home.
- The opportunity to work for a global world-class FinTech with an incredibly passionate pool of Developers
For more information please contact [email protected] or call 0208 057 9260 | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153814.37/warc/CC-MAIN-20210729011903-20210729041903-00580.warc.gz | CC-MAIN-2021-31 | 2,236 | 13 |
https://www.learnnowonline.com/blogs/2012/08/16/developers-lets-talk-%24uccess | code | Developers, Let's talk $uccess
By Craig Jensen | August 16, 2012
It is plain common sense that a developer will succeed and advance in their career, and therefore benefit financially from their success, if they are known as an expert in the technology they work in. As a Visual Web Developer or Visual Studio Developer, would you do better in your career if you were average or if you were an expert?
Clearly, that is an easy answer... of course you will do better if you are known as an expert. Beyond being a so-called expert, what must you do in order to succeed, advance your career and make more money as a developer?
Learn the right technologies!
Would you do better if you were an expert in Fortran or Cobol? Or would you do better if you were an expert in Visual Studio, Visual C#, .NET, Microsoft SharePoint, SQL Server, mobile development or Java? In the short term you can't do them all, so it's very important to pick the right ones! Success lies in being an expert in the hottest technologies at the moment, so choose wisely and then use a proven method to learn the technology.
According to Dice.com, Java developers remain the most difficult tech pros to land, followed by mobile developers and .NET developers. Hiring managers and recruiters cite these positions 2-3 times more frequently than other skill sets in the employment marketplace! Given the above, I suggest becoming an expert in Java, Mobile Development or .NET programming. Once you've chosen a technology to become an expert in, the next step is finding the best materials to learn the technology.
At LearnNowOnline.com we build the highest quality video tutorials in the technologies you need and desire. We have Java Video tutorials, Mobile development video tutorials including development in iOS, Android and .NET and we have .NET programming video tutorials! In addition to our online video tutorials, you can add on sample code, full courseware and hands on labs to provide additional resources for your learning.
Happy Learning, Craig
Craig Jensen is the President and CEO of LearnNowOnline. Craig has led the company’s change from instructor-led classroom training, to self-study CD/DVD training, to the award winning online learning solutions offered today. Craig is passionate about helping individuals and businesses of all sizes solve their problems through practical learning and technology. He is involved in setting direction for the company, including selecting training content for development with resources to support all learning styles. He is also involved in The CEO Roundtable organization in the Twin Cities as well as the Minnesota High Tech organization. In his spare time, Craig loves to travel, golf, and partake in water sports of all kinds. | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964359976.94/warc/CC-MAIN-20211201083001-20211201113001-00044.warc.gz | CC-MAIN-2021-49 | 2,752 | 10 |
http://forum.xda-developers.com/showpost.php?p=53848936&postcount=1 | code | OP Junior Member
Join Date:Joined: Jul 2014
I am developing an app that uses the Galaxy line's Smart Pause feature to measure the duration of a pause initiated by Smart Pause when the user looks away. The galaxy tablets that do have it are a bit pricey. Does anyone know of an equivalent feature with the Nexus line or any other android tablet family? Thanks in advance. | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131298020.57/warc/CC-MAIN-20150323172138-00147-ip-10-168-14-71.ec2.internal.warc.gz | CC-MAIN-2015-14 | 370 | 3 |
http://www.sevenforums.com/tutorials/75127-partition-image-restore-hdd-ssd-6.html | code | There is a completely free version - works really well. Paragon Backup & Recovery (Advanced) Free Edition - Free Download
If you look under the settings tab - you can select the alignment type - choose Vista or later - that will give the 1024 alignment.
Install it on your HD - make an image - then from the installed version you already - restore the image to the SSD.
It is possible to restore a Paragon image to a smaller drive - but it takes a while.
Better to shrink the source partition before making the image. Seems you have already done that. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700107557/warc/CC-MAIN-20130516102827-00017-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 551 | 5 |
https://licandcountgo.tk/dam-mac-terminal.php | code | You can choose a command to run on startup; for example, start an alternate shell. Set Ask before closing to Always to prevent accidentally killing it, or set it to Never if you find that prompt annoying. If you check Only if there are processes other than the login shell and , Terminal will alert you before you quit the app.
This feature is useful if you accidentally click the wrong window element or press the wrong key sequence.
Do you like to have your Terminal windows arranged in a particular way and want to resume a session without having to rearrange and relaunch? The Window Groups feature will save you time and increase your productivity. Using it, each window can have its own process, attributes, and position on the desktop. For example, you might be editing a file with Vim in one window and running Octave in another.
And if one shell is busy in performing long tasks, you might want to run a command in another window. Type in a name, check Use window group when Terminal starts , and click Save. That way you can keep working on your current shell but open the group any time you need to run a specific set of tasks.
If there are other application windows, assign the window group to a separate desktop workspace to avoid distractions. The default login shell for macOS is the bash shell. Happy using the bash shell in Linux?
Or would you prefer to try out an alternative? There's tsch, fish, KornShell and Z Shell to choose from. But which of these Linux shells is best? Unix enthusiasts love to work with the zsh or Z shell because it offers many features on top of the bash shell and supports dozens of plugins. But you should know how to switch them when needed. Click the lock icon and enter your administrator credentials.
Then right-click your name from the list and choose Advanced Options.
In the dialog window that appears, change the option under Login shell. Next to Shells open with , select Command complete path and enter the path to your new shell in the field.
The default command line prompt shows you the same information every time you open the Terminal. There are many special character sequences that, when used to define the prompt, can reveal interesting bits of data. When you type in the following:. This is for MacOS and for regular bash in the Terminal. My Versions: Mac High Sierra; git version 2.
Note: You can download various Themes. This folder contains Theme for the terminal.
At this point, you have the Theme installed into your Terminal. We just need to make it a default Theme. From now on, your Terminal should like below.
Terminal has the built-in ability to theme your shell windows, but you'd never know it by customize-terminal-macos-change-text-color-profile. Simple Tricks to Improve the Terminal Appearance in Mac OS X. The next two lines enable command line colors, and define colors for the 'ls' command. Finally, we alias ls to Change ANSI colors in Terminal. Generally it's.
Step 2 — Install Powerline Powerline is a Python app and is a status line plugin for vim, and provides status lines and prompts for several other applications, including zsh, bash, tmux, IPython, Awesome and Qtile. It makes the Terminal prompt look like below. MacOS comes with Python installed already.
And open it again.
You can work around it by adding the following to your vimrc:. Apple does not want you to use command line options with GUI applications. By default most Linux distro displays hostname and current working directory. If your font is not listed in kitty list-fonts it means that it is not monospace. Feedback post: Moderator review and reinstatement processes. Some programs that run the shell allow you to set the window size and buffer essentially scrolling inside the limitations of the window. If the server is running FreeBSD, or another system that relies on termcap rather than terminfo, you will need to convert the terminfo file on your local machine by running on local machine with kitty :.
But I got some odd powerline-config file is missing! Unzip the fonts-master. Download ZIP.
We can make this file beautiful and searchable if this error is corrected: It looks like row should actually have 3 columns, instead of 4. This comment has been minimized. Sign in to view. Copy link Quote reply.
Really nice! Hi- Thank you so much.
I have a quick question. Please advice. Sign up for free to join this conversation on GitHub. Already have an account? | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655892516.24/warc/CC-MAIN-20200707111607-20200707141607-00345.warc.gz | CC-MAIN-2020-29 | 4,429 | 19 |
http://ldl.herokuapp.com/deep | code | Apparent age estimation has attracted more and more researchers since its potential applications in the real word. Apparent age estimation differs from chronological age estimation in that each facial image is labelled by multiple individuals, the mean age is the ground truth age and the uncertainty is introduced by the standard deviation. In this paper, Deep Age Distribution Learning (DADL) is proposed to solve this problem. According to the given mean age and standard deviation, we generate Gaussian age distribution for each facial image as the training target instead of the single age. Our DADL method first detects the facial region in image and aligns the facial image, then uses the deep Convolutional Neural Network(CNN) based on the VGGFace and fine-tuned on the age dataset to extract the predicted age distribution and finally it uses ensemble method to get the result. Our DADL method had a good performance in ChaLearn Looking at People 2016-Track 1:Age Estimation and ranked the 2nd place.
- Matlab, version 2014a and higher.
- Matcovnet, version 1.0-beta18 (http://www.vlfeat.org/matconvnet/).
- GPU driver, cuda-7.0 if nessesary.
Before train the deep network, we first preprocess the facial images. The three steps of the facial images pre-procession are shown as follows:
The face region of each image was detected by the face detector described in . Then the detected face was feed into a public available facial point detector software, i.e., , to detect five facial key points, including the left/right eye centers, nose tip and left/right mouth corners. Finally, based on these facial points, we employed face alignment for these facial images.
Once downloaded, unzip the compressed folder and you will see:
Copy and Replace the three files 'cnn_train.m', 'cnn_extract.m', 'evaluate.m' to the '<Matconvnet_Root>/examples/';
Copy the file 'vl_klloss.m' to the '<Matconvnet_Root>/matlab/';
Copy the file 'vl_simplenn.m' to the '<Matconvnet_Root>/matlab/simplenn/';
Once downloaded,Readme.txt will help you use our model for prediction.
This file including four trained models, competition pictures, related scripts and etc.
These scripts are used to extract features from the last full connected layer of corresponding models. Note that you have to use these scripts in '<Matconvnet_Root>/examples/'
After extracting features from models, you can get the last full connected layers feature from the traning images and the test images. They are named 'whole_data1', 'whole_data2', 'whole_data3' and 'whole_data4'. We provide the data in this folder and you can run Script 'enssemble.m' to get the final results.
R. Rothe, R. Timofte, and L. Gool. Dex: Deep expectation of apparent age from a single image. In Proceedings of the IEEE International Conference on Computer Vision Workshops, pages 10–15, 2015.
A. Vedaldi and K. Lenc. Matconvnet – convolutional neural networks for matlab. 2015
Y. Sun, X. Wang, and X. Tang. Deep convolutional network cascade for facial point detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 3476–3483, 2013 | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163326.85/warc/CC-MAIN-20180926041849-20180926062249-00054.warc.gz | CC-MAIN-2018-39 | 3,119 | 17 |
https://plugincafe.maxon.net/topic/8026/10429_get-all-shaders/2 | code | On 10/07/2014 at 11:34, xxxxxxxx wrote:
I am trying to get all of the shaders that are in a material.
This returns some of the shaders but not all of them. I am using it on an Octane material but that shouldn't make a difference. Drag and dropping my material into the timeline will show all of the shaders, basically I want that list.
Here is the code: Just a simple search down and next script. Any help would be great!
import c4d,sys from c4d import gui def main() : c4d.CallCommand(13957) def ShaderSearch(shader) : next = shader.GetNext() down = shader.GetDown() print shader.GetName() if down: ShaderSearch(down) if next: ShaderSearch(next) shader = doc.GetActiveMaterial().GetFirstShader() ShaderSearch(shader) c4d.EventAdd() if __name__=='__main__': main() | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511386.54/warc/CC-MAIN-20231004152134-20231004182134-00735.warc.gz | CC-MAIN-2023-40 | 764 | 5 |
https://bhi.fas.harvard.edu/event/bhi-colloquium-28 | code | Martin Lesourd (BHI, Harvard)
Title: How Do Black Holes Form ?
Abstract: Mathematical General Relativity is held together by a couple of deep conjectures. Many mathematicians like to think that by proving these (or finding counterexamples), they will finally be able to underpin (or challenge) the beliefs that Physicists and Astrophysicists have held for decades. Arguably the grandest such example is the ''Final State Conjecture'': generic vacuum spacetimes undergoing gravitational collapse will eventually resemble the Kerr solution in their exterior. At present, there is not a single example of this conjecture, nor a single vacuum spacetime with a complete future asymptotic region describing black hole formation. I will review what is known, and describe some work (still in progress) with Athanasiou in this direction.
Frederic Vincent (Paris Meudon Observatory)
Title: What can we infer from black hole images?
Abstract: The recent Event Horizon Telescope (EHT) millimeter image of the vicinity of the supermassive compact object M87* at the center of the galaxy M87 is a breakthrough. It is important to investigate what can and what cannot be inferred from such images. In this talk I will discuss a simple geometric model of the region of the accretion flow immediately surrounding M87*. I will use this model to discuss the highly-lensed features of EHT-like images, often loosely referred to as the "photon ring". I will discuss whether such features can be used as clean probes of the nature of the underlying spacetime. I will also discuss various EHT-like images of M87*, assuming this object is various kinds of compact alternatives to the standard black hole. This will allow discussing to what extent can EHT-like images help constrain the nature of the compact objects at the center of M87 or our Milky Way. | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587608.86/warc/CC-MAIN-20211024235512-20211025025512-00616.warc.gz | CC-MAIN-2021-43 | 1,831 | 6 |
https://discuss.pytorch.org/t/is-it-okay-to-match-the-ratio-of-labels-in-the-mini-batch-from-the-extremely-imbalanced-data/198872 | code | Hi, thank you for your effort in establishing PyTorch.
I have a general question about the sampling strategy in the DataLoader.
When I have a very imbalanced dataset with binary classes for the link prediction task, the basic sampler returns the randomly sampled cases while preserving the original ratio of classes.
(In detail, I have 138,015 edges with label 0 and 8,791 with label 1)
Before making the model training, I checked the ratio of labels in the mini-batch and found that most labels were set to 0. (i.e., [0,0,0,0,0,0,0,0] when batch_size=8)
Although I checked that there are several ways to solve this problem (e.g., WeightedRandomSampler in torch.utils.data, RandomUnderSampler in imblearn.under_sampling, …), I considered matching the ratio of pos(1) and neg(0) labels in each batch by randomly choosing the samples from the major class (i.e., [1,1,1,1,0,0,0,0] when batch_size=8).
But is it the right way to overcome the data imbalance?
As the general meaning of negative sampling in the graph is sampling the edges from the unconnected edges, I’m not sure how to deal with the minor class: is it okay to repeat it during iteration?
Yes, forcing each batch to contain the same number of negative samples as
positive samples is a perfectly legitimate way to sample data when you have
unbalanced binary classes.
(You could also reweight the samples in your loss function, for example,
by using BCEWithLogitsLoss’s pos_weight constructor argument. It is,
however, my theoretical preference to sample the minority class more
heavily, as you propose doing, rather than reweight the samples in the
loss function, unless the number of minority samples in your training set is
so small that batches would often contain duplicates of the same sample.)
It’s worth noting that if you use something like WeightedRandomSampler
so that your batches of eight samples contain on average four positive and
four negative samples, it is unlikely that a given batch would contain no
positive or no negative samples and it is rather unlikely that a given batch
would contain only one sample from a class. So you would still get batches
that are usually reasonably well balanced even if you don’t force each batch
to have exactly four positive and four negative samples. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816864.66/warc/CC-MAIN-20240414033458-20240414063458-00296.warc.gz | CC-MAIN-2024-18 | 2,275 | 24 |
https://fullnovels.com/my-childhood-friends-dck-disappeared/ | code | 7 Chapters (Completed)
One day, my childhood friend who lives next door came to me for help after his d*ck disappeared. I was confused as hell, didn’t know what he was talking about, but he showed me his crotch, and it was weirdly sexy, so we ended up doing it.
Afterwards, there was a rumor at school that we were gay, and one of the seniors started making eyes at me, and ended up dragging me to a love hotel.
So what are we supposed to do now? | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499790.41/warc/CC-MAIN-20230130003215-20230130033215-00726.warc.gz | CC-MAIN-2023-06 | 448 | 4 |
https://techraptor.net/gaming/news/minecraft-education-edition-now-teaches-kids-to-code | code | Mojang has announced a few new features coming to Minecraft: Education Edition, a version of the popular building game meant specifically for use in a classroom. These new features include the introduction of Command Blocks to the game, allowing the game to teach children the basics of coding and programming.
Minecraft has a unique advantage that it reaches any student, as not only an open world game, but as a gateway to coding as well. The number one request we hear from educators is the importance of coding and computational thinking as essential for college and career readiness. Through our partnership with Code.org, we have seen over 50 million hours of code, showing the appetite for engaging and innovative ways to teach and learn coding.Minecraft: Education Edition has support for various programming packages built into its core, meaning that students and teachers can easily interface with so-called "learn-to-code" packages like ScratchX, Tynker, and the recently released Microsoft MakeCode within Minecraft. Support for Code.org's Code Studio and Code Builder will be coming to Minecraft: Education Edition at some point later this year.
Later this spring, Mojang will be releasing version 1.01 of the game. This update will introduce Command Blocks to the game. These blocks can be programmed by players to perform specific functions by using an actual programming language. In OG Minecraft, these blocks weren't ordinarily used by players but by server owners wanting to customize how their server operates. This update will also add support for more languages, custom texture pack support, trading with villagers, an adventure mode, and new block types to use in your buildings.
And one more thing - Starting today, a one-year subscription to Minecraft: Education Edition will be included with qualifying purchases of Windows 10 computers and tablets, making it simpler to add Minecraft to your tools for classroom learning. For more information about this amazing offer, head to our offer page here.What do you think of the planned features for Minecraft: Education Edition? have you used this version of the game yourself? Let us know in the comment section down below! | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653501.53/warc/CC-MAIN-20230607010703-20230607040703-00692.warc.gz | CC-MAIN-2023-23 | 2,195 | 4 |
https://bitnami.com/stack/shopware | code | About Bitnami Shopware Stack
Shopware is an open source eCommerce application and the leading solution in the German market. Shopware’s scalability, modular basis and range of features provide businesses with the ultimate platform for growth. Thanks to an ongoing dialogue with its widespread community, Shopware remains close to customers’ needs, connecting them with the most modern platform on the market. After nearly 2 decades in business, Shopware is the trusted solution for over 54,000 international online storefronts ranging from small business to global corporate enterprise.
Key features of Shopware include
- Open source with complete source code on GitHub (including plugins developed in-house)
- Strong SEO capabilities
- Modular platform with wide variety of extensions/plugins to satisfy your business needs
- Intuitive use and operation, with a fast learning curve
- PHP7, Elasticsearch, open REST API and lean code basis
- Unique features for creating emotional shopping environments
- Outstanding marketing tools offered in the standard version
- Open template basis – easy to customize without coding experience
- Short time to market
- Widespread community network
- Complete documentation (developer, designer and general use)
- Responsive template with simple device allocation
- Versatile options for product presentation
- Transparent roadmap and frequent version releases
More on Shopware
Open, authentic, visionary – following these company values, Shopware focuses on providing its users with the most modern tools to sell online, now and in the future.
Why use the Bitnami Shopware Stack?
- Consistent between platforms | s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737178.6/warc/CC-MAIN-20200807113613-20200807143613-00386.warc.gz | CC-MAIN-2020-34 | 1,657 | 21 |
https://elpha.com/posts/599df4cp/support-scribe-on-product-hunt | code | Elpha community -
I'm SO excited to share with you the launch of Scribe 2.0 -- a product me and my team have been working hard on for the past year. We've just launched on Product Hunt and would really appreciate your support, feedback, and engagement! Please check us out!
Scribe is a tool that automatically generates step-by-step guides based on any task you do on your computer. It’s the fastest and easiest way to share what you know how to do. I am really proud of what we’ve built and the Scribe team is looking forward to hearing what you think! | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572174.8/warc/CC-MAIN-20220815115129-20220815145129-00249.warc.gz | CC-MAIN-2022-33 | 557 | 3 |
https://frontend.spiceworks.com/topic/155719-not-found-a-vpro?page=1#entry-919901 | code | Sorry for not replying earlier. The reason I mentioned the Russian characters for the scan account was because what I saw in the logs:
W[08:01:06.76 a9f1f0] String is not valid UTF-8. Force conversion from Windows-1251 to UTF-8, dropping bad chars.
I should have realized that the Windows-1251 char set does have non-Russian characters in it as well, but either way it's still something we need to fix, so the ticket with our developers is still valid. :)
Since the issue was just discovered a couple of days ago, it didn't make it into the drop that went out yesterday, but should make it into one of the future ones. Keep an eye out for the Beta which should be sometime next week. Thanks! | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511220.71/warc/CC-MAIN-20231003192425-20231003222425-00628.warc.gz | CC-MAIN-2023-40 | 691 | 4 |
https://www.experts-exchange.com/questions/27981846/HP-J6480-Paper-jam-not.html | code | Hoping we have some HP printer jockeys here. Here's our favorite HP J6480 AIO that suddenly comes up with "Paper Jam - clear paper path and press OK". Well, there wasn't a jam (that I know of) and we've pulled the thing apart as much as we can. Main Clamshell, ADF, duplexer, feed trays, exit port, dismout and remount the tanks. Took a can of compressed air to it to eject any little bits that might remain. The alert appears even if disconnected from the PC. Did a soft reset and a hard factory default reset. Didn't help.
Is this thing headed for the recycle bin? | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499888.62/warc/CC-MAIN-20230131154832-20230131184832-00494.warc.gz | CC-MAIN-2023-06 | 566 | 2 |
https://80.lv/articles/custom-terrain-blending-tool-for-ue4/ | code | Fuck off, Ad. It cost $$$$$$$
Laura, thank you for taking the time to model the warehouse boxes. I appreciate the enginuity. This could be used for games but as well as that, for businessmen to help showcase floorplans and build site images to their co-workers and employees. I highly respect this level of design. Best Paul.
Haha.I can understand English. I am just not good at speaking. It has been a long time I don't speak English, but I can read. Anyway, thanks for sharing my artwork. Thank you for loving it.
A student from Digital Arts and Entertainment (in Kortrijk, Belgium) is developing a tool for UE4 to blend static meshes with the environment as his graduation project. With this tool he wants to remove the harsh seam that player sees when a static mesh intersects with a landscape actor.
It was 2016 GDC talk by Dice about Star Wars Battlefront, which presented in-engine tools to blend together natural meshes and the environment, that inspired the artist. In this presentation DICE showcased some in-engine tools to blend together natural meshes and the environment.
I currently have created three variants of this material. One automatically detects the landscape intersection, the second one uses a vertex-paint mask and the third one is a combination of the two.
You can follow the progress on the tool here. | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514571360.41/warc/CC-MAIN-20190915114318-20190915140318-00521.warc.gz | CC-MAIN-2019-39 | 1,330 | 7 |
https://forums.totalwar.com/discussion/295313/hit-points-change-after-modding-number-of-monsters | code | I was trying to do some modding in TWW2 myself, I tried to change the number of some single-entity unit like mutant ogre and Doomwheel. But then I found a weird problem, for Doomwheels, I change the Num Engines in land_units_tables to 4 which means each Doomwheel unit will have 4 Doomwheels, and the Bonus Hit Points is 5180 as the default number. When I test it out in game, each time I loaded a save game the total HP of Doomwheel are correct showing at about 20K (5180 * 4), but when I start a battle the total HP of Doomwheel will became about 80K, which look likes the total HP multiplied with number of engines again, and this amount of HP will be kept until I exit the game or load a save game again. Same thing happened with other monsters like Mutant Ogre (5 entities, 5500 hp each, load in first showing 27K hp, then showing 137K after start a manual battle). Is there anyone knowing this issue? Or is there anyway to solve this? | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500339.37/warc/CC-MAIN-20230206113934-20230206143934-00083.warc.gz | CC-MAIN-2023-06 | 940 | 1 |
https://community.familysearch.org/en/discussion/116335/do-i-index-the-names-of-slaves-in-increase-and-decrease-column-as-enslaved | code | Do I index the names of slaves in "Increase" and "Decrease" column as enslaved?
I have read in other posts that located in the "Increase" and "Decrease" column are "proprietors" and they should be labeled as such. However, I am coming across many of these names in these columns and it is obvious to me these are slaves and not proprietors.
Some of these names match names in the enslaved list and so I feel I shouldn't index those that are already listed in the list of slaves.
Also, I do not currently have an example, I am reading through the "I swear" statements from the proprietors. Sometimes I will come across slaves being mentioned in those written oaths and there are descriptions. Most of the time these slaves have "abandoned" and so they are not listed in the slaves column. I am indexing those who are written in the oaths. I need to confirm if this is something I should or should not do.
Thank you for your time. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474533.12/warc/CC-MAIN-20240224112548-20240224142548-00818.warc.gz | CC-MAIN-2024-10 | 928 | 5 |
https://help.bitsighttech.com/hc/en-us/articles/360008451554-How-to-Parse-a-CSV-File-in-a-Spreadsheet-Processor | code | Publication Date – October 27, 2018
If a spreadsheet processor software (such as Microsoft® Excel) is generating multiple or double commas, ensure the file is correctly parsed:
- Double-click the file or select Open with to open the file.
- Select Text-to-Columns in the “Data context” menu. The selection will open a wizard panel.
- In the wizard panel, select Delimited.
- “Comma” as the delimiter.
- “Quotes” as the text qualifier. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510903.85/warc/CC-MAIN-20231001141548-20231001171548-00404.warc.gz | CC-MAIN-2023-40 | 449 | 7 |
https://blog.carbonfive.com/author/prakash/ | code | Greenfield projects have a hidden set of needs — and each one can be an opportunity for growth if handled well! But if handled poorly or if not handled at all, these pitfalls can perpetuate and multiply across the lifetime of the project, taking you further and further away from your treasure and further into the endless cave of despair.
In my last post, I described how to generate a platform-specific Elixir release. Now, the only thing left to do is to put it on the world wide web. To follow along with this post, you’ll need a few things: An IP address for a remote machine (preferably running Linux) you want to deploy your …
While releases are meant to be self-contained executables, they still call out to native system libraries to do things like open TCP sockets and write to files. That means that the native libraries referenced at compile time need to be exactly the same as the ones on your target machine. Unless you can guarantee that your workstation and cloud are exactly the same, releases can seem like only half the promise of a stress-free deployment.
What can we help you with?
Tell us a bit about your project, or just shoot us an email. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303884.44/warc/CC-MAIN-20220122194730-20220122224730-00696.warc.gz | CC-MAIN-2022-05 | 1,169 | 5 |
http://lists.berlios.de/pipermail/haiku-commits/2009-June/017215.html | code | [Haiku-commits] r31038 - haiku/trunk/src/preferences/media
anevilyak at gmail.com
Sun Jun 14 07:45:39 CEST 2009
On Sat, Jun 13, 2009 at 7:37 PM, anevilyak at
BerliOS<anevilyak at mail.berlios.de> wrote:
> Author: anevilyak
> Date: 2009-06-14 02:37:07 +0200 (Sun, 14 Jun 2009)
> New Revision: 31038
> ViewCVS: http://svn.berlios.de/viewcvs/haiku?rev=31038&view=rev
> The Media preflet was using a mix of old and layout style primitives to set itself up. As a consequence resizing basically didn't work correctly at all. Fixes ticket #3427.
These changes do expose a peculiarity I've thus far been unable to
track down the cause of: if I switch to the config view of my audio
chip, the resulting view has far more controls than can fit in the
default window width, and thus has a scroll bar. This is fine.
However, if I then resize the window wide enough such that said scroll
bar is no longer necessary, I can then no longer size the window any
smaller than that (ergo small enough to make the scrollbar reappear).
I have yet to find where in any of the code this clamping effect comes
from. Anyone who knows the layout kit and such better have any ideas?
More information about the Haiku-commits | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533957.14/warc/CC-MAIN-20140416005213-00506-ip-10-147-4-33.ec2.internal.warc.gz | CC-MAIN-2014-15 | 1,195 | 20 |
https://support.playhive.com/tag/staff-and-ranks/ | code | An article that provides several tips on how to make a great application.
Staff and Ranks
A collection of 5 articles
An article that answers common questions about our Helper application process.
Information about how our staff team works, and the various ranks and roles within it.
Information about and requirements for our partner program (for YouTubers & streamers).
Information about our helper role, and how you can apply for it. | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655924908.55/warc/CC-MAIN-20200711064158-20200711094158-00065.warc.gz | CC-MAIN-2020-29 | 435 | 7 |
http://www.linuxquestions.org/questions/linux-newbie-8/how-to-use-jdk-1-3-1-in-rh-9-a-112967/ | code | how to use Jdk 1.3.1 in RH 9
I don't what are the commands to use to compile or run the java file in RH 9 Gnome with jdk1.3.1.
and also how can I directly compile *.cpp files in RH 9 or gnome enviroment.
without Cpp compiler. becoz I head some people said C++ program in linux as well but I don't know how.
Anyone please guide me? | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123560.51/warc/CC-MAIN-20170423031203-00238-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 330 | 5 |
https://openriaservices.codeplex.com/releases/view/619745 | code | The goal of the release is to add improved cross platform support.
This is the first release with stable WPF support as well as (at least partioal) core support to many other platforms such as windows apps (and probably xamarin apps). For an example with both Silverlight, WPF and Windows 8 app see https://github.com/Daniel-Svensson/OpenRiaPlayground/tree/master/HttpClient
Workaround: The recommended approach for WPF projects is to have a separate library project for the code generation
- Code generation has issues for platforms where dataannotations has moved from System.ComponentModel.DataAnnotations
This includes, windows phone as well as several of the portable library targets.
Code generation will succeed, but important attributes such as Key
will be missing.
Workaround: Run code generation in a project targeting a supported platform and then use that dll (if possible) or directly link to the generated code from another project without the code generation installed.
- Silverlight projects will sometimes fail to open if they reference OpenRiaServices.Client.Codegen
Uninstall the package and install OpenRiaServices.Silverlight.Codegen
- Added additional extension points for WCF based DomainClientFactory implementations
- Add a new base-class WcfDomainClientFactory for WebDomainClientFactory
- Add extension points for customizing ChannelFactory creation by moving default ChannelFactory creation code to Wcf/WebDomainClientFactory
- Fix bug in Soap (BasicHttpBinding) endpoint preventing query options from working
- Add back Silverlight specific codegen package (and .targets file)
- Fixes a bug where Visual Studio in some cases failed to load silverlight project with a mesage that silverlight projects cannot dependend on non silverlight projects.
- Automatic build ordering vill not work for silverlight clients.
- A warning message has been added in case the "wrong" .targets file is used
- Reduce size of OpenRiaServices.Endpoints
- It now reuses internal types from Hosting assembly
- Added nuget badges to README.md
- Add script for coverity static analysis with a badge added to README.md
- Run analysis with sonarqube and added badge for results to README.md
- Fix #96 [Required] incorrectly added to database generated properties
- Fix #94 Slow first call to a service
- Improved startup (and codegen) performance
- Fix #92 EntityCollection load is very slow for large number of entities
- Improved nuget behaviour for other targets than silverlight and desktop .net
- Updated portable library to have the same implementation as non portable builds
- Added netstandard 1.3 build (experimental) see https://docs.microsoft.com/sv-se/dotnet/articles/standard/library for netstandard information
- AssemblyVersion updated to 220.127.116.11 for silverlight and portable build
- Silverlight support automat assembly redirection to higher versions so manual redirection should not be required for any target platform
- Fix #90 FormsAuthentication on Desktop Platforms
- Desktop client now support Cookies by default (which means Forms authentication just works)
- Can be controlled via WebDomainClientFactory.CookieContainer
- WebDomainClientFactory can now be overridden (bug in beta2)
- Enforce build ordering so we don't get error saying web project did not build which is one of the errors issue #73 Code generation fail for WPF if xaml references local types
- You will se a new project reference "OpenRiaServices Server Project Link" in projects with the code genereation enabled.
- Automatically generate WebContext for .exe projects
- Use msbuild property OpenRiaGenerateApplicationContext to control webcontext generation instead of just using SilverlightApplication variable
- Fix #91 Difference in validation behaviour between Silverlight and .net
- Desktop version now uses same validation logic as Silverlight build
- ApplicationServices classes are moved to the Client assembly
- This means that portable libraries and windows apps can now access them and have AuthenticationServices generated
- All project now compiles
- Appveyour compatibility - all projects now builds successfully on ci.appveyor.com
The communication layer on the client can now be easily switched, for an example implementation se https://github.com/Daniel-Svensson/OpenRiaPlayground/tree/master/HttpClient
- Introduces a new extension point for controlling what kind of DomainClient gets created and how.
- Allow Desktop and Portable clients to specify a "Base uri" so that the default constructor generated by the code gen can work outside silverlight.
This should hopefully remove the last strong dependency from the "core" Client on the current WCF based Client.Web assembly so that it becomes possible to add new service communication
protocols in the future.
- Make the core assembly independent of how we communicate with the Server.
- Allow new communication protocols in the future such as talking to the DomainController odata service, (soap/json endpoints) etc as well as for providing a portable alternative for the current Client.Web assembly for talking with normal DomainServices.
How to use it:
- Most user don't do anything at all, it will setup a DomainClientFactory automatically
- For "advanced" scenarios the user can set DomainClient.DomainServiceFactory to a WebDomainClientFactory instance.
Ex: One can add the following code att application startup (ex: App ctor) before WebContext or any other DomainContext get created
DomainContext.DomainClientFactory = new WebDomainClientFactory()
ServerBaseUri = new Uri("http://localhost:51359/ClientBin/", UriKind.Absolute),
For another example with both Silverlight, WPF and Windows 8 app see https://github.com/Daniel-Svensson/OpenRiaPlayground/tree/master/HttpClient (WIn8 upp is not updater to beta1) | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121528.59/warc/CC-MAIN-20170423031201-00021-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 5,785 | 60 |
https://tribuo.org/learn/4.1/javadoc/org/tribuo/util/tokens/universal/package-summary.html | code | A range currently being segmented.
This class was originally written for the purpose of document indexing in an information retrieval context (principally used in Sun Labs' Minion search engine).
It was originally developed to support information retrieval and forms a useful baseline tokenizer for generating features for machine learning.
Copyright © 2015–2021 Oracle and/or its affiliates. All rights reserved. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711394.73/warc/CC-MAIN-20221209080025-20221209110025-00453.warc.gz | CC-MAIN-2022-49 | 416 | 4 |
http://www.daz3d.com/forums/viewthread/12614/ | code | [selfsolved] Saving poses in DS3 (with PFE) without saving Morphs?
I'm struck with the dumb... there was a way to export Poses in DS3 with the PFE script without saving Morphs too... but I always end up saving the morphs along with the poses... could someone please tell me what I'm doing wrong... or how I'd do it right?
Thank you in advance :)
Edit: Forget it... like I said I was struck with the dumb... I forgot to uncheck the "others" part
Thanks to anyone who rattled their brain for me :) | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123046.75/warc/CC-MAIN-20170423031203-00091-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 495 | 5 |
http://redquadrant.com/campaign-against-consultancy-2/ | code | The Campaign Against Consultancy
RedQuadrant has launched the Campaign Against Consultancy. Our goal – that the public sector need no longer rely on costly consultants who:
- are only in it for the money
- undermine the confidence and capacity of the client
- sell the same old solution whether it fits the problem or not
OK, we admit it – we are a bunch of consultants ourselves.
But what’s wrong with trying to do ourselves out of a job?
We know that the challenges the public sector faces are so serious, we’ll probably retire before we achieve our goals – and from exhaustion rather than extravagant wealth!
That won’t stop us from trying….
Consultants should not drive the change that is required, the drive should come from within.
Are we right or wrong? | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383160/warc/CC-MAIN-20130516092623-00016-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 774 | 11 |
http://www.networksteve.com/exchange/topic.php/Fatal_Error_Opening_Another_Mailbox/?TopicId=37294&Posts=5 | code | Fatal Error Opening Another Mailbox
Currently I'm having problem opening another mailbox from Administrator account, it displayed a fatal error page. I've succeed before, but when I tried it again, it showed a fatal error. How to fix this problem?
February 14th, 2013 7:29pm
Are you sure that admin still have Full Mailbox Rights?Regards, Konrad Sagala, MCT, MCSE+M, MCITP: Exchange 2007/2010, Lync 2010, Office365, Windows 2008, Virtualization
February 15th, 2013 7:18am
I haven't changed the permission system, but how to check that one?
February 15th, 2013 7:52am
Check by running ExBpa and diagnostic logging
February 19th, 2013 9:44am
Hi You can run "Get-MailboxPermission" cmdlet on exchange management console. Get-MailboxPermission: http://technet.microsoft.com/en-us/library/aa998218(v=exchg.141).aspxWendy Liu TechNet Community Support
February 19th, 2013 10:33am
Are you sure that admin still have Full Mailbox Rights? Regards, Konrad Sagala, MCT, MCSE+M, MCITP: Exchange 2007/2010, Lync 2010, Office365, Windows 2008, Virtualization Currently, I'm having role as Organization Management. Does it not enough to open another mailboxes? I've done it before, but somehow these days, I'm failed to open them.
February 19th, 2013 11:17am | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573561.45/warc/CC-MAIN-20190919163337-20190919185337-00239.warc.gz | CC-MAIN-2019-39 | 1,243 | 13 |
https://www.kiwi-electronics.nl/en/seeed-studio-290/grove-4-channel-spdt-relay-3806 | code | The Grove - 4-Channel SPDT Relay has two single pole - double throw (SPDT) switches. It only requires low-voltage and low current signals to control those switches. Specifically, you can use 5V DC to control max.250V AC or 110V DC.
An on-board STM32F030F4P6 is used to control the channels separately. The control command is transmitted via the I2C interface. The on-board STM32F030F4P6 will parse the command, so that you can control the switch you want.
- High temperature resistant plastic shell
- High voltage load
- Low power consumption
- Long lasting | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304287.0/warc/CC-MAIN-20220123141754-20220123171754-00314.warc.gz | CC-MAIN-2022-05 | 557 | 6 |
http://www.techrepublic.com/resource-library/whitepapers/analysis-of-energy-consumption-and-lifetime-of-heterogeneous-wireless-sensor-networks/ | code | Analysis of Energy Consumption and Lifetime of Heterogeneous Wireless Sensor Networks
The paper examines the performance as well as energy consumption issues of a wireless sensor network providing periodic data from a sensing field to a remote receiver. The sensors are assumed to be randomly deployed. The authors distinguish between two types of sensor organizations, one with a single layer of identical sensors (homogeneous) and one with an additional overlay of fewer but more powerful sensors (heterogeneous). They formulate the energy consumption and study their estimated lifetime based on a clustering mechanism with varying parameters related to the sensing field, e.g., size, and distance. They quantify the optimal number of clusters based on their model and show how to allocate energy between different layers. | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541692.55/warc/CC-MAIN-20161202170901-00092-ip-10-31-129-80.ec2.internal.warc.gz | CC-MAIN-2016-50 | 824 | 2 |
https://community.etcconnect.com/control_consoles/f/cobalt-family/29849/keys-no-more-active | code | I'm working on a new show and during a run-through, I did several corrections, savings, etc... but after a while some keys are no more working. It's not the first time. After a reboot, everything comes back to normal. I'm working on a Cobalt 10, running 8.1.1
Have anyone encountered this issue?
Are there only specific keys that stop working? If so, could you name a few of these?
Does it make any difference if you press the ESC key?
For sure there was the SAVE, THRU, UPDATE (only when I was on the playback window...) but I didn't test all the keys as I'm working during the run. It's just annoying because it's hard to do fast corrections in that situation.
Please try to press ESC if it happens again and let us know if it helps.
Ok, I will test this.
Thanks, have a nice day
The ESC key is the solution in this case thank you!
I am glad that it helped. If you encounter this again, it would be interesting to know the commands you did leading up to this situation. For combination commands where you hold one button and push another, releasing the second button before you release the first one would reduce the risk of this happening again. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027321140.82/warc/CC-MAIN-20190824130424-20190824152424-00408.warc.gz | CC-MAIN-2019-35 | 1,148 | 10 |
https://www.cabi.org/isc/abstract/20219941554 | code | Structural equation modeling of a winnowed soil microbiome identifies how invasive plants re-structure microbial networks.
The development of microbial networks is central to ecosystem functioning and is the hallmark of complex natural systems. Characterizing network development over time and across environmental gradients is hindered by the millions of potential interactions among community members, limiting interpretations of network evolution. We developed a feature selection approach using data winnowing that identifies the most ecologically influential microorganisms within a network undergoing change. Using a combination of graph theory, leave-one-out analysis, and statistical inference, complex microbial communities are winnowed to identify the core organisms responding to external gradients or functionality, and then network development is evaluated against these externalities. In a plant invasion case study, the winnowed microbial network became more influential as the plant invasion progressed as a result of direct plant-microbe links rather than the expected indirect plant-soil-microbe links. This represents the first use of structural equation modeling to predict microbial network evolution, which requires identification of keystone taxa and quantification of the ecological processes underpinning community structure and function patterns. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103624904.34/warc/CC-MAIN-20220629054527-20220629084527-00080.warc.gz | CC-MAIN-2022-27 | 1,372 | 2 |
http://mirror.olnevhost.net/pub/lam/using/docs/release.php | code | The bulk of the release notes for LAM/MPI 7.1.4 are in the
Installation Guide and
User's Guide. Both
documents are also included in the
doc/ directory of
every LAM/MPI tarball.
There are many release notes, and it is not worth replicating the
information on a web page. Please see the documents cited above for the
release notes. Thanks. | s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00581.warc.gz | CC-MAIN-2022-40 | 337 | 9 |
https://www.oreilly.com/library/view/beautiful-data/9780596801656/ch11.html | code | WHAT MAKES DATA BEAUTIFUL, AND WHERE DOES IT COME FROM?
Beautiful data is interesting, useful, public, and free. Data must be of interest to someone, somewhere: its collector, an audience, a constituency. It must be useful to those whose interests demand its collection and maintenance, by helping them understand something about their environment. Data is most beautiful when it is public and free, and available for inspection and debate.
This is a story about Oakland Crimespotting (http://oakland.crimespotting.org), a research project of Stamen Design (http://stamen.com) in San Francisco. Crimespotting (see Figure 11-1) was developed as a response to the existing Oakland Police Department crime-reporting application, CrimeWatch (http://gismaps.oaklandnet.com/crimewatch/). As with many projects, Crimespotting didn't start with a concrete end goal in mind; it was born out of frustration, matured through basic technical research, and was finally made public after a traumatic crime in Oakland focused national attention on the city. It seems that this is a typical project arc: what starts with directed noodling often ends as a full-fledged informational project. This one in particular is an example of what Stamen advisor Ben Cerveny calls "things informationalize": a world of data is being moved onto the Internet piece by piece, exposed to and collided against an open source toolchain and methodology.
Figure 11-1. The logo for ... | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540511946.30/warc/CC-MAIN-20191208150734-20191208174734-00443.warc.gz | CC-MAIN-2019-51 | 1,448 | 4 |
https://insiteapp.zendesk.com/hc/en-gb/articles/360015780080-Adding-project-collaborators-from-outside-of-your-organisation | code | ! This article has been superseded since update 1.12.0 by the following:
- You can only add external collaborators on Enterprise level plans. You will not have this option on a Basic or Team plan.
- Only Project Admins are able to add and manage project collaborators. If you are not a Project Admin you will only be able to view the project collaborators.
You can invite Insite users to your projects from outside of your organisation. These are users who are not a part of your Insite Plan. You may want to do this so that your clients, consultants, or others can collaborate on certain lists on your project, for example, to create a client snag list. Don't worry, they won't be able to see all of your lists and they also have limited permissions compared to regular Internal Project Users which are:
- They are unable to create new lists.
- They can only view lists that have the privacy set to Open.
- They can add items to Open lists.
- They can create reports on Open lists.
- They can only delete items on Open lists which they have created.
They still will not have permission to delete the list as that is only available to Project Admins and the list creator.
External users can be promoted to Internal users by a Plan Admin after they have been added to the project. See Promote External user to Internal.
To add project collaborators from outside of your organisation:
1. From the home screen go to Your project.
2. You will now be presented with the project overview screen.
3. Tap the Collaborators button in the top right of the screen to view the current collaborators.
4. Tap the Blue ⊕ button in the bottom right-hand corner of the screen.
5. Enter the email address of the external user who you would like to add to the project in the input field under the Search & invite users heading. Note: You can enter multiple email addresses in the search box if you separate them using commas.
6. Tap Search. You will be presented with the users to invite pop over. If the user(s) exist(s) and they are not already part of the project then their name(s) will appear in the pop-up. If their email address is shown instead of their name then no account has been found in which case you can invite them to the project - see Invite new users to your project. Note: If you cannot find the user(s), double-check the email address(es) and ask them to check that they are not in private mode.
7. When you have found the user(s) tap Add. The user(s) will now be added to your project. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476464.74/warc/CC-MAIN-20240304165127-20240304195127-00759.warc.gz | CC-MAIN-2024-10 | 2,490 | 19 |
http://www.parallel-universe-online.com/ | code | The Intel® Xeon Phi™ coprocessor extends the reach of the Intel® Xeon® family of computing products into higher realms of parallelism. This article offers the key tips for programming such a high degr ee of parallelism, while using familiar programming methods and the latest Intel® Parallel Studio XE 2013 and Intel® Cluster Studio XE 2013—which both support the Intel Xeon Phi coprocessor.
It is worth explaining this checklist in more depth, and that is the purpose of this article. You can see that preparing for Intel Xeon Phi coprocessors is primarily about preparing for a 50+ core x86 SMP system with 512-bit SIMD capabilities. That work can happen on most any large, general purpose system, especially one based on Intel Xeon processors. Intel Parallel Studio XE 2013 and Intel Cluster Studio XE 2013 will support your work on an Intel Xeon processor-based system with or without Intel Xeon Phi coprocessors. All the tools you need are in one suite.
Intel Xeon Phi coprocessors are designed to extend the reach of applications that have demonstrated the ability to reach the scaling limits of Intel Xeon processor-based systems, and have also maximized usage of available vector capabilities or memory bandwidth. F or such applications, the Intel Xeon Phi coprocessors offer additional powerefficient scaling, vector support, and local memory bandwidth, while maintaining the programmability and support associated with Intel Xeon processors.
Advice for successful programming can be summarized as: “Program with lots of threads that use vectors with your preferred programming languages and parallelism models.” Since most applications have not yet been structured to take advantage of the full magnitude of parallelism available in an Intel Xeon Phi coprocessor, understanding how to restructure to expose more parallelism is critically important to enable the best performance. This restructuring itself will generally yield benefits on most general purpose computing systems—a bonus due to the emphasis on common programming languages, models, and tools across the Intel Xeon family of products. You may refer to this bonus as the dual-transforming-tuning advantage.
A system that includes Intel Xeon Phi coprocessors will consist of one or more nodes (a single node computer is “just a regular computer”). A typical node consists of one or two Intel Xeon processors, plus one to eight Intel Xeon Phi coprocessors. Nodes cannot consist of only coprocessors.
The First Intel Xeon Phi Coprocessor, Codename Knights Corner
While programming does not require deep knowledge of the implementation of the device, it is definitely useful to know some attributes of the coprocessor. From a programming standpoint, treating it as an x86-based SMP-on-a-chip with over 50 cores, over 200 hardware threads, and 512-bit SIMD instructions is the key.
The cores are in-order, dual-issue x86 processor cores (which trace some history to the original Intel® Pentium® design). But with the addition of 64-bit support, four hardware threads per core, power management, ring interconnect support, 512 bit SIMD capabilities, and other enhancements, these are hardly the Intel Pentium cores of 20 years ago. The x86-specific logic (excluding L2 caches) makes up less than 2 percent of the die for an Intel Xeon Phi coprocessor.
Here are key facts about the first Intel Xeon Phi coprocessor product:
- It is a coprocessor (requires at least one processor in the system); in production in 2012
- Boots and runs Linux* (source code available at http://intel.com/software/mic)
- It is supported by standard tools including Intel Parallel Studio XE 2013. Listings of additional tools available can be found online (http://intel.com/software/mic).
- It has many cores:
- More than 50 cores (This will vary within a generation of products, and between generations. It is good advice to not hard code applications to a particular number.)
- In-order cores support 64-bit x86 instructions with uniquely wide SIMD capabilities.
- Four hardware threads on each core (resulting in more than 200 hardware threads on a single device) are primarily used to hide latencies implicit in an in-order microarchitecture. As such, these hardware threads are much more important for HPC applications to utilize than hyperthreads on an Intel Xeon processor.
- Cache coherent across the entire coprocessor.
- Each core has a 512K L2 cache locally with high-speed access to all other L2 caches (making the collective L2 cache size over 25M).
- Special instructions in addition to 64-bit x86:
- Uniquely wide SIMD capability via 512-bit wide vectors instead of MMX, SSE or AVX.
- High performance support for reciprocal, square root, power, and exponent operations
- Scatter/gather and streaming store capabilities for better effective memory bandwidth
- Performance monitoring capabilities for tools like Intel® VTune™ Amplifier XE 2013
Maximizing Parallel Program Performance
The choice whether to run an application solely on Intel Xeon processors, or to extend an application run to utilize Intel Xeon Phi coprocessors, will always start with two fundamentals:
- Scaling: Is the scaling of an application ready to utilize the highly parallel capabilities of an Intel Xeon Phi coprocessor? The strongest evidence of this is generally demonstrated scaling on Intel Xeon processors.
- Vectorization and Memory Locality: Is the application either:
- Making strong use of vector units?
- Able to utilize more local memory bandwidth than available with Intel Xeon processors?
If both of these fundamentals are true for an application, then the highly parallel and power-efficient Intel Xeon Phi coprocessor is most likely worth evaluating.
Ways to Measure Readiness for Highly Parallel Execution
To know if your application is maximized on an Intel Xeon processorbased system, you should examine how your application scales, as well as how it uses vectors and memory. Assuming you have a working application, you can get some impression of where you are with regards to scaling and vectorization by doing a few simple tests.
To check scaling, create a simple graph of performance as you run with various numbers of threads (from one up to the number of cores, with attention to thread affinity) on an Intel Xeon processor-based system. This can be done with settings for OpenMP*, Intel® Threading Building Blocks (Intel® TBB) or Intel® Cilk™ Plus (e.g., OMP_NUM_ THREADS for OpenMP). If the performance graph indicates any significant trailing off of performance, you have tuning work you can do to improve your application before trying an Intel Xeon Phi coprocessor.
To check vectorization, compile your application with and without vectorization. If you are using Intel compilers: disable vectorization via compiler switch: -no-vec, use at least –O2 xhost for vectorization.
Compare the performance you see. If the performance difference is insufficient, you should examine opportunities to increase vectorization. Look again at the dramatic benefits vectorization may offer as illustrated in Figure 7. If you are using libraries, such as the Intel® Math Kernel Library (Intel® MKL), you should consider that time in Intel MKL routines offer vectorization invariant to the compiler switches. Unless your application is bandwidth limited, effective use of Intel Xeon Phi coprocessors should be done with most cycles executing having computations utilizing the vector instructions. While some may tell you that “most cycles” needs to be over 90 percent, we have found this number to vary widely based on the application and whether the Intel Xeon Phi coprocessor needs to be the top performance source in a node or just to contribute to performance.
The Intel® VTune™ Amplifier XE 2013 can help measure computations on Intel Xeon processors and Intel Xeon Phi coprocessor to assist in your evaluations.
Aside from vectorization, being limited by memory bandwidth on Intel Xeon processors can indicate an opportunity to improve performance with an Intel Xeon Phi coprocessor. In order for this to be most efficient, an application needs to exhibit good locality of reference and utilize caches well in its core computations.
The Intel VTune Amplifier XE product can be utilized to measure various aspect of a program, and among the most critical is “L1 Compute Density.” This is greatly expanded upon in a paper titled Using Hardware Events for Tuning on Intel® Xeon Phi™ Coprocessor (codename: Knights Corner).
When using MPI, it is desirable to see a communication vs. computation ratio that is not excessively high in terms of communication.
Because programs vary so much, this has not been well characterized other than to say that, like other machines, Intel Xeon Phi coprocessors favor programs with more computation vs. communication. Programs are most effective using a strategy of overlapping communication and I/O by computation. Intel® Trace Analyzer and Collector, part of Intel Cluster Studio XE 2013, is very useful for profiling. It can be used to profile MPI communications to help visualize bottlenecks and understand the effectiveness of overlapping with computation to characterize your program.
Compiler and Programming Models
No popular programming language was designed for parallelism. In many ways, Fortran has done the best job adding new features, such as DO CONCURRENT , to address parallel programming needs, as well as benefiting from OpenMP. C users have OpenMP, as well as Intel Cilk Plus. C++ users have embraced Intel Threading Building Blocks and, more recently, have Intel Cilk Plus to utilize as well. C++ users can use OpenMP as well.
Intel Xeon Phi coprocessors offer the full capability to use the same tools, programming languages, and programming models as an Intel Xeon processor. However, with this coprocessor designed for high degrees of parallelism, some models are more interesting than others.
In essence, it is quite simple: an application needs to deal with having lots of tasks (call them “workers” or “threads” if you prefer), and deal with vector data efficiently (a.k.a., vectorization).
There are some recommendations we can make based on what has been working well for developers. For Fortran programmers, use OpenMP, DO CONCURRENT, and MPI. For C++ programmers, use Intel TBB, Intel Cilk Plus, and OpenMP. For C programmers, use OpenMP and Intel Cilk Plus. Intel TBB is a C++ template library that offers excellent support for task-oriented load balancing. While Intel TBB does not offer vectorization solutions, it does not interfere with any choice of solution for vectorization. Intel TBB is open source and available on a wide variety of platforms supporting most operating systems and processors. Intel Cilk Plus is a bit more complex in that it offers both tasking and vectorization solutions. Fortunately, Intel Cilk Plus fully interoperates with Intel TBB. Intel Cilk Plus offers a simpler set of tasking capabilities than Intel TBB, but uses keywords in the language to enable full compiler support for optimizing.
Intel Cilk Plus also offers elemental functions, array syntax, and “#pragma SIMD” to help with vectorization. The best use of array syntax is implemented along with blocking for caches, which unfortunately means naïve use of constructs such as A[:] = B[:] + C[:]; for large arrays may yield poor performance. The best use of array syntax ensures that the vector length of single statements is short (some small multiple of the native vector length, perhaps only 1X).
Finally, and perhaps most important to programmers today, Intel Cilk Plus offers mandatory vectorization pragmas for the compiler called “#pragma SIMD.” The intent of “#pragma SIMD” is to do for vectorization what OpenMP has done for parallelization. Intel Cilk Plus requires compiler support. It is currently available from Intel for Windows*, Linux*, and Apple OS* X. It is also available in a branch of gcc.
If you are happy with OpenMP and MPI, you are in great shape to use Intel Xeon Phi coprocessors. Additional options may be interesting to you over time, but OpenMP and MPI are enough to get great results.
Your key challenge will remain vectorization. Auto-vectorization may be enough for you, especially if you code in Fortran, with the possible additional considerations for efficient vectorization, such as alignment and unit-stride accesses. The “#pragma SIMD” capability of Intel Cilk Plus (available in Fortran, too) is worth a look. In time, you may find it has become part of OpenMP.
Dealing with tasks means specification of tasks, and load balancing amongst them. MPI has provided this capability for decades with full flexibility and control given to the programmer. Shared memory programmers have Intel TBB and Intel Cilk Plus to assist them. Intel TBB has widespread usage in the C++ community. Intel Cilk Plus extends Intel TBB to offer C programmers a solution, as well as help with vectorization in C and C++ programs.
Coprocessor Major Usage Model: MPI vs. Offload
Given that we know how to program the Intel Xeon processors in the host system, the question arises of how to involve the Intel Xeon Phi coprocessors in an application. There are two major approaches: (1) “offload” selective portions of an application to the Intel Xeon Phi coprocessors, and (2) run an MPI program where MPI ranks can exist on Intel Xeon processors cores, as well as on Intel Xeon Phi coprocessor cores with connections made by MPI communications. The first is call “offload mode” and the second “native mode.” The second does not require MPI to be used, because any SMP programming model can be employed, including just running on a single core. There is no machine “mode” in either case, only a programming style that can be intermingled in a single application if desired. Offload is generally used for finer-grained parallelism and, as such, generally involves localized changes to a program. MPI is more often done in a coarse-grained manner, often requiring more scattered changes in a program. RDMA support for MPI is available.
The choice is certain to be one of considerable debate for years to come. Applications that already utilize MPI can actually use either method by either limiting MPI ranks to Intel Xeon processors and use offload to the coprocessors, or distributing MPI ranks across the coprocessors. It is possible that the only real MPI ranks be established on the coprocessor cores, but if this leaves the Intel Xeon processors unutilized then this approach is likely to give up too much performance in the system.
Being separate and on a PCIe bus creates two additional issues: (1) the limited memory on the coprocessor card, and (2) the benefits of minimizing communication to and from the card. It is worth noting as well, that the number of MPI ranks used on an Intel Xeon Phi coprocessor should be substantially less than the number of cores—in no small part because of limited memory on the coprocessor. Consistent with parallel programs in general, the advantages of overlapping communication (e.g., MPI messages or offload data movement) with computation are important to consider, as well as techniques to load balance work across all available cores. Of course, involving Intel Xeon processor cores and Intel Xeon Phi coprocessor cores adds the dimension of “big cores” and “little cores” to the balancing work, even though they share x86 instructions and programming models. While MPI programs often already tackle the overlap of communication and computation, the placement of ranks on coprocessor cores still requires dealing with the highly parallel programming needs and limited memory. This is why an offload model can be attractive, even within an MPI program.
The offload model for Intel Xeon Phi coprocessors is quite rich. The syntax and semantics of the Intel® Language Extensions for Offload are generally a superset of other offload models including OpenACC. This provides for greater interoperability with OpenMP; ability to manage multiple coprocessors (cards); and the ability to offload complex program components that an Intel Xeon Phi coprocessor can process, but that a GPU could not (and hence, OpenACC does not allow). We expect that a future version of OpenMP will include offload directives that provide support for these needs, and Intel plans to support such a standard for Intel Xeon Phi coprocessors as part of our commitment to providing OpenMP capabilities. Intel Language Extensions for Offload also provides for an implicit sharing model that is beyond what OpenMP will support. It rests on a shared memory model supported by Intel Xeon Phi coprocessors that allow a shared memory programming model (Intel calls this “MYO”) between Intel Xeon processors and Intel Xeon Phi coprocessors. This is most similar to partitioned global address space (PGAS) programming models; not an extension provided by OpenMP. The Intel “MYO” capability offers a global address space within the node, allowing sharing of virtual addresses for select data between processors and coprocessor on the same node. It is offered in C and C++, but not Fortran, since future support of coarray will be a standard solution to the same basic problem. Offloading is available as Fortran offloading via pragmas, C/C++ offloading with pragmas, and optionally shared (MYO) data.
Use of MPI can also distribute applications across the system.
Summary: Transforming-and-Tuning Double Advantage
Programming should not be called easy, and neither should parallel programming. However, we can work to keep the fundamentals the same: maximizing parallel computations and minimizing data movement. Parallel computations are enabled through scaling (more cores and threads) and vector processing (more data processed at once). Minimal data movement is an algorithmic endeavor, but can be eased through the higher bandwidth between memory and cores that is available with the Intel® Many Integrated Core (Intel® MIC) architecture used by Intel Xeon Phi coprocessors. This leads to parallel programming using the same programming languages and models across the Intel Xeon family of products, which are generally also shared across all general purpose processors in the industry. Languages such Fortran, C, and C++ are fully supported. Popular programming methods such as OpenMP, MPI, and Intel TBB are fully supported. Newer models with widespread support such as Coarray Fortran, Intel Cilk Plus, and OpenCL* can apply as well.
Tuning on Intel Xeon Phi coprocessors for scaling, and vector and memory usage, also benefits the application when run on Intel Xeon processors. Maintaining a value across the Intel Xeon family is critical, as it helps preserve past and future investments. Applications that initially fail to get maximum performance on Intel Xeon Phi coprocessors generally trace problems back to scaling, vector usage, or memory usage. When these issues are addressed, the improvements to the application usually have a related positive effect when run on Intel Xeon processors. This is the double advantage of “transforming-and-tuning,” and developers have found it to be among the most compelling features of the Intel Xeon Phi coprocessors. | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860121418.67/warc/CC-MAIN-20160428161521-00129-ip-10-239-7-51.ec2.internal.warc.gz | CC-MAIN-2016-18 | 19,312 | 59 |
https://azure.microsoft.com/en-in/updates/staticwebappsdotnet3deprecation/ | code | Azure Static Web Apps extended support for .NET Core 3.1 ends on 3 December 2022
Published date: 07 October, 2022
.NET Core 3.1 will reach the end of support on 13 December 2022. As a result, extended support for .NET Core 3.1 in Azure Static Web Apps that use Azure Functions will end on 3 December 2022. After this date, your existing static web apps that use Azure Functions will continue to work, but security patches and customer service for .NET Core 3.1 will no longer be provided.
Azure Functions announced their end of support for .NET Core 3.1 in March 2022. Since the managed functions hosted by Azure Static Web Apps run on Azure Functions, we recommend you update your functions applications to runtime version 4.x, which uses .NET 6.
.NET 6 is the latest version with long-term support and provides these enhancements:
A unified set of base libraries and an SDK that makes it easy to share code across any application type.
Simplified development with new C# 10 features and minimal APIs.
Hot reload that allows you to make code changes without explicit recompiling.
To avoid potential service disruptions or security vulnerabilities, update your applications to runtime version 4.x before 3 December 2022.
Change the api runtime from .NET Core 3.1 to .NET 6, please configure the apiRuntime version in staticwebapp.config.json as explained here.
Follow this documentation to update your local project from .NET Core 3.1 to .NET 6.
To learn more about Azure Functions runtime support policy, check out this documentation. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100909.82/warc/CC-MAIN-20231209103523-20231209133523-00342.warc.gz | CC-MAIN-2023-50 | 1,535 | 12 |
http://www.sounddrivers.net/about/ | code | Do you want to learn more about sound driver software? Maybe you are looking for a way to fix your current audio problems yourself. In this case, there are plenty of ways to do this. You don’t even have to do the work on your own! With sound driver software, it is easy. We have many tutorials on how to diagnose your problem, or how to use sound drivers.
If you are someone who is not really inclined to today’s technology, that is no problem. Our tutorials and advice on using these programs is fairly straight forward. In fact, you can read from just a few of our featured articles within the site: | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164989606/warc/CC-MAIN-20131204134949-00010-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 605 | 2 |
http://www.p4c.philips.com/cgi-bin/dcbint/oleeview.pl?view=aa12_view_iframe.html&scy=gb&slg=ENG&refnr=0091654&dct=QAC&ctn=241P4LRYEB/00 | code | 1. Install latest display card drivers
2. Go to Control Panel from Start =>Settings=>Control Panel Click Sounds and Audio Devices.
3. You should see two Default devices in the selection lists. Choose ATI HD Audio output to replace original Realtek audio output in this case.
Was this document helpful? | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867644.88/warc/CC-MAIN-20180625092128-20180625112128-00087.warc.gz | CC-MAIN-2018-26 | 301 | 4 |
http://www.gegenees.org/beta/GegeneesHelp.html | code | Gegenees Fragmented Aligner version 3.0
This is a beta-version for testing functionality. Please look for updates at www.gegenees.org and report any problems to [email protected] or [email protected]
Download the windows version of Gegenees-FA. If you have a 64-Bit environment, download the ”x_86_64” version and if you have a 32-bit environment download the ”x86” version. Note, even if you have a 64-bit windows version, the java version may be 32-bit. To check this: Open a command prompt (search for cmd in the windows menu) and type ”java -version”. If java is installed a version will be reported. The java version must be 1.8.x or higher. If the java version is 64-bit, there should be a statement about ”64-Bit” somewhere in the version information. If java stops and returns ”exit code 13” when you try to start Gegenees-FA, you are probably trying to run a 64-bit Gegenees version using a 32-bit Java version.
Gegenees-FA is started by double-clicking the Gegenees-FA program located under the eclipse folder.
Download the Macintosh version of Gegenees-FA. Gegenees-FA requires java version 1.8.x or higher. Note, on macintosh the commandline version of java is not always the same as the graphical version. Gegenees uses the command line version. To check your java version, open a terminal window and type ”java -version”. If java is installed in the command line environment, version information will be displayed. The version must be 1.8.x or higher. If you need to install or update your command line version of java, download and install the latest Java Development Kit (JDK) version. Note, it must be the JDK version, not the JRE version for it to become accessible from the command line.
Gegenees-FA is started by double-clicking the Gegenees-FA executable file in the MacOS folder. Eventually you need to open it by right clicking (ctrl-clicking) and explicitly allowing it to be run.
The first Linux version is nor released for beta-testing. Gegenees-FA requires java version 1.8.x or higher. Type ”java –version” in a terminal to check. Start the program by double clicking Gegenees in the eclipse folder. If it does not start, check that the launcher is marked as beeing allowed to execute.
The first time you start Gegenees-FA, you need to select a workspace directory (File->Select workspace…). If you have no Gegenees-FA workspace for precious, you may create/select an empty directory. The workspace directory will contain your databases with genomic sequences (a sub-directory starting with ”database_”) and comparisons (a subdirectory starting with ”comparison_”). You may have several different workspaces for your different projects. If you press the ”Projects” tab, you may see the name of the active workspace in the bottom of the window. In general, pathways containing spaces may cause problems for command-line programs such as BLAST, but Gegenees-FA should work with workspace paths containing spaces. If you experience problems, you may try to move/rename the workspace directory so that no spaces are within the pathway.
Gegenees-FA depends upon the standalone executable version of NCBI Blast. Some versions of NCBI Blast has under some operating systams (mainly windows) had problems with multithreading. This version of Gegenees-FA has been tested with the latest BLAST version (2.6.0). NCBI Blast can be downloaded from ftp://ftp.ncbi.nlm.nih.gov/blast/executables/blast+/. Download the version that matches your operating system (Windows: win64.tar.gz or alternatively the installer wrapped win64.exe version Macintosh: macosx.tar.gz Linux: linux.tar.gz) Extract the archive file and place it in a pathway that do not contain spaces. Note, spaces are not allowed anywhere in the blast pathway (directories and all parent directories). Windows: Eventually you need a tool to unpack the archive such as 7-zip. If you do not have permissions/possibilities to unpack/install the blast on your computer, you may extract the files on another computer and move them to the computer of interest. Macintosh: It should be possible to double-click the tar.gz file. Alternatively use the linux style extraction method in the terminal window. Linux: extract with a command such as ”tar –zxvf ncbi-blast-2.6.0……tar.gz”. The blast path (which is the path to the ”bin” directory of the extracted directory structure) must then be specified in the ”File->Configure Blast path…” dialog of Gegenees-FA.
In a workspace there is a directory called ”database”. This is the ”default database” that stores genome sequences that can be used to set up a comparison. Each genome is stored in a directory which is named as the genome name and in it one or several genbank-formated files. Eventually Gegenees-FA will make an ”info.geg” file with some statistics on the genome. It is also possible to have more databases which then is a directory beginning with ”database_”. The databases are handled by the ”Database Manager” which can be launched from the Data->Database manager menu command. When starting a new comparison, the available genomes comes from the currently active database. If you need to change database, do it through the database manager. To ensure correct formatting, genomes (in.eg. fasta format) may be imported into a database using the database manager.
The Projects tab
The Projects tab lists all comparisons in the current workspace dir. By selecting a comparison the contents of the other tabs will be changed and reflect the selected comparison. In an empty workspace there will be no comparisons listed. A new comparison can be initiated by (File->New Comparison…). In the bottom line, the path of the current workspace is listed.
The Run Alignments Tab
When a new comparison is made (New comparison wizard is completed), you will end up on this tab. You start the comparison by pressing ”start”. The logwindow and the statusbar will show progression of the alignment. After some initial work, the logwindow will be dominated by messages such as ”Thread=12/625 (P=13) blast producing: G8_G17.result” and ”Thread=6/625 (P=17) done: OK!”. In this case there are 625 blastcommands that needs to be run (each containing all fragments from a certain genome compared to an unfragmented sequence of another genome). The P value represents how many parallel threads are executing BLAST command. It is based on the number of processor cores reported by the system. It can be limited in the preferences page. Eventually some threads may not produce a valid blast-result file in reasonable time and then the tread is killed and that particular blast job is started again after all other threads have finished. A few restarts may be tolerable, but massive amounts of fails/restarts indicate something is wrong. After some post-processing, the logwindow will reload it contents and start with a row ”COMPLETED!”. The data can then be explored in the other tabs. The ”The Run Alignments Tab” has little function, except looking at the logfile, after the comparison has completed. The logfile can also be looked at in a text editor. It is called ”logfilecomparison.txt” and is located in the ”alignment_analysis” directory of the comparison directory.
The Included Genomes Tab
This Tab lists the genomes in the comparison. Information about the genomes can be displayed and the comparison can be modified by adding or removing genomes. The progress reporting of the modify function is not functioning properly in this beta-testing version.
The Group settings Tab
This Tab allows the included genomes to be assignes to the ”background” or the ”target” group. The Signature tabs uses this information. A signature represents what is conserved in the target but absent from the background group. A reference genome can also be selected, which will define the coordinate system when the signature is graphically plotted.
The heatmap Tab
In this tab, a heatmap based on the average fragment similarity between the genomes is displayed. The color profile can be changed and the rows/columns can be sorted by similarity. A new sort-order is given a name and stored so that it can be reloaded. Also, a threshold can be set so that the fragments with poor alignment is filtered out. This allows the ”core genomes” to be compared. However, if too much of the genome is filtered out, the data becomes unreliable. How much of the genome that is included at a certain threshold level can be investigated by changing from ”show score” to ”show core”.
The Signature graph Tab
In this tab, the selected reference genome is plotted and on top of it ”biomarker score” values are plotted above and below. (max/min) biomarker score means the max value in the background group (worst false positive) and the min value in the target group (the worst false negative) is used to calculate the score. This is most the most stringent way too look at signatures and require full conservation in the target group and no trace of the sequence in the background group for high scoring. Alternative scores based on average values can be used. If you select a single genome as the target group, you will highlight what is unique for this genome.
The Signature Table Tab
In this tab, fragments with different ranges of biomarker score can be sorted out and analyzed. | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202125.41/warc/CC-MAIN-20190319183735-20190319205735-00024.warc.gz | CC-MAIN-2019-13 | 9,413 | 24 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.