url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://docs.blackberry.com/en/endpoint-management/blackberry-uem/12_18/administration/network-connections/airprint-airplay-profiles/airplay-profile
code
Create an AirPlay profile - On the menu bar, clickPolicies and Profiles. - ClickNetworks and connections > AirPlay. - Click . - Type a name and description for theAirPlayprofile. - Click in theAllowed destination devicessection. - In theDevice namefield, type the name of theAirPlaydevice you want to provide the password for. You can find the name of theAirPlaydevice in the device settings or you can look up the name of the device by tappingAirPlayin the Control Center of aniOSoriPadOSdevice to see a list of availableAirPlaydevices near you. - In thePasswordfield, type a password. - Click in theAllowed destination devices for supervised devicessection. - In theDevice IDfield, type the device ID of theAirPlaydevice you want to allow supervised devices to connect to. You can find the device ID of theAirPlaydevice in the device settings. Supervised devices can connect only toAirPlaydevices in the list.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816864.66/warc/CC-MAIN-20240414033458-20240414063458-00458.warc.gz
CC-MAIN-2024-18
911
10
https://flyingbuttresses.wordpress.com/2009/03/19/status/
code
I’ve been using Facebook since I was in my third year of university, at Queen’s. That was about 4-5 years ago. Back then it was a social network only opened to other students, at various universities across North America. Now I believe there is something like 175 million users? Its opened up communication lines that it is no longer surprising when old teachers, and elementary school enemies add you as a friend. And sometimes you will click through photos of people who don’t know and there isn’t a delayed reaction of is this creeping…I mean, they are public. Good and bad is what I’m saying. It also got me thinking, I’ve been blogging for just as long, but why all of a sudden I am bored with blogging and hanging around Facebook more? Is it because now with the status updates I can say what I want in 150 characters or less? Therefore, it is just laziness? I mean the things going around Facebook now (the quizes, etc) are in no way revolutionary. Anyone who has been around the internet has done the What Colour Are You quiz. Is it the immediacy of it then? Is blogging really dead? I have to go change my status. Oh, and I’m purple, if you’re wondering.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647768.45/warc/CC-MAIN-20180322034041-20180322054041-00248.warc.gz
CC-MAIN-2018-13
1,181
7
http://forum.xda-developers.com/showthread.php?p=48743133
code
[Q] How can I fix a Security Error on LG Optimus Vu II - F200K? I have an Optimus Vu 2 (F200K), which I rooted via the universal 4.1.2 method found in the XDA Developers forums. After downloading an update, I experienced an error, after which the phone is stuck in a bootloop showing Security error. Please help me fix it. The specs of the Vu 2 are: 1. 1024*768 [4:3] 5" screen. 2. 2 GB RAM 3. 1.5 GHz Dual-Core Krait CPU 4. Adreno 225 GPU 5. Android 4.1.2 Jelly Bean So, can anyone suggest a fix? Please reply quickly. After randomly pressing keys, I got this screen. What does it mean? The link to the image is: i40.tinypic.com/2je4qe1.jpg
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609530131.27/warc/CC-MAIN-20140416005210-00253-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
641
9
https://www.chryp.to/points/
code
Points & Ranks On Chryp.to you’re rewarded for site interactions such as creating a profile, uploading a cover image, as well as for your posts and comments. You can use your collected points to pay for products and services on the platform – as well as with our partners. You can also transfer any amount of points to another member: %rank_logo% %rank% %min% – %max% No instances found for this point type Leaderboard is empty
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526807.5/warc/CC-MAIN-20190418201429-20190418223429-00281.warc.gz
CC-MAIN-2019-18
433
7
https://mollyhetheringtonrauth.com/blog/2019/5/27/neon-open-access-data-to-explore-our-ecosystems-highlights-the-need-to-incorporate-data-science-skills-for-reproducible-research-in-to-biology-course-curriculum
code
The National Ecological Observatory Network (NEON) is a NSF funded project designed to "characterize and quantify complex, rapidly changing effects of ecological processes across the US" over a 30 year time-frame. The data collected is intended to be used by "scientists, educators, planners, decision makers and public to map, understand and predict the effects of human activities on ecology and effectively address critical ecological questions and issues." (https://www.neonscience.org/about). The data collected by NEON is diverse and extensive. The NEON project monitors 45 field sites located across the United States including Alaska, Hawaii and Puerto Rico and collects both biological and physical data important to understanding ecosystem functioning. I wanted to explore the NEON datasets to better understand how the data could be accessed and used (potentially in a classroom setting or for a course project), so I created a mini-project for myself. In my mini-project I explore the geographic distribution of ticks species and the pathogens they carry that can have consequences for human health across the United States. My code and analysis can be found on my github (here & here). Below I document some of the potential challenges to access and use the data and the skills that are required to overcome these challenges. My experience highlights the need to incorporate data science skills that allow for reproducible research (computer coding literacy, data formatting, cleaning, filtering, and analysis) into biology course curriculum. Challenge 1: Downloading and aggregating the data It is easy to download the data directly from the NEON site (see figure 1); however upon opening the downloaded folder you are faced with a multitude of zip files. In fact there is a zip file for each site/year combo (that can be upwards of 200 zip files!). Within each zip file there is a minimum of (1) a csv file with the data for that site and year, (2) a csv file providing information of the variables in the data csv, and (3) a text file that provides details of the data and data collection methods. To get a complete dataset, the lines of data from each data containing csv file must be aggregated together—a task (like so many others in current biological research and data management) that would be tedious if done manually. (Plus what if you make a mistake and have to start all over again or accidentally skip a csv file!) Luckily, as part of the NEON project, NEON researchers create tutorials on how to use and analyze the data. Tutorials can be found here. Among these tutorials are ones that demonstrate how to download and aggregate the data using either R or Python languages. In fact NEON researchers developed a NEON specific library for R and NEON specific module for Python. This makes the data easily accessible for students and researchers who are experienced in R or Python. Additionally, another benefit of these tutorials is that although they are intended to be used with NEON data, the concepts they teach can be used to solve other programing and data analysis tasks. Because I wanted to practice my Python skills, for my mini-project I wrote a custom python script to aggregate the data after I downloaded the data from the NEON site. The script unzips each folder, pulls the lines of data from the data csv file, and aggregates them into a single variable that is then written to a csv file (see figure 2). Challenge 2: Managing large-scale datasets Once aggregated across sties and years, the completed dataset will have upwards of 5,000+ lines of data. Once again, this amount of data is not easily manageable without reproducible workflows documented and performed in R or Python for example. For my mini-project, I performed my data analysis in R (the repo for this analysis can be found here). I relied on the R library dplyr, which is a SQL-like toolkit. With the functions in dplyr I was able to filter and summarize data easily in order to answer my questions. See figure 3 for some ideas on the types of questions you may want to ask yourself when filtering and summarizing data. I also created a SQLite database, allowing me to query the data using SQL (the repo for this can be found here). The NEON project is awesome! It provides real ecological data that students and researches can use to generate and answer ecological questions. However, it also highlights the need to incorporate data science skills that allow for reproducible research (computer coding literacy, data formatting, cleaning, filtering, and analysis) into biology course curriculum. Without these skills the data and insights from the data are not accessible.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316785.68/warc/CC-MAIN-20190822064205-20190822090205-00142.warc.gz
CC-MAIN-2019-35
4,683
11
https://www.ycombinator.com/companies/discz/jobs/nbld2ml-data-scientist
code
What Is Discz? Discz is an app for Gen Z to connect around music and culture, but with the expression and playfulness of the myspace and mixtape era. We provide a digital world where you can find your communities and build fully customizable spaces to show off your interests. We’re looking for someone who is excited to lead the charge on helping us better understand our users through data. The ideal candidate is someone who can not only look at data but tell a story from it. Someone who gets excited around data and proactively shares their ideas to influence marketing, growth, product, and more. Whether that’s looking at internal user engagement or external third party data, we’re looking for someone who is passionate about influencing our company strategy from their insights. We’re a culture that thrives on pairing data with creativity, combining the two to shape every effort we make. - Pull and analyze data to understand the “why” behind consumer actions - Create dashboards to help others visualize user engagement - Prototype content ranking algorithms - Shape growth effort strategy and track progress and success - Provide guidance for simplifying the user journey and building virality - Implement measurement to track impact of marketing efforts both in market and in product - Analyze of user cohorts per advertising channel - Driving strategic marketing and product recommendations based off user engagement - Competitive analysis + assessing impact of trends on the business - 3+ years of working as a data analyst, or related role - Strong competency in SQL, Python, and R - Can proactively create an insights roadmap and manage requests from cross functional partners - Able to structure user data in a systemized way so it can be viewed comparatively to other features or product launches - Has a deep understanding of combining data sources (e.g. merging data across backend DBs, amplitude, & Google analytics) - Strong communication skills to influence key partners - Able to think holistically and can influence others to buy into your strategy If you’re excited to learn more, please include your resume and a brief sentence or two about why you’re interested in Discz in your application.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100523.4/warc/CC-MAIN-20231204020432-20231204050432-00254.warc.gz
CC-MAIN-2023-50
2,237
22
https://www.paulmcafee.com/experiential_learning_activities/more-about-academic-integrity-in-our-changed-world
code
"NUS students get zero marks for cheating on take-home exam" As students take more college courses online, either fully or in a hybrid seated+online configuration, getting the students to maintain academic integrity increases dramatically. It simply is too easy for a student to cheat if they are taking an exam or writing a paper online with no oversight -- i.e., without proctoring. Why does this matter to me? Two simple reasons: Students who study to learn the material feel cheated by students who collaborate or plagiarize on exams. - Some students -- think nurses, accountants, engineers, doctors, and other professional practitioners -- will be expected to have actually learned what they studied when they start to practice medicine, design buildings and bridges, or handle corporate and personal accounts. - In a recent year, partway through a semester in a capstone strategic management course I taught in Singapore, I was talking with my students about academic integrity. One student raised his hand and I called on him. He said, and this is a verbatim quote: "Professor, it isn't cheating if you don't get caught." This actually happened! After discovering that exam scores were significantly higher -- i.e., 20% or more higher -- with online multiple-choice question (MCQ) exams, I did an experiment in one of these capstone courses. I put a low-stakes MCQ exam online, scheduling it to be open for 30 minutes during a regular seated class session. The exam was intended to be taken independently, not collaboratively. The students had ten minutes to complete the exam during the 30-minute window. They started in the classroom, and then could go wherever they wanted to complete the exam during that 30-minute window. I gave the students a countdown to the start of the exam, and the second the exam window opened, about 75% of the students ran out of the classroom to the tables in the hallways to form groups to take the exam together. The remaining 25% of the students stayed in the classroom. I had told everyone that they should take the exam the way the normally would, so they did. One group at a large table had a single student take the exam during the first 10-minute block and watched that student, advising him if he was unsure of the answer. When he finished they regrouped into three smaller groups and then watched and advised the one student in their smaller group has he or she took the exam. Finally, the remaining students went to their computers to take the exam in the last 10-minute block, with the students who had completed the exam watching and helping. I knew this behavior existed from a few years back, when I discovered extremely high scores on a Masters-level online exam that -- are you ready for this -- nursing students were taking. Eventually, one of the students in the class complained. To her -- she had studied hard for the exam and had taken it by herself as instructed -- it was unfair that other students had high grades without actually learning the material. She had observed students in her class taking the exam in teams at computers in the library. Many of my friends feel it is unfair to use plagiarism checking tools, or online exam monitoring tools. We would proctor the exam in the classroom. Why should we not proctor it online? And how do we treat the students who learn the material who feel cheated by the students who do not learn but plagiarize or get help during online exams? Of course, we could stop giving MCQ exams. But students can cheat in online essays or open-ended question exams just as easily. I use the MCQ exams only to confirm that the students are reading and understanding the course material. I even give the students the subject of every question on the exam a week ahead. These exams account for a relatively small portion of the final grade. If I catch a student cheating on one of these, the student most likely will fail the course. But I need the monitoring tools for online exams to catch the cheating. (And yes, I use question pools and random question delivery to limit cheating. I've had a student answer a write-in question that wasn't on his delivered online exam because someone else had told him the question that the other student had received and this student gave the answer to that question.) I use Project-Based-Learning methods with students working together all semester in teams. We could just give team-based grades. But if you teach, you know there are a lot of social loafers who expect the other team members to do the work, but expect the same grades as their team members. I hate online exam monitoring. We must use it; out of fairness to students who try to learn the material, and because students will be expected to know what we teach when they start their careers. This article, about online cheating in an Engineering program at the National University of Singapore (NUS), illustrates the problem. Congratulations to NUS both for giving the students zero grades, and noted their academic integrity failure in their permanent records. If we sanction students for cheating, and have ways to identify cheating, we may be able to reduce the "It isn't cheating if you don't get caught" mentality. #college #highereducation #academicintegrity #integrity #honesty #onlineeducation #onlineexam
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816939.51/warc/CC-MAIN-20240415014252-20240415044252-00480.warc.gz
CC-MAIN-2024-18
5,309
14
https://www.mail-archive.com/[email protected]/msg255117.html
code
Hi All, I know that a class can only inherit from one other single class in PHP, but how would I go about simulating a multiple class inheritance? For example, if I had several small classes that dealt with things like form generation, navbar generation, etc, how could I create a class in which these all existed? Or am I thinking about this the wrong way? Should I have keep the smaller classes, and have one larger object containing instances of each as and how are necessary? I've used classes before, but I'm fairly new to class inheritance, and more particularly, the complex inheritance like I describe here. Thanks, Ash http://www.ashleysheridan.co.uk
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511175.9/warc/CC-MAIN-20181017132258-20181017153758-00298.warc.gz
CC-MAIN-2018-43
659
2
https://practicaldev-herokuapp-com.global.ssl.fastly.net/ahferroin7/comment/ipjh
code
Pretty much anything I don't use on at least a weekly basis. I usually check manpages first though when that's an option, because I can often find what I'm looking for that way far faster than I can with Google. FWIW, of the languages I've used, I found myself doing it more with JS for core language functionality (that is, stuff that's part of the ECMA standard in this case, as opposed to web API's) than any other language I've tried, even stuff as 'out there' as Erlang or Perl in terms of syntax. And I know quite a few other developers who would almost certainly say the same, which really says something about JS IMO. Yeah I would second that; JS tops it out of all the languages I use. We're a place where coders share, stay up-to-date and grow their careers. We strive for transparency and don't collect excess data.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144429.5/warc/CC-MAIN-20200219214816-20200220004816-00231.warc.gz
CC-MAIN-2020-10
826
5
http://cheatingdome.com/pc/notimetoexplain-cheats.htm
code
|Achievement||How to unlock - Beat the scrolling shooter segment without dying, as a dinosaur. - Eat every fatcake in fatcake universe with a hamburger for a face. - Dance to the first boss don't stop for nothing. - Beat Rejected Green Clone universe in under 2 minutes wearing a monocle and top-hat. - Finish first Shotgun universe in under 60 seconds - Play through straightjacket darkness universe without dying, with a horse head. - Finish the whole damn game. You are able to put your Question about No Time to Explain online. Other CheatingDomers can see your Question after it has been posted and are able to Answer it.
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982964275.89/warc/CC-MAIN-20160823200924-00135-ip-10-153-172-175.ec2.internal.warc.gz
CC-MAIN-2016-36
626
9
https://ourdjtalk.com/djchat/budget-mixer-choice.51249/page-2#post-696247
code
This is a constant saga...Hahaha what have I awoken here? You guys got beef? Are you trying to use that mixer to run Serato DJ? Or an old copy of Scratch live?Ok on a side note i just got a rane tt57sl and need help on how to get firmware update . rane does not have it in their relic page I read if it gets firmware update it will work in new live If you are using another device to power serato, that's the equivalent of Steve's suggestion. You're basically just using the Rane as analog. It's a well built mixer. It'll work well like that.So I hooked up my ds1 and its perfect .my main goal was having great sliders , I have dicers so I'm not losing anything .
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539101.40/warc/CC-MAIN-20220521112022-20220521142022-00184.warc.gz
CC-MAIN-2022-21
663
4
https://karenscancer.blogspot.com/2007/05/first-colonoscopy.html
code
Yesterday (May 2nd) my wife had a colonoscopy. The found a small tumor about 30cm into her colon. All other parts of the colon are within normal limits. The rectum is normal (thank God). So this was a good outcome. The tumor is not the size of a bowling ball or anything. It's about half the diameter of her colon. I guess she just was unlucky that it grew so quickly through the wall and went to the liver. They biopsied the mass and marked it with dye. Last night she had a fever of 101.5 and after calling the doctor, took some tylenol and it went down.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828356.82/warc/CC-MAIN-20171024090757-20171024110757-00106.warc.gz
CC-MAIN-2017-43
556
2
http://dobeash.com/rebdb.html
code
REBOL Pseudo-Relational Database RebDB is a small but highly efficient RDBMS written entirely in REBOL/Base syntax, meaning that it will run on any platform that REBOL/Core runs on. - Works out of the box do %db.rto your script and you are ready to go. No marathon installation/configuration/tuning sessions required! - Native REBOL storage Your data is stored and accessed as REBOL values which means that you have the full range of REBOL data-types at your fingertips! - Plays well The dozen or so functions that drive the database behave like any other REBOL function, accepting and returning REBOL values as you would expect. - Lean and mean The entire distribution weighs in at less than 20Kb of highly optimized and tuned REBOL/Base syntax. It can blaze through millions of rows a second! - No indexes RebDB loads an entire table into memory and ensures it is sorted when needed. This simple technique makes indexes redundant as RebDB is able to directly access rows in large chunks! - No locking RebDB serializes all requests. Not having to worry about locking means we can crunch through statements at a far greater rate.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991759.1/warc/CC-MAIN-20210510174005-20210510204005-00561.warc.gz
CC-MAIN-2021-21
1,129
14
https://supportforums.cisco.com/t5/service-providers-documents/how-to-see-which-table-and-rdrs-are-used-for-each-report/ta-p/3119248
code
Probably you asked yourself sometimes how to do this, and then tried to find in user guides. Well there is a much easier way to see this. In the installation directory go to: (this is an example for version 3.1.5) C:\Program Files\Cisco SCA\SCA BB Console 3.1.5\plugins\com.cisco.p3.apps.scasbbtemplates_220.127.116.11\templates there you will have a list of all reports you can see in Reporter on SCA BB Console. If you enter the directory of specific global report, you will find a definition in xml file for each report. If you open this file (and do not modify it) you will see at the end of xml file something like this:
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934804610.37/warc/CC-MAIN-20171118040756-20171118060756-00461.warc.gz
CC-MAIN-2017-47
625
6
http://matitalabs.com/2012/04/14/mobile-layout-bookmarklets/
code
I often need to view a web page I’m viewing on my desktop as I was on a mobile screen. I used to manually resize the browser but I could not have a reference on which size should have the browser to be like a tablet or a smartphone. So I’ve done myself some simple bookmarklets that open the page I’m viewing in a browser page of the correct size. Here they are: If you think they can be useful drag them to your bookmarks bar. I use to put them in a “Screens” folder in my bookmarks bar. If just resizing the browser isn’t enough and I really want to know how a webpage is viewed on a smartphone and don’t want to write the entire URL with the uncomfortable virtual QWERTY, I show a QR code of the current page by using this bookmarklet: After i did them I found Bricss uses a similar way to show how the webpage appears in different screen sizes. That’s interesting too, because it allows you to see how a webpage appears on different screens at once.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588242.22/warc/CC-MAIN-20211027181907-20211027211907-00519.warc.gz
CC-MAIN-2021-43
969
9
https://en.wikipedia.org/wiki/User:Russia_Moore
code
Russia Moore is a Wikipedian who likes animals, history and many other things. Russia has a great fear of being stalked online, and so gives out very little personal information whenever possible. Due to many real-life obligations, Russia Moore would like to apologize should any comments or responses not be attended to in a timely fashion. Russia finds it amusing writing in the third person, apparently. Hmm. New hobby. Rather than taking the time to actually write something, it has been found exceptionally fun to make an annoying list of Userboxes and let small rectangles explain everything.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141396.22/warc/CC-MAIN-20200216182139-20200216212139-00275.warc.gz
CC-MAIN-2020-10
598
2
http://www.gmu.edu/schools/vse/seor/studentprojects/graduate/2011Fall/Clean_Team/Final%20Presentation%20Slides_FINAL_files/slide0131.htm
code
Why CPN Model? Good way to capture the important aspects of the system as it related to our study Provided a way to look at different charging scenarios and seeing their impacts on a circuit Allowed for visualization of the effects of plug-in vehicles on a circuit. You could see the model react.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886476.31/warc/CC-MAIN-20180116164812-20180116184812-00084.warc.gz
CC-MAIN-2018-05
296
7
https://mail.python.org/pipermail/docs/2013-May/015161.html
code
[docs] Bug: multiprocessing documentation naroom at gmail.com Tue May 21 20:14:36 CEST 2013 126.96.36.199. Synchronization between processes Sample code doesn't work, as processes may exit before releasing the lock. Adding a join() on each process fixes the problem. Corrected code below: from multiprocessing import Process, Lock def f(l, i): #single process executes the block at a time print 'hello world', i if __name__ == '__main__': lock = Lock() #spawn 10 processes, each with an arg that says their index for num in range(10): p = Process(target=f, args=(lock, num)) Thanks for maintaining the doc, for the betterment of all mankind! -------------- next part -------------- An HTML attachment was scrubbed... More information about the docs
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669225.56/warc/CC-MAIN-20191117165616-20191117193616-00132.warc.gz
CC-MAIN-2019-47
748
19
http://store.steampowered.com/news/4062/
code
Team Fortress 2, Counter-Strike: Source and Day of Defeat: Source Updates Released Product Update - Valve Jul 13, 2010 Updates to Team Fortress 2, Counter-Strike: Source and Day of Defeat: Source have been released. The updates will be applied automatically when your Steam client is restarted. The major changes include: Increased the resilience of client/server data table mismatches when playing back demos. This will make most old demo files playable again, but with potential visual side effects Team Fortress 2 Added map to the default mapcycle and motd files. Fixed a server crash issue related to increased maxplayer servers. Fixed a couple Engineer building exploits. Updated the localization files. Improved the performance of the critboost particle effect. Fixed a server crash related to carrying buildings at round start. Fixed players picking up buildings before a round has started. Fixed an exploit where Engineers could create level 3 mini-sentries.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948596115.72/warc/CC-MAIN-20171217152217-20171217174217-00549.warc.gz
CC-MAIN-2017-51
966
14
https://www.montash.com/job/fullstack-developer-7/
code
Position: Senior Fullstack Developer Start Date: ASAP Location: Southern Germany (2 days remote/home working) Duration: 12 Months - extension possible Currently working with a World Leading Automotive client looking to bring in an experienced Fullstack Developer on-board. Your Current Profile: - High performing software engineer/developer responsible for maintaining and enhancing business critical platforms and deliver high ROI business features. - Build expertise in the team and position for platform enhancements - Understand the architecture of the existing applications and develop features solutions for the full stack; UI, Java-based back-end, database and messaging - Work collaboratively in an Agile Feature team setup with team members located across different locations and time zones. - Have a strong focus on time and resource-management, decision-making and ability to operate with parallel project deliveries. - Monitor production activities/processes to ensure timely and effective reporting, tracking, follow-up and communication of problems to internal and external clients, technical resources. - Clean code, TDD, code review, and problem solving. - Develop new skills to contribute as a multi-functional team member (potential areas for secondary skills: Angular, Cloud readiness, Security, Monitoring and Measuring Tools). - At least Bachelor's degree in Computer Science or equivalent. - Minimum 4+ years of Java design and development skills. Must have strong analysis (both requirements and system) and design skills. - Expertise in application, data, integration and infrastructure architecture disciplines. - Strong experience with performance testing, performance test tools, investigation and resolution. - Expertise in Spring, ORM tools, MQ, Java Multithreading, Security and Performance, RESTful webservices, XML, JSON, and Apache+Tomcat. - Experience in writing, maintaining, performance tuning in SQL and PL/SQL (Oracle preferred), and the ability to write complex SQL, understand complex procedures and triggers. - Current experience in applying Test Driven Development techniques (jUnit, Selenium, Fitnesse or similar tools). - Experience with job scheduling technologies like Autosys and Control-M. - Passionate about technology, problem solving, learning new skills, sharing expertise and knowledge. - Excellent analytical and communication skills with the ability to communicate complex issues in an easy to understand manner. - Experience with Agile processes - Knowledge with AWS (Lambda functions)
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046155188.79/warc/CC-MAIN-20210804205700-20210804235700-00614.warc.gz
CC-MAIN-2021-31
2,541
26
https://community.spiceworks.com/topic/239125-how-to-blacklist-a-directory-path-from-being-scanned-for-applications
code
We control application installations on OSX machines by "disabling" them by moving them to restricted directories. We want to restrict the scanner from scanning these directories so we get an accurate reading on application installations and licenses. Is there a way to fine tune the scanning to blacklist these directories? Unfortunately there isn't a way to disable specific directories from the network scan. Sorry for any inconvenience this may cause, but let me know if you have any other questions. How does the scan work exactly? Does it scan the entire hard drive? Does it skip over ANY types of files? What if I made the files or folders invisible with a chflag command? Would those be visible to the spiceworks scan? Sorry for not responding sooner, I didn't get the notification for this topic! We scan the software using SSH so basically send a command to that machine to grab all of the software titles. It doesn't actually scan individual directories or files, just grabs back what the machine reports via SSH. Hope that helps! I tested with invisible files and it didn't work. I set the files to hidden with the chflags command and then did a manual rescan of the machine. I'd like to try with moving disabled apps to a sparsebundle dmg so that spiceworks can not scan it. Can you explain more about the command that is sent via SSH for grabbing the software titles? There doesn't seem to be a lot of info about how this happens on the Mac side of things. I'd like to understand how this works to make it work in our environment better. Does it hook into spotlight at all? Sure thing. Basically Spiceworks sends the following command via SSH to the Mac: Which in return lists all of the installed applications on the machine. If you would like to see that full list, what you can do is navigate to that device within inventory, hover over the Wrench, then choose "rescan." What that will do is spit out a verbose log under C:\Program Files\Spiceworks\log called finder_re.log with full details about what is happening during the scan on that single device. If you do a find for the above command, right after it lists all of the applications that are found in the System Profiler. To be honest, I'm not sure how you'd be able to exclude certain applications as once they are installed and added to the system profiler, I don't believe there's a way to hide them other than to just remove them. However, I hope the above information gives you what you need.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988721595.48/warc/CC-MAIN-20161020183841-00293-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
2,471
10
https://forum.aspose.com/t/datetime-footer-not-updated/77285
code
We are generating slides from MS-PPT provided layouts. The footer with DateTime is not updated automatically on slide generation. It shows date time of file creation/ layout creation. Please find attached sample files. The Footer_Backgroud_ppt.pptx is layout used to generate the slide. The Footer_Output.pptx is generated file which shows footer with date 10/9/2012… (It should be 10/11/2012). Code to create slide: LayoutSlideEx ls0 = ProcessingPresentation.LayoutSlides.GetByType(SlideLayoutTypeEx.TitleAndObject); Hope data provided is sufficient to analyze and reproduce issue at your end. Thanks and Regards,
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879673.14/warc/CC-MAIN-20201022141106-20201022171106-00506.warc.gz
CC-MAIN-2020-45
616
10
https://medium.com/@lib_hip
code
You own the rights to the content you create and post on Medium. Our component is opinionated about data structure but has no way of expressing those opinions. This component will break silently if the json endpoint change. Your markup components should state expectations of the data they require. PropTypes are great for this.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945082.84/warc/CC-MAIN-20180421071203-20180421091203-00620.warc.gz
CC-MAIN-2018-17
328
3
https://www.templateninjas.com/moto-cms-html-templates-type/41959.html
code
Moto CMS HTML Template is a full-fledged HTML website with Moto CMS (Content Management System) integrated for easy website editing and content updating. Each design element can be easily customized according to your project needs. The price mentioned here includes the Moto CMS license in addition to the price of a template and its source files. PHP v. 5.2 or 5.3; Zend Optimizer v3.3 (for PHP 5.2) or Zend Guard Loader (for PHP 5.3). Sources Not Included For uncompressing a template ZIP package: WinZip 9+ (Windows); Stuffit Expander 10+ (Mac), Hosting Requirements: PHP 5.4.04+, 5.5.09+, 5.6+ Zend Guard Loader.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347390448.11/warc/CC-MAIN-20200526050333-20200526080333-00058.warc.gz
CC-MAIN-2020-24
616
7
https://shop.sophos.com/collections/all/products/sophos-yeti-bottle
code
There’s more tech in this bottle than a Saturn V rocket. (Fun fact: In 1969, the cost of a Saturn V rocket, including launch, was just over $3 billion.) Anyways…keep your liquids cold or whatever with this thingy. - 18 oz vacuum insulated bottle with chug cap - Dishwasher safe Durable, double-walled construction *Not to be used with with carbonated beverages or for storage of food or perishables.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00844.warc.gz
CC-MAIN-2023-50
403
5
https://www.slideserve.com/remedios-petty/network-management-using-nfv
code
IK2200 Midterm Presentation. Network Management Using NFV. Group 2 UnnA Oct.22th.2014. Outline. Introduction Goal Approach Work Splitting Challenges & Problems 2nd Term Plan Current results and Video shows. Introduction. Project name:Network Management Using NFV Team Members: Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. Project name:Network Management Using NFV Define tasks and sub-tasks We have sub-groups to finish different sub-tasks. Virtual “physical” topology Integration between components Compute Node 2 Compute Node 1 Connectivity from Mininet to ODL OVSwitch Connectivity from the instance inside Openstack to Mininet Generate packet in Mininet Create a Tenant Network in Openstack A packet generator tool has been created in python which can generate following packet types: Integration of Openstack and OpenDaylight. Video1-Ping between OpenStack VMs and Firewall functions.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893397.98/warc/CC-MAIN-20180124050449-20180124070449-00599.warc.gz
CC-MAIN-2018-05
1,191
16
https://it.ifixit.com/Risposte/Visualizza/449437/Why+can't+I+view+the+videos+on+my+computer
code
Why can't I view the videos on my computer? I would record a video with my videodrone. When i connect it to my computer the video date is in 1979 and it wont play. How did i get the videos i record to play on my computer. Questa è una buona domanda?
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347407667.28/warc/CC-MAIN-20200530071741-20200530101741-00217.warc.gz
CC-MAIN-2020-24
250
3
http://whywontgodhealamputees.com/forums/index.php?action=karmamessage;u=56706;topic=23428;m=551726;start=0;sort=time;asc
code
Don't you see what's going on here. You are all blinded by this dellusion and the only reason this site is here is because satan has used it. And used some stupid question to de-convert a few weak souls and set them on the way to hell. SO satan glorifies some retarded question because he used it to steal a few people away so that they will eventually end up in hell. That's why this site and it's stupid question are here and being glorified by you - the dellusional weak children of the devil.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125532.90/warc/CC-MAIN-20170423031205-00058-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
496
1
https://torontoai.org/2019/05/28/d-what-is-the-effect-of-training-a-system-with-jumbled-up-feature-vectors/
code
[D] What is the effect of training a system with jumbled up feature vectors? An idea has been bouncing around my head today, and since I’m not very knowledgeable about ML I want to know if there’s any literature (or common sense from experts) about it. Lets say we have training examples consisting of (say) two features, color ( c) and size ( s), such that v1 = [c1, s1], v2 = [c2, s2], and vn = [cn, sn]. What is the effect of training a system with “jumbled” inputs vy, such that vx = [c1, s2] and vy = [c2, s1]? My immediate thought is that you can’t really give labels to jumbled training examples (it can’t be a cat if it has a horse’s head and a pig’s tail), but perhaps the system could learn a probability distribution of the labels based on the features included? Anyway, can jumbled training examples produce a model that is useful in any way? Is there any literature exploring this?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511000.99/warc/CC-MAIN-20231002132844-20231002162844-00371.warc.gz
CC-MAIN-2023-40
910
14
http://aatwow.fimlys.com/2008/02/29/rss-changes/
code
I have switched to using feedburner for RSS feeds. Please change your RSS URL to: or use the following…. (Also updated on sidebar now).. I’m doing this because I may soon be switching to a different host. I want to have a standard place for the feed so that if I move, you move with me 🙂
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189583.91/warc/CC-MAIN-20170322212949-00583-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
294
3
http://www.diaperswappers.com/forum/showpost.php?p=9838104&postcount=1
code
I cant reply to my fsot posts Every time I try to reply either to a person or to bump my fsot threads, I get this message... The following errors occurred with your submission 1. You did not enter a price for this listing. 2. You did not enter any shipping details for this listing. It happens whether I use the reply button OR the quick reply.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189032.76/warc/CC-MAIN-20170322212949-00072-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
344
6
https://forum.transmissionbt.com/viewtopic.php?f=7&t=17516&sid=f64f91af6a25bb7f4fbff4410d8613c6
code
Feature requests for the GTK+ version of Transmission - Posts: 1 - Joined: Tue Nov 03, 2015 9:09 pm I think it would be really nice if Transmission would sort filenames in natural sort order, that is keeping numerical order intact even if numbers don't have leading zeros. So, instead of the current behaviour: I'd (and probably most people) would like to see this: Theres a function in GNU libc called strverscmp that sorts exactly like this , and it even is used in other GTK+ programs (as far as a quick google tells me), so it should be possible to lift the code from some other FLOSS project.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154471.78/warc/CC-MAIN-20210803191307-20210803221307-00104.warc.gz
CC-MAIN-2021-31
597
7
http://www.bikeforums.net/bicycle-mechanics/63123-click-click-click-driving-me-nuts.html
code
I have an '04 Specialized Expedition Sport. The last couple days of riding have introduced a very annoying clicking sound. It sounds like the left pedal is hitting on something whenever it's at its apex. I've looked and it's not even close to hitting anything. This didn't happen for the first week I rode the bike, just in the last couple of rides. No clicking when coasting or at any other point in the pedals travels other than the apex of the crank rotation. What should I be looking for? Thanks in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464054526288.74/warc/CC-MAIN-20160524014846-00064-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
511
2
https://2adultentertainment.com/?tag=bell
code
Tune in Sunday, December 21, at 8 p.m. ET/PT. When Rachel was 17 years old, her father, a well-respected pastor in their small town, took his own life. Rather than bury her feelings, watch how Rachel found power in owning her story. Find OWN on TV at http://www.oprah.com/FindOWN Oprah Winfrey Network is the first and only network named for, and inspired by, a single iconic leader. Oprah Winfrey’s heart and creative instincts inform the brand — and the magnetism of the channel. Winfrey provides leadership in programming and attracts superstar talent to join her in primetime, building a global community of like-minded viewers and leading that community to connect on social media and beyond. OWN is a singular destination on cable. Depth with edge. Heart. Star power. Connection. And endless possibilities. Discover OWN TV: Find OWN on your TV!: http://bit.ly/1wJ0ugI Our Fantastic Lineup: http://bit.ly/1qMi2jE Connect with OWN Online: Visit the OWN WEBSITE: http://bit.ly/1qMi2jE Like OWN on FACEBOOK: http://on.fb.me/1AXYujp Follow OWN on TWITTER: http://bit.ly/1sJin8Y Follow OWN on INSTAGRAM: http://bit.ly/LnqzMz Follow OWN on PINTEREST: http://bit.ly/1u0CqR6 The Power in Owning Your Story | The Rob Bell Show | Oprah Winfrey Network Uploads by OWN TV
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107863364.0/warc/CC-MAIN-20201019145901-20201019175901-00409.warc.gz
CC-MAIN-2020-45
1,268
16
https://www.learnvern.com/wordpress-tutorial/adding-categories-wordpress
code
Download the New LearnVern Android App and enter Lucky Draw to win Free Certificate Add Categories in Wordpress In today's video we are going to learn that how we can add Category in Wordpress. So for that we will first go to our dashboard and then to Posts section, and after that to it's Category section where we can add new category. We will first add a category named as 'php'. After that we will add another categories naming it as 'asp.net' and 'java'. Now to categorise any post into particular category, we will open that post's edit section and than select any one category from the three. This will get that post into the selected category section. So similarly we will add categories to different post and update them. Now if we click on any one category we will be able to see all the posts which are included in that particular category appearing all together in front of our screen. We can also give multiple categories to one single post, which means that, that post will display in all of the categories we selected. So this is how we can categorise posts in Wordpress in very easy manner. Have a friend to whom you would want to share this course?
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362287.26/warc/CC-MAIN-20211202175510-20211202205510-00331.warc.gz
CC-MAIN-2021-49
1,165
11
https://community.nethserver.org/t/backscatter-mails-not-catched-by-mail2/10231/20
code
Is possible to manage these messages with greylisting? old website but still actual http://www.dontbouncespam.org/ I think that greylisting gets a different kind of approach. Error 4.x.x is a temporary reject during delivery to Postfix. If it’s legitimate message, the MTA will try again in a correct time. The greylisting should be bypassed when : - the message comes from an already know legitimate server as assured by SPF - the message comes with verified DKIM key - DMARC says “'verythingallright, pal!” Mailling list could send your email from a not allowed IP Sometime DKIM key is badly formated and you cannot verify Not all servers use a really restricted dmarc policy, sometime it is really relaxed and in failed case you have no recommended action . In short we have no absolute weapon I think you are right @stephdl : we should simply not bounce mails « back » to spammers, at least not those with a very high score. Maybe that’s a postfix job but it has to rely on rspamd to decide wether a mail is spam or not. Maybe I’m wrong. Postfix has features to recognize and discard forged sender adresses. Are they used on nethserver ? From the official doc : http://www.postfix.org/BACKSCATTER_README.html#random By the way : It just came to my mind that that issue (spam mails bounced) already plagued me in the past : I use a smarthost that decides from time to time that I’m a spammer because I send too many non delivery notifications for spammers ! Read my post I wrote at that time on this board : Postfix sending non-deliveries notifications because of spam? That’s a real issue, we should handle it. Ok, maybe i am the dumb one now. @stephdl, in your opinion, what’s wrong, during the first connection during delivery, with a “temporary reject”? I guess graylist does not help in this case because the backscatter source will try the delivery again after the temporary rejection. Unless it gets blacklisted in the meantime… But we cannot rely on this event. I just ended up disabling rspamd, as it sent almost everything to spam folder probable as well as reject. It blocked online bill pay alerts, newsletters, you know, important emails. I just need to figure out how to get rspamd to learn from good emails it has marked as spam. I tried allowing the sender in the web gui but that did not work. To learn ham it should be enough to just move the good mails to the inbox. You need 200 hams to make the filter work. Thanks, I will give that a try! I agree. But also I can’t totally rely on that every backscatter source will try again the delivery. Get into a Blacklist is a matter of time. Therefore, during backscatter firetime i am not sure than all the spam sources will manage the delivery according to RFC and best practices for email servers. I think (and maybe i’m wrong ) that SPF could ease at least 30% of backscatter sources. So, still not absolute weapon but… maybe another little brick into the “keep the thrash out of servers” wall. Do I need to port forward sieve port since my mail server is behind a gateway? 200 spams/hams is an awful lot. I will keep on though! It depends, if you use webmail it shouldn’t be necessary. Not local clients like thunderbird may need it. ok I will add it…I use all non-local imap clients (bluemail on android and windows mail on windows). NethServer does not bounce emails. NethServer does not create backscatter. To fight backscatter received by NethServer (sent by other mail servers) you need to know which mail servers can send email for your domain and discard messages not sent by them, or you will lose legitimate bounces. This can not be done automatically. ATM, my only idea is to use http://www.backscatterer.org/ to refuse messages from server known to send backscatter. Reading the mail headers again, I believe that in that case you’re right : my user is actually victim of a backscatter mail, and therefore nethserver isn’t the culprit here. I misinterpreted the non delivery notification. However I’m pretty sure that nethserver does send non deliveries in case of spam. Please read again that thread : Postfix sending non-deliveries notifications because of spam? NethServer answers with smtp error code 554, you can check it sending you a gtube (http://spamassassin.apache.org/gtube/). I see. I thought that a 554 could generate backscatter but it looks like it is actually not the case. However, I’m positive that still there is a case where nethserver answers back to spammer, which triggers the anti spam policy of my smarthost. I’ll report back next time it happens. Regarding this backscatter potential issue. Look at this mail queue on a live system : The recipients are obviously not connected in any way to our business. MAILER-DAEMON indicates that it is our server that tries to answer them some delivery report… for a mail we never sent. How do you interpret this ? Personally I interpret this as the result of a backscatter attack involving our server. Thanks for your insight.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585181.6/warc/CC-MAIN-20211017175237-20211017205237-00609.warc.gz
CC-MAIN-2021-43
5,022
44
https://www.visionsgame.com/product/large-commemorative-obelisk-copy/
code
A commemorative obelisk placed in one of the currently available cities with a small infopoint with the text* of your choice. Text could include a memorial to a loved one, a favorite scripture, a word of encouragement to players, or your company name. (Text must be approved.)Small Obelisk = $1000 Medium Obelisk = $2000 Large Obelisk = $3000 A small obelisk shaped statue about half the size of the play-character. A medium obelisk shaped statue of similar height to the play-character. A large obelisk shaped statue about twice the size of the play-character.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585171.16/warc/CC-MAIN-20211017082600-20211017112600-00477.warc.gz
CC-MAIN-2021-43
561
4
https://www.elitetrader.com/et/threads/an-ib-api-question.237361/
code
I am trying to learn IB API interface and test and modify some of my strategies. I can download historical data through Excel DDE in IB. I also use scale trader in TWS for my trades. Now my question is how I can feed the loaded data to the existing scaletrader in IB for backtesting? If yes, how? Is there any tutorial on how to do it? Should I also write my own scale trader program? I know it is a basic question for those who constantly use API and backtest theor system.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864186.38/warc/CC-MAIN-20180521122245-20180521142245-00378.warc.gz
CC-MAIN-2018-22
474
1
https://forum.espruino.com/comments/13400200/
code
I was wondering about an accelerometer - the issue really is price (and also board space). If I can source a cheap magnetometer + accelerometer chip that handles both then possibly, but I think it's unlikely I'd change it for a while. I guess potentially there might be an uber-puck that comes with loads of sensors (especially when the BME680 environment sensor finally gets released), but I wonder whether that'd be popular enough to justify it. MicroBits do use a Nordic chip, but an older, cheaper one. There's very little RAM available, and it can't connect to other devices. However you can still connect to it (even from a Puck) and can do some fun stuff. © Espruino, powered by microcosm. Report a problem
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499819.32/warc/CC-MAIN-20230130133622-20230130163622-00654.warc.gz
CC-MAIN-2023-06
714
5
http://stackoverflow.com/questions/22824794/python-overflowerror-math-range-error
code
I'm new to Python and i'm having trouble with this: Traceback (most recent call last): b = 1-exp(n)*erfc(n**0.5) OverflowError: math range error I need to calculate 'b' for ever increasing values of 'n' and i don't know what to do to solve this problem. Can someone please help?
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097730.92/warc/CC-MAIN-20150627031817-00089-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
278
6
https://experiment.com/u/7Lju2A
code
About This Project I'm interested in how stingrays, with jaws made of cartilage, consume tough or stiff prey like insects, crabs, and mollusks. I use high-speed videography and measure bite forces to analyze how rays use their jaws to eat tough prey. These freshwater rays invaded South America 30+ million years ago and diversified to feed on a variety of prey. How does feeding specialization evolve and what does it look like? Browse Other Projects on Experiment Performance-enhancing substances: How do male black widows use chemical cues to gain a competitive advantage? For a male black widow spider, life is a series of deadly challenges. He must first make a dangerous...
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.56/warc/CC-MAIN-20211020024111-20211020054111-00216.warc.gz
CC-MAIN-2021-43
679
5
https://docs.uipath.com/orchestrator/v2020.10/docs/release-notes-2020-10-17
code
Release date: 3 August 2022 - The design of the GetAssetByNameForRobotKeyendpoint caused requests to timeout when each robot had multiple assets. This has been improved. - Accessing the Orchestrator Host Feed in Studio resulted in the following error: “Failed to retrieve metadata from source”. This happened because the Libraries > Secure deployment setting and the corresponding value in the Orchestrator database were opposite. Upon upgrading to this Orchestrator version, the default Libraries > Secure deployment setting is to allow public access to the libraries. For fresh installs, the default Libraries > Secure deployment setting is to allow only authenticated user to access the libraries. Updated 3 months ago
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710237.57/warc/CC-MAIN-20221127105736-20221127135736-00874.warc.gz
CC-MAIN-2022-49
725
8
https://stackoverflow.com/questions/4097432/which-is-the-default-location-for-keystore-truststore-of-java-applications/15674540
code
I am writing an application that uses SSL. Hence, I have a dummy keystore and a dummy truststore I want to supply to my customer. Is there any default folder to put them inside my distribution? e.g. docs, lib, bin...etc. Where is usually the keystore put on the server and where is usually truststore put on the client?
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585518.54/warc/CC-MAIN-20211022181017-20211022211017-00341.warc.gz
CC-MAIN-2021-43
319
1
https://en.softonic.com/author/jason-savard
code
Jason Savard Apps Featured app for Windows - (252 votes) Desktop notifications for your Facebook messages Facebook Chat Notification for Google Chrome sends you notifications when you receive Facebook messages. They appear on the desktop in the form of dialog boxes with the name of the person sending the message. It will alert you when someone wants...
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.13/warc/CC-MAIN-20240222161802-20240222191802-00717.warc.gz
CC-MAIN-2024-10
354
5
https://groups.google.com/g/jenkinsci-ux/c/3f9lcwLkdXE
code
I have made a change on the Jenkins calendar proposing that we move the next UX SIG meeting from Sep 29, 2021 to Sep 15, 2021. The Sep 29, 2021 meeting would collide with DevOps World and a number of us will be attending that conference. I suggested agenda items for the Sep 15, 2021 session to include: - Pull request monitoring plugin demo and status - Simon Symhoven - Code coverage UI improvements - Ulli Hafner - Pipeline graph view plugin demo and status - Tim Jacomb Would that day work for others, or is there a better time and date?
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363641.20/warc/CC-MAIN-20211209000407-20211209030407-00306.warc.gz
CC-MAIN-2021-49
541
7
https://docs.daily.co/reference/rn-daily-js/instance-methods/destroy
code
You can re-use the call object multiple times (a sequence of join(), etc method calls will work fine). But when you are finished with the daily-js call object, you should call destroy() to free all resources associated with it. This is particularly important if you plan to create another daily-js object in the future. If you don't call destroy(), and later create a new daily-js call object, the event listeners from the old object and the new object will interfere with one another.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710765.76/warc/CC-MAIN-20221130160457-20221130190457-00757.warc.gz
CC-MAIN-2022-49
485
9
http://www.objectarchitects.de/insurance/people.htm
code
The people to follow are not a representative choice but those I know and who have a good web presence. If you want to be listed here drop me a mail. Ali Arsanjani does research on rules and rule systems and has also been the organizer of an OOPSLA 2000 Workshop on Business Rules Jens Coldewey: does consulting on product servers Ralph Johnson used to be interested in building insurance software, mostly using Smalltalk. He still does useful stuff for the domain, e.g. the Accounts framework and also the User Defined Products framework. He did this work together with Jeff Oakes. Wolfgang Keller: operates this site and is an architect at AMB Generali Informatik Joe Yoder (who also does database access layers) is another organizer of the OOPSLA workshop on Business Rules Lubor Sesera from softec Bratislava has also written patterns in the insurance domain (Recurring Duties Analysis Pattern)
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511406.34/warc/CC-MAIN-20231004184208-20231004214208-00456.warc.gz
CC-MAIN-2023-40
898
7
http://www.infoworld.com/article/2619234/it-jobs/the-strange-case-of-the-missing-servers.html
code
I was working for a large IT services provider, many of whose customers were large corporations, and we supported them remotely. As a result, we often did not know the physical location of customers' machines and often we knew only the people who worked directly with us. Plus, all of the work was supposed to be pre-approved by tickets, but all too often somebody would, without our knowledge, make changes. Our team supported software that automated and kept customers' crucial operations going. It had components running on several machines at once, and a server component was needed to communicate with so-called "agent" components on other computers. Communication took place over the customer's internal network using the TCP protocol, and the network link between components was crucial for operation. One customer requested we install a new environment, with a new server and about 20 agents. The new environment was installed over the course of several days, then we went into testing -- a phase that was planned to last about two months and that was a near replica of the production environment already in place so we could correct any problems before production. At first everything went well, until one day three agents stopped responding. Whatever we did, the server component could not communicate with them. We started performing standard network connectivity tests to see if the problem was with the agents themselves, with the machines on which they resided, or with the network link. We couldn't get any answer from the problem machines. The customer was a huge company, and we soon learned that although the entire testing environment was on the same private network, the physical servers resided in several different states in the U.S. We didn't know which state the problem machines were located in, so we called the customer's Unix team to check the servers; they told us the machines were up and running and there was nothing wrong with them. So it had to be a network problem. We asked the customer to diagnose the network problem, and they told us that network administration was the responsibility of another company. We promptly got in touch with them, and they assigned an engineer to troubleshoot the problem. The engineer told us to run some tests. We had already done these tests, but did them again and got the same results as before. He promised to get back to us. Days went by. We contacted the engineer again and received no reply. Our company's liaison with the client called the network service provider again. They assigned another engineer to diagnose the problem. He requested we perform the same tests as before. We did, and sent him the results -- and got no reply. This same process was repeated with yet another network engineer. Meanwhile, all testing on the environment had been halted, and the deadline for going into production was postponed. The customer's middle managers were furious and frantic -- postponing meant an incredible headache to them, and they started begging their superiors to mobilize resources to solve the problem. But apparently their superiors didn't care much, and the problem persisted. Finally, after about a month, the network service provider company gave us their answer: They had no idea what the problem was. All network switch links were operational, and testing showed no signs of a problem. It had to be a problem with the machines, but we'd been told by the customer that the machines were fine. We were baffled. The customer's top managers still didn't do anything to help figure out what was going on. Our customer liaison was going way beyond the call of duty to get the customer to find out what the problem was with their own machines. By opening unofficial lines of communication with employees working for the customer and by gradually gaining the trust of people in several departments, she was finally able to solve the mystery. It was simple: The problem machines had been moved from one physical location to another, without our knowledge. They should have been up and operational after two days' delay, but due to the customer's internal bureaucracy, they had been forgotten in a warehouse and were still sitting in their crates waiting to be turned on and plugged into the network. Since the customer's Unix team didn't have problem tickets opened for the machines, they assumed they were in working order, and this they told us without bothering to check. By the time this was discovered, the customer's testing phase had gone completely off schedule, and services that their company was scheduled to provide to their own customers had to be postponed, risking cancellation or renegotiation of contracts -- all because of a combination of bureaucratic inefficiency and neglect. From that point on, we became very wary and demanded from our customers proof at every stage of a job. And we learned not to trust anybody ever again, except the people who we knew were also suffering from the same problem. In short, we learned that many times in such large environments only the people directly affected by a problem are genuinely interested in solving it. Do you have a tech story to share? Send it to [email protected], and if we publish it, you'll receive a $50 American Express gift cheque. This story, "The strange case of the missing servers," was originally published at InfoWorld.com. Read more crazy-but-true stories in the anonymous Off the Record blog at InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120187.95/warc/CC-MAIN-20170423031200-00288-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
5,547
16
https://www.andybrocklehurst.com/blog/how-to-learn-to-make-wordpress-plugins
code
I get asked a lot about how to go about learning to make WordPress plugins. I usually point people towards courses on Udemy and when they see how many hours of learning it is... They give up. But I came across a tool this week that makes learning much easier, it does 80% of the heavy lifting for you and you could make money with this while you learn. Now if you have never even looked at code (like HTML, etc) then this isn't going to help you as much because you do need to have at least a basic understanding of how code "works". But if you've tweaked HTML pages, looked at the occasional PHP file, etc - this could work for you. Even I've picked up a copy as an experienced coder because it makes things so much easier. And the tutorials you get with it are crystal clear. For $17 (it's on special offer at the time of writing) this is well worth picking up.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891980.75/warc/CC-MAIN-20180123151545-20180123171545-00577.warc.gz
CC-MAIN-2018-05
863
5
http://www.beyondbullets.com/2005/10/powerpoint_20.html
code
Always on the look out for presentations we can critique, we thought we'd tackle this one: OK, I'll go first. The buffoons in the audience will clap anything. Now the presenter will get the wrong idea and probably think that he is good at presenting. In actual fact, it was a boring presentation. The presenter’s voice was a study in monotone. Lacklustre delivery doesn’t come close to describing it. The novelty of seeing the words just spoken by the presenter pop up on the screen immediately wore off after … well, there was no novelty there to start with. This gimmick reminded me of Bob Dylan's cue card "presentation" for Subterranean Homesick Blues. At the time, this was original and entertaining, but unfortunately has been done to death since 1965. Hell, I'm sure some people believe they can get even more mileage out of it! Verbose. Why spend 5 minutes explaining something relatively simple in a concise and compact way, when you can drone on for 15 mins and induce catalepsy in your audience members? Obviously the audience is techie, and the presenter has used appropriately techie language to communicate, so thumbs up for that. I’m struggling to figure out what the goal of the presentation was, though. Was it to impart information? Provide entertainment? Was it just designed as a get together/a nice chat? No subject was explored in any great depth, so the audience must already have been familiar with the subject matter. Maybe insights were given and I just missed them...? Now that I think about it, I suspect the presenter's goal may have been to get some air time for his work. I might be wrong about that. Dunno. But oh dear. The very fact that the presenter used "architect" as a verb turned me right off. Why use a boring old word like "made", when we can distort a noun like "architect" into a fab new verb? "We’ve architected it to mimic blah blah". FFS. Watching him architect something to mimic something else made me architect a voodoo doll. What He Could Do Better - Go to some charisma classes. Putting some expression into his voice would be a great start. - Use a pointer instead of controlling the laptop on which his presentation ran. Doing so would enable him to move around more, and even… - engage with the audience. Believe me, engaging with the people you are talking to is a Good Thing. Yes, the audience clapped and laughed, but I have a feeling they would clap and laugh at their own funeral. - Cut the "Dick" jokes. - Presentation aside, avoid buzzwords like the plague. Sorry, I don't mean avoid buzzwords like "The Plague". Not much of a buzzword! "Web 2.0" got a frosty reception, and "identity 2.0" didn’t fare much better.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.50/warc/CC-MAIN-20170423031207-00005-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,689
14
http://www.dead.net/forum/report-technical-problems-here?page=1
code
good catch, Badge'. We'll check into it!! what's happened to the whole Forum Section called Grateful Dead....nothing there right now?? Sorry Mayre, I went right by your last post. Thanks for your attention!!! Mayre, I just went to login,guess what? I'm still loggedon from yesterday. HELP I will pass this along to the techs in case it suggests something to them. Thanks! 1. Blue collar; 2. White collar; 4. Hair Spitters; 7. Wild Card/Trash Talk. "All energy flows according to the whims of the Great Magnet. What a fool I was to defy him." Mayre, it happened just now. Went to login today and was still loggedin from yesterday, I'm sure that I had logged out. Anyhow tried to logout right away and I had to logout twice and then a page came up that said it couldn't find that page, so I tried it again then it finally logged me out. Help!! if you can THANKS 1. links that don't work right 2. 'features' problems 3. 'taper's section' problems (technical ONLY) perhaps subdivide by individual areas, i.e. all the sections and subdivisions in the upper left of this page. or would that be too complicated? hmmmm. something like that. i don't know. most sites have a technical e-mail address that you can contact if you see a problem dealing with tech issues. Things we can do something about Things we can't do anything about I'm sorry about that right there Lord; feed the starving pygmies in New Guinea. I'll ask again. I'd say we'd be perfectly willing to subdivide "Technical Problems" if you can suggest some reasonable areas into which to subdivide it. The topic's getting long enough that restarting it isn't a bad idea anyway.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863901.24/warc/CC-MAIN-20180521004325-20180521024325-00128.warc.gz
CC-MAIN-2018-22
1,633
21
http://www.meetup.com/UX-Perth/members/87711272/
code
April 4, 2013 Useful ideas that I will be able to apply in my startups. My role? A web developer primarily, so I design things which people use. The creation of a product which is appealing to use - I suppose? Hey, I'm Joe. I'm into neat ideas, thinking about things, and startups.
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936461359.90/warc/CC-MAIN-20150226074101-00072-ip-10-28-5-156.ec2.internal.warc.gz
CC-MAIN-2015-11
281
5
https://www.instructables.com/AvoRipe-Checking-If-Your-Avocado-Is-Ripe/
code
Introduction: AvoRipe - Checking If Your Avocado Is Ripe It happened to everyone, you buy an avocado, it's not ripe yet. A few days pass by, and by the time it's ripe you have forgotten about it... and in a few days, it may go bad! lucky for you we designed and built AvoRipe, a device that checks your avocado twice a day, or on-demand, sends you a notification to your smartphone if your avocado is ripe and allows you to track the softness of your avocado over time. Who are we? Proudly created by Elad Goldberg and Eden Bar-Tov a from IDC Herzliya in McCann Valley, Mizpe Ramon and the media innovation lab at IDC (MiLab). A practical thanks to Zvika Markfeld, of ForRealTeam, for teaching us everything about IoT, supplied us with all the equipment and went with us to the desert, where we built most of this device. Special thanks to Instructables and Thingiverse, for giving us some inspiration and ideas and to this guy that designed a 3D model that we used in our device. this is the list of things that we used, needless to say, that every component here is replaceable and was chosen mostly by the availability to us in the time of making this project. Micro-Controllers, boards, and shields - 1x ESP8266 boards (we used LoLin-made WeMos D1 minis) - 1x D1 Mini servo Shield - 1x Micro-USB Cable - 20 x jumper cables - 1 x 10K Ohm resistor - 1 x Breadboard - 1 x Servo motor (we advise on a robust one, from our experience the little ones sometimes won't do) - 1x Thin Film Pressure Sensor Force Sensor - 1x RGB Color Detector Using TCS3200 Sensor Module - 1 x Smart Box - 7x rings that will form a stand - 2x 70X100 cm - Avocado Griper (originally Petri Dish Gripper that we found here) Step 1: Understanding the Device and Data Flow The AvoRipe is designed to check your avocado's ripeness twice a day (morning and evening) and it can also check it in a push of a button on your phone whenever you want wherever you are! If the avocado is ripe (by color and softness) than a push notification will be sent to you by the BLYNK app letting you know it is time to eat your delicious avocado. Since we are advocates of data to the people, we also build a dashboard using AdafuitIO that will keep track of your avocado's progress (softness level, current color, and ripeness) in order to keep you up to speed. Step 2: Building the Parts - After printing the parts of this 3D model, and the 70x100 mm plastic square - assemble the 3D model as seen in the original designer's instructions - since we use a bigger servo, we won't be using the biggest part of the model to keep the servo in place, instead, we'll use the 70x100 mm plastic square and glue them together as seen in the picture. - after a lot of trial and error, we came to the conclusion that some duct tape and a little weight from above can go a long way into smoothing things out - so we recommend using something heavy to put on the top part - we used play-dough but it doesn't really matter. - we used some duct-tape to soften the blunt plastic claw so the avocado will be cozy and we connected the force sensor to one of the arms. - after inserting the light sensor inside the largest ring (we suggest to drill a small hole for the jumpers to go through) glue together all the rings until you reach the desired height. we used makercase to make the box, and assemble it. the box gives us a hight boost for the claw and also a place to store the wemos circuits Step 3: The Circuit In this step, we will connect all the sensors. - Connect VCC to + in the breadboard. - Connect G and A0 to the 10K Ohm resistor. - Connect the other resistor leg to - in the breadboard. - Connect the VCC to + in the breadboard - Connect the Ground to - in the breadboard - and connect the source to D8 RGB sensor (TCS3200): - Connect the S0 to D4 - Connect the S1 to D3 - Connect the S2 to D6 - Connect the S3 to D7 - Connect the out to D5 Step 4: Required Software Install Arduino IDE: Touch the QR-code icon and point the camera to the QR code below after that send yourself the authentication code (we will use it in the next step) Step 5: Dashboard Create an account: https://io.adafruit.com Go to "Feeds" and create 3 new feeds: Then, go to the "Dashboard" tab and create a new dashboard. After the dashboard is created, enter the dashboard and add 3 new blocks using the "+" button: 1. A line chart, and add the squishiness feed to it, that block will show the avocado squishiness progress over time. 2. A color picker, and add the avocadoColor feed for it. that block will show the avocado's color. 3. An indicator, and pick the isRipe feed for it. that block will measure whether the avocado is squishy enough to be determined ripe. make sure to set the condition in this block to "=", and the value to 2. Step 6: Code The code is attached, hopefully, you will find it easy to use (we tried to document it as much as possible). Open Arduino IDE and import the code, make sure that you are working on the right board (use Tools -> board) run serial monitor (CTRL+SHIFT+m) and see the angle of the servo and the force applied to the sensor at every stage. When you are running the serial monitor, make sure you are on 9600baud. Modify all are places in the code you need to modify, it's well commented in the code (mostly your WiFi details, adafuitIO, and BLYNK authentication). We suggest that you calibrate the value of the force needed to decide that an avocado is ripe after you test a few hard and a few ripe avocados and find a sweet spot (we have learned that every set up is a bit different since the force sensor is pretty delicate). We also suggest that you calibrate the Color sensor. You can do that by opening the serial monitor (CTRL+SHIFT+m) in the Arduino IDE and then entering "c" in the upper line. after that, just follow the printed instructions in order to calibrate the sensor. Step 7: BLYNK App and Notification In the BLYNK app, make sure the timers are set to the desired time and that your device allows notifications from the app. A little explanation about how the BLYNK app and the code work together: we have set a virtual pin (V0) that is being checked constantly by the wemos, the app will change it from 0 (don't check avocado ) to 1 (do check avocado) when: - the on button is pushed (make sure to push it to off afterward) - one of the timers sets off. we set another virtual pin (V4) will determine if the avocado is ripe (V4 = 2) or isn't ripe (V4=1 ) this will be determined inside the wemos and will be sent to the app. Also if the avocado is ripe the wemos will trigger a notification through the app. to learn more about the notification widget check out this link.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337421.33/warc/CC-MAIN-20221003133425-20221003163425-00252.warc.gz
CC-MAIN-2022-40
6,666
75
https://unix.stackexchange.com/questions/525138/why-is-streamlocalbindunlink-disabled-by-default
code
I want to enable GPG agent forwarding, and found that StreamLocalBindUnlink is disabled by default on sshd. Why is it disabled by default? Is there any security risk in enabling it? Since X11 forwarding and agent forwarding are enabled by default, even though they include a security risk for the connecting user.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400191780.21/warc/CC-MAIN-20200919110805-20200919140805-00564.warc.gz
CC-MAIN-2020-40
313
4
https://youtuberead.com/how-study-multiple-subjects
code
How to study multiple subjectsAug 08, 2023 In this video, I'm going to talk about two different ways you can combine your studies using a strategy called interleaving to get better grades. At the end, I'll talk about a common challenge that many students face when using interleaving and stepping. what can you take to overcome it Hello everyone, welcome back to the channel if you are new here my name is mike I am a doctor working in California and co-founder of brem note this is another video in our series on evidence base Learning strategies in the That Mattie and I take the research in cognitive and neuroscience and help you apply it in your studies to get better grades. If you are interested, subscribe to see weekly videos. In this video we will talk about how to use interleaving, which means mixing your studies and I assume you already know what the strategy is about, but in case you don't check out this video here where we dive into the science behind why it works so Well, I'd probably watch it. video first to get some context and then come back here when you're ready to apply the techniques. The first way to use interleaving is to alternate between different topics within the same topic, so here's an example of how you wouldn't do it in the morning you spend three hours studying chapter one, then in the afternoon you spend three hours studying the chapter two and then in the evening spend three hours studying chapter three yes, you are studying three topics in one day but you are not interspersing your study time, so here is an example of how I would do it in the morning, I would spend an hour studying the chapter one, then an hour studying chapter two, then an hour studying chapter three, then in the afternoon and evening, they would do the same, they would spend an hour each studying each chapter, so now many of you are thinking that Switching between different topics would not force you to shift gears and change focus and would ultimately be less effective at learning well. It's kind of counterintuitive in the first method, your brain is thinking about chapter one for three hours, but after you. When you finish studying it, that's it, your brain stores all that knowledge and doesn't think about it again for the rest of the day, whereas in method two, after spending an hour studying chapter one, your brain knows that you are going to come back to chapter one later in the afternoon and evening, so your brain has to retain that knowledge effectively for seven hours in advance so that your brain spends more time with that information and the best part is that when you're By studying chapters two and three your brain is retaining information from chapter one that could help you better understand those two chapters and make connections. The second way to use interleaving is to switch between different learning modes. What I used to do and it wasn't very effective. I would go to math class and then go home and review the math lesson and then immediately do math homework. I wanted to finish everything while the information was still fresh in my head, but the problem with this was that by the next math class. When we went over our homework, I didn't remember anything I learned in the previous math lesson because it had been a long time since I had seen that material. Now here's an example program of what you can do to incorporate interleaving, so go first. to math class and then you can review the math lesson after class and then just leave it and let it sit, then go to history class and then review history and then now that some time has passed, you can do the homework for math class and then go. to science class and then doing homework for history class and so on, not only are you interspersing all your topics but this method also implements spatial repetition because you allow yourself to forget some of the material before revisiting the homework. making your learning harder, with more effort, and ultimately making it stick because the harder you try to learn, the more you retain. Leon Pora goes into more detail about this method and I can leave a link to that video in the description below, okay so it's a common. The challenge that students often encounter is how often they switch between different subjects. If you spend three hours studying one topic before moving on to the next, then you won't get the interleaving effect, but if you only spend 15 minutes, then you force your mind to switch too quickly and this ends up being more like multitasking and isn't helpful either. . Well, cal Newport from the book how to be straight. One student recommends that you study a topic for 50 minutes and then take a 10-minute break before starting. The next 50 minutes, I have personally found this time frame to be the sweet spot for my attention span, but keep in mind that yours may be a little different. To find your sweet spot, I would recommend using a pomodoro timer, so start studying a topic for 25 minutes, then take a five-minute break, then continue that topic for another 25 minutes, then a five-minute break, and then with time, you can increase the time increments. Do 35 minutes, then five minute breaks, then do 45 minutes with five minute breaks and that's it. Eventually you'll notice that you tend to keep losing focus at about the same time. Well, that would be your sweet spot. My favorite way to do this is using rem note, the first smart note tool that applies science to your studies. The remainder is free space. snooze app that has a built-in pomodoro timer and allows you to apply spacing schedules to specific folders or even specific documents within your database, making collating practice simple to do. Well, if you enjoyed this video, we would appreciate it if you shared it. with your friends watch this video here to learn about different ways you can implement active recovery in your studies watch this video here if you want to learn about different ways to implement spatial repetition in your studies if you want to chat just follow us on twitter or instagram and send us a message as always thanks for watching and i'll see you in the next video. If you have any copyright issue, please Contact
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506539.13/warc/CC-MAIN-20230923231031-20230924021031-00768.warc.gz
CC-MAIN-2023-40
6,214
12
https://www.ssbtech.in/everything-you-need-to-know-for-java-programming-success-ssb-technologies/
code
If you are looking to learn the basics of Java Course in Hyderabad, SSB Technologies offers Java classes for beginners as well as advanced learners. Beginners can enroll for a Core Java training course to learn programming basics with the help of JAVA Coding and its various concepts such as conditional logic, loops, arrays, and objects. In comparison, those who already have some knowledge of coding can opt for an Advanced Java training course to acquire skills in concurrency via multi-threading and networking using sockets. Java is one of the most popular programming languages in the world. It has been used by millions of professionals worldwide to develop robust applications, games, and so on. Our Core Java Programming Course in Hyderabad will help you become a professional programmer by teaching you the fundamentals of Java programming language. Our Advanced Java Training in Hyderabad will provide you with an overview of more advanced topics to allow you to pursue your career goals as a programmer. Along these lines, hold hands with SSB Technologies for acknowledging new demands and making the best arrangements through the best Java Classroom Training in Hyderabad. Learning Java fledgling course essentials and different elements will make you a specialist in Java capacities and applications to manage ongoing undertakings. SSB Technologies gives the best progressed Java Online Training in Hyderabad, where you will come to realize how Java Online Classes in Hyderabad help to work in genuine world stages. Center Java Online Training India at SSB Technologies will assist you with getting your preparation without any problem. Also, Java full stack Developer Course gives answers for having some familiarity with the advancement of uses utilizing the Java stage. Java Online Training India with SSB Technologies will cause you to accomplish the objective to turn into an affirmed Java Development master. On the off chance that you are searching for a solid profession in JAVA, Join SSB Technologies Best Java Courses in Hyderabad and land 100% Position Assistance.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103037649.11/warc/CC-MAIN-20220626071255-20220626101255-00577.warc.gz
CC-MAIN-2022-27
2,089
5
http://www.howtobuildsoftware.com/index.php/how-do/yUM/c-ftp-embedded-ftp-file-upload-from-memory-in-c
code
I'm programming an embedded software in C (not C++) that allows me to transfer a file to the ftp (some readings that a specific hardware does), but it seems I don't know how to do the transfer. This is my code: ///pasive connection FTP if(strncmp(szBuf , "227", 3) != 0) sprintf(szBuf, "STOR m4.html\r\n");//command that allows storage of a file in the FTP The thing is that STOR uses the filename, but since it is custom hardware I need a way to stream the bytes from a specific address in the SDRAM ( 0x000-0xFFF for example), so I was wondering if someone could give me a little advice creating the file, fill with the information in the FTP? Best How To : The FTP protocol works with two distinct connections, the control connection and the data connection. Depending on the mode, the data connection may be initiated by either the server (active) or client (passive). PASV command's (which indicates passive transfers) response contains the IP address and PORT the server is listening for data connections. STOR command indicates to the server which filename must it use to store the data sent by the client through the data connection. So, what you are missing here is: - Parsing the - Opening the data connection and sending data over it There are other exchages between client and server, for instance to coordinate the termination of the data connection after the transfer. The protocol is described in RFC 959. Without knowing what library you are using it's hard to say how it has to be implemented. A step by step overview can be found here
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479967.16/warc/CC-MAIN-20190216065107-20190216091107-00336.warc.gz
CC-MAIN-2019-09
1,552
16
http://www.ccs.neu.edu/home/vkp/2510-fl12/lab3.html
code
Goals: The goals of this lab are to learn how to follow the design recipe for designing methods in Java. Of course, as the part of the design recipe, we will learn how to design tests for our methods and how to run them. For a simple tutorial on how to design the tests using the tester library look at the wiki pages on the JavalibTester github site. For the rest of the semester we will use the Web-CAT homework submission and grading system. In the lab today we will make sure every student can submit their work individually, we will then make sure every pari can submit the homework that is due tonight. Follow the link to our Web-CAT server and log in. Find Assignment 1 and upload the file Shapes.java that we had worked on during the last lab. Check that the file has been submitted correctly. Last week we started designing methods for the class Person that referred to the person’s Address. We have designed the method sameCityState that told us whether this person lived in the same city (and state) as the given Person. Design the following additional methods for the classes Person and Address you have defined during the previous lab: Design the method sameName that determines whether two persons have the same name. Design the method moveToCity that produces a new Person who has moved to a new city within the same state. Design the method moveTo that produces a new Person who has moved to a new city in a new state. Design the method moveInWith that produces a new Person who has moved in with the given Person - so they are now in the same city and state. In this simple exercise you will se how you can design images from geometric shapes as well as image files and some text. Download the file javalib.jar and add it to your project. Start a new project MyDrawing and download the file ExamplesDrawings.java and import it into the project. Download the file Images.zip, unzip it and save the images in the same folder in your Eclipse has the src folder for your MyDrawing project. Run the program the same way as you would any other program. Look at the program and add to it a new image. Include in your image at least three geometric shapes, one image (use those that were given to you; later you may explore other options), and some text. For a desctiprion of how to design images see the Javalib World tutorial pages. In class we have designed a data representation for mobiles as follows: | IMobile |<---------------+ / \ | | | | +--------------+ +---------------+ | | Simple | | Complex | | +--------------+ +---------------+ | | int length | | int length | | | int weight | | int leftside | | | IColor color | | int rightside | | +--------------+ | IMobile left |----+ | IMobile right |----+ Convert this data definition into Java interfaces and classes and make several examples of mobiles. Include in your examples at least three mobiles, the first two as shown and the thid one more complex that what is shown here: Simple mobile | Complex mobile | | | | 10 | 40 red 10 green Design the method totalWeight for the mobiles that computes the total weight of the modile. We assume that the weight of the struts from which the mobile hangs is negligible, as is the weight of the string on which the disks hang. Design the method totalHeight that computes the height of the mobile. Assume that the height of the disks is the same as their weight (i.e. a disk of weight 10 has height 10). Design the method isBalanced that determines whether a mobile is balanced. A simple mobile is always balanced. A complex mobile is balanced if every mobile that hangs from it is balanced, and the weight of the left side multiplied by the length of the right strut equals the weight of the right side multiplied by the length of the left strut. (So if I hang weight 3 on the left and weight 5 on the right, then the length on the left should be 5 and the lengh on the right should be 3 — or both could be the same multiple of these numbers, e.g. 20 on the right and 12 on the left.) Design the method buildMobile that combines this balanced mobile with the given balanced mobile and produces a new mobile as follows: The method is also given the desired length of the string on which the new mobile will hang, ad the strut that will be used to hang the two mobiles on. Your job is to make sure that the length of the strut is divided into the left and righ side in such way that the resulting mobile will also be balanced.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886639.11/warc/CC-MAIN-20180116184540-20180116204540-00798.warc.gz
CC-MAIN-2018-05
4,440
48
https://www.ibm.com/developerworks/community/forums/html/topic?id=8a7e0bc3-3d00-491e-82f8-395a05dc7e41&ps=25
code
i'm a student and for the end of my studies , i want to create an Microsoft cluster Hyper-v 2012R2 on 2 IBM x3650 7979 . and when i install my serveur , there are an error in log file : Hypervisor processor startup failed ( APCI ID 0X4 status 0X1035), further processors in the system were not started... i would like to know if hyper-V 2012 R2 is supported on IBM X3650 ? sorry for my english , i'm french and my english level is not very well, thank a lot !
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645613.9/warc/CC-MAIN-20180318110736-20180318130736-00618.warc.gz
CC-MAIN-2018-13
459
5
https://mail.python.org/pipermail/python-list/2015-January/684055.html
code
multiprocessing queue hangs up on the Amazon cloud rosuav at gmail.com Wed Jan 14 23:16:56 CET 2015 On Thu, Jan 15, 2015 at 8:55 AM, <jgrant at smith.edu> wrote: > I am trying to run a series of scripts on the Amazon cloud, multiprocessing on the 32 cores of our AWS instance. The scripts run well, and the queuing seems to work BUT, although the processes run to completion, the script below that runs the queue never ends. I have tried Queue and JoinableQueue and the same thing happens for both. Hi! I'm not absolutely sure that this is a problem, but I'm seeing something in the code that you might have to walk me through. > def worker(done_queue,work_queue): > for f in iter(work_queue.get, 'STOP'): This repeatedly asks the queue for something, until it finds the word STOP. By the way: > except Exception, e: This is an old form of exception syntax. You may want to use "except Exception as e:" instead, assuming you don't need to support ancient Python versions. Carrying on! > work_queue = JoinableQueue(810) #change if more than 810 taxa There's a single work queue, with a single word STOP on it. > for w in xrange(workers): > p = Process(target=worker, args=(done_queue,work_queue)) > print "3 it gets here" > for p in processes: > print p # it only prints once - <Process(Process-1, started)> And then you seek to run multiple workers. If my reading is correct, one of them (whichever one happens to get there first) will read the STOP marker and finish; the others will all be blocked, waiting for more work (which will never arrive). In theory, you could have the first process be the one to stop, in which case you'd successfully join() it and then go on to wait for the second, but if any other process gets it, you'll be stuck waiting for the first. Or have I misunderstood something in your logic? If this is indeed what's happening, the simplest solution might be to add as many STOPs as you have workers. Alternatively, if you can guarantee that the work is all on the queue before the first process starts, you could simply use the empty queue as the sentinel; which I would recommend doing for the done_queue, as there's only one reader But it's entirely possible I've missed some tiny fact that makes my entire analysis wrong, in which case I apologize for the noise! More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528290.72/warc/CC-MAIN-20190722221756-20190723003756-00133.warc.gz
CC-MAIN-2019-30
2,331
38
https://forums.opensuse.org/t/how-to-install-a-package/18570
code
I am new to linux but love to explore it. I just installed openSuse 11.1 on my new desktop which already has Windows XP on it. I would like to install a package called NetworkManger. Can anyone please tell me how to get it and how to install it? I need to set up my wireless connection on this machine. So, I can’t access internet from this machine when logged on using linux OS. When I tried /usr/sbin/iwlist scan, I do not see my wirelesss SSID in the list. I do not know why, but windows can see it. I tried configuring with iwconfig, but did not work. Can anyone help on this? I am using KDE desktop.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476592.66/warc/CC-MAIN-20240304232829-20240305022829-00597.warc.gz
CC-MAIN-2024-10
606
2
https://mnczuba.com/research/
code
“Quasi-Denial”: (Counter-)Expectation, Evidentiality and Epistemic Modality More recently, I have been working to introduce a class of utterances which I call “Quasi-Denial”: epistemically-modalized denials which depart from the standard truth-conditional picture of negated epistemic utterances. Such sentences exhibit curious context-sensitivity in expressing underspecified speaker attitudes of skepticism. The work was recently presented at ICFL-8 in Hangzhou, China. This project is very much in its formative stages, but slides and a manuscript will be made available shortly; if you would like to request a copy, please feel free to reach out to me. - Condensed abstract (one page), December 17th, 2018. Comments are most welcome. Complex Directional Constructions in Mandarin Chinese I spent the latter half of my undergraduate years studying the phrase structure of directional constructions containing motion deixis, particularly in Mandarin. A single puzzle involving the distribution of locative vs. non-locative objects (first observed in Chao 1968) constituted the bulk of my senior thesis, which I successfully defended on May 9th, 2016. Since graduation, my research broadened to focus on understanding linguistic and pragmatic demands for the interpretation of location, particularly in the context of utterances involving motion; how such observations figure into the encoding of viewpoint deixis; and their role in syntactic and semantic theory.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100529.8/warc/CC-MAIN-20231204115419-20231204145419-00248.warc.gz
CC-MAIN-2023-50
1,472
5
https://www.npmjs.com/advisories/1097
code
Denial of Servicegrpc-ts-health-check grpc-ts-health-check prior to 2.0.0 are vulnerable to Denial of Service. The package exposes an API endpoint that may allow attackers to set the service's health status to failing. This can lead to Denial of Service as Kubernetes blocks traffic to services with a failing status. Upgrade to version 2.0.0 or later. publishedAdvisory PublishedAug 5th, 2019 reportedReported by Dave BrettAug 5th, 2019
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670921.20/warc/CC-MAIN-20191121153204-20191121181204-00406.warc.gz
CC-MAIN-2019-47
437
5
https://support.clicksafety.com/hc/en-us/articles/115002083286-Creating-and-assigning-groups
code
Groups are a way to create custom course lists or curriculum from inside your administrative accounts. By using groups you can create and assign courses based on job title, location, specific projects, new hire training and basically any other designation you may want. When a group is assigned, all associated courses are placed in a user's account and their progress can be tracked. To create a group, click the GROUPS link on the top right of your admin dashboard From the Groups page you can select the courses you want to be part of the curriculum. NOTE: It i snot recommended that you include OSHA or Specialty courses like HAZWOPER or EM 385 as they are already their own groups. To create a new group on the GROUPS page, click 'add groups' or 'add new group' Assign a name for your group. This can be anything that helps you identify the curriculum.For example: "New Hire" for every new employee, "East Coast" for only employees in your east coast division or office, "Mechanics" or "Office Staff" for employees in those positions, etc. Then click NEXT On the Add Courses page you can either search for a course keyword or click 'List all courses. Note: We recommend typing a keyword. The SEARCH function may not find the course if there is any difference in the way you enter it vs how it is listed in the. Also the 'list all courses' will contain all of the course sin your library which can number in the 300s. When you have found your list or related courses you can select one or more courses to add by checking them and clicking "ADD SELECTED COURSES" You will be given the chance to add more courses to the selected list or remove ones you decide against before clicking 'FINISHED ADDING COURSES>>' You may choose to display the courses in a particular order. If your company account is set to allow clickable courses, your users may choose to do them in any order, but they will be presented as you list them. Set the duration between courses to determine an approximate target date for the group. This group This is the default time to complete a course. Courses not completed by the target date are listed as Behind Schedule but can still be worked on. When the process is completed you can assign the group by selecting the people in your account and choosing the 'assign training group" option. You can leave the default target date as mentioned above, or you can enter a different date for that assignment. Anyone to whom the group is assigned will receive all associated courses.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100626.1/warc/CC-MAIN-20231206230347-20231207020347-00011.warc.gz
CC-MAIN-2023-50
2,501
15
https://forum.iredmail.org/post76727.html
code
Topic: fail2ban blocking whitelisted IPv4s ==== REQUIRED BASIC INFO OF YOUR IREDMAIL SERVER ==== - iRedMail version (check /etc/iredmail-release): - Deployed with iRedMail Easy or the downloadable installer? - Linux/BSD distribution name and version: - Store mail accounts in which backend (LDAP/MySQL/PGSQL): - Web server (Apache or Nginx): - Manage mail accounts with iRedAdmin-Pro? - [IMPORTANT] Related original log or error message is required if you're experiencing an issue. Cent OS 7 & MySQL - Roundcube webmail 1.4.8 - SOGo 5.0 In GUI add IPv4 addresses to system in the box Whitelist Senders. System -> Whitelist & Blacklist. Add one IP per line. However, the IP will then show up as blocked IP in the GUI as Banned address Dashboard -> Banned Ips Click on it and see the IP with say all these ports in the match but the originating IP should only be using port 25. 80, 443, 25, 587, 465, 110, 995, 143, 993, 4190 What am I missing here?
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107912593.62/warc/CC-MAIN-20201031002758-20201031032758-00057.warc.gz
CC-MAIN-2020-45
947
20
https://www.thedataschool.co.uk/muneeb-sajjad/dashboard-week-day-1-uk-street-crime-ds24/
code
Final week of training, dashboard week, day 1. We've been tasked with building an Alteryx App that allows the user to pick a date range and category; using the UK Street Crimes API. A dashboard on tableau, and this blog post. 1.0 The Workflow After entering the URL and connecting the download tool to retrieve the UK Street Crime data, I used the JSON Parse to parse out the values into a table from the DownloadData field. I then used the text-to-columns tool to split the numbers and the headers I'd be using for my fields. The cross-tab tool helped me to split the rows into columns. I added a create points tool with a browse to view the points on a map. To create the app, I added a couple filters. One to allow the user to select a crime category, and the second for the date. 2.0 The Dashboard To create the dashboard, I added an output data tool after the cross-tab. This gave me more data to play with. I included a few filter options (crime category, the outcome, and the date). And also a BAN showing the number of crimes. The dashboard shows crime at street-level, within a 1-mile radius of the single-point (latitude/longitude) I entered in Alteryx. Link to the dashboard: https://public.tableau.com/shared/DYXJCMB4H?:display_count=n&:origin=viz_share_link 3.0 This Blog Post
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570913.16/warc/CC-MAIN-20220809064307-20220809094307-00525.warc.gz
CC-MAIN-2022-33
1,289
9
https://powerdream5.wordpress.com/2007/11/24/shift-to-dynamic-programming-language/
code
In recent years, dynamic programming languages develope very fastly, especially PHP and Ruby. There is no doubt that They have already became the first choice for many programmerers when developing web applications. Furthermore, it seems that more and more people, like thoughtworks, are trying to apply them to enterprise applications dominated by Java and C#. I have studied JAVA for almost 5 years. I love it. Everything in JAVA makes me comfortable. Although I have finished several projects by PHP, and in some aspects, PHP is really better than JAVA, I still put JAVA in the first place in my mind. In fact, there are already a lot of arguments about PHP or Ruby on Rails are not suitable for complex enterprise appliactions. In my opinion, everything in the world is changing, so is dynamic programming language. Just like Java adopts some good features of dynamic language, for example, reflection and supporting scripting language, I believe that both PHP and Ruby on Rails are developing so that they can be applied in a broader area. Now, I have a strong feeling that it is necessary to pay more attention to Ruby and Ruby on Rails. Many Java programers think that studying dynamic languages can imporve their thought about Java. Therefore, it is killing two birds with one stone. Fortunately, because I have much experience in Java, it is easy to pick up a kind of dynamic language. However, I suggest the people who want to study programming start from Java or C++, since they are more religious and can help you build solid fundation in programming.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123549.87/warc/CC-MAIN-20170423031203-00444-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,563
5
https://learnhowtowriteabook.teachable.com/courses/rewrite-your-life/lectures/1911169
code
Congratulations on making the empowering decision to rewrite your life! You'll be guided, step-by-step, through the transformative process of turning your experiences and emotions into a novel in one year's time. I encourage you to check out the optional companion book and this coloring book for writers. Afterward, click on "Included Courses" on the left of the previous screen (the screen you're brought to when you log into Rewrite Your Life). That's where all 10 modules of this program can be found. You can return here at any time to print out the recommended reading list or the BONUS "How to Publish a Book" guide. I'm happy you're on this path. --Jess
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710765.76/warc/CC-MAIN-20221130160457-20221130190457-00092.warc.gz
CC-MAIN-2022-49
661
2
http://developer.nokia.com/community/discussion/showthread.php/131908-Python-CONE-8-sometimes-System-Error-50
code
I run script in emulator without any problems, I exit script without any problems, but when I exit python shell there's "Python CONE 8" error. The only script which I ran was my own, so there MUST be something wrong with it. There's no error notes after running the script. Trace doesn't show anything suspicious. Everything is juuuuuust fine - until I exit python shell. How to debug this kind of error? There was earlier also "system error (-50)", but it disappeared. That means "Exception in UI callback" and CONE 8 most likely means "Environment found window server resources had not been freed". That suggests that I created something related to appuifw and it wasn't ever deleted or released. What kind of cleanup I have to do myself? This sample is basically what I did, should I somehow delete myText? Should I delete m object? There are no tabs, no views, no icons, no listbox, no canvas - nothing but one appuifw.Text() and few writings on it. This sample gives same CONE 8 error, here's how to use: 1) Start python shell 2) Run this script 3) Exit script 4) Exit pythin shell Btw using S60 3rd Edition SDK MR with Python 1.4.2. appuifw.app.screen = 'normal' appuifw.app.title = u'Test' appuifw.app.exit_key_handler = self.cb_quit appuifw.app.menu = [ self.myText = appuifw.Text() self.myText.font = u"title" self.myText.style = (appuifw.STYLE_BOLD | appuifw.STYLE_UNDERLINE) self.myText.font = u"normal" self.myText.style = 0 self.print_status(u"Press Select key to start:") appuifw.app.body = self.myText self.myText.bind(key_codes.EKeyEnter, lambda: self.sample()) self.myText.bind(key_codes.EKeySelect, lambda: self.sample()) def print_status(self, aString): e32.ao_sleep(0.1) # Give time to update screen m = Main() app_lock = e32.Ao_lock()
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776435842.8/warc/CC-MAIN-20140707234035-00082-ip-10-180-212-248.ec2.internal.warc.gz
CC-MAIN-2014-23
1,755
28
http://www.geekstogo.com/forum/topic/148254-securing-a-wireless-network-connection/
code
Ever since I started to use a wireless router for my internet connection I have been telling myself I should make it secure. I have often started the process and then given up as it got too confusing! A couple of nights ago I had a weird pop up message (which I foolishly didnt write down) about an IP conflict which rightly or wrongly I took to mean that someone was trying to use my wireless internet connection. Spurred on by this I have finally followed some instructions and hopefully I have succeeded in securing my connection using WPA-PSK. However, I do not know how I can verify that it is in fact as secure as I think it is. Would someone please look at the enclosed screen shots and interpret them for me please? Also, is there a way that I can test the security of my system? Thanks very much, Roger
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743968.63/warc/CC-MAIN-20181118052443-20181118074443-00407.warc.gz
CC-MAIN-2018-47
811
5
http://mailman.linux-thinkpad.org/pipermail/linux-thinkpad/2000-November/003402.html
code
FW: [ltp] Thinkpad i Series 1200 model 71U Thu, 30 Nov 2000 21:57:26 +0100 (MET) On Thu, 30 Nov 2000, Bruce Cowan wrote: > I just got another message from Silicon Motion and they claim to have > released a new driver for XFree86 4.0 just _last week_. Did they say where? Their website only links to the beta driver from december last year. ----- The Linux ThinkPad mailing list ----- The linux-thinkpad mailing list home page is at:
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362605.52/warc/CC-MAIN-20211203060849-20211203090849-00330.warc.gz
CC-MAIN-2021-49
432
9
https://serverfault.com/questions/587710/sftp-password-wrong-from-remote-but-not-from-local
code
From my server, connecting to it via eth0 (not localhost), I can connect via SFTP: Apr 9 10:02:40 domain sshd: Accepted password for test from 1.x.x.x port 45335 ssh2 From a remote Filezilla, I cannot connect using the same password: Apr 9 10:04:25 domain sshd: Failed password for test from 2.x.x.x port 26714 ssh2 Both IP addresses are in hosts.allow and the SSH config is properly and setup to allow special ssh and sftp groups to connect. What could be the error?
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038078021.18/warc/CC-MAIN-20210414185709-20210414215709-00548.warc.gz
CC-MAIN-2021-17
467
7
https://www.elitetrader.com/et/members/gkishot.38141/recent-content
code
If you are planning to rent a Linux server, php or python are the best envs to code in. Nope. You aren't taking a pee while typing b/c you have no choice? Is it b/c you have no choice? Or is it b/c for fear of being penalized if get caught? What about let's s say paying taxes? Do you consider yourself a law abiding citizen? Do you have a choice how to trade? Any idea why does XIV underperform so greatly SVXY today? They both track the same index. Is CS chipping away a few bucks from the fund to cover... Why do you have such a low allocation if you trade it in & out? Why should be position size for people who don't trade in & out? Is it less than 5%? What should be position sizing? The thing is we want it back. How come they leave us in the cold. You don't just leave and slam the doors on us and our business. Not nice. Yeah, it was designed to disappear into thin air. Good for them. What took them so long? Compensation for counterparty risk coming from its liquidation = default on me and other traders. In my book 0 means they blew it and have to close down their product/business consequently harming the business of the traders/counterparties.... Yes, a flawed flight by night business model. Riskier does not mean 0. 0 = default. It failed to prove its mettle for the short term investors by closing down on them. Separate names with a comma.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815918.89/warc/CC-MAIN-20180224172043-20180224192043-00432.warc.gz
CC-MAIN-2018-09
1,359
17
https://collabshow.com/2011/06/16/10-things-i-learned-from-microsofts-sharepoint-it/
code
10 Things I Learned From Microsoft’s SharePoint IT Was great to get a reminder of how Microsoft Does IT. Today I attended the IT Showcase by Microsoft’s own IT Group. Mike Rian the IT manager over the internal SharePoint environment delivered a great session designed for IT managers. If you’ve followed me for a while you’ll know I spent 7 years at Microsoft and 5 of those years in Microsoft IT. I still have fond memories. Here are some of the key takeaways. - SharePoint Does Really Scale – They are supporting 30TB globally on SharePoint across 199,786 Site Collections. I’m aware of a couple of other environments that stretch the imagination one with America as the scope of potential users at recovery.gov run on Amazon’s infrastructure as a service, and one e-commerce portal with 2 million monthly users (SharePoint 2010 plus Commerce Server). I’ve heard of environments even larger than 30TB, but you don’t want me to tell you about some of these, ’cause I’d have to take you out. - SharePoint Governance comes in the form of a service offering – Microsoft has a vanilla Utility SharePoint service offering where my sites, collaboration & team sites, and small medium portals are provided with separate purchasable service levels and now offer a custom service offering including charge back for storage needs over 10GB. Mike mentioned on the webcast that the custom service offering charge back (quarterly) now pays for the scale hosted vanilla hosted offering. - SharePoint is an application and a platform (consider chargeback for custom deployments) – With on premise SharePoint you’ll likely need to provide SharePoint integration with other platforms and line of business apps. Microsoft calls this service SharePoint PLUS which provides just that including small and medium portals integrating and becoming Line of Business apps. - Engage & Measure Adoption and Satisfaction – Microsoft surveys their users on a quarterly basis to gather "NSAT" the statistic that gives them customer satisfaction including pain points, and ensures that service teams are meeting service level commitments. Focus is on driving adoption not deployment. They’ve built a feedback tool to measure and track feedback into the NSAT statistics. - Don’t be afraid to buy or build – MS IT built their own site classification tool for following up to ensure data is properly secured. It also trips off groups that are not allowed on high business impact sites. Out of the box sharepoint can meet many needs, but some needs carry beyond. They also built their own site recycle bin, which I’m excited to see as a feature in SP1. I’m sure it’s a re-write, but great to see the functionality to meet a pain point I spec’ed out in 2005 be incorporated into the product. - Stay in front of demand – Those who say we’ll build it and then later figure out how to govern it are missing the point. As well if you do nothing you’re also missing it. Microsoft realized they needed to provide services early in the process to stay ahead of the viral site growth. They are growing at 1TB ever 2-3 months. - You Must Life Cycle Manage your Sites (data) – Not only is provisioning a key part of the lifecycle and support for your users, but offboarding is just as important. We need to know why a site is being created, understand its nature and when it should expire. Not all sites are created equally and life cycle must take this into account. Site ownership changes, data leakage, and poor search all result in a lack of life cycle management. I pushed Mike to share their code for how they lifecycle manage and classify their sites. I really think it would be great for the community. - IT should not operate in a vacuum – Governing by committee and including advisors from the business in a cross section of roles will help include a broader perspective. These days in business transparency is so important. I’m working on creating my own advisory group. It’s a challenge to get them gathered together, but once they see we’ll actually listen and incorporate their feedback I expect we’ll get a captive audience who will give us key pieces of feedback on challenges and our roadmap. - Education Strategy – It’s so easy to see how lack of education simply puts the pressure on the business to take time to struggle with the updates and releases, where a little training goes a long way. Training materials need to be accessible. We recently rolled out the productivity hub along with some videos. It seems training and education comes up in every conversation these days. A good deployment has accessible training and resources. - Governance includes enforcement – Remove broad based security groups on sensitive sites (like authenticated users), email->lock->delete sites owners for sites out of policy. Microsoft has built an alert and popup mechanism to notify users that go to a site that’s out of policy where the owner has not corrected the problem with the necessary action. Enforcement simply needs the rules and backing. One slide that Mike Rian shared provided a list of pain points. These are worth including…. - Difficulty finding content due to outdated and irrelevant results - Users inability to remember URLs - Orphaned team sites, mysites, doc and mtg workspaces - No rollover of site ownership - Users hitting site quotas - Complicated and painful restores due to lack of site recycle bin - Leaked information because content not properly secured Here’s the PDF deck from the Webcast: How Microsoft IT Does Governance on SharePoint 2010 Get more detail on TechNet: Microsoft IT and SharePoint 2007 and SharePoint 2010 case study and showcase whitepapers IT Showcase: Microsoft IT Uses Service Infrastructure and Governance Policies to Manage 29.9 TB of SharePoint Data
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510520.98/warc/CC-MAIN-20230929154432-20230929184432-00693.warc.gz
CC-MAIN-2023-40
5,840
25
https://docs.bmc.com/docs/discovery/213/en/traversals-1024739035.html
code
A SEARCH expression creates a set of nodes, and a LOOKUP makes a set with just one node in it. With that set, a query can TRAVERSE from each of the nodes to a new set of related nodes. The format of a TRAVERSE expression is The WHERE clause allows the new set to be further filtered. For example, to find all software instances that are running on Linux hosts: As with key expressions, elements of the traversal can be omitted as a wildcard mechanism. All matching relationships are followed, so this example finds software running on Linux hosts, and virtual machine software containing the hosts: Adding some filtering: The attributes that are accessed in the WHERE clause are attributes of the nodes that have been traversed to, not attributes of the original nodes. The original nodes have been discarded from the set. Traversals can be chained, so we can now find any business application instances related to the software instances: At each stage, the result of a traversal is a set, so each node appears only once in the set, even if it is reached via relationships from more than one node. TRAVERSE clause performs one single traverse from each node in the current set. Sometimes it is useful to repeatedly traverse to find all the nodes that can be reached via particular relationships, using an EXPAND clause. This is useful for finding all applications that depend on a particular other application, for example: The set now contains the original nodes, plus all the nodes that depend upon them, via any number of intermediate dependencies. The EXPAND keeps performing traversals until no more nodes are found. The EXPAND always keeps the original set. If you want to EXPAND but not keep the original set, use a TRAVERSE followed by an Just like a TRAVERSE clause, an EXPAND can have a WHERE clause. The filtering of the WHERE clause happens once the EXPAND has completed, not on every traversal iteration (since if it did it every iteration, it might never complete). EXPAND move from one set of nodes to another set of nodes. Sometimes, you want to stop off at a relationship along the way. This is achieved with STEP IN, which replaces the set of nodes with a set of relationships. Given a set of relationships, you can STEP OUT to another set of nodes. To find critical Dependency relationships: To find the BusinessApplicationInstances that have a critical dependency to the ones matched in the WHERE clause: To find a relationship between 2 named nodes: To find all the relationships between 2 named nodes: Named and filtered sub-traversals To see the types of all the SoftwareInstances running on each Host, you can use the following traversal: You can also use a named traversal to do the same thing: You can filter the results using a WHERE clause: An example of how these can be used is to find named attributes on Detail nodes. For example, a standard TKU pattern creates "LPAR Resource" Detail nodes with additional details about LPAR allocations for AIX machines. One of the attributes on those Details is entitled_capacity. Using a key expression to find it: As there are other, completely different Detail nodes related to those Hosts which do not have an entitled_capacity attribute, so they show as "None". For example: Using a named traversal, we can filter out the non-matching nodes. The last host in the list had five Nones before, meaning it had five non-matching Detail nodes, and no LPAR Resource Detail. Now it reports "Not set", because there was nothing matching. Similarly, when Software Instances are modeled running on a Cluster, they are given "ClusteredSoftware" relationships to each of the Host nodes that are in the cluster, to efficiently answer the common question of which software is on which hosts. When the Cluster node represents a fail-over cluster, one Host is "active" and the others are not. BMC Discovery sets an "active" attribute on the relationship leading to the Host that was most recently seen to be the active one. Because the data is on the relationship, it can be tricky to access. Using a simple key expression to access the Host for SoftwareInstances in fail-over clusters: Each SI reports two hosts, because these are fail-over clusters of two hosts. We cannot see which one is active. Using a traversal expression to access the relationship and the target node: We see just the active Host for each SI.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818999.68/warc/CC-MAIN-20240424014618-20240424044618-00578.warc.gz
CC-MAIN-2024-18
4,373
38
http://programmersvoice.com/sql-server/jdbc-drivers-for-sqlserver.php
code
latest shipping version) Low Risk (CVSS 0-to-5 or industry equivalent) Next major release or best effort Active (i.e. To get the latest preview version of the driver, add the following to your POM file: Congratz to the whole team for such an amazing tool and go on like this. Applications that run in an IDE Each IDE vendor provides a different method for setting the classpath in its IDE. We will look into adding a more comprehensive set of tests, improving our javadocs, and start developing the next set of features. LicenseMITTagsjdbcsqlUsed By30 artifactsVersionRepositoryUsagesDate6.3.x6.3.0.jre8-pr...Central 0 (Jul, 2017)6.3.0.jre7-pr...Central 0 (Jul, 2017)6.2.x6.2.1.jre8Central 0 (Jul, 2017)6.2.1.jre7Central 0 (Jul, 2017)6.2.0.jre8Central1(Jun, 2017)6.2.0.jre7Central 0 (Jun, 2017)6.1.x6.1.7.jre8-pr...Central2(May, 2017)6.1.7.jre7-pr...Central1(May, 2017)6.1.6.jre8-pr...Central1(Apr, 2017)6.1.6.jre7-pr...Central 0 (Apr, 2017)6.1.5.jre8-pr...Central 0 (Mar, 2017)6.1.5.jre7-pr...Central1(Mar, 2017)6.1.4.jre8-pr...Central 0 (Feb, https://docs.microsoft.com/en-us/sql/connect/jdbc/microsoft-jdbc-driver-for-sql-server To unpack the tar file, move it to the directory where you want the driver installed and type tar –xf sqljdbc_<version>_<language>.tar. Some commonly used platforms include Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Server 2008 R2, Windows Vista, Linux, Unix, AIX, MacOS, and others. EJB containers are sourced from various vendors. Driver Name Driver Package Version Applicable JAR(s) End of Mainstream Support Microsoft JDBC Driver 6.2 for SQL Server 6.2 mssql-jdbc-6.2.1.jre8.jar mssql-jdbc-6.2.1.jre7.jar June 30, 2022 Microsoft JDBC Driver 6.0 for SQL Server Required File(s) jtds-1.3.1.jar Default Driver Class net.sourceforge.jtds.jdbc.Driver JDBC URL Format jdbc:jtds:sqlserver:// Append sqljdbc.jar, sqljdbc4.jar, or sqljdbc41.jar to the classpath of the system. Sql Server Jdbc Driver Class Read the Article Case Study Yamaha Achieved 20X Performance Increase Using SQL Server JDBC Driver Yamaha turned to Progress DataDirect after its operationally-critical website suffered performance issues. jTDS has been tested with virtually all JDBC-based database management tools and is the driver of choice for most of these (recommended for DbVisualizer and SQuirreL SQL, distributed with Aqua Data https://docs.microsoft.com/en-us/sql/connect/jdbc/microsoft-jdbc-driver-for-sql-server-support-matrix We have an older benchmark result but we strongly encourage you to download any benchmark published by commercial JDBC driver vendors and see for yourself. Application Server Support The Microsoft JDBC Driver for SQL Server is tested with various application servers. Mssql-jdbc.jar Download Run sqljdbc_<version>_<language>.exe. 3. For more information about how to use these new data types with the JDBC driver, see Working with SQL Server 2008 Date/Time Data Types using JDBC Driver and Working with SQL Before you connect to a SQL Server database, SQL Server must first be installed on either your local computer or a server, and the JDBC driver must be installed on your Guidelines for Reporting Issues We appreciate you taking the time to test the driver, provide feedback and report any issues. a fantastic read Read the Tutorial Solution Page Learn What DataDirect can do for your SQL Server Shops Progress DataDirect is the trusted name in data connectivity for Microsoft SQL Server Ecosystems. Sql Server Jdbc Connection String Guidelines for Creating Pull Requests We love contributions from the community. Sql Server Jdbc Driver Maven You should receive a response within 24 hours. Just setting the classpath in the operating system will not work. this page If for some reason you do not, please follow up via email to ensure we received your original message. Features Business Explore Marketplace Pricing This repository Sign in or Sign up Watch 57 Star 359 Fork 118 Microsoft/mssql-jdbc Code Issues 30 Pull requests 12 Projects 0 Wiki Insights Pulse Supported Java Versions: Version support for Java Runtime Environments (JRE) and the associated JDBC API versions are determined by the included JAR files as follows: • Sqljdbc41.jar requires a JRE of Jdbc Sql Server Example This creates JDBC 4.1 compliant jar in \target directory Run mvn install -Pbuild42. Build the JAR files Maven builds automatically trigger a set of verification tests to run. Therefore, applications do not need to call the Class.forName method to register or load the driver when using the sqljdbc4.jar, sqljdbc41.jar, or sqljdbc42.jar class library. get redirected here To help improve the quality of our code, we encourage you to use the mssql-jdbc_formatter.xml formatter provided on all pull requests. Here are a couple of benchmarks you could use: JNetDirect's JDBC Performance Benchmark and i-net Software's BenchTest 2.1 for MS SQL Server. Microsoft Jdbc Driver 6.0 For Sql Server The JDBC product team tests our driver on Windows, Sun Solaris, SUSE Linux, and RedHat Linux. We recommend that you unpack this zip file in %ProgramFiles% with the default directory: "Microsoft JDBC Driver x.x for SQL Server". Quite a few of the commercial JDBC drivers out there are based on jTDS (or FreeTDS), even if they no longer acknowledge this. Please refer to this Wiki page for more information. Get the latest one from here and see whether you like it or not. No Suitable Driver Found For Jdbc:microsoft:sqlserver Choosing the Right JAR file The Microsoft JDBC Driver 6.2 for SQL Server provides mssql-jdbc-6.2.1.jre7.jar, and mssql-jdbc-6.2.1.jre8.jar class library files to be used depending on your preferred Java Runtime Environment (JRE) Download sqljdbc_<version>_<language>.exe to a temporary directory. 2. To build the jar files, you must use Java 8 with Maven. For features needing native libraries such as XA support or Single-Sign-On consult the specific README files. useful reference The Microsoft JDBC Drivers 6.0 and 4.2 for SQL Server provide sqljdbc41.jar, and sqljdbc42.jar class library files to be used depending on your preferred Java Runtime Environment (JRE) settings. jTDS is also becoming a common choice for enterprise-level applications: it passes both the J2EE 1.3 certification and Hibernate test suites, and is recommended for JBoss, Hibernate, Atlassian JIRA and Confluence Further information, including the MSRC PGP key, can be found in the Security TechCenter. Run mvn install -Pbuild41. We're now on the Maven Central Repository. For more information about the down-level compatibility of these new data types, see Using Date and Time Dataand FILESTREAM Support topics in SQL Server Books Online. 4Support for connections between the The Azure Key Vault feature in Microsoft JDBC Driver for SQL Server depends on Azure SDK for JAVA and Azure Active Directory Library For Java. Thank you! Java and JDBC Specification Support JDBC Driver Version JRE Versions JDBC API Version 6.2 1.7, 1.8 4.1, 4.2 6.1 1.7, 1.8 4.1, 4.2 6.0 1.7, 1.8 4.1, 4.2 4.2 1.7, 1.8 mvn dependency:tree Azure Key Vault and Azure Active Directory Authentication Dependencies Projects that require either of the two features need to explicitly declare the dependency in their pom file. Reload to refresh your session. and/or other countries. It would be extremely helpful if you: Report each issue as a new issue (but check first if it's already been reported) Try to be detailed in your report. Run one of the commands below to build a JDBC 4.1 compliant jar or JDBC 4.2 compliant jar in the \target directory.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864740.48/warc/CC-MAIN-20180622162604-20180622182604-00570.warc.gz
CC-MAIN-2018-26
7,557
16
https://discourse.julialang.org/t/running-julia-with-slurm-output-not-being-printed-until-after-completion/102728
code
I’m running Julia on a computing cluster and submitting jobs through slurm. The submission file is relatively simple: #!/bin/bash #SBATCH -o test.out module purge module load modules/2.1.1-20230405 gcc/11.3.0 module load julia/1.8.3 julia ./test.jl with the code: println("Test 1") sleep(600) println("Test 2") When I do this, the output of the code only gets written to the outfile after the code completes (I’ve let the code sleep for over an hour to confirm that this is the case, as opposed to there just being some finite delay). This seems to be at least somewhat Julia related, as non-Julia output such as information about module loading gets written to the outfile immediately. Is anyone familiar with this, or does anyone have an idea as to what might be causing this?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00025.warc.gz
CC-MAIN-2023-50
782
5
https://community.spiceworks.com/topic/1923868-vcenter-6-5-and-esxi-6-5-released-ga-today
code
Any decided to be the guinea pig for the rest of us and already install or upgrade to this? If so any issues? Im particularly excited about the built-in update manager, and I'm gonna wait a bit to upgrade from 6.0U2. At this point I'm just upgrading my vRealize OMA to 6.4, not sure if I want to upgrade vCenter or ESXi just yet. That and I have two R510's that are not on the "supported" list so I'm not sure if I even can. They are running 6.0 U2 just fine, curious what others think. I do like the HTML5 support and some of the new features look nice.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304345.92/warc/CC-MAIN-20220123232910-20220124022910-00407.warc.gz
CC-MAIN-2022-05
554
4
https://steem.buzz/steem/@therealwolf/one-currency-to-unite-them-all-71ooesyu
code
The biggest problem I see within Steem as a currency, is the fact that the global rewards pool is creating sub cultures within Steem itself. Instead of having one big community of people and stakeholders who believe in Steem (the currency) for similar reasons, we‘ve got different groups with different ideals. Some find that Steem should be distributed without thinking about your own profits. Some find that Steem is a great asset to be invested in as it gives you the ability to reward your friends and followers and thus grow your power. Some find that Steem is a great asset with a high APR due to excessive vote-selling & self-voting. .... and the lost goes on and on. But who’s right? What happens when different ideals clash against each other? Whale flag wars is what happens, splitting the community even further and hitting innocent targets on both sides. What‘s the optimal situation? Well, let’s take Bitcoin as an example. Everyone who’s invested in Bitcoin is most likely in it for similar reasons or at least believes in the same bitcoin ideals, which are simple and short: Value! This strengthens the bond between individual stakeholders and attracts new investors, as there is a clear path made by Bitcoin believers. If we compare Steem side by side, people from the outside might be attracted by groups who claim that Steem is an amazing asset for APR, but once they get here and try to optimize their APR, they’ll be greeted by a commando of newSteem believers, who are flagging exactly that behavior. Said user will most likely leave, as his/her expectations weren’t met. What’s the solution? We need a Steem that is universally positive and attracts and retains stakeholders from all categories who believe in Steem. And I do think there is a solution: Remove or drastically reduce the global rewards pool, add a passive inflation source for stakeholders instead and let SMTs do the rest. The main currency should be as little opinionated as possible, while unique SMTs can decide on their own what behavior they will allow and thus which categories of stakeholders they want to attract.
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145960.92/warc/CC-MAIN-20200224132646-20200224162646-00183.warc.gz
CC-MAIN-2020-10
2,125
18
https://community.skylum.com/hc/en-us/profiles/374264850111-Marc-Meylemans?filter_by=comments&sort_by=recent_user_activity
code
Well, there was a post on Feb 4th that version 3.0.2 is here...but I have not been able to get my grabby hands on it so far! https://skylum.com/blog/luminar-3-0-2 Regards, -Marc I have a similar issue as Denis Kotsee describes above. 1. It took ages to create folders and updating its contents after the initial install of Luminar 3 (talking hours here - 2 Many folders show...
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499890.39/warc/CC-MAIN-20230131190543-20230131220543-00234.warc.gz
CC-MAIN-2023-06
377
2
https://wiki.networksecuritytoolkit.org/nstwiki/index.php?title=Key_Release_Changes&diff=8899&oldid=prev
code
Difference between revisions of "Key Release Changes" (→NST 28 Release Notes) (→Missing Font for gm convert) |Line 142:||Line 142:| === Missing Font for gm convert === === Missing Font for gm convert === Post distribution of the NST 28 ISO: '''[https://sourceforge.net/projects/nst/files/NST/NST%2028-10234/ nst-28-10234.x86_64.iso]''', it was determined that a font change occurred. This issue effects the use of Post distribution of the NST 28 ISO: '''[https://sourceforge.net/projects/nst/files/NST/NST%2028-10234/ nst-28-10234.x86_64.iso]''', it was determined that a font change occurred. This issue effects the use of '''gm convert''' when rendering world mercator maps with '''[https://www.ntop.org/products/ntop ntopng''''. Revision as of 18:58, 2 July 2018 - 1 Package Management - 2 Distribution Size - NST Minimal - 3 Low Memory NST Installation - 4 New Boot Types - 5 Initial Boot - 6 NST 18 Release Notes - 7 NST 20 Release Notes - 8 NST 22 Release Notes - 9 NST 28 Release Notes Full Package Management You can now easily add packages to the NST distribution using standard yum and rpm commands. This allows you to start with a initial NST distribution and then enhance it for your custom purposes. This is only recommended after performing a hard disk installation of the NST. Live Systems Can Be Updated You can perform package management commands using yum and rpm commands even if you boot NST Live (off of a DVD or USB drive). However, since the media is not writable, new packages which are downloaded and added will consume RAM. Because of this, you should only install a few packages at a time for experimental purposes. If you were to attempt a full system update on a Live system, it is likely it will run out of memory. NST System Maintenance And Updates NST is maintained via yum updates from Fedora and the Network Security Toolkit repositories. These sites are rundundantly located in case of system or network failures. See the section: " Maintaining And Updating NST" on the Getting Started page for detailed information on upgrading and maintaining an NST system. Distribution Size - NST Minimal In order to update the NST distribution to support full package management, the full ISO distribution has increased significantly in size (over 1.2GB). The full distribution can no longer be burned to CD media (you must burn it to a DVD or a USB drive). If you have a system which can only boot from CD media (i.e., it can't read DVD media and does not support booting from a USB drive), you will not be able to run a full NST Live distribution. Low Memory NST Installation Starting with NST 2.16.0, the anaconda installer requires a minimum of 768 MB of RAM for installation of NST. The NST installer: "nstliveinst", which uses anaconda, will abort and fail to install NST Live to the hard drive if your system has less than 768 MB of RAM installed. This limitation was probably set for running the Gnome 3 Desktop. A headless NST system can still run many applications contained within the distribution using a minimum of 512 or 640 MB of RAM installed. An unsupported method to circumvent this anaconda limitation is to remove the memory requirement check. Use these steps to accomplish this task: - Boot the NST Live Distro. - Edit the anaconda executable script: (vi /usr/sbin/anaconda). - Add a python 'return' statement right after the "check_memory" function. - Make sure you left-justify the 'return' statement with the "reason_strict" description string. - Save your edited script. def check_memory(anaconda, opts, display_mode=None): return reason_strict = _("%s requires %s MB of memory to install, but you only have " "%s MB on this machine.\n") - Now perform your NST Live installation using the "nstliveinst" installer. New Boot Types One may boot an NST system using a USB drive for systems capable of booting from USB. There are 2 different types of NST USB installs. First, Fedora provides a "Live USB Creator" application that allows NST Live to be installed to a USB drive from an already booted NST Live system. Secondly, one can use the "nstliveinst" NST script to perform a hard disk install to a USB drive. Once either one of the above USB installs is completed, one can simply plug in the USB drive into a system capable of booting from USB and bring up an instance of NST booted from USB. The following services are disabled until the default NST password is changed upon booting NST Live or after a fresh NST hard disk install. Run the nstpasswd script to set the password for the root user and then both the sshd and httpd service will automatically be enabled. - The SSH daemon providing secure encrypted communications between two untrusted hosts over an insecure network. - The Apache Hypertext Transfer Protocol Server (HTTP) - Web server. The default password is still nst2003. In prior releases, you had to set the password of the NST system each time you booted a system from the ISO image. This was a good practice as the https and sshd services were enabled by default when logging into system. Starting with the new release, we no longer require you to set the NST password when the system boots. However, we no longer enable the https and sshd services until you run the nstpasswd script to set the system passwords. Hence, the NST system acts as a client system (you won't be able to connect to it from other systems) until you secure it by running the nstpasswd script. Graphical Desktop Session You now have the option on the boot screen to go directly to a graphical desktop session (you can choose between the Fluxbox or the GNOME desktop manager). The GNOME gdm graphical login screen manager is used. To login as the "root" user, choose "Other...", type in the Username: "root", type in your NST Password and select a desktop manager (Fluxbox or GNOME) on the bottom task bar. At the initial boot screen, you can now perform a media check at the start of the boot. This should be done to verify your media (especially in situations where the NST system does not boot cleanly or behave properly). NST 18 Release Notes NST 18 Versioning We have moved away from the "2.xx.0" version nomenclature to just a distribution integer release number. For example: "NST 2.18.0" becomes "NST 18". Intermediate "NST 18" releases will be distinguished by the current subversion number at time of release (e.g., NST 18, SVN: 4566). New Anaconda Installer When performing a hard disk installation using the new "anaconda" installer with "NST 18" be patient with the application. The installer takes some time to load when launched from the "NST Live" media. It appears that nothing is happening but eventually displays. Also after making any disk partitioning changes, be patient for any changes to take effect. A suggestion to the author of the new installer would be to provide better feedback or status of its current operation. HTTPS Access with a Configured Static IP Address If one configures the NST system with a static IP Address, then the "Apache Web Service" will also need to be configured for access using "HTTPS". Edit the "SSL" configuration file:"/etc/httpd/conf.d/ssl.conf" and change these lines to the static "IP Address" or "Host Name". . . . ## ## SSL Virtual Host Context ## <VirtualHost 10.222.222.10:443> # General setup for the virtual host, inherited from global configuration #DocumentRoot "/var/www/html" #ServerName www.example.com:443 ServerName 10.222.222.10:443 . . . NST 20 Release Notes The w3af Web Application Attack and Audit Framework application may need to be updated with the python pip command prior to using it. This includes both the GUI and Console-based versions. Run the following command and follow any instructions related to running the pip package installer: [root@shopper2 ~]# /usr/share/w3af/w3af_console NST 22 Release Notes Mate Desktop: User: root If one logs into NST using the Mate desktop as the "root" user, the pulseaudio daemon will not startup automatically thus no sound output will occur. This may also cause continual warning messages to accumulate in the "/root/.xsession-errors" file. A work around is to manually startup the pulseaudio daemon. Audio output should now work normally. [root@ronbo ~]# pulseaudio --start W: [pulseaudio] main.c: This program is not intended to be run as root (unless --system is specified). NST 28 Release Notes Missing Font for gm convert Post distribution of the NST 28 ISO: nst-28-10234.x86_64.iso, it was determined that a font change occurred. This issue effects the use of gm convert when rendering world mercator maps with [https://www.ntop.org/products/ntop ntopng'.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655897844.44/warc/CC-MAIN-20200709002952-20200709032952-00202.warc.gz
CC-MAIN-2020-29
8,633
69
https://developer.blender.org/docs/features/core/proposals/extensibility/
code
Extensible Architecture Proposal¶ The goal of this proposal is to make Blender more extensible and object-oriented. The first step is to make it easier for Blender developers to implement new features and understand the code. If the interface is well-defined and stable it can then later also be exposed to Python or C++. However the focus of this document is only on improving the internal architecture. Adding new features often requires changes to many files, as Blender was not initially designed to be extensible. When the codebase was small this worked well, but as it keeps growing it becomes harder and harder to manage. Operators are an example of a case that works relatively well and was designed to be extensible from the start. Python add-ons can define their own operators that behave just like built-in operators. On the other hand, adding a new datablock requires changes across dozens of files. Modifiers are somewhere in between, they have a fairly well-defined interface, but still require changes across a few files and are not extensible through Python. Ideally, implementing a datablock, node, modifier or constraint can be done in a single C/C++ file. That would include defining the user interface, DNA, RNA, .blend I/O, dependency graph nodes and relations, and any other interface specific to the data type. Some of those are relatively easy, some require changes to core Blender systems. We can work towards this ideal incrementally. There should be an IDTypeInfo interface, similar to for example ModifierTypeInfo. A significant part of this interface already exists, but is implemented through many switch statements on the datablock type. The first step would be to turn that into an IDTypeInfo struct with callback functions. (task The next step is identifying more areas in the code where the datablock type is checked, and turning them into new callbacks and flags where appropriate. For .blend file I/O, versioning likely will remain centralized. But direct and lib linking should become callbacks in the data type interface, using well documented blenloader API functions. It may be possible to replace lib linking with lib query callbacks entirely, if those are extended to support deprecated members. RNA is parsed as part of Blender compilation, and then stored in the executable. RNA can also be registered at runtime, but only for cases like operator properties and Python, not for wrapping DNA structures. We can make this either work fully at runtime (and hopefully it doesn't affect startup time too much), or we can find a way to statically process files throughout the source code instead of centralized in We expect runtime registration can be made fast enough, so that would be the first thing to work on. Modifiers and nodes would be a good first step here. DNA could also be decentralized, once .blend file I/O and RNA are done. We could have a way to mark structures as DNA with a macro, and then automatically find them throughout the source code. This still leaves us with our own parsing code which has limitations (like not supporting #defines for arrays sizes). An alternative solution would be to unify DNA and RNA registration. There would need to be a way to add internal struct members that do not need to be used as RNA properties exposed in the API. Nodes have an interface, but it can be improved. Each node system generally converts the nodes to its own representation, which allows optimizations and scheduling. To avoid the associated code duplication, there are a few solutions. At least for the new function node system, we should aim to define nodes in a single source and header file from the start. We can make it so that registering a function node in C++ will automatically create the associated C node type definition. Eventually, compositing and texture nodes should also be moved to use the new function system and take advantage of this. Some things in the node sockets are only defined through Python, like socket types and node categories. There is also some distinction between built-in and custom nodes. This is a mistake, both C/C++ and Python should register the same data type interface, with callbacks being routed to either C/C++ or Python code. Implementing a shader node in Cycles is complicated, due to the CPU-GPU abstraction and having both OSL and SVM shading systems. We can improve the system here by allowing mixed SVM/OSL nodes execution, and then removing the OSL node implementations. Further, we can automate the packing of SVM nodes, maybe with automatic code generation. Further, the connection to Blender shader nodes could be mostly automated. The dependency graph node and relations creation can also be decentralized, at least per datablock and later more fine-grained as well. Here again, Modifiers are an example of how it can be done. There are many types of UI buttons and layout elements. This could also use a more object-oriented architecture, so that the UI is represented by a hierarchy of widgets with an interface for each widget type. For modifiers and nodes, we could add a UI drawing callback to draw the properties, rather than having them in Python and code is a bit more difficult to do UI layout in, but these properties are usually relative simple and it keeps the system extensible.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476592.66/warc/CC-MAIN-20240304232829-20240305022829-00123.warc.gz
CC-MAIN-2024-10
5,307
35
http://rmathew.com/2004/accts.html
code
I update my Advogato diary far more often than these pages, probably because I have more things to say on nerdy stuff than on anything else. That diary is now also being consolidated into Planet Classpath, courtesy of Mark Wielaard. Courtesy of Yumpee Saar I now have a Gmail account from Google that too with my preferred username: rmathew AT gmail DOT com! With 1000MB of total storage space and up to 10MB allowed per incoming or outgoing message, this provides much more breathing space than what is given by the provider of the other email address I use regularly. I am slowly moving to using this account as my primary email address. Somewhat belatedly, I applied for and got write-after-approval access to GCC's CVS repository. This means that I can now commit my own patches after approval from a maintainer instead of making another person do it for me. The GIMP got its most significant upgrade in a long time when version 2.0 was released recently. Among other things, Windows is now a fully supported platform so many, many more users can try their hands on this ultra cool piece of fine Free software. Definitely worth a dekko and very highly recommended. A couple of weeks ago, I decided to update my Slackware 8.1 based Linux installation at home to the latest and the greatest stable versions of the components, compiling them all from their sources - glibc 2.3.2, kernel 2.4.26, GCC 3.3.3, XFree86 4.4.0, KDE 3.2.1, Mozilla 1.6, Gtk+ 2.4.0, etc. The upgrade was surprisingly smooth and the system feels even more responsive under Linux than ever before. In sharp contrast, under Windows the system feels slower after every upgrade. Mind you, I am not speaking this as a Linux zealot but as someone who uses it to get his work done with the least hassles - but this does make me love this wonderful system more than ever before. Oh by the way, with the gorgeous Crystal SVG icons set for KDE by Everaldo, my Linux desktop looks positively beautiful!
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743968.63/warc/CC-MAIN-20181118052443-20181118074443-00261.warc.gz
CC-MAIN-2018-47
1,965
5
https://community.cloudflare.com/t/zero-trust-managed-networks-working/451682
code
I noticed that Managed Networks has been enabled in beta and this was a feature I was eagerly awaiting so I decided to try it out. I set up the TLS cert endpoint (per Cloudflare instructions) and added a managed network in the portal pointing to the new endpoint and TLS fingerprint. I confirmed the endpoint is working and presenting the certificate. I added a new Device Settings profile using the new managed network as a selector and saved everything. I opened the WARP client on my devices (all iOS devices) to ensure the policy is up to date on the device and then performed a network change (e.g. disable Wifi and then re-enable Wifi to put the device onto the new managed network) but the new device settings for the managed network are not being applied. I tried this on several devices and made sure the clients were on the latest WARP version, but none of the WARP clients are getting the new managed settings profile when connected to the new managed network. I checked the console logs in the WARP app but nowhere in the logs does it refer to the TLS endpoint. Should this be working already or are we waiting on a new iOS app to be released for this to function? I tried this on W11 und iOS with the most recent WARP Clients. Works fine in Windows, but not on iOS. I tested on W11 with the latest WARP client and I noticed that some settings did apply (like split tunnel IPs) but others did not (the service mode did not change from Gateway with WARP to Gateway with DoH). I does appear a new iOS app release was the key, it released on Friday and I updated the devices in question. Similar to W11, it seems some settings apply while others do not. I also noticed that the transition between profiles does not work every time. I would connect to a managed network and the default profile would be applied until I launched WARP at which point it would update the settings for the managed network. I expect there are still some bugs to be worked out since it’s still in beta, I’ll watch closely to see when it comes out of beta. I am having a similar experience to you Octopirate. I am testing with MacOS (latest beta from Jan 11th - Version 2022.12.578.1 [20230111.3]) and iOS (latest version from a couple of days ago which added support for this feature). Ideally I wanted DoH mode on the local network, but quickly discovered that transitioning mode didn’t seem to work and dropped that for now. Even when manually connecting on network change, it seems that the mode got stuck permanently. Instead I focused on WARP mode, while on the local network RFC1918 is excluded and while not on the local network those ranges aren’t excluded. It is working if I connected WARP manually while on either network. However, the transition almost never works automatically, even if I give it 5-10 minutes it doesn’t seem to detect the change. Hopefully this last piece is resolved during the beta, this is a great feature and I have been waiting 6+ months for it Doesn’t work for me neither. Also running MacOS with latest version. Really hope to see this feature working soon The Trusted Networks option worked great until they removed it… Similar problem with the Android client. The Warp client gets “stuck” using the profile for the managed network and won’t switch back to the default profile when changing networks. I still seem to be having this problem. My Android WARP Client seems to be stuck on one of our managed network’s WARP profile for several hours despite not being able to reach the nominated host for that managed network. I have cycled the network connection and the WARP Client manually. Hopefully this beta feature is still in active development. I assume support is the only way to report/diagnose this type of bug but I was hoping this is a known issue. Disabling the device profile for that managed network and re-enabling allowed it to become unstuck. I will see if it sticks again tomorrow and if so report to support. The on device checks seem to show the correct response but profile selection seems to fail in some cases. This is still a problem when using the Android client v 6.25 I’m trying to use it on MacOS, (work) , Android and Fedora (personal). It seems to change behaviors . Currently MacOS sees the correct profile when disconnected, but as soon as I connect the beacon is unreachable and it falls back to default
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510462.75/warc/CC-MAIN-20230928230810-20230929020810-00067.warc.gz
CC-MAIN-2023-40
4,382
24
https://serverlogic3.com/is-powershell-scripting/
code
PowerShell is a powerful scripting language developed by Microsoft. It was first released in 2006 and has since become an essential tool for system administrators and developers alike. But is PowerShell considered a scripting language Let’s delve into this question and explore the features that make PowerShell unique. What is a Scripting Language Before we can determine if PowerShell is a scripting language, let’s first understand what a scripting language is. A scripting language is a programming language that allows you to automate tasks, manipulate data, and interact with various software components. Unlike traditional programming languages, which are compiled, scripting languages are interpreted at runtime. Scripting languages are often used for automating repetitive tasks, such as file manipulation, system administration, or web scraping. They provide an easy-to-use syntax and typically have extensive libraries that simplify common operations. The Origins of PowerShell In the early days of Windows administration, batch files (with the .bat extension) were commonly used to automate tasks. However, batch files had limitations in terms of functionality and ease of use. To address these limitations, Microsoft introduced Windows PowerShell. PowerShell was designed to provide administrators with both the power of traditional command-line tools and the flexibility of a full-fledged programming language. It combined elements from various scripting languages like Perl and Shell with the object-oriented features of .NET. The Syntax of PowerShell PowerShell uses its own unique syntax that resembles other scripting languages like Perl or Python. Each line in a PowerShell script contains one or more commands called cmdlets (pronounced command-lets). These cmdlets perform specific operations on objects. A key feature of PowerShell is its ability to work with objects instead of just text strings like traditional shell scripts. This object-oriented approach allows for more complex operations and makes PowerShell a versatile tool. PowerShell as a Scripting Language Based on the definition of a scripting language, it is clear that PowerShell fits the bill. It allows you to automate tasks, manipulate data, and interact with software components. PowerShell scripts are interpreted at runtime, making them flexible and easy to use. In addition to its scripting capabilities, PowerShell also supports advanced programming concepts like functions, loops, conditionals, and error handling. This makes it suitable for writing complex scripts and even full-fledged applications. So is PowerShell scripting Absolutely! With its powerful features and object-oriented approach, PowerShell is not just a scripting language but a robust automation tool. Whether you are an IT professional or a developer, learning PowerShell can greatly enhance your productivity and efficiency.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818337.62/warc/CC-MAIN-20240422175900-20240422205900-00171.warc.gz
CC-MAIN-2024-18
2,896
16
https://docs.sunpy.org/en/latest/generated/gallery/plotting/quadrangle.html
code
Drawing a latitude-longitude quadrangle# How to draw a latitude-longitude quadrangle on a map. The purpose of this example is to demonstrate how to draw a quadrangle on a draw_quadrangle(). A quadrangle has edges aligned with lines of constant latitude and longitude in some coordinate system. We start with the sample AIA image. aia = sunpy.map.Map(AIA_171_IMAGE) Now let’s define the bottom-left corner of the quadrangle. Note that we define it in a different coordinate frame (heliographic Stonyhurst) than the coordinate frame of the map (which is helioprojective Cartesian). Now let’s draw a quadrangle on the map, with a width of 20 degrees and a height of 60 degrees. Because the coordinate frame of HeliographicStonyhurst, the width and height correspond to the longitude and latitude directions, respectively, in that Total running time of the script: (0 minutes 1.218 seconds)
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816045.47/warc/CC-MAIN-20240412163227-20240412193227-00359.warc.gz
CC-MAIN-2024-18
890
13
https://quantlabs.net/blog/2022/05/python-vs-r-debate/
code
It seems that this debate was raging a few years ago. I am surprised that R is still considered. I could be wrong here. Some good arguments for Python and misguided R developers as well. Build or preserve your trading wealth by watching this video https://quantlabs.net/banking/ This post was removed but this was the only comment: Python and R are both popular programming languages for data analysis and scientific computing. They both have their pros and cons, but in general Python is considered to be more user-friendly while R is more powerful. (I just wonder how R is more powerful)NOTE I now post my TRADING ALERTS into my personal FACEBOOK ACCOUNT and TWITTER. Don't worry as I don't post stupid cat videos or what I eat!
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711108.34/warc/CC-MAIN-20221206124909-20221206154909-00133.warc.gz
CC-MAIN-2022-49
730
5
https://pinside.com/pinball/forum/topic/name-a-common-game-you-haven-t-played
code
I haven't played most of the Multimorphic titles. I've never played Baywatch, Skateball, Monopoly, Wheel of Fortune, Bugs Bunny's Birthday Ball, Rocky, Hoops, Car Hop, or Title Fight There's a number of ultra rare games I haven't played (Krull, King Kong, Loch Ness Monster, Qbert's Quest, Goin Nuts, Kingpin, Pinball Circus, etc) and rare foreign games I haven't touched either. There's a lot of games I've only had the opportunity to play once or twice, which was barely enough to get a good feel for them. There's a lot of EM games that I haven't played, but I don't really seek them out a lot of the time, though I do have some favorites from that era.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100626.1/warc/CC-MAIN-20231206230347-20231207020347-00271.warc.gz
CC-MAIN-2023-50
656
5
http://rulint.xyz/archives/3071
code
Jam-upnovel War Sovereign Soaring The Heavens – Chapter 3127 – Duan Ling Tian Attacks acidic prickly recommend-p2 Novel–War Sovereign Soaring The Heavens–War Sovereign Soaring The Heavens Chapter 3127 – Duan Ling Tian Attacks actor prick The duo through the Leaving Mansion Willow did not see Duan Ling Tian moving at all. When managed he get behind them? It had been as though he vanished and reappeared once more in one more area. “No, I did not.” Tong Qi Shan shook his top of your head before he reduced his speech and claimed, “If I’m not wrongly diagnosed, he got utilised legal requirements of s.p.a.ce’s Teleportation Profundity previously. The Teleportation doesn’t take in one’s Celestial Starting point Vigor and allows one to teleport to anywhere in just a 100-meter radius at the rudimentary period. The greater one’s farming structure is, the quicker the cooldown period of time between each use will be. Even though profundity doesn’t use one’s Celestial Origins Vigor, its cooldown period relies upon the level of one’s Celestial Beginning Power.” Based upon his words and phrases, it turned out obvious he got a a number of amount of perception of legislation of s.p.a.ce’s Teleportation Profundity. bound to darkness by ciara graves “The Metal Model Profundity?” Duan Ling Tian narrowed his eyeballs. He believed the profundity that Hong Ji obtained cast. Hong Ji was surprised when he saw Duan Ling Tian vanis.h.i.+ng into skinny atmosphere which he did not remember to take out his infiltration. “What variety of approach is that?” While doing so, the initial fracture from the void suddenly lengthened before it combined using the second crack during the void. Using that, the fracture developed even bigger. Within a simple occasion, a gaping gap could be noticed in the void as being a drawing push began to move the fantastic saber rays in to the hole. Using this, it did not require much time before all of the fantastic saber sun rays vanished immediately after becoming drawn into the golf hole. Refining the Mountains and Rivers “No, I did not.” Tong Qi Shan shook his brain before he decreased his voice and explained, “If I’m not taken wrongly, he acquired utilised the law of s.p.a.ce’s Teleportation Profundity previous. The Teleportation doesn’t use up one’s Celestial Starting point Vitality and lets anyone to teleport to anywhere inside of a 100-meter radius for the rudimentary period. The higher one’s cultivation bottom is, the reduced the cooldown period between each use could be. While the profundity doesn’t use one’s Celestial Origins Vitality, its cooldown period relies on the quantity of one’s Celestial Origin Electricity.” Based upon his thoughts, it was subsequently distinct he had a selected measure of idea of legislation of s.p.a.ce’s Teleportation Profundity. The great saber ray collided while using grey sword ray. Having said that, the grey sword ray was quickly overcome by the quantity of golden saber sun rays. Even so, after the second, a different grey sword ray taken out from one more fracture in the void. “No, I did not.” Tong Qi Shan shook his head before he lowered his speech and said, “If I’m not taken wrongly, he obtained made use of legislation of s.p.a.ce’s Teleportation Profundity earlier on. The Teleportation doesn’t take one’s Celestial Beginning Vigor and makes it possible for people to teleport to anywhere inside of a 100-meter radius for the rudimentary period. The bigger one’s cultivation foundation is, the smaller the cooldown time between each use will be. While the profundity doesn’t use one’s Celestial Beginning Vigor, its cooldown phase will depend on the quantity of one’s Celestial Origin Electricity.” According to his words and phrases, it turned out distinct he experienced a specific amount of knowledge of legislation of s.p.a.ce’s Teleportation Profundity. “Trying to kick free from my Restraining Profundity?” Duan Ling Tian narrowed his sight. If he did not do just about anything, it turned out likely that Hong Ji can absolutely free himself from your Restraining Profundity. In the crucial occasion, he quickly waved his right hand within the fresh air. Hong Ji nodded. Then, he looked at the purple figure and said, “Lad, you are not actually a century outdated and possess comprehended the law of s.p.a.ce’s Teleportation Profundity. You truly astonished us. On the other hand, if you feel you are able to escaping from us, you are too naive.” out of the country candy “There he is!” Tong Qi Shan exclaimed. “Restraining Profundity! Distortion Profundity!” Before Hong Ji could act in response, Duan Ling Tian cast another two profundities from the legislation of s.p.a.ce. “Go straightforward for both among us?” Duan Ling Tian’s ideas angered Hong Ji and Tong Qi Shan. Not just was this external judge disciple out of the Profound Nether Mansion unappreciative with their good motives, but he even explained he was going to go effortless in it? Was he daydreaming? Wow! I’m Gay! Section 3127: Duan Ling Tian Problems The oxygen around Hong Ji seemed to hold at this moment, causing him powerless. Then, power generated in the distortion of s.p.a.ce swept toward him, shattering his stainless steel armor. While he was shocked by Duan Ling Tian’s approaches, he failed to reduce target. Within these types of circ.u.mstances, he realized he could not afford to be derailed. Duan Ling Tian possessed made use of the Teleportation Profundity two times now. On top of that, the period in between each use was incredibly limited. This is why, Tong Qi Shan was sure that Duan Ling Tian was actually a Ten Guidelines Celestial Duke. If not, it could have been out of the question for Duan Ling Tian to work with the Teleportation Profundity consecutively! “The Piercing Profundity.” The streak of great lightweight photo out effortlessly with virtually no reluctance coming from the surroundings. The resistance was only minute at greatest. It was because Hong Ji obtained cast legislation of metal’s Piercing Profundity. As the name endorsed, it might pierce through air and minimize its resistance to almost no. Hong Ji had taken a deep inhalation to reduce the rage boiling hot in the system. He considered Duan Ling Tian and coldly explained, “Lad, it looks like generally if i don’t instruct you on a class, you’ll never understand there will almost always be persons stronger than you on earth. Allow me to reveal to you the main difference between an outside court disciple through the Serious Nether Mansion along with an inner disciple from your Leaving Willow Mansion!” Once he concluded speaking, gold gentle burst forth from his entire body, in which he was bathed entirely within the dazzling gold lighting. Gold super mounting bolts might be seen flas.h.i.+ng around his physique, offering him a formidable atmosphere. EndlessFantasy Language translation “Territory Profundity!” Duan Ling Tian suddenly showed up behind Hong Ji. All at once, vitality surged beyond his human body and surrounded the vicinity within 100 meters of Duan Ling Tian at super pace. Then, the raging vitality swept toward Hong Ji, leaving a lot of dents on his armor. “The Metal Fashion Profundity?” Duan Ling Tian narrowed his vision. He believed the profundity that Hong Ji obtained cast. Hong Ji required a deep inhale to reduce the fury boiling within his entire body. He checked out Duan Ling Tian and coldly claimed, “Lad, it appears as though when i do not educate you on a session, you’ll never master that there will definitely be men and women stronger than you on earth. Permit me to demonstrate the primary difference between an outer courtroom disciple out of the Serious Nether Mansion and an inside disciple through the Departing Willow Mansion!” Immediately after he finished communicating, glowing light broken forth from his body, and the man was bathed entirely from the dazzling wonderful lightweight. Golden lightning mounting bolts can be found flas.h.i.+ng around his body, presenting him a formidable aura. “Go quick on both individuals?” Duan Ling Tian’s phrases angered Hong Ji and Tong Qi Shan. Not merely was this exterior courtroom disciple from your Powerful Nether Mansion unappreciative of their own very good purposes, but he even explained he was going to go simple in it? Was he daydreaming? “Go quick on individuals?” Duan Ling Tian’s ideas angered Hong Ji and Tong Qi Shan. Not only was this exterior judge disciple out of the Powerful Nether Mansion unappreciative with their decent objectives, but he even reported he was going to go easy about them? Was he daydreaming? Hong Ji nodded. Then, he investigated the crimson shape and claimed, “Lad, you are not a hundred years older and have comprehended what the law states of s.p.a.ce’s Teleportation Profundity. You probably surprised us. Nonetheless, should you feel you’re efficient at escaping from us, you are too naive.” “The Piercing Profundity.” The streak of gold lighting picture out effortlessly with almost no amount of resistance from your atmosphere. The resistance was only minute at ideal. This is because Hong Ji acquired cast legislation of metal’s Piercing Profundity. As its label encouraged, it may pierce through atmosphere reducing its effectiveness against almost absolutely no. ‘Hong Ji has cast five profundities in the regulation of metal so far… Before I made use of the Teleportation Profundity, he possessed infected while using Aluminum Elemental Profundity, the Slas.h.i.+ng Inches Profundity, plus the Slicing Profundity. And from now on he’s with the Aluminum Model Profundity and the Piercing Profundity.’ With Duan Ling Tian’s present toughness, it was subsequently simple enough for him to work out the type of profundities Hong Ji got cast. Based on Hong Ji’s episodes and toughness, he safely concluded that Hong Ji got only comprehended five profundities through the rules of steel so far. “Go straightforward on both folks?” Duan Ling Tian’s words angered Hong Ji and Tong Qi Shan. Not only was this outside judge disciple from your Significant Nether Mansion unappreciative in their great intentions, but he even mentioned he was going to go straightforward in it? Was he daydreaming? Chronicles of Primordial Wars Hong Ji switched back in appear and spotted a purple physique ranking about 100 meters aside. Section 3127: Duan Ling Tian Episodes
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949025.18/warc/CC-MAIN-20230329182643-20230329212643-00360.warc.gz
CC-MAIN-2023-14
10,567
38
http://forum.devmaster.net/t/2d-platform-idea-multiplayer-strategy/21044
code
Bounce Combat (Basic Game Design) · There are 2 teams · The characters are round and they come from a pixilated world of computers. Somehow they end up in a lush fantasy world. · They are from a computer world so they have energy or charge. · There is negative charge (red team) and positive charge (blue team). · When in charge radius, players of different charges (teams) will connect like magnets. · When moving around the playing field however, it uses charge (to jump or stay in the air long takes up (uses) more of your charge). · When you are attached to a player of another charge, your job is to either 1. Steal his charge and add more power to your opposing charge bar (i.e. say your team red (negative charge) you attach yourself to someone from team blue, you can steal some of his charge to add to your positive (blue) charge bar. The use of this is that when enemies attack you, you can change to the opposite charge (the charge you stole) and it will repel you away from the enemy to avoid the risk of dying OR 2. Attack the player to kill him. · When the player IS running out of charge, their "tail" will become narrower until it diminishes and the player falls to the closest platform · When you jump for a long time or turn sharply, players will run out of their charge (which can replenish over time) · There are also power ups (located on the bottom right action bar) · Power ups are not traditional jump on-pickup-use power ups. · Power ups have charges on them. · Power ups are Positive, Negative, and Neutral · When using a positive charge, a player can ONLY pick up power ups with negative charge and vise versa. · If a power up is neutral, anybody can take it and use it · There are 12 power ups total. · There are 3 groups of 4 power ups = 4 power ups -> Super Power Up (Power Pill) · If you collect two monochromatic power ups, you will create half of a super power up. (Power Pill) · If you collect four monochromatic power ups of the same "pill", you have gotten a super power up! · When attacking other players, there are 6 different abilities that are located at the bottom left of the action bar. Skype me: chris.fracassi1 if you want to start helping us with anything relating to the development of this game. Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818696677.93/warc/CC-MAIN-20170926175208-20170926195208-00349.warc.gz
CC-MAIN-2017-39
2,271
22
https://www.create-games.com/forum_post.asp?id=202706&s=0
code
The battle system's mostly based on Super Mario RPG, but with a greater variety of and more complex action commands. For example, one type of action command that appears throughout the game, mostly in the major boss battles, starts some kind of mini-game in which the player gains full control of Ryou (the protagonist) so that he can move around, jump, and attack. For the first boss, the battlefield starts collapsing into a pool of lava below and Ryou has to climb up the falling platforms so that he can attack. In the second boss, the enemy starts pressing a Reset button that restores his HP, and Ryou has to get past a conveyor belt flooding with candy so that he can knock the enemy off of the Reset button. The game also has a total of 18 playable characters, with the party changing constantly throughout the game. With a few exceptions, most of the time once a character leaves you never get to use him again, so customization and the like are kept to a minimum (although it is present to a certain extent). Another aspect I've added is a selection of special abilities exclusive to the main character based on the Star Points system from Paper Mario.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198868.29/warc/CC-MAIN-20200920223634-20200921013634-00543.warc.gz
CC-MAIN-2020-40
1,162
4
https://etcmontessorionline.com/checker-board-plp/
code
Printed and then laser cut out of 14 mil plastic, this is the consumable version based on the original item. The Checker Board is used for short and long multiplication with the hierarchies in the decimal system up to 100,000,000. The set comes with the following: - Checkerboard mat (slight assembly required to join one seam) - Tiles (spare tiles are included for both grey and white) - printed beads (18-20 of each kind)
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107891228.40/warc/CC-MAIN-20201026115814-20201026145814-00614.warc.gz
CC-MAIN-2020-45
423
6
http://www.hp-fans.de/ewtv_/affiliates.php
code
web sites are other web sites which are relevant to our main topics (Emma Watson and Harry Potter) and which have been accepted as partner sites ("Affiliates"). you can find a list of web sites which have already been accepted as our affiliates. If you want to become affiliate with your web site, too, contact us. Please don't forget a banner of your web site, which can be published in this section. We'll send you a banner of emmawatson.tv, too, if your application is accepted, what it is for sure if you're topic-relevant. affiliates up to now: Potter Fanclub (German)
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585348.66/warc/CC-MAIN-20211020183354-20211020213354-00449.warc.gz
CC-MAIN-2021-43
573
9
http://www.cnczone.com/forums/cnczone_club_house/110732-parallel_port_pic.html?s=e26da45c35240247047876ab5005b70a
code
I am new to CNC and am interested in designing and building a small cnc machine , not really to do anything useful but just to learn more about them. From reading info on several sites I have found that the most popular method to control a cnc machine is through a parallel port. I have an old PC with a parallel port which would do well but I read somewhere that controlling it through software on windows xp is not a good idea? Although a quote from http://www.probotix.com/cnc_software/ says "Mach3 has a HUGE support group and bypasses some of the timing issues of the Windows environment" Is it possible to control them reliably in xp with mach3 or other software? I also have ubuntu linux so would I be safer using software on that? Also is there such thing as software to convert CAD into assembler or c++ so it could be programmed onto a pic micro and the machine controlled from the pic? Sorry for all the questions and thanks in advance for any useful info. Mach3 has over 50,000 registered users. I've read that 2-3% of users have problems with specific PC's. I run it on an older Dell PIII that I got for $20 on Ebay. Mach3 2010 Screenset (Note: The opinions expressed in this post are my own and are not necessarily those of CNCzone and its management)
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164116508/warc/CC-MAIN-20131204133516-00093-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
1,265
10
http://frozenfractal.com/blog/
code
A look behind the scenes at Frozen Fractal. Yes indeed, Frozen Fractal’s first officially released game is there! It’s called Patchy, and it’s a retro arcade-style land-grabbing game for Android. This post is about its inception and also describes some bits of the technical implementation. Patchy is the spiritual successor to my one-weekend Ludum Dare entry Park to Park. (And of course, Park to Park is itself a spiritual successor to the 1981 arcade game Qix.) But I made several important changes. The original Qix and also Park to Park let you move only horizontally and vertically. This makes sense with keyboard controls. With the freedom of a touch screen however, allowing for movement in any direction is much more fun. It also makes the bouncers’ trajectory harder to predict. In Qix, the player’s movement is restricted to previously drawn edges. I saw no need for that and thought it might be hard to control on a touch screen, so I let the player move anywhere they please outside the arena. The other notable change was that I added the tracers, which traverse the edge of the arena. These are critical to fast gameplay, because without them, you can just wait forever on the edge until a good opportunity arises. Because the player is not confined to edges, the tracers needed to have their laser sword to increase their range. Their purpose is to force the player to go out into the arena and expose themselves to danger, and they fulfil that purpose quite effectively! I chose to use libgdx, a cross-platform game library originally developed for Android. The great advantage of libgdx is that you can run the very same game on desktop Java, so there is no need for slow emulators or annoying apk installs. The result is a much faster development cycle. I highly recommend it. Anyway, one long Easter weekend of coding later, I had a game. A game with horrible, Ludum Dare style code quality, public fields, copypasta everywhere – but a game nonetheless, and that’s what counts in the end. Then the fun started. The game ran fine on desktop, Nexus 7 and Galaxy Nexus, but achieved only around 17 frames per second on my trusty Nexus One. It may be a few years old, but it’s not ancient, and Patchy’s graphics are really simple. I didn’t want to release something that was going to have crappy performance on all but the latest phones. What was going on? Fortunately the Android SDK comes with really great profiling tools. Traceview doesn’t just show a call graph like a traditional profiler does; it also shows a timeline detailing the exact sequence of calls, and context changes between threads. Running with profiling enabled dropped the framerate to about 12, but I thought nothing of it at the time. The output was surprising though: a lot of time was spent in updating camera matrices. Just a handful of floating point operations! (Okay, maybe in the hundreds.) Later this turned out to be an artifact of the profiler; instrumenting profilers add some overhead to each method call, and camera updates were performing a lot of tiny method calls for operations such as vector additions and dot products. Having optimized away as many camera updates as I could (updating only if something changed), although it all but vanished from the profiling output, did not help the framerate one bit. The next biggest chunk of time was spent in text rendering. Building up the text character by character into a vertex buffer, taking care to use correct kerning and such, turned out to be fairly expensive. This, too, consisted of quite a lot of method calls and was – with hindsight – probably a profiling artifact. But fortunately, text is fairly static so I could use libgdx’s BitmapFontCache. This, too, had a big impact in the profiling data but didn’t change framerate one bit. The next biggest chunk of time, around 18%, was spent on framebuffer operations. The cool, CRT-like retro rendering effect is achieved by first drawing the entire scene to an offscreen 240x360 framebuffer, then downscaling that twice by a factor of 2, then blending the three using linear filtering to achieve a blur/glow effect (and throwing in some scan lines afterwards). Now I found that, by commenting out this code and just rendering the scene to the screen, the Nexus One achieved a framerate of a steady 60 fps! I tried to optimize, but nothing worked. Using just one downscaled framebuffer instead of two didn’t help. Using no downscaling at all didn’t help either. Various combinations of clearing and not clearing the framebuffer, as suggested here, didn’t help either. Without the profiler, I was just guessing what operations took long. I could have instrumented the code by hand, but since it was still slow after ripping out almost everything that mattered, it seemed pointless. I concluded that framebuffer operations are just inherently slow on this device, and left it at that. Shipping, after all, is a feature. This was the first app I’ve ever published to the Google Play Store, and I was pleasantly surprised by the process. Exporting a signed apk from Eclipse is really easy using the wizard, and uploading it to the Play Store is a breeze. Configuration of pricing and distribution countries/carriers is also really easy in the new Developer Console. I don’t know what the old one was like, but the huge yellow bar keeps nagging me that it’s going away soon, so I don’t suppose I need to care. Most of releasing time was spent on creating promotional graphics. I drew the banner above in Gimp, mainly because I was too lazy to reboot to Photoshop. I’m not completely happy about it, but shipping is a really, really important feature, so once it had some colours and things in it, I called it done. I chose to make it a paid app because this is the least hassle for me. I do realize that payment makes for a significant barrier to entry, even though the price is as low as I could set it (GBP 0.49, EUR 0.59, USD 0.99). My main objective with this project was not to get rich; it was to get some experience actually releasing something on Android, figure out how the process works, what to do and what to avoid. My next Android game will probably be a free one with in-game ads, and possibly in-game purchases. Reception (or lack thereof) I did no advertising or promotion at all, apart from posting to Twitter, Facebook and Google+. This led to a handful of friends buying it to try (thanks everyone!), but not much else. Patchy has been in the Play Store for a few days now, and I’ve seen only one or two purchases from outside my normally under-represented home country of the Netherlands. Thinking about how the Play Store works, this isn’t too surprising: new apps don’t show up anywhere, except in search results. And nobody will be searching for “patchy” unless they already know about it. Some people might be searching for “arcade”, or “retro”, but I don’t think it’ll show up high for those generic terms either. I think the best chance for new paid games to “make it” is to end up in the “top new paid” category; the apps at the bottom of those typically have only 100-500 downloads. This doesn’t seem too hard to achieve, and would then drive early adopters and hopefully bump you to one of the other, more prominent categories. There used to be a section in (what was then called) the Android Market with new/updated apps, but with Android’s popularity these days, it probably became unwieldy. Pity. But hey, it’s been only a few days since release. Patchy has received one review so far, it’s not from anyone I know, and it’s five stars out of five, so who knows… As far as I’m concerned, having launched is a success worth celebrating in itself! Ladies and gentlemen, Frozen Fractal presents… Bigcanvas! It’s an infinite online canvas that anyone can draw on. The ‘why’ is described within the app itself, so have a look! This blogpost focuses on the technical aspects, i.e. the ‘how’. Just for fun and challenge, efficiency was one of the main design goals. This mainly manifests itself in the design of the server, storage format and the wire protocol. But to understand those, you first need to know how things fit together in the web browser. The canvas is broken up into blocks of 512×512 pixels, each with base 64 integer coordinates. We indicate the particular point within a block with another pair of integer coordinates, in regular decimal notation this time. Each block is drawn on screen using a HTML5 canvas element. Scrolling means simply moving the canvases around, and adding and removing them as needed. Drawing is a bit trickier. Because the canvas is broken up into blocks, a single line segment may overlap multiple blocks. We could simply draw it in all of the blocks that it overlaps, and rely on the canvas to clip it correctly. The problem is that the coordinate range within a block is limited (by the wire protocol, see below), so not every segment can be represented within each block. We therefore need to clip the line segment manually to fall within a small margin around each block. That’s all done on the client side. At no point do we send or store pixel data. Instead, we work with ‘strokes’, i.e. a series of points that together make up a squiggle that the user drew. Strokes are sent to the server via HTML5 WebSockets. This was a challenge, because the WebSockets standard does not (yet?) allow transmission of binary data, and mandates the use of UTF-8 strings. Invalid UTF-8 causes the connection to close. Note that UTF-8 may not contain null ( '\0') bytes. Code points between 1 and 127 (inclusive) are encoded as themselves. Code points of 128 and up require more than one byte to encode and are therefore quite wasteful. So the wire protocol was designed to use only bytes in the range 1–127. By far most data sent across the wire will consist of strokes, so it is important to represent these efficiently. I started out with 127×127 blocks, so that each coordinate within a block would fit in a byte. A stroke would thus look like xyxyxy.... But I soon discovered that this block size was too small, causing things to work slowly on Firefox and to a lesser extent on Chrome. So I switched to 512×512 blocks. Now this requires 9 bits per coordinate. The trick I use is to break each coordinate (x and y) up in a part modulo 127 and a part divided (rounding down) by 127. The modulo part fits in one character; the other part is at most 4 so it fits in 3 bits. Those 3 bits from x and y combine into 6 bits, which fit into another character. So each point is now three characters: x%127 + 1 y%127 + 1 (((x/127) << 3) | (y/127)) + 1 It’s ugly, but it works well. All the encoding and decoding is done on the client side; the server is just a dumb data switch and does not need to know the format, except to the extent that it can check it is valid (which is easy and fast). For extensibility, the string with coordinates is wrapped inside a JSON object. Later on, I might add stroke properties such as width and colour. Of course, we wouldn’t want to send the entire canvas contents to a client when they connect. Therefore, a client sends ‘subscription’ messages to the server, requesting to be kept up to date on the contents of particular blocks. When one of these blocks changes, the server pushes out the new strokes (but not the existing ones) to all subscribed clients. When a block scrolls out of view, the client sends an ‘unsubscribe’ message so it no longer receives updates. The server is written in Google’s Go. This entire project was in part an excuse for me to become familiar with that language. If you’ve never seen Go before, you can think of it as high-level C with garbage collection and very powerful and easy to use parallelization primitives. Currently, the server is not distributed in any way; it just runs on a single machine. I did design it so that it can easily be sharded if the need arises. This could be done by region in the canvas (each server serves a particular area) but this would create hotspots if many users are active in the same area. It could also be done by hash (each server serves a set of blocks based on a hash of their coordinates), but this requires a client to have connections to many more servers, and open and close them as they move around. Neither solution is ideal; probably some area-based approach combined with splitting/combining of areas is most scalable. But that’s for another day. Blocks are stored on the filesystem in flat files, one file per block. For small blocks (< 1 kB) this is a bit wasteful, but it will have to do for now. Of course, empty blocks are not stored at all, which is part of the secret ‘infinity’ sauce. To avoid filesystem limits on the number of files per directory, we compute the SHA1 hash of the block’s coordinates, take the first three and second three characters, and create a directory structure out of that. As an example, block 3,5 would be stored in the file 95a/c05/3,5. If we conservatively assume a maximum of 4096 files per directory, this allows for 236 files. If each block is 4 kB, this takes 256 TB of disk space, so the directory structure is not going to be the limiting factor. Inside each block file, the strokes are concatenated as a series of strings, each prefixed with a header specifying the length. This format is exactly the same as the wire format, which means that if a client requests a block, the server can simply and brainlessly stream out the entire file. The advantage of flat files is that we can trivially append to them. If someone draws a new stroke, we simply append it verbatim to the existing file. This is implemented in the server code by storing the stroke in a Go ‘channel’. A single goroutine runs an infinite loop that takes strokes from the channel and writes them to disk. This prevents problems with concurrent writes, and ensures the least amount of disk thrashing (although I still expect disk seeks to become the first performance bottleneck). This storage format is far from efficient, but it was easy to implement. The server currently caches all data into memory anyway, so as long as that still fits, it doesn’t really matter. Of course, a truly infinite canvas is impossible, because computers have limited memory. Even if we don’t store the actual contents, even the coordinates themselves can become arbitrarily large. But I’ve given it my best shot, storing coordinates as strings in base 64. Assuming that we’ll hit some limit at 256 characters (be it URL length or filename length), this gives 64256 different coordinates. This number is so large that even Google’s built-in calculator refuses to compute it. But we need two of these babies, an x and a y coordinate, so that leaves ‘only’ 128 characters each. On an 80ppi screen, this comes down to 2.5 × 10230 metres. For reference: the size of the visible universe is only about 1024 metres. Frankly, this is a bit scary. I intentionally did not add an erase option, and this thing is open to the entire internet, entirely anonymously. I have no idea what this will lead to. Will it bring out people’s inner artist and allow beauty to be created? Will people find a use for it, such as online collaborative sketching? Will it become a display of love, like when people carve hearts into tree barks? Will the immature insist on drawing penises all over the place? Will griefers paint everything black and ruin it for everyone? I have no idea, and that’s exciting! Today I’m feeling more superficial and have been doing some UI design work. This image had been in my head for some time, but I was happy to discover that it works on paper, too. The overall positioning of the elements on screen isn’t much different from what I’ve got today, because it gives a symmetric and balanced look. The thick frame has the dimensions of an 980×661 browser viewport, which by some freaky coincidence is exactly the viewport of Safari on the iPad in landscape mode (but it’s a sane size for desktop browsers as well). The iPad would be the ideal platform for Turtle Paint, except for one teensy detail: the keyboard would take up half the screen. I suppose it would work okay in portrait mode, and meanwhile I’m hoping that Apple will come up with decent speech recognition at some point. It might be hard to see in this sketch, but the backdrop is supposed to be a beach – beaches being the place where one finds turtles, right? (I could have done sewers instead, but that would have been a dark and smelly affair.) I’m planning to have some windsurfing, swimming and sunbathing turtles in the background, but those might not make it in the first iteration. There will be plenty of space for them to the sides, if I make the backdrop wider than the iPad frame; much like the entire thing will extend below the bottom of that frame, which will still be visible on desktop computers. As you can see, I’m going for a very physical look and feel. The easel is leaning back slightly, making the canvas non-rectangular; you won’t be able to draw outside the canvas proper. The palette contains gobs of paint to select the colour to use, three or four different brush sizes, and a painter’s knife to erase (scratch paint off). The latter might need a tool tip to reveal its purpose, but I don’t think it’ll be a showstopper. I’ll also try giving the canvas some texture, and make the paint 5% transparent to let it shine through. It might look really classy. Unfortunately, not everything is easily captured in that way. There are “Clear” and “Skip word” buttons, for which I couldn’t find suitable metaphors. Several other elements are also simply text. Although “3 of 5” and “4 of 10” could be represented graphically as a row of icons (e.g. checkboxes), I have yet to come up with a way of blending them in with the painting-on-the-beach theme. Maybe the guess list on the right side should fade into the horizon, to give the impression of depth, but I’m not sure how far I can shrink it before it becomes too small to fit all the guesses for the current round. Interface elements appear and disappear depending on what is going on at the time. The “lobby”, where you choose a game to join, has the same backdrop but no easel or any of the other game elements. If we have joined a game, but are still waiting for it to start, the easel is shown without the canvas. The palette at the bottom is only shown while it’s your turn to paint. If it’s your turn to guess, it is replaced by the guess box, and the controls in the bottom right corner disappear. Everything will be smoothly animated; as I’m not much of an animator, I’ll restrict the animation to things that can be done with CSS3 transitions. Next up is to convert all this from paper to Inkscape. That is the difficult step! Once upon a time, over a decade ago, I wrote a simple program in C++Builder to help my father solve crossword puzzles and cryptograms. It would let you type a word with blanks such as f....al and it would tell you which words would fit. When my father asked whether I still had the program, to install it on his new computer, I decided to rewrite it from scratch. This time round, it is a web app using Ruby, Sinatra and Liquid. The result is at the unimaginative URL crosswordfinder.frozenfractal.com. Of course, for anyone with basic shell-fu, it’s as simple as aspell -l en dump master | egrep '^f....al$' but for the other 99% of the population, this app might be of some use. It currently contains wordlists for Dutch, US and UK English, but I can easily add more on request. Also, this is Frozen Fractal’s first open source application. The source is on GitHub. - Immaturity. Often, there are five different Node.js libraries that do approximately the same thing, but all of them are buggy and none do it exactly the way you’d want. - Documentation. Nonexistent for most Node.js modules; most just provide one or two canonical usage examples. You could argue that I should simply read the source, but that is often difficult if you don’t have the high-level picture of how things fit together. - Callback spaghetti. For instance, the way I’m importing a word list into the MongoDB database backend takes no less than seven levels of nested callbacks: create database connection, open database, drop collection, create collection, open file, read lines, insert data. When done reading, open other collection, update word count. When written like this it looks straightforward, but in code, each action is a new level of nested callbacks. There are libraries like flow.js that make this a little easier, but they mostly remove indentation levels while not fundamentally changing anything. I like to write event-driven code when it makes sense, but being forced to use it for everything is a pain. - Difficulty of event-driven programming. It gets really difficult to tell what gets executed when. For instance, I had a bug where I opened a file and wanted to read it line-by-line in an event-driven way. I knew how many lines the file had, but the code consistently kept reading fewer lines than that. The cause? After verifying that the file existed by having opened it successfully, I opened a database connection. But while doing so, my file object already started streaming out read events, even though no event handler had been hooked up to it yet! This caused the first few thousand lines of the file to be ignored. As the event handler needed an open database, there was no way to hook it up earlier. The “fix” was to open the database first, then open the file and synchronously hook up the data event handler. var i;at the top of the function if I use ias a counter in a forloop, K&R C-style. Some such nonsense can be turned off, but not all. JSHint is better in this respect, but has other problems. Both struggle with unrecognized global variables that Node.js provides. - Syntax. It matters. Too many functionobjects make me go dizzy. I’m planning to use Sinatra for serving static files, and Cramp (built on top of EventMachine) for the game logic. This will still be event-driven code, but only where it makes sense, and hopefully Ruby syntax will make it more pleasant to use. Cramp supports WebSockets out of the box, assuming one uses Thin or Rainbows as the HTTP server. For older browsers, I might use the Flash fallback of web-sockets-js, or I could use socket.io-ruby. But as I don’t like Socket.IO very much either (feature creep, bad documentation, and new bugs every release), it’ll probably be the former. There won’t be a “polling” fallback for browsers that support neither WebSockets nor Flash, but I think I can live with that.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368701063060/warc/CC-MAIN-20130516104423-00009-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
22,860
74
https://forum.rclone.org/t/blocked-rclone-solution/17699
code
Are you asking if rclone can be used with a proxy? If so, yes; check out the FAQ ( https://rclone.org/faq/ ) which has a pretty detailed explanation. You may need to work out what your proxy settings are (which can be complicated in a large enterprise!). If you're asking if rclone uses the http/https protocols, then it depends on the service. rclone talks to the remote API. For most cloud offerings this is https based, so rclone talks that way automatically. Downloaded that program but when running it, it gave an error and didn't install. cmd /c set http_proxy=127.0.0.1:8888 & set http_proxy & c:\temp\rclone\scripts\rclone.exe & pause results in cmd window showing below: about Get quota information from the remote. authorize Remote authorization. backend Run a backend specific command. cat Concatenates any files and sends them to stdout. check Checks the files in the source and destination match. cleanup Clean up the remote if possible config Enter an interactive configuration session. copy Copy files from source to dest, skipping already copied copyto Copy files from source to dest, skipping already copied copyurl Copy url content to dest. cryptcheck Cryptcheck checks the integrity of a crypted remote. cryptdecode Cryptdecode returns unencrypted file names. dedupe Interactively find duplicate files and delete/rename them. delete Remove the contents of path. deletefile Remove a single file from remote. genautocomplete Output completion script for a given shell. gendocs Output markdown docs for rclone to the directory supplied. hashsum Produces a hashsum file for all the objects in the path. help Show help for rclone commands, flags and backends. link Generate public link to file/folder. listremotes List all the remotes in the config file. ls List the objects in the path with size and path. lsd List all directories/containers/buckets in the path. lsf List directories and objects in remote:path formatted for pars lsjson List directories and objects in the path in JSON format. lsl List the objects in path with modification time, size and path md5sum Produces an md5sum file for all the objects in the path. mkdir Make the path if it doesn't already exist. mount Mount the remote as file system on a mountpoint. move Move files from source to dest. moveto Move file or directory from source to dest. ncdu Explore a remote with a text based user interface. obscure Obscure password for use in the rclone config file purge Remove the path and all of its contents. rc Run a command against a running rclone. rcat Copies standard input to file on remote. rcd Run rclone listening to remote control commands only. rmdir Remove the path if empty. rmdirs Remove empty directories under the path. serve Serve a remote over a protocol. settier Changes storage class/tier of objects in remote. sha1sum Produces an sha1sum file for all the objects in the path. size Prints the total size and number of objects in remote:path. sync Make source and dest identical, modifying destination only. touch Create new file or change file modification time. tree List the contents of the remote in a tree like fashion. version Show the version number. Use "rclone [command] --help" for more information about a command. Use "rclone help flags" for to see the global flags. Use "rclone help backends" for a list of supported services. Press any key to continue . . . I tried checking if env variables were changed with below. cmd /c set & pause resulted in below output. Can't see any variable for http_proxy. tried the following but it still couldn't reach tardigarde. cmd /c set http_proxy=127.0.0.1:8888 & set http_proxy & c:\temp\rclone\scripts\rclone.exe lsd strj-xxxx: -vv & pause 2020/07/08 13:56:23 DEBUG : rclone: Version "v1.52.2" starting with parameters [ "c:\\temp\\rclone\\scripts\\rclone.exe" "lsd" "strj-xxxx:" "-vv"] Enter configuration password: 2020/07/08 13:56:27 DEBUG : Using config file from "c:\\temp\\rclone\\scripts\\r 2020/07/08 13:56:27 DEBUG : FS sj://: connecting... 2020/07/08 13:56:48 DEBUG : FS sj://: connected: <nil> 2020/07/08 13:56:48 Failed to create file system for "strj-xxxx:": tardigrad e: project: uplink: metainfo error: rpccompat: dial tcp 18.104.22.168:7777: conn ectex: A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connect ed host has failed to respond. Press any key to continue . . . The alternate cmd tries to install. As I have no admin rights it stops mid installation and says "are you sure you want to cancel installation". Responding with 'no' doesn't help. The only way I can run programs is: Install without admin rights . eg. Brave browser Run portable app. This is preferred. Even some portable apps are blocked by smartscreen policy. Thats why I was looking for portable version of cmd alternative. I've tried several others like 'cmder' but they all say command line is restricted by admin. However, I probably don't need command line, as can run rclone from file manager total commander, but the problem seems to be it can't reach tardigrade through the firewall.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662562106.58/warc/CC-MAIN-20220523224456-20220524014456-00399.warc.gz
CC-MAIN-2022-21
5,135
80
https://www.rubydoc.info/gems/rugs/0.1.1
code
RUGS - RUby Git Setup A helper script that makes setting up remote git repositories a snap. RUGS has three main functions: - Creates a local git repository using default templates or ones you create. - Sets up a remote repository to mirror your local one. - Adds a framework of git hooks allowing you to store and run your own hooks in directly from the repo. RUGS makes creating remote repos as simple as rugs create repo_name on server_name. A local and remote repo will be created and your default remotes will automatically to the local repo. [This is to-do functionality so the "instructions" are just brainstorming] If you want to create just a local repo but add a remote as origin you would do this: rugs create repo_name on server_name using remote as origin RUGS even allows you to automatically embed your Git hooks in the repo itself. No more jumping through hoops to make sure your hooks are maintained with your project; with RUGS you just store your hook scripts in the git_hooks directory and they're automatically updated and run. Once you've set up your project using RUGS you just use Git as you normally would with the exception of your hooks being the in Basic functionality done: - Stores config info for remotes. - Sets up local repos. - Sets up remote repos. - Automatically adds default remotes to repos. - Add setup templates. - Add hook framework to store and run hooks from the repo itself. - Deal with existing repos. - Figure out how to set remotes in a repo as some name other than the remote's name. - Refactor (of course). - Clean up test, they're really ugly. - Install the gem. - Add a remote repo. - Create a new project. It might look something like this: gem install rugs rugs remote_add origin git@git-server:/srv/repos/git rugs create new_project on origin
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865081.23/warc/CC-MAIN-20180623132619-20180623152619-00375.warc.gz
CC-MAIN-2018-26
1,796
30
http://help.pressis.com/Page_Management
code
This page basically provide you the facility of page management ,section management, Manage page is the first section provided in page management.Manage page section is used to add,modify pages. Create: This page setting use to create the new page in your database, you can fill the details of the page as per the value shown in the picture below. You can fill the values for your page ,then you can click on create page , the page will be created in the database. There is one more option showing for After/Before/Under page , this is basically use to set your page after ,before ,under any page which is already created. There are two options to add page that Regular page , Iframe Page., you can choose as per your requirements. Further there is other link Advance Page settings, as per the name suggest it is use to edit or manage the page which is already existed, you can change its values and update it in database. Edit : This page is use for managing page to (modify or to provide the update), as per shown below the picture. You can fill the details for the page which you have already added and can update the page values in the database, this section basically helps to provide quick update to your existing pages, by clicking modify page you can provide modification, and the option Forhandlerer page deactivate the shop section from your website, and delete option use to delete the page as per the requirements. This is second option provided in page management to manage section. This Page basically includes four parts first is to create new section, second one is to modify the section (you can easily modify your existing section), third is to copy the section which is already existed and you want to use that section in other page also, the last one is delete section this is the way thorugh you can delete your existed section. Create: This page basically allow you to create new section . You can add any of the section from these two option as mentioned (in to) =Main Section , Side Section . Modify: This section used to do any update in your existing section. When you click on the tab modify you will be redirected to the page as shown below: you can use this page to provide modification or updation in your existing section by selecting that particular page and section. Copy : This page is used to Copy the section to other page, Fill the details and select the page on which you want to copy the section. When you click on the tab copy you will be redirected to the page as shown below: Click on the copy (to copy the existing section to another page by selecting that section). Delete Section : Click on the delete and select the particular section you want to delete. Manage template is the third section provided in page management to manage the template. Manage: This page basically works as per its name suggest (Used to manage the template). When you click on the tab manage template you will be redirected to the page as shown below: As options showing in : Select Layout: You can Select layout for your website from the existing layout by just clicking on the specific layout. Select Theme:you can add the theme just by clicking on that specific theme which you want to add. Add Header logo :you can add new logo by browsing through your local system or you can add from the existing ones. Change Background :you can add new background through browsing in your system or you can add from existing backgrounds. When you click on the tab manage button you will be redirected to the page as shown below: As options showing in : select Page : This option is used to Select the page you want to modify. Place Code in:This option is used to Select Where to Place the code in the page. i.e. Body or Header. Gogle Code Type :This option is used to write Gogle Code Type i.e. analytics etc. Gogle Code :This option is used to write Gogle Code i.e. Code Provided by Google. Add/ Modify Code :click on this button to add/modify code. EDIT PAGE FOOTER This is fifth option provided in this page to Edit Page Footer . Manage: You can edit the footer section by clciking on the edit button. when you click on edit button , the same edit tool box will appear for it , you edit footer section by using the tabs included in editor, shown below the picture. After editing click on save page data button to edit footer.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986685915.43/warc/CC-MAIN-20191018231153-20191019014653-00040.warc.gz
CC-MAIN-2019-43
4,339
49
https://www.fi.freelancer.com/projects/php/nginx-web-app-developer/
code
Nginx web app developer for runnung web application. Work to be done remotely. Should be familier with Python, java, Uwsgi 13 freelanceria on tarjonnut keskimäärin %project_bid_stats_avg_sub_26% %project_currencyDetails_sign_sub_27% tähän työhön Hello! I am a python developer. I looked at your project and it seems interesting. I have all necessary skills required for this project. Ping me to discuss in detail.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827137.61/warc/CC-MAIN-20181215222234-20181216004234-00276.warc.gz
CC-MAIN-2018-51
419
3
https://webtechgarden.com/about/
code
Web Tech Garden was created from my interest to provide qualitative tech information and solutions to people around the world from my years of experience in the web and computer-based services. As the name implies, this is a cool garden where readers relax and chill their mind with amazing articles. Web Tech Garden also offer periodic webinars to the general public. Most of our webinars are free and in some cases premium. To provide qualitative technology and web information to people around the world. To provide world class web and computer services. Web Tech Garden also offer world class website design and development services. With a robust group of web and software developers, we provide any kind of web or software development services. Feel free to ask any question relating to any of our posts through the comment box below every post.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484689.3/warc/CC-MAIN-20190218053920-20190218075920-00399.warc.gz
CC-MAIN-2019-09
851
7