url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://fosstog.com/2017/06/03/hello-world/
code
More content soon! I registered this domian quite a while ago, but now that I’m starting to have some extra free time, I want to start focusing on building out this site and start producing content that focuses on free and open source photograpy software/hardware. For now we’ll just focus on the software side, but I’d love to see what I can do with hardware. Most notable is axiom of course, but I probably won’t have the $$$$ to pre-order one. 🙁
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891377.59/warc/CC-MAIN-20180122133636-20180122153636-00220.warc.gz
CC-MAIN-2018-05
459
3
https://2015.igem.org/Practices_Hub/Showcase
code
Human Practices Showcase -- Call for Proposals On Saturday afternoon at the Jamboree, the Human Practices committee will be holding a special session dedicated to hearing your feedback about the Human Practices aspects of the iGEM competition. We are excited to hear your views! iGEM teams and advisors will be invited to give 5-minute talks that answer the following questions: - What has been most interesting and enjoyable for you about Human Practices? - What challenges has your team faced in developing and running your Human Practices activities? - What support or resources can iGEM offer to help you improve your Human Practices work? If you would like to apply to give one of these 5-minute presentations, please send an email to humanpractices AT igem DOT org by September 7th with the following information: - Team name - Project name - 1-2 sentence description of your Human Practices activity/activities this year - 1-2 sentence description of why you would like to participate - Name(s) of proposed presenters during the Human Practices Showcase (can be team members or advisors, or both). These individuals must commit to attending the showcase session on Saturday afternoon. We are keen to hear feedback from all teams (and advisors) -- whether you have been making big efforts in Human Practices for years now or are newer to iGEM, whether you are brimming with ideas for HP projects or confused about what an HP project looks like -- come share your experiences with us!
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103626162.35/warc/CC-MAIN-20220629084939-20220629114939-00357.warc.gz
CC-MAIN-2022-27
1,489
12
https://www.lessons99.com/how-do-i-create-and-mount-a-vhd-in-windows-7.html
code
How Do I Create and Mount a VHD in Windows 7 Windows 7 provides you with the ability to create virtual hard drives (VHD) without having to repartition your computer. After VHD creation, you can mount or dismount and attach to virtual machines as additional hard drives. My favorite feature is creating a VHD and then backing up your computer using a disk imaging tool such as Acronis to that specific VHD. I also like performing Physical to Virtual conversions (P2V). This allows me to bring my desktop with me during my travels as a virtual machine. Let’s begin by opening the “Disk Management” console. Click “Start,” “My Computer,” and right-click and choose “Manage.” Select “Disk Management” and your disk configuration loads. Select “Action” from the toolbar and choose “Create VHD (Figure 1)”. Next, specify the location of your VHD and the size. You have the ability to create a fixed size VHD or one that expands as necessary until you run out of available space (Figure 2). Click “OK.” The new disk is created and you must initialize the disk by right-clicking on it and choosing “Initialize Disk (Figure 3).” Select the Disk or Disks you want to initialize by ticking the appropriate box, as shown in Figure 4, and click “OK.” Please leave the default value of “MBR” unless you are using an Itanium based computer. For the purposes of this tutorial that would be one GIANT VHD. Basically, do not choose “GPT.” Now that both of your disks are initialized (Figure 5), you are ready to create your disk volumes. Right-click on each Disk (Figure 6) you created and choose “New Simple Volume…” The wizard walks through assigning a drive letter, setting the size and formatting the drive for use. Repeat this process for all VHD’s created. Your VHD virtual drives are now ready for use and show up as drives in “My Computer” (Figure7). You can drag and drop files or save documents, spreadsheets and videos as if they were physical drives. Now that you can create a VHD, you also have the ability to detach and attach a VHD. Open the Disk Management console and right-click on the VHD disk and choose “Detach VHD (Figure 8 and 9).” Note: If you want to permanently delete the VHD, choose “Delete the virtual hard disk file after removing the disk.” Click “OK” and the disk is removed from the disk configuration. Click “Action,” “Attach VHD” and specify the location (Figure 10) of your VHD and click “OK.” This reattaches your VHD. As you can see, Windows native support for VHD creation is powerful. The line is getting blurred with each release as to what is physical and what is virtual. I suspect at some point, we won’t be able to tell the difference.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198287.23/warc/CC-MAIN-20200920161009-20200920191009-00115.warc.gz
CC-MAIN-2020-40
2,750
13
http://forums.augi.com/showthread.php?150534-Pipe-Accessory-Family-Inserts-at-Strange-Angle&s=0ceeb48dd190200a00b4fa44795450a6&p=1246233
code
I recently created a new Pipe Accessory family. I've done this many times before with no problems. But, this time when I insert the family into my model it always want to break into the piping at a strange angle instead of vertical. The family is defined as "always vertical" and was built in a vertical orientation. Any ideas on why this is happening? Sample screen shot is below. What I want is shown on the right, but what I'm always getting is shown on the left. I can rotate it to the correct angle, but this shouldn't be necessary.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122619.60/warc/CC-MAIN-20170423031202-00480-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
537
1
https://www.odoo.com/groups/community-59/community-19411002
code
Community mailing list archives Re: user access rightsby I hope you are aware of the security operation. You can apply field level security over here. So you can do one thing create a group add only admin & apply that group to that particular field which you want to show particular group of users only. I hope my answer will help you. You can explore more details in given link written by SerpentCS. Let me know if you need more help on this. On Thu, Jul 28, 2016 at 4:32 PM, Omal Bastin <[email protected]> wrote: I believe that user will belong to some user group. Following is a link to an answer posted in stackoverflow for making a field readonly for users under specific group. In your case you need it to be invisibleOn Thu, Jul 28, 2016 at 4:01 PM, Dominique Chabord <[email protected]> wrote:@Adel I think your message was not intended to be posted here and this place is an English speaking list. short answer : your url is uncorrect Back to original thread (sorry for noise)--Omal Bastin
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864848.47/warc/CC-MAIN-20180623000334-20180623020334-00470.warc.gz
CC-MAIN-2018-26
1,012
10
https://interpersonal.stackexchange.com/questions/10886/how-to-stop-dad-from-telling-the-same-jokes-again-and-again
code
Context: I am 23, studying in Switzerland. I have a really good relationship with my father. Often when I visit my dad(55) we go for a walk or just have a tea. We talk about all kinds of things and from time to time he will tell jokes he has told many times. This is boring and annoying to me. My goal is to make him stop tell these jokes, but without directly saying so. Because saying something like: "Don't tell me this joke, it is boring and you told me before" is very offensive. What I tried: I tried numerous things which nearly never had an effect. He usually just proceeds to tell the joke. Sometimes he goes "Ah" and stops but that is rather rare and next time we meet he goes at it again. - Not laughing at all at the joke, just lifting the sides of my lips a little bit in german "müdes lächeln"(tired smile) - Saying: "Oh I heard this joke before" - Saying: "You told me this joke before" - Finishing the joke for him. I think his intentions are to create a good mood and be funny. Now while I am not impacted much by this and the mood when we meet is always great and I enjoy seeing him, these joke have the opposite effect. How could I react to achieve my goal, but also fulfill his intention of creating a good mood? To me the mood is already good and we talk about interesting things no need for an old joke to "lighten the mood". An answer from the perspective of a dad is very welcome, maybe I am misunderstanding what this joke interaction is about and a dad can tell me the story from the other side. Note: He also does this, repeating these jokes, to others as well. The jokes are not related to the topic we are talking, and often some random internet jokes you would find if you type 'jokes' into the google.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00287.warc.gz
CC-MAIN-2024-18
1,734
9
http://daejongfilmaward.org/room-divider-kijiji/room-divider-for-sale-kijiji-wall-winnipeg/
code
Room Divider For Sale Kijiji Wall Winnipeg |Include In Article| Room Divider Kijiji |Published Date||Sunday , March 22nd 2020| room divider screen. Sunday , March 22nd 2020. Quote from Room Divider Kijiji : You have to decide first what sort of theme you would like for the curb appeal. The ideal theme is, naturally, one that complements the general exterior look. Hopefully you’ll find the ideal inspiration from our gallery here. Effortless Style made a room divider with over 1 function. In the site, you’re going to be in a position to learn many things regarding interior design. You may also utilize fabric in place of finished curtain panels to lower the expense of your curtain divider. Utilizing a black canvas screen you may add upholstery fabric and a number of bolts for something extra sharp. Wall dividers can be put almost anywhere and are created of various materials. Wood dividers were hard to discover. One of the most frequent dividers utilised in homes is an easy wall divider. You can create a Multi-Use Divider. If you select a rice paper room divider, this choice is ideal for allowing light to pass through. It is possible to also utilize room dividers as a manner of hiding workspaces. You may even make an offbeat room divider with the usage of some crates! You are able to buy dividers with floral designs or gorgeous scenes or even purchase a fabric covered divider to improve the softness of the style. Which kind of room dividers to use, will count on the home owner’s demands and requirements. Creating DIY room dividers is a fantastic approach to divide a bigger area into two defined spaces. It’s possible to customize a wooden frame within which you may insert a translucent glass that’s embossed with designs. The way in which the light is filtered to every side of the rooms can be used to make an appearance of division also. Each divider can be constructed from materials like metal, bamboo, or strong wood and in a range of price ranges. With suspended curtain rods and a sheet of cloth, you might have an instantaneous divider. Any content, trademark/s, or other material that might be found on this site that is not this site property remains the copyright of its respective owner/s. In no way does LocalHost claim ownership or responsibility for such items and you should seek legal consent for any use of such materials from its owner.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371665328.87/warc/CC-MAIN-20200407022841-20200407053341-00484.warc.gz
CC-MAIN-2020-16
2,390
11
https://informationmania.in/whats-the-difference-between-programming-and-scripting-language-2020/
code
Two types of programming language – high level and low-level. The high-level programming languages are called formal computer language. It is a collection of vocabulary sets or grammatical rules made for a computer which gives instruction to communicate with the computer and perform a specific task to computer. To convert high language into machine code another program which is called compiler or interpreter is needed. Software programs and scripts are made using Programming Language which can be executed on computers and end-user can perform their tasks by using it. Example – Java, C ++ and Pascal, Visual Basic BASIC, FORTRAN, Dot net etc. Low-Level Programming languages– The basic language of the computer is also called low-level computer language or machine language which only understands binary (‘1’ and ‘0’) code but it is very complex to convert the low language to machine code. There is no need for another program called compiler or interpreter. High-level languages (an example of which we have given above – software for school) are very easy to use. About scripting language Having interpretations at runtime means that when an application is running or running, the code is read and executed. The scripting language is used to create a script which is a type of programming language. A feature of scripting language is that it can communicate with any other language. These scripts can be embedded with a language like HTML i.e. you can also write scripting codes in HTML document. Almost all scripting languages are programming languages. scripting is used not only in webpages but also in operating systems. Where it is used to automate a task. Difference between scripting language and programming language Knowing These Secrets Will Make Your Difference Between Scripting Language And Programming Language Look Amazing – Programming Languages –In programming, the code compiles before executing. Once compiled, the source code of the program cannot be seen. On compile, it creates a binary file that requires additional memory. Its codes are complex. Many codes have to be written for the entire program. Due to complexity, it takes time to learn. C, C ++, Java, etc. are some examples of programming languages. There is no need to embed it with any other language. Once compiled, the source code of the program cannot be seen. On compile, it creates a binary file that requires additional memory. Programing language is used to make software or to give any command to the computer. The programming language is server-side languages eg VB, C#, C++ and JAVA It is not directly run in the browser, the compiler is required to run and not understandable to the browser. In Programming Language first, you compile the code through compiler i-e compiler or intereprator then you can see the output of the code. like c,c++ The programming language is basically defined in the Business logic layer. Where we used to write business logic operation which can be direct. Programming Languages are compiled to machine code and run on the hardware of the underlying Operating System There is no need to compile code in scripting. It is interpreted in runtime. Mostly it is embedded with a language like HTML. On the web browser, we can see the source code of the script. This does not create any kind of binary file nor does it take up extra space. In this, only a few lines of code are used. scripting language directly runs in the browser and understandable to the browser. scripting language is the language understood by the people. It is basically a language to interact with the browser and also rendering information from both Client and Server Side On the other hand, scripting languages are an unstructured subset of programming language,they are generally interpreted. The scripting language is used for writing small code and it has less security compared to a programming language. For example, the scripting language is used for validation of form not for submitting it into the database. (Image source google search)
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585449.31/warc/CC-MAIN-20211021230549-20211022020549-00215.warc.gz
CC-MAIN-2021-43
4,066
37
https://tesmail.org/domain-based-message-authentication-reporting-conformance-dmarc/
code
Domain-based Message Authentication, Reporting & Conformance (DMARC) is a standard that allows the owner of an Internet domain name to specify a policy for treatment of unverified messages that appear to originate from him, and to request reporting for such incidents. Standardized in 2015, DMARC builds on top of SPF and DKIM. It addresses a fundamental problem of those mechanisms: originating domains have no immediate way to monitor the actual effect of their SPF and DKIM policies, while recipients cannot know the degree of confidence and reliability of every sender’s implementation; thus many preferred to stay on the safe side and not to discard any messages, voiding most of the purpose of these systems. Also, DMARC adds an additional check: while SPF verifies that the originating server really belongs to the domain name of the envelope sender, and DKIM verifies that the message really comes from the domain name that signed it, a successful DMARC verification also requires that at least one of these domain names matches the domain of the sender’s email address as shown in the From: field of the message. This addition is particularly important because the sender’s email address is displayed by clients and used by users to identify the message author: it is the true target of phishing attempts. This further requirement is called message alignment: a message is aligned if the domain name in the sender’s email address matches the domain name used by the underlying authentication mechanism. The alignment is verified separately for each authentication mechanism, so a message can be “SPF-aligned”, “DKIM-aligned” or both. For DMARC verification to be successful, there needs to be at least one alignment on an authentication mechanism (SPF or DKIM) which was also successful on its own; a single failure in SPF or DKIM is not a problem as long as the other mechanism produces a successful and aligned verification. By default, the alignment is checked in relaxed mode, which means that it is enough that the organizational domain – the one belonging to an entire organization, e.g. “example.com” or “example.co.uk” – is the same, even if the actual domain names are different due to the use of different hosts or subdomains inside it. However, the domain name owner can prescribe a strict mode alignment check, in which no difference is allowed at all, even if just in terms of subdomains of the same organizational domain. The DMARC alignment check breaks several traditional legitimate email arrangements, such as mailing lists and automatic forwarding of messages, where the manipulation of headers or the re-sending of the message from a third party server, even if properly validated via SPF and DKIM, can easily break the alignment. This is why the deployment of DMARC has been cautious and based on trial and error. However, having to find technical workarounds for some specific email uses is considered a lesser evil, in the ongoing fight against email forgeries. DMARC is implemented through a policy declaration published in a specific TXT record in the DNS for the name “_dmarc.<domain>”, where the domain name used for the query is that of the sender’s email address. The declaration is made by a series of name-value pairs, of which “p” (policy) is the most important, as it tells the receiving server what to do with messages that fail DMARC verification: “p=reject” will tell the receiving server to reject the messages, while “p=quarantine” will tell it to accept them but mark them as dubious and possibly illegitimate. It is up to the receiving server whether and how to honour these indications. This can be done by specifying “p=none” and adding some specific email addresses for reporting, as values for the “rua” and/or “ruf” properties. This declaration tells the receiving server to send to those addresses an aggregate report in XML format about all messages that failed verification (“rua”) and/or a copy of the actual messages (“ruf”). If these email addresses point towards a different domain name, a consent must be provided by that domain name via another specific DNS record. Also, to reduce throughput, a message reporting percentage lower than 100 (“pct”) can be specified. This allows the originating domain to check whether the failures only include spam and forged messages, or whether they also include legitimate messages that due to SPF or DKIM configuration problems are failing the verification. Further details can be found in the overview and FAQ on the DMARC website; RFC 7489 contains the full specification of the DMARC policy record fields.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00249.warc.gz
CC-MAIN-2023-14
4,679
11
https://community.emc.com/thread/243285
code
Please share the NetWorker version you are using. What you have set is a notification for Savegroup on NetWorker. Are you saying that this msg is being passed on to your trap host as information and how do you process it further? After I know the version, I can tell you which file to look at. but still not clear on how you have applies nsrtrap in your environment. Looks like an interesting approach. We are using NetWorker 22.214.171.124.Build.478 NetWorker Source Capacity Data Zone Enabler, in Linux os. /usr/sbin/nsrtrap -c public -i 1 xxxxxxxxxx When networker servcer sends trap to snmp server its getting only first line of failure group like below. "NetWorker savegroup: (alert) <<GROUP NAME>> completed, Total 16 client(s), 1 Failed, 15 Succeeded. Please see group completion details for more information." But we need full backup failures information including failure clients and error messages. NetWorker savegroup failure: (alert) xxxxxxxxxx aborted, Total 6 client(s), 0 Clients disabled, 0 Hostname(s) Unresolved, 2 Failed, 4 Succeeded, 0 CPR Failed, 0 CPR Succeeded. xxxxxxxxx aborted, Total 6 client(s), 2 Failed, 4 Succeeded. See group completion details for more information. Failed: xxxxxxx1, yyyyyyy1 Succeeded: zzzzzzz, rerrrrrrr2, cccccccc2, eeeeeeee1 Start time: Wed Dec 27 21:15:00 2017 Restart time: Thu Dec 28 00:05:15 2017 End time: Thu Dec 28 00:53:46 2017 --- Unsuccessful Save Sets --- * xxxxxxx1,sr/local/oracle/scripts/rman/archive_backup_xxxxxxx1,.rman --- Job Indications ---
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829115.83/warc/CC-MAIN-20181217183905-20181217205905-00237.warc.gz
CC-MAIN-2018-51
1,512
17
https://cookiepedia.co.uk/cookie/271501
code
_session_id on audioporncentral.com About this cookie: This cookie creates an interim session ID used as an in-session user ID. Related general information about _session_id: We don’t have enough information about this cookie or the website hosting it to be able to assign it to a category at this time. However, we are constantly updating our knowledge base, so do check back if you need to know more. If it is urgent then get in touch and maybe we can look into it for you.More about cookie classifications. Third Party Cookies Session Cookies are only stored temporarily in the browser's memory, and are destroyed when it is closed down, although they will survive navigating away from the website they came from. If you have to login to a website every time you open your browser and visit it - then it is using a session cookie to store your login credentials. Many websites use session cookies for essential site functions, and to make sure pages are sent to the browser as quickly and efficiently as possible. This protects it from so-called cross-site-scripting (XSS) attacks, where a malicious script tries to send the content of a cookie to a third party website.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662604495.84/warc/CC-MAIN-20220526065603-20220526095603-00323.warc.gz
CC-MAIN-2022-21
1,175
10
https://datatpoint.com/atlassian-careers-2023-hiring-for-software-engineer/
code
Atlassian Data Center products are built for enterprise and designed to be self-managed by our customers. They provide flexibility to meet the unique needs of our customers through infrastructure choices and controls. They are built to meet the expectations of quality and security of our customers and have built-in enterprise-grade features to meet the complex demands of our customers. Confluence Data Center is a collaborative knowledge hub where remote teams can create content, collaborate on work, and organise and share information, all in one place. - Regularly tackle large and complex projects in the team, contributing to technical design, implementation and release. - Partner with other engineers, designers and product managers to deliver quality features for Confluence DC - Rotational feature leading on large projects - Routinely tackle complex architectural challenges and apply our architectural standards - Contribute to documentation - Work with the team to solve complex bug fixes - Guide other engineers in the team by pair programming, tech design reviews, meaningful code reviews and sharing through our Craft Brownbag Sessions. - Partner across engineering teams to take on company-wide initiatives spanning multiple projects - Keep our quality bar high - Mentor more junior members - Proficiency in any modern object-oriented programming language (e. g., Java, Kotlin etc. ). - Experience building large-scale, web-based enterprise software - A track record of execution, risk management, and delivering outcomes - Experience with risk assessment, testing practices and philosophies, and have a quality-oriented mindset - Excellent troubleshooting, debugging, problem-solving and analytical skills - Passion for product, and delivering value to customers - Passion for collaborating with and mentoring junior members of the team - Great communication to build and articulate a technical vision for the product and pitch it to critical stakeholders.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817474.31/warc/CC-MAIN-20240420025340-20240420055340-00633.warc.gz
CC-MAIN-2024-18
1,976
20
http://bpc4hana.blogspot.com/2017/01/debugging-fox-part-1.html
code
In this first post I want to address the two ways to debug FOX code in SAP BPC Embedded/BI-IP. Two methods exists: 1 - Debug the fox code itself as FOX script, covered in this post 2 - Debug the generated ABAP code, covered in part 2. Debug FOX Code as Script This method allows you to trace the values in the script. And you will be able to see the block characteristics as well as the fields to be changed and trace the values quite easily. To debug using this method follow the steps below: In Transaction SE80, select class CL_RSPLFR_CONTROLLER Expand Methods and Select the Method execute_service and double click. Go to line 105 and set a break-point Once set, go to transaction RSA1, and select the planning sequence and the step you want to test. Add the variables you need and then select 'Execute step with trace'. The ABAP debugger will pop up and stop at line 105 where we set the breakpoint. Select the script tab: And select Load Script. Keep the Script Source Database and under script name, select or enter RSPLFC_DEBUGGING_SCRIPT_FOX Click on the Start Script Button You should now see the debugging screen with your FOX Script: To start the debugging process, press the Start Debugging button or F8. The following features are available: Block Values: Display the block characteristic values Show Messages: Display any messages Choose Variables for Display: This will allow you to display the values of all fields to be changed. Toggle Variables for Display: Switches the variable display on and off. Toggle Ref-Data Display: Switches the display of the reference data tables on and off. Toggle Block Value Display: Switches the display of the block data tables on and off.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648003.58/warc/CC-MAIN-20180322205902-20180322225902-00732.warc.gz
CC-MAIN-2018-13
1,691
23
https://mediajunkie.com/2002/political-parrhesia-the-national-debt-marches-upward/
code
Just passing this Political Parrhesia item along: The federal government’s fiscal year ended on Monday, September 30. So, it is appropriate to take a look at how much the national debt rose in the past year. $100 billion? You wish. $200 billion? Sorry. $300 billion? Still low. $400 billion? Getting warmer. The actual amount? Upon further review, we learn that the national debt rose by $420.773 billion in the past 12 months. It goes on, with links to the details.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337906.7/warc/CC-MAIN-20221007014029-20221007044029-00118.warc.gz
CC-MAIN-2022-40
468
6
https://www.educatorstechnology.com/2014/03/a-treasure-trove-of-educational-ipad.html
code
March 6, 2014 Here is a wonderful resource I came across today and wanted you to see as well. TCEA iPads Apps and iBooks is a resource page created by the folks in TCEA (Texas Computer Education Association) which is a member-based organization devoted to the use of technology in education. This page features tons of educational iPad apps organized under different categories. You can browse apps according to age group and content area. I have been spending some time sifting through the apps they featured and found them really worth sharing. There is a section for interactive books which span a wide variety of genres including: picture books, rhyming books, books for non-readers, beginning readers and many more. There is also another section devoted to special needs apps and another one for web tools to use with your iPad. Overall, TCEA page is a treasure trove that you should bookmark for later reference. Have a look and share with your colleagues.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.87/warc/CC-MAIN-20231130031610-20231130061610-00081.warc.gz
CC-MAIN-2023-50
962
3
https://wiki.climatechange.ai/w/index.php?title=Climate_Impact_Of_AI&oldid=5730
code
AI and machine learning has a climate impact from the energy used at all stages from development to deployment, as well as considerations around embodied energy in hardware from GPUs to data centres. Tools to measure the CO2 impact have been created - Lacoste, Alexandre; Luccioni, Alexandra; Schmidt, Victor; Dandres, Thomas (2019-10-21). "Quantifying the Carbon Emissions of Machine Learning". arXiv:1910.09700 [cs, stat].
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710801.42/warc/CC-MAIN-20221201053355-20221201083355-00511.warc.gz
CC-MAIN-2022-49
424
2
http://madpropstobakedpotatoes.com/2013/08/aspiring-to-be-a-programmer.html
code
Learning computer languages comes naturally to you and for good reason since you want to program for a living. Most people don't want to engage in the art of learning these languages, but you have a capacity to learn them and, taking it a step further, create one of your own. C++, COBOL, and others are not unfamiliar to you and, in fact, you get joy when these are presented to you. This is the right mindset to have in a case where you're in control of the PC's brain and communicating tool. Programming requires knowledge of languages and other forms of innovation such that new and easier means of computer usage are created. Computers have to talk to one another and the language that a programmer would know is the system used to establish a direct connection. Being a programmer implies that you've learned the languages which may include HTML or a variant form of a hypertext markup language. Whatever the case may be, it's a proven fact that a programmer is a valuable asset to a business. Working in the business world as a programmer, whether you've secured a position with Google or have started your own company to service the masses, has its rewards. There is the added advantage of a decent income and the demand for such a person still exceeds supply. To have the skills necessary for such a job places you in another bracket to command a staff and work with other creative people. Enjoying the talents of people with like minds is the way to truly revel in the benefits of the field. With work come incentives in addition to the pay perks and titles. You'll get to work with the best in the field whether they're software engineers or not. The possibilities are endless. Living in this age promises this. The worse part of being a programmer might be the hours that you must commit to the job, but this applies to many career paths.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218193284.93/warc/CC-MAIN-20170322212953-00138-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,850
4
https://slashdot.org/~StarWynd
code
Your focus shouldn't be on tracking and staying on top of all the trends. It should be about finding ways to be more efficient and more productive with what you're already doing. Occasionally, I will accidentally run across a cool new tool or framework that's useful, but most of the time I have to go looking for it myself. If you find yourself saying "Surely there's a better way," someone else has probably said the same thing. And while you could scan books or search online for the answer, talking to someone else who has experienced the same thing is probably your best bet. Get involved with a local user's group for whatever language you're developing in. Ask questions, show up at the meetings and contribute back to the group. It's still good to track new trends, but this should be secondary. Just subscribe to a tech magazine or two or maybe watch some of the RSS feeds from sites that pertain to your work, but your best resource is the rest of the community.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560285315.77/warc/CC-MAIN-20170116095125-00325-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
972
1
https://ned.ipac.caltech.edu/level5/Sept04/Koratkar/Koratkar_contents.html
code
Invited Review. Published in The Publications of the Astronomical Society of the Pacific, Volume 111, pp. 1-30, 1999. For a PDF version of the article, click For a PDF version of the article, click here. Abstract. A fundamental component of models of active galactic nuclei (AGNs) is an accretion disk around a supermassive black hole. However, the nature of this accretion disk is not well understood, and current models do not provide a satisfactory explanation of the optical/UV continuum observed in AGNs. In this paper we review the substantial theoretical and observational progress made in the field. We also try to point out future research directions that would be fruitful in trying to obtain a complete, self-consistent model of the continuum-emitting regions. Table of Contents
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00609.warc.gz
CC-MAIN-2023-14
789
6
https://exceptionshub.com/excel-how-to-change-y-axis-min-max-scale-values-using-c.html
code
I’m trying to change the Y Axis Scale limits of Excel Chart using C# , the following code works fine on X-axis but struggling to change this to Y-axis. Excel.Axis ax = chartPage_1.Axes(Excel.XlAxisType.xlCategory, Microsoft.Office.Interop.Excel.XlAxisGroup.xlPrimary) as Excel.Axis; ax.MinimumScale = 0.3; any help or suggestions would be much appreciated. Thanks.! Here’s the code I’m using: myChart.Axes(XlAxisType.xlValue).MinimumScale = MIN_SCALE; Could be that different chart types will/won’t work with this.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178357984.22/warc/CC-MAIN-20210226205107-20210226235107-00484.warc.gz
CC-MAIN-2021-10
522
9
https://originalsessions.com/qa/question-what-is-the-only-pure-oceanic-plate.html
code
- Are continents the same as plates? - What happens when two oceanic plates diverge? - Which are the oceanic plates? - Is the Cocos Plate oceanic or continental? - What are the 2 oceanic plates? - What happens when two plates carrying oceanic crust collide? - Why is it called the Ring of Fire? - Is the Cocos Plate shrinking? - Is Antarctica still moving? - What are the names of the hot spots on Earth? - Why is the Nazca plate a divergent boundary? - How many oceanic plates are there? - Is Antarctic plate oceanic or continental? - What are the 12 major plates? - What will happen when two oceanic plates move towards each other? - What is the largest oceanic plate? - Are oceanic plates more dense? - What caused Antarctica to freeze? Are continents the same as plates?
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178357935.29/warc/CC-MAIN-20210226175238-20210226205238-00392.warc.gz
CC-MAIN-2021-10
774
19
http://forums.interworx.com/forumdisplay.php?10-Feature-Requests
code
Let us know where SiteWorx needs work or could be improved by adding a feature. To syncing Interworx with external DNS servers this is very important feature, what the most users would like to have on Interworx CP. Can someone test uploading a custom avatar / profile pic / album? For some odd reason, the feature has been disabled. I just renabled it :D Whoever tests this for me will win an achievement! (Please contain your excitement though.) Right now, when users want to login to the controlpanel, we have a number of ways. Let the user access the controlpanel without HTTPS. -> they might as well stand in a streetcorner and shout out their user information. Give every customer a SSL certificate and dedicated IP -> Overly expensive,... I've implemented a long overdue plugin that measures and rewards us for activity on the forum. I'll be slowly skinning this to look better when I have time, and also adding different awards and achievements. The end goal will be a point system that translates into currency so... Considering the easy to use Ruby on rails integration in Iworx, there should really be a NodeWorx/SiteWorx Gui plugin for MongoDB, as it's one of the most widely used noSQL databases in Ruby Congratulations for your product : - Full featured control panel - APF support - Multiple domains - Real-time graphical statistics - Pleasant to use - an api well documented usable in php loadUI is my suggestion as an open source Load Testing solution that is free and cross-platform. Very useful to test our servers deployed with Interworx, whatever alone or clustered. "With a visual, drag-and-drop interface, it allows you to create, configure and redistribute your Load... I think it would be great if you could make a RPM for NfSen for your repos. NfSen is a network monitor, and it has a lot of great features! It uses RRD graphs, the same graphs that you use for the rest of our controllpanel, and contains some aditional features. NfSen described here:... I suggest Icinga for monitoring Systems & Network. "Icinga is a fork of Nagios and is backward compatible. So, Nagios configurations, plugins and addons can all be used with Icinga. Though Icinga retains all the existing features of its predecessor, it builds on them to add many long... I would like to see the Package Name that is set up in NodeWorx to be displayed some where on the entrance Page of Siteworx. Something to the effect "Your Current Hosting Package is: XYZ" And if you wanted to take this one step further in Nodeworx when one sets up a package right under... I haven't seen this available, nor do I know of a workaround; if someone more familiar has a suggestion please feel free to enlighten me. I'd like to see an option in the "packages" section to select "no local email". As in, the user will be hosting their email elsewhere so when the account is... GlobalSign have a great SSL provisioning system that makes life a lot easier for both service provider and customer. There is already an integration with WHMCS, but there also needs to be an integration with InterWorx for it to work. information on the system:... The current panel doesn't support Multi-Domain SSLs without doing some hacking to get it to work. It would be nice if you could install a Multi-Domain SSL against a shared IP address for use on many sites. Be able to set what webmail clients are available on a PER SITEWORX account or per domain. Also be able to set a "custom" webmail app if you choose to install something else so you can redirect /webmail to the custom webmail app per domain. We're currently reviewing the design of our network, and it got me thinking... Have you guys ever looked at the idea of doing micro licenses for cluster deployments? Such a license could: -Support only 1 or 2 services, -Only function with an InterWorx cluster master, Would be nice to be able to pull in an external DNS service like Amazon's Route 53 or Rackspace DNS or both. See what DNSly.net did... Whether it's the vacation message or the actual stand-alone autoresponders in Siteworx, I'd love to know if there is a way to make them more "intelligent". Is there some hack I can do from the command line? If not, I'd like to see these features enhanced in future releases. Here's what I mean... Is there a way to force password rotation for siteworx accounts or have them use a 3rd party authentication method such as active directory? In the PACKAGE section, can you guys implement a drop-down for whether Softaculous (or Simplescripts) is available to users set up with that particular package? I like that I can manually turn it on/off on a per user basis, but I'd like the option set properly upon sign up, when the correct... I've been doing a lot of research recently into qmail, especially since some spammers exploited a brute force attack that has allowed them to create hundreds of thousands of emails from [email protected]. I've recently implemented some stricter qmail measures on SMTP and POP,... Could you implement this as default for security reason? Just curious, would anyone out there be interested (and see the value) of a SiteWorx WordPress plugin, that would allow the Administrator access to the SiteWorx Control Panel while logged into the back in of WordPress? Of course this would mean the WordPress install would be on the same server of... Auto-Installation of Sogo for the purpose to have a good platform in terms of communication / collaboration / coordination so this includes the mail server out of the box along with Funambol (pluggable into sogo) for mobile devices. It would be really nice to have a Notes area on each page where I could record events or reasons behind a particular setting. There are settings I have made and don't necessarily remember why I made them. There are procedures that I go through when a condition arises and it always takes me a few... Issue: We currently use the SuPHP configuration for many reasons and since the default session folder (/var/lib/php/session) is in root:apache 770 permissions, no site can write to this folder. (if I am missing something here, please tell me, hehe, I'd love to know how to fix this) There are currently 2 users browsing this forum. (0 members & 2 guests) Use this control to limit the display of threads to those newer than the specified time frame. Allows you to choose the data by which the thread list will be sorted. Order threads in... Note: when sorting by date, 'descending order' will show the newest results first.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368700107557/warc/CC-MAIN-20130516102827-00086-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
6,497
61
https://kr.tradingview.com/script/pzUpBSIm-Candlestick-Channels-LUX/
code
The detected patterns are also highlighted with labels on your chart automatically. - Trend Length: Period of the oscillator used to determine trend sentiment; this sentiment is used to detect certain patterns. - Convergence: Convergence percentage of the channel extremities used during the occurrence of a pattern. A lower value will return extremities converging more slowly toward the price. - Smooth: Determines the degree of smoothness of the channel extremities. This category determines which patterns are detected by the indicator. Patterns toggled off will not be detected and won't affect the channels. patterns are commonly used by traders to detect potential reversals or continuation periods in the price. It can be of interest to use them as core elements in the calculation of more classical indicators, this can allow us to filter out potential false signals returned by patterns by shifting the source of interpretation towards the channel extremities instead. In this indicator extremities converge towards the price when a corresponding pattern is detected. As such patterns will make the upper extremity converge towards the price, facilitating a cross with price. Using a lower convergence percentage will require a greater number of patterns to make the extremity converge closer towards the price. Users can use the channel like most indicators returning extremities, with an uptrend being detected when price cross over the upper extremity and a downtrend being detected when price cross under the lower extremity. An approach solely making use of crosses between the price and the average line can be used but the user should expect further whipsaws signals. Users can eventually use the patterns as entries and use the extremities for confirmation. For example, users can follow a pattern return an indication in accordance with the detected trend by the channels. This approach would lead to the following of patterns when they occur in an uptrend, that is when the price is above the average line (in orange). The same logic applies to patterns. The chart above highlights the patterns in accordance with a detected trend. - / patterns are turned off by default due their more frequent appearance. - patterns relying on gaps were not included, since they would be more uncommon in cryptocurrencies, thus leading to a disparity between the indicator performance on the cryptocurrency and stock market. Join our 100k+ community: https://discord.gg/lux 이 스크립트의 오써는 참된 트레이딩뷰의 스피릿으로 이 스크립트를 오픈소스로 퍼블리쉬하여 트레이더들로 하여금 이해 및 검증할 수 있도록 하였습니다. 오써를 응원합니다! 스크립트를 무료로 쓸 수 있지만, 다른 퍼블리케이션에서 이 코드를 재사용하는 것은 하우스룰을 따릅니다. 님은 즐겨찾기로 이 스크립트를 차트에서 쓸 수 있습니다. 이 정보와 게시물은 TradingView에서 제공하거나 보증하는 금융, 투자, 거래 또는 기타 유형의 조언이나 권고 사항을 의미하거나 구성하지 않습니다. 자세한 내용은 이용 약관을 참고하세요.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710808.72/warc/CC-MAIN-20221201085558-20221201115558-00791.warc.gz
CC-MAIN-2022-49
3,183
17
https://forum.duelistsunite.org/t/nazuki-the-vaylantz-ninja/16986
code
Nazuki can only move opponent’s monsters under certain conditions. When Nazuki’s effect is used to move a monster horizontally, it will work as intended if you select your own monster, however, if you select an opponent’s monster, it will only move it in the direction of an open zone if the equivalent zone on your own field is unoccupied. (To clarify, if you select an opponent’s monster in their center MMZ with no monsters to its left or right, but you have a monster in the zone to the left of your own MMZ, it will only allow you to move the opponent’s monster to the zone to its right. This means that if the zones to the left and right of a certain monster zone on your own field are occupied, Nazuki cannot move an opponent’s monster to the equivalent zones on the opponent’s field, even if they are unoccupied.) Bug reproduction steps Summon Nazuki in the left or right most zones or the EMZ and you will not be able to move an opponent’s monster to any zone Nazuki itself cannot move to. Screenshot OR error code Nazuki should be able to move any monster to an unoccupied adjacent zone regardless of Nazuki’s own position. What OS are you using
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00173.warc.gz
CC-MAIN-2023-50
1,173
6
https://www.consumerfinance.gov/data-research/cfpb-researchers/judith-ricks/
code
- Economist, Consumer Financial Protection Bureau - Ph.D. in Economics, Maxwell School at Syracuse University - B.A. in Economics, Vanderbilt University Ricks, Judith. “Mortgage subsidies, homeownership, and marriage: Effects of the VA Loan Program.” Regional Science and Urban Economics (2021). Ricks, Judith. “Homeowner Behavior, Health Status, and Medicaid Payment Eligibility: Evidence from the Deficit Reduction Act of 2005.” Journal of Policy Analysis and Management, Vol. 37, Iss. 4 (2018).
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00099.warc.gz
CC-MAIN-2023-40
505
5
https://hostingcati.com/bluehost-registrar/
code
Locating a top notch low-cost host provider isn’t very easy. Every website will have different needs from a host. And also, you need to contrast all the functions of a hosting business, all while trying to find the best bargain possible. This can be a great deal to type via, particularly if this is your first time acquiring hosting, or constructing a website. A lot of hosts will use incredibly inexpensive initial rates, only to elevate those rates 2 or 3 times greater once your preliminary call is up. Some hosts will certainly offer complimentary bonuses when you subscribe, such as a free domain, or a cost-free SSL certification. While some hosts will be able to use better performance as well as high degrees of protection. Bluehost Registrar Below we dive deep right into the very best inexpensive web hosting plans out there. You’ll learn what core hosting attributes are important in a host as well as exactly how to assess your own organizing demands to make sure that you can choose from one of the best inexpensive organizing providers below. Disclosure: When you buy a host package through links on this web page, we make some commission. This helps us to keep this site running. There are no extra prices to you at all by utilizing our web links. The list below is of the most effective economical webhosting plans that I have actually directly made use of and evaluated. What We Consider To Be Inexpensive Webhosting When we define a webhosting package as being “Affordable” or “Budget plan” what we suggest is hosting that falls into the cost brace between $0.80 to $4 per month. Whilst looking into economical holding carriers for this overview, we took a look at over 100 different hosts that came under that price array. We after that evaluated the top quality of their most affordable organizing plan, worth for cash and customer care. In this short article, I’ll be reviewing this world-class internet site holding business as well as stick in as much appropriate details as feasible. I’ll look at the attributes, the rates options, as well as anything else I can think of that I assume might be of advantage, if you’re deciding to join to Bluhost as well as get your web sites up and running. So without further ado, allow’s check it out. Bluehost is one of the biggest webhosting companies on the planet, getting both substantial advertising assistance from the business itself as well as affiliate online marketers who promote it. It truly is a massive firm, that has actually been around for a very long time, has a large credibility, and also is absolutely one of the leading options when it concerns web hosting (absolutely within the leading 3, at the very least in my book). However what is it specifically, as well as should you get its services? Today, I will address all there is you require to know, supplied that you are a blog owner or an entrepreneur who is looking for a webhosting, and also does not know where to get started, given that it’s an excellent service for that audience in general. Let’s envision, you wish to host your sites and make them visible. Okay? You already have your domain name (which is your site destination or LINK) and now you wish to “transform the lights on”. Bluehost Registrar You need some organizing… To complete all of this, and to make your site noticeable, you require what is called a “server”. A web server is a black box, or device, that saves all your web site data (documents such as images, messages, video clips, links, plugins, and other details). Currently, this server, has to get on regularly and it needs to be connected to the web 100% of the moment (I’ll be mentioning something called “downtime” later on). In addition, it also needs (without getting too fancy as well as into information) a file transfer protocol frequently referred to as FTP, so it can reveal internet browsers your site in its designated form. All these points are either expensive, or require a high degree of technological ability (or both), to develop and also keep. And you can completely go out there and learn these points by yourself as well as established them up … but what regarding rather than you buying and also keeping one … why not just “leasing organizing” rather? This is where Bluehost is available in. You lease their web servers (called Shared Hosting) and also you introduce a website utilizing those servers. Considering that Bluehost maintains all your files, the business additionally enables you to establish your web content administration systems (CMS, for short) such as WordPress for you. WordPress is a super popular CMS … so it just makes good sense to have that choice readily available (virtually every holding company now has this option also). In short, you no longer require to set-up a server and then integrate a software where you can build your web content, individually. It is currently rolled right into one bundle. Well … visualize if your web server is in your residence. If anything were to occur to it whatsoever, all your documents are gone. If something goes wrong with its interior procedures, you need a professional to repair it. If something overheats, or breaks down or gets damaged … that’s no good! Bluehost takes all these problems away, and also takes care of whatever technical: Pay your server “rent”, and they will look after everything. And also when you acquire the solution, you can after that begin concentrating on including content to your internet site, or you can place your initiative into your advertising and marketing projects. What Solutions Do You Get From Bluehost? Bluehost offers a myriad of different services, yet the primary one is hosting certainly. The organizing itself, is of different types incidentally. You can rent a common server, have a devoted web server, or additionally a digitalexclusive web server. For the purpose of this Bluehost testimonial, we will certainly focus on organizing services and various other services, that a blog writer or an on-line business owner would require, instead of go unfathomable into the bunny opening and also discuss the various other solutions, that are targeted at more experienced folks. - WordPress, WordPress PRO, and also shopping— these organizing solutions are the plans that permit you to host a website utilizing WordPress and WooCommerce (the latter of which enables you to do shopping). After purchasing any of these bundles, you can begin developing your website with WordPress as your CMS. - Domain name Industry— you can likewise buy your domain name from Bluehost as opposed to various other domain name registrars. Doing so will certainly make it simpler to aim your domain name to your host’s name web servers, given that you’re making use of the very same market. - Email— when you have purchased your domain name, it makes good sense to additionally obtain an email address linked to it. As a blog owner or on the internet entrepreneur, you need to basically never use a free email service, like Yahoo! or Gmail. An e-mail like this makes you look unprofessional. Fortunately, Bluehost provides you one absolutely free with your domain name. Bluehost additionally uses specialized web servers. And you may be asking …” What is a devoted web server anyhow?”. Well, things is, the basic host plans of Bluehost can just a lot website traffic for your web site, after which you’ll require to upgrade your hosting. The reason being is that the common web servers, are shared. What this indicates is that web server can be servicing 2 or even more websites, at the same time, one of which can be yours. What does this mean for you? It means that the single web server’s sources are shared, and it is doing several tasks at any type of provided time. When your internet site starts to hit 100,000 website gos to each month, you are mosting likely to require a devoted web server which you can likewise get from Bluehost for a minimum of $79.99 each month. This is not something yous needs to fret about when you’re starting yet you must keep it in mind for certain. Bluehost Pricing: How Much Does It Price? In this Bluehost review, I’ll be focusing my focus generally on the Bluehost WordPress Hosting bundles, considering that it’s the most preferred one, as well as most likely the one that you’re searching for and that will certainly match you the best (unless you’re a huge brand, business or site). The three offered plans, are as adheres to: - Fundamental Strategy– $2.95 each month/ $7.99 regular price - Plus Plan– $5.45 per month/ $10.99 normal rate - Selection Plus Strategy– $5.45 each month/ $14.99 normal price The very first cost you see is the cost you pay upon join, as well as the 2nd rate is what the expense is, after the first year of being with the firm. So essentially, Bluehost is going to bill you on an annual basis. And you can likewise pick the quantity of years you wish to organize your website on them with. Bluehost Registrar If you pick the Basic plan, you will certainly pay $2.95 x 12 = $35.40 starting today and by the time you enter your 13th month, you will certainly now pay $7.99 per month, which is additionally charged per year. If that makes any sense. If you are serious about your website, you ought to 100% obtain the three-year option. This implies that for the basic plan, you will certainly pay $2.95 x 36 months = $106.2. By the time you hit your fourth year, that is the only time you will pay $7.99 per month. If you consider it, this approach will save you $120 during three years. It’s very little, however it’s still something. If you intend to obtain greater than one internet site (which I very recommend, and if you’re severe, you’ll probably be getting more eventually in time) you’ll intend to take advantage of the choice plus strategy. It’ll enable you to host unrestricted internet sites. What Does Each Strategy Deal? So, in the case of WordPress holding strategies (which are similar to the common hosting strategies, yet are much more geared towards WordPress, which is what we’ll be concentrating on) the features are as follows: For the Fundamental strategy, you get: - One internet site just - Protected internet site via SSL certification - Maximum of 50GB of storage space - Complimentary domain name for a year - $ 200 advertising credit rating Bear in mind that the domains are acquired separately from the holding. You can get a totally free domain with Bluehost below. For both the Bluehost Plus hosting and also Choice Plus, you obtain the following: - Unrestricted number of web sites - Free SSL Certificate. Bluehost Registrar - No storage or data transfer limitation - Cost-free domain name for one year - $ 200 advertising and marketing debt - 1 Office 365 Mailbox that is totally free for thirty days The Choice Plus strategy has an included benefit of Code Guard Basic Back-up, a back-up system where your data is conserved and duplicated. If any kind of accident occurs and also your site data disappears, you can recover it to its original type with this function. Notification that even though both plans cost the very same, the Selection Strategy then defaults to $14.99 per month, routine price, after the collection quantity of years you have actually chosen. What Are The Advantages Of Using Bluehost So, why pick Bluehost over various other webhosting services? There are hundreds of host, a number of which are resellers, however Bluehost is one select few that have actually stood the test of time, as well as it’s possibly one of the most well known available (as well as forever reasons). Right here are the three primary advantages of selecting Bluehost as your webhosting service provider: - Server uptime— your website will not show up if your host is down; Bluehost has greater than 99% uptime. This is exceptionally crucial when it concerns Google Search Engine Optimization and also positions. The higher the better. - Bluehost rate— exactly how your server response figures out just how quick your internet site reveals on a web browser; Bluehost is lighting fast, which means you will certainly minimize your bounce price. Albeit not the most effective when it pertains to filling speed it’s still widely crucial to have a fast speed, to make individual experience better and also much better your position. - Unrestricted storage space— if you obtain the Plus plan, you need not bother with how many data you save such as videos– your storage space ability is limitless. This is truly important, because you’ll probably run into some storage issues later on down the tracks, and you do not desire this to be an inconvenience … ever before. Finally, customer assistance is 24/7, which means no matter where you remain in the globe, you can get in touch with the support team to fix your internet site issues. Pretty standard nowadays, however we’re taking this for given … it’s also extremely crucial. Bluehost Registrar Likewise, if you’ve gotten a free domain with them, then there will be a $15.99 charge that will be deducted from the quantity you initially purchased (I visualize this is because it kind of takes the “domain name out of the market”, uncertain concerning this, yet there probably is a hard-cost for registering it). Finally, any type of requests after thirty day for a reimbursement … are void (although in all sincerity … they should probably be rigorous below). So as you see, this isn’t necessarily a “no doubt asked” policy, like with a few of the various other holding options out there, so make sure you’re okay with the plans before proceeding with the hosting.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00494.warc.gz
CC-MAIN-2021-43
13,746
81
https://bugzilla.redhat.com/show_bug.cgi?id=10341
code
When I printed a file from within kdehelp, it would cut off the first two or three lines on the page and the last two or three lines on a page. I am running version 1.1.2-29 of kdebase. I am using an HP 680C printer. This problem may also have occurred in previous versions of KDE (e.g. in Red Hat This seemed to be a problem because I printed out in A4 format instead of letter. Is there a way to save a default? Red Hat may consider using letter as the default instead of A4 seeing as it's an American company. "Red Hat may consider using letter as the default instead of A4 seeing as it's an American company." - with an international customer base! This is the internet, remember. Switching the default to letter makes sense nevertheless - because a printout in letter on an a4 page looks much better than a printout of an a4 page on a letter
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583831770.96/warc/CC-MAIN-20190122074945-20190122100945-00115.warc.gz
CC-MAIN-2019-04
846
12
https://www.eventbrite.co.uk/e/ucldh-seminar-series-micropasts-tickets-21376727367
code
Actions and Detail Panel UCLDH Seminar Series: MicroPasts Wed 24 February 2016, 17:30 – 18:30 GMT MicroPasts: Crowd & community fuelled archaeological research This seminar, given by Daniel Pett (ICT Advisor at the British Museum), will focus on the AHRC funded MicroPasts project, a collaboration between the Institute of Archaeology, University College London, the British Museum and the public. This project had 3 strands of research, crowdsourcing, crowdfunding and 3D. Two aspects were extremely successful, one was not. The MicroPasts project has looked at a wide range of periods, topics and institutions, working with the Petrie Museum, Mary Rose Museum and British Museum collections for instance, to produce open data, open source software and an open attitude. A demonstration of what can be achieved by a small team, using open source technology to work in tandem with an amazing contributing crowd will be made, with illustration provided by various 3D prints and models. Date and Time Arts and Humanities Common Room, G24 University College London
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218199514.53/warc/CC-MAIN-20170322212959-00653-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,063
9
http://www.linuxplanet.com/linuxplanet/print/2957
code
Back to article Win4Lin: Running Windows Applications Under Linux Computing in the real world January 29, 2001 Linux applications are gaining ground, but Windows applications still dominate. If you are like me, you still need to use Windows apps to work with files that other users need. Win4Lin let me have the benefits of Linux and Windows desktops at the same time. It is even possible to cut and paste between Windows and Linux applications. Win4Lin is effectively a set of Windows device drivers plus support code that lets Windows run on top of Linux. This affords users two key benefits. First, Windows itself is not changed so compatibility is high. Second, performance is good because minimal translation is required between the Windows application and the Linux device drivers. Win4Lin�s interface is comparable to a remote control program. Windows runs in a Linux window. It can also run full screen. Windows applications run within this window. Linux applications run in their own window. Switching between windows is a matter of a mouse click or an Alt-TAB combination. Windows hot keys work when the main Windows window is active. The Win4Lin default installation uses a folder in a user�s home directory as the C: drive, but this an be mapped to almost any directory including a DOS disk partition. Dual-boot installations need to be careful of this feature, since the Win4Lin Windows directory and a native Windows Windows directory will contain different information due to the differences in device drivers. Direct Windows access to the floppy disk and CD-ROM drives is also supported. Overall, my Win4Lin experience has been excellent. Win4Lin supports Winsock, so applications like Internet Explorer and email applications work if the Linux system is connected to the Internet, but the Windows Network Neighborhood is not supported. Still, sharing network files and printers is possible using the Linux support. More on this in the Networking section. The lack of DirectX support is the main limitation. DirectX is used by almost every Windows-based game but few other applications use DirectX. Audio support is provided if Linux has audio support. There are some restrictions on Linux audio support, but check the website for details as Win4Lin updates should eliminate these. Printer support uses Linux printer connections but Windows printer drivers. Win4Lin worked well with my normal suite of applications, including Office 97, ACT!, and Photoshop. I need to find my Quark CD-ROM to reinstall it under Win4Lin but that should work as well. As expected, none of the Windows games would even install. The result, dual boot stays for games but real work gets done with Linux, Win4Lin and Windows.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125074.20/warc/CC-MAIN-20170423031205-00069-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,722
12
https://scifi.stackexchange.com/questions/91748/betazoids-in-the-last-starfighter-versus-star-trek-the-next-generation
code
Released in 1984, The Last Starfighter is sometimes accused of borrowing too many themes and plot points from contemporaneous sci-fi fare, including the Star Wars trilogy. But conversely, one element of The Last Starfighter reappears only a few years later in Star Trek: The Next Generation: the term Betazoid. - In The Last Starfighter, the term refers to a type of robot / android / replicant. - In TNG, the term refers to a race of telepathic / empathic humanoids from the planet Betazed. Given that TNG hit the air only three years after Starfighter was released, is there a connection here, or is the appearance of the term in TNG a mere coincidence?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100476.94/warc/CC-MAIN-20231202235258-20231203025258-00637.warc.gz
CC-MAIN-2023-50
655
5
http://projectcentersinchennai.co.in/Final-Year-Project-for-CSE/Solving-Quantum-Channel-Discrimination-Problem-With-Quantum-Networks-and-Quantum-Neural-Networks-Project-For-CSE
code
Distinguishing one quantum channel from another becomes a next natural question following the advent of quantum state discrimination. Here, we address the problem of quantum channel discrimination with the separable states and the entangled states input. Two schemes, based on the simulator for quantum networks and channels framework (SQUANCH) and the quantum machine learning toolbox (QMLT), are proposed to perform the quantum channel discrimination task. In the first scheme, we give an example of several qubit channels, verify that the performance metrics of channel discrimination can be improved by the entangled states. In the second scheme, we train a quantum circuit learning model to classify quantum channels using the Adam stochastic optimization algorithm. Although we consider the distinguishability in the case of only two possible channels, this model can be extended to any number of channels. This method can provide a good solution for distinguishing some complex quantum channels. To View the Base Paper Abstract Contents Now it is Your Time to Shine. Great careers Start Here. We Guide you to Every Step Success! You're Awesome Thank you for filling out your information! We’ve sent you an email with your Final Year Project PPT file download link at the email address you provided. Please enjoy, and let us know if there’s anything else we can help you with. To know more details Call 900 31 31 555 The WISEN Team
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038072180.33/warc/CC-MAIN-20210413092418-20210413122418-00591.warc.gz
CC-MAIN-2021-17
1,441
10
https://membermouse.com/testimonial/john-b/
code
John has gone out of his way to be incredibly helpful in resolving our complex issue. This isn't the first time he has gone out of his way to be friendly & helpful. The way you all handle support tickets is unlike any other service I have opened tickets with. We'll continue to be loyal customers for years to come. Thank you John, you saved my butt! Cynthia is the Head of Customer Experience for MemberMouse.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816586.79/warc/CC-MAIN-20240413051941-20240413081941-00806.warc.gz
CC-MAIN-2024-18
410
2
http://www.anddev.org/advanced-tutorials-f21/image-viewer-t12892-15.html
code
Just curious but did you leave this out of your "zoom out" section on purpose? Using java Syntax Highlighting int width = ImageViewer.resizedBitmap.getWidth(); int height = ImageViewer.resizedBitmap.getHeight(); Parsed in 0.015 seconds, using GeSHi Not sure how the above links relate to this tut since they are on galleries and your is on the image viewer but one of those galleries helped me in combination with some of the tuts by plusminus. I have the gallery somewhat working and it shows images when selected but my problem is it does not show my small images in the gallery view, only in the imageview when the grey rectangle (supposed to be the smaller image) is selected. I am racking my brain trying to figure out how to figure this out but truthfully after creating a custom content provider for my image DB and getting it to work my brain is fried lol. Edit: after looking at it I dont think I am pulling the the image path from the uri in the gallery view section. Another day on this and I should have it. Thanks again for the great tut! Edit of my edit: I got it. I had to put a new cursor to pull the actual path instead of using the Uri since my table stores the actual path. I now have a working gallery that will load the converted images. Now it shouldnt crash on my phone.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119080.24/warc/CC-MAIN-20170423031159-00084-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,293
8
https://community.spiceworks.com/topic/2199590-remote-computer-management
code
This is the situation, pretty much everyone in the company I work for are home / remote workers and the few who work in an office don't connect to an internal corporate network unless to work on an application hosted on AWS. All email and file storage is provisioned on G-Suite so we don't have any Windows infrastructure at all, no active directory etc. So what am I asking for, well, what I need is: A way to manage Windows laptops, Apple Mac's, iOS/Android and Windows mobile phones. Manage endpoint security (password policy enforcement, ant-virus, firewall, etc.) Provide MDM for iOS, Android and Windows Provide software updates and patch management BYOD management / Security I'd also like to make everyone have to login to their computers whether Windows or Apple. Not much to ask for....is it? I have had a quick look over Citrix Endpoint Management, VMware Airwatch, SOTI MDM, ManageEngine Desktop Central and of course MS Intune but would like to hear anyones ideas, thoughts, experience?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662572800.59/warc/CC-MAIN-20220524110236-20220524140236-00321.warc.gz
CC-MAIN-2022-21
999
10
https://news.ycombinator.com/item?id=4587065
code
I know a lot of my peers would know what FAQ means and what a password is. Even some of the "less" tech savvy people. But late adopters who are still using 10 year old PCs usually don't know. Before I hear claims of ageism, it is just a fact that a higher percentage of the older generations don't know how to use computers. It isn't ALL of them but they didn't have the benefit of growing up with computers as a tool, to the point where they become second nature.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865411.56/warc/CC-MAIN-20180523024534-20180523044534-00295.warc.gz
CC-MAIN-2018-22
464
2
https://www.robin.is/posts/2021/static-site-costs/
code
$12.20 * 2 In a previous post on the tooling I use for my site, I said it cost me an extra $4 per year to host my site now that I moved from Netlify to Github pages. This is to cover the DNS charges of my registrar, which was free if I used Netlify's DNS. Turns out I was wrong. The charges are actually only $1.20 per year. So I decided to move another static, one page, 600 byte, site of mine from Netlify to GitHub pages in order to close my Netlify account. So now for each of my sites I pay $12.20 ($11 for the domain name and $1.2 for the DNS). So $24.40 in total. Not bad given that this is irrespective of usage. Not that my sites actually get any visitors. It's great value, thanks to my old hosting provider, but still current registrar Nearlyfreespeech.com. A word on Netlify. It might sound like I don't like their service, as I am moving to a setup which actually costs me more. In fact I thought Netlify was great, but for my rather basic needs I preferred to have less services to manage. I already used GitHub, so using GitHub Pages removes one provider from the workflow and simplifies things for me. This is true even though the setup on GitHub pages is quite a bit more involved as you need to create an action to trigger the build of your static pages whenever you want to re-publish. With Netlify this comes out of the box, so actually it is easier to get things going with Netlify than Github pages. Netlify just worked immediately for me. GitHub pages took some coding googling and hacking around to get working. But once implemented it is quite simple to maintain and keep going.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.45/warc/CC-MAIN-20240222193722-20240222223722-00272.warc.gz
CC-MAIN-2024-10
1,603
4
https://www.overclockers.com/forums/threads/lapping-the-heatsink.12633/
code
Lapping means to sand down the heatsink so to remove machine marks. This makes for better contact between it and the processor. Try going like 600,800,1000,1200 sand papper. From 600 to1200. This should smoth the bottom out real nice. Lapping simply refers to sanding something flat. In the case of heatsinks, you will want to sand the contact area flat so that there are no gaps between the processor and the heatsink. When there are gaps between the core and the heatsink, the heat must travel through the air. Air is a very poor medium for heat transfer. The flatter you can get the heatsink, the fewer gaps there will be, and the more contact you will have between heatsink/processor (lower temps). As for how to do it, I recommend you search for a tutorial off of this site, or off of a search engine. They will have pretty pictures that I can't describe in this post. Oh yeah, and if you can get your hands on some, I prefer to use lapping compound instead of sandpaper (at least for the final grit). Sandpaper shifts around too damn much, and it annoys the hell out of me. Lapping compound costs about $17 at machine shops. The most common method of lapping involves taping the sandpaper to something totally flat, usually a sheet of glass. You then rub the heatsink on it until the machine marks are gone and it is flat and smooth, working your way to finer grades of sandpaper. After it is lapped it is recommended that you apply some thermal compound to fill in microscopic imperfections that you can not remove by lapping and help transfer the heat to the the sink from the processor. Arctic Silver is the brand considered the best.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662647086.91/warc/CC-MAIN-20220527112418-20220527142418-00719.warc.gz
CC-MAIN-2022-21
1,643
5
http://dev.deluge-torrent.org/ticket/515
code
Ticket #515 (closed feature-request: duplicate) Tracker based priority |Reported by:||jd@…||Owned by:||andar| Hi! I searched on the forums and tickets for this idea and guessed it's not been raised; apologies on the contrary. A nice feature to have could be priority management based on trackers. I foresee two flavors: * allowing for global priorities only (as currently implemented). That is, if one set tracker A to be High Priority, then all its torrents get High Priority on; if tracker B is set to Normal Priority, but has one B_1 torrent set to VeryVeryHigh? Priority, B_1 will have the priority of leeching over A torrents, although the tracker it belongs to has a lower priority than A's; * allowing for two hierarchical levels of prioritization: trackers, then torrents within a given tracker. That is, considering the same two trackers with the same priorities rules, B torrents will never have the leeching priority over A torrents. In the same time, if A has several torrents, say A_1 to A_3 with priorities declared as A_1 > A_2 > A_3, then along the fact that A_i torrents have the priority over B torrents, A_1 remains before A_2, A_2 before A_3 in the priority queue. I'd go for the second option, for it provides the user with a powerful tool when it comes to handle trackers for which leeching/seeding activity is rare but important; for instance private trackers where one strive to build (or at least keep!) a good ratio. But the first flavor may be simpler. Maybe giving the choice as a user preference would be great, but the mechanisms are a bit different in the background, so you may not want to code and manage both… if only this idea interests you to start with :) I happen to know that the 1.1 branch can filter torrents by tracker, so it could make the implementation easier?
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698196686/warc/CC-MAIN-20130516095636-00066-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,809
7
https://blog.mavnn.co.uk/2024/01/26/writing_a_cv.html
code
A while back (checks notes, gulps) I wrote a fairly successful blog post on the types of CVs I liked receiving as one of the people screening technical applications, and some of the mistakes I was seeing applicants making. What I didn't speak about at all was the "structure" of the CV; how to arrange it, and what sections to include/not include. Today somebody asked me for an actual CV for the first time in… quite a while actually. The last couple of jobs both had their own interview process that didn't include one, so that means it's been at least 5 years. Turns out that having been on the other side of the table a few more times now, and hiring for more senior candidates, my CV creation style has changed radically. The result is four broad categories of ways I've been effective in previous jobs, with a brief description of when I became senior enough to start doing that. So rather than having a big timeline of work history and education, I end up with things like: Training and mentoring For over a decade I have provided mentoring and training both to team members and as a service offered. This has ranged from people learning to code for the first time (CodeInstitute), to week long courses teaching professional developers new programming languages or architectural styles (@mavnn ltd), to giving talks at conferences on topics from the obscure to the philosophical (SDDConf, NDC, F# Exchange, Lambda Days, etc). Apart from formal training I have mentored teams several times during the introduction of new programming languages, libraries, and techniques (15below, NoRedInk, Blissfully/Vendr). Again - your mileage may vary; it's not like I've had any feed back on the application yet, or even that a single response tells you much about how the CV be received in general. But I can tell you that from the other side of the table that I'm much more interested in what you think are the areas you've made a difference, or that you're proud of, than I am in the job descriptions of your last 5 posts and where you went to secondary school. One slight caveat: I did include my LinkedIn profile, which has all the gritty dates and things. It just wasn't what I chose to highlight in the part of the process that I can control. Your CV is your chance to control the narrative - take it.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474360.86/warc/CC-MAIN-20240223021632-20240223051632-00220.warc.gz
CC-MAIN-2024-10
2,304
9
https://community.tp-link.com/en/home/forum/topic/166692
code
Dear TP comunity I´ve an TP Link Router - TD-W8901N in my home and I would like to know if there are an option in router setup where I can block ip address of websites like a firewall . I knew that exist firewall option native in the setup. But I can´t to edit just only enable and disable . There are any idea ? Rio de Janeiro - Brazil
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103271864.14/warc/CC-MAIN-20220626192142-20220626222142-00188.warc.gz
CC-MAIN-2022-27
338
3
http://www.tomshardware.com/forum/369524-31-intel-confusion-bridge-celeron
code
As we are seeing in games, CPU cores are being utilized more and more. Right now a few games already use more than 2 cores (Which is what the i3 has). So I would recommend a 4 core CPU (i5). For the CPU I would recommend you get the i5 3570K, this is a 4 core CPU and it runs very fast. It is also the BEST gaming CPU, as anything higher is using hyperthreading and hyperthreading has no impact on games. TLDR; Get the i5 3570K CPU ($220) EDIT: As a side note, I would suggest you DO NOT skimp on the GPU. As it the GPU is the heart of your system in terms of gaming.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947822.98/warc/CC-MAIN-20180425135246-20180425155246-00044.warc.gz
CC-MAIN-2018-17
567
4
https://www.codeproject.com/Articles/24290/Progress-Bar-Best-Practices
code
Proper Progress Notification This is going to be met with great skepticism but I'm going to say it anyway… There is only one best way to show a progress window for long operations. That answer is to show a modal progress window on the UI thread while the work is done on the worker thread. First let’s look at why the progress window must be on the UI thread: If you try to show a dialog on a worker thread, that dialog cannot have an owner from the calling thread. Try and you'll get the exception: Cross-thread operation not valid: Control 'Form1' accessed from a thread other than the thread it was created on. And showing the dialog on another thread without an owner (modal or non) makes the dialog appear non-modal and therefore allows the user to click on your main window and loose the progress window to the depths of the Z-order making it difficult for the user to know if the operation is still in progress or not. One trick you might be tempted to try is setting the progress window’s TopMost property to force it on top. Unfortunately, this keeps it on top of all other windows and is not ideal for users trying to multi-task while they wait for your application to do its thing. Next, let’s examine why the work ought to be done in a separate thread at all. If you don't and the application doesn't call DoEvents, the app will quickly become non-responsive as far as Windows is concerned and users will see the “Not Responding” message up in the title bar if a user tries to click on it. And we all know that users feel entitled to tell you your app “freezes” or “hangs” when they see this. So why not use DoEvents to allow your app to respond? Not only would you need to call frequent DoEvents to give the appearance of a responding app, but DoEvents are evil. Calling DoEvents during your operation makes your code much less reusable. Imagine you have a nice little procedure that is capable of sorting numbers. In this case, you are locking down the UI and showing a progress bar so the DoEvents seems to accomplish the desired effect. But then imagine someone reuses your sort routine in between steps in a wizard. The user clicks Next, the code runs and calls DoEvents, and for whatever reason the user decides to click Next again before the routine has finished. Maybe the user simply double clicked because they're click happy. The button click event will fire AGAIN and potentially get you into all kinds of trouble because your code will run twice. Code should be expected to be reused synchronously without fear of reentry. If we all commit to this, there would be fewer bugs in our apps and our code would be much easier to reuse. This kind of detail in my opinion is simply not something the consumer of a routine should need to worry about. Lastly, should the progress dialog be modal or modeless? You might think that it doesn't matter. Assuming you have code that needs to run after the worker thread is complete, does it matter if the code is running in some “Thread is complete” event handler or immediately after your progress window closes? In many cases, I admit it doesn't matter. But I assert that it is good practice to do the later. This is because your code is always in some way being called from an event handler. Whether it’s a button click event or some object raising an event, with the exception of Sub Main, you are always running in an event handler of some sort. And if you spawn your worker thread and return immediately, the caller of that event may run some additional code. Now because you're showing a progress bar, you are indicating to the user that this operation did not finish. So why would you return from the event as if the operation did finish? What if there are multiple observers of that event. There’s nothing stopping another module from adding a second event handler to that same event. And if you return immediately, that code will run before your long operation has completed. This may not be a problem, but it could. - It might assume that there is NOT a modal dialog displayed in the case that it needs to show its own, OR - it may be dependent on your code completing before it does its thing. Also, the event might do its own thing afterwards assuming you are done with the operation. For example, imagine an event BeforeOpen and another AfterOpen. If you do your long operation in BeforeOpen and return immediately, AfterOpen is going to fire before you're done. And consumers of that event are probably assuming you are finished with whatever it is that you are doing. And last: what if the event caller is trapping for exceptions. Waiting for your thread to complete also allows you to trap for exceptions on your thread and bubble them back up to the event issuer or even maybe appropriately set an EventArgs.Cancel flag. So far all these reasons, I assert that it is good practice to show your progress dialogs as modal unless you have some compelling reason not to. So, how do we do all this? While there is more than one way, the easiest in my opinion is to use the System.ComponentModel.BackgroundWorker object. Here’s how: Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs)_ BackgroundWorker = New System.ComponentModel.BackgroundWorker FormProgress = New FormProgress Private Sub BackgroundWorker_DoWork(ByVal sender As Object, _ ByVal e As System.ComponentModel.DoWorkEventArgs) Handles BackgroundWorker.DoWork Private Sub BackgroundWorker_RunWorkerCompleted(ByVal sender As Object, _ ByVal e As System.ComponentModel.RunWorkerCompletedEventArgs) _ Voila! It’s as simple as that. Presumably you'd also report a percent finished back through the BackgroundWorker object and its associated ProgressChanged event but perhaps you'd just have a little repeating animation on your progress form instead in which case this is all you would need. One caveat: users can still enter Alt+F4 or click the red X in the upper right corner of your progress dialog if it’s there so you'll need to prevent this. An easy way to get around this is to just cancel the Form Close unless it’s coming from our code. Private AllowClose As Boolean = False Private Sub FormProgress_FormClosing(ByVal sender As Object, _ ByVal e As System.Windows.Forms.FormClosingEventArgs) Handles Me.FormClosing If e.CloseReason = CloseReason.UserClosing And AllowClose Then e.Cancel = True Public Sub ForceClose() AllowClose = True AllowClose = False FormProgress.ForceClose instead from your RunWorkerCompleted event and you're in business. - 11th March, 2008: Initial post I am a software architect and engineer who has been working in the industry since 1994. Although I officially started writing software many years earlier at age 11 by authoring games, graphics demos, or whatever I found interesting. I even landed my first consulting job at age 16 implementing a newly invented mathimatical algorithm for a team of researchers at the local University. I've designed and implemented hundreds if not thousands of applications: client, web, and hybrid of all scales and was a contributing author to the Black Belt programming column of Visual Basic Programmer's Journal. My goals when coding are always to write clean, reusable and optimized code using the latest and technology, tools and techniques.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335054.79/warc/CC-MAIN-20220927162620-20220927192620-00326.warc.gz
CC-MAIN-2022-40
7,321
53
https://support.certara.com/forums/topic/1184-applying-covariate-into-poppk/
code
Might you be able to help me apply the covariate in my model of special populations. It has been a while since I used NLME, and for some reason I am not able to set it, I keep getting errors during the search step. The covariate is currently categorical for hepatic impairment set to 0 or 1 for normal function or mild impairment, but I do have continuous covariates in the dataset labeled as ASTULN or BILIULN which are better to use. I would like to simulate exposures using the continuous covariates (making my own scenarios). Please see the link to my model below: Edited by csheme, 23 March 2018 - 04:18 AM.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178374686.69/warc/CC-MAIN-20210306100836-20210306130836-00449.warc.gz
CC-MAIN-2021-10
612
6
https://awesomeanimewallpaperhd.pages.dev/rainforest-animals-and-plants-facts
code
Rainforest Animals And Plants Facts Animals in tropical rainforests can be as diverse as exotic birds colorful frogs large insects and large cats. Rainforest animals and plants facts. The remains of animals and plants will be decomposed by the fungi. And birds such as toucans macaws and the harpy eagle. When we talk about rainforest facts some foods we eat like chocolate pineapple and medicines we use are derived from rainforest plants and animals and there are some ingredients which are only found in the rainforest climate. Trees in the rainforest grow very tall because they have to compete with other plants for sunlight. Swallow-tail kite This agile bird of prey soars above the canopy searching for reptiles sunning on branches then swoops in to snatch them. Rainforest animals include mammals such as sloths tapirs jaguars tigers howler monkeys spider monkeys and orangutans. Ad Find Visit Today and Find More Results. The climate of the Amazon Rainforest allows a huge range of plant species to grow here. Unlike most lemurs that like to stay up in the trees the ringtail lemur spends much of its time on the ground. They curl up to sleep in the daytime. Rainforests plants and trees are evergreen and grow continually. Rainforest climates are typically very hot and humid but the rainforest plants and animals living there have learned to adapt to these extremes. Rainforests make up only about 6 of the Earths land surface. Tropical rainforests are home to more species of plants and animals than anywhere else on earth. Some reptiles like the snakes some fish and even birds feed on the insects. As far as the flora of Amazon Rainforest is a concern there are approximately 40000 species of plants and trees found in the rainforest. The tropical rainforest animals have. Rainforests support a very broad array of fauna including mammals reptiles amphibians birds and invertebrates. - Cats Best Oko Plus 30l - Cats And Coronavirus Symptoms - Cats And Dogs 3 Review - Cats Cast 2020 Taylor Swift - Cats And Christmas Trees Reddit - Cats Cradle Rescue Nc - Cats Best Smart Pellets Alternative - Cats Cast List Musical - Cats And Dogs 3 Paws Unite 2020 - Cats Cradle Fargo North Dakota - Cats Best Litter 40l - Cats Best Litter Pellets - Cats Animal Crossing Pocket Camp - Cats Bus Schedule 11 - Cats Best Katzenstreu Entsorgen - Cats And Dogs Cartoon - Cats Cradle Book Review - Cats Best Original Clumping Wood Cat Litter - Cats Cradle Tricks Witches Broom - Cats Best Smart Pellets 10kg
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100540.62/warc/CC-MAIN-20231205010358-20231205040358-00037.warc.gz
CC-MAIN-2023-50
2,501
28
https://det.math.bme.hu/node/2174
code
Szeretettel meghívjuk David Bartl előadására az Optimalizálási Szeminárium keretében 2018.09.27-én csütörtökön, 14:15-15:45 óráig Helyszín: BME H épület 306 terem A discrete variant of Farkas' Lemma, some related results, and homogeneous linear programming Előadó: David Bartl (Department of Informatics and Mathematics School of Business Administration in Karviná Silesian University in Opava) Abstract: The talk will present a discrete variant of Farkas' Lemma in the setting of a module over a linearly ordered commutative ring (such as the ring of the integer numbers, i.e. the discrete case; apart from the setting of a vector space over a linearly ordered field, which could be the continuous case). We shall then present the corresponding discrete variants of some related results: Tucker's Key Theorem, Motzkin's Theorem and Tucker's Theorem. Finally, we shall discuss a possible aplication of the discrete variant of Farkas' Lemma in the duality theory of linear programming. We shall introduce the concept of the homogeneous linear program, its dual problem, and mention that the strong duality holds.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476137.72/warc/CC-MAIN-20240302215752-20240303005752-00746.warc.gz
CC-MAIN-2024-10
1,132
7
https://community.theforeman.org/t/jenkins-full-disk-incident/26788
code
Just now Jenkins had a full disk. Turns out there was a Katello PR test job build (number 9791) that had a 47GB log file. I’ve removed that log file which freed up more than enough disk space. After that I restarted the Jenkins process. Given the excessive size of a single build (the /var/lib/jenkins partition is 100G), I’m not sure we could (or should) have planned ahead for this. I’m not sure if Jenkins has some built in limit for this to keep the size small. For now I’d suggest to keep this in mind and continue. If it pops up more often, we can look into technical solutions.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300289.37/warc/CC-MAIN-20220117031001-20220117061001-00305.warc.gz
CC-MAIN-2022-05
592
3
https://support.microsoft.com/en-us/kb/307874/en-us
code
Article ID: 307874 - View products that this article applies to. This article was previously published under Q307874 This article is intended for people who use a computer that is part of a network or for people who have a single computer that has more than one user account. By default, simple file sharing is enabled on most Windows XP-based computers. If simple file sharing is enabled, everyone in your workgroup has access to your shared folders. If simple file sharing is disabled, members of your workgroup cannot access your shared folders until you choose to share particular folders or drives with those users or groups that you select. If simple file sharing is enabled, the simple file sharing user interface is displayed instead of the Security and Sharing tabs. By default, this new user interface is implemented in both Windows XP Home Edition and Windows XP Professional if you are working in a workgroup. If you disable simple file sharing, the classic Security and Sharing tabs appear, and you can specify which users and groups have access to shared folders on your computer. Note You cannot disable simple file sharing in Windows XP Home Edition. To have us disable simple file sharing for you, go to the "Fix it for me" section. If you would rather do this yourself, go to the "Let me fix it myself" section. Fix it for meTo disable simple file sharing, click the following Fix this problem link. In the File Download dialog box that appears, click Run, and then follow the steps in this wizard. Fix this problem Microsoft Fix it 50053 Note this wizard may be in English only; however, the automatic fix also works for other language versions of Windows. Note If you are not on the computer that has the problem, you can save the automatic fix to a flash drive or to a CD, and then you can run it on the computer that has the problem. Did this fix the problem? Let me fix it myselfTo disable simple file sharing yourself, follow these steps: Did this fix the problem?Check whether the problem is fixed. If it is not fixed, you can contact support. To share a folder or a drive with specific users or groupsNote To share folders and drives, you must be logged on as a member of one of the following groups: To manage all shared folders from one locationThis method is intended for advanced computer users. If you are not comfortable with advanced troubleshooting, you might want to ask someone whom you know for help, or contact Support. For information about how to do this, visit the following Microsoft Web site: http://support.microsoft.com/contactusYou can use the Shared Folders snap-in to work with your shared folders. This snap-in lets you create and manage shared folders, view a list of all the users who are connected to a shared folder over a network, disconnect one of or all the users, view a list of files that are opened by remote users, and close one of or all the open files. To start the Shared Folders snap-in, follow these steps: TroubleshootingIf the Sharing tab is not visible Use the Services snap-in to start the Server service. To do this, follow these steps: If none of these methods helped you, you may want to ask someone whom you know for help, or you may want to contact your Internet service provider (ISP) or network administrator for help. You can also use the Microsoft Customer Support Services Web site to find other solutions to your problem. Some services that the Microsoft Customer Support Services Web site provides include the following: Article ID: 307874 - Last Review: August 28, 2013 - Revision: 15.0
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645151768.51/warc/CC-MAIN-20150827031231-00339-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
3,568
22
https://forums.mcafee.com/t5/Parental-Controls/Safe-Family-location-tracking/td-p/517970
code
We don't have a specific feature that prevent the parent's location from showing up on the map. the reason is because we want to build trust through transparency and the intent of the feature is to allow for the family to see each other on map. With that said, if your wife is on an iPhone, you/she can disable permission to the location (settings -> privacy -> location services -> Safe Family -> change to "never" and that will prevent your wife's device from sharing location. unfortuntely there isn't an equivalent control on the android side to disable just location for just safe family. hope that helps,
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657144.94/warc/CC-MAIN-20230610062920-20230610092920-00784.warc.gz
CC-MAIN-2023-23
610
2
http://oeis.org/A185671
code
Table of n, a(n) for n=1..6. While the very first concatenation is divisible by 23, 23^2 does not divide any such number until 5861 is adjoined. Cf. A183194, A185656, and those following. Sequence in context: A249511 A248506 A034317 * A187879 A325052 A283019 Adjacent sequences: A185668 A185669 A185670 * A185672 A185673 A185674 James G. Merickel, Feb 01 2011
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987829458.93/warc/CC-MAIN-20191023043257-20191023070757-00283.warc.gz
CC-MAIN-2019-43
359
6
https://www.postman.com/newsletter/september-2022/
code
September 2022 Newsletter We've just released the biggest and best version of Postman ever, and we're rolling it out to users on the early access waitlist. Want access too? Sign up today! In the meantime, read on for a glimpse of what's new, including native Git support, Partner Workspaces, and our API Governance and Security features. And be sure to join us online September 28 for a live unboxing of v10's most exciting features. Collaborate Effectively with Partner Workspaces Learn about Postman's Partner Workspaces, which are shared, secure, access-controlled places where organizations can invite select partners to collaborate and build APIs. Get Native Git Support with the Redesigned API Builder Postman's improved API Builder offers native Git support, letting you connect to your source code repository to automatically maintain API documentation, tests, and specifications alongside code. WhatsApp Makes Developers' Job Easier With Postman Postman has enabled the WhatsApp Business Platform to reduce developer onboarding time to minutes for its Cloud API and generate documentation for easier collaboration. Unboxing What's New in Postman v10, Sept. 28 This one-hour session is especially well suited for testers, developers, and DevOps but also for anyone interested in boosting team productivity. The Postman API Network Postman's Ecosystem Partner Program Is Live Our Ecosystem Partner Program is created to support companies and independent software vendors in building joint solutions with the Postman API Platform that improve the developer experience and enhance visibility in front of Postman's 25 million users. Empower Your Business with These Payment APIs Businesses can develop payment programs faster by integrating publicly exposed payment APIs with their own systems. We've compiled a set of high-quality and ready-to-use payment APIs to cominbe with your own apps. Solve Problems Together with Postman Workspaces Postman Co-founder and CEO Abhinav Asthana shares the ten common types of Postman workspaces that are helping teams collaborate to get more done, faster. More Postman resources In Case You Missed It Guide to API-First The most farsighted companies take an API-first approach to their software development. Before writing a single line of code, developers first design or build the API. Check out our Guide to API-First to learn about the benefits for developers, organizations, and their customers. The 2022 State of the API Report The results are in from the 2022 State of the API report, the largest and most comprehensive survey and report on APIs, ever. More than 37,000 respondents told us how they work with APIs, what tools and technology they're most excited about, and where they see the industry going.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100650.21/warc/CC-MAIN-20231207054219-20231207084219-00804.warc.gz
CC-MAIN-2023-50
2,757
23
https://codecov.io/gh/r-lib/covr/tree/7f963e2b73e73a7c57fd0ba243a280865724471b
code
We’ve been making changes to the web experience and this page includes a new look. You can switch to the new user interface. Also, we would love to hear your feedback! Let us know what you think in Do not try to automatically fill the container Something seems wrong with DT's autodetection, it is making the table much too small. Unfortunately I don't have time to track down the root cause, and simply disabling the auto fill improves the situation. Sign up with GitHub Sign up with Bitbucket Sign up with GitLab Log in with GitHub Log in with Bitbucket Log in with GitLab
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300010.26/warc/CC-MAIN-20220116180715-20220116210715-00380.warc.gz
CC-MAIN-2022-05
576
14
http://gnunify.in/?q=event/193/146
code
In this hackathon we will work in following areas of Indic in LibreOffice * Testing basic language support (input, fonts etc) * Testing spellchecker, hyphenation Participants can work in following areas. * UI/Help Translation review. * Creating/extending spellchecker * Creating autocorrect for own language * Creating autotext * Creating document templates using Indian languages. Prior to workshop one should attend LibreOffice introductory sessions.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860041.64/warc/CC-MAIN-20180618031628-20180618051628-00470.warc.gz
CC-MAIN-2018-26
452
10
http://java.sys-con.com/node/3076119
code
|By Kevin Benedict|| |May 5, 2014 09:00 AM EDT|| Data ownership and privacy are two big issues that we all need to be thinking about these days. Mobile, telematics and IoT technologies have reached the point that it is very easy and cost effective to track the location of just about anything. What personal information are you willing to give up in order to get a better insurance rate? We are seeing more business models these days based upon personal data and tracked activities and locations which should be giving each of us a sense of urgency to think through these issues. A couple of weeks ago, Quindell and RAC in the UK announced that it has launched a £100m scheme for black boxes to be installed in cars. RAC aims to sell these telematics tracking devices to its 2.5 million members in order to help safe drivers reduce their premiums, plus the opportunity to drive additional revenue by monetizing the data (using the Code Halos). I am not too sure that this strategy is something that most drivers will buy into for the following reasons: - It does not really offer the customer a substantial benefit that is quantifiable. If the customer realizes that this approach will only save them a nominal cost it is unlikely to motivate them to pay for the device to drive the premium down by just £100 or there about. - I never automatically renew my motor insurance with the same company, as I am always searching for the best deal when my policy is about to end. In general, car policy buyers are becoming more informed to make sure they do not renew their insurance without shopping around for the best deals. Today the conversation around privacy is a very sensitive issue, and RAC may find out that the desire to lower premiums may be trumped by the need for privacy. For example we already know that the probability of having an accident during the night is higher than during the daytime. If as an individual I do more driving in the night than in the day, why would I have a box installed in my car when it will drive up my premiums in the long run? There is also the issue of driver's location being monitored, and the law enforcement asking to give up data on an individual's whereabouts. These are decisions that will weigh heavily on the mind of customers as to whether or not they should have these boxes installed. At the beginning of the year at the annual Consumer Electronics Show (CES) in Las Vegas, Ford marketing head Jim Farley sparked a fury among privacy advocates when he said during a panel discussion, "We know everyone who breaks the law, we know when you're doing it". He went on to say "We have GPS in your car, so we know what you're doing. By the way, we don't supply that data to anyone." The alternative approach should be that the customers choose to install the black box themselves and choose which data they want to share with their insurance company. The more data they are willing to share the higher the possibility for lower premiums, this with the option to no longer share that data at any time they wish, will make for a good proposition. This is the whole idea behind the concept of the quantified-self. The individual is in charge of their data and they choose what part of that entire dataset they want to share or to withhold. This is why I see the RAC/Quindell initiative as a high-risk strategy that might not yield the returns that it is hoping for. While the idea of giving holders of health or life policies heart rate monitors sounds like a ludicrous idea, on the other hand the idea of giving policy holders the opportunity to upload data to indicate that they have a consistent active lifestyle and not at risk of a serious health issue or sudden death might encourage some policy holders to share this data because they like what they have achieved to reduce any of the aforementioned risks and would like to be rewarded for it. It is important to note that for some policyholders, the reward has to be seen as substantial, otherwise it may not be enough for them to want to participate. This is where gamification comes into its own and where web portals like MapMyRun andTraining Peaks would begin to benefit from helping to develop the concept of the quantified self. In using gamification to create excitement, there also has to be rewards for consistent performance. Independent portals for driving behavior where car drivers can show off their good driving skills may give insurers the opportunity to reward good driving not just in terms of lower premiums but rewards through gamification. These rewards will go to individuals whether they hold the sponsors policy or not. According to a USA Today editorial, it was reported that 94% of all new cars manufactured today have black boxes. If that is the case, then car companies need to begin open up that data source such that it is easy for the owners to monitor and manage their own data, which can in turn be provided to the insurer should they desire to do so. This will cause initiatives like RAC/Quindell to review its strategy, as it will eliminate what is already considered a very fragmented market in terms of device and data interoperability. This should be the approach that RAC and Quindell considers without locking the customer into a black box that would no longer be useful should the policyholder decide to change insurer. Hence, it makes sense that insurers do not reinvent the wheel but seek to partner with car manufacturers so that car owners can access that data that insurers need to reward what is considered good behavior on the roads. 1. USA Today. January 15, 2014. - Is your car's black box the next privacy battlefield? Peter Abatan is a project manager and a team member of Studio13, which provides product and service design to a wide variety of Cognizant's customers. Kevin Benedict Writer, Speaker, Editor Senior Analyst, Digital Transformation, EBA, Center for the Future of Work Cognizant View my profile on LinkedIn Learn about mobile strategies at MobileEnterpriseStrategies.com Follow me on Twitter @krbenedict Browse the Mobile Solution Directory Join the Linkedin Group Strategic Enterprise Mobility Join the Google+ Community Mobile Enterprise Strategies Recommended Strategy Book Code Halos Recommended iPad App Code Halos for iPads SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 ad... Feb. 11, 2016 03:45 PM EST Reads: 407 SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful... Feb. 11, 2016 02:45 PM EST Reads: 439 The Quantified Economy represents the total global addressable market (TAM) for IoT that, according to a recent IDC report, will grow to an unprecedented $1.3 trillion by 2019. With this the third wave of the Internet-global proliferation of connected devices, appliances and sensors is poised to take off in 2016. In his session at @ThingsExpo, David McLauchlan, CEO and co-founder of Buddy Platform, will discuss how the ability to access and analyze the massive volume of streaming data from mil... Feb. 11, 2016 01:45 PM EST Join us at Cloud Expo | @ThingsExpo 2016 – June 7-9 at the Javits Center in New York City and November 1-3 at the Santa Clara Convention Center in Santa Clara, CA – and deliver your unique message in a way that is striking and unforgettable by taking advantage of SYS-CON's unmatched high-impact, result-driven event / media packages. Feb. 11, 2016 01:45 PM EST SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management... Feb. 11, 2016 01:30 PM EST Reads: 437 With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, will discuss the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filte... Feb. 11, 2016 12:00 PM EST Reads: 209 WebSocket is effectively a persistent and fat pipe that is compatible with a standard web infrastructure; a "TCP for the Web." If you think of WebSocket in this light, there are other more hugely interesting applications of WebSocket than just simply sending data to a browser. In his session at 18th Cloud Expo, Frank Greco, Director of Technology for Kaazing Corporation, will compare other modern web connectivity methods such as HTTP/2, HTTP Streaming, Server-Sent Events and new W3C event APIs ... Feb. 11, 2016 12:00 PM EST SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies adopt disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advanced analytics, and DevO... Feb. 11, 2016 11:30 AM EST Reads: 246 SYS-CON Events announced today that Avere Systems, a leading provider of enterprise storage for the hybrid cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Avere delivers a more modern architectural approach to storage that doesn’t require the overprovisioning of storage capacity to achieve performance, overspending on expensive storage media for inactive data or the overbuilding of data centers ... Feb. 11, 2016 11:30 AM EST Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ... Feb. 11, 2016 11:00 AM EST Reads: 125 Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations. Feb. 11, 2016 10:15 AM EST With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts... Feb. 11, 2016 10:00 AM EST Reads: 395 As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis... Feb. 11, 2016 09:15 AM EST Reads: 201 SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc... Feb. 11, 2016 09:00 AM EST Reads: 111 Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha... Feb. 11, 2016 06:45 AM EST Reads: 444 Silver Spring Networks, Inc. (NYSE: SSNI) extended its Internet of Things technology platform with performance enhancements to Gen5 – its fifth generation critical infrastructure networking platform. Already delivering nearly 23 million devices on five continents as one of the leading networking providers in the market, Silver Spring announced it is doubling the maximum speed of its Gen5 network to up to 2.4 Mbps, increasing computational performance by 10x, supporting simultaneous mesh communic... Feb. 11, 2016 05:00 AM EST The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes... Feb. 11, 2016 01:15 AM EST Reads: 215 SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,... Feb. 11, 2016 01:00 AM EST Reads: 237 One of the bewildering things about DevOps is integrating the massive toolchain including the dozens of new tools that seem to crop up every year. Part of DevOps is Continuous Delivery and having a complex toolchain can add additional integration and setup to your developer environment. In his session at @DevOpsSummit at 18th Cloud Expo, Miko Matsumura, Chief Marketing Officer of Gradle Inc., will discuss which tools to use in a developer stack, how to provision the toolchain to minimize onboa... Feb. 10, 2016 11:45 PM EST Reads: 118 SYS-CON Events announced today that VAI, a leading ERP software provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. VAI (Vormittag Associates, Inc.) is a leading independent mid-market ERP software developer renowned for its flexible solutions and ability to automate critical business functions for the distribution, manufacturing, specialty retail and service sectors. An IBM Premier Business Part... Feb. 10, 2016 12:00 PM EST Reads: 631
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701162903.38/warc/CC-MAIN-20160205193922-00125-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
16,805
60
https://manijshrestha.wordpress.com/about/
code
I am a passionate developer, futuristic enthusiast, Linux fan and open-source solutions advocate residing in Minneapolis Minnesota. I am intrigued by advancement in technology industry in just past few years. I am always curious about things that come up in the Tech industry. I try to get my hands dirty with various technologies. You probably could guess that by looking at my blog as I go about many different random things. At the end I learn something new by trying them out. Hope you find my thoughts helpful. Feel free to drop me a line/ comments or suggestions. Things I publish here is my own personal opinion and does not reflect views of my current or past employers.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500126.0/warc/CC-MAIN-20230204110651-20230204140651-00422.warc.gz
CC-MAIN-2023-06
678
2
https://www.raspberrypi.org/forums/viewtopic.php?f=2&t=4704
code
Jim Manley said: So, who pays the MPEG license fees for freeware like MythTV on Linux - the receiver/tuner card/stick manufacturers? MP3 is an MPEG layer, but, a lot of people aren"t paying any license fees for that, AFAIK. I recall that DIRECTiVo recorded encrypted MPEG2 directly off the satellite, then hardware decrypted/decoded the recordings during playback, since they had a business relationship (and both paid MPEG fees, I guess). Does broadcast ATSC encode MPEG and, if so, where are the fees paid there, by the broadcasters? Do you only pay fees if you"re selling something that uses it? Using "freeware" mpeg decoders without paying any fees is arguably illegal. Many people don't pay these fees, but they are suppose to. However, it's impractical (and possibly even unnecessary) to track down all these users and force them to pay fees. [Disclaimer: IDK if I had the details as to where the illegality actually is. (use, distribution, etc etc. not sure) However, hardware vendors and paid software vendors can't get around the fees so easily. So, yes, DirectTV (or one of it's vendors) pays MPEG fees. Same thing with the ATSC broadcasters. Same thing with any ipod, cell phone, bluray player, etc, etc.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187828356.82/warc/CC-MAIN-20171024090757-20171024110757-00706.warc.gz
CC-MAIN-2017-43
1,216
8
https://devforum.okta.com/t/cookies-custom-domain/16336
code
When going to our corporate website, for example, www.abc.org, google analytics does its thing. it sets cookies for the domain. When the user has to login, they are taken to our custom domain, Okta hosted login page, sso.abc.org. There are no cookies for .abc.org present until I refresh the page. This is what is seen on the corporate website. All of these cookies appear in Developer tools after refresh. Has anyone had to deal with this, or created a workaround. This kills any analytics data if a user has to go to login.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585025.23/warc/CC-MAIN-20211016200444-20211016230444-00712.warc.gz
CC-MAIN-2021-43
525
2
https://ifisc.uib-csic.es/en/publications/dynamics-of-a-dispersively-coupled-transmon-qubit/
code
We describe transmon qubit dynamics in the presence of noise introduced by an impedance-matched resistor (50 Ω) that is embedded in the qubit control line. To obtain the time evolution, we rigorously derive the circuit Hamiltonian of the qubit, readout resonator and resistor by describing the latter as an infinite collection of bosonic modes through the Caldeira-Leggett model. Starting from this Jaynes-Cummings Hamiltonian with inductive coupling to the remote bath comprised of the resistor, we consistently obtain the Lindblad master equation for the qubit and resonator in the dispersive regime. We exploit the underlying symmetries of the master equation to transform the Liouvillian superoperator into a block diagonal matrix. The block diagonalization method reveals that the rate of exponential decoherence of the qubit is well-captured by the slowest decaying eigenmode of a single block of the Liouvillian superoperator, which can be easily computed. The model captures the often used dispersive strong limit approximation of the qubit decoherence rate being linearly proportional to the number of thermal photons in the readout resonator but predicts remarkably better decoherence rates when the dissipation rate of the resonator is increased beyond the dispersive strong regime. Our work provides a full quantitative description of the contribution to the qubit decoherence rate coming from the control line in chips that are currently employed in circuit QED laboratories, and suggests different possible ways to reduce this source of noise.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646144.69/warc/CC-MAIN-20230530194919-20230530224919-00419.warc.gz
CC-MAIN-2023-23
1,558
1
https://www.bond.tech/blog/why-i-joined-bond-jaco-raubenheimer
code
For the child of two mathematicians, one a professor and the other a teacher, I was hardly following in their footsteps during high school. I was at the top of my class, but that ranking was really a license to pursue my true fixation — cycling. I was consumed by cycling in my teens. All my energy went into shaving a few seconds off of my race time as a member of the South African Junior Cycling team. It was only until I got to college that I found something that enveloped my attention the same way racing did. Diving into computer science led me into the world of engineering, into fintech, and eventually to Bond. Now, I'm incredibly excited to have joined Bond as a Principal Software Engineer, helping to build and scale our platform even further. As an engineer, I love tackling hard problems; as a leader, I think there's nothing more rewarding than assembling and growing a team that can tackle hard problems at scale and build something bigger than themselves. That's the exact type of work I'm looking forward to at Bond. Diving into CS There are plenty of engineers who started tinkering with code before they were out of middle school — I was a freshman in college when I first dove into computer science. Heading into C++ 101, my friends who had studied CS in high school were far more technically adept than me. Maybe it was my strong math skills or my excitement at seeing math applied in a practical, powerful context, but I quickly closed the skills gap. At the time, I was enrolled in a double-major, Math and Computer Science but I quickly found my passion for Computer Science so I switched to solely focus on CS and graduated in the top 1% of my class. My first job out of college was at the intersection of embedded engineering and perishable goods transportation. I helped engineer a wireless transponder that measured ambient temperature and humidity, stored the time series data locally and then uploaded it to be analyzed by the food wholesalers later. At the time, long haul drivers were monetarily incentivized to conserve as much fuel as possible when distributing perishable food across South Africa. Cutting or lowering the amount of fuel used to keep the truck's cargo cool was a great way to conserve fuel but a less than ideal experience for the retailers when spoiled food arrives at their stores. Our product helped drivers find the right balance using data. This little taste of making data more accessible and building a scalable distributed system, felt like I was finding my niche. Leaping into fintech My next job was my first step into fintech. I worked for Mosaic Software, which was acquired by S1, which in turn was later acquired by ACI Worldwide, developing software that processes financial messages and routes them between merchants, banks, processors and networks. There, I saw a glimpse of a bigger fintech industry waiting to be improved and built upon so I chased that opportunity. When I moved to the United States in 2007, it was to learn from the best. I moved to Atlanta, GA to be closer to S1's team of engineers that could help me sharpen my skills and dive further into building financial systems that can scale and improve the tech underpinning the financial industry. I felt an urge to work on something big, to build something that has a long lifetime and a sizable reach. I had an innate knack, similarly like I did for math, at sussing out what felt like a viable product and what might just be a flash in the pan. When I saw the opportunity to join a startup company and build it up from scratch, I trusted that innate knack and jumped at the chance. At nCino, I was employee number three, and the first engineering hire. We built the product, the team, and the culture from the ground up. I grew as an individual, not just contributing to code and to applications, but learning the skill of scaling myself — mentoring lead engineers to scale capabilities and bringing a vision to life. nCino IPO’d in 2020 and I could not be prouder of the team and the product. At Bond, I can't wait to bring our vision of building the future of finance to life. After working in fintech for years, I know how hard it can be to build embedded financial products. It's a massive challenge no one has solved yet. However, I think Bond is poised to be a solution that unites the various partners across the fintech ecosystem. Together, we're ready to build a platform that vastly improves and streamlines the way banks work with brands as well as how customers access the financial industry. By combining best-in-class, cloud-based technologies with the collective experiences of everyone at Bond we can realize our vision to bring embedded finance to every brand. If you're interested in joining the team and working with Jaco check out our careers page and let’s chat!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817095.3/warc/CC-MAIN-20240416124708-20240416154708-00594.warc.gz
CC-MAIN-2024-18
4,832
19
http://codeforces.com/problemset/problem/798/D
code
|Codeforces Round #410 (Div. 2)| Mike has always been thinking about the harshness of social inequality. He's so obsessed with it that sometimes it even affects him while solving problems. At the moment, Mike has two sequences of positive integers A = [a1, a2, ..., an] and B = [b1, b2, ..., bn] of length n each which he uses to ask people some quite peculiar questions. To test you on how good are you at spotting inequality in life, he wants you to find an "unfair" subset of the original sequence. To be more precise, he wants you to select k numbers P = [p1, p2, ..., pk] such that 1 ≤ pi ≤ n for 1 ≤ i ≤ k and elements in P are distinct. Sequence P will represent indices of elements that you'll select from both sequences. He calls such a subset P "unfair" if and only if the following conditions are satisfied: 2·(ap1 + ... + apk) is greater than the sum of all elements from sequence A, and 2·(bp1 + ... + bpk) is greater than the sum of all elements from the sequence B. Also, k should be smaller or equal to because it will be to easy to find sequence P if he allowed you to select too many elements! Mike guarantees you that a solution will always exist given the conditions described above, so please help him satisfy his curiosity! The first line contains integer n (1 ≤ n ≤ 105) — the number of elements in the sequences. On the second line there are n space-separated integers a1, ..., an (1 ≤ ai ≤ 109) — elements of sequence A. On the third line there are also n space-separated integers b1, ..., bn (1 ≤ bi ≤ 109) — elements of sequence B. On the first line output an integer k which represents the size of the found subset. k should be less or equal to . On the next line print k integers p1, p2, ..., pk (1 ≤ pi ≤ n) — the elements of sequence P. You can print the numbers in any order you want. Elements in sequence P should be distinct. 8 7 4 8 3 4 2 5 3 7 1 4 5
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662540268.46/warc/CC-MAIN-20220521174536-20220521204536-00453.warc.gz
CC-MAIN-2022-21
1,919
12
http://www.happymillfam.com/x-dg-ref-header-is-too-long/
code
TLDR – x-dg-ref is a property of header X-MS-TNEF-Correlator, not a real header. It’s too big because you’re using rich text in Outlook. Switch to HTML and problem solved. More words and Majesty Working a case this week where customer was getting an error “5.5.0 x-dg-ref Header is too long” causing messages to be rejected, and it took way more then 30 minutes to find the answer – which means the answer needs to be written down – After obtaining an email header and looking at 700 lines of x-dg-ref header I could see that the header was indeed too large. The customers solution was to create a transport rule to remove the header x-dg-ref from messages to the domain rejecting them. Message tracking was showing the rule was applied correctly but it was not removing the header. Confused over why the rule was not working the customer opened a ticket to my team to investigate the rule not working. After verifying the rule was correct more research took place, and it turns out this is actually a rich text vs. HTML issue caused by Outlook. In certain cases when you add an attachment to a message Outlook will add the attachment to the message header under the X-MS-TNEF-Correlator header as a header property x-dg-ref. Swapping Outlook to HTML from rich text solves the problem of the header being too large – and it explains why the rule did not work. x-dg-ref is not a header at all, it’s a property of another header X-MS-TNEF-Correlator. – That’s some tricky stuff right there. In real like the above header should actually read more like below – X-MS-TNEF-Correlator: x-dg-ref: =?etf-8?RASDDFASFDLJASDFJ Pictures are Great The above image is not really enough to make for a pretty picture for the post. How about a picture of the digital waterfall from the building I work in.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817184.35/warc/CC-MAIN-20240417235906-20240418025906-00286.warc.gz
CC-MAIN-2024-18
1,812
8
https://ontio.github.io/documentation/The_Hello_World_Contract_en.html
code
The "Hello World" Contract English / 中文 - Sign in your account. If you don’t have an account yet, please refer to the document - SmartX Tutorial - Click “Create Project” button and then choose the programming language you like. - Select the “Hello World” template and enter the smart contract name - MyHello. - Click “OK” button to enter the edit page. - Click “Compile” button to compile the code. You will get ABI file and AVM bytecode file after compilation. - Click “Next” button, fill in the information and then click “Deploy” button; You will enter “Run” page and get contract hash from operation panel. For verification, you can input the contract hash into the blockchain browser to query whether the deployment is successful. Select a contract’s method, input the parameters, and click “Run” button. In the output area, you can get the detailed information.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514577478.95/warc/CC-MAIN-20190923172009-20190923194009-00353.warc.gz
CC-MAIN-2019-39
907
10
http://www.linuxquestions.org/questions/slackware-14/wireless-on-sony-vaio-v505bx-89970/
code
SlackwareThis Forum is for the discussion of Slackware Linux. Welcome to LinuxQuestions.org, a friendly and active Linux Community. You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today! Note that registered members see fewer ads, and ContentLink is completely disabled once you log in. If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here. Having a problem logging in? Please visit this page to clear all LQ-related cookies. Introduction to Linux - A Hands on Guide This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own. Click Here to receive this Complete Guide absolutely free. Hi, I just bought a Sony Vaio V505BX, and I've been configuring it to run with Slackware 9.0. I still haven't gotten the wireless card to work though, and am unsure where exactly to start. When I run iwconfig, I get: lo no wireless extensions etho 0 no wireless extensions And when I run /sbin/lspci, there doesn't seem to be anything regarding a wireless card - does this mean that on bootup it hasn't detected my card? I've reconfigured the kernel with wireless, and have read some posts on other sony laptops using the orinoco driver, but I'm not really sure how to go about checking if I have that or not. When I ran devicemanager from windows, it said this about my card: LAN-Express IEEE 802.11 PCI Adapter From what I've read on the web, the orinoco_pci driver will work for you. As root, try running "/sbin/modprobe orinoco_pci", then post the output of iwconfig and lspci for me to look at. If the orinoco_pci driver turns out to work for this card, then you'll just add that command to your /etc/rc.d/rc.modules. Last edited by eric.r.turner; 09-06-2003 at 08:11 PM. /lib/modules/2.4.22/kernel/drivers/net/wireless/orinoco_pci.o: init_module: No such device /lib/modules/2.4.22/kernel/drivers/net/wireless/orinoco_pci.o: Hint: insmod errors can be caused by incorrect module parameters, including invalid IO or IRQ parameters. You may find more information in syslog or the output from dmesg /lib/modules/2.4.22/kernel/drivers/net/wireless/orinoco_pci.o: insmod /lib/modules/2.4.22/kernel/drivers/net/wireless/orinoco_pci.o failed /lib/modules/2.4.22/kernel/drivers/net/wireless/orinoco_pci.o: insmod orinoco_pci failed iwconifg returns the same 'no wireless extensions' message as before, and lspci returns: 00:00.0 Host bridge: Intel Corp. 82845 845 (Brookdale) Chipset Host Bridge (rev 00:01.0 PCI bridge: Intel Corp. 82845 845 (Brookdale) Chipset AGP Bridge (rev 04) 00:1e.0 PCI bridge: Intel Corp. 82801BAM/CAM PCI Bridge (rev 42) 00:1f.0 ISA bridge: Intel Corp. 82801CAM ISA Bridge (LPC) (rev 02) 00:1f.1 IDE interface: Intel Corp. 82801CAM IDE U100 (rev 02) 00:1f.3 SMBus: Intel Corp. 82801CA/CAM SMBus (rev 02) 00:1f.5 Multimedia audio controller: Intel Corp. 82801CA/CAM AC'97 Audio (rev 02) 00:1f.6 Modem: Intel Corp. 82801CA/CAM AC'97 Modem (rev 02) 01:00.0 VGA compatible controller: ATI Technologies Inc Radeon Mobility M6 LY 02:02.0 Network controller: Harris Semiconductor: Unknown device 3872 (rev 01) 02:05.0 CardBus bridge: Ricoh Co Ltd RL5c475 (rev b8) 02:05.1 FireWire (IEEE 1394): Ricoh Co Ltd R5C551 IEEE 1394 Controller 02:07.0 USB Controller: NEC Corporation USB (rev 43) 02:07.1 USB Controller: NEC Corporation USB (rev 43) 02:07.2 USB Controller: NEC Corporation USB 2.0 (rev 04) 02:08.0 Ethernet controller: Intel Corp. 82801CAM (ICH3) PRO/100 VE (LOM) Ethernet Controller (rev 42) It doesn't look like it's detecting my card....is there something I'm doing wrong? The device is listed in the output of lspci: "Network controller: Harris Semiconductor: Unknown device 3872 (rev 01)". Doing a little googling I found that Harris Semiconductor is Intersil's old name. Intersil makes the Prism3 chipset, which I think is what this card uses. I have a Netgear MA311 PCI card that uses the Intersil Prism2.5 chipset, and have had excellent experience with the hostap driver (http://hostap.epitest.fi/releases/hostap-0.0.4.tar.gz). Apparently the Prism3 is also supported by the hostap driver. You may want to try using this driver... it was the only one I could get to work properly with my Prism2.5. Anyway, it does look like the card is recognized. It's now a matter of finding a driver that will work. I've never installed a driver before.....I tried reading the README file for the hostap driver, but I was confused on a couple of points. Is there a way to check whether i'm using a 'kernel tree PCMCIA module', or an 'external pcmcia-cs module'? Also, is there any other doc I can refer to to help me understand how to install it? Or maybe it's a really simple install, and I'm just making it complicated? btw, thanks for your help so far. Originally posted by rech I've never installed a driver before.....I tried reading the README file for the hostap driver, but I was confused on a couple of points. Is there a way to check whether i'm using a 'kernel tree PCMCIA module', or an 'external pcmcia-cs module'? Also, is there any other doc I can refer to to help me understand how to install it? Or maybe it's a really simple install, and I'm just making it complicated? btw, thanks for your help so far. Slackware uses the Linux kernel PCMCIA code by default, not some other third-party PCMCIA code (unless you've downloaded and installed one yourself.) So you don't have to worry about that. Your wireless card is built into the laptop, right? Since this isn't a PCMCIA card I think you only need to compile the hostap_pci driver not the hostap_cs driver. As root, execute "make pci". This will compile and the hostap_pci driver. Install the driver (i.e. make it available to modprobe) by executing "make install_pci". Once it's built and installed (i.e. made available to modprobe), inserting the driver into the kernel is easy: "/sbin/modprobe hostap_pci" I say driver but I really mean kernel module. A kernel module inserts code into the kernel (the core of the OS) at runtime. A kernel module can have driver code to "drive" a hardware device like your wireless card. In other words, hostap_pci is a kernel module that contains the driver code for your wireless card. The code in a kernel module doesn't HAVE to be a driver, but that's the most common use. Another way to get driver code into your kernel is to recompile the whole kernel, but I don't do that unless I need to change a lot of things at once. Last edited by eric.r.turner; 09-06-2003 at 11:53 PM. When I run 'make pci', I get a message saying 'make: ***** No rule to make target 'pci'. Stop ' - The README file for hostap_pci said something about editing KERNEL_PATH in makefile - is that what that's talking about? How do I get the command 'make pci' to work? Originally posted by rech When I run 'make pci', I get a message saying 'make: ***** No rule to make target 'pci'. Stop ' - The README file for hostap_pci said something about editing KERNEL_PATH in makefile - is that what that's talking about? How do I get the command 'make pci' to work? It just occurred to remind you that you should cd to the hostap-0.0.4/ source directory before you try to "make pci". Okay, I was able to compile and install, but when I tried running modprobe, I got: bash-2.05b# /sbin/modprobe hostap_pci /lib/modules/2.4.22/net/hostap_pci.o: init_module: No such device /lib/modules/2.4.22/net/hostap_pci.o: Hint: insmod errors can be caused by incorrect module parameters, including invalid IO or IRQ parameters. You may find more information in syslog or the output from dmesg /lib/modules/2.4.22/net/hostap_pci.o: insmod /lib/modules/2.4.22/net/hostap_pci.o failed /lib/modules/2.4.22/net/hostap_pci.o: insmod hostap_pci failed bash-2.05b# cd /lib/modules/2.4.22/net hostap.o hostap_crypt.o hostap_crypt_wep.o hostap_pci.o The patch posted on his website is for 2.4.20 - is it possible that I patch it for my kernel (2.4.22) by just changing the 20 to a 22, or does that not work? Also, what is the syntax to patch the kernel?
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122739.53/warc/CC-MAIN-20170423031202-00079-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
8,821
66
https://answers.illinois.edu/illinois/page.php?id=109544
code
Cybersecurity, End-of-life README Language for Open-Source Tools - This article provides an overview of End-of-Life information to include in Open Source product README files. - This document can help development teams associated with the University of Illinois fulfill their responsibility to comply with Illinois Cybersecurity standards - including IT-07.11, IT08.3, and IT13.2. - Planning ahead for product End-of-Life is necessary for maintaining an application development lifecycle secure development environment (Standard IT7.11), reduces the costs of complying with University Information Security Standards (Standard IT08.3), and reduces the costs of passing web application vulnerability scans (Standard IT13.2) - Information about End-of-Life should be presented prominently in the product documentation - typically the README file, CHANGELOG or another form of release notes communication. Example Text or End-of-Life Language This is an example of text that could be included as the End-of-Life language for a product: This product is supported by <TEAM NAME> on a best-effort basis. As of the last update to this README, the expected End-of-Life and End-of-Support dates of this product are 31 October 2031. End-of-Life was decided upon based on these dependencies: - <DEPENDENCY 01> (End-of-Life is the same as <DEPENDENCY 02>) - <DEPENDENCY 02> (31 October 2031) Finding End-of-Life Dates in Dependencies - Keep track when choosing dependencies in a separate file - Useful Open Source website with some common End-of-Life product dates: https://github.com/endoflife-date/endoflife.date - Direct Link: https://endoflife.date/ End-of-Life vs End-of-Support Date - End-of-Life Date - The last date that any updates, releases, patches, etc. will be provided by the development team for a product - Should be no later than the End-of-Life of the nearest End-of-Life of any single dependency - End-of-Support (Service) Date - The last date that customer service and support will be provided for a product - Can be the same date as the End-of-Life Date - Should be no earlier than the End-of-Life Date Checklist of Items to Include - Product Introduction - What is one-line description of the product? - E.g.: [Product Name] is an application that [short description] - Maintenance Team - What team maintains this product? - Does the team provide a support level commitment? - End-of-Life Details - What is the planned End-of-Life Date? - What is the planned End-of-Support Date? - Are the limiting dependencies included to facilitate future updates to these dates? - Is there a new product that is replacing this product, or other recommended solutions to migrate to? References and Useful Links - README files contain general information about a product. For more information on README files, see https://docs.github.com/en/github/creating-cloning-and-archiving-repositories/about-readmes
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100593.71/warc/CC-MAIN-20231206095331-20231206125331-00576.warc.gz
CC-MAIN-2023-50
2,899
38
http://programmers.stackexchange.com/questions/tagged/media+software-patent
code
to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Can I use aac in an commercial app for free? I was wondering if I can use the aac codec in my commercial app for free (through lgpl ffmpeg). It says on the wiki: No licenses or payments are required to be able to stream or distribute content ... Nov 24 '12 at 3:06 newest media software-patent questions feed Hot Network Questions Why are there so many CSS properties which are essentially the same? Rearrange pixels in image so it can't be recognized and then get it back How can I work with very large shapefiles (~1 GB) in QGIS? Generating random email addresses What are the advantages of a shunt resistor vs. a hall effect sensor? Why does https://gmail.com/ produce no SSL error while using a bad certificate? Why do some companies not give minor benefits to employees? Appropriate word for a young person who behaves like a cynical old person? Creating a new list by dropping sub elements of the original list How to react to a reviewer’s comment when he is completely right, but you do not like the consequences? A strange trigonometric equation Can a 6th level character do forced march forever? Change rowguidcol property to a different column Is this kids experiment a legitimate way to show that air has mass? Effects of past unemployment on mortgage refinance What typesetters do with the submitted paper? Excel VBA program only running at 25% speed How was Grievous able to defeat Jedi? How can I test out my equipment before a backpacking trip? Why was the first compiler written before the first interpreter? Source that taking charity without a genuine need is a good thing bracha on beautiful people how to make a color transparent in GIMP Unplugging a router from the wall socket more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510263423.17/warc/CC-MAIN-20140728011743-00040-ip-10-146-231-18.ec2.internal.warc.gz
CC-MAIN-2014-23
2,338
52
https://www.sencha.com/forum/forumdisplay.php?87-Ext-Q-amp-A/page556&order=desc
code
+ Post New Thread Kindly find the issue details below: Issues fixed in local files which are correct: 1. In locale.js: Ext.Util.JSON has changed to... How to print the data in Grid,we hav any plugin in 4.1 version please provide a solution,if possible. I've got a web app that's working perfectly in most browsers, but, oddly Internet Explorer is giving me the following error: I'm just starting out with Ext JS 4. I have found that if include an image in a container, then I must supply image width and height... i would like to know , How to expand the particular node in the tree panel? Please share ur experience. Hi I have two models : I have a Store for Tree : Data.Treestore the proxy is a xml file I create TreePanel with the TreeStore In the xml, i have more information for all... my app was running quite nice using ExtJS 4.0.x. However, the way how one can build a tree manually (in contrast to loading tree data from a... I'm just going crazy over this: I'm using Tree Panel, TreeStore and a model to load data like this: When I use the following... My team has run into an issue when trying to automate out tests with Selenium. We are using extJS 4.0.7. We are trying to select a value... I have one query with dataview. I have to unbind(disable) the 'itemclick' event to a dataview item which has a class 'x-item-disabled' in... I have a grid that has a column that looks like this, I am new to ExtJs. I am getting the 'this.el is undefined' after upgrading to ExtJS4.1.1a. Kindly let me know where I am... I am trying to construct a grid dynamically. I am wondering if it is possible to render the grid without knowledge of model. I am... Can anyone please help me on this? A am expecting to get a line chart (together with a stacked column chart) that accepts null values but ignores... I would like to use Ext's String method on some text that will be output to the view. I am new to EXT and in the process of implementing the EXT checked tree as a picker for a Symfony application we are using. I have the... I'm using EXTJS 4.1.1 and I have a problem with the font family in IE9 64bits. I would like to change the tick marks to be between the columns instead of under them, as is typical for histogram charts. See the chart below. I... Hi, I'm using REST services that address resources using URL path: rather than parameters
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861848830.49/warc/CC-MAIN-20160428164408-00109-ip-10-239-7-51.ec2.internal.warc.gz
CC-MAIN-2016-18
2,345
32
http://tastytorrents.org/details.php?id=60677
code
|Added||July 29 2008| |Seeds / Peers||2 / 1 Refresh Leechers| 957 Byte details.txt 124.49 MB I Wanna Be The Guy.zip Like many of the traditional games that IWBTG parodies, the game's plot is straightforward and does not heavily impact gameplay. The player takes on the role of "The Kid," who is on a mission to become "The Guy." The entirety of the plot is given in a rather cryptic message during the opening credits, a parody of bad Japanese translations and broken English in early NES games. In the year 200x on his 15th birthday... a child left home on his dangerous and epic quest to become The Guy! Many years ago, "The Guy" left world and retreat to "Dungeon of Doom". Now "Young Boy" goes to defeat "The Guy" and become "The Guy" with his gun pass handed down by former "Grandfather the Guy". Go find the "8 units". Now become "The Guy". A Very addicting but annoying game... it is ridiculously hard, all my friend but me have had the privilege of saying they are the guy..... WHO DOESN'T LIKE A CHALLENGE! |Help-HI2U - Pc Games||568.3 MB||8||1||1 month| |GoNNER-GOG - Pc Games||452.15 MB||17||12||1 month| |Stellar Overload v0.8.5.0 - Pc Games||866.3 MB||16||10||1 month| |Loot Hunter v1.18 - Pc Games||31.88 MB||1||0||1 month| |Hyper Light Drifter Update 10.12.2016 - Pc Games||778.3 MB||7||18||1 month| |Zombie Boom - Pc Games||59.08 MB||4||1||1 month| |Tzar The Burden Of The Crown-GOG - Pc Games||195.82 MB||4||5||1 month| |The Dweller - Pc Games||17.04 MB||3||1||1 month| |Stranded Deep Alpha v0.16 H2 - Pc Games||325.65 MB||31||2||1 month| |Sparkle ZERO - Pc Games||132.07 MB||5||2||1 month| |Risky Rescue - Pc Games||19.67 MB||4||1||1 month| |Project Highrise v1.1.0 - Pc Games||50.89 MB||5||1||1 month| |Maze The Broken Tower Collectors Edition - Pc Games||497.65 MB||8||23||1 month| |WARSHIFT-SKIDROW - Pc Games||1.14 GB||16||47||1 month| |Shadow Warrior 2 Deluxe Edition v1.0.6 Inclu DLC (GOG) - Pc Games||15.06 GB||40||17||1 month| |Eventide 2 The Sorcerers Mirror-PLAZA - Pc Games||1.2 GB||6||7||1 month| |Shadow Warrior 2-CODEX - Pc Games||14.13 GB||15||9||1 month| |Shadow Warrior 2-CODEX - Pc Games||14.14 GB||7||317||1 month| |Kerbal Space Program v126.96.36.1996 - Pc Games||1.16 GB||86||15||1 month| |Sakura Space - Pc Games||169.32 MB||20||5||1 month|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541905.26/warc/CC-MAIN-20161202170901-00425-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
2,280
28
https://forum.knittinghelp.com/t/interpretation-of-instructions-help-please/73395
code
I am a good beginner and this pattern is from England (cap sleeve top). I have cast on 83 sts and worked 2-3/4 inches (st-st). Now it says, “Work 16 rows dec 1 st at each end of next and foll 14th row”. Ending with 79 sts. Huh? I just want to know which row numbers I will dec 1 st which totals 4 dec sts. Looking for simple English. Next and foll are not clear to me.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334332.96/warc/CC-MAIN-20220925004536-20220925034536-00448.warc.gz
CC-MAIN-2022-40
372
1
https://mb.srb2.org/threads/generations-classic-sonic-wip.37902/page-6
code
Alright after your done traceing it. You need to color it in the srb2 style. Shouldn't be too hard. You can look at sonic's sprites as reference. To be honest, its not that bad. Heck, i find it quite charming. But, there is still room for gradual improvent and more time baking it in the oven to become better. For example, i'd reccomend improving his arm to not go straight after going upwards for a bit, and make fingers not that too blocky.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819067.85/warc/CC-MAIN-20240424045636-20240424075636-00617.warc.gz
CC-MAIN-2024-18
443
2
http://forum.battlefleetgothic-armada.com/viewtopic.php?f=37&t=22660&view=print
code
I think a good idea is: "giving each faction a legendary slot for famous ships like the planetkiller, Space Hulk, and all the other named ships among the other races. It could be done one by one with small dlc's. ("The-legendary-Ship-dlc-of-the-month" In the end, when the balance and point costs are well done, it could give more ship-choices for the players without creating ships that dosen't exist in lore. Implentet like the demiurg without crew and favors, (Abbadon's favor is just "Black Legion" for example^^). the legendary slot could named. "Commandoship or Admiralship" or something similar. And we could increse the levelcap for the players from 8 to 9 to unlock the famous ship slot. (or maybe 9 for the Grand Cruiser Slot, and 10 for the legendary Slot.)
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741764.35/warc/CC-MAIN-20181114082713-20181114104713-00201.warc.gz
CC-MAIN-2018-47
768
8
http://isgt.fmi.uni-sofia.bg/publication/default.html
code
The papers should be submitted electronically via EasyChair: All submissions will be reviewed by the ISGT 2017 International Programme Committee. The accepted papers will be published in the ISGT 2017 Proceedings. The conference papers are indexed by the Google Scholar. Extended versions of selected papers will be published in Serdica Journal of Computing after the conference. Requirements for papers formatting download here!
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607242.32/warc/CC-MAIN-20170522230356-20170523010356-00186.warc.gz
CC-MAIN-2017-22
429
5
http://bezakful.com/games/terraria/colins-fun-server/
code
While I was working up the update to tshock for the Terraria server, I ran across a post by Colin. This led me to his Terraria server. I provided the information to Z, and he actually loves this server. He seems to be spending all of his Terraria time on there now. He can be found on the CFSGaming server as Wing.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283008.19/warc/CC-MAIN-20170116095123-00323-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
314
1
https://swiftpackageindex.com/keywords/non-blocking
code
Packages for keyword “non-blocking” Event-driven network application framework for high performance protocol servers & clients, non-blocking. Lightweight library for web server applications in Swift on macOS and Linux powered by coroutines. 🔌 Non-blocking TCP socket layer, with event-driven server and client. 🐬 Non-blocking, event-driven Swift client for MySQL. Coroutines, structured concurrency and CSP for Swift on macOS and Linux. ⏱ Promises and reactive-streams in Swift built for high-performance and scalability. A Swift Multiplatform Single-threaded Non-blocking Web and Networking Framework A pure Swift Client implementing the MySQL protocol. Also supports non-blocking I/O
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00513.warc.gz
CC-MAIN-2024-18
697
9
http://www.duelinganalogs.com/comic/its-dangerous-to-go-alone-2/
code
Maybe that’s why the old man disappears in the beginning of the Legend of Zelda. He couldn’t deal with the fate he forced upon an innocent child. Or Link decides not to take the sword and finds another way. I really wish nintendo games ever had a similar message. Last Zelda game I played I was getting rewarded for killing snakes and bugs. Wow. I was just playing that game today. Now I have a whole new outlook on it.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737922497.60/warc/CC-MAIN-20151001221842-00177-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
423
4
https://forums.macrumors.com/threads/did-i-buy-the-wrong-mbp-external-monitor-question.1080434/
code
I was originally looking for a standard res 15" because at 1440x900 it would be the same resolution as the 17" 1440x900 I was coming from, so everything would be a bit smaller but I wouldn't lose any screen real estate. When I went to pick up the notebook (craigslist) it turns out I read the ad wrong and it was actually 17" which is 1920x1200. The price was great for a 15" so it was even better for a 17" so I took it anyways ($1,500 sealed/brand new with applecare, some rich kid selling her xmas gift). Because of the resolution I have to set chrome to a 120% zoom by default, increased the font size in textpad and pathfinder to 15, and in word and excel documents set the zoom to 150%. It's not a pain because it's done and everything looks great now, but if I buy an external monitor, like say the Dell U2311H 23" 1920x1080.. since the resolution is essentially the same but the dpi is much lower, won't everything everything I've zoomed in now look too big? So I'd be forever reseting zoom levels everytime I plug in the monitor? Whereas if I'd bought the 1440x900 15" I wouldn't need to zoom anything or change font sizes, and could just plug it in and everything would be the right size on the monitor, I'd just have more screen real estate? And finally, one beautiful thing about my new Mac is when I plug in a new audio source it switches to it automatically, it's awesome because on my PC I had to manually switch my audio output via menus every time I plugged in my firewire audio interface. Same thing when I plugged in a monitor, it wouldn't automatically switch, I'd have to go into the videocard settings, pain in the ass. Are Mac's equally awesome when it comes to external monitors? Plug it in and it switches automatically?
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514497.14/warc/CC-MAIN-20181022025852-20181022051352-00404.warc.gz
CC-MAIN-2018-43
1,745
1
https://omictools.com/transposable-element-prediction-category
code
bookmark MGEScan MGEScan-LTR and MGEScan-nonLTR are successfully used programs for identifying long terminal repeats (LTR) and non-LTR retrotransposons in eukaryotic genome sequences. However, these programs are not supported by easy-to-use interfaces nor well suited for data visualization in general data formats. MGEScan is a user-friendly system that combines these two programs with a Galaxy workflow system accelerated with MPI and Python threading on compute clusters. MGEScan and Galaxy empower researchers to identify transposable elements in a graphical user interface with ready-to-use workflows. MGEScan also visualizes the custom annotation tracks for mobile genetic elements in public genome browsers. A maximum speedup of 3.26× is attained for execution time using concurrent processing and MPI on four virtual cores. MGEScan provides four operational modes: as a command line tool, as a Galaxy Toolshed, on a Galaxy-based web server, and on a virtual cluster on the Amazon cloud.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948617.86/warc/CC-MAIN-20180426222608-20180427002608-00173.warc.gz
CC-MAIN-2018-17
996
1
http://greendelta.github.io/olca-schema/classes/TechFlowValue.html
code
A value related to a technosphere flow. - Type: TechFlow - Proto-Index: 1 - Proto-Index: 2 Python class stub The snippet below shows the names of the properties of the corresponding Python class of the olca-schema package. Note that this is not the full class definition but just shows the names of the class and its properties. @dataclass class TechFlowValue: amount: float tech_flow: TechFlow
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647525.11/warc/CC-MAIN-20230601010402-20230601040402-00567.warc.gz
CC-MAIN-2023-23
394
7
https://www.contractortalk.com/threads/hello-everyone.68269/
code
Nice to be here! My name is Ian Sean, new member of this forum. I've found your forum when I'm searching for the term 'contractors'. I'm very thankful for being a part of this nice community. Anyway, just thought I'd say Hi and hope to be able to contribute and help out where I can.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499966.43/warc/CC-MAIN-20230209112510-20230209142510-00602.warc.gz
CC-MAIN-2023-06
283
5
https://bintanvictor.wordpress.com/category/t_jcc/
code
In java, this is simple and extremely common: Shape interface. In c++, we need a container of shared_ptr to pure abstract base class. - pure abstract interface can support MI - shared_ptr supports reference counting, in place of garbage collection - pointer instead of nonref payload type, to avoid slicing. Most complex libraries (or systems) in java require reflection to meet the inherent complexity; Most complex libraries in c++ require template meta-programming. But these are for different reasons… which I’m not confident to point out. Most complex python systems require … reflection + import hacks? I feel python’s reflection (as with other scripting languages) is more powerful, less restricted. I feel reflection is at the core of some (most?) of the power features in python – import, polymorphism Based on whatever little I know, here are some technical advantages of c# over java. (Master these c# feature and mention them in your next java interview 🙂 - C# has many more advantages on desktop GUI, but today let’s focus on server side. - [L] generics —- c# generics were designed with full knowledge of java/c++ shortcomings. Simpler than c++ (but less powerful), but more complete than java (no type erasure). For example see type constraints. - [L] delegates —- Rather useful. Some (but not all) of its functionalities can be emulated in java8. - [L] c# can access low-level windows concurrency constructs such as event wait handles. Windows JVM offers a standardized, “reduced-fat” facade. If you want optimal concurrency on windows, use VC++, or c#. - [L] reflection —- is more complete than java. Over the years java reflection proved to be extremely powerful. Not sure if c# has the same power, but c# surely added a few features such as Reflection.Emit. - concurrency —- dotnet offers many innovative concurrency features. All high level features, so probably achievable in java too. - tight integration with COM and MS Office. In fact, there are multiple official and unofficial frameworks to write Excel add-ins in c# - tight integration with high-level commercial products from Microsoft like MSSQL, sharepoint - tight integration with windows infrastructure like Windows Services (like network daemons), WCF, Windows networking, Windows web server, windows remoting, windows registry, PowerShell, windows software installation etc - c# gives programmers more access to low-level windows system API, via unmanaged code (I don’t have examples). In contrast, Java programmers typically use JNI, but I guess the java security policy restricts this access. - probably higher performance than JVM on windows [L = low-level feature] If you want highest performance on Windows, low-level access to windows OS, but without the complexity of VC++ and MFC, then c# is the language of choice. It is high-level, convenient like java but flexible enough to let you go one level lower when you need to. Another way to address your question — listen to the the complaints against java. (Put aside the complaints of GUI programmers.) Even if a (rational, objective) architect doesn’t recognize any of these as important advantages, she may still favor c# over java because she is familiar and competent ONLY in the Microsoft ecosystem. She could point out countless features in Visual Studio and numerous windows development tools that are rather different from the java tool set, so different that it would take months and years to learn. Also, there are many design trade-off and implementation techniques built on and for Dotnet. If she is reliant on and comfortable in this ecosystem, she would see the java ecosystem as alien, incomplete, inconvenient and unproductive. Remember when we first moved to U.S. — everything inconvenient. On a more serious note, her design ideas may not be achievable using java. So java would appear to be missing important features and tools. In a nutshell, for her java is a capable and complete ecosystem theoretically, but in practice an incomplete solution. A Shanghai Morgan Stanley interviewer asked in a 2017 java interview. One hypothesis — no free() or delete() in java, so the memory manager doesn’t need to handle reclaiming and reusing the memory. [[optimizedC++]] P333 confirmed the c++ mem mgr need that. Instead the GC uses a very different algorithm — see below. One hypothesis — after a warm-up period, based on heuristics JIT compiler could aggressively compile bytecode into machine code with speedy shortcuts for the “normal” code path + special code path to handle the abnormal conditions. Here’s an analogy — if every borrower seen so far has acceptable credit score, the bank may simplify credit check and have special procedure to deal with defaults. For most of the cases this work flow is faster than the traditional. http://www.javaworld.com/article/2076593/performance-tests-show-java-as-fast-as-c–.html is a 1998 research. In my GS-PWM days, a colleague circulated a publication that java could match C in performance, but they didn’t say “surpass” https://stackoverflow.com/questions/1984856/java-runtime-performance-vs-native-c-c-code is not a published expert but he says: On average, a garbage collector is far faster than manual memory management, for many reasons: - on a managed heap, dynamic allocations can be done much faster than the classic heap - shared ownership can be handled with negligible amortized cost, where in a native language you’d have to use reference counting which is awfully expensive - in some (possibly rare and contrived) cases, object destruction is vastly simplified as well (Most Java objects can be reclaimed just by GC’ing the memory block. In C++ destructors must always be executed) See also https://bintanvictor.wordpress.com/2009/03/21/realtime-inter-vm-communication-in-front-desk-trading-sys/ These are in the QQ category i.e. skills required for QnA IV only. Q1: 3 threads to print the numbers 1,2,3,4,5… in deterministic, serial order. Just like single-threaded. Q1b: what if JVM A has T1, T2, and JVM B has T3? How do they coordinate? %%A: in C++ shared memory is the fastest IPC solution for large data volume. For signaling, perhaps a semaphore or named pipe %%A: I feel the mutex is probably an kernel object, accessible by multiple processes. On Windows, mutex, wait handle, … are all accessible cross-process, but java (on Windows or unix) is designed differently and doen’t have these cross-process synchronization devices. %%A: use a database table with one row one column. Database can notify a JVM. AA: The java.nio.file package provides a file change notification API, called the Watch Service API. The registered JVM has a thread dedicated to watching.AA: in java, the JDK semaphore is NOT a wrapper of the operation system semaphore so not usable for IPC A: java Semaphore? Probably not an IPC construct in java. Q2: have you used any optimized Map implementations outside the JDK? Q3: to benchmark your various threading solutions how do you remove the random effects of GC and JIT compilation? %%A: allocate enough memory to avoid GC. Turn off JIT to compile every code path. Perhaps give the JVM some warm-up period to complete the JIT compilation before we start the benchmark. Parametrized Functor (class template) is a standard, recommended construct in c++, with no counterpart in java. C# delegae is conceptually simpler but internally more complex IMO, and represents a big upgrade from c++ functor. Better get some clarity with functor before comparing with delegates. The most common functor is the simple stateless functor (like a simple lambda). The 2nd common category is the (stateful but) immutable functor. In all cases, the functor is designed for pass-by-value (not by ref or by pointer), cheap to copy, cheap to construct. I see many textbook code samples creating throwaway functor instances. Example of the 2nd category – P127[[essentialC++]]. A) One mental block is using a simple functor Class as a template type param. This is different from java/c# B) One mental block is a simple parametrized functor i.e. class template. C++ parametrized functor can take various type params, more “promiscuous” than c#/java. C) A bigger mental block, combining A+B, is a functor parametrized with another functor Class as a template param. See P186[[EssentialC++]]. This is presented as a simple construct, with about 20 lines of code, but the more I look at it, the more strange it feels. I think this is somwehwat powerful but unpopular and unfamiliar to mainstream developers. Functional programming in c++? In java, we write a custom comparitor class rather than a comparitor class Template. We also have the simpler alternative of a Comparable interface, but that’s not very relevant in this discussion. Java 8 lambda — http://www.dreamsyssoft.com/java-8-lambda-tutorial/comparator-tutorial.php I hope to find online articles to support each claim. C# — anon (unicast) delegates. See [[c# in depth]] java — anon nested classes. See [[mastering lambdas]] c++ — functor class (template) or function pointer. See https://blog.feabhas.com/2014/03/demystifying-c-lambdas/ and http://www.cprogramming.com/c++11/c++11-lambda-closures.html * in dotnet the plain lookup operation will throw exception if non-existent. I hit this frequently in my projects… *** STL map silently adds an empty entry! For the justifications (crazy interviewers?), see http://stackoverflow.com/questions/4382656/why-is-stdmapoperator-so-counter-intuitive *** java returns null http://stackoverflow.com/questions/5220619/return-from-hashmapstring-string-when-no-key * basic Dictionary offers TryGet…() TryAdd? Concurrent dict only, not the basic Dictionary. * in dotnet, the plain Add() will throw exception if clash *** STL map will silently ignore the insert() attempt, but operator can be used to insert or overwrite ??? TryRemove? No such thing. Using the plain Remove to remove a non-existent is no-throw.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825473.61/warc/CC-MAIN-20171022222745-20171023002745-00177.warc.gz
CC-MAIN-2017-43
10,019
72
https://visualstudiomagazine.com/Articles/2020/03/02/net-core-3-ends.aspx
code
.NET Core 3.0 'Dies' March 3 Microsoft advised developers that .NET Core 3.0, a major milestone in the new cross-platform, open-source direction of .NET, will reach "end of life" on Tuesday, March 3. Coders who haven't already are advised to switch to .NET Core 3.1, a long-term support (LTS) edition released three months ago that will "live" (be supported) for at least three years. The "end of life" of a release means it won't be included in future .NET Core patch updates. Though it only "lived" for about five months, .NET Core 3.0 was an important milestone for Microsoft's transition from the aging, Windows-only .NET Framework to .NET Core. because it introduced support for Windows Presentation Foundation (WPF) and Windows Forms desktop development, one of the more problematic areas of the transition. The Microsoft support policy explains the difference between LTS and "Current" releases: - LTS releases include features and components that have been stabilized, requiring few updates over a longer support release lifetime. These releases are a good choice for hosting applications that you do not intend to update often. - Current releases include features and components that are new and may undergo future change based on feedback. These releases are a good choice for applications in active development, giving you access to the latest features and improvements. You need to upgrade to later .NET Core releases more often to stay in support. "Both types of releases receive critical fixes throughout their lifecycle, for security, reliability, or to add support for new operating system versions," Microsoft said in a Feb. 28 post that explains how to migrate to .NET Core 3.1. "You must stay up-to-date with the latest patches to qualify for support." Though Microsoft is advising developers to migrate to .NET Core 3.1, that release itself is a transition to the unifying .NET 5 coming in November that will wrap up everything in one package. David Ramel is an editor and writer for Converge360.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818468.34/warc/CC-MAIN-20240423064231-20240423094231-00132.warc.gz
CC-MAIN-2024-18
2,016
11
https://www.freelancer.com.ru/projects/sql-windows-server/acces-sql-server-database/
code
We have a a software that works with SQL SERVER, we run the client on a workstation, it connects to the server (windows server 2003 + sql server 2000). This windows server 2003 is a domain controller for mydomain1.com. Now we have a new domain in our network, mydomain2.com. The problem is that when I connect the work station to this new domain, it can not connect to the sql server and the software doesnt works without this SQL SERVER connection. It says that cannot finde the SQL SERVER. can anyone solve this problem? It looks like no big problem but can not find the solution Thanks in advance
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511314.51/warc/CC-MAIN-20181017220358-20181018001858-00384.warc.gz
CC-MAIN-2018-43
599
5
https://sharepoint.stackexchange.com/questions/177489/force-name-field-in-sp13-library-to-be-equal-to-title
code
As I understand, SP13 searches documents by document Title. When you upload some document to the library, you have to fill in "Name" and "Title" ( the same field twice). What I want to do is to make these fields source values from each other. Is there some solution available? May be some jquery code in CE?
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370506959.34/warc/CC-MAIN-20200402111815-20200402141815-00215.warc.gz
CC-MAIN-2020-16
307
2
https://marketforum.com/forum/topic/20299/
code
This weekly list of global economic reports and pressers include such topics as current GDP,PPI,CPI,Sentiment Surveys,Interest Rate Announcements,Employment Numbers,Trade Balances and such. Those who trade "things" that have values sensitive to the above items may find it useful. Set your current time (time zone) via the "Current Time" tab located on the right above the "Friday" date. John --M erry Christmas to ALL !
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347419639.53/warc/CC-MAIN-20200601211310-20200602001310-00512.warc.gz
CC-MAIN-2020-24
420
5
https://openreview.net/forum?id=mAzhEP9jPv
code
Are Large Language Models Post Hoc Explainers? Abstract: Large Language Models (LLMs) are increasingly used as powerful tools for a plethora of natural language processing (NLP) applications. A recent innovation, in-context learning (ICL), enables LLMs to learn new tasks by supplying a few examples in the prompt during inference time, thereby eliminating the need for model fine-tuning. While LLMs have been utilized in several applications, their applicability in explaining the behavior of other models remains relatively unexplored. Despite the growing number of new explanation techniques, many require white-box access to the model and/or are computationally expensive, highlighting a need for next-generation post hoc explainers. In this work, we present the first framework to study the effectiveness of LLMs in explaining other predictive models. More specifically, we propose a novel framework encompassing multiple prompting strategies: i) Perturbation-based ICL, ii) Prediction-based ICL, iii) Instruction-based ICL, and iv) Explanation-based ICL, with varying levels of information about the underlying ML model and the local neighborhood of the test sample. We conduct extensive experiments with real-world benchmark datasets to demonstrate that LLM-generated explanations perform on par with state-of-the-art post hoc explainers using their ability to leverage ICL examples and their internal knowledge in generating model explanations. On average, across four datasets and two ML models, we observe that LLMs identify the most important feature with 72.19% accuracy, opening up new frontiers in explainable artificial intelligence (XAI) to explore LLM-based explanation frameworks. Submission Track: Full Paper Track Application Domain: Natural Language Processing Survey Question 1: In our study, we turned to the latest advancements in natural language processing, particularly Large Language Models (LLMs), to see if they could offer explanations for the predictions of other machine learning models. LLMs are known for their capability to understand and generate human-like text based on a few input examples. We designed various strategies to prompt these LLMs, feeding them information about a given prediction, and asking them to generate explanations. Our experiments on multiple datasets showed that LLMs could produce reliable and understandable explanations, often performing as well as or better than current state-of-the-art explanation techniques. Survey Question 2: We opted for benchmark datasets like Recidivism and Credit, which have known challenges and implications around model interpretability. While powerful predictive models exist, many current explanation techniques necessitate intrusive white-box access or impose computational burdens. These constraints limit their applicability, especially when rapid or scalable explanations are required. Moreover, a lack of clarity on why models make specific predictions can inhibit their wider adoption, especially in sensitive applications. Our observation of these challenges in existing methods, combined with the versatility of LLMs, spurred our exploration into harnessing LLMs as more efficient and accessible explainers. Survey Question 3: In our work, we introduce a novel approach to achieve explainability by leveraging the capabilities of Large Language Models (LLMs). Rather than relying solely on existing techniques, we designed a unique framework that encompasses multiple prompting strategies, such as Perturbation-based ICL, Prediction-based ICL, Instruction-based ICL, and Explanation-based ICL. To validate the effectiveness and reliability of our LLM-based explanation method, we conducted comprehensive tests against well-established XAI techniques like LIME, SHAP, Gradients, Integrated Gradients, SmoothGrad, and Input x Gradients. This comparative evaluation allowed us to gauge how our LLM-generated explanations stand relative to state-of-the-art explainers. Submission Number: 76
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817455.17/warc/CC-MAIN-20240419203449-20240419233449-00162.warc.gz
CC-MAIN-2024-18
3,992
8
https://innovalog.atlassian.net/browse/JMWE-639
code
Since a recent JSD version, Validator error messages don't show up anymore in the error box at the top of the JSD request creation screen. This is due to a regression in JSD. We can fix this for error messages related to a field (e.g. Field Required Validator, or the Scripted Validator using the "For field" option). But if the message is not associated to a field, it will not be displayed (unlike in previous JSD versions - e.g. 3.0.11). We are using atlassian-servicedesk-3.12.2-x64.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655896932.38/warc/CC-MAIN-20200708093606-20200708123606-00520.warc.gz
CC-MAIN-2020-29
487
3
https://community.smartthings.com/t/how-do-i-create-a-new-mode/8458
code
Okay, I’ve searched and searched - and read countless articles where people discuss creating new modes. Even where people ask how to do it, but then figure it out before anyone can answer. And here I am. . .2 hours in. . .and I have no.earthly.idea how to do it. I can create “Actions” all day and night, but that’s not what I want. I need two modes for “Alarm Armed - Sleeping” and “Alarm Disarmed - Awake”. Help!!! Where do I go? What do I do to create a new mode?
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742316.5/warc/CC-MAIN-20181114211915-20181114233915-00380.warc.gz
CC-MAIN-2018-47
482
1
https://www.bnonlinear.com/
code
We use our deep understanding of liquid crystal systems and optics to develop new ways to shape, steer, and manipulate light. Boulder Nonlinear Systems is a company consisting of a multi-disciplinary team of scientists and engineers that develop novel liquid crystal devices – from optics to electronics to software – to solve the world’s toughest problems. By harnessing the unique electro-optic properties of liquid crystal materials, we can bring solutions to market with higher performance and lower size, weight, and power requirements than conventional technologies. From medicine to aerospace, from ultraviolet to infrared, we want to be your partners in tackling the toughest challenges in optics. For over 30 years, we’ve been partnering with government, industry, and academia to bring world-class technologies to market. These include liquid crystal on silicon spatial light modulators with the fastest frame rates and non-mechanical beam steering systems with the largest angles and apertures. Chief Technology Officer Crystals, vol. 11, no. 4, Art. no. 4, Apr. 2021, doi: 10.3390/cryst11040361. Optical Trapping and Optical Micromanipulation XVI, San Diego, United States, Sep. 2019, p. 3, doi: 10.1117/12.2528558 Science, vol. 365, no. 6453, Aug. 2019, doi: 10.1126/science.aaw5202
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499953.47/warc/CC-MAIN-20230201211725-20230202001725-00325.warc.gz
CC-MAIN-2023-06
1,303
7
https://support.route4me.com/geocoding-addresses-with-the-enterprise-architect-uploading-a-file/
code
Geocoding Addresses with the Enterprise Architect (Uploading a File) With Route4Me Enterprise Architect, you can geocode thousands of addresses in seconds. Geocoding enables you to significantly increase the accuracy of your customers’ locations and ensure that your routes are as precise and efficient as possible. It also helps to fix insufficient or misspelled addresses by processing them and outputting complete and correct data. With geocoded addresses, you can spatially display your customers’ locations and recognize certain patterns that will enable you to make your routing activities more efficient and your business more profitable. Enterprise Architect allows you to import addresses for geocoding in two main ways – by uploading a file/spreadsheet from your computer or by adding addresses from your Route4Me Address Book. To geocode addresses from an upload file, first, go to the “Addresses” tab at the top of the screen. Next, you need to import a file/spreadsheet with addresses into the Enterprise Architect from your computer. To do so, click on the “Load” button in the top right corner. Then, select the file with addresses from your computer, and upload it into the “Addresses” tab respectively. Currently, Enterprise Architect supports CSV file format only. For a spreadsheet to be successfully uploaded and processed, it should contain a header row and data rows. The header defines the type of information you are importing (i.e., addresses, zip codes, cities, etc.), while the corresponding data rows contain the actual address information. Once the addresses are uploaded into the Enterprise Architect, they are displayed in the “Addresses” tab respectively. To delete one or multiple addresses from the list, first, select the addresses you want to remove, then click on the “Delete” button. To geocode the uploaded addresses, click on the “Geocoder” button in the navigation menu. Then, select the column(s) with the data (addresses) that you want to geocode from the left-side list and transfer them to the right-side list by clicking on the corresponding button. Check the box next to the “Address Parser” to enable it. The “Address Parser” allows you to fix and properly geocode the incomplete or misspelled addresses. You can also automatically upload the addresses to your Route4Me Address Book, once they are geocoded. To do so, check the corresponding box. Click “Start” to geocode the uploaded addresses. Once the addresses are geocoded, they are displayed in the “Addresses” tab with three additional columns. The “fixed_address” column contains fixed and complete names of the corresponding addresses when the “lat” and “lng” columns display the latitude and longitude coordinates of the geocoded addresses. To download the list of the geocoded and fixed addresses, click on the “Save” button in the top right corner. You can also view and edit the geocoded addresses in your Route4Me Address Book if you selected the “Upload to Address Book” option.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314638.49/warc/CC-MAIN-20190819011034-20190819033034-00451.warc.gz
CC-MAIN-2019-35
3,057
13
http://slavaim.blogspot.com/2015/05/kernel-mode-debugging-windows-iot-on.html
code
I already described two ways for kernel mode debugging Windows IoT for Intel Galileo( via JTAG and WinDBG ), Windows IoT for Intel Galileo is still built around Windows 8.1 not 10( at least at the time of writing ). In case of Raspberry PI Windows IoT is built on Windows 10 kernel. Raspberry Pi2 doesn't have easily available JTAG port, there are speculations that JTAG is available via some GPIO pins but to prove this I need the board schematics which has not been available at the time of writing. Anyway, this is Windows so WinDBG over serial port, USB or network should work. There are three GPIO pins dedicated to UART communication on Raspberry Pi 2 - GPIO(6) is GND, GPIO(8) is Txd, GPIO(10) is RxD. There is a guide from Microsoft for Raspberry Pi2 kernel mode debugging - Conect Windows 10 IoT Core to WINDBG - Connecting to a Raspberry Pi 2 (RPi2) . Unfortunately it contains an error in the wiring that showed with TxD connected to TxD, RxD connected to RxD, instead TxD-RxD and TxD-RxD , i.e. the wiring as shown by Microsoft works only if null modem cable is used but doesn't work with standard FTDI connector. Also, you need a decent serial port adapter which is able to communicate at a speed at least 1 Mbaud as Raspberry PI 2 UART communicates at 921600 baud, I would recommend to buy an original FTDI TTL-232R 3.3 V cable or similar as easily available cheap USB2Serial cables are not able to communicate at the speed over 115200 baud. Connect the wires like this: I used a ribbon cable from a cobbler kit to connect FTDI 232R via male jumper cables, if you have male-female cables your can connect them directly to GPIO pins. Configure the board for kernel mode debugging via bcdedit, run WinDBG and establish a kernel mode debugging via COM port at 921600 baud . Below is a quote from the Microsoft tutorial Start of the quote. End of the quote. When executing bcdedit to activate kernel mode debugging do not provide the port speed as 921600, just leave it blank, as this value is considered as invalid by bcdedit, Raspberry Pi 2 UART by default communicates at 921600 baud and it looks like it is not possible to change it ( at least at the time of writing ). Below is an example of WinDBG session for Windows IoT on Raspberry Pi 2, note the ARM instructions at the bottom There is an easy way to test a serial connection with Raspberry Pi 2 when WinDBG remains silent and doesn't connect. Close WinDBG, run PuTTY , open COM port at 921600 baud, power on the board and watch the output. If there is a clear meaningful text like at the picture below then the connection is OK, if there is some output but there is no meaningful text then the serial adapter unable to communicate at 921600 baud, if there is no output at all then the wiring is wrong ( most probably you connected TxD to TxD instead RxD ) Question - Can I damage a serial adapter by a wrong wiring? Answer - No, normally you can't cause any damage by wrong wiring. But refrain from disconnecting or reconnecting wires when the board is powered.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578732961.78/warc/CC-MAIN-20190425173951-20190425195951-00411.warc.gz
CC-MAIN-2019-18
3,032
14
http://shallowthoughts00.blogspot.com/2007/01/its-privilege.html
code
And while we're at it, y-o-u-r your is a possessive pronoun. y-o-u-apostrophe-re- (you're) is you-are. Implying an action. Your grammar sucks. P.S: This post is an awesome idea to vent my pet issues on matters of the written word. Watch out for regular updates. :-) And feel free to add your own.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676596336.96/warc/CC-MAIN-20180723110342-20180723130342-00440.warc.gz
CC-MAIN-2018-30
296
3
http://blogs.trhonline.com/getpost.pl?messnumb=1264516381&user=2
code
This week on Facebook a bunch of people decided to have a "Doppelganger Week" in which people replace their Facebook photos with images of famous people we've been TOLD we look like. This does not actually mean we THINK we look like these people (in my case, I have always protested the claimed resemblence between myself and the person whose image I have posted), but merely what other people think they look like. Peso decided to participate, and put up an image of someone that I, for years, have insisted he resembled. Some of you might believe my choice to be tasteless, and in truth it's not that I don't disagree... it's that I don't care. While it's true that I don't think that being tasteless for the sake of being tasteless is funny, a funny joke that just happens to be tasteless is still a funny joke to me. In my opinion, this falls into that category. Also, I'm convinced that I'm right, and that the resemblence between the two is hilarious. The sad part is that I spent way too much time putting that short clip together. The end results are actually what happens when I sort of give up and say "Hell, it's good enough." But by then, I had already put a good hour of work into the ridiculous, stupid 48 second waste of time. Honestly though, I think I did it in part just so I could finally post more content to the site beyond the comics and blog entries which fill the week here. Perhaps I did it just to randomly remind people that there's a little more depth. Perhaps I did it just to selfishly promote other short films I've done... hell, perhaps I did it just because I lovedefamingPeso.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186891.75/warc/CC-MAIN-20170322212946-00524-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,610
5
https://www.timesjobs.com/job-detail/senior-net-developer-itforte-staffing-services-private-ltd-gurgaon-5-to-8-yrs-jobid-Jos__PLUS____SLASH__hf__PLUS__MoVzpSvf__PLUS__uAgZw==
code
Required Skills: Founded in 1987 and listed on NASDAQ, our client is headquartered in the USA and has an annual turnover of over USD 2 Billion. They are a leading provider of technology solutions for small, medium, enterprises throughout the North America, Europe and Asia. Their comprehensive expertise and proven experience in advanced technologies and consulting & implementation services makes them the preferred partner for many global MNC customers. The successful candidate will be a highly skilled developer in building scalable, high-quality and high-performance web applications on the Microsoft technology stack. As a .NET Senior Developer you will be responsible for building and maintaining internal and external facing web applications in a fast-paced E-commerce environment. - Develop software in the .NET MVC 6.0 using Entity Framework and SQL stored procedures as a full stack developer - Expected to have a solid understanding of software development design patterns and ability to develop solutions from complex business logic. - Must have clear oral and written communication skills to interact with technical and non-technical personnel. - Expected to conduct system analysis and development, with limited support from professional staff, to keep our systems current with changing technologies - Responsible for coding standards and peer reviews - Evaluate and identify new technologies for implementation - Project Planning and Project Management - Take specifications and develop applications and solutions - Designing, coding and debugging applications in various software languages. - Scoping documents and technical specs - Object-oriented Design and Analysis (OOD/OOA) - Software modeling and simulation - Support, maintain and document software functionality - Maintain standards compliance - Maintenance of legacy software (Classic ASP) - Give technical direction to lower level employees - Performs additional duties as assigned Qualifications and Skills: - Bachelor (4-year) degree in Computer Science, MIS or related field with 5 years of programming experience how you interact with our website. This allows us to improve and customize your browsing experience. To find out more about the cookies we use, see our Cookies
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487622234.42/warc/CC-MAIN-20210616063154-20210616093154-00311.warc.gz
CC-MAIN-2021-25
2,253
24
https://pensarefriends.wordpress.com/2017/03/01/part-two-turning-words-into-pictures/
code
For this exercise I chose the word KITCHEN. Here are my visual outcomes for this word: ‘Using drawing as a form of visual shorthand.’ During this exercise I noticed how I am developing a sense of visual editing and distillation of information, through practicing drawing more often than previously. I think I could have filled more of the space, but I started with the table in the middle as I was writing KITCHEN, and then started pretty much from the left hand corner round in a clockwise movement to fill the page with things from my own kitchen, mostly from memory and some from life, as I moved to the kitchen half way through to finish the exercise. I like that this is not completely linear, in that things overlap and if you looked at it from a life-like comparison it seems unrealistic because things appear to be floating and out of context which, visually, makes it more compelling.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589029.26/warc/CC-MAIN-20180716002413-20180716022413-00461.warc.gz
CC-MAIN-2018-30
897
4
https://www.assistmyteam.com/knowledge-base-addins/
code
Knowledge base for Outlook Knowledge sharing plug-ins with seamless integration in Outlook and SharePoint Document best practices and solutions for common and recurring problems in a knowledge base and use the articles to reply to time-consuming and repeated queries from your end-users in Outlook in a single click. Reduce customer support, improve staff productivity and eliminate time wasted searching for information across disparate systems. Available for a fully functional 30 days trial. - Seamless integration with Microsoft Outlook - Centralize sharing of knowledge and documents – KB articles are stored in shared or public folders of your Exchange server or in SharePoint lists. - No server installation or configuration – Only a simple client install - Centralized administration, configuration and deployment of KB configurations and logic for all work-group users. - Find relevant KB article fast – Keywords search options from within Outlook - Grouping of KB articles in multi-tier categories and types for easy locating of relevant article effortlessly in Outlook - Use your existing Exchange/SharePoint permissions to grant/deny access to the KB articles - Define custom fields you wish to track within the knowledge base - Preserves the original formatted content, embed images and files attachments of the chosen KB article, if any, when inserting it to email reply in Outlook - Insert chosen KB article as file attachment in the following document formats: – Adobe Portable document (.pdf) – Outlook Message (.msg) – XML Paper Specification document (.xps) – Microsoft Word document (.doc) – Web-archive Single Page (.mht) - Insert chosen KB article as inline content into the email reply - Support for Office 2019 and Office 365 - Available in Personal and Team Editions. Lack of a centralized knowledge sharing mechanism in Outlook You and your support team frequently find trying to solve the same issue over and over. Your end-users send you emails on similar issues repeatedly. And if you are already aware of the solution, typically, you will try to compose the solution or if you have vague recollection of it, you will try to navigate to your existing document libraries, past emails etc. Just consider how much time and effort you had wasted in trying to find the right information at the moment of need, not to mention the delayed response to the support request. You wish you could share your knowledge on a centralized information system with other team members so that everyone has the same understanding and are communicating the same message when asked about specific issues. Knowledge base add-in for Outlook Knowledge base add-in is designed to bridge this gap between your Outlook and Exchange folders or SharePoint lists where all your knowledge base articles are stored, such that you can effortlessly locate a KB article relevant to an issue from within Outlook itself and insert it into an outgoing email reply in a single click. All these and more making sure, the outgoing email retains all the actual files and the original formatting of the selected KB article. No more frequent switching between Outlook folders or SharePoint lists, no more copy-paste job etc. With Knowledge base add-in, any team can leverage the information stored on Exchange Folders or SharePoint lists, to reduce customer support, improve staff productivity and save time that would otherwise have been wasted in searching for information across disparate systems such as shared folders and paper documents, all inside Outlook. Factors that demand for a knowledge management system for your organization: - Rising rate of innovation and increasing competition in marketplaces - To replace informal knowledge with format methods, especially, when the organization is under-staffed - Competitive pressures reduce the size of workers that holds valuable business knowledge. - To help new workers experience and acquire knowledge in the shortest time. - Need to manage increasing complexity as businesses become globalized. - Changes in strategic direction may result in the loss of knowledge in a specific area. - Retaining knowledge when employees leave or change positions or retires how it works Knowledge base add-in makes the process of collection, organization, management and retrieval of knowledge very easy in Outlook. The first step is for the administrator to install the Team KB Admin add-in and then configure a new on-premise SQL Server or Cloud Azure SQL or an Access database or a SharePoint site to be used as a KB Settings data source. This database should be configured such that it is accessible to all users on the company’s network. Choosing Exchange folders or SharePoint lists Before you and other staffs can start searching and choosing KB articles and insert to outgoing email replies in Outlook, the KB Administrator needs to choose the Exchange folders or SharePoint lists where KB articles are collected and stored. Admin chosen Exchange Folders containing KB articles: Admin chosen SharePoint lists containing KB articles: Each KB article can also be tagged with a Category and Type. Typically, administrator will gather all the problem areas that the support team will be attending to and feed them into the categories list. Further each category can have their own list of types. So, what you have will be nested tiers of categories/types which are complete representation of your organization’s support model and act as somewhat of a guiding decision tree for publishing and searching KB articles. To be able to access and make use of the KB articles in Outlook, every team member must install the Team Knowledgebase User tool in their system. Once installed, the user will be prompted to specify the KB Settings Data Source, which is nothing but a database that your administrator had created and configured under your company’s network with the Team KB Admin Add-in (either could be a Microsoft Access or a Microsoft SQL Server database or a SharePoint list). The data source stores the drop-down lists of categories, types, email templates, notification and other common settings. In short, these are global settings that streamline the behavior on how all users raise, access and use KB articles in their Outlook. If the ‘KB Settings Data Source’ panel does not show up, you can invoke from the Outlook > Team KB toolbar > My Options menu… If an Access database was chosen by your administrator, each user needs to input the network location (UNC path) where the TeamKBSettings.mdb file is located. If a SQL database was chosen by your administrator, user needs to input the server name where the TeamKBSettingsDB database is stored. If a SharePoint database option is chosen, enter the SharePoint URL site to show all available sub-sites and lists and choose the ‘TeamKBSettings’ list (that was already created and configured using the admin add-in tool) to maintain a permanent link between the Team KnowledgeBase User add-in and the KB data source. Now, click the Save button, to confirm the selected KB Settings Data Source, such that Team Knowledgebase User add-in will maintain connection to the database and retrieve the KB logic and settings data to the local system automatically. Now, open Outlook and from the Team Knowledgebase toolbar, you will notice that the ‘New Empty KB’, ‘Raise KB in’ and ‘Navigate to KB folder’ drop down menu shows all the administrator’s chosen KB folders or SharePoint lists where the KB articles are stored. You and other users can then simply choose the destination KB folder or SharePoint list to which a new KB will be generated from emails and or to choose an existing KB article from one of the relevant KB folder or SharePoint to reply to an email in Outlook. Team Knowledgebase specific ribbon available in the Home tab of the Outlook Explorer window. Team Knowledgebase specific ribbon available in the Message tab of the Outlook mail inspector window A pop-up dialog box allows you to browse through the existing knowledge base articles, and select the relevant article to be embedded either as attachment or inline content or as URL into the email reply. You can insert selected KB article in 3 ways to outgoing email: 1. Inserting chosen KB article as PDF, MSG or XPS file attachment to the email reply Selected KB article can be applied or inserted into the replied email in varied format. You can choose to insert as attachment in the form of a word document (*.doc), Adobe PDF (*.pdf), Outlook Message file MSG (*.msg), Microsoft XPS (*.xps) or as single file MHTML (*.mht). 2. Inserting chosen KB article as inline content to the email reply You can also embed the selected KB article directly into the body of the email reply. Any inline images and formatting are preserved in its original state in the reply also. 3. Inserting chosen KB article as hyperlink URL into the email reply Alternatively, if your SharePoint site is opened (i.e., accessible via the web), then you can also insert the hyperlink or URL of the selected KB article into the reply, so that the recipient can simply click the hyperlink to open the relevant article in their web browser.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100531.77/warc/CC-MAIN-20231204151108-20231204181108-00356.warc.gz
CC-MAIN-2023-50
9,213
62
https://www.best-it-tutors.co.uk/c-plus-plus-programming-for-beginners-course/
code
C++ is one of the powerful object-oriented programming languages in the world. Its is widely used since it was introduced and used to code basic applications to high-end applications. C++ Programming course for beginners covers the basics of programming using C++, programming constructs, methods, features of C++ language, data types, program structures, functions, object-oriented programming with C++, memory management in C++ and others. Target Audience – Learners who are familiar with the basics concepts of programming and interested in learning C++ programming. Prerequisite – Basic understanding of computing and programming is preferred. Learners are required to bring their own laptops with them when they come for the course. Duration – 24 hours Course Fee – £750 More Information – This course can be organised as groups or individual. Expert trainers are available to train your employees at your workplace or online using virtual platforms on request. C++ Introduction to programming with C++ C++ Understanding the building blocks of C++ C++ IDEs and Tools for C++ C++ Use of variables and constants C++ Primitive data types C++ User defined data types C++ Flow of Control C++ Use of arrays C++ Understanding references and pointers C++ Functions and function overloading C++ Introduction to Object Oriented Programming with C++ C++ Memory management in C++ Completion of the course will give learners the confidence to start programming with C++ and be knowledgeable with the concepts and features of C++ programming.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545326.51/warc/CC-MAIN-20220522094818-20220522124818-00414.warc.gz
CC-MAIN-2022-21
1,544
19
http://www-01.ibm.com/software/analytics/many-eyes/conversations.html
code
Check out these papers, videos, blogs and more from IBM’s visualization luminaries. When companies can analyze big data, they benefit. Visualization can play a vital role in making sense of your big data. This paper by T. Alan Keahey, Ph.D., IBM Visualization, Science and Systems Expert shows you how. Knowing how to use visual properties effectively has a powerful effect on the accessibility and utility of your visualization. The indispensability of visualization (YouTube, 00:10:23) IBM visualizations luminaries Graham Wills and Frank Van Ham sat down at the 2012 IBM Information On Demand conference to discuss the indispensability of visualization. The goal of visualization is to make the complex intuitive and as simple as possible. IBM visualization luminary Graham Wills provides suggestions for how to do this. No need to call in the mathematicians. IBM visualization luminary Graham Wills is merely explaining how visualization design and how different visual features work together. The most common framework for embedding visualizations is a rectangle in the overall display, with other controls and information arrayed outside of the rectangle. Learn why Alan Keahey calls this Visualization in a Box and how you can get more of the interaction inside the box, thereby manipulating the information directly rather than through external controls. After you have determined the purpose (the why of a visualization), you can start thinking about what you want to visualize. The task is to include the relevant data (that which you know is useful) and to leave the rest out. Noah Iliinsky, IBM Visualization Luminary, offers tips for figuring all this out. What makes a successful visualization? IBM visualization luminary, Noah Iliinsky, explains the four pillars of visualization and why they matter. Because information visualizations are subjective carriers of a particular message, you can apply communication theory to your design. IBM visualization luminary Frank van Ham explains how. The hardest challenge in dealing with 'big data” is finding ways to refine it into useful information. IBM visualization luminary Frank van Ham shares his ideas for how it can be done. IBM visualization luminary Frank van Ham reflects on how Many Eyes came to be and some of the paths the original research team followed. How do you visualize many variables all in the same format? IBM visualization luminary Graham Wills breaks down a visualization to show you how. What makes a good visualization? Is it the quality of the presentation or something more? IBM visualization luminary Graham Wills answers these questions and others. OLAP “locks” us into a data model. But, data doesn’t always have one definite model. IBM visualization luminary Frank van Ham writes about resolving this incompatibility. A shift from being data-centric to being question-centric is needed in this era of big data. Eser Kandogan of IBM Research tackles the idea of “Big Questions” and how to answer them. IBM visualization luminary Dr. T. Alan Keahey compares visualizations to another well-known technology that has evolved significantly over the last 100 years: the automobile.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065306.42/warc/CC-MAIN-20150827025425-00288-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
3,181
18
https://forums.veeam.com/veeam-backup-replication-f2/network-loss-tolerance-t39578.html
code
Is there any way to set network loss tolerance? For example, if I have an error like "The system cannot find the file specified. Failed to write data to the file" during backup, and I know that is due to network loss, how is tolerance in this case? Veeam will retry for n seconds before giving the error? Tests n ping packet or other connection to repo? Any way to set this value?
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257646602.39/warc/CC-MAIN-20180319062143-20180319082143-00698.warc.gz
CC-MAIN-2018-13
380
3
https://www.experts-exchange.com/questions/21103075/Windows-2000-Pro-in-peer-to-peer-network-will-only-communicate-with-two-windows-98-computers-with-specific-IP-addresses.html
code
Windows 2000 Pro in peer-to-peer network will only communicate with two windows 98 computers with specific IP addresses. I have a peer-to-peer network with Windows 2000 pro and two windows 98SE computers using static IP addresses. When I add a third win98 to the network, it can see the other two Win98 computers but not the W2K. If I change the IP address to the one used by one of the two existing computers it can connect just fine. These two machines use the address 192.168.1.11 and 192.168.1.13. I have tried several addresses including 192.168.1.12 and 10 and 14 and others. Pinging the W2K from a computer with any address but one of these two gets a "Request Timed out" reply. I can only guess that there must be something in a policy or something. Other people have "mucked" around in the system and I understand last year they had trouble with a virus. I don't see anything virus related now and Norton does not report any. Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948529738.38/warc/CC-MAIN-20171213162804-20171213182804-00702.warc.gz
CC-MAIN-2017-51
1,160
4
https://wordpress.org/plugins/no-disposable-email/
code
This plugin prevent people from registering with a disposable email addresses like the ones provided by mailinator. It protects your most important asset, your registered user base, by preventing contamination by fake accounts. This plugin working principle is similar to spam blacklists. - Unpack the *.zip file and extract the /no-disposable-email/ folder and the files. - Using an FTP program, upload the full /no-disposable-email/ folder to your WordPress plugins directory (Example: /wp-content/plugins). - Go to Plugins > Installed and activate the plugin. - How can I support this plugin? If you enjoy this plugin and would like to help with the development, please consider donating. Otherwise, spread the word, report bugs and give this plugin a good rating. - How do I report a bug? If you find any bugs with the plugin or if you have any suggestions, please go to the No Disposable Email plugin homepage and leave a comment to let me know. Perfect and yes, still working in 4.4! Be great if it also works on theme (premiumpress.com) signup page as well I only want signups with emails that relate only to domain submission listing Send you a donation if I can get it to also apply to registration form. Save me lots of work! Really disappointed because they do not work on my system may be incompatible with BuddyPress .. damage, damage Contributors & Developers “No Disposable Email” is open source software. The following people have contributed to this plugin.Contributors Interested in development? - Compatibility check with WordPress 3.8.1 - Updated database - New filtering method (requires WordPress 2.9) - Compatibility check with WordPress 3.3.1 - Added activity log - Further compatibility improvements with some versions of php - Improved compatibility with some versions of php - Compatibility check with WordPress 2.8.2 - Compatibility check with WordPress 2.8.1 - Blacklist update - Compatibility check with WordPress 2.8 - Minor localization work - Added a setting page that allow easy customization of the error message and the blacklist - The plugin now use the SQL database - Blacklist update - Files are now UTF-8, no BOM - Initial release
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118477.15/warc/CC-MAIN-20170423031158-00402-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,174
34
https://www.experts-exchange.com/questions/23507824/Why-do-some-of-my-Virtual-Machines-lose-their-network-connection-when-they-are-power-cycled.html
code
I have a VMware ESX Server (3.0.2) single host environment and am having some issues with my VM network connectivity. I have a few real (as in, not Virtual) NIC bonded networks set up and for some strange reason, when I power cycle some of my VMs, they lose their network connectivity. This is indicated in VirtualCenter by showing an IP address of 0.0.0.0. If I go into the configuration for the VM, it shows the "Connected" box for the NIC as unchecked. The fix for this is to check the "Connected" box, switch the network the VM is on to another one temporarily, apply the configuration, and then switch it back to its proper network. The connection to the VM then returns. I have seen this behavior since installing 3.0.2 and never saw this in 2.5.4. Any idea what's happening here?
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865995.86/warc/CC-MAIN-20180624005242-20180624025242-00139.warc.gz
CC-MAIN-2018-26
786
3
https://support.controlshiftlabs.com/hc/en-us/articles/216967738-Partner-Events-and-Calendars
code
In addition to campaigns, partner admins are also able to create calendars and events. We hope that allowing partner organizations to hold offline events will lead to more robust campaigns and more rewarding partnerships. As an organization administrator, you'll be able to create partner events and calendars from the partnership's admin page. If you create an event from the normal events page, you can move it into the partnership by clicking the Events button and then clicking to Move Event Into Partnership. Once an event is associated with a partnership – either through initial creation or after being moved into the partnership – we'll include the partner's name and logo on the event page. Additionally, we'll use the partnership's signature sharing rules to determine which RSVPs will be added to the partner's mailing list. When an event is added to a partnership after creation, we'll email the partner administrators to inform them that an event has been added to their partnership. They'll be able to view all of their partnership's events and calendars from the partner's Manage page. To add a new event or calendar to their partnership, they'll just need to click the New Event or New Calendar button. From the partner's manage page, partner admins can view event responders by clicking to export their list. This export now includes both petition signatures and event RSVPs. Partner admins will be able to see which event the RSVP is from by looking in the event_slug column. If you have any questions or feedback, please send us an email.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038083007.51/warc/CC-MAIN-20210415035637-20210415065637-00567.warc.gz
CC-MAIN-2021-17
1,561
9