url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.robg3d.com/2014/06/hiring-your-cake-and-eating-it-too/
code
When evaluating candidates, I have always been a believer that cultural fit and potential to improve is more important than technical ability. Of course I like to review real code samples and give a programming test, but I rarely ask for whiteboard programming. I am not a master of algorithms or math and don’t have a CS background, so I don’t require that of most candidates*. As Five Thirty Eight explains and shows, people just want to date themselves. This policy is amazingly ego-centric. But it’s also worked pretty well. Without exception, I’m proud of the hires I’ve had a primary stake in. But it is the best policy, at least for the type of work I’m doing? I think I am a pretty darn good hire. Why would I want to exclude people like me? Well, the fact is that I’m not special. There are way more gifted people around than me. There are plenty of people who are a great fit, and are great leaders, managers, developers, and coaches, and are awesome at math and algorithms. Should I overlook myself to try and get someone better? Clearly companies like Google can do this. There are anecdotes about people who they hired the second or third time around. People like Steve Yegge. On the other hand, there are plenty of managers that hire “to fill a seat.” Can every company interview like Google, and reject otherwise promising candidates that do not ace a challenging technical interview? Who you choose to hire does not define what your company is, it defines what your company will become. If you give in and make unenthusiastic hires, your amazing company will be dragged into mediocrity. If you hold the line and hire only the best, you’ll continue to excel, if you can find people. In reality, most companies are somewhere in the middle. The “best” policy is the one that fits your situation. In an isolated job market, you may choose to value fit and culture. A tight-knit culture may help retention, and make it easier for the inevitable low performers to improve. At a startup, you may have limited headcount, short timelines, and immediate technical needs. Cultural fit would be trumped by technical expertise and experience. On the other hand, cultural fit may be most important at an established company. The biggest risk is a dilution of the culture, and there are plenty of senior people around to do mentoring. Recognizing what you should select for is much more important than simply always trying to be as selective as possible. * Obviously there are exceptions. If you need expertise, you need expertise. My thoughts apply to the 80% case.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647706.69/warc/CC-MAIN-20180321215410-20180321235410-00138.warc.gz
CC-MAIN-2018-13
2,591
8
https://www.sparkfun.com/users/237109
code
SparkFun will be closed Nov 26th and 27th for the Thanksgiving holiday. Orders placed after 2:00pm MT on the 25th will ship out Monday the 30th. Member Since: July 8, 2011 Country: United States c, processing, java, python, matlab Norwegian university of science and technology No public wish lists :(
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447860.26/warc/CC-MAIN-20151124205407-00002-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
301
6
https://simbi.com/kelly-vansyckle/math-tutor
code
I have a math degree, and have taken all the way through Analysis with Proof and Differential Equations (calculus 4). Most of the time calculus 3 is called multivariable calculus, which I have also taken. I'm not too familiar with the "new math", but my mom is a public school principal and I'm working on understanding her curriculum, so I'm getting there. I teach for understanding, not memorization. If you have a test tomorrow, my technique won't work. Training & Qualifications I have a bachelor's degree in math, with a concentration in actuarial science (probability). Availability & Preferences Nights and weekends.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946807.67/warc/CC-MAIN-20180424154911-20180424174911-00146.warc.gz
CC-MAIN-2018-17
623
6
https://ej2.syncfusion.com/aspnetmvc/Chart/PolarRadarStackedArea
code
This sample demonstrates polar series with stacking area type for GDP of different countries in recent years. The switching between polar and radar series can be done by using Series Type in property panel. In this example, you can see how to render and configure the stacking area type charts. Stacks the series on top of another series to avoid the overlapping of series with one another, when rendering more than one area series in same chart. You can use fill property to customize the stacked area. dataLabel is used to represent individual data and its value. More information on the polar series can be found in this documentation section.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710918.58/warc/CC-MAIN-20221203011523-20221203041523-00171.warc.gz
CC-MAIN-2022-49
646
9
http://math.soimeme.org/~arunram/Resources/LOCGS11SomeTwistedGroups.html
code
Last update: 13 July 2013 In this section we study the group of fixed points of a Chevalley group under an automorphism We consider only the simplest case, in which fixes hence acts on and permutes the Before launching into the general theory, we consider some examples: (a) If is a nontrivial graph automorphism, it has the form (where is the transpose of and We see that fixes if and only if If is skew, we get If is symmetric, we get (split form). The group in characteristic 2 does not arise here, but it can be recovered as a subgroup of namely the one "supported" by the long roots. Let be an involutory automorphism of having as fixed field. If is now modified so that then (split form). This last result holds even if is a division ring provided is an anti-automorphism. If is the vector space over generated by the roots and is the Weyl group, then acts on and and has fixed point subspaces and is a reflection group on with the corresponding "roots" being the projection on of the original roots. To see these facts, we write or and use the indices with the index omitted in case If is the weight on defined by then the roots are and is thus spanned by Now if and only if commutes with i.e., if and only if implies We see that is the octahedral group acting on by all permutations and sign changes of the basis The projection of on is or If either or the projection of is The projected system is of type if or (a combination of and if (b) (split form, char We take the group defined by the form We will take the graph automorphism to be The corresponding form fixed by elements of is Thus, fixes and hence the hyperplane on this hyperplane is the group If we now combine with as in (a), the form is replaced by If we make the change of coordinates replaced by replaced by we see that is replaced by and is replaced by where and Since these two forms have the same matrix, is over re the new version of That is, is for a form of index which has index over Example: If and is the Lorentz group (re If we observe that corresponds to we see that and the of the Lorentz group are isomorphic over their centers. Thus, is the universal covering group of the connected Lorentz group. Exercise: Work out in the same way. For other examples see E. Cartan, Oeuvres Complètes, No. 38, especially at the end. Aside from the specific facts worked out in the above examples we should note the following. In the single root length case, the fixed point set of a graph automorphism yields no new group, only an imbedding of one Chevalley group in another (e.g. or in To get a new group (e.g. we must use a field automorphism as well. Now to start our general development we will consider first the effect of twisting abstract reflection groups and root systems. Let be a finite dimensional real Euclidean vector space and let be a finite set of nonzero elements of satisfying |(2)||for all where is the reflection in the hyperplane orthogonal to| Theorem 32: Let etc. be as above. |(a)||The restriction of to is faithful.| |(b)||is a reflection group.| |(c)||If denotes the projection of on then is the corresponding "root system"; i.e., generates and However, (1) may fail for| |(d)||If is the projection of on then is the corresponding "simple system"; i.e. if multiples are cast out (in case (1) fails for then is linearly independent and the positive elements of are positive linear combinations of elements of| Denote the projection of on by This commutes with and with all elements of (1) If then indeed implies If is positive, so are all vectors in the of Thus, their average is also positive. If then (2) Proof of (a). If then for some root Thus, and So (3) Let be a of simple roots, let be the group generated by all let be the corresponding set of positive roots, and let be the unique element of so that Then and for any root To see this, first consider Since then by uniqueness, and Since permutes the elements of in a single orbit, the projections on of the elements of are all positive multiples of each other. It follows that if is any element of then If with then for Hence Thus (4) If is a of roots and then all elements of have the same sign. This follows from for (5) a of simple generates Let with and let be a simple root such that Let be the containing By (4), (i.e., for all Now and permutes the elements of Hence, (see Appendix 11.17). Using induction on we may thus show that is a product of (6) If is the element of such that then This follows from and the uniqueness of (7) a of simple is a partition of If the are called parts, then belong to the same part if and only if for some To prove (7), we consider Now and where each for some of simple roots (by (5) and (6)). Choose so that and If then i.e., is in some part. Similarly, if is in some part. Now assume belong to the same part, say to We may assume Then and are positive multiples of each other, as has been noted in (3). Conversely, assume 8) consists of all such that and is a root whose support lies in a simple Now has its support in and hence so does since maps simple roots not in to positive multiples of simple roots not in We see then that and that any part containing also contains The parts are just the sets of such that and hence form a partition. (8) has support in a of simple (9) Parts (b) and (c) follow from (3), (5), and (8). (10) Proof of (d). We select one root from each and form This set, consisting of elements whose supports in are disjoint, is independent since is. If then it is a positive linear combination of the elements of Hence is a positive linear combination of the elements of Remark: To achieve condition (1) for a root system, we can stick to the set of shortest projections in the various directions. |(a)||For of order 2, of type we get of type For of type we get of type| |(b)||For of order 2, of type we get of type| |(c)||For of order 3, of type we get of type To see this let be the simple roots with connected with and Then and giving of type Schematically:| |(d)||For of order 2, of type we get of type| |(e)||For or order 2, of type we get of type| |(f)||For or order 2, of type we get of type| |(g)||For or order 2, of type we get of type (the dihedral group of order 16). To see this let be the Dynkin diagram of and Since we have This corresponds to an angle of between and Hence is of type Alternatively, we note that makes six positive roots negative and that there are 24 positive roots in all, so that Hence, and is of type Note that this is the only case of those we have considered in which fails to be crystallographic (See Appendix V).| In (e), (f), (g) we are assuming that multiples have been cast out. The partition of in (7) above can be used to define an equivalence relation on by if and only if is a positive multiple of where is the projection of on Letting denote the collection of equivalence classes we have the following: Corollary: If is crystallographic and indecomposable, then an element of is the positive system of roots of a system of one of the following types: |(b)||(this occurs only if is of type| |(c)||(this occurs if is of type or| Now let be a Chevalley group over a field of characteristic Let be an automorphism of which is the product of a graph automorphism and a field automorphism of and such that if is the corresponding permutation of the roots then |(1)||if preserves lengths, then order order| |(2)||if doesn't preserve lengths, then (where is the map| and if is simple. (See the proof of Theorem 29.) Now preserves and and hence The action thus induced on is concordant with the permutation of the roots. Since preserves angles, it agrees up to positive multiples with an isometry on the real space generated by the roots. Thus the results of Theorem 32 may be applied. Also we observe that if is the order of then or so that the length of each is or Lemma 60: over each of length Since acts on each simple) as a field automorphism, it does so on all of whence the lemma. Lemma 61: If then Choose so that no can be added to it to yield another root. If the orbit of has length 1, set if with and if Then If the length is we set then over the orbit, and use Lemma 60. Theorem 33: Let etc. be as above. |(a)||For each the group is fixed by| |(b)||For each there exists indeed so that| |(c)||If is as in (b), then with uniqueness of expression on the right.| (a) This is clear since and are fixed by (b) We may assume that for some of simple By Lemma 61, choose where corresponds to Using Theorem 4' we may write for some where and Now and by Theorem 4 and the uniqueness in Theorem 4', we have and Thus, Since and we have for some and (c) Let say Since we have Choose as in (b) and write with and Applying we get and Uniqueness follows from Theorem 4'. Corollary: The conclusions of Theorem 33 are still valid if and are replaced by and Also since we can replace by Lemma 62: Let generically denote a class in Let be a union of classes in which is closed under addition and such that if then Then with the product taken in any fixed order and there is uniqueness of expression on the right. In particular, and for all We arrange the positive roots in a manner consistent with the order of the i.e., those roots in the first are first, etc. Now in the order just described and with uniqueness of expression on the right by Lemma 17. Hence in the given order and again with uniqueness of expression on the right. The lemma follows by considering the fixed points of on both sides of the last equation. Corollary: If are classes in with then where the roots on the right are in the closed subsystem generated by and those of and excluded. The condition on can be stated alternately, in terms of that is in the interior of the (plane) convex cone generated by and Remark: The exact relations in the above corollary can be quite complicated but generally resemble those in the Chevalley group whose Weyl group is For example, if is of type and is of order 2, say and if we set and similarly for and we get In the corresponding relation is If is of type and is of order we say is of type E.g., the group considered in the above remark is of type The group of type is called the Suzuki group and the groups of type and are called Ree groups. We write and Lemma 63: Let be a class in then has the following structure: |(c)||If then and| |(d)||If then and If denotes the given element,| |(e)||If then and If denotes the given element then| Note that in (a) and (b), is a one parameter group for the fields and respectively. (a) and (b) are easy and we omit their proofs. For (c), normalize the parametrization of so that Then and Write as and compare the coefficients on both sides of to get (c). The proof of (d) is similar to that of (c). For (e), first normalize the signs as in Theorem 28, and then complete the proof as in (c) and (d). Exercise: Complete the details of the above proof. Remark: The role of the group in the untwisted case is taken by the groups (split form), the Suzuki group, and Ree group of type Exercise: Determine the structure of in the case is universal. Lemma 64: If is universal, then is generated by and except perhaps for the case with infinite. Let and let By the corollary to Theorem 33, it suffices to show i.e., Since is universal, is a direct product of (see the corollary to Lemma 28). These groups are permuted by exactly as the roots are. Hence it is enough to prove when there is a single orbit; i.e., when is one of the types or For this is clear. (1) For write with and Then is generated by a fixed choice of To see this let be the group so generated. Consider This set is closed under multiplication by It is also closed under right multiplication by This follows from and since for We see that whence (2) If and are the simple roots of or labeled as in Lemma 63 (c), (d), or (e) respectively, then is isomorphic to via the map (3) Let be the weight such that let be a representation of (obtained from one of by shifting the coefficients to having as highest weight and let be a corresponding weight vector. Let be the lowest weight of and let be a corresponding weight vector. For write terms for lower weights. Then and is isomorphic under in (2) to the subgroup of generated by all To prove (3), let and write as in (1). We see terms for lower weights, so and If then by the choice of (see Lemma 19 (c)). (3) then follows from (1). (4) The case Here and To see this, we note that the representation of (3) in this case is and if then Thus, by Lemma 63 (c). Thus, is the group generated by ratios of elements of whose traces are norms Let If set and if choose so that Then and are values of (their traces are 0 or 1), so that and (5) The case Here and To see this, first note that since the characteristic of is 2, there is an ideal in "supported" by short roots. The representation can be taken as acting on this ideal, and while Letting we can determine By taking in the expression for and writing we see that (6) The case Here The group is generated by all values of for which and it contains and hence if is finite. Here the representation can be taken to be the adjoint representation on and Letting be as in Lemma 63 (e), and working modulo the ideal in "supported" by the short roots, we can compute Setting we see that hence and If is finite follows from To show suppose with Then so and Since we see But so a contradiction. This proves the lemma. Corollary: If is universal, then and except possibly for with infinite in which case with as in (6) above. |(a)||It is not known whether always if One can make the changes in variables and then to convert the form in (6) to Both before and after this simplification the form satisfies the condition of homogenity:| |(b)||A corollary of (3) above, is that the forms in (5) and (6) are definite, i.e., implies A direct proof in case is as in (5) can be made as follows: Suppose with one of nonzero. If then so we have We see using Hence we may assume Thus, or (by applying Hence and Thus, or a contradiction. A direct proof in case is as (6) appears to be quite complicated.| The form in (5) leads to a geometric interpretation of Form the graph in of the form Imbed projective 3-space over by adding the plane at and adjoin the point at in the direction to the graph to obtain a subset of is then an ovoid in i.e. Theorem 34: Let and be as above with universal. Excluding the cases: (a) (b) (c) (d) we have that is simple over its center. |Sketch of proof.| Using a calculus of double cosets re which can be developed exactly as for the Chevalley groups with in place of and (or (see Theorem 32)) in place of and Theorem 33, the proof can be reduced exactly as for the Chevalley groups to the proof of: If has "enough" elements, so does by the Corollary to Lemma 64 and the action of on can be used to show This takes care of nearly everything. If has "few" elements then the commutator relations within the and among them can be used. This leads to a number of special calculations. The details are omitted. Remark: The groups in (a) and (b) above are solvable. The group in (c) contains a normal subgroup of index 3 isomorphic to The group in (d) contains a "new" simple normal subgroup of index 2. (See J. Tits, "Algebraic and abstract simple groups," Annals of Math. 1964.) Exercise: Center of We now are going to determine the orders of the finite Chevalley groups of twisted type. Let be a finite field of characteristic Let a be minimal such that (i.e., such that for all Then for for and for We can write where is some power of less than If is the geometric average of over each then except when is of type or in which case Let be the real Euclidean space generated by the roots and let be the automorphism of permuting the rays through the roots as permutes the roots. Since normalizes we see that acts on the space of polynomials invariant under Since also acts on the subspace of of homogeneous elements of a given positive degree, we may choose the basic invariants of Theorem 27 such that for some (here we have extended the base field to As before, we let be the degree of and these are uniquely determined. Since acts on we also have the set of eigenvalues of on We recall also that denotes the number of positive roots in Theorem 35: Let and be as above, and assume is universal. We have |(b)||The order of the corresponding simple group is obtained by dividing by where is the center of| Lemma 65: Let etc. be as above. (a) It suffices to show that by Lemma 62. This is so by Lemma 63. (b) Let be a of simple roots. Since the contribution to made by elements of "supported" by is if Since the corresponding to are the roots of the polynomial (b) follows. (c) This follows from (a), (b), and Theorem 33. Corollary: is a subgroup. Lemma 66: We have the following formal identity in We modify the proof of Theorem 26 as follows: With these modifications the proof proceeds exactly as before through step (5). Steps (6)-(8) become: Lemma 67: The form a permutation of the Set in Lemma 66. Then 1 has the same multiplicity among the as among the This is so since otherwise the right side of the expression would have either a root or a pole at Assume then either and all not are or else and all not 1 are cube roots of 1, coming in conjugate complex pairs since is real. Thus in all cases implies the lemma. |Proof of Theorem 35.| (a) follows from Lemmas 65, 66, 67. Now let be the center Clearly Using the corollary to Theorem 33 and an argument similar to that in the proof of Corollary 1(b) to Theorem 4', we see Since acts "diagonally," we have hence proving (b). Corollary: The values of and are as follows: Here denotes a primitive cube root of |Proof (except for| We consider the cases: We first note To prove we use the standard coordinates for Then is given by Since acts via all permutations of we see Alternatively, since is transitive on the simple systems (Appendix II.24), there exists such that Hence, or i.e., or Since there are invariants of odd degree By fixes the invariants of even degree and changes the signs of those of odd degree. The second argument to establish in the case may be used here, and the same conclusion holds. even or odd). Relative to the standard coordinates the basic invariants are the first elementary symmetric polynomials in together with and acts via all permutations and even number of sign changes. Here can be taken to be the map Hence, only the last invariant changes sign under The degrees of the invariants are 2, 4, 6, and 4. By Lemma 67, the are 1, 1, Since is real, and must occur in the same dimension. Thus, we replace in the usual formula by In both cases the are 1, by Lemma 67. Since is a finite group, it fixes some nonzero quadratic form, so that for The degrees of the invariants are 2, 6, 8, 12 and the are 1, 1, As before there is a quadratic invariant fixed by Consider We claim that is an invariant of degree 8 fixed by and there is a quadratic invariant fixed by which does not divide The first part is clear since and preserve lengths and permute the rays through the roots. To see the second part, choose coordinates so that the long roots (respectively, the short roots) are the vectors obtained from (respectively, by all permutations and sign changes. The quadratic invariant is To show that this does not divide consider the sum of those terms in which involve only and and note that this is not divisible by Hence, I can be taken as one of the basic invariants, and if Remark: is not divisible by 3. Aside from cyclic groups of prime order, these are the only known finite simple groups with this property. Now we consider the automorphisms of the twisted groups. As for the untwisted groups diagonal automorphisms and field automorphisms can be defined. Theorem 36: Let and be as in this section and the subgroup of (or generated by and Assume that is not the identity. Then every automorphism of is a product of an inner, a diagonal, and a field automorphism. Remark: Observe that graph automorphisms are missing. Thus the twisted groups cannot themselves be twisted, at least not in the simple way we have been considering. |Sketch of proof.| As in step (1) of the proof of Theorem 30, the automorphism, call it may be normalized by an inner automorphism so that it fixes and (in the finite case by Sylow's theorem, in the infinite case by arguments from the theory of algebraic groups). Then it also fixes and it permutes the (a simple, henceforth we write for and also the according to the same permutation, in an angle preserving manner (see step (2)) in terms of the corresponding simple system of By checking cases one sees that the permutation is necessarily the identity: if is finite, one need only compare the various with each other, while if is arbitrary further argument is necessary (one can, for example, check which are Abelian and which are not, thus ruling out all possibilities except for and and then rule out these cases (the first two together) by considering the commutator relations among the As in step (4) of the proof of Theorem 30, we need only complete the proof of our theorem when is one of the groups in other words, when is of one of the types or (with and excluded, but not or which we henceforth assume. The case having been treated in §10, we will treat only the other cases, in a sequence of steps. We write or for the general element of as given in Lemma 63 and for (1) We have the equations This follows from the definitions and Lemma 20(c). (2) Let be the subgroups of obtained by setting then also Then is the lower central series for if the type is or while is if the type is Exercise: Prove this. (3) If the case is excluded, then with a homomorphism whose image generates additively. (4) The automorphism (of can be normalized by a diagonal and a field automorphism to be the identity on Our object now is to show that once the normalization in (4) has been attained is necessarily the identity. (5) fixes each element of and and also some which represents the nontrivial element of the Weyl group. (6) If the type is or then is the identity. The preceding argument, slightly modified, barely fails for in fact fails just for the smallest case The proof to follow, however, works in all cases. (7) If the type is then is the identity. It is also possible to determine the isomorphisms among the various Chevalley groups, both twisted and untwisted. We state the results for the finite groups, omitting the proofs. Theorem 37: (a) Among the finite simple Chevalley groups, their twisted analogues, and the alternating groups a complete list of isomorphisms is given as follows. |(1)||Those independent of| |(2)||if is even.| |(3)||Just six other cases, of the indicated orders.| (b) In addition there are the following cases in which the Chevalley group just fails to be simple. The indices in the original group are 2, 3, 2, 2, respectively. |(a)||The existence of the isomorphisms in (1) and (2) is easy, and in (3) is proved, e.g., in Dieudonné (Can. J. Math. 1949). There also the first case of (b), considered in the form (symmetric group) is proved.| |(b)||It is natural to include the simple groups in the above comparison since they are the derived groups of the Weyl groups of type and the Weyl groups in a sense form the skeletons of the corresponding Chevalley groups. We would like to point out that the Weyl groups are also almost simple and are related to earlier groups as follows.| Proposition: We have the isomorphisms: The proof is similar to the proof of given near the beginning of §10. Aside from the cyclic groups of prime order and the groups considered above, only 11 or 12 other finite simple groups are at present (May, 1968) known. We will discuss them briefly. (a) The five Mathieu groups These were discovered by Mathieu about a hundred years ago and put on a firm footing by Witt (Hamburger Abh. 12 (1938)). They arise as highly transitive permutation groups on the indicated numbers of letters. Their orders are: (b) The first Janko group discovered by Janko (J. Algebra 3 (1966)) about five years ago. It is a subgroup of and can be represented as a permutation group on 266 letters. Its order is The remaining groups were all uncovered last fall, more or less. (c) The groups and of Janko. The existence of was put on a firm basis first by Hall and Wales using a machine, and then by Tits in terms of a "geometry." It has a subgroup of index 100 isomorphic to and is itself of index 416 in The group has not yet been put on a firm basis, and it appears that it will take a great deal of work to do so (because it does not seem to have any "large" subgroups), but the evidence for its existence is overwhelming. The orders are: (d) The group of D. Higman and Sims, and the group of G. Higman. The first group contains as a subgroup of index 100 and was constructed in terms of the automorphism group of a graph with 100 vertices whose existence depends on properties of Steiner systems. Inspired by this construction, G. Higman then constructed his own group in terms of a very special geometry invented for the occasion. The two groups have the same order, and everyone seems to feel that they are isomorphic, but no one has yet proved this. The order is: (e) The (latest) group of Suzuki. This contains as a subgroup of index 1782, and is contructed in terms of a graph whose existence depends on the imbedding It possesses an involutory automorphism whose set of fixed points is exactly Its order is: (f) The group of McLaughlin. This group is constructed in terms of a graph and contains as a subgroup of index 275. Its order is: Theorem 38: Among all the finite simple groups above (i.e., all that are currently known), the only coincidences in the orders which do not come from isomorphisms are: |(a)||and for and odd.| |(c)||and if they aren't isomorphic.| That the groups in (a) have the same order and are not isomorphic has been proved earlier. The orders in (b) are both equal to 20160 by Theorem 25, and the groups are not isomorphic since relative to the normalizer of a subgroup the first group has six double cosets and the second has 24. The proof that (a), (b) and (c) represent the only possibilities depends on an exhaustive analysis of the group orders which can not be undertaken here. This is a typed excerpt of Lectures on Chevalley groups by Robert Steinberg, Yale University, 1967. Notes prepared by John Faulkner and Robert Wilson. This work was partially supported by Contract ARO-D-336-8230-31-43033.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944606.5/warc/CC-MAIN-20230323003026-20230323033026-00749.warc.gz
CC-MAIN-2023-14
26,463
165
http://meta.stackoverflow.com/questions/tagged/magic-links
code
Meta Stack Overflow Stack Overflow Careers to customize your list. more stack exchange communities Back to Stack Overflow Return to the main site Start here for a quick overview of the site Detailed answers to any questions you might have How Meta is different from the main site tag has no wiki summary. Can we have [mcve] expand to http://stackoverflow.com/help/mcve in comments, please Working through the review queue, I am finding it very common to need to refer new users who's questions are being close-voted to the Minimal Complete Verifiable Example doco. It would be a boon to ... May 18 at 8:43 newest magic-links questions feed Hot Network Questions Terminal 'incognito mode'? Sales Tax Problem, rejected for not being up to their standards How to substantiate the claim that something is not known? They use me... What am I? Formatting a Lisp-like Syntax std::function fails to distinguish overloaded functions What is this "[0 ... 255] =" syntax in C? Term for words like "Hanky-Panky" She Can Move Mountains (Literally) Why specifying a lvalue reference for *this on a member function is different from not specifying anything? Is there a more intuitive proof of the halting problem's undecidability than diagonalization? Could Skynet have avoided the war via nonviolent means? Array and Itemize at the same time What's the English for the Russian saying "Love sometimes plays tricks - you may fall in love with a goat"? I am the odd one A bug in Integrate Is F2 two fluoride ions or just one? Do rainbows have ultraviolet bands and infrared bands? Why are there two spellings of "heteroskedastic" or "heteroscedastic"? Sum in each dimension Story about a civilization which repeatedly rises and falls, because individuals can't stop reproducing Are the books written for blender 2.5 or 2.6 still useful for the latest blender 2.7 version? Overriding list and Java practice Eating alone in London more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2015 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207925274.34/warc/CC-MAIN-20150521113205-00082-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
2,353
57
http://www.rsl.ethz.ch/
code
ANYmal is a quadrupedal robot designed for autonomous operation in challenging environments. From Walking Excavator to Legged Robot Robots are the future of any potential sector Best Master student in D-MAVT, Jan Carius wins the Willi Studer Prize 2017. ICRA 2017 SINGAPORE Please find the available student projects here Programming for Robotics - Introduction to ROS We have a number of open positions. Apply now!
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549427429.9/warc/CC-MAIN-20170727042127-20170727062127-00440.warc.gz
CC-MAIN-2017-30
415
8
https://www.tabloidgadget.com/compare-2-files-or-sheets-of-data-in-excel-how-to
code
A subreddit for all questions related to programming in any language. The solution here is easy, find one thing to mock about every popular text editor, and you will be armed for combat. Notepad++ with a few plugins can be a solid choice, as can VSCode, Visual Studio, IntelliJ , Vim, Emacs… - Earlier, we suggested you use Spotify to listen https://peopleanswer.altervista.org/which-notepad-to-download-a-guide/ to your favorite music. - In this section, we will learn how to save, compile, and run a Java program in Command Prompt using notepad. - Let the OS swap in and out the pieces you need as you access it . Notepad++ supports a ton of different plugins that give added functionality. You can use the help menu to be taken to Notepad++ Plugin Central but unfortunately, only the 32-bit version of NPPExport is available there. Once it’s installed, type in your code, pick the language and all the syntax will be highlighted appropriately. Thousands of organizations use Ninite Pro to patch and secure software including Click the “Convert to TXT” button to start the conversion. Check the Wiki for some real-world examples of projects using EditorConfig files. From the screen above, we are able to encode and decode HTML Entities. Again, re-launched Notepad++ and here are the options under Plugins\HTML Tag. Took to the Net to see if there is a more specific plugin for XML Encode. BTW, “PowerShell Lexer” provides syntax highlighting for Power-Shell. Save the Java program by using the class name followed by .java extension. We must follow the steps given below to run a Java program. I don’t really use those in my code so it’s not been a huge problem. But when I initially tried the only way the comment would change color was if it was all one unbroken line. If the comment was multi-lined then the first line would be colored but the rest wouldn’t. Pro Tip: Remove Notepad++ as Default Text Editor You can plan every aspect of the trip from one place, and you only pay when you travel. Make the most of your travel budget by easily setting travel policies, managing invoices, claiming back VAT, and tracking your spend. How to create ISO files from your software disksCreate and use ISO files from your software CDs and DVDs. When you join us, you’ll get access to over $1,000,000 in software savings – we’ve exclusively negotiated discounts on 240+ tools that are proven to grow your business. In July 2020, Notepad++ released a version codenamed “Stand with Hong Kong” (v7.8.9). In the release notice, the author expressed his concern on the Chinese government implementation of the National Security Law in Hong Kong.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948684.19/warc/CC-MAIN-20230327185741-20230327215741-00413.warc.gz
CC-MAIN-2023-14
2,664
10
https://www.freelancer.com/job-search/state-cities/
code
Hello, We have a landing page that needs the following: Dynamic keyword insertion- page should be able to populate a title/headings with a different city name by adding a modifier to the URL. Background image is missing on the page. I'll supply a new image. You'll just need to size this and insert it. Youtube video is erroring. We need to re-insert the embed code for this. Add call ... django-private-chat version: django_private_chat-0.1.6 Django version: (2, 0, 2, 'f...Python version: 3 Operating System: Ubuntu Description I am getting following error in Chrome console. Failed to execute 'send' on 'WebSocket is already in CLOSING or CLOSED state. I am Using wss and the following repo: [login to view URL] Hi I need some information articles on a certain topic related to different cities in Italy. All the source material can be found online - however it might be easier for a local Italian speaker/native to do the research in Italian language. Articles are to be written in English Orlando State Project Scope: To upgrade the current [login to view URL] site to a new clean B2B/B2C site. I would like this site to mimic that of a college university athletic site (examples provided below). The core business of Orlando State is a SEO social media agency specializing in growth and revenue generation. Additional services of event promotions AGS is an IT company specializing in government contract services. Founded in 2009, AGS LLC has many IT partners in San Diego, Sacramento and LA. We have an immediate need for Software Testers in Sacramento as follows: Tester i: Up to $25 HR. (I need 2 tester at this level) 1 full time, 1 part time. College Degree and no experience or High School and 3 Years experience. Tester II: $35 HR (I ne... Hello, I have a very quick and simple project. I have a document that I need changed. The only thing that I need changed on the document is the name, the date and the state abbreviations. I am not looking to spend a lot of money on this project since it's pretty quick. I would need it ASAP I would like you add to my existing form so that it is possible that when an user logs in, it fills and pre-populates the (long) empty form with that user's information. i would like it to work for all possible user data permutations: for any user information used it should be able to pre-populate the whole form with no missing inputs or unselected buttons. I have attached the form that I wo... Hi, I'm trying to get leads for my property Rent to Rent business. I want to rent houses in London (West London preferably), to rent them myself as Serviced Accommodation. I normally search in sites like Zoopla, Rightmove, or OpenRent. I like this last one as you deal straight to the landlord with no agents in the middle I target 1 or 2 bedroom houses, I need a list of Agents and their pho... Hi, I am SDS SHIFAT from Dhaka Bangladesh. Currently I have a Software company in Dhaka. I need an representative office (Branch office) in The United state. As I am living in Dhaka Bangladesh can I do this from here? and How costly it would be. Please let me know which documents I have to send to you. Oh I am shearing you all about our business which THIS IS AN OPPORTUNITY IF YOU HAVE A WORKING COMPUTER AND A PRINTER PM ME FOR MORE ...outreach and followup continously, over emails and phones. I will give you the list of 200 cities of USA, you need to google "best website design company" or "best website development company" for each of these 200 cities, and put 20 to 30 data of each of these cities, total 5000 companies atleast and in the excel file mention it very clearly that which Project is similar to power barges that do not move. We have a list of cities. It needs to be checked for translation correctness into DK, SE and NL. We will provide the list in Excel, with the English version and additional info (such as city code, etc) to verify whether existing translation is proper. If it’s not – you will have to correct it (insert the proper city etc. name), making sure the spelling ...a washer and dryer. Need to know what process i need to follow to make these changes , if i would need some type of approval from the state. - requirements for having a a facility with un-staffed hours in the state of arizona. ( equipment, numbers of members, age limit) . - Agreement /disclamer to protect myself from liablities - type of Insurance Implement an Airline Reservation Sub-System that allows a customer to search and reserve flight tickets. The customer can search for suitable flights available between the two cities of travel for selected departure and arrival date. On selection, the system displays the list of available flights with details like airline, flight number, price of the ticket ...collecting drugs, school kit and coins through the city that is infested with political zoombies. The game is divided into Cities, States and Federal District. Each module has 25 levels, each level represents a city or state. In the case of the federal district each level represents city districts. At the end of each level he will have to win 3 stars Hello. How are you? I am looking for native English freelancers for my business. I will share details to selected freelancers. Please don't apply if you are not from United State. Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861899.65/warc/CC-MAIN-20180619041206-20180619061206-00357.warc.gz
CC-MAIN-2018-26
5,302
17
http://newsgroups.derkeiler.com/Archive/Alt/alt.html/2008-03/msg01007.html
code
Strange IE issue - From: Leupi <spinsheet@xxxxxxxxx> - Date: Wed, 26 Mar 2008 02:33:24 GMT I have a site that renders fine in Firefox and Opera but I am seeing some very strange things in IE (surprise...). None of my navigation is visible; it's there, if you mouse over where it should be you can click on the hyperlink, you just can't see the hyperlink. This is happening on two different navigation lists. My graphics are not showing up either, if you mouse over them you will see the contents of the alt tag, but the graphic itself is not visible. The page will not center in IE or maintain the width that I set for it. I have put the index.html and the style_1.css pages through the W3C Validator and I am getting this issue with the html page: "Line 10, Column 6: end tag for "HEAD" which is not finished. Most likely, you nested tags and closed them in the wrong order. For example <p><em>...</p> is not acceptable, as <em> must be closed before <p>. Acceptable nesting is: <p><em>...</em></p> Another possibility is that you used an element which requires a child element that you did not include. Hence the parent element is "not finished", not complete. For instance, in HTML the <head> element must contain a <title> child element, lists (ul, ol, dl) require list items (li, or dt, dd), and so on." I can not find anything that I have done wrong with the <head> tag, not sure what I am missing. There is also an ID error, I know what that is, I just need to figure out how to fix it and still get the effect that I want. I did delete that issue temporarily and it did nothing to fix the issue however. My CSS came out clean with the exception of a *html hack that is in there for IE. This is all very strange to me and I have been staring at it without any success. If someone else could check it out I would certainly appreciate it. Thanks for your time,
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123560.51/warc/CC-MAIN-20170423031203-00132-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,865
12
https://www.mindthebyte.com/saas-platform/cabrakan/
code
Lab University of Vic - Central University of Catalonia Cabrakan is a 2D ligand-based virtual profiling application integrated on Mind the Byte's SaaS platform for computational drug discovery. Cabrakan compares molecules through the use of 2D fingerprints and theassignment of biological activity with an internal algorithm. Can be used by a single user or a group You only pay per service or calculation, fully on-demand (no licences) The SaaS platform is supported by the certified infrastructure of Amazon Web Services. We guarantee a safe working environment by encrypting all data transfers, by strictly safeguarding services (you can only share information with other team members that is uploaded to and managed in the SaaS platform) and by conducting system audits with penetration testing. Learn more on page Security
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818689413.52/warc/CC-MAIN-20170923014525-20170923034525-00527.warc.gz
CC-MAIN-2017-39
827
5
http://freecode.com/users/aiken11
code
ACL2 is a mathematical logic, programming language, and mechanical theorem prover based on the applicative subset of Common Lisp. It is an "industrial-strength" version of the NQTHM or Boyer/Moore theorem prover, and has been used for the formal verification of commercial microprocessors, the Java Virtual Machine, interesting algorithms, and so forth. Re: Why such an IMHO offensive name? > do you guys want to popularize on > Franz's success? Or is it a bad pun on I doubt there was any intended connection. Franz's renamed their product from "ExCL" to "Allegro CL" in 1988 (according to their company history page), and the ACL2 project began in 1989 (according to their acknowledgements page). Re: Configuration made simple... Things like your "type" and "unit" and "description" should not be in the config file. The actual config file itself should look something like this: Whereas things like type, unit, descrption, etc. should live in a configuration description file which sets up what valid parameters are and form the basis for UIs. This keeps the config file itself simple, while maintaining all your data.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123530.18/warc/CC-MAIN-20170423031203-00563-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,121
9
https://github.com/elia/avian-missing.tmbundle
code
gem install tmbundle-manager --pre # sudo might be needed tmb install elia/avian-missing tmb update avian-missing This is a collection of missing features from TextMate 2.0 Alpha. This bundle includes: ⌃⌘S Save Project The save project command will now create a .tm_properties in the current file browser folder projectDirectory set and an example windowTitle featuring the current scm-branch and the application.rb ☛master [awesome-app] This command also saves the project in the favorities (accessible with ⎋ Character class indifferent completion TextMate 2 introduced strict …err …clever completion, which will not cross boundaries between character classes anymore. For example in Ruby typing au and hitting ⎋ for autocompletion will not pick @autocomplete since they have a leading @ and the belong to the symbol and instance variable character classes. This bundle reintroduces the TM1 behavior. ⌃⎋ Cross tab completion RubyAMP used to have this. ⌃⌥⌘T Open Project directory in terminal NOTE: requires OSX Lion Opens the current project directory in the terminal (not really present in TM1, but useful anyway). By default will open Terminal, if you prefer anoter terminal app you can set in .tm_properties a variable: TM_TERMINAL_APP = "iTerm.app" ⌃⌥⌘L Keep current file as reference …waiting for split panes Outputs the current source into the bottom html pane, this makes the current file source visible while changing tabs. Seems that most of the need for split panes is to keep one file as a reference, this solves this particular issue. ⌥⌘, Open the global Tired of opening .tm_properties from the terminal or browsing to it by hand? Now you can just hit ⌥⌘, and bring up your alternative preferences (from you the home folder). ⌃⌥⌘, Open the project Now you can just hit ⌃⌥⌘, and bring up your alternative preferences (from the current project). ⌘S Strip trailing whitespace on save TM_STRIP_WHITESPACE_ON_SAVE = true to your Ending newline fix is included. BEWARE: The command strips whitespace before writing to disk but not in the editor window, this is a feature to me but I understand that some users would prefer to have the editor updated. If you're of that kind you'll have to modify the bundle manually ⌘S Add newline at end of file TM_ENSURE_TRAILING_NEWLINE_ON_SAVE = true to your This won't add a second newline if you also have ⌃⌘N New File → ⇧⌘N (builtin) Removed as ⇧⌘N has been introduced as a builtin command. ⌥⏎ Insert new line above This is like o which is ⌘⏎) in - Fork it - Create your feature branch ( git checkout -b my-new-feature) - Commit your changes ( git commit -am 'Added some feature') - Push to the branch ( git push origin my-new-feature) - Create new Pull Request Copyright © 2012 Elia Schito. See MIT-LICENSE for details.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039745281.79/warc/CC-MAIN-20181119043725-20181119065725-00198.warc.gz
CC-MAIN-2018-47
2,848
60
https://www.cruisersforum.com/forums/f10/any-chance-of-a-bavaria-yacht-forum-65252.html
code
I've just noticed that this site has a section for manufacturers' forums . Is there any chance of getting a Bavaria Although one of the commonest boats in Europe , the only Bavaria forum is exclusively paid-for, and this loses a lot of potential members. I like your solution of opting-in for payment, and plan to do so in the near future. I'd be happy to help with any admin, moderating etc. I also know members of other forums that would be very interested.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100427.59/warc/CC-MAIN-20231202140407-20231202170407-00877.warc.gz
CC-MAIN-2023-50
459
8
https://healthunlocked.com/anxietysupport/posts/133692177/fluoroquinolone-toxicity-syndrome
code
A lot of the posts here make me suspect this. It's the culprit for many of these types of symptoms. If' you have taken any fluoroquinolone antibiotics at any point, it may be that it's causing all the strange symptoms. Look at the web site called Floxiehope.com. It is good for that. The FDA has only just now issued a major warning about these antibiotics.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592420.72/warc/CC-MAIN-20180721071046-20180721091046-00390.warc.gz
CC-MAIN-2018-30
357
1
https://community.carbide3d.com/t/downloading-cc-and-cm/49933
code
I have downloaded the files onto a new mini tablet but i can not open them because i dont have anz app that can work with these files. Anybody know what app i need to use Does your tablet meet the system requirements for the programs in question? - Windows 8, 10, or 11 , 64-Bit (Intel or AMD) - 4GB RAM - Screen Display: 1280 x 1024 Note that if the system is in Windows S mode you will need to take it out of that. Apparently not. I have a Samsung Galaxy Tab At Lite. Can you recommend a tablet that will work or do i need a laptop with windows. I was unaware that a tablet wont work. You will need a tablet which runs Windows (unfortunately, there aren’t any available which run Mac OS). I use a Samsung Galaxy Book 12. A currently available model is the Samsung Galaxy Book2 360: This topic was automatically closed after 30 days. New replies are no longer allowed.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655027.51/warc/CC-MAIN-20230608135911-20230608165911-00160.warc.gz
CC-MAIN-2023-23
871
11
http://www.edugeek.net/forums/cloud-services/print-109307-office365-domains.html
code
With O365 is it possible for me to create a main user, for example [email protected] , but then have them automatically get an email [email protected] or do I have to manually go in and give them all aliases? You can add an alias domain, confirm the ownership, then run a few PowerShell commands to add the domain to all users. Oh, great! Thanks. Any decent websites out there with these commands?
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657137056.60/warc/CC-MAIN-20140914011217-00256-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
410
4
http://www.icdevgroup.org/pipermail/interchange-cvs/2001-April/000825.html
code
[interchange-cvs] CVS notice: activity by heins Tue, 10 Apr 2001 21:33 -0500 CVS activity by user 'heins': interchange/dist/foundation/etc report,188.8.131.52,184.108.40.206 receipt.html,220.127.116.11,18.104.22.168 Update of /anon_cvs/repository/interchange/dist/foundation/etc In directory www.akopia.com:/tmp/cvs-serv18603 * Add handling handling to the report and receipt. 8-) * Put mv_credit_card_reference in "Account number" area.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860570.57/warc/CC-MAIN-20180618144750-20180618164750-00616.warc.gz
CC-MAIN-2018-26
437
8
https://www.open-electronics.org/google-android-supports-raspberry-pi-3/
code
- Grand Piano Keys with ArduinoPosted 3 days ago - Wireless Power TransferPosted 4 days ago - Robot Punchers with ArduinoPosted 5 days ago - A minimal 3D-printed scalePosted 7 days ago - Expanding the pins of a microcontrollerPosted 1 week ago - Let’s create a small level with a matrix displayPosted 2 weeks ago - ChatGPT: Writing Code with Artificial IntelligencePosted 2 weeks ago - Free Webinar: Arduino IoT Cloud and ESP32 DemoboardPosted 2 weeks ago - Maker Faire Rome – The European edition and FAE Technology launch the contest “MY Maker PCBA: your electronics for a better planet”Posted 3 months ago - Efficient and Compact Stereo Power Amplifier: Unleash High-Quality Audio with the PAM8610Posted 4 months ago Google Android supports Raspberry Pi 3 The Raspberry Pi 3 is not hurting for operating system choices. The tiny ARM computer is supported by several Linux distributions and even has a version of Windows 10 IoT core available. Now, it looks like the Pi is about to get official support for one of the most popular operating systems out there: Android. In Google’s Android Open Source Project (AOSP) repository, a new device tree recently popped up for the Raspberry Pi 3. For just $35, you get a 1.2GHz 64-bit Broadcom BCM2837 ARMv8 CPU, 1GB of RAM, a VideoCore IV GPU, 802.11n Wi-Fi, and Bluetooth 4.1. From there, it’s up to you to add all the missing components via external devices. For storage, toss in a MicroSD card. For a display, hook up to the full-size HDMI port. For sound, use the 3.5mm audio/composite video jack. For everything else, use the 4 USB ports, Ethernet jack, 40 GPIO pins, CSI camera port, or the DSI display port. With officially supported source code, it should be much easier for hackers to get Android up and running on the Pi 3. Now the repo is still empty, so let’s stay tuned! Source: Ars Technica
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506676.95/warc/CC-MAIN-20230925015430-20230925045430-00736.warc.gz
CC-MAIN-2023-40
1,863
15
http://originsofttech.net/spinrewriter5/things-that-make-you-love-and-hate-spin-wordai-get-my-offer.html
code
QuillBot is a state-of-the-art paraphrasing tool. It is the best article rewriter available, and can completely paraphrase an entire article for free. Simply input a sentence, and hit the "Quill It" button. QuillBot will then rephrase the content while maintaining the original meaning. You can then click on any of the words or phrases to have a drop down thesaurus appear which can then provide further edits in order to optimize your sentence. It is the best article spinner out there. We will even provide statistics to how fluent the sentences are, and how much they have changed. QuillBot can also function as a grammar checker and fluency enhancer. In addition to this, it can provide you with creative suggestions on your sentences. We labeled the software as a "smart thesaurus for sentences" or a full-sentence thesaurus. QuillBot underlying technology uses complete machine learning. This means that when you interact with the website, you are providing data that will be used to improve QuillBot's proficiency. This also means that the version you are using will be the worst version of the model, and that it will constantly improve. Users have been uitilizing QuillBot for a variety of purposes. They use QuillBot as an SEO optimizer tool, in order to improve their writing, or simply get over writers block. The language that QuillBot produces is natural, and will improve overtime as well. Our mission is to achieve human-level paraphrasing. Once we achieve this task, we will aim to produce language in particular linguistic styles or degrees of sophistication. We will even allow users to control the degree of permutation that the paraphrasing tool produces. This will give users complete control over QuillBot and the ability to manipulate language to meet their needs. While our goals our ambitious, we see a clear path forward towards achieving them! He saw a trainer regional and questioned why these creatures made no attempt to escape and merely stood there. “Well coach mentioned, “when they are hardly old and considerably smaller it’s enough to carry them, make use of the size string to link them and, at that era. They are conditioned to trust they cannot breakaway, as they mature. They imagine the rope may still keep them, so they never attempt to break free.” Millions of people who also have the internet at their fingertips are wondering exactly the same thing as you right now: How can I make money online? How can I get search engine exposure for my website (or blog)? What will give me a leg up on the competition? Thankfully you have already arrived at the answer to all these questions. Article Rewriter Tool is available for free to make your online business as successful as possible, with minimal effort on your part. X-Spinner has been tested on Windows XP, Vista, Windows 7, Windows 2003/2008 and Windows 8, Windows 10 and MacBook with Windows VM; it's advisable to have a screen resolution larger than 1024x768px for optimal interface display due to the large amount of functionality. For using X-Spinner on Mac Computer, you need instal a windows virtual machine on your Mac computer. WordAI automatically rewrites entire paragraphs and sentences – this functionality is offered by most content spinners nowadays, but not many are good at it. WordAI tries to understand in the best possible way, not just the words in the sentence, but the entire meaning of the sentence as well as its connection to subsequent sentences in the paragraph. If you already have some blog or website content that you want to turn into fresh, rewritten content in a matter of seconds you should use our article rewriter tool. This free paraphrasing tool is available to you 24/7 to rewrite the text. Most of the text created by our article spinner is human readable and 100% unique which makes it suitable for creating mass blog posts and web content. Does your website need quality content in numbers? The truth is; producing articles restrict the amount of content that is written on your site if you’re the only one writing on your website and can take any author hours. Hiring a writer can get expensive. Have you ever considered using an article spinner? Spinning content is a excellent way to keep your website fresh and relevant . Needless to say, not all article spinner applications is great. Therefore it’s important to do your homework first. We propose Spin Rewriter 9.0. You can rewrite your articles using their Rewrite system. In addition, you have a Bulk Rewrite option that lets your rewrite articles with one click. You break it up into several terrific pieces of content and may take one article. The choices are endless.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583795042.29/warc/CC-MAIN-20190121152218-20190121174218-00225.warc.gz
CC-MAIN-2019-04
4,681
7
https://redthunder.blog/tag/logging/
code
In the world of cloud computing there are often multiple ways to achieve the same or similar result. In Oracle Cloud Infrastructure (OCI) logs are generated by the platform itself such as audit logs, OCI native services such as the Network Firewall Service, and custom logs from compute instances or your applications. These logs typically live in OCI logging where you can view them, or search them if required. Collecting and storing logs is useful, however if you want to produce insights then you will need a way to analyse and visualise the log data. OCI Logging Analytics allows you to index, enrich, aggregate, explore, search, analyse, correlate, visualise and monitor all log data from your applications and system infrastructure. From OCI logging there are two common ways in which logs can be ingested into Logging Analytics. The first is using a Service Connector to send logs to an Object Storage bucket, and an Object Collection Rule to then import the logs into Logging Analytics. The second option uses a Service Connector to send the logs directly to Logging Analytics. Both are valid options however require some consideration before use.Continue reading “Import Logs to Logging Analytics & Preserving Log Sources”
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500158.5/warc/CC-MAIN-20230205000727-20230205030727-00855.warc.gz
CC-MAIN-2023-06
1,236
3
https://translate.wordpress.org/locale/en-nz/default/wp-themes/ecommerce-inn/
code
eCommerce Inn is a clean and feature-rich WooCommerce WordPress theme. WordPress.org Theme Page This project is no longer actively used. Translations remain for archiving purposes. The initial language pack for the theme will be generated when 90% of the project strings have been translated (currently 80%). Manesh Timilsina Latest translation: 5 years ago
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499919.70/warc/CC-MAIN-20230201081311-20230201111311-00822.warc.gz
CC-MAIN-2023-06
357
5
https://qsmm.org/doc/new/qsmm-man.html-node/lookup-Instruction.html
code
The instruction is the mixed type one, which can be generated when disassembling a node of a multinode model that has positive length of the look-ahead signal segment. That length is specified when creating the multinode model and can be retrieved using the function The instruction has syntax The instruction sets the outcome to a look-ahead signal at given zero-based position. When the length of the look-ahead signal segment of a multinode model is positive, assembler programs cannot be loaded into nodes of the multinode model. Therefore, if you need to assemble a program that contains lookup instructions (e.g. generated by the disassembler), you have to create a model with the zero-length look-ahead signal segment. You have to define instruction meta-class ‘lookup’ that fetches signals at given positions from an array used as a substitute for the look-ahead signal segment. You also need to register necessary instruction classes derived from instruction meta-class ‘lookup’, the number of which is equal to the number of possible values of position.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370500331.13/warc/CC-MAIN-20200331053639-20200331083639-00225.warc.gz
CC-MAIN-2020-16
1,071
9
https://www.propellerheads.se/forum/showpost.php?p=1180956&postcount=1
code
Bass on Figure I have an Iphone 5 using the lates iOS. I bought Figure for my iPhone 4 and even before upgrading, I started having problems when selecting the Bass instrument (does not matter which one) - there is no sound when I play patterns at all. This is not an issue when playing patterns for Drum or Lead. Any insight into this issue?
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537376.43/warc/CC-MAIN-20140416005217-00362-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
341
2
http://softwaredevelopercertification.com/unable-to/unable-to-load-library-icui18n-cannot-load-library-icui18n.php
code
You signed out in another tab or window. I suspet it's that there are no symlinks of the form /usr/lib/foo.so --> /usr/lib/foo.so.48 [email protected]:~/packages/x$ dpkg -L libicu48 /. /usr /usr/share /usr/share/doc /usr/share/doc/libicu48 /usr/share/doc/libicu48/copyright /usr/share/doc/libicu48/NEWS.Debian.gz /usr/share/doc/libicu48/changelog.Debian.gz /usr/share/lintian /usr/share/lintian/overrides /usr/share/lintian/overrides/libicu48 /usr/lib /usr/lib/libiculx.so.48.1.1 You are currently viewing LQ as a guest. Offline #17 2013-10-17 21:34:11 jasonwryan Forum & Wiki Admin From: .nz Registered: 2009-05-09 Posts: 19,791 Website Re: [SOLVED] qt: error while loading shared libraries: libicui18n.so.51 Merging... Source Chromium works. Christian Convey (christian-convey) wrote on 2012-09-12: #9 Just installing the package doesn't seem sufficient. Reload to refresh your session. Indeed in synaptic there are two packages that comes out:libicu44libicu55Unfortunately, in synaptic it is not possible to find out the contents of each package (this is a problem of the pclos https://github.com/wkhtmltopdf/wkhtmltopdf/issues/2242 Done The following packages were automatically installed and are no longer required: libaudio2 libavahi-client3 libavahi-common-data libavahi-common3 libcups2 libgstreamer-plugins-base1.0-0 libgstreamer1.0-0 liborc-0.4-0 libqt4-declarative libqt4-network libqt4-opengl libqt4-script libqt4-sql libqt4-sql-mysql libqt4-xml libqt4-xmlpatterns libqtcore4 libqtdbus4 libqtgui4 Icui18n Centos Already have an account? I'm going to perform a reboot and report back here. I learn various commands thru the terminal when you guys help me on the forum to correct something.But curious why I did not get the code you got. You signed in with another tab or window. Libicui18n.so.48: Cannot Open Shared Object File: No Such File Or Directory Stop the world, I get off... replaced with new one. --- Reply to this email directly or view it on GitHub: #41 (comment) subdesign commented Jan 29, 2015 yes, I have https , its running under a I guess I did not, I always upgrade KDE packages from AlienBOB. Offline #11 2013-10-17 21:05:04 clfarron4 Member From: London, UK Registered: 2013-06-28 Posts: 2,162 Website Re: [SOLVED] qt: error while loading shared libraries: libicui18n.so.51 Not meaning to add to this thread, but http://www.pclinuxos.com/forum/index.php?topic=118521.0 Are you new to LinuxQuestions.org? Icui18n Arch Chromium still to test.EDIT3:7) qt4 @ 4.8.5-3 with icu @ 52.1-1 and libtracker-sparql @0.16.2-3 . Icui18n Debian Are you sure the ssl certificate is installed properly? Reload to refresh your session. Andreas Metzler (k-launchpad-downhill-at-eu-org) wrote on 2012-05-28: #8 @Gallomimia: You could simply install the libicu48 package to silence the warnings. thanks NitMedia member chonthu commented Jan 29, 2015 Hey Barna, If the server throws any warnings / errors in the response, the pdf generator will not show thinking the pdf might sudo apt-get install -f Reading package lists... So I fixed this issue with the following installation process: wget -q http://download.gna.org/wkhtmltopdf/0.12/0.12.2.1/wkhtmltox-0.12.2.1_linux-trusty-amd64.deb dpkg --install wkhtmltox-0.12.2.1_linux-trusty-amd64.deb # Download required dependencies apt-get --yes --fix-broken install # Test /usr/local/bin/wkhtmltopdf http://www.google.com test.pdf be-codified commented Personal Open source Business Explore Sign up Sign in Pricing Blog Support Search GitHub This repository Watch 5 Star 87 Fork 34 NitMedia/wkhtml2pdf Code Issues 5 Pull requests 0 Projects http://softwaredevelopercertification.com/unable-to/unable-to-load-bcp-resource-dll-bcp-cannot-continue.php I guess I should recompile instead of installing binaries but it feels too cumbersome for this particular error... If you continue to use this site we will assume that you are happy with it.Ok Icui18n Unetbootin Already have an account? Bindestreck View Public Profile View LQ Blog View Review Entries View HCL Entries Find More Posts by Bindestreck 03-25-2013, 02:16 PM #4 volkerdi Slackware Maintainer Registered: Dec 2002 Location: You'll have to get the binary directly from http://download.gna.org/wkhtmltopdf/0.12/0.12.2.1/wkhtmltox-0.12.2.1_linux-trusty-amd64.deb if you want the last working version. Unable to load library icui18n "Cannot load library icui18n: (libicui18n.so.48: cannot open shared object file: No such file or directory)" ProblemType: Bug DistroRelease: Ubuntu 12.04 Package: mumble-server 1.2.3-2ubuntu4 Uname: Linux 3.2.13-grsec-xxxx-grs-ipv6-64 There are different versions for different platforms, although version is the same. Now I can run and generate the pdf via command line. Lib64icu51 On Fedora (and other RPM-based distros):$ su -c 'yum install libicu' Logged Juan ConejeroPixInsight Development Teamhttp://pixinsight.com/ georg.viehoever PTeam Member PixInsight Jedi Master Posts: 2077 Re: [1.8RC1]: Unable to load library icui18n It says very clearly command: ../vendor/h4cc/wkhtmltopdf-amd64/bin/wkhtmltopdf-amd64 That's wrong, it should be /usr/local/bin/wkhtmltopdf or just wkhtmltopdf. What is the specific error in the response? I put it thru the run command also and it did the same thing. http://softwaredevelopercertification.com/unable-to/unable-to-load-dll-the-operating-system-cannot-run.php Personal Open source Business Explore Sign up Sign in Pricing Blog Support Search GitHub This repository Watch 9 Star 66 Fork 20 h4cc/wkhtmltopdf-amd64 Code Issues 5 Pull requests 0 Projects You signed in with another tab or window. rdpascua commented Jul 22, 2015 I'm having this exact issue on Ubuntu 14.04 (x64) imanzuk commented Jul 22, 2015 I'm also having this exact issue on Ubuntu 14.04 (x64) ldd has Instead of http://mydomain.com/uploads/image.png use /var/www/html/uploads/image.png @ashkulz am I right? janzenz referenced this issue in h4cc/wkhtmltopdf-amd64 Oct 6, 2015 Closed Unable to load library icui18n #12 janzenz commented Oct 6, 2015 @Oliboy50 Thanks for that solution. Skip to content Ignore Learn more Please note that GitHub no longer supports old versions of Firefox. We don't understand again, how a command line tool connected to a ssl certificate?! Changed in mumble (Ubuntu): status: New → Confirmed Benjamin Jemlich (pcgod) wrote on 2012-04-28: #3 The missing dependency has to be in one of the Qt packages because they're trying to I have it installed (Mint 13) and get the same error. Blogs Recent Entries Best Entries Best Blogs Blog List Search Blogs Home Forums HCL Reviews Tutorials Articles Register Search Search Forums Advanced Search Search Tags Search LQ Wiki Search Tutorials/Articles Search
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511122.49/warc/CC-MAIN-20181017090419-20181017111919-00477.warc.gz
CC-MAIN-2018-43
6,686
16
https://onenetworkecommerce.com/chatgpt-services/
code
Chatgpt in Education, Tech, and More Chatgpt, an artificial intelligence has recently released text that sounds like human. This has caused concern over the possibility of its application in the education sector, technology industry and beyond. They also write fake essay and newspaper articles that are difficult to distinguish from authentic work. The New York City school district has blocked the site from their network, which has left teachers scrambling to find methods to stop cheating. 1. Jasper ai Jasper AI is an online writing tool created to aid writers in creating more engaging content, stimulating ideas, and overcome writer’s block. Additionally, it assists them to achieve higher rankings in Google search results. It offers 50 short-form copywriting template to create content for blogs social media channels, websites and email campaigns. Additionally, it comes with an Boss Mode plan which gives you access to the long-form editor, more flexible with additional tools that integrate with its short-form counterparts – to increase your imagination. Jasper AI not only offers templates for copywriting, but it also comes with other useful tools and functions for travel bloggers and content creators. It also has the History tab, where you can store any generated content produced by the AI. This makes it simple to find and reuse the content you have curated whenever you’re ready to put it online. The tool also has an outline of text, which is handy when you need to quickly sum up some text. Additionally, it provides blog post topic ideas and article outlines that will keep your readers entertained. Another impressive feature is the Jasper Paragraph Generator, which creates breathtaking paragraphs that can be used in articles, blog posts or other writing. These paragraphs are logical useful, unique and helpful. Jasper AI’s Chat support team is excellent, offering live webinars to showcase their software and provide general guidelines on best practices. Contact them via chat, email and phone calls as they provide hands-on documentation and instructional videos. Ultimately, Jasper AI boasts an incredible array of features which make their service exceptional: If you’re in search of an easy way to create content, Jasper AI is worth considering. It provides an affordable option and has a wide range of features that will aid you in producing more high-converting material in less time. Chatbots can be a great resource for customer support, whether your customers use chatbots to navigate your site or to get answers to their queries. They are not only affordable ways to offer 24/7 assistance in all time zones and places, but adding staff can also make operations easier. AI-powered chatbots use natural machine learning and language processing to answer basic customer inquiries. As these bots learn from thousands of conversations, they become better at providing more pertinent responses over time, by studying the data. Integrating a chatbot into your customer support processes can improve effectiveness by taking routine requests off your team’s plate leaving them free to focus on more complex questions. Additionally, it lowers costs by enabling agents to manage fewer calls at once which allows them to spend more time solving real issues. Another major benefit that a chatbot has is the ability to monitor its performance. It is possible to ask your customers at the end of each contact to see how well the bot resolved their issue which gives you the opportunity to improve its performance or to train it for new capabilities. Chatbots are capable of collecting data from users, enabling them to provide a customized and tailored experience for each customer. This can help companies improve the Net Promoter Score (NPS), boost retention rates and increase their operations. Chatbots are able to be easily integrated into existing customer support software. It provides a comprehensive view of all customer interactions across channels, including the internet, which allows you to follow up with clients and to send feedback surveys when necessary. ChatGPT is a natural language processing tool developed by OpenAI which allows users to submit questions and comments for instant responses. It provides responses that can be in audio, text and video , and is able to respond to questions related to general knowledge as well as investigate areas. In addition, ChatGPT can be used to troubleshoot devices, solve math problems , and locating information on companies or products. But, the tool isn’t ideal as it is only able to use data prior to 2021. This could leave some topics such as world events without sufficient data points, resulting in inaccurate fill in of those areas with inaccurate information. Deep TabNine, like many machine learning tools, needs lots of processing power in order to function properly – which is why its cloud-hosted with Google’s Kubernetes Engine. The software works by analyzing statistical patterns in data to predict what we will do next. It has been trained on over 2 million files from GitHub. Users are able to sign up to try a trial version of the program, however, they you must purchase additional features and features such as persona types, voice search and API support. Furthermore, there are tutorials and a user-friendly dashboard, and fast response times and quality customer support provided by the program. As with Copilot on GitHub Copilot, Tabnine places emphasis on educating its models using responsibly sourced data. In order to achieve this, the company has revamped the company’s AI models and improved the way it integrates new ones into its platform; rather instead of having a only model Tabnine now supports multiple customized AI models after rigorously assessing the one that is most suitable to the needs of its customers. Codewhisperer is a machine learning (ML)-powered programming companion that assists improve the productivity of developers by providing code suggestions. The service leverages contextual cues such as the location of the cursor and code before it to push its recommendations accordingly. CodeWhisperer is a program developed in collaboration with Amazon Web Services, is compatible with any programming language , or IDE supported by AWS such as VS Code, IntelliJ IDEA, PyCharm and WebStorm. Furthermore, CodeWhisperer features a security scanner and reference tracking feature that can scan your code for security holes. CodeWhisperer as well as GitHub’s Copilot is an AI-assisted software development tool that interprets developers’ comments and suggests code that they could use to develop their project. It was trained using an extensive library of open source code as well as internal training data from Amazon. Jeff Barr, AWS Vice Chief Evangelist and President of the company said CodeWhisperer is an extension of the IDE to help developers write code more quickly and accurately. It makes use of multiple context clues like where the cursor is situated or in front of it, as well as other projects within it to move its recommendations forward. CodeWhisperer, like ChatGPT creates code fragments in a variety of programming languages, as well as technical documents. The service is supported through an open source community comprising more than a thousand artificial intelligence experts who have shared their knowledge. CodeWhisperer might not include all the features that ChatGPT provides however it could serve as a viable alternative for a lot of users. It helps coders get their work done quicker and more accurately , while also removing possible biases or bugs. Another option is LaMDA, an AI-powered conversation system created by Google that can comprehend and respond to complicated questions and conversations. The platform has been pre-trained on 137 billion parameters and 1.56T words of publicly available internet documents and dialog information as well as fine-tuned for quality, safety and solidity. 5. Google Assistant Google Assistant is a voice-activated virtual assistant designed to assist with daily tasks on your phone. Compatible with Android-powered smartphones 5.0+ and compatible smart speakers such as Google Home, this virtual assistant helps simplify many of your tasks on the go. SearchEngine can be used in conjunction with verbal commands and control of various devices that support it, such as smart lighting bulbs, thermostats and TVs. In addition, Speech Recognition is supported with support for a variety of languages. Google Assistant not only answers your questions, but will also display photos, emails or other data depending on what you’ve asked it do. For instance, you could ask Google Assistant to show photos of a visit or a conference or send emails from Gmail on a specific subject or individual. You could ask Assistant to provide you with an overview of the day’s events or check the weather forecast. It can also read out news stories from a variety of sources. If you’re a fan of music, Assistant can play music tracks and albums by only the command “Play my favorite song.” All you need is one simple command – just say, “Play my favorite song.” Another amazing characteristic that is a highlight of Google Assistant is its capability to translate sign language using Lens. Simply point your phone’s camera at a sign, then it’ll overlay the message with a precise translation in any language you choose. Google Assistant now features Scheduled Actions that let you manage all your smart home devices from an interface. It’s particularly useful for connecting new appliances such as the C and Ecobee smart thermostats to your account.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948632.20/warc/CC-MAIN-20230327123514-20230327153514-00675.warc.gz
CC-MAIN-2023-14
9,679
37
https://community.oracle.com/thread/2423069
code
This content has been marked as final. Show 4 replies 945731 wrote:You design the code, write it and test it. Standard developer tasks. If you can't do it and cannot do the research required to figure out how, there is something horribly wrong. If you're a novice there should be a senior you can turn to for guidance. How do I stop executing the current thread and kill the processing thread and create a new thread to retry for certain number of times... Stop executing a thread: you interrupt threads to do that (with the interrupt() method). That does not magically work, thread code needs to be designed to be interruptable. Research on your part, a good book on Threads will surely help. Create new thread: well you already know how to do that Certain number of times: maintain an integer that keeps track of how many times you interrupted and restarted the thread With those three pieces of the puzzle you really must be able to put it all together yourself. We do a similar thing in our database classes. Inside a loop, we execute a statement, and if it succeeds, we exit the loop. Else, we examine the error to see if it's a type we have determined (after years of painful experience) to be "transient." We define "transient" errors as those that may go way on their own (i.e., record locked, resource busy, etc.). If it's a transient error, and we haven't reached our (app-configurable) retry limit, we wait a specified length of time (say, a minute or two or five), then retry the statement. Pretty simple logic, but it works wonders in our nighttime batch processing where many apps are competing for the database's attention.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823947.97/warc/CC-MAIN-20160723071023-00119-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
1,638
9
https://1password.community/discussion/114352/command-line-tool-version-1-2-x
code
We just release v1.2.0 of the command line tool! It is a small release but I'm sure you will appreciate the newly added features. We are especially excited to provide basic shell completion for zsh and bash! Have a look at op help completion to see how to set it up. Full details here: https://app-updates.agilebits.com/product_history/CLI#v1020001
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107891428.74/warc/CC-MAIN-20201026145305-20201026175305-00058.warc.gz
CC-MAIN-2020-45
348
4
https://www.buyvardenafilmh.com/hostgator-advanced-dns-zone-editor/
code
Bluehost Vs HostGator – Which Web Hosting Provider is Better? Bluehost was faster and offered more storage options than the other hosting providers. However we discovered that HostGator was more user-friendly, and HostGator also comes with a money back assurance and offers free SSL. Which one is more suitable for you? Continue reading to discover! You can try these services for free for 30 days! Both companies have pros and cons. We’ve listed the pros and cons for each web hosting service in this article. Bluehost is more efficient than Hostgator There is a distinct difference between the shared hosting provided by Bluehost and dedicated hosting that is provided by HostGator. While Bluehost’s monthly plans are much less expensive, HostGator’s are not. Both offer a money-back guarantee. You can cancel the service you do not like within 45 days. These options are more beneficial than shared hosting. In terms of reliability, HostGator is faster. This shouldn’t be a surprise since they are owned by the same firm. Bluehost is, however doesn’t offer backups, nor assured recovery. However, they both provide free SSL certificates as well as full SSH access. HostGator is a better choice when you’re looking for backup options. Cloudflare can be easily installed and set up to automatically backup your website. Bluehost offers more storage options Bluehost is a web hosting service provider that provides a range of features. The Basic plan is suitable for single-page websites, and has a 50GB. The plan doesn’t allow accounts, email storage or databases. Alternatively, if you’d like to have more than one website, you can opt for the more expensive Bluehost Pro plan which offers more storage space for $2.99 per month. However, this plan will not suffice for a commercial website. Plus plans allow users to create unlimited websites, store unlimited information and can have unlimited email addresses. You can upgrade to the next level by choosing the Choice Plus package. This includes all Plus features, but comes with better options for backups and domain privacy for one year. While this package is slightly more expensive, it doesn’t make much sense for your business to spend more on it. The Pro version offers superior performances and offers more storage options. The maximum file size is increased by default to 300,000. There are also options for a permanent backup. Hostgator gives a 30-day money-back guarantee In case you are not satisfied with the hosting experience, you can request an entire refund within 30 days of your purchase. The only restriction is that the policy of refunds does not apply after the 45-day guarantee for money-back has expired. If you’ve been using the service for less than 30 days, you may be able to get a prorated refund. If you’re a new user, you are eligible for an amount of money back if you have not yet made a purchase through HostGator. The refund policy is different based on whether you’re an incoming user or have already created multiple accounts. To make a refund request, you must first cancel your hosting subscription via your admin panel or contact Billing via live chat. Although the policies for refunds differ between hosts, the cancellation procedure is quick and easy. It is important to know that the refund policy does not apply to add-ons or services such as Sectigo WebDNS. The money-back guarantee is only valid for the first 30 days of a subscription. It is not for domain names or add-ons. Hostgator is offering SSL for free HostGator offers a free SSL with all shared hosting plans. If you’d like to take advantage of this service, you only must know the name of the server, your cPanel account name and the secure address of the server. After that, you are able to install the SSL certificate to get your site up and running. If you are using another provider, you need to change your domain name and create an record for your new hosting plan. It is highly recommended to make use of SSL as it can boost your search engine rankings and traffic. While many websites are encrypted, not all are. Your website isn’t protected without an SSL certificate. Google wants secure sites. If you’re new to the business you’ll be able to get an SSL certificate. Long-term customers can wait until the rollout.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030338073.68/warc/CC-MAIN-20221007112411-20221007142411-00740.warc.gz
CC-MAIN-2022-40
4,319
14
http://help.notablesolutions.com/AutoStore/7_0/ContentManagementQueue/CMOptions.htm
code
The component options determine the data source, user credentials, queue name, and status for the Content Management Queue component in a workflow. To configure options for the Content Management Queue component, double-click the component icon in the workflow. To configure a processing or routing component in the same workflow, click the icon for the processing or routing component. Select the data source to which you want to queue the files to. Make sure you have the data source attributes correctly, as you will not be able to select the Queue name or Status otherwise. If the data source has user access privileges, enter the user name to use for the data source connection. Enter the password that corresponds to the user name. Specify the queue name to which to queue files. You may add new queues by selecting the Add button and entering a new name for a new queue. Specify the status of the files. You may add a new status by selecting the Add button and entering a new name, such as "pending" or "approved". The priority determines the order that files will be serviced out of the queue. You can select Low, Normal, or High. High priority files are serviced first, normal priority files are serviced second, and low priority files are serviced last. Shows when a job in a queue has completed its workflow. The termination script lets an administrator decide what to do with a record after it has been processed by the workflow. For example: Send to email. Clicking this button opens the Termination Script dialog box. There are three Termination Script options:
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540553486.23/warc/CC-MAIN-20191213094833-20191213122833-00404.warc.gz
CC-MAIN-2019-51
1,575
10
https://mail.python.org/pipermail/python-list/2005-September/329053.html
code
scroll a frame to display several lines of widgets at a time matt.hammond at rd.bbc.co.uk Fri Sep 2 13:02:31 CEST 2005 I don't quite understand (if I'm interpreting you correctly) why you want separate widgets, all displayed at once, for several hundred records - surely better to just reuse the one set of widgets and have the scrollbar or back-forward buttons change which record is being displayed in the If you're after replacing widgets, then you need to destroy them first. Use the self.destroy method and unset/change any variables referencing the widget so it get a chance to be garbage collected. However, if you want a scrollable view onto a larger area, what you need to do is use a Canvas, with a window shape on it. You then put a frame into that window. canvas = Tkinter.Canvas( <parent> ) canvas.grid( ... ) winID = self.canvas.create_window(0,0, anchor=Tkinter.NW) Then later you can add a frame to that window on the canvas: canvas.itemconfigure( winID, window = <my frame> ) canvas['scrollregion'] = canvas.bbox('all') Make sure you've created the frame and perhaps called update_idletasks() to give it a chance to size itself before shoving it onto the canvas. And of course, the scrollbar! yscroll = Tkinter.Scrollbar( <parent>, orient=Tkinter.VERTICAL) yscroll.grid( ... ) yscroll['command'] = canvas.yview canvas['yscrollcommand'] = yscroll.set On Thu, 01 Sep 2005 14:33:36 +0100, William Gill <noreply at gcgroup.net> > I need to display a couple of labels and a checkbox from each entry in > my database. Simple enough, but there are several hundred records, and > I only want to display 5 or 10 at a time. Can this be accomplished by > putting everything in a Frame(), using width, height, grid_propagate(0) > , and a scrollbar? or do I have to grid 5 rows at a time? If the > latter, can I just grid over the previous 5 or do they have to be > explicitly removed first. | Matt Hammond | R&D Engineer, BBC Research and Development, Tadworth, Surrey, UK. More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678700738/warc/CC-MAIN-20140313024500-00003-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
2,017
37
https://www.daniweb.com/programming/web-development/threads/507523/online-shop
code
It's because there's also an index.html in that 'bestshop' directory and that's the one that gets loaded when accessing www.advance-web-studio.com/bestshop/ http://www.advance-web-studio.com/bestshop/index.html As far as I know loads Apache by default an index.html before an index.php unless you tell otherwise (a diffrent order) in a .htaccess file. If you want to load the index.php you can also remove the index.html or rename it to something else if you want to keep it, If you are focusing on seo also then I suggest you check if the pages are duplicated. If you want to tell google what is the main page Add this code to your index. <Link href = "www.yoursite.com" rel = "canonical" /> ( Place the main page )
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221218357.92/warc/CC-MAIN-20180821151743-20180821171743-00043.warc.gz
CC-MAIN-2018-34
716
6
https://joshgreen.substack.com/about
code
Because you’re interested in climate, crypto, or just staying in touch. Going Green is fun for me and free for you. I co-founded and led Panjiva, a start-up that transformed unstructured data into supply chain intelligence. Since selling Panjiva to S&P Global, I’ve been obsessed with climate and crypto. If you’re interested in either, or both, or just want to follow my adventures, subscribe to this (free) substack.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511220.71/warc/CC-MAIN-20231003192425-20231003222425-00178.warc.gz
CC-MAIN-2023-40
424
2
https://sitoolkit.com/the-five-domains/environmental/water-quality/salinity
code
You are here Water salinity is a measure of the amount of salt that is dissolved in a water quality or soil (for soil see electrical conductivity metric). High salinity level above 1000mg/liter of salt make water significantly unpalatable for humans. How to operationalize the metric Method of data collection and data needed to compute the method: Unit of analysis: Limitations regarding estimating and interpreting:
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500384.17/warc/CC-MAIN-20230207035749-20230207065749-00669.warc.gz
CC-MAIN-2023-06
417
6
https://www.ques10.com/p/1127/object-oriented-programming-methodology-question-5/
code
Object Oriented Programming Methodology - May 2015 Computer Engineering (Semester 3) TOTAL MARKS: 80 TOTAL TIME: 3 HOURS (1) Question 1 is compulsory. (2) Attempt any three from the remaining questions. (3) Assume data if required. (4) Figures to the right indicate full marks. 1 (a) Write a program to calculate GCD of two numbers in JAVA. (5 marks) 1 (b) Explain any three features of JAVA. (5 marks) 1 (c) Draw and explain applet life cycle. (5 marks) 1 (d) Explain wrapper class and its applications. (5 marks) 2 (a) Write a program in JAVA to display following pattern. (Take input for number of rows from command line) 2 (b) Write a note on System.arraycopy(). (5 marks) 2 (c) Identify classes and their attributes and draw the relationships specified by following problems. i) Bank maintains two kinds of accounts for customer, Saving accounts & current account. Saving account provides compound interest and withdrawal facility. Current account provides cheque book facility but no interest. ii) Library maintains books and magazines. A student can issue a book or return a book. A fine is charged if book is returned after 8 days. The magazines are not issued, but student can read it in library. (10 marks) 3 (a) What is a package? Explain with example the steps to create package and add a class or an interface. (10 marks) 4 (a) What is Exception? Explain how JAVA handles an Exception using following keywords: try, catch, throw, throws & finally. (10 marks) 4 (b) Write a program to read and display details of ten Employees with following specifications: Data Members: Emp_ID, Emp_name. Emp_Salary Parameterized constructor to initialize data members of Employees and Member functions: Display ()-to display information of all employees. (10 marks) 5 (a) With the help of suitable example explain how threads are created in JAVA. (5 marks) 5 (b) Explain multiple inheritance in JAVA with example. (5 marks) 5 (c) Write a program to count the number of alphabets, digits and special symbols from string. (10 marks) Write short notes on (any four): 6 (a) Method overloading & overriding (5 marks) 6 (b) Static data members & methods (5 marks) 6 (c) Abstract class & methods (5 marks) 6 (d) Constructor & its type (5 marks) 6 (e) JVM. (5 marks) 3 (b) Write a program to create vector objects with student names. Program should perform following operations based on choice: i) Add student name-To add new student name in the vector. ii) Remove student name-Removes student name if already exists else display appropriate message. iii) Display - Display contents of vector.(10 marks)
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250609478.50/warc/CC-MAIN-20200123071220-20200123100220-00481.warc.gz
CC-MAIN-2020-05
2,593
36
https://experienceleague.adobe.com/en/docs/experience-platform/web-sdk/identity/first-party-device-ids
code
First-party device IDs in Web SDK The Adobe Experience Platform Web SDK assigns Adobe Experience Cloud IDs (ECIDs) to website visitors by using cookies, to track user behavior. To account for browser restrictions on cookie lifespans, you can opt to set and manage your own device identifiers instead. These are referred to as first-party device IDs (FPIDs). You can either use first-party device IDs, or you can use third-party cookies, but you cannot use both features simultaneously. This document covers how to configure first-party device IDs for your Platform Web SDK implementation. This guide assumes you are familiar with how identity data works for the Platform Web SDK, including the role of ECIDs and identityMap. See the overview on identity data in the Web SDK for more information. AAAA records are only supported for setting and tracking cookies. The primary method for data collection is through a DNS CNAME. In other words, FPIDs are set using an A record or AAAA record, and are then sent to Adobe using a CNAME. Once an FPID cookie is set, its value can be fetched and sent to Adobe as event data is collected. Collected FPIDs are used as seeds to generate ECIDs, which continue to be the primary identifiers in Adobe Experience Cloud applications. To send an FPID for a website visitor to the Platform Edge Network, you must include the FPID in the identityMap for that visitor. See the section later in this document on using FPIDs in identityMap for more information. ID formatting requirements The Platform Edge Network only accepts IDs that comply with the UUIDv4 format. Device IDs that are not in UUIDv4 format will be rejected. Generation of a UUID will almost always result in a unique, random ID, with the probability of a collision occurring being negligible. UUIDv4 cannot be seeded using IP addresses or any other personal identifiable information (PII). UUIDs are ubiquitous and libraries can be found for virtually every programming language to generate them. Setting a first party ID cookie in the Datastreams UI setting-cookie-datastreams You can specify a cookie name in the Datastreams UI, where the FPID can reside, rather than having to read the cookie value and include the FPID in the Identity map. See the datastreams documentation for detailed information on how to configure a datastream. When configuring your datastream, enable the First Party ID Cookie option. This setting tells the Edge Network to refer to a specified cookie when looking up a first-party device ID, rather than looking up this value in the Identity Map. See the documentation on first-party cookies for more details on how they work with Adobe Experience Cloud. When enabling this setting, you must provide the name of the cookie where the ID is expected to be stored. When you use first party IDs, you cannot perform third party ID syncs. Third party ID syncs rely on the Visitor ID service and the UUID generated by that service. When using the first party ID functionality, the ECID is generated without the use of the Visitor ID service, which makes third party ID syncs impossible. When you use first party IDs, Audience Manager capabilities targeted towards activation in partner platforms are not supported, given that Audience Manager Partner ID syncs are mostly based on DIDs. The ECID that is derived off a first party ID is not linked to a UUID, making it un-addressable. Setting a cookie using your own server When setting a cookie using a server that you own, various methods can be used to prevent the cookie from being restricted due to browser policies: - Generate cookies using server-side scripting languages - Set cookies in response to an API request made to a subdomain or other endpoint on the site - Generate cookies using a CMS - Generate cookies using a CDN document.cookie method will almost never be protected from browser policies that restrict cookie durations. When to set the cookie The FPID cookie should ideally be set before making any requests to the Edge Network. However, in scenarios where that is not possible, an ECID is still generated using existing methods and acts as the primary identifier as long as the cookie exists. Assuming the ECID is eventually impacted by a browser deletion policy, but the FPID is not, the FPID will become the primary identifier on the next visit and will be used to seed the ECID on each subsequent visit. Setting the expiration for the cookie Setting the expiration of a cookie is something that should be carefully considered as you implement the FPID functionality. When deciding this, you should consider the countries or regions in which your organization operates along with the laws and policies in each one of those regions. As part of this decision, you may want to adopt a company-wide cookie-setting policy or one that varies for users in each locale where you operate. Regardless of the setting you choose for the initial expiration of a cookie, you must ensure you include logic that extends the expiration of the cookie each time a new visit to the site occurs. Impact of cookie flags There are various cookie flags that impact how cookies are treated across different browsers: Cookies set using the HTTPOnly flag cannot be accessed using client-side scripts. This means that if you set an HTTPOnly flag when setting the FPID, you must use a server-side scripting language to read the cookie value for inclusion in the If you choose to have the Platform Edge Network read the value of the FPID cookie, setting the HTTPOnly flag ensures that the value is not accessible by any client-side scripts but will not have any negative impact on the Platform Edge Network’s ability to read the cookie. HTTPOnly flag does not have an impact on the cookie policies that may restrict cookie lifetime. However, it is still something you should consider as you set and read the value of the FPID. Cookies set with the Secure attribute are only sent to the server with an encrypted request over the HTTPS protocol. Using this flag can help ensure that man-in-the-middle attackers cannot easily access the value of the cookie. When possible, it is always a good idea to set the SameSite attribute lets servers determine whether cookies are sent with cross-site requests. The attribute provides some protection against cross-site forgery attacks. Three possible values exist: None. Consult your internal team to determine which setting is right for your organization. SameSite attribute is specified, the default setting for some browsers is now Using FPIDs in Below is an example of how you would set an FPID in the As with other identity types, you can include the FPID with other identities within identityMap. The following is an example of the FPID included with an Authenticated CRM ID: If the FPID is contained in a cookie being read by the Edge Network when first-party data collection is enabled, you should capture only the authenticated CRM ID: identityMap would result in an error response from the Edge Network since it is missing the primary indicator for the FPID. At last one of the IDs present in identityMap must be marked as The error response returned by the Edge Network in this case would be similar to the following: "title": "No primary identity set in request (event)", "detail": "No primary identity found in the input event. Update the request accordingly to your schema and try again.", When both an ECID and FPID are present, the ECID is prioritized in identifying the user. This ensures that when an existing ECID is present in the browser cookie store, it remains the primary identifier and existing visitor counts do not risk being affected. For existing users, the FPID will not become the primary identity until the ECID expires or is deleted as a result of a browser policy or manual process. Identities are prioritized in the following order: - ECID included in the - ECID stored in a cookie - FPID included in the - FPID stored in a cookie Migrating to first-party device IDs If you are migrating to using FPIDs from a previous implementation, it may be difficult to visualize what the transition might look like at a low level. To help illustrate this process, consider a scenario that involves a customer who has previously visited your site and what impact an FPID migration would have on how that customer is identified in Adobe solutions. ECID cookie is always prioritized over the The following is a list of answers to frequently asked questions about first-party device IDs. How is seeding an ID different from simply generating an ID? The concept of seeding is unique in that the FPID passed to Adobe Experience Cloud is converted to an ECID using a deterministic algorithm. Each time the same FPID is sent the Adobe Experience Platform Edge Network, the same ECID is seeded from the FPID. When should the first-party device ID be generated? To reduce potential visitor inflation, the FPID should be generated before making your first request using the Web SDK. However, if you are unable to do this, an ECID will still be generated for that user and will be used as the primary identifier. The FPID that was generated will not become the primary identifier until the ECID is no longer present. Which data collection methods support first-party device IDs? Currently only Web SDK supports FPIDs. Are FPIDs stored on any Platform or Experience Cloud solutions? Once the FPID has been used to seed an ECID, it is dropped from the identityMap and replaced with the ECID that has been generated. The FPID is not stored in any Adobe Experience Platform or Experience Cloud solutions.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817382.50/warc/CC-MAIN-20240419074959-20240419104959-00439.warc.gz
CC-MAIN-2024-18
9,614
83
https://blog.lordsutch.com/?day=20070721
code
The poster presentation today went moderately well, all things considered, and a few people indicated interest in seeing the completed paper in the near future. Compared to the other projects on my plate, that may be comparatively easy to do. The only real extension I want to do for now is to tweak the R simex package to allow the error variances for covariates to be different between observations; I also think I can cleanup the call syntax a bit to make it a bit more “R-like,” but that has less to do with the paper proper—except cleaning up the call syntax will make it easier to implement my tweak. Since I have a lovely 6 am flight tomorrow, I’ve spent much of the afternoon packing and getting ready for the trip back to St. Louis; I’ll probably wander towards the closing reception in a little while, once everything’s close to organized for the morning.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662562410.53/warc/CC-MAIN-20220524014636-20220524044636-00053.warc.gz
CC-MAIN-2022-21
877
4
https://olab.ca/olab-in-the-cloud/
code
We are now hosting OLab4 in the cloud: https://cloud.olab.ca These are mostly the same maps as on our demo server. Use ‘guest‘ as username and password, if you have not been provided with one. Why use a cloud service? You may be interested in our cloud service if you need to provide cases that will see heavy use. e.g. major projects, large class sizes etc. Our cloud service is highly scalable, which means that it can reliably handle very high numbers of users, is rarely offline, and can be accessed from anywhere. Because there are increased costs with such a service, we do need to charge a fee for cases that are hosted in the cloud. Please contact us for more details.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00440.warc.gz
CC-MAIN-2023-50
680
7
https://rdrr.io/cran/photobiologySun/man/ppfd_BF.data.html
code
Dataset containing mean, maximum, minimum and standard deviation values for total, direct and difusse photosynthetically active radiation expresed as photon irradiance. Each value is a summary 60 consecutive readings acquired once every second. A data frame with 24479 rows and 9 variables. variables. The variables are as follows: time_EEST POSIXct Local time according to EET coordinates. ppfd_tot_mean numeric (mol m-2 m-2) ppfd_tot_min numeric (mol m-2 m-2) ppfd_tot_max numeric (mol m-2 m-2) ppfd_tot_sd numeric (mol m-2 m-2) ppfd_diff_mean numeric (mol m-2 m-2) ppfd_diff_min numeric (mol m-2 m-2) ppfd_diff_max numeric (mol m-2 m-2) ppfd_diff_sd numeric (mol m-2 m-2) Instrument used: Delta-T BF5 "quantum sensor" , mounted on tripod at approximately 2 m height. Data collected with a Campbell Scientific CR6 datalogger, using analogue outputs from the sensor. Wavelength sensitivity range of the quantum sensor is 400 nm to 700 nm. Location: Viikki campus of the University of Helsinki. Coordinates: 60.226803 N, 25.019205 E. Add the following code to your website. For more information on customizing the embed code, read Embedding Snippets.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103626162.35/warc/CC-MAIN-20220629084939-20220629114939-00301.warc.gz
CC-MAIN-2022-27
1,150
15
https://www.fi.freelancer.com/projects/php/build-website-32212888/?ngsw-bypass=&w=f
code
I need a website like [login to view URL] but for Massage and Spa. It must be designed for Linux servers. It must be in 3 different languages (Turkish, English, Persian) It must be somehow that I can add new languages (LTR and RTL) to it easily and the database must be in MySQL. It must work well on a computer, cell phone, tablet, ... Please mention rama spa in your bid so that I'll be sure you have read the project specification. Also, specify in what language you will design it.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303729.69/warc/CC-MAIN-20220122012907-20220122042907-00635.warc.gz
CC-MAIN-2022-05
485
7
https://os.mbed.com/users/loopsva/code/ds3232m_HelloWorld/
code
DS3232M RTC demo program. Tested on the K64F (this example) and the KL25Z, but should work on any platform by changing the SDA and SCL pins. USB serial baud rate is 230400, tested on TeraTerm. Demo includes setting the DS3232's time, turning on and off the 32KHz and 1Hz outputs and accessing the DS3232's temperature. Also included are DS3232 user RAM access tests and user RAM CRC data calculations. Since user RAM is battery backed up, CRC routines are included to insure that the data stored in user RAM is intact.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735958.84/warc/CC-MAIN-20200805124104-20200805154104-00112.warc.gz
CC-MAIN-2020-34
518
1
https://lawsofgravity.blogspot.com/2008/08/silly-quote.html
code
I had lunch at Ruby's today. Yeah, I know, you don't care what I had for lunch, but there's actually a point to this. They're doing some sort of contest. They're giving away a Schwinn. So, as I walked by the poster advertising this, I flashed on The Muppet Movie. "If frogs couldn't hop, I'd be gone with the Schwinn." It's really odd what things stick with you. Just think of all the useful information I have forgotten, but 20-odd years later, I remember that one quote.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589179.32/warc/CC-MAIN-20180716041348-20180716061348-00549.warc.gz
CC-MAIN-2018-30
472
3
http://tugdualgrall.blogspot.gr/
code
MQTT (MQ Telemetry Transport) is a lightweight publish/subscribe messaging protocol. MQTT is used a lot in the Internet of Things applications, since it has been designed to run on remote locations with system with small footprint. The MQTT 3.1 is an OASIS standard, and you can find all the information at http://mqtt.org/ This article will guide you into the various steps to run your first MQTT application: - Install and Start a MQTT Broker - Write an application that publishes messages - Write an application that consumes messages The source code of the sample application is available on GitHub.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281332.92/warc/CC-MAIN-20170116095121-00471-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
603
7
https://chaoticunited.net/forums/files/file/12-cu-1112-2016-2017-survival-world/
code
This is the survival world used during 1.10 and 1.11. It was created after the 2016 relaunch and was used up until the 2017 relaunch. The spawn structure for this world was removed to prevent usage of the spawn in other servers, but all player builds are intact. You cannot take this map, or any structures within it, and run it in your own server or someone else's. This is only for those who wants to continue their projects on it instead of having to start over in single player mode. Breaking this rule will result in your download privileges being permanently suspended and could result in your account being banned.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055632.65/warc/CC-MAIN-20210917090202-20210917120202-00032.warc.gz
CC-MAIN-2021-39
621
2
http://rpg.stackexchange.com/questions/tagged/combat+move-action
code
Role-playing Games Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site Order of actions in combat Is there a specific order in which move / move-equivalent actions and standard actions should occur during a combat round? I know you can take the 5-foot step at the beginning or the end of the turn, ... Apr 22 '12 at 21:54 newest combat move-action questions feed Announcing The Launch Of Meta Stack Exchange Hot Network Questions Windows workstations in a Windows domain with a Linux domain controller Is there a word for this situation? What does consistency mean for "computational theories" corresponding to inductive types? Truncate inputtext field Using puppet and ensure latest for RPM package management "Hangman" game follow-on Brainteaser: What is the one thing a queen cannot do that all other pieces can do? How many Stack Exchange logins should I have? Formula for computing integrals How can I make the screen black and white? How to make traffic time contour map in ArcMap? Plausible explanation for large number of armed adventurers in fantasy RPG setting? Can I use a song from a YouTube remix in my game? What is the unit of pH? Does series converge or not? What's the fastest/easiest way to get Forgotten Souls? How to solve 4sin θ +3cos θ equals 5 What does 'highly non linear' mean? Is "The MSO/MSE Split is soon underway" grammatically correct? applying for positions below current rank Does it make sense to open one window all the way when the other window is much smaller? Packages are removed when I use "apt-get install" with a hyphen after the package name What do hardware address pins do? Enum with getting subset more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532128.44/warc/CC-MAIN-20140416005212-00181-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
2,235
54
https://web3bitsnbytes.substack.com/p/the-easiest-way-to-earn-money-in
code
💸The easiest way to earn money in Web3🤑 How to earn money in web3 through your skills- Bounties, Grants and more Diwali bonuses are around the corner👀, and I’ve got something special: it’s the bonus post for Bits n Bytes this week. Read on to find out more👇👇 Today's newsletter is a complete guide to bounties in web3 + a starter pack to help you: 🛠 Work in web3 💸 Earn in web3 Y'all must have heard about bug bounties in tech space, especially in the cyber security domain. But tf are bug bounties?🤔 Bug bounty programs are offered by websites and organizations where coders are incentivized to detect and report bugs, particularly those related to security weaknesses. The purpose of these programs is to find and fix bugs before the greater public is aware of them and prevent large-scale hacking abuse.🧐 When it comes to web3, bounties are rewards given in exchange for work done by And anybody who contributes to the ecosystem and are typically rewarded in the form of tokens🤩 Web3 is still in its native stage and onboarding more and more users everyday. Experts such as blockchain devs & content creators, who can help drive a protocol's adoption, technical experts who can simplify the documentation are still scarce. 😐 Bounties have provided a way to recognize the work that these folks do in a manner similar to how “Freelancing” works. The only difference being, you’re rewarded in tokens instead of fiat in most cases!🧐🧐 Bounties are an excellent way to get started in this space. You can get involved while still working a regular job. Say you’re a developer who loves to create content. You can get started in web3 by helping protocols create audio/video/text based learning modules and organizing weekly AMA with the community to help drive the adoption and bring in more users. Now web3 is evolving and expanding rapidly. With rapid development comes rapid growth and a need to spread awareness about all the new things a Defi protocol/ analytics solution or any web3 startup is doing. Hiring talent is obviously hard 😕😕 And in web 3, it can be harder😭 To address these issues, organizations use bounties to outsource development rather than hiring a large staff, given the mode in which these companies operate. And honestly, web3 bounties are an excellent choice for blockchain projects, such as DAOs or DeFi, and even for professionals. It can practically take any form, but they typically relate to problems and features on a project's backlog — anything from improving the interface, to easing the process of installation & setup to managing the community discord🤩🤩 Why do web3 bounties even matter?🤔 Bounties were started as a medium to incentivize/reward people to do something/contribute to the web3 ecosystem in any way possible. Early on, there used to be Ambassador programs for protocols, DAOs where folks used to enroll and get compensated for doing tasks. Bounties became a part of the bigger program and today it’s a part of the web3 culture. All those who seek such opportunities and provide services in exchange of tokens are commonly referred as bounty hunters - sounds like a treasure hunt much ?😛 NGL, web3 can be intimidating for absolute beginners. So, to make things easier for people, Work2Earn model was introduced, where you could be a part of the community by contributing in any aspect from bug bounties to creating content for the socials to running a social media campaign. Web3 has a seat at the table for anyone who wants one! You’ve convinced me, so How do I get started? There are numerous bounties listed on the web, such as bug bounty programs, bounties for reviewing smart contracts, content creation and so on. Let’s understand a bit more about these opportunities before I get to the real deal - the platforms, tips and tricks to find bounties and much more😁 📌Before projects are released, developers and researchers search for bugs and are rewarded for each bug found. The reward may vary depending on the security level of the bug. A critical-level bug would pay a bigger prize rather than a low-level one. Web3 developer bounty for smart contracts: 📃🔍💲 📌Organizations publish a smart contract code for developers to review and identify flaws. Commonly known as smart contract Audits. Such bounties are generally more long term and help you build a proof of Work for yourself on the chain 📌A good chunk of web3 bounty programs seek blockchain devs, designers, and UX writers to help them expand blockchain[Get more users for their L1/L2 solution] and web3 with new features. You’ll see these bounties under protocol integration. Think of it as using your skills to help a protocol while being incentivized. Does it get any better? Truly, web3 is powered by the community. 💁♀️ New to web3 and looking for resources to learn the concepts while still not lose your mind around jargons? 🤔 To keep up with web3 subscribe to Web3 Bits ‘n’ Bytes for easy web3 breakdowns😎 When a new protocol/L2/ L1 solution is launched, you wouldn’t know until you read about it somewhere or you watch a tutorial about it or just randomly find a repository around it. Boosting the discoverability and awareness about new projects is really important in web3. That’s where Content bounties come in place: It can be anything - writing a blog to help people install and setup your SDK, create a learning module around the utilities of your platform, create video content [podcasts, tutorial or even an AMA], manage social media handles and create content for twitter, Instagram etc.🤩🤩 Clearly, there's a lot of opportunity.👀 So, let’s put our Dora Explorer hats on and go bounty hunting on the web. Umm, just kidding. When there are problems, there are solutions Honestly, finding your first bounty can be daunting and challenging, but I’ve got you covered with some really sought after platforms Time to look at some bounty aggregator platforms that will help you find the right opportunities: 📌SuperteamDAO: Find bounties to earn crypto and get community membership for SuperteamDAO. 📌Chainwiz: Instantly start earning crypto by discovering amazing bounties. 📌Immunefi: Secure Web3, save funds from theft, and get paid the world's largest bug bounties. All aspiring whitehat hackers - this is your time! This reminds me of the news I read yesterday: TempleDAO exploited for $2mn QANPlatform bridge exploited Mango markets on Solana was exploited, a potential loss of over $100mn And all this happened in 1 day.😵 Still thinking about where to get started? 📌Layer3: Explore bounties through Quests. All you need is a wallet to get started For protocol specific bounties, Keep an eye out on their website, Discord, Telegram and Twitter.👀 Also, when we talk about web3, we can’t not talk about communities. Be a part the communities offering bounties, learn, work and earn and most importantly → give back to the community Pro tip💡 If you’re looking to venture into web3, continue researching more about the bounty and propose a pragmatic solution - this will help build a PoW for you. And as they say, victory comes from finding opportunities in problems😇 Bounty Benefits - Let’s talk money and opportunities Bounties a great way to build connections with protocols, DAOs, orgs building in web3. Starting with smaller bounties, you can become an integral part of the community and contribute to long-term projects, and even find work opportunities. Pro tip 💡Be super active on Discord and have proof of your work on GitHub for easy access. Discord and Twitter are the holy grail in web3. More so, when an organization sets the reward for a bounty, it will always pay the same amount when the work is done. This enables a truly global economy, whether a person is in the United States, India, Brazil, or even on Mars. 🪐 Payment methods in Web3 - Token, Fiat? Coming to the REAL QUESTION → How do I get paid?🥶 I don’t get all these crypto transactions.😫 I want to work in web3 but paisa apun ko USD mein hi chahiye 🤪 Well, that’s the whole essence of the decentralized web. I have seen people struggle with crypto in wallet, unsure about how to swap it with fiat or at times even with stablecoins and ask “How do I make real money out of this “crypto money”. Some tips that’ll help you navigate the rewards and payouts in the web3 space: Always ask for help, the community is always there for you Have enough options to claim stablecoins: if you’re getting paid in a native token — make sure it’s listed on a DEX and you can swap it You can sometimes be incentivized in fiat: happens very seldom in web3 To make things easier for people, DAOs, and protocols have started paying out bounties in the form of their own tokens/or more easily swappable tokens, ETH, stablecoins like USDC, or other ERC-20 tokens. Are bounties the ONLY WAY to earn in crypto?🤔 Absolutely not, you’ve grants if you're working on a long-term project. Grants are a key source of non-repayable funds, and they're especially popular in the Web3 ecosystem. Many protocols and foundations like Web3, the Ethereum Foundation, Polygon, etc. grant program funds for software dev and research in web3. 🤩 From my personal experience: Don't ❌ apply for grants unless you know the ideas are implementable — always think of long-term plans since grants come with milestones and opportunities to be turned into a product. Whether you’re a designer, a developer, or a creator looking to step into the web3 world, bounties are one of the best ways to enter the ecosystem and learn while you earn. Does it get any better? 🤗🤗 Now, what are you waiting for? Let’s get to bounty hunting, shall we?🏃♀️ And that’s a wrap for today! ☺️ Adios Amigos 👋 If you today’s edition, show us some love and share with you frens! Web3 shouldn’t be so hard😑Subscribe for free to start your learning journey and support my work🤗.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297284704.94/warc/CC-MAIN-20240425032156-20240425062156-00383.warc.gz
CC-MAIN-2024-18
10,048
91
https://www.slideshare.net/LuisCabaceira/sizing-your-alfrescoplatform
code
Sizing an alfresco infrastructure has always been an interesting topic with lots of unrevealed questions. There is no perfect formula that can accurately define what is the perfect sizing for your architecture considering your use case. However, we can provide you with valuable guidance on how to size your Alfresco solution, by asking the right questions, collecting the right numbers, and taking the right assumptions on a very interesting sizing exercise. How many alfresco servers will you need on your alfresco cluster? How many CPUs/cores do you need on those servers to handle your estimated user concurrency? How do you estimate the sizing and growth of your storage? How much memory do you need on your Solr servers? How many Solr servers do you need to get the response times you require? What are the golden rules that can drive and maintain the success of an Alfresco project? Predicting and sizing a system depends on a good understanding of user behavior and how that behavior affects the various layers of your infrastructure. Performing a regular analysis to the monitorization/capacity planning data will help you know exactly when and how you need to scale our architecture. The more data that gets indexed inside elastic search along the application life cycle the more accurate your capacity predictions will be. They represent the “real” application usage and how that usage affects the various layers of your application. This plays a very important role when modeling and sizing the architecture for future business requirements. Miguel Rodriguez is presenting on how to monitor Alfresco with open source tools, I consider this a very robust solution that you should adopt on your project as it will help you to adjust your sizing predictions based on real data. I’ve also wrote a blog post on how to monitor your alfresco solution with opensource tools. The best way to perform a sizing exercise is to ask the right questions and gather relevant information that can support the sizing decisions. Gathering this information should be the first step in order to do an Alfresco-sizing proposal, next I will explain the 3 most important factors to consider while gathering sizing information. Without the information on those 3 topics is virtually impossible to execute a sizing exercise. It’s useful to build sensible assumptions that provide approximate answers to the sizing input not provided by the organization. At this stage you should gather all information related with how the solution is intended to be used by final end users. Understanding the purpose of the system is critical to avoid providing values that does not take into account the many subtle (and not so subtle) details that may be hidden behind the rest of the information provided. You may find out that some solutions aggregate in fact many different use cases that are fairly different and independent making the sizing estimate effort more difficult. Those situations may also be hard to optimize from a configuration but also from an architecture point of view. For optimized architectures it may be considered as an important improvement to separate those different solutions and use cases into different separated deployments that may be sized also in an independent dedicated manner. The concurrent users information is definitely on the top of the importance rank of information to gather for a proper sizing. You will need to size it in a completely different manner, systems with very different concurrency even if they share the same basic architecture skeleton. On the other hand different concurrencies can even demand different architectures. Number of concurrent users ( including system users ) Consider detail around average think-time for the number of concurrent users defined Details on average and peak values. People often mean considerably different things when they talk about concurrent users. So some agreement is needed on the definition of concurrent user. Generically we consider here that a system with an average of N concurrent users will mean that in average for a period of time (30 to 100s think-time) the system will receive requests from N different users. So the term of concurrent user to have meaning needs to have it clarified the think-time being considered. Smaller or bigger think-times being discussed will demand in general an extrapolation of the value to compare to reference cases. How many documents in the repository ? What types of documents will be used ? What are the average document sizes ? Distribution ratio on the various types ? Injection Rate: the repository growth or document upload rate. The document types and sizes will impact transformation, text extraction and indexing. The repository size has impact on performance will grow with the ratio of search operations expected on the solution. Repository size is also dynamical, and the project may expect even on the near term to go through different phases: first migrating legacy repository, new content roll out, archival, etc. So sizing estimates should cover the different phases especially on short term. The injection rate has an obvious impact on the server concerning near future repository sizes, but also around the capability of the different solution layers on handling the throughput that not only stress the content storage and database (metadata extraction/upload/rules) but also the indexing layer. This may imply depending on the amount of document injection happening that dedicated nodes are reserved for the injection (that can be on cluster or not with the front end service nodes) and also Solr layer scaled up/out. The requirements around uploading and downloading large or small documents, and indexing, transforming different types of documents will vary. This can have architecture consequences. Preference for certain type of protocols and mechanisms for large files for example: FTP, bulk ingestion; or use of dedicated caching solutions for large documents downloads. But this also has consequences at the sizing level. It will be very different having to index large documents than smaller ones, and also between different types. Next I will explain the rest of the factors to consider (when possible ) while gathering sizing information. That information helps on the accuracy of the sizing forecast. If those are not available you should make some assumptions and write those assumptions on your sizing document. Some typical questions to answer are: Is high availability needed? Cluster or failover mechanism is enough? Where is load balancing needed? Is there a need for a dedicated transformation server? Virtualization used ? Is there a need for independent layers/clusters for certain interfaces (injection, etc)? Are there reasons to consider a smaller independent layer for Alfresco Share? Should dedicated caching elements be introduced? Architecture expectation will constrain what needs to be sized but also will need to get reviewed according to sizing arising from all the different parts of information gathering and analysis. Do not expect the architecture to be the result of one direction information flow from the organization to you. Most probably the organizations will expect a coordinated answer (proposal/feedback) on both: architecture and sizing. How our user identities organize themselves from a permission control point of view. Basically, the named users and groups, and subgroups, structure. Number of Users, Number of user groups, Group tree/structure depth, Average number of users Per Group , Average number of Groups per user Consider a fairly complex authority structure, one with considerable number of hierarchy levels in the group structure with the users belonging to many different groups and Consider a a very simple authority structure one with a very reduced number of users (most system users) with each user belonging to a fairly small number of groups (5 or less). Real users corresponding to organization charts usually have a complex authority structure (teams, projects, departments, etc). This is a typical scenario for collaboration use cases. While cases where Alfresco is used as backend without permission control responsibilities will have in general the most simple authority structures. We know from recent benchmarks comparisons that authority structure has a direct and important impact on performance of SOLR especially. So its important when sizing SOLR the importance of search operations for the solution, the types of searches being executed, the repository size and characteristics but also and equally important the authority structure of the corresponding use case. Collaboration use cases will so be in general more demanding in principle (keeping the other mentioned factors constant) than backend use cases with simpler authority structures. Split ratio between browse/download/search/Write, Which types of search operations will be executed (global, full text, custom search), Time window frames for the operations execution. Averages and peaks Browse are “pure” read operations that do not execute searches. They won’t stress the index/search layer and basically will access the database. Each of these operations types will stress different parts of our architecture in a different extent. Search will stress the Solr (or Lucene) layer. Indexing (especially Solr that its not atomic) will in general stress the database but also has a considerable impact at the search level, concurring with search operation for the same resources (disk and memory). Write/Download should stress the repository/database. The fact you have 50% of Search operation for example will demand a much bigger sized Solr layer than if you would have in general only 5% of searches. If the write operations ratio is comparable to the reads and downloads we are most of the times talking about cases of massive injection (image capturing, scanning, etc), and those cases may demand a separate dedicated injection layer as already mentioned. For most of the cases we would expect that read/browse and download operations are the lighter ones. We already discussed the write operations specific case for the Injection Rate topic. Search operations will also differ from one another and special care should be taken around the type of search operations being executed. Many full text global searches against very large repositories with complex authority structures will certainly have a very important impact on your Solr layer sizing. But content models with few untokenized metadata fields may have better response times, even against a considerably large repository. Finally remember when analyzing the information gathered around operations being executed, the time windows for the execution of those operations. So, as an example, saying a system will have an average of 2000 docs downloaded a day can have quite a different meaning if complemented by the fact this will happen mostly during the first 5 morning hours of the day. Which components of Alfresco will be used ? Which APIs will be used. Which protocols will be used ? Some protocols will be more demanding than others and require a more scaled up or scaled out system to provide acceptable response times. In general some attention should be paid to some problematic protocols. In general this is not Alfresco’s fault but because of the protocols definitions themselves. From load point of view CIFS and IMAP are possibly good examples of protocols that affect performance. On the other hand other protocols and interfaces should be considered reasonably light in comparison like FTP and WebDAV. This topic is in most of the cases (of sizing work) more a matter of proper guiding the organization to the correct and balanced solution, from the combined point of view of their requirements at the functional and sizing level. Batch operations are especially important for customized cases, where new processes are being executed related to custom workflows, custom scheduled jobs, custom rules and transformations, etc. It’s also very hard to have sensitivity at initial stages what will the future custom batch operations be. In any case for those situations when we already have information about it (solution analysis by organization is already advanced) it’s an important topic to take into account. If it is considered important enough, batch jobs might be configured to execute on dedicated nodes/layers in order to minimize the effect on the other service layers. Also care should be taken around customizations to use proper Alfresco cluster job lock service to avoid jobs execution repetition between nodes in a cluster. This is definitely a very hard point to measure on initial phases of the project and the best candidate to strong requirements around proper dedicated benchmark and load tests on later phases. And at the same time experience also tell us that it happens too frequently that it’s in fact the most important point damaging the correct performance of a system. Besides all the common warnings around best practices on Alfresco coding, preventive expert code review, unit and load systematic tests, training/certification, etc. The Alfresco expert responsible for sizing should pay attention to the most probably critical points that may affect the implementation performance in the future considering what’s known from the solution requirements. And most especially contextualize the proposed sizing on the adequate terms concerning optimized custom code or (if it really needed) extra scaling up the sizing for taking into account a very possible optimized custom code solution. In any case for very customized scenarios all sizing should be considered really as first test environments setups sizing, and any final sizing for production environments should come from dedicated benchmark results. Details around planned customizations Customizations impact analysis Details on external system integrations. If there’s already developed code evaluation on the code performance and possible optimization of the same code. Last but not least, we need to know the expectations around response time for the different operations being executed. And specifically the important value from sizing point of view will be in general the required response time for peak concurrency (also check the details on response times for the different operations). From a scalability point of view there might exist requirements around response time degradation with the variation of the different dynamical factors that constrain our solution: concurrent users, but also: repository size, architecture components, etc. Those types of requirements may demand from you a more scaled up/out sizing to cope with the near term possible variations that may affect in a negative way your solution and response times. The same requirements may also demand specific architecture solutions to cope with them. There is no perfect formula that can be applied to determine the appropriate sizing for every scenario. Sizing and capacity planning depend of several important factors that change from project to project such as: Number and type of customizations External systems integrations User Behavior Network topology and infrastructure specific factors Only with dedicated benchmarks over the final solution on proper setup test environment (reproducing as accurate as possible production conditions, on functional and load terms) its possible to provide empirically tested values. The architecture on the diagram follows some of Alfresco best practices . It shows a horizontally scalable architecture with Alfresco user facing nodes (2 or more), dedicated tracking alfresco repositories local to the solr servers and a dedicated node for bulk ingestion of content. Check my blog post on solr tuning for architecture options in http://blogs.alfresco.com/wp/lcabaceira/2014/06/20/solr-tuning-maximizing-your-solr-performance/#comment-339 We will analyze each layer and provide the sizing variables relating those with the sizing information we’ve gathered previously. Be aware that: Network communication with the database is very important, latency should be < 5ms. Note that the formula are not taking in consideration additional space for logging, rollback, redolog, etc.(OOTB the number of meta-data fields in documents ins about 10 and folders is about 6) The Alfresco database and the filesystem where the content store resides are the brain and heart of Alfresco. Those are the 2 most important layers of every Alfresco architecture, if they are not working well, nothing else will work well. If your project will have lots of concurrent users and operations, consider an active-active database cluster with at least 2 machines. Most common throughput factor is transactions per second. DB performance in a transactional system are usually the underlying database files and the log file. Both are factors because they require disk I/O, which is slow relative to other system resources such as CPU. In the worst-case scenario (big databases, big number of documents ): Database access is truly random and if the database is too large for any significant percentage of it to fit into the cache, resulting in a single I/O per requested key/data pair. Both the database and the log are on a single disk. This means that for each transaction, the Alfresco DB is potentially performing several filesystem operations: Disk seek to database file Database file read Disk seek to log file Log file write Flush log file information to disk Disk seek to update log file metadata (for example, inode information) Log metadata write Flush log file metadata to disk Faster Disks normally can help on such sittuations but there are lots of ways (scale up, scale out) to increase transactional throughput. In Alfresco the default RDBMS configurations are normally not suitable for large repositories deployments and may result into: • I/O bottlenecks in the RDBMS throughput • Excessive queue for transactions due to overload of connections • On active-active cluster configurations, excessive latency Alfresco Database treads pool. Most Java application servers have higher default settings for concurrent access, and this, coupled with other threads in Alfresco (non-HTTP protocol threads, background jobs, etc.) can quickly result in excessive contention for database connections within Alfresco, manifesting as poor performance for users. If tomcat is being considerer this value is normally 275. The setting is called db.pool.max and should be added to your alfresco-global.properties (db.pool.max=275). http://docs.oracle.com/cd/E17076_04/html/programmer_reference/transapp_throughput.html 0. Concurrent users information is definitely on the top of the importance rank of information to gather for a proper sizing on the user facing nodes. People often mean considerably different things when they talk about concurrent users. An agreement is needed on the definition of concurrent user. Generically we consider here that a system with an average of N concurrent users will mean that in average for a period of time (30 to 100s think-time) the system will receive the requests from N different users. So the term of concurrent user to have meaning needs to have it clarified the think-time being considered. Smaller or bigger think-times being discussed will demand in general an extrapolation of the value to compare to reference cases. 1.Browse/Download/Write operations are those that do not execute searches. They basically will access the database and this database access takes cpu resources on this layer. The more Browse/Download and Write actions the more cpu power you need to have. 2. Components, Protocols and API: Some protocols will be more demanding than others and require a more scaled up or scaled out system to provide acceptable response times. In general some attention should be paid to some problematic protocols. In general this is not Alfresco’s fault but because of the protocols definitions themselves. From load point of view CIFS and IMAP are possibly good examples of protocols that affect performance. On the other hand other protocols and interfaces should be considered reasonably light in comparison like FTP and WebDAV. 3. Response Times: Depending on the expected response times you may have to adjust your sizing for this layer if they are to low. This is also be depending on the use case, but it’s a rule that normally apply to most use cases. Whenever you scale out your cluster adding more nodes you should not expect a linear scalability and therefore that the double of the load on a 2 times bigger (more nodes) cluster will necessarily deliver the same response time. In fact in most of the cases you should expect some degradation of the response time arising from some cluster cache synchronization extra load (this effect has been much reduced on latest Alfresco 4 versions). So to compensate this effect, keeping the same response time, it is important in general also scale up a little each node in your cluster. 1 node = 1 Quad-core ( 3.2Ghz – 64 bit ) The memory consumption is normally not very high on these nodes, start with a 6..8 GB heap and adjust it considering your monitoring data. Remember that bigger heaps can lead to long lasting Garbage collections and some “stop-the-world pauses” if the garbage collector is not tuned for your use case. You can also add more threads to Libreoffice allowing for some parallel work, this impacts the memory typically 1GB for each Libreoffice thread. The best way to size these nodes is to start with a conservative approach for example 1 CPU quad-core and 8GB of RAM and to setup a proper monitoring scenario gathering the relevant information for any necessary adjustments. These nodes offload important work for the user facing alfresco nodes and they do not consume a license as they don’t receive user requests. They are configured outside of the cluster/loadbalancer. Dedicated alfresco tracking nodes serve as a database and solr proxy, they are mostly used for FTS transformations. Operations: Percentage of write operations. Document Details: types, sizes and distribution ratios Memory is impacted by the number of documents and transactions on the documents. Note that these nodes normally have their own JVM and application server instance, separated from the solr application server and JVM. Memory is impacted by the Number of documents and transactions on the documents. Collaboration use cases will so be in general more demanding in principle (keeping the other mentioned factors constant) than backend use cases with simpler authority structures. What do we mean by Authority Structure? We mean how our user identities organize themselves from a permission control point of view. Basically, the named users and groups, and subgroups, structure. We will name as fairly complex authority structure, one with considerable number of hierarchy levels in the group structure with the users belonging to many different groups. On the opposite side we will say it’s a very simple authority structure one with a very reduced number of users (most system users) with each user belonging to a fairly small number of groups (5 or less). As we said real users corresponding to organization charts usually have a complex authority structure (teams, projects, departments, etc). This is a typical scenario for collaboration use cases. While cases where Alfresco is used as backend without permission control responsibilities will have in general the most simple authority structures. For those cases the ones most affected will also be the ones for which the user-group authority structure is more complex, with users belonging to many groups in average. If your case does not fit the scenarios just described a larger repository size wont probably affect the performance of your system in a such determinant manner. At the same time it’s worth to notice that some organizations may impose performance requirements over average operation response times but also limit values for specific operations. For those cases even if search operations for example may represent just a small portion of operations executed they must be taken into account from sizing point of view in order to fulfill the organization requirements. The solr nodes are the one’s that need more memory. Indexing impacts CPU usage, but the memory is the most impacted factor on these servers. Solr performance depends on the cache, bigger repositories require more memory (bigger caches) Also take in consideration the search ratio, the formula is generic, you may have to adjust the memory based on your project search ratio. Mention the possibility of having 2 servers, each indexing one core. Or several servers load-balancing the search request and each one holding a copy of the index with its own tracking server.Also a possibility is to use the new index replication feature , allowing for logical separation and independent tuning on the search and index layers of Solr. When there are scheduled and frequent bulk ingestion processes it makes sense having a dedicated bulk ingestion server. Content ingestion consumes application server threads (and cpu) , having a dedicated bulk ingestion node offloads that work from the main (user facing nodes) maximizing resource usage for real user interactions. Memory consumption is generally low, normally a heap of 4G is enough. No need to cluster caches from this server with the front end. Background index properties and/or content, indexes will catch up from DB transactions. Benefits: No Cache update/invalidation overhead. To exclude servers(s) from cluster, do not set cluster name for bulk load servers in alfresco-global.properties alfresco.cluster.name= During the ingestion process we expect most of the load to occur on the database, the shared file system (I/O) and the user facing Alfresco nodes. Rule of thumb: Prefer scale up over scale out as it provides simpler deployment and management. Beware of network latency to RDBMS, Alfresco to Database is Key, Latency is key e.g. > 5ms is absolute max The performance of the storage where the content store resides is vital for the Alfresco overall performance.We recommend a fast storage (RAID5) shared with SAN and connected with the alfresco server via optical fiber or, as an alternative, 100GB Ethernet connection. The high availability and scalability for the binary content storage layers is vendor dependent. We support different binary content storage for dedicated advanced file systems/servers. swf is >10 * bigger than source (small text) to source is > 4 * bigger than swf (medium .doc) Alfresco use cases vary considerably because of the elasticity of the platform. The details on which each real implementation differs may be very important from an architecture and sizing perspective. Lets check the differences on 2 common use cases : Collaboration and Backend Repository Generically we expect some differences between each of those generic cases but bear in mind that only the details of your use case will give you sensitivity on which aspects really matter for your case and which differences do not apply for you. NOT FOR PRESS ------------------------ A correspondence between backend shorter think-times concurrent users with generic concurrent users (60 to 100s think-time) may be needed to compare to collaboration sizing references, although care should be taken since collaboration concurrency is usually more demanding (different users, many groups per user). Most Java application servers have higher default settings for concurrent access, and this, coupled with other threads in Alfresco (non-HTTP protocol threads, background jobs, etc.) can quickly result in excessive contention for database connections within Alfresco, manifesting as poor performance for users. If tomcat is being considerer this value is normally 275. The setting is called db.pool.max and should be added to your alfresco-global.properties (db.pool.max=275). After increasing the size of the Alfresco database connection pool, you must also increase the number of concurrent connections your database can handle, to at least the size of the Alfresco connection pool. Alfresco recommends configuring at least 10 more connections to the database than is configured into the Alfresco connection pool, to ensure that you can still connect to the database even if Alfresco saturates its connection pool. Version 5 will have new values for this. Considering our existing customers, the biggest running repositories are under Oracle (most of them RAC). Active-Active cluster can be achieved using Oracle RAC or a Mysql based solution with haproxy (opensource solution) or a commercial solution like MariaDB or Percona. You can use either solution, depending also you the knowledge that you have in-house. At this layer we don’t recommend to use any virtualization technology. The database servers should be physical servers. The high availability and scalability for database is vendor dependent and should be addressed with the chosen vendor to achieve the maximum performance possible. Next I present you with a series of Golden rules that you can apply on each of the layers we’ve previously discussed No document text extraction occur on these nodes. That operations are taken by the dedicated tracking alfresco on the Solr server, this is one of the reasons for having a dedicated tracking alfresco instance as it offloads the user facing alfresco for the text extraction work that can be resource consuming depending on the size of the documents. To create documents previews and thumbnails Alfresco needs transform some of the content into little PNG files for preview purposes. When the Transformation server is not being used Alfresco is responsible for this transformations, for which it uses Open Office that can be heavyweight and resource consuming. Transformations for previews and thumbnail generations, note that when the Alfresco transformation server is being used it will take care of all MS Office documents thumbnails and preview transformation but the rest of the mimetypes will still be handled by these nodes. Transformations via PDF: Both oo.org and ImageMagik are used) thumbnails and SWF (via PDF: Both oo.org and pdf2swf.exe are used) User operations take application server threads. The more concurrency the more threads will be occupied and the more cpu will be used. Size the maximum number of application server threads (and the number of cluster nodes) according to your expected concurrency. Note that each thread normally holds a database connection, so concurrency impacts both alfresco cluster nodes and the database. Find the exact number of nodes in the store (N), exact number of transactions in the repository (T), number of ACLs (A) and related ACL transactions in the repository (X). Since everything scales to the number of documents in the index, add the Index control aspect to the documents you do not want in the index. Aim is to define common standard figure that can empirically define the capacity of a repository instance. Aim is to define common standard figure that can empirically define the capacity of a repository instance. This methodology helps on defining a common standard figure that can empirically define the capacity of a repository instance. The name (C.A.R.) stands for "Capacity of an Alfresco Repository" Decreasing ERT means the necessity to increase the capacity of the alfresco repository server. In average for a period of time ("The think time") the system will receive requests from N different users. Fine-grain our definitions considering that “Create/Update” operations are most resource consuming than “Read and Delete” on both repository and on the database server. OOB Alfresco also provides feature to enable and/or disable selected sub actions for content auditing. This would be required when you want to perform track content auditing for specific action only.For example, configurations required to enable only READ audit action and basic audit logging in Alfresco 4.01. Add below configurations in alfresco-global.properties audit.enabled=true audit.alfresco-access.enabled=true audit.alfresco-access.sub-actions.enabled=true audit.filter.alfresco-access.transaction.action=READ;~updateNodeProperties;~addNodeAspect;~UPDATE CONTENT;~CREATE;~CHECK OUT;~CHECK IN audit.filter.alfresco-access.transaction.sub-actions=readContent;~updateNodeProperties;~deleteNode;~createNode;~createContent;~checkOut;~copyNode2. Add below configurations in log4j.properties log4j.logger.org.alfresco.repo.audit.access.AccessAuditor=debug log4j.logger.org.alfresco.repo.content.transform.TransformerDebug=trace The formula shifts and may be adapted with more ERT Objects that define the use case for fine tuned predictions. Sizing your alfresco platform Sizing your Alfresco • Who am I • Presentation Objectives • Sizing Key questions • Sample Architecture • Sizing the different application layers • Luis Cabaceira, Technical Consultant at • 13 years of field experience • Helped clients in various fields on architecture and sizing decisions Government & Banking & Manufacturing Media Publishing Objectives of the presentation • Explain sizing key questions that will drive • Some Architecture best practices • Explain the impact of system usage on the different application layers • The information provided on this presentation is based on Alfresco internal benchmarks as well as our field experience in various • Sizing predictions should be validated by executing dedicated benchmarks. • Monitoring your solution will also help on validating your sizing predictions allowing for incremental and continuous improvement 3 required sizing topics • The most important topics are • Use Case • Concurrent Users • Repository documents • In many cases organizations are not able to provide the answers to the other questions and you have to build Extra sizing topics The more information you have about your scenario the more accurate will be your When available you should get information on the topics explained on the next slides to complete the information gathering stage. All operations in Alfresco require a database connection, the database performance plays a crucial role on your Alfresco environment. It’s vital to have the database properly sized and tuned for your specific use case. Content is not stored in the database Database size is un-affected by size or the document's content Database size is affected by the number/type of metadata fields Database Size calculation D = Number of Documents + Avg. number of DA = Average number of Metadata fields per F = Number of Folders FA = Average number of Metadata fields per Folder Dbsize = ((D * DA) + (F*FA)) * 5.5k Add 2k for each user and 5k for each group User facing nodes sizing The repository user-facing cluster is dedicated on serving the usual user requests (reads, manual writes The most important factor that stresses these servers is the number of concurrent users hitting the cluster. Note that these nodes also do transformations to swf when a user accesses the document preview. User Uploads will also create thumbnail images. User facing nodes sizing factors Operations: Percentage of browse, download and Components, Protocols and API: Which components, protocols and APIs of the product are the users using to access these nodes. Response Times: The detail around response time User facing nodes calculations Considering our field experience and our internal benchmark values and assuming we assign a quad-core cpu to the node with a user think-time of 30s 1 alfresco node for each 150 concurrent users. Number of Nodes = N Concurrent Users / 150 If we assign 2 quad-core cpus to each node. 1 alfresco node for each 300 concurrent users. Number of Nodes = N Concurrent Users / 300 User facing nodes calculations By default Alfresco has only 1 thread configured for libreoffice, but the number of threads can be increased using the port numbers on jodConverter. If have lots of uploads and you need faster (concurrent) transformations, consider raising the number of libreoffice threads. Have this in consideration on your memory calculations for these servers, it takes typically 1GB for each Libreoffice thread. Transformation server can be an option. Dedicated tracking nodes sizing The dedicated tracking nodes exist on each Solr server and they are the only reference to Alfresco that Solr knows about. Note that they normally have their own JVM and application server instance. The dedicated tracking Alfresco instances perform. • Text extraction of the document’s content to send to Solr. (Alfresco api call) • Allow for local indexing (document’s do not have to travel over the wire during tracking) Dedicated tracking nodes sizing Normally these nodes do not have high requirements on memory and CPU but sizing will depend on the number of expecting uploads and transactions on the Indexing (Text extraction) impacts CPU and it’s API call that occurs exclusively on these nodes. Solr nodes sizing factors Recent benchmarks comparisons that authority structure has a direct and important impact on performance of SOLR. When sizing Solr we should analyze the types of searches that will be executed and the authority structure of the corresponding use case Solr nodes sizing factors Important to notice that repository sizes should mostly only affect average response times for search operations, and more importantly for certain kinds of global searches very sensitive to the overall size of the repository. This is the layer most affected by the increase on Solr nodes Calculations Use the online formula published by alfresco to calculate the necessary memory for your solr Note that the formula provided gives results for each core and it considers only one searcher. There can be up to 2 searchers per core, so the values you get from the formula you should multiply Total Memory = Result x 2 cores x 2 searchers Solr nodes Calculations To calculate the number of Solr nodes on your cluster you should consider the search response times, the frequency of the search requests and the size of your repository. There are several possible architectures for solr and corresponding sizing scenarios depending on your use case, also tuning plays an important role. You can expect the size of your indexes (when using FTI) to be between 40-60% the estimated size of your content store. Bulk ingestion nodes sizing Sizing the nodes dedicated to content ingestion is very similar to sizing the tracking nodes, these nodes do not take any user requests and don’t receive search requests but they do generate document thumbnails. Start with 1 cpu (quad-core). They are mainly database and solr proxys. They read xml files and there is few memory consumption. The load on this server will mostly impact Solr indexing and the dedicated tracking instances (text Bulk ingestion nodes tuning Disable unneeded services, many standard services are not required when bulk loading content Verify the existence of rules on target folder that can delay the speed of the ingestion and disable when Minimize network and file I/O operations Get source content as close to server storage as Tune JVM, Network, Threads, DB Connections. Content Store Sizing To size your content store consider • Number of documents (ND) • Number of Versions (NV) • Average document size (DS) • Annual Growth rate (AGR) Content Store Size (Y1) = (ND * NV * DS) If you have thumbnails and previews enabled also consider the pdf and swf versions of each document and the documents thumbnails Sample Real Life numbers SIZING AREA INFORMATION USE CASE Collaboration CONCURRENT USERS 600 REPOSITORY 4M docs/ Avg doc size is 3mb/ Ingestion Rate is 75000 docs /Year ARCHITECTURE High availability required on Solr and Alfresco user facing nodes AUTHORITY STRUCTURE 8000 named users, 100 groups, user belongs to 4 or 5 groups, Group hierarchy max depth 4. OPERATIONS Search/Write/Browse split is 10/10/80 Alfresco Share + DM + Sites. SPP, Integration with AD. CUSTOMIZATIONS IMPACT None BATCH OPERATIONS Ad Synchronization, External loaded dictionary data RESPONSE TIMES Not Defined Sample Real Life numbers ALFRESCO NODES CPU JVM MEMORY 2 2 Quad-Core 8 GB SOLR NODES CPU JVM MEMORY 2 1 Quad-Core 20GB 2 Common use cases Collaboration Backend Repository Collaboration vs Backend Repo • Search is usually just a small portion of the • User authority structure will be complex • Most uploads are • In most of the cases especially for very large repositories there wont be full text indexing/search • Authority structures will be in general fairly • Dedicated nodes for ingestion are normally Collaboration vs Backend Repo • Repository Sizes are usually of small or • Customizations in most cases will concentrate at the front end (Share). • Architecture options are in general the standard ones provided by Alfresco • Repository sizes are usually • Custom solution code may live external to Alfresco by using CMIS, public APIs, • Architecture options are normally more complex using proxies, cluster and unclustered layers, sharding of Alfresco repository, etc Collaboration vs Backend Repo • Concurrent users are normally quite high • Share interface is used, very common usage of SPP, CIFS, IMAP, WebDAV and other public interfaces (CMIS) for other interfaces (mobile). • Concurrent users are in general fairly small but think times are much smaller than for • Most of the load should concentrate around public API (CMIS) and custom developed REST API Collaboration vs Backend Repo • Batch operations should mostly be around human interaction workflows and the standard Alfresco • Batch operations will usually have a including content injection processes (bulk or not), custom workflows and Database Thread Pool A default Alfresco instance is configured to use up to a maximum of forty (40) database connections. Because all operations in Alfresco require a database connection, this places a hard upper limit on the amount of concurrent requests a single Alfresco instance can service (i.e. 40), from all protocols. Alfresco recommends to increase the maximum size of the database connection pool to at least [number of application server worker threads] + 75. Alfresco relies largely on a fast and highly transactional interaction with the RDBMS, so the health of the underlying system is vital. If your project will have lots of concurrent users and operations, consider an active-active database cluster with at least 2 machines. User facing nodes Golden Rules Browsing the repository using a client (share or explorer) performs Acl checks on each item present on the folder being browsed. Acl checks go against the database and occupy a thread in tomcat, causing cpu consumption. Consider having a max of 1000 documents on each folder to reduce this overhead. Add a transformations timeout and configure the transformation limits to prevent threads spending to much time doing transformations. User facing nodes Golden Rules User operations take application server threads. The more concurrency the more threads will be occupied and the more cpu will be used. Size the maximum number of application server threads (and the number of cluster nodes) according to your expected Include the Alfresco scheduled tasks on your cpu calculations, those also require server threads and User facing nodes Golden Rules Customizations on the repository should be carefully analyzed for memory and cpu consumption. Check for unclosed resultsets, they are a common memory The local repository caches (L2 caches) occupy server memory, size them wisely. Check my blog post on the alfresco repository Golden Rules – Solr memory To minimize memory requirements on solr : • Reduce the cache sizes and check the cache hit • Disable ACL checks. • Disable archive indexing, if you are not using it. • Since everything scales to the number of documents in the index, add the Index control aspect to the documents you do not want in the Capacity of Alfresco Repository How do can determine the throughput of my Alfresco repository server ? A ECM repository is very similar to a database in regards to the type of events that they manage and execute, specially when we think about “transactions per second” where a “transaction” is considered to be a basic repository operation (create, browse, download, update , search and delete) . “The maximum number of transactions that can be handled in a single second before degrading the Capacity of Alfresco Repository 3 more figures EC = The expected concurrency represented in number of users. TT = user think time represented in seconds ERT = Expected/Accepted response times The Expected Response Times OPERATION VALUE WEIGHT LAYER CPU MEM I/O Download 3 sec 20 Repo Write/Upload 5 sec 10 Repo/Solr/DB Delete 3 sec 5 Repo/DB Browse/Read 2 sec 50 Repo/Solr/DB Search Metadata 2 sec 10 DB/Solr Full Text Search 5 sec 5 Solr It’s an object representing the response times being considered including the weight of each type and the layer that it affects. It takes known repository actions Capacity of Alfresco Repository With the inclusion of new variables we can tune our C.A.R. definition and redefine it as. “Number of transactions that that the server can handle in one second under the expected concurrency(EC) with the agreed Think Time (TT) ensuring the expected response times(ERT) “. By configuring the Alfresco audit trail we can define our initial throughput (average transactions Predicting the future Re-evaluate your sizing introducing new factors. Take a dynamic / use case oriented approach to identify a formula, built on a system of attributes, values, weights and affected areas. Introduce one or more ERT objects representing use case specific response times and operations acting as influencers on the server throughput. Simple lab tests results We’ve executed some lab tests, one server running Alfresco and another running the database, simple collaboration use case on a repository with 5000 documents. Alfresco Server Details • Processor: 64-bit Intel Xeon 3.3Ghz (Quad-Core) • Memory: 8GB RAM • JVM: 64-bit Sun Java 7 (JDK 1.7) • Operating System: 64-bit Red Hat Linux • ERT = The sample ERT values shown before on the presentation • Think Time = 30 seconds. • EC = 150 users The C.A.R. of the server was between 10-15 TPS during usage peaks. Through JVM tuning along with network and database optimizations, this number can rise over 25
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107896778.71/warc/CC-MAIN-20201028044037-20201028074037-00067.warc.gz
CC-MAIN-2020-45
46,821
471
https://community.smartthings.com/t/play-a-message-remotely-on-sensor-trigger-through-alexa-voice/56946
code
So given the fact that Alexa and Smarthings work together to some extent, Im wondering if it would be possible to write an app that would make it possible to have Alexa play a message by sending sending a text message to it when a sensor is triggered. I found this: it has the source code for sending a message to Alexa and if the message was “Simon Says, Im leaving the office” then if my wife’s presence was detected at the house it would play on Alexa/Echo device the message “Im leaving the office”. Im also using an app called Macrodroid which is really nice, far friendlier and easier to use than other macro products out there: If the integration isnt possible within a smart app, Im wondering maybe it would be possible to just do it though a Macro App like Macrodroid. Yes it’s possible, using one of two different paths. The code for both already exists in the community. One, you can just stream to the echo as a Bluetooth speaker. You will need another device to create the files to stream and decide when to stream them. LANnouncer can do this, among others. Two, if you set up your own Amazon developers account you can take advantage of a very sophisticated Alexa skill which community members have created which let you both use the echo to make announcements and let you Query the status of devices and a whole bunch of other things. That one is called askAlexa. You will find both of these and more on the quick browse list for “voice” smart apps in the community – created wiki. Have fun. Also, Im not a programmer, so am looking for something that might be already available. One other thing that I wanted to say was I am using Lexa which is an android app that functions as an echo without having to actually have a physical Echo. Im sure this has been approached on various threads so I apologize if I am starting something that has been discussed a bunch. Yes as I said, lots of ways to do this with code already available in the community. No need to apologize, the forum has a ton of information but it’s often very difficult to search. That’s why the community – created wiki has the quick browse lists. You just pick the topic you’re interested in, like voice, and then it will pull just those topics for you. The ask Alexa solution is pretty complicated and does require significant technical skills. Most of the others, though, are standard smartthings custom code. Using that is pretty straightforward – – basically you’re just going to copy someone else’s code and paste it into your own account. Here’s the FAQ for that process: Then if that sounds like something you’d like to try, you can use a quick browse list to quickly find existing solutions by topic. In addition to the smart app and device type handler sections, there’s another quick browse section for project reports. Alexa Voice features are call and response, but the echo device is also a Bluetooth streaming speaker. That doesn’t require a call and response format. It does, however, require another device to stream to the echo and decide what and when to stream. Also, I don’t think that option is available just with Amazon voice services, I think you have to have the actual echo hardware, although I’m not sure on that one. So some community members have use this in the past to play voice announcements on an echo just as you would play a custom MP3 streamed from your phone. (Note that the following thread mentions landroid – that was the previous version of LANnouncer.) So it can be done, but there’s no question that the native feature that’s discussed in the verge article would be way easier to use. Under “limitations” in the wiki for Ask Alexa, it states that it cannot provide real-time alerts. Is this true? I’d like Alexa to be able to notify me when a door is opened, or presence is detected. I do not have an android and my Echo is at a different location. (vlc-thing and the Bluetooth option aren’t currently an option for me) @lalo This is still true, but we are getting closer. Just recently, Amazon enabled their calling feature which allowed you to call other Alexa users and ‘leave’ messages. This would have the Alexa ring turn green when a message is present or in a call. Then, a week later they finally announced that ‘alerting’ to messages (from developers) would be coming. This is for whole accounts; so whether you have 1 or 10 devices all will show that green light. So, unfortunately, you can’t specify a device within an account. If I had to guess, they will probably be able to eventually specify devices within an account, but just the light and gentle tone to alert to messages…not full on “wake up and start talking”. Ask Alexa gets a little closer to the ‘individual account’ thing by setting up individual message queues. So, when the message alerting comes online I can light up the message indicator. If I had a wish list, I would hope that I could specify color and individual devices, but I will take what I can get. As for alerting to doors opening, if you pair Big Talker with Ask Alexa you can ALMOST get what you want. And if you do have Sonos, it IS available now through my app. Hope that all makes sense. The next 4 weeks will be interesting and will get us closer. While it is cool to have the Alexa devices light up green when a new message comes in, I belive that flashing lights only in the room where the message is intend for, is more noticeble. As a custom skill, EchoSistant has been doing that for a few months. The person in the specific location has a few choices to play the incoming message. One can ask Alexa to ‘play the message’, or just simply ask Alexa ‘what’s up?’ If that’s the case then I don’t see this as a suitable solution. When a door is opened, I’d have to ask Alexa to play the notification in order for her to tell me a door opened? I’m more interested in having Alexa tell me the door opened without having to ask to play notifications
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558030.43/warc/CC-MAIN-20220523132100-20220523162100-00164.warc.gz
CC-MAIN-2022-21
6,016
28
https://www.technochops.com/the-many-types-of-scraper-apis-which-one-is-for-you/
code
There are several types of scraper APIs, each designed for a specific function. Thus, if you are in the market for one, it is vital to know beforehand what each of them offers to pick the right one. This article intends to help you by providing all the information you need. We will discuss the various types of scraper APIs and their uses. But first, what is a scraper API, and what are its features? What is a Scraper API? Features of a Scraper API Depending on the service provider, a typical Scraper API has the following features: - A large number of IP Addresses - Proxy management and proxy rotation - Dynamic browser fingerprinting: This creates multiple unique users, thus preventing IP blocks or CAPTCHAs - Integration with third-party applications - Several data delivery options, e.g., sending the extracted data via the API or directly to a cloud container - Platform-agnostic capabilities: A scraper API can be accessed from any device, operating system, or application Types of Scraper APIs There are four main types of scraper APIs 1. General-Purpose Scraper API The general-purpose scraper API can be used for: - Travel fare aggregation - Job aggregation - Market research - Academic research - Website change monitoring - Lead generation 2. SERP Scraper API A SERP scraper API collects real-time data from search engine results pages (SERPs). This solution can collect data from major search engines, including Google, Bing, Yandex, Yahoo, and Baidu, just to mention a few. In addition, it can access and extract location-specific paid ad results for different keywords. And given that search results can vary based on the location, the SERP scraper API can undertake country, state, city, or coordinate-level targeting. The SERP scraper API can be used for: - Retrieving keywords for search engine optimization (SEO) - Tracking ads data - Brand monitoring - Collecting keyword-specific images - Content analysis to identify content that appeals to customers, helping you to come up with topics for your website’s blog - Competitor monitoring: by collecting data associated with a given keyword, the SERP scraper API can help you identify businesses that rank based on that term - Lead generation: You can use a SERP scraper API to retrieve companies’ contact information, especially if you want to establish a working relationship 3. Real Estate Scraper API A real estate scraper API is specifically designed to collect real estate data. This includes location-specific rental listings and prices, market reports, homes for sale by owners or agents, foreclosures, property managers, real estate agents, and more. The real estate scraper API is used for: - Identifying new investments and properties to purchase - Discovering market trends and projections - Optimize the price of your property based on market standards - Sentiment analysis based on homeowners’ reviews; you can, for instance, gather important data such as factors that make a neighborhood appealing, valuable features of homes in various neighborhoods, and amenities in a given location - Uncover geo-targeted advertisements of real estate property: the built-in proxies enable you to collect geo-targeted ad data from any location 4. E-Commerce Scraper API An e-commerce scraper API localized real-time product and pricing data from online shopping websites. It can also be used to collect review data. And given that e-commerce sites are notorious for being overly complicated, this solution can handle the complex web structure and retrieve organized data on your behalf. The e-commerce scraper API can be used in the following ways: - Gathering product data - Competitor monitoring - Review monitoring - Collecting pricing data - Harvesting data about available stock - Identify potential suppliers, e.g., third-party sellers There are four main types of scraper APIs. If you want a solution that extracts data from most websites, select a web scraper API. Conversely, if you want to collect product and pricing data from online shopping websites, the e-commerce scraper API is the most appropriate solution. The same goes for situations where you want to extract data from search engines or real estate sites. In such cases, select the SERP scraper API or real estate scraper API, respectively.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816586.79/warc/CC-MAIN-20240413051941-20240413081941-00036.warc.gz
CC-MAIN-2024-18
4,291
48
https://community.magento.com/t5/Magento-1-x-Theming-Layout/Product-Grid/td-p/85359?nobounce
code
Having an issue with the product grid still. No matter what i have tried, it seems as though the grid stays at the 4x1x4x1 etc.. Is there anything i can do for this? Hi, looking into this, Rebecca's description of your problem is still accurate https://community.magento.com/t5/Theming-Layout-Design-Questions/Product-Layout-HELP/m-p/85193/highl.... The code that manages the width, margin and padding of product grid items needs changing to ensure that 5 can fit on a row. It looks like you have a problem regardless of screen size. Thanks for your reply. I have tried changing the code, like Rebecca had stated. Unfortunately, the code for site has something wrong with it. No matter what i have changed it does little to nothing for the grid. Unfortunately, it is the code that needs fixing so you will need to find a developer with more CSS knowledge in order to resolve the problem.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267866965.84/warc/CC-MAIN-20180624141349-20180624161349-00066.warc.gz
CC-MAIN-2018-26
887
4
http://my.impress.ly/qyhuh754.php
code
All our videos are tidily kept in categories. We can't be held responsible for your actions. In addition, to the best of NameThatPornstar. You want it, we got it! We are not acting in any way to send you this information; you are choosing to receive it! Enjoy your visit and feel free to let us know what you think! Some images used on NameThatPornstar.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335034.61/warc/CC-MAIN-20220927131111-20220927161111-00687.warc.gz
CC-MAIN-2022-40
353
4
https://www.reblaze.com/wiki/general/what-is-captcha-and-recaptcha/
code
For decades, web applications have suffered the consequences of malicious bot traffic. Bots can be coordinated to gather data from a site, abuse mechanics of a site, or even disrupt its services with a full-scale DDoS (Distributed Denial of Service) attack. To combat the increasing threat of bots and enable bot management, experts developed CAPTCHA and reCAPTCHA tests, designed to tell humans apart from bots. For many years, they were gold standards in bot mitigation, but today, they are not as attractive as they once were. What exactly are these methods, and what are their strengths and weaknesses? What Is CAPTCHA? CAPTCHA is a contrived acronym for “Completely Automated Public Turing test to tell Computers and Humans Apart.” It’s a kind of reverse Turing test. In a Turing test, a human judge attempts to discern whether a subject is a computer or human; the computer “passes” the test if it deceives the human judge. With CAPTCHA, a computer attempts to discern whether a subject is a computer or human; the human “passes” the test if it completes a task successfully. How It Works Conventional CAPTCHA tests take the form of a distorted image of a word (or phrase) on the user’s screen. These phrases are randomly generated, and fully automated—requiring no manual intervention to deploy. The human visitor to a site must enter the words to solve the problem; if they enter the words successfully, they “pass.” This test was originally almost impossible for bots to solve, effectively weeding them out. There are three major reasons why this was the case: - Variable letter shapes and sizes. CAPTCHA words tend to be highly distorted, with letters being warped so they can’t be easily discerned by automated bots. However, to a human, it should be easy to identify a letter even if it’s somewhat distorted. - Spacing and segmentation. Characters in CAPTCHA words tend to be crowded close together, making it hard for a bot to tell where one letter ends and another begins. Again, to a human, this task is trivial. - Context and identification. Human beings are good at identifying words as a whole, rather than identifying each individual letter like a bot would. However, a bot may struggle to read a word without seeing each letter clearly. Over the years, CAPTCHA has introduced more advanced puzzles, including general knowledge questions and notably, visual identification puzzles. For example, a human user may be asked to identify images that contain a specific object. What Is reCAPTCHA? reCAPTCHA is a network of human verification systems similar in nature to CAPTCHA, owned by Google. Initially, this system was designed with CAPTCHA-like puzzles, but with a twist—the puzzle words were scanned from books that needed to be digitized, serving as a way to crowdsource illegible word analysis. How It Works For the most part, simple reCAPTCHA puzzles function like CAPTCHA puzzles. reCAPTCHA also provides image identification puzzles, prompting users to identify images that contain specific things, like street signs or fire hydrants; this is used for Street View analyses. Why CAPTCHA and reCAPTCHA Are Increasingly Harmful to User Experience CAPTCHA and reCAPTCHA may be somewhat useful at filtering bot traffic (though not universally so—more on that later), but they tend to be annoying for users. If used improperly or excessively, they can detract from the experience of users on your site. - The extra step. Most people don’t want to have to solve a puzzle before completing a transaction or accessing content. Though a typical CAPTCHA puzzle only takes 10 seconds for a human to solve, in the fast-paced world of the web, that’s a relatively long time. - Inscrutability. Most people wouldn’t mind solving a quick puzzle if it were truly quick. Unfortunately, the very mechanisms used to deceive bots can also make a CAPTCHA puzzle inscrutable to a human being. You may have encountered this in your own life; have you ever seen a CAPTCHA word that was practically impossible to decipher? - Increasing difficulty. The difficulty of CAPTCHA and reCAPTCHA puzzles is also increasing. A decade ago, the most complex task you’d be asked to do is typing out a simple word. Today, you might spend a minute or more trying to identify Japanese street signs, wondering whether a tiny corner of a sign in an image means that the image “contains” a sign. - Disabilities. CAPTCHAs are difficult enough for people with conventional vision and motor skills. For people with disabilities, they’re even harder. CAPTCHA puzzles could decrease the accessibility of your site. Why CAPTCHA and reCAPTCHA Are Increasingly Ineffective You might tolerate the negative user experience associated with CAPTCHA puzzles if they were guaranteed to catch all non-human or illegitimate traffic. The unfortunate reality is that they aren’t. In fact, they’re getting worse as bot detection methods, for several reasons: - History and familiarity. CAPTCHA puzzles have been around since 2000, so hackers have had plenty of time to adapt to these puzzles. More advanced CAPTCHA puzzles introduce new, more challenging problems to solve, but they still follow many of the same principles. - Machine learning and AI. We also need to consider the emergence of machine learning tools and artificial intelligence (AI). Today’s machine learning technology can easily be trained to solve CAPTCHAs and reCAPTCHAs with 70 percent accuracy or higher. In fact, CAPTCHA puzzles serve as great training fodder for these advanced systems. Given enough time, even a rudimentary AI can learn to beat the best CAPTCHA puzzles available. - Sweatshops and manual labor. Some CAPTCHA puzzles can be beaten without the help of bots or machine learning; instead, the work of solving CAPTCHA puzzles is outsourced to cheap human labor. These practical sweatshops can have dozens of people staring at screens and solving puzzles all day to get around the traffic limitations and verification potential of the CAPTCHA system.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00381.warc.gz
CC-MAIN-2023-14
6,048
27
https://3dpe.org/forum/1
code
A.K.A the vast majority of 3dPE dev time otherwise i'm waiting for nothing, although this community is still nice i guess No longer prototype! tell me what you want! clever subtitle, related to AI putting the "item" in "3dpe" This means you, partially such connectivity, much uptime, wow IRC gives very little EXP
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347434137.87/warc/CC-MAIN-20200603112831-20200603142831-00072.warc.gz
CC-MAIN-2020-24
313
9
https://hardforum.com/search/5963470/?c[users]=Stanley+Pain&o=date
code
4k requires a fast I/O subsystem. Thankfully good + fast NVMEs exist ;). Even on the cheap you could RAID0 together 3 or 5 cheap SATAIII SSDs for some scratch space. To add a beefier CPU will help in certain situations too. Depends on what your current storage hardware is like. Best set of IEMs I've ever had. If you can find these or the w40s for a decent price I'd highly recommend them. I hate to pile onto this conversation but HDMI audio out to an AVR is actually the superior way of doing audio on PC. @OP. I get what you're trying to do I had an analog setup like that for years maybe like a decade and a half ago :P. I was even using a sound card maybe 5 years ago now. Then I... So I did some reading about stablebit and DrivePool and it seems ok. If you've been using that it should be fine to continue using it. Get Windows 10 Pro for Workstation (since it can do REFS) and call it a day maybe? I've never been fond of Windows for file server type stuff though. For once I have to agree with the Linux zealots here. Install Linux, use ZFS, never look back. Getting a Windows server license is going to be costly and isn't going to net you much, unless you want Storage Pools + HyperV. I've used FreeNAS, Windows Server and Linux w/ ZFS and there's no way... Anyone arguing against Windows Defender doesn't know wtf they are talking about. Especially in the Enterprise market, but equally so in the Desktop environment. Installing 3rd party AV software these days actually increases your attack vector. Too many CVEs out there with full remote code... KDE Manjaro is what I run on my Desktop. I really like it. I am very tempted to try KDE Neon, because bleeding edge KDE on LTS stability has me kinda intrigued and I haven't started fresh on a Linux in a while. Gotta say KDE is by FAR my favourite DE. Super customizable and really REALLY good fractional HiDPi support. It's also come a long way in the theming department. It's rare to run an app that doesn't look right these days. GhostCow, don't bother with BSD unless you have a very specific reason to... Holy fuck the derail in this thread because someone said something bad about their favourite flavour of computing. The LZDF (Linux Zealot Defense Force) is out in full force here. Just as much as I hate people spouting off about religion, I hate people spouting off about what OS I should be... WTF do you mean by you people? WTF are you even babbling on about with this? Please tell me you're not arguing from some asinine position of Windows vs Linux or something equally as juvenile If you properly disable updates on Windows 10 (Moreso if you're running Workstation/Enterprise) MS isn't... Are we seriously using AMDFLAWS.com as gospel ITT? That site redirects to CTS-LABS with no info about any of those flaws after a cursory glance. Are there any actual CVEs for any of those flaws? My understanding is the majority of those exploits' requirements were already in LOLPWNED territory.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655247.75/warc/CC-MAIN-20230609032325-20230609062325-00174.warc.gz
CC-MAIN-2023-23
2,962
20
http://misscherminn.blogspot.com/2008/10/im-back-in-town.html
code
Finally, PMR is over now is just the results which i so do not want to think about right this moment. After PMR was over which is now i feel so bored. I'm still not use to not study and all after for the past few months i have been studying and busy with this and that but now i have nothing to do . I can't wait for my genting trip which is next tuesday! Me and my friend are gonna have a fabulous time =) Oh yeah, btw i just had my hair done im going to post a picture of me on my next Post. I'm by far sastified with it. so, now at 12.12pm i'm in pyramid working and it's like super boring. So i thought i should blog. So let me see what i did this morning.. I woke up at 7am because i was sneezing like crazy and i couldnt take it so i woke up and played with the computer and than i posted my postcard and can't wait to get some back =) well that's about it i'll add more up later.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867050.73/warc/CC-MAIN-20180624180240-20180624200240-00264.warc.gz
CC-MAIN-2018-26
886
18
http://stackoverflow.com/questions/1361817/phps-dom-createtextnode-escapes-some-characthers
code
I am using dom->createTextNode() in PHP. I see that it automatically escapes characters e.g \/"" etc. According to the PHP's manual this is a standard behavior. Is it possible that it doesn't escape any characters? If some characters are not escaped, you might not get a valid XML file, in the end. Though, note that you will get that kind of things (well, CDATA sections) in your XML : If you can avoid the escape sequences by creating a DomDocumentFragment node and appending raw text with the appendXML() method: However I don't think you can necessarily access the DOM of this raw text without reloading the document. Also some characters are still not allowed in. I needed to do some string processing to insert some php into an html document using this method:
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930866.66/warc/CC-MAIN-20150521113210-00129-ip-10-180-206-219.ec2.internal.warc.gz
CC-MAIN-2015-22
766
6
https://www.research.manchester.ac.uk/portal/nikita.a.sidorov.html
code
I am a Lecturer in Pure Mathematics , a member of the Dynamical Systems research group at the School of Mathematics My academic qualifications are: - Ph.D. in Mathematics, Steklov Mathematical Institute at St. Petersburg - M.Sc.in Mathematics (Summa cum Laude), St. Petersburg State University , 1992. Employment to date 11/04 – present: Lecturer in Pure Mathematics 11/01 – 11/04: Named Research Associate in the Department of Mathematics at UMIST, Manchester. 11/98 – 11/01: Research Associate in the Department of Mathematics at UMIST, Manchester 09/96 - 07/97: Postdoctoral fellow at the Institut de Mathématiques de Luminy , Marseilles, France. 09/92 - 09/96: Assistant Professor at Baltic State University of Technology, St. Petersburg, Russia.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347445880.79/warc/CC-MAIN-20200604161214-20200604191214-00118.warc.gz
CC-MAIN-2020-24
757
13
https://supersmashbros.fandom.com/wiki/Snake_(Super_Smash_Bros._Brawl)?oldid=20262
code
Solid Snake (ソリッド・スネーク, Soriddo Sunēku) is a character appearing in the upcoming Super Smash Bros. Brawl. Instead of using guns like in the real games, he'll be using explosives and the cardboard box used in the trailer. He is the first third-party character to appear in any Super Smash Bros. game. Based on the most recently released trailer, Snake will have an RPG (Rocket Propelled Grenade) that he will use during gameplay. Other footage hints at a thrown grenade attack. Snake has been seen using physical moves that look similar to those of Captain Falcon. Hideo Kojima, the creator of Metal Gear Solid, begged Sakurai to include Snake in SSBM, but it was too late to do it at that time.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396163.18/warc/CC-MAIN-20200527204212-20200527234212-00275.warc.gz
CC-MAIN-2020-24
713
3
https://community.trimble.com/thread/5532-trimble-business-center-fxl
code
Feature Definiation Manager v9.0 When loading the fxl file in order to process features, I get a message of "invalid file" and the fxl will not load. The fxl was created using "GIS get scema". I have edited the "Code" within the fxl to match the codes used in the trimble data collector. What could be the problem?
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400212039.16/warc/CC-MAIN-20200923175652-20200923205652-00090.warc.gz
CC-MAIN-2020-40
314
2
https://www.vskills.in/certification/certified-wordpress-developer-ldap-and-ad-integration
code
Your shopping cart is empty! Additionally, you’ll need to decide how Simple LDAP Login will or will not create new WordPress users on your system. The choices are: Authentication in LDAP is a two step process: The ldap_bind()function returns a boolean, which succeeds if the username and password were found in the directory. Here’s an example syntax: Note that the line reading: $ldap['ad_domain'] . '\' . $ldap['username']is what prefixes your username with the Active Directory domain. So if you typically logon to your network with MicrosoftBillGates, the domain is Microsoft. The \ is the escaped backslash character. It is a special symbol, so don’t forget to escape it! $ldap['ad_domain'] . '\' . $ldap['username'] Using this information, we can modify the wpDirAuth plugin to work with our Active Directory. Pare it down to only use Active Directory (you don’t need the OpenLDAP stuff around line 300), and look for any instances of ldap_bind(). Make sure the username is prefixed with the domain and escaped backslash. You don’t need the prebound / prebinding stuff. When you’re done with that, install and activate the plugin. Set the Directory Servers and Base DN in the Admin settings, the rest should be okay.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258862.99/warc/CC-MAIN-20190526065059-20190526091059-00087.warc.gz
CC-MAIN-2019-22
1,234
9
https://docs.gamebench.net/docs/release-notes/pronet-windows/v0-7-0/
code
22 Apr 2022 - RTT metrics now gather data from 3 different endpoints simultaneously. - Added new session summary window on stop recording. - Added configurable tags, which can be selected in the session summary window. - Added shortcut (F12) to start and stop recording. - Executables are now signed correctly with windows certificate. - Rebranded tool as ProNet Windows. - Fixed issue with usernames being case sensitive. Last updated on
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100264.9/warc/CC-MAIN-20231201021234-20231201051234-00722.warc.gz
CC-MAIN-2023-50
438
9
http://www.un4seen.com/doc/bassasio/BASS_ASIO_Monitor.html
code
Sets the direct input monitoring state. |input||The input to set the monitoring state of... -1 = all. |output||The suggested output for the monitoring. |gain||Suggested output gain... ranging 0 (silent) - 0x7FFFFFFF (+12 dB), 0x20000000 = 0 dB. |state||Monitoring state... 0 = off, 1 = on. Other settings may be possible depending on the drivers. |pan||Suggested output pan... 0 = left, 0x7FFFFFFF = right. If successful, TRUE is returned, else FALSE is returned. Use BASS_ASIO_ErrorGetCode to get the error code. |BASS_ERROR_INIT||BASS_ASIO_Init has not been successfully called. |BASS_ERROR_UNKNOWN||Some other mystery problem! Not all devices/drivers support monitoring. The output, gain and pan settings are also just suggestions, and may be ignored by the device/driver.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499857.57/warc/CC-MAIN-20230131091122-20230131121122-00073.warc.gz
CC-MAIN-2023-06
775
10
https://ayawata.com/home/aya-watanabe/
code
Hi, I am a web developer based on Vancouver in Canada. I am highly motivated and passionate about creating websites and apps that incorporate interactive design and modern technologies. Specializing in front-end development and devoted in creating websites with elegance and fashion, along with simplicity and allowing high capabilities; all in perfect harmony. I offer to constantly pursue and demonstrate new features and functionality with the aim to enhance quality and efficiency. If you would like to connect with me, please be sure to find me on LinkedIn or reach me via email. Information can be found on the contact page.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585183.47/warc/CC-MAIN-20211017210244-20211018000244-00026.warc.gz
CC-MAIN-2021-43
630
5
https://www.simplemachines.org/community/index.php?topic=32954.820
code
Want to get involved in developing SMF, then why not lend a hand on our github! Started by enik, April 11, 2005, 03:41:07 PM Quote from: john34516 on July 01, 2008, 05:20:12 PMcan you make the hide button work for smf2? 'quote' => array('code' => 'quote', 'before' => '[quote]', 'after' => '[/quote]', 'description' => $txt['bbc_quote']), 'hide' => array('code' => 'hide', 'before' => '[hide]', 'after' => '[/hide]', 'description' => $txt['bbc_hide']), Quote from: Rocks-HD on August 31, 2008, 01:05:29 AMWhen I go to PrintPage don't show me the text, I don't know why!it's the same of the I'am not logged! Quote from: EmiX11 on September 14, 2008, 07:30:44 PMHow cann i modify the hide tag special to don't link my download links inside hide tag? Quote from: ide on July 05, 2008, 04:36:40 PMI have same problems Quote from: Oliver.Z on September 21, 2008, 01:59:12 PMHello DIN1031,first thx for the MOD, nice work.I don't know someone has already asked.It's possible to change the MOD, that the area will be unhidden after X days ?Something like in a poll that run for a few days and then the user can view the results.Olli
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510225.44/warc/CC-MAIN-20230926211344-20230927001344-00086.warc.gz
CC-MAIN-2023-40
1,125
9
https://law.stackexchange.com/questions/92650/can-a-lease-last-forever
code
If two parties agree to a lease on real property, can the lease be binding in perpetuity if it lacks a termination date? Can the lease ever be rescinded because the lessor wishes to terminate the lease? 1See en.wikipedia.org/wiki/99-year_lease– Jon CusterMay 23 at 16:57 Leases without specific termination dates are fairly common, but they can terminate under various conditions, for example when one party gives notice, the tenant dies, the tenant violates some clause, etc. I expect that this is obvious enough that you already know this, so I don't understand exactly what your question is.– user6726May 23 at 18:27 What do the terms of the lease say about the lessor terminating? Suppose the lessor dies, or violates some clause.– Weather VaneMay 23 at 18:31 More detail and the jurisdiction are necessary to provide an answer. This is governed by state law and varies quite a bit from U.S. state to U.S. state. It also isn't real clear it this is a lease with perpetual term or just with an indefinite term. It depends on the termination provisions.– ohwillekeMay 23 at 19:57 @user6726 I wouldn't assume bad-faith, not just because I strive to be ethical, but because that's a rule on this site. I don't "know this" -- that's why I am asking. Specifically, are you saying that as a matter of law you can terminate a lease without a specific termination date merely because one party "gives notice"? Feel free to submit that as an answer.– Evan CarrollMay 23 at 20:29 A lease agreement can terminate for many reasons. One of them is that the lease specifically states a termination date. Another is that there could be a clause allowing unilateral or bilateral termination, e.g. "the parties may mutually agree to terminate the lease", or "tenant may terminate the lease by providing 30 days notice". There can be other statutorily mandated grounds, such as the tenant being shipped out in the military, being harassed by the landlord, the premise being unsafe. If you don't pay rent, or if you run a meth factory (among other activities) the lease can be terminated. Certain perpetual leases may be impossible in some jurisdictions, for example in Washington, a residential lease without a specific termination period is construed to be a month-to-month lease (it terminates every month, possibly subject to renewal). I don't know of a state that allows perpetual residential leases. One might have a commercial perpetual lease, where the tenant can automatically renew the lease at the end of each period (which could be 5 years). If you don't have any stated termination period whatsoever (and the maximum duration of the lease is not statutorily stipulated), the law is "generally skeptical" about such perpetuities, see Ginsberg v. Gamson for discussion. However, "courts will enforce a lease provision that grants a tenant the right to unlimited renewals, so long as the parties' intent to create that right is explicit and clear". A contract will be construed to impose an obligation in perpetuity only when the language unequivocally compels such a construction. If the agreement fails to be crystal clear on the maximum number of renewals allowed, the court may find that, for example, only two renewals are possible (basically, looking at prior case law to see if there is some existing common law rule).
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00466.warc.gz
CC-MAIN-2023-23
3,329
9
https://petri.com/windows-7-editions-comparison/
code
With its planned upcoming release of Windows 7, presently slated for release in early 2010, Microsoft has released some information as to the different editions of Windows 7 that may be available for use by consumers for purchase, original equipment manufacturers (OEMs) and corporations for use in their enterprise as part of their open and / or volume licensing agreements through their reseller. [NOTES FROM THE FIELD] – A couple notes to point out. The first is the state of this information; it is important to remember that Windows 7 is still in beta release and this information as it is being provided is in a state of flux. Some of the different versions and editions of Windows 7 may be pulled or the details changed when the product formally releases to manufacturing (RTM) and then forward from there. This was the case with Windows Vista that started with four versions formally released and then more editions were added. Additionally, not every version listed is going to be available for consumer purchase or OEM purchase, etc. For example, you cannot presently go out and buy at a retail outlet a copy of Windows Vista Business. Same is true for Windows Vista Starter edition. With respect to the Windows XP family of operating systems Microsoft has formally released Home Edition, Professional Edition, Media Center Edition, Tablet PC Edition and Professional x64 Edition as outlined in Microsoft’s Windows XP Homepage. With respect to system requirements for XP Home and XP Professional, the Microsoft Windows XP System Requirements outline the following: [NOTES FROM THE FIELD] – No self-respecting IT professional would ever attempt to run a system with the minimum system requirements or the recommended system requirements other than to simply prove the installation would complete and the system would actually run upon completion. The x64 version of XP has different minimum system requirements than those listed above but most of the other editions are the same or vary slightly. With respect to Windows Vista family of operating systems Microsoft had formally released with four editions Home Basic, Home Premium, Business, and Ultimate edition. Since that time and for various reasons (some legal, some performance, and some for various other reasons) additional editions were released. As referenced by the Windows Vista Editions Comparison page, you can see a total of six versions available for use partially due to a legal settlement with the European Union and the anti-trust rulings there. This would be in reference to Home Basic N and Business N versions that do not include Windows Media Player and other media-related functionality preinstalled on the operating system. You can compare the main version editions at the Microsoft Vista Editions Comparison page. Also, you can read about the Vista Starter Edition at its homepage. [NOTES FROM THE FIELD] – As I mentioned before, not everyone everywhere can buy some of the editions. As this site points out “Windows Vista Starter is not available in developed technology markets such as the United States, the European Union, Australia or Japan. Windows Vista Starter ships on lower-cost computers sold by original equipment manufacturers (OEMs) and Microsoft OEM distributors in 139 countries.” Here is a summary of the system requirements for Windows Vista: Vista Home Basic should have a 1 GHz 32-bit (x86) or 64-bit (x64) processor installed with 512 MB of system memory and a 20 GB hard drive with at least 15 GB of available space. Additionally there should be support for DirectX 9 graphics and 32 MB of graphics memory. A DVD-ROM drive, Audio Output and Internet access are also listed there as “recommended.” Vista Home Premium, Vista Business and Vista Ultimate Editions list the following recommended system requirements: [NOTES FROM THE FIELD] – While all editions of Windows Vista can support multi-core processors, only Windows Vista Business, Ultimate, and Enterprise editions can support multiple processors. (More than one physical processor regardless of the number of processor cores.) With the beta of Windows 7 released and some of the roadmap laid out we do have some information to present on the suggested system requirements as currently available as well as some editions information with respect to the planned releases and versioning. Presently the suggested system requirements as outlined in the Windows 7 Beta Installation Instructions indicate: Additionally I have been able to research out the following details on the different editions planned as part of the Windows 7 release. Again, these are preliminary and with any beta release, subject to change. [NOTES FROM THE FIELD] – Don’t confuse “three concurrent applications” with the old “concurrent connections” from the desktop operating system limitations – this is different; this is effectively “three concurrent applications” running at the same time. All of the functionality listed above in Starter and Home Basic Editions [NOTES FROM THE FIELD] – I could not find real differences between Enterprise Edition and Ultimate in the Windows 7 information that I could reference. As an example, one main difference between Vista Business and Vista Ultimate is the All-in-one media center functionality of Ultimate which allows the end user to leverage Windows Media Center and Media Center Extenders. Business edition does not support this functionality. There are other subtle differences as well. I could not find any delineation details in the information I referenced for Windows 7 editions between Business Edition and Ultimate Edition. So that is a wrap on my Windows 7 Editions Comparison article. I hope you found it informative and a good investment of your time. As always, I welcome any feedback that you might have this or any other articles I have written and I am always interested to hear your suggestions for future articles so please keep that email coming.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100525.55/warc/CC-MAIN-20231204052342-20231204082342-00812.warc.gz
CC-MAIN-2023-50
5,985
28
http://community.spiceworks.com/topic/278778-saving-or-replicating-a-file-in-two-locations
code
Our CEO likes things simple but sometimes to make things simple for him, it's pretty tough. Case and point. We just purchases a Microsoft Surface for him. In addition to CEO, he is going to be county judge for the next two years, so he wants to work on the go sometimes. His laptop at work is on XP, so I couldn't load the SkyDrive app on it. So, what' I did was load skydrive on a development server and in a round about way, I replicate his work PC's documents that way. Now, he want's instant access to two excel files on our server. VPN would confuse him, so I thought about going the SkyDrive route. I am looking for a way to replicate two excel files to the SkyDrive folder. Basically, when they save the excel files at their normal locations, I want a second copy to go to his SkyDrive. Looking for the easiest way to automate this and get copies of those two spreadsheets to his SkyDrive folder for syncing. Any suggestions?
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500825174.42/warc/CC-MAIN-20140820021345-00208-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
932
5
https://forums.developer.nvidia.com/t/cuda-on-opensuse-version-numbers-for-opensuse-and-cuda/14544
code
I’ve been working with CUDA in Windows and want to port my work to Linux, specifically OpenSUSE. I downloaded the latest OpenSUSE version, which is 11.2, but the latest CUDA code available is only for version 11.1. I notice there are 5 different versions of OpenSUSE supported by NVidia, but only up to 11.1. A similar situation exists for other Linux versions. I tried to compile the sample CUDA programs but got compilation errors. My paths are set up, and running nvcc -V returns a valid version number. It seems counterintuitive to me that the Toolkit and SDK codes would be so highly dependent on even small changes in the Linux version number. Do I need to wait for a matching version number, or will the 11.1 CUDA code work with the later OpenSUSE release?
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655892516.24/warc/CC-MAIN-20200707111607-20200707141607-00368.warc.gz
CC-MAIN-2020-29
765
2
https://devblogs.microsoft.com/visualstudio/visual-studio-2019-v16-8-preview-3-1/?WT.mc_id=DOP-MVP-4025064
code
New Features in Visual Studio 2019 v16.8 Preview 3.1 In conjunction with Ignite 2020, we are releasing Visual Studio 2019 v16.8 Preview 3.1. Our events always bring an excitement to our team as we launch new functionality to our product. In this release, we are giving you access to improvements in Git Integration, C++20 conformance, .NET Productivity, Web Tools, and XAML . We can’t wait to hear how these features impact your work for the better. Equally, we love to hear how we can strive for constant improvement through our Developer Community. While taking in one of our free Ignite 2020 sessions, why not download our latest Preview release and give some of these new features a try? GitHub Codespaces for Visual Studio GitHub Codespaces for Visual Studio is now available as a limited beta in Visual Studio 2019 Preview 3.1. This gives you an instant cloud development environment that lets you code from anywhere. You can use the features you love from Visual Studio 2019 in a codespace to develop, test, and deploy modern apps including ASP.NET Core web apps, .NET Core, CMake, and C++ console / library apps. GitHub Codespaces for Visual Studio is available to a subset of GitHub users that sign-up while in limited beta. Over time, more users will get access based on availability and sign up date. On a local machine, Visual Studio competes with other apps for resources with limits in CPU and disk space. With Codespaces, many of the CPU intensive operations like loading the solution, building, and debugging are offloaded to the cloud. This allows you to work on enterprise scale application without impacting your local machine’s resources. This also allowed us to dramatically reduce what we install locally when you’re building apps in a Codespace. Installing Visual Studio to connect to GitHub Codespaces takes minutes. Whether you are new to the team or on a new machine, getting a full development environment setup from scratch for a project can be challenging. Getting the configuration for a repository correct takes time. Worse, if something doesn’t work, you’re left wondering if you made a mistake or if the setup steps are out-of-date. Now, you can setup a development environment with a new command line tool called devinit. This allows you to define dependencies in code through a declarative format that versions with your source so it is always up-to-date in any branch of the code. Devinit supports a range of existing package managers to automatically and repeatably configure dependencies in a codespace. We’ve put together some resources so you can learn more about how to use devinit. We have been expanding and improving the support for Git source control workflows, with the new Git tools. In this latest preview, you can create new branches from Azure DevOps Work Items using the new ‘create branch’ dialog. Just go to the Work Items panel from Team Explorer and right click a work item to create a new branch from it. You also now have available a list of local Git repositories that Visual Studio detects and adds to the Git menu when you open a project, solution, or just a folder. You can also directly clone a repository and it gets added to this list. Selecting a repository from this menu opens the Git context in Visual Studio. You can then go to Solution Explorer to load the solution or folder you want. In addition, we’ve changed the default source control provider to Git, which is active when you install Visual Studio for the first time. It was previously TFVC. So now you will get the Git menu and tool windows available in your first launch without having to go to Tools – Options – Source control to change the setting. The C++ team is excited to announce that they’ve improved support for major C++20 features across the compiler, standard library, and IDE. You can now use Modules, Concepts, Coroutines, and (some of) Ranges all in the same project! The work we’ve been doing around C++20 Coroutines is now complete and available under /std:c++latest. When using C++20 Coroutines you should include the <coroutine> header. Support for our legacy behavior is available under <experimental/coroutine> and the /await switch. Read more details in our C++20 Coroutines blogpost. Also available under the /std:c++latest are feature-complete C++20 Modules. This includes header units and experimental MSBuild support. What makes this exciting is that this will work out your module dependencies automatically and ensure they are built in the right order. Far more details are available in the team’s C++20 Modules blog post. Also landing in this release is support for the majority of C++20 Ranges. The big highlights are support for most of the range-based algorithms. Though, rest assured, we are still working tirelessly to complete the remaining. Feel free to track our progress on this GitHub issue. STL Features and Optimizations Outside of Ranges, this release brings several new STL features and optimizations. Some examples include: - std::atomic_ref<T> allows you to perform atomic operations on non-atomic objects. - Our std::midpoint and std::lerp implementations are now constexpr. - std::execution::unseq indicates that an algorithm’s execution may be vectorized on a single thread. - We’ve hand-vectorized our std::reverse_copy implementation As always, we document all of the STL updates in our Changelog. IntelliSense now provides support for C++20 <concepts> and <ranges> headers, and rename and browsing for concept definitions. We do have a known issue that we expect to address in Visual Studio 2019 v16.8 Preview 4. While we are on IntelliSense, we’ve added new warnings and quick-fixes based on an IntelliSense-driven code linter. Use Tools>Options>Text Editor>C/C++->CodeStyle->Linter + Fixups to configure this to your liking. You’ll be able to get warnings and fixes for arithmetic overflow, uninitialized local variables, converting the result of an integer division to float, and more! Our code analysis tools now support the SARIF 2.1 standard: the industry standard static analysis log format. Behind the scenes, SARIF 2.1 powers the MSVC code analysis experience in Visual Studio, including error list population in both regular and background code analysis runs, green squiggles and fix-its. In the near future, we plan to improve the IDE experience further by color coding the squiggles according to severity level (Info/Warning/Error) of each defect based on information in the SARIF logs. You can read more about the format SARIF format in the official specification. C11 and C17 Support All required features of C11 and C17 are now supported using the /std:c11 and /std:c17 switches. This includes: - _Noreturn and <stdnoreturn.h> - _Alignas, _Alignof and <stdalign.h> - _Generic and <tgmath.h> support It is important to mention that the optional features are not supported, so we do not claim C99 compliance. Learn more in our C11/C17 blogpost. Debug Linux Core Dumps If you run a “Windows shop”, but deploy to Linux servers, you may find this next feature quite exciting. You can now debug Linux core dumps on a remote Linux system or WSL directly from Visual Studio. This will help you diagnose crashes in a familiar environment. Speaking of Linux, we’ve improved our error reporting for missing build tools on Linux projects. Previously you would encounter a lot of errors when compiling, debugging, or using IntelliSense. The warning in the toolbar will now give a clear error telling you about the missing tools in the error view. Here are a couple of examples of what you’ll see in Visual Studio 2019 v16.8 Preview 3.1: Wrapping up our features from the C++ team, the addition of Conditionally trivial special member functions are now supported in MSVC. And finally, we have upgraded the version of CMake shipped with Visual Studio to CMake 3.18. This will enable you to use their new CMake profiling feature, and more. Read more in the team release notes. .NET compiler platform (Roslyn) analyzers inspect your C# or Visual Basic code for security, performance, design, and other issues. Starting in .NET 5.0, these analyzers are included with the .NET SDK. Code analysis is enabled, by default, for projects that target .NET 5.0 or later. We have added the ability to enable code analysis on projects that target earlier .NET versions by setting the EnableNETAnalyzers property to true. On the flip side, you can disable code analysis for your project by setting EnableNETAnalyzers to false. Another means of accomplishing the same is to use the Project Properties toggle. To access the Project Properties right-click on a project within Solution Explorer and select Properties. Next, select the Code Analysis tab where you can either select or clear the checkbox to Enable .NET analyzers. Inline Method Refactoring There is now an inline method refactoring that helps you replace usages of a static, instance, and extension method within a single statement body with an option to remove the original method declaration. Place your cursor on the usage of the method. Press (Ctrl+.) to trigger the Quick Actions and Refactorings menu. Next select from one of the following options: Select Inline <QualifiedMethodName> to remove the inline method declaration: Select Inline and keep <QualifiedMethodName> to preserve the original method declaration: The same Quick Actions and Refactorings menu has the option for the new C# 9 `not` pattern matching syntax when a suppression operator is present. Again, use (Ctrl+.) to trigger the menu and select Use pattern matching. Finally from this team, creating a new C# or Visual Basic files from a template respects EditorConfig code style settings. The following code styles will automatically get applied when creating new files: file headers, sort using directives, and place using directives inside/outside namespaces. Similar to the feature added from our C++ team, we realized debugging a captured managed Linux core dump on Windows has been difficult. It would usually mean setting up another Linux environment that exactly mirrored production and then installing a set of tools for the analysis. Thankfully with Visual Studio 2019 16.8 preview 3.1 you can simply drag and drop a managed Linux core dump directly into your IDE and immediately start debugging. XAML Binding Failures diagnostic improvements Developers working on WPF, UWP, WinUI and Xamarin.Forms projects must often detect and resolve XAML data binding failures in their applications. To improve the diagnostic tooling in this scenario we’ve added two new experiences to Visual Studio 2019 (16.8 Preview 3.1+) and both are now on by default for our Preview customers. - XAML Binding Failure Indicator Icon is now present in the in-app toolbar for WPF and UWP projects. This icon will show a red indicator if at least one binding failure is detected. Clicking the icon will also take you to the new XAML Binding Failures window. - New XAML Binding Failures window is now available for WPF, UWP, WinUI and Xamarin.Forms projects. This new dedicated experience provides a rich user interface over the binding failure information that was previously only available in the Output Window. Improvements include the ability to see the failures as a set of columns that can be sorted, customized and are fully searchable. We’ve also grouped similar errors together limiting the noise that can occur during certain combination of data binding templates failures while still making all the original raw error information available and easily copyable through a right-click menu option. (note: requires Xamarin version 5.0.266-pre3 or higher) Other XAML Tooling Improvements We’ve also released many other new XAML features in previous 16.8 preview releases including updating XAML Hot Reload settings UI, XAML Hot Reload support Xamarin.Forms projects targeting UWP and improved MVVM tooling to help you set a XAML documents d:DataContext through IntelliSense. For details on these additional features see the full release notes. A sneak peek of what’s coming next: Fakes code coverage support in .NET Core With the release of .NET Core support for Fakes in Visual Studio 16.6 many users are eagerly awaiting code coverage support for Fakes in .NET Core as well. We are hoping to land this support in the 16.9 update on windows only, here is the sneak peek. This required enabling the Visual Studio built-in dynamic code coverage to use the open source CLR instrumentation engine. This is also an exciting first step to providing a cross platform solution for dynamic code coverage eventually. Enjoy Ignite 2020 and Visual Studio 2019 v16.8 Preview 3.1 Once again, we are constantly moving forward with greater functionality with our features. While enjoying Ignite, please Download Visual Studio 2019 v16.8 Preview 3.1 to give them a try. Let us know how we are doing as your input is of the greatest value to our teams.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474544.15/warc/CC-MAIN-20240224180245-20240224210245-00278.warc.gz
CC-MAIN-2024-10
12,976
54
http://www.startupblink.com/startup/Teammate
code
Everybody shares documents by email… and has troubles with it when it comes to collaboration. You may use solutions like Dropbox, Basecamp, Trello, Google... but you will always need to collaborate with people who use other solutions than yours. Back to email! Teammate is a sharing network which helps you to share and keep track of shared documents, and which is even more easier than sending an email! Email is simple, right? You write a message, add your recipients, click "Send" and it goes in your Outbox. Then, it pops in the Inbox of your recipients. Dead simple. Well, Teammate works like email, but with files instead of emails, and sharing folders instead of mailboxes: Create a project, connect your storage app, and invite your partners: Teammate will set up your project and share folders in your storage app. Drop a file in a share folder and it will be automatically organised, delivered, and notified to all your teammates, regardless the application they use. No brainer!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.50/warc/CC-MAIN-20170423031207-00386-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
991
7
https://manacrystals.com/meta_deck_rankings
code
Top Decks to Beat Standard Format Decks that are being prominently played on the Hearthstone Ladder/Ranked play. Extremely well refined and balanced decks, suitable in any meta. Top Decks to Watch Standard Format Decks that have a consistence presence on the ladder. Their prominence is heavily dependent on the meta. When the meta shifts in the right direction, these decks can rise to become the Decks to Beat. Top Decks to Try Standard Format Decks that appear sporadically, not expected by the masses. Made of newer deck types or niche decks. Obscure / Wild Decks Decks that are no longer viable or are seeing minimal play. Either due to its core cards nerfed or simply not suitable for the current meta, no matter how much the meta shifts. Also decks that are under the Wild Format can be found here as well.
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948515311.25/warc/CC-MAIN-20171212075935-20171212095935-00449.warc.gz
CC-MAIN-2017-51
813
9
https://geo.javawa.nl/trackanalyse/index.php?lang=en
code
You can select a treshold value for speed (default 5 km/h or mph); statistics for speeds above and below the treshold value are displayed separately (resp. "Moving" and "Stopped"). The idea behind it is to filter out pauses. Click & drag with the mouse cursor on an area in the graph to zoom in. Double click the graph to zoom out. Hold shift or alt and click & drag to scroll a zoomed in graph. Hover the mouse cursor over a point in the graph to show the data. Click a point in the graph to zoom in on that particular track segment on the map. Hover the mouse cursor over a track segment to show the data. When you click the button "Track data" a new window will be opened with a table that shows the data of all track points. You can copy the data with Ctrl-A & Ctrl-C (Cmd-A & Cmd-C on the Mac) and paste it in a spreadsheet.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585290.83/warc/CC-MAIN-20211019233130-20211020023130-00154.warc.gz
CC-MAIN-2021-43
829
8
https://johannstander.com/2014/08/11/vin-guest-operating-system-management-limited-permissions-for-vcenter-server/
code
vCenter Infrastructure Navigator has a single account which it uses to access VMs. This is set within vCenter Server’s infrastructure navigator screen. I wanted to limit which datacenters inside vCenter Server VIN would be able to see as the functions this account can perform. Create a guest operating system management role within vCenter Server with minimal privileges for VIN: - Navigate to administration - Select roles - Click add roles - Enable the following with checkbox: - Virtual machine > Interaction -> Guest operating system management by VIX API - Virtual machine > Interaction -> Console interaction - Provide role name - On the vCenter entity root level click manage tab - Select permissions and add - Select user and assign the newly create limited VIN role. This will provide the necessary privileges to enable the discovery process for user selected. In my case I also did not want this service account to view my vCloud director datacenter so I added the user to the datacenter permissions with “no access” role. From inventory menu select Infrastructure navigator. Select settings tab Here you can now set the new user account. Make sure to enable access to VMs
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00220.warc.gz
CC-MAIN-2023-23
1,189
20
https://macdownload.informer.com/multishow/
code
MultiShow is a multipurpose file viewer for audio, video, images and text. With MultiShow you can examine a file at multiple levels of abstraction. The high level views show a file as audio, video, image or text. The intermediate level views show the logical structure of the file content. At the lowest level, a binary or textual representation of the file is shown.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302723.60/warc/CC-MAIN-20220121040956-20220121070956-00696.warc.gz
CC-MAIN-2022-05
367
1
http://open-sharedroot.org/comoonics-installation-dvd
code
com.oonics installation DVD This page is intended to collect all information about the com.oonics version of anaconda. Which allows to install open sharedroot cluster with the well know Red Hat installation software anaconda. This page is intended to collect all information about the Open-Sharedroot version of anaconda. It allows to install an Open-Sharedroot cluster with the well known Red Hat installation software anaconda. It is very much like the normal way to install a server with Red Hat Advanced Plattform based software. The difference is that you'll end up with a single node shared root cluster. That means you are ready to share the root of that installed server to many other servers.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704132298/warc/CC-MAIN-20130516113532-00020-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
701
4
https://www.a2hosting.com.mx/kb/developer-corner/python
code
Consejos para el desarrollo Web, estrategias de marketing y novedades de A2 Hosting enviadas a su email. Get answers here to essential questions about Python script files. This article covers how to set the path to the Python executable, how to use the correct file permissions for Python scripts, and more. The virtualenv and pip programs enable you to create custom Python environments and install Python packages. This article covers how to create and activate environments using virtualenv, and how to install packages using pip. There are scenarios where you may need to activate and use a Python virtual environment within a script file, and this article shows you how. Learn how to send e-mail messages from your hosting account using the smtplib module in Python. This article includes sample code that you can use in your own sites. You may want to use a version of Python that is newer than what is installed on your server. Learn how in this article. This article demonstrates how to install and configure Django on an unmanaged server. Learn how to install and configure Django on a Linux shared hosting account, step by step. Learn how to install Flask and configure it on a Linux shared hosting account, step by step.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141750841.83/warc/CC-MAIN-20201205211729-20201206001729-00166.warc.gz
CC-MAIN-2020-50
1,231
9
https://stackoverflow.com/questions/67162116/delphi-oracle-rowid-ignored-with-dbgo-ado
code
Delphi Rio - I have dbGO/ADO configured with Oracle (using Oracle's connector, not Microsoft's). I am working with a simple query. mySQL := 'select REGISTRY_ID, TERRITORY_ID, ACCOUNT_NAME from ACCOUNTS_SI'; ADO_Q1.Close; ADO_Q1.SQL.Clear; ADO_Q1.SQL.Add(mySQL); ADO_Q1.Open; ShowMessage(IntToStr(ADO_Q1.FieldList.Count)); This works exactly as expected, and the Message popup shows 3. If I add the ROWID as a column, it appears to be totally ignored. The query below runs, but still shows 3 columns. mySQL := 'select ROWID, REGISTRY_ID, TERRITORY_ID, ACCOUNT_NAME from ACCOUNTS_SI'; I have even tried renaming it. mySQL := 'select ROWID as MYKEY_ID, REGISTRY_ID, TERRITORY_ID, ACCOUNT_NAME from ACCOUNTS_SI'; ROWID as a column, while completely legal, is being filtered out. When I look at Oracle's documentation, it seems to show that RowID is perfectly valid. In order for the OleDbDataAdapter.Update() method to properly update Oracle with changes made in the DataTable, the DataTable must contain a primary key of a database table. If the database table does not contain a primary key, the ROWID must be selected explicitly when populating the DataTable, so that the ROWID can be used to uniquely identify a row when updating a row in the database. Is there a way around this? How can I use RowID with dbGo? (Yes, I am ware of issues using RowID...but this is a single user, local DB.)
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988793.99/warc/CC-MAIN-20210507120655-20210507150655-00432.warc.gz
CC-MAIN-2021-21
1,389
10
https://forums.mythicmc.org/t/name-change-request/698
code
Reason (explain in detail):Name changed of premium account so requesting a name change in the server so that I can the change skin etc. /chest, /ec, private signs, warps and faction removed. Requesting u to transfer my faction’s 205 xp levels and survival inventory and echest. Moved everything except cosmetics and creative plots. Will move these when you’re online. Moved cosmetics and creative plots.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500035.14/warc/CC-MAIN-20230202165041-20230202195041-00674.warc.gz
CC-MAIN-2023-06
407
3
http://drayxs.blogspot.com/2015/03/kgsp-presentation-and-dragons.html
code
Anyways this week was kinda interesting. One of the highlights of the week was that I went and did a presentation at KAIST. My supervisor wanted me to do a presentation on Unity, which is a game engine that I've used before, so I went to Daejeon on Friday to do a presentation and a tutorial. Unity. You're ok I guess. (Unity) It was nice to talk to people at KAIST too because I could get a feel for what my life would be like when I start my studies there. But unfortunately because I spent too much time in Daejeon I got back to Daegu late and missed curfew. But it was ok because some of my friends skipped curfew too. Awww yea, missing curfew to play StarCraft at a PC Bang. It was an alright night. Super tiring considering all the stuff I did that day, but it was fine. The next day was pretty tiring too because I didn't get to sleep that much that night, but I had a plan to go to the Dragons of Tarkir prerelease with some friends, so I went to that. The last prerelease we went to was pretty fun, and this time I got more friends to go so there were five of us. My initial packs weren't that good, but I ended opening up two planeswalkers and a fetchland in my final two packs. That's like $60+ in just three cards. So those three cards managed to win me games, so I ended up doing ok in the event. Other than that the week has been ok. I was planning on doing a new section of my blog posts where I write in Korean, but since this one was so late to begin with and since I'm feeling lazy, I'll start next week.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247518497.90/warc/CC-MAIN-20190222155556-20190222181556-00265.warc.gz
CC-MAIN-2019-09
1,522
9
https://www.freelancer.jp/projects/copywriting-blog/blog-style-press-release-for/
code
I'm preparing to market a new website: [url removed, login to view] and I need a blog post or press release to send to Stock Market related blogs in the hopes that they will feature my websites and use the post as content. I'd like the writing style to be less formal than a press release, more like a blog post. Preferably with simple words, so that anyone can understand it. Please only bid if you have looked at and understand what my website does. Here are some key points I'd like to communicate: - My site indexes stock picks from popular stock gurus (experts) - It automatically calculates profit and loss on these stock picks - It's free - It also offers free notifications of new stock picks - It just launched I'd like you to be creative and add use your own discretion on the content. I'm a poor write, that's why I am hiring you!
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512750.15/warc/CC-MAIN-20181020121719-20181020143219-00326.warc.gz
CC-MAIN-2018-43
841
9
https://2022.help.altair.com/2022/panopticon/realtimeinstall/onlinehelp/SendingServerPropertiesThroughtheEnvironmentVariables.htm
code
Setting Server Properties Through the Environment Variables Server properties set in the Panopticon.properties file in the AppData folder (i.e., c:\vizserverdata) are overridden by environment variables. For example, you can supply a JSON object through the environment variable SPRING_APPLICATION_JSON that will be parsed during server start up: Ensure that you minify the JSON object before setting the environment variable. This will override and set the following property values: As seen from the example above, you can use inline JSON annotations for properties that share the same prefix, which in this case is subscription. To override a single property, create an environment variable with the same name, but replace each '.' with an '_' and use upper case. Example: Override the property server.id Value: <some value> You can also override individual properties with environment variables. Just set a variable with the same name as the property but with all letters in upper case and periods replaced with underscores. For example, REPOSITORY_STARTUP_IMPORT_PATHS will override the repository.startup.import.paths in Panopticon.properties.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573630.12/warc/CC-MAIN-20220819070211-20220819100211-00532.warc.gz
CC-MAIN-2022-33
1,149
10
https://help.oncehub.com/help/deleting-users
code
This article explains how to delete Users from your account. Only OnceHub Administrators can delete Users. - Sign into your OnceHub account. Then, open the left sidebar and click Users. - To delete a User, click the action menu (three dots) next to the relevant User record and select Delete User profile (Figure 1). - The user will be deleted, except for the last Administrator with an assigned ScheduleOnce User license. - When you have an active ScheduleOnce subscription, at least one User license must be assigned to an Administrator. - Upon deletion, an email notification will be sent to both the User and all OnceHub Administrators. The User license of the deleted User is now unassigned. When the User is the Owner of at least one ScheduleOnce Booking page, all Booking pages will be automatically transferred to the remaining OnceHub Administrator upon deletion.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204790.78/warc/CC-MAIN-20190326034712-20190326060712-00044.warc.gz
CC-MAIN-2019-13
872
7
https://discussions.unity.com/t/mecanim-animation-clip-curve-value-not-being-set-to-variable/57754
code
I am trying to add a custom curve to an animation clip by going to the animation import settings, selecting the specific clip in the inspector, then going down to the curves section, pressing + and naming a curve “test”. I am then going to the animation controller that contains this animation clip as one of it’s states and adding a float parameter named “test”. When I run these animations, this parameter named test never changes from 0, even though the curve is constantly changing. I have tried this with the models/animations I have received from an artist several times, setting up different test projects, but the value is never update. If I open the Mecanim test project and try it with the Unity provided models/animations, then this same process works no problem, and the value for the parameter changes in both the animator view and when accessed in the code. When I apply these Unity provided animations to the custom model, even though the animations themselves don’t work on the model, the curve parameter is updated. When running the scene using both a custom animation and unity animation on a custom model and watching the animator view, the parameter with the same name as the curve in the unity animation is grayed out and updating, but the parameter with the same name as the custom animation is not grayed out and not updating. Does anyone know of any specific settings, or any issues with animations that can cause the parameters of the animator not to link with the animation clip curves of the same name?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510734.55/warc/CC-MAIN-20231001005750-20231001035750-00356.warc.gz
CC-MAIN-2023-40
1,541
4
http://www.thefutureiscrypto.org/2021/07/03/live-bitcoin-ethereum-signals-eth-btc-live-streaming/
code
➡️ If you wish to buy indicator go to : https://www.raishiz.com ➡️ E mail at [email protected] for enterprise enquires. 💰Commerce crypto on Bybit! Stand up to $100 Bonus if you join with my hyperlink and commerce! https://www.bybit.com/register?affiliate_id=17432&group_id=0&group_type=1 🟢Directions : (Video is just 30sec delay as a result of YouTube Lag)🟢 1- These candles are on 15min time-frame. 2- It’s a must to look ahead to the candle to shut then solely the sign confirms, It would retract if candle will not be totally closed in 15mins. ❌Do not disrespect different’s. ❌Do not comply with any contact info that sounds skilled, it might get you in a rip-off or mislead. ❌Do not promote or spam the chat. Please hit a like and subscribe to this channel for extra charts and alerts. Commerce rigorously and at your personal threat, Glad Buying and selling 🙂 Observe: Instructional Objective Solely. Disclaimer : All info within the Service is offered “as is”, with no assure of completeness, accuracy, timeliness or of the outcomes obtained from the usage of this info, and with out guarantee of any sort, categorical or implied, together with, however not restricted to warranties of efficiency, merchantability and health for a selected function. The Firm is not going to be liable to You or anybody else for any choice made or motion taken in reliance on the knowledge given by the Service or for any consequential, particular or related damages, even when suggested of the potential of such damages. The market cipher will not be below this firm identify, and please seek advice from the proprietor which is crypto face for his or her unique script, the one you see on the display is much like it however not the identical.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362589.37/warc/CC-MAIN-20211203030522-20211203060522-00226.warc.gz
CC-MAIN-2021-49
1,781
13
http://r13.railsrumble.com/entries/all?page=4
code
by Boyarski brothers in Aggregation It is an attempt to improve modern E-Mail experience by creating a Web interface for GMail and other IMAP-enabled mail services. Planned features are Kanban-style email board, encryption, immediate app buttons and links etc. by Code 2319 in Utilities You need to come to the realization that you don't keep track of your appointments the way you should and that you need to become more organized. Text your first appointment to qwikcal.com and start down the path of bet... by forxin in Utilities GitHub is a powerful collaboration, code review, and code management platform for open source and private projects — as per their own description — and we couldn't agree more. That's awesome, but you know what? GitHub fork... by The Worst Disease Is Rabies in Social Saveling.com is a peer-to-peer item sharing platform. It enables friends to borrow and lend physical items to each other, everything from books and movies to lawnmowers and penthouses. by Ruby Sense in Social A simple carpooling app. Think that you are only building this for a city say pune or mumbai In that we can get list of all bus and train stops Using that we can ask user to select destination and source By usi... by Tectonics in Utilities Have a burning question? Now you can collect opinions from people all around the world. We've made it simple to create and share polls about anything and everything. Get on it! Ask a question today! by Platform45 (Mother City) in Aggregation MediaFunnel acts as a media aggregator, collecting magnet links from the public and exposing them as a syndicated feed for applications to consume. This allows you to subscribe to a TV Show and automatically get new epi... by Anduril in TV & Movies One App To Rule Them All Instead of managing separate watch lists for your movies, tv show, books and places to vist, do it all in one place. mark entries as done or favourite by Team Rockdale in Software as a Service Contractify is a tool designed to provide freelancers, independent contractors, and small businesses with a free and easy way to draft up professional contracts without having to write your own from scratch. Using this too... by Caffeine Maniacs in Developer Tools Ruby Kaizen is a tool to motivate a team of developers to get rid off technical debt in the form of code that doesn't conform to Ruby's guidelines. "Kaizen" is a Japanese concept that means "continuous improvement". It ... by Team SDR in Health & Fitness Listening to music can have a tremendously relaxing effect on our minds and bodies, especially slow, quiet classical music. This type of music can have a beneficial effect on our physiological functions, slowing the pulse ... by Bricklayers in Developer Tools Many Rails developers have learned something from Ryan Bates through his RailsCasts, but one screencast tends to deliver more knowledge than described in the title. This project is looking to point forward this extra knowl... by forevisalonis in Social Be you a critic travel, why let stored in a closet or forgotten in time? Your trip may have been something unique and amazing, so please share your stories. It will be amazing! by Kisko Disco in Health & Fitness Track what you eat and how you feel afterwards. Use this information to figure out what foods consistently cause problems for you. Features: * Guest accounts: try it out before signing up * Remembers meal ingredient... by Team Eros in Health & Fitness Those things you always postponed: 'Buy plane tickets', 'Do the laundry', 'Call the plumber'... How often you have this problem? With this tool, we try to not make you fall into the "I'll do it later" trap. by team_mindfire in Social People tends to forget special dates of friends and loved ones and couldn't able to send their best wishes. This small application will definitely help you send your wishes on special dates of your loved ones. Get connecte... by RailsRiders in Software as a Service Locate, Compare and Reside. We locate your current location using Google Maps API and find the locations available for Rent/Purchase. You can filter locations on the basis of various characteristics such as area, number o... by Tofli in Finance PAYREE acts as an intermediary between service providers and their clients and guarantees safe deals and transactions. There's no way you will be cheated by anyone - with PAYREE you'll keep away fraud. by TwoAndTwoKids in Utilities Application to help people and companies to manager yours collaboratives spaces. by Probably Wrong in Developer Tools Reissue. It's issues. In your repo. Yes, you can take your issues with you. Reissue is a service that keeps a copy of your GitHub issues in a branch on your repo. We use the GitHub api to listen for issue activity and p... by Webonisers in Developer Tools Our application, Hippo, is a wholesome cloud management system. Hippo, allows the user to register himself and their different cloud provider accounts like rackspace and aws. The user can register multiple public clouds al... by Las Vegas Ruby Group Team 3 in Social Want your friend to complete a task? Send a request through TaskBuddy! Users can send, accept, and reject tasks, keep track of task progress, approve task completion quality, and earn brownie points for completing requests.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948064.80/warc/CC-MAIN-20180426031603-20180426051603-00536.warc.gz
CC-MAIN-2018-17
5,300
44
https://www.guru.com/service/programming/united-states/washington/bellingham/1292724
code
Software development professional with 8 years experience. I specialize in web and Windows application design, development, and review. My coding philosophy is to write code correctly the first time to reduce debugging time and costs and increase maintainability. My development process includes unit and acceptance testing to ensure the highest quality of code. Other features include self-documenting code and method and class level comments. I am U.S. born and raised, working in the Pacific Northwest. In addition to excellent written technical communciation skills I am also at ease working via phone and internet meetings, having previously telecommuted for two years. 1 Review For This Service
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526517.67/warc/CC-MAIN-20190720132039-20190720154039-00381.warc.gz
CC-MAIN-2019-30
700
7
https://community.monday.com/t/server-side-access-to-monday-com-apis-to-poll-board-data/57251
code
Is it possible to have a standalone service (externally hosted app or serverless function) authenticate itself to obtain an API token (I am used to using client-credentials workflows for this in other contexts). I am developing an Azure hosted app service that will poll data from a specific set of company boards. This app is written in .Net 6. So far I have successfully completed a PoC but the token I am using is my own personal developer token. I am aware that I can also, with correct permissions, use an admin API token but this seems somewhat insecure to use as a long term solution (even while using the likes of key vault to store it). I was hoping that it would be possible to register a new app and use the client id and secret to obtain a token for the app itself but I am unable to find any documentation to this effect (leading me to believe that maybe it is not possible). Is anyone able to confirm this for me please or perhaps steer me in the right direction for achieving my aim? Welcome to the community! Have you checked this one: OAuth and Permissions OAuth 2.0 is a protocol that lets your app request authorization to read or modify data in a user’s monday account. Basically, at the end of the OAuth process, your app gets an access token that belongs to the user, and grants access to specified permission scopes. I’ve been through this documentation. This workflow assumes a client app (ui based) that a user will log into and use directly (hence the OAuth 2.0 workflow). This means that the token is the “user’s token”. I am working on a server-side only service that will have no user-based login. As such the service itself will need access to a token without a user authenticating. I don’t think that will fly. How is the app / user of the app authenticated in monday? I think you have misunderstood. Its not actually an app that I want to write. I am attempting to create an external 3rd party standalone service that will poll the Monday APIs for data. Have you come across the concept of a client credentials grant before? Essentially the service would have its own credentials (in a manner of speaking) and authenticate on behalf of itself. This is not a novel workflow, its something that operates on many third party APIs. Hello there @paulmarshall, I am not sure I follow. You mentioned there are apps that are doing this. What would be an example? Which app? Is creating an app in monday a possibility? I believe it would make things easier for you. Looking forward to hearing from you Hi Matias. The workflow I am describing is quite a basic one: I am creating a “server-side only” service which is just code running in azure. It calls the Monday.com GraphQL API and queries some data. It then persists that data to a database (no user interaction required for this, its automatic). This service is running as a .NET “Azure Service App” (a completely different thing to a Monday.com “app”). I am not talking about creating an “app”, as it would appear that, from the Monday.com point of view, an “app” is something that has a UI that users can view, interact with etc. I don’t need a UI, or a front end or anything users click on or use. My problem is that to make the call to the Monday GraphQL API requires an API token. I am currently using my own “Developer Token” as acquired from the “Developer” portion of my Monday.com profile. This is not particularly secure as this token is long lived. I want to know if there is a way for the service itself to authenticate against the Monday APIs. This is a common practise within the industry. It does not require a user. I gave the example of a “client credential” workflow (though there are others). I mentioned that I had registered an app within Monday. I only did this to see if this was a possible route of obtaining a token that did not require an actual user. It is not possible to do this without a monday app. Having said that, you can create a monday app with NO FEATURES, NO UI AND NO BUTTONS AT ALL and use it to get an OAuth token. - Create an app. - Select the scopes in the OAuth tab - Save your app - Go to the versions tab and promote the version to live - Go to the “Share” tab and share the link for someone to install the app - The account installs the app - Go to the OAuth tab in your app’s configuration screen and enter the “Redirect URLs” tab - Copy the URL that says “Making OAuth Request” Whenever someone (who has the app installed) uses that URL, they will see a scopes authorization screen from monday and when they authorize the scopes, you will receive a token you can then exchange for the OAuth token as explained here. What do you think? Thanks for the suggestion but I am afraid this won’t meet the required levels of either security or automation. I think we are going to need to proceed with the Developer API Token pathway based on what you have said and figure out a way to do this within the scope of our licensing. Thanks anyway @codyfrisch I am afraid you seem to have missed the point. This service is completely external to Monday. It doesn’t use a Monday trigger or a Monday.com custom event. It runs as serverless code within Azure within a completely secure environment and will poll based on a cron expression. It should not require installation by anyone or require a user’s access token to work. Like I said, at the moment I am using a “developer token”. I could, based on the Monday documentation also use an “admin token” and it works just fine. No app required. The problem is that since this token is static, its is not really very secure (as confirmed by our infosec dept.). This is why I was hoping that Monday implemented something more secure for third party integration (I gave the example of a client credentials grant which is a common security standard for API integrations). Since it appears that this is not possible, I am going ahead with the admin token workflow and seeking to mitigate the security concerns through other means. I would like to start by stating that I am not in an “it must work this way” type of thinking. I am simply asking questions about accepted industry standard ways of implementing security of 3rd party API integrations. Thank you for taking the time to outline this solution. It does look similar to what I am after, however, it relies upon Monday.coms implementation of WebHooks. I have done some work and a PoC with Monday’s Webhooks alrady and I discounted them as the webhooks themselves require preconfigured access to an endpoint or function within my secure environment but without themselves being authenticated. The only way I have been able to integrate a webhook with anything like a secure workflow is to use a function key. The problem with a function key is that it is itself a static value that makes it less secure. I am proceeding down the route of using a Service Account for now. Thanks for reaching out! I wanted to update that we are aware of this gap and are working to improve the experience around server side application access. At this time, although it is not ideal, my best recommendation would be to create a service user that is only used for the API and use that account’s personal token to run the application. I hope that I can share more info regarding the solution and timeline soon.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100745.32/warc/CC-MAIN-20231208112926-20231208142926-00868.warc.gz
CC-MAIN-2023-50
7,383
40
https://apps.odoo.com/apps/modules/13.0/stock_partner_delivery_window/
code
Stock Partner Delivery Windowby Camptocamp https://github.com/OCA/stock-logistics-workflow , ACSONE SA/NV https://github.com/OCA/stock-logistics-workflow , Odoo Community Association (OCA) https://github.com/OCA/stock-logistics-workflow |Lines of code||361| Stock Partner Delivery Window This module allows to define time scheduling preference for delivery orders on partners, in order to raise a warning when changing a scheduled date to a time window that is not preferred by this customer. Table of contents On partners form view, under the “Sales & Purchases” tab, one can define a “Delivery schedule preference” for each partner. Possible configurations are: - Any time: Do not postpone deliveries - Fixed time windows: Postpone deliveries to the next preferred time window After selecting “Fixed time windows”, one can define the preferred delivery windows in the embedded tree view below. Bugs are tracked on GitHub Issues. In case of trouble, please check there if your issue has already been reported. If you spotted it first, help us smashing it by providing a detailed and welcomed feedback. Do not contact contributors directly about support or help with technical issues. This module is maintained by the OCA. OCA, or the Odoo Community Association, is a nonprofit organization whose mission is to support the collaborative development of Odoo features and promote its widespread use. This module is part of the OCA/stock-logistics-workflow project on GitHub. You are welcome to contribute. To learn how please visit https://odoo-community.org/page/Contribute. Please log in to comment on this module - The author can leave a single reply to each comment. - This section is meant to ask simple questions or leave a rating. Every report of a problem experienced while using the module should be addressed to the author directly (refer to the following point). - If you want to start a discussion with the author, please use the developer contact information. They can usually be found in the description.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178347321.0/warc/CC-MAIN-20210224194337-20210224224337-00629.warc.gz
CC-MAIN-2021-10
2,028
20
https://niedermayer.ca/node/76
code
Before development of the Web Interface, a Visual Identity Guide (VIG) will be required. This guide will contain the basic style elements to ensure that all pages on the User Interface are visually and thematically consistent with each other and with the general GPFN web site. The Visual Identity Guide will also contain directives concerning how users will navigate around the pages as well as how linkages outside the UMS pages back to the GPFN general web site will be incorporated. In addition to the VIG, web developers will require a common set of resources such as icons, navigation bar graphics, template files and HTML Style. Developing the VIG and the other components will be the duty of the GPFN webmaster.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711126.30/warc/CC-MAIN-20221207021130-20221207051130-00190.warc.gz
CC-MAIN-2022-49
719
3
https://www.criep.eu/biagi-f-falk-m-2017-relative-demand-for-highly-skilled-workers-and-use-of-different-ict-technologies-applied-economics-499-903-914/
code
Falk M., Biagi F. (2017). Relative demand for highly skilled workers and use of different ICT technologies. Applied Economics, Volume 49(9), pp. 903-914. This study investigates the relationship between several indicators of ICT usage and digitalization and the relative demand for highly skilled workers. The data are based on two-digit industry-level information on seven European countries for the period 2001–2010. For manufacturing industries, static fixed-effects models show that the share of employees with internet broadband access, the diffusion of mobile internet access and the use of enterprise resource planning (ERP) systems and automatic data exchange combined with electronic invoicing are all significantly and positively related to skill intensity in the industries observed. For service industries, only mobile internet usage intensity is significant. Specifically for manufacturing, a 10-point increase in the percentage of firms using ERP systems is associated with an increase in the share of highly skilled workers by 0.4 percentage points. These estimates indicate that the increase in ERP system usage during the period studied accounted for 30% of the increase in the share of workers with a tertiary degree across manufacturing industries and countries. The results are robust with respect to the estimation method and the potential endogeneity of ICT.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816024.45/warc/CC-MAIN-20240412132154-20240412162154-00763.warc.gz
CC-MAIN-2024-18
1,382
3
https://www.xeed.hk/work/ether-dungeon
code
Ether Dungeon: Age of Myth is a revolutionary strategy RPG blockchain game in which players can train epic heroes, upgrade powerful equipments, and explore the depth of dungeons in the artificial blockchain world Pangaea Ultima! The basic way to earn ETH in Ether Dungeon is through dungeon challenges. If your hero power is larger than the dungeon difficulty, you can challenge the dungeon by clicking the “Challenge” button, and get a portion of the Accumulated Dungeon Rewards, while the remaining amount is splitted among 1. Base rewards of next floor, 2. Dungeon Master rewards, 3. Consolation Jackpot.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526560.40/warc/CC-MAIN-20190720173623-20190720195623-00118.warc.gz
CC-MAIN-2019-30
611
2
http://lists.p4.org/pipermail/p4-apps_lists.p4.org/2018-June/000086.html
code
[P4-Apps] INT pipeline on v1model and ptf tests noraki at postech.ac.kr Mon Jun 4 17:06:55 EDT 2018 I just created a pull request for reference INT pipeline (src, sink and transit) on v1model and corresponding ptf tests. If anyone is interested in the implementation, please take a look at it in the following URL: Any comment would be appreciated. -------------- next part -------------- An HTML attachment was scrubbed... More information about the P4-apps
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314732.59/warc/CC-MAIN-20190819114330-20190819140330-00173.warc.gz
CC-MAIN-2019-35
458
11
https://www.thoughtco.com/monitoring-mouse-activity-1058400
code
<p>Is the mouse over a component? Was a mouse button pressed? Which button was it? Did the user release a button, which one? Exactly where inside the form is the mouse? Did the user move the mouse out of the form and into another?</p><p>Delphi (as Windows) constantly monitors what the user is doing with the mouse. Naturally, Delphi can detect any mouse action. When a Delphi application detects a mouse action, it calls whatever event handler we&#39;ve defined for the corresponding event.</p><h3>Responding to the mouse</h3>There are four kinds of mouse actions you can respond to in your applications. Three of these are uniquely mouse actions: mouse-button down, mouse moved, and mouse-button up. The fourth kind of action, a click (a complete press-and-release, all in one place) is a bit different, as it can also be generated by some kinds of keystrokes (such as pressing Enter in a modal dialog box).<p>Components recognize a mouse event only when the mouse pointer is inside the component. However, if a mouse button is pressed and held while the mouse pointer is inside a component or form, that object captures the mouse. This means that no other Delphi object can react to mouse events until the user releases the mouse button, regardless of where the user moves the mouse.</p><p>There are three fundamental mouse event handlers: OnMouseDown, OnMouseMove, and OnMouseUp. The MouseUp and MouseDown event handlers take the same five parameters as follows (the MouseMove lacks a Button parameter):</p><ul><li> <b>Sender</b> - The object that detected the mouse action.</li><li> <b>Button</b> - Indicates which mouse button was involved: mbLeft, mbMiddle, or mbRight.</li><li> <b>Shift</b> - Indicates the state of the Alt, Ctrl, and Shift keys and the state of the mouse buttons when the event occurred.</li><li> <b>X, Y</b> - The pixel coordinates of the mouse pointer in the client area of the Sender.</li></ul><h3>OnMouseDown/OnMouseUp</h3>Whenever the user presses a button on the mouse, an OnMouseDown event goes to the object the pointer is over. To see the event handler at work, assign the following code to the OnMouseDown procedure: <pre><code> <b>procedure</b> TForm1.FormMouseDown(Sender: TObject;\n Button: TMouseButton; Shift: TShiftState;\n X, Y: Integer) ;\n <b>begin</b>\n Canvas.Ellipse(x-20,y-20,x&#43;20,y&#43;20) ;\n <b>end</b>;\n </code></pre> When the application runs, you can press the mouse button with the mouse cursor on the form and have the circle appear at the point clicked. This simple event uses the X and Y parameters sent to the method, and calls the Ellipse method of the canvas to display the circle.<p>Let&#39;s spice this code a bit. Suppose that we want red colored circles when the user presses the left mouse button, and blue colored rectangles when right button is pressed. The Button argument has three predefined constants to determine which button was pressed: mbLeft, mbRight, mbMiddle:</p><pre><code> <b>procedure</b> TForm1.FormMouseDown(Sender: TObject;\n Button: TMouseButton; Shift: TShiftState;\n X, Y: Integer) ;\n <b>begin</b>\n <b>case</b> Button <b>of</b>\n mbLeft:\n <b>begin</b>\n Canvas.Brush.Color :&#61; clRed;\n Canvas.Ellipse(x-20,y-20,x&#43;20,y&#43;20) ;\n <b>end</b>;\n mbRight:\n <b>begin</b>\n Canvas.Brush.Color :&#61; clBlue;\n Canvas.Rectangle(x-20,y-20,x&#43;20,y&#43;20) ;\n <b>end</b>;\n <b>end</b>;\n <b>end</b>;\n </code></pre> As for the OnMouseUp event: use the OnMouseUp event handler to implement special processing when the user releases a mouse button.<h3>OnMouseMove</h3>OnMouseMove occurs when the user moves the mouse pointer while the mouse pointer is over a control. Since the OnMouseMove event handler will be called relatively frequently, any code inside this event handler will be executed often.<p>As we know, we can combine the keyboard with the mouse. For example, we can have the Shift-Move combination draw a circle. Let&#39;s see MouseMove in action (new project/new form):</p><pre><code> <b>procedure</b> TForm1.FormMouseMove(Sender: TObject;\n Shift: TShiftState; X,Y: Integer) ;\n <b>begin</b>\n <b>if</b> ssShift <b>in</b> Shift <b>then</b>\n Canvas.Ellipse(x-20,y-20,x&#43;20,y&#43;20)\n <b>else</b> <b>if</b> ssCtrl <b>in</b> Shift <b>then</b>\n Canvas.Rectangle(x-20,y-20,x&#43;20,y&#43;20) ;\n <b>end</b>;\n </code></pre> With this code, moving the mouse over the form causes circles to follow the mouse if Shift key was pressed during move, and rectangles if Ctrl key was pressed<h3>There is more</h3>In the following <a href="https://www.thoughtco.com/advanced-mouse-processing-1058399" data-component="link" data-source="inlineLink" data-type="internalLink" data-ordinal="1">article</a> I&#39;ll show you how to include some special API calls to your programs, and take more advanced control over the Mouse. Third <a href="https://www.thoughtco.com/understanding-drag-and-drop-operations-1058386" data-component="link" data-source="inlineLink" data-type="internalLink" data-ordinal="2">article</a> will show how to include drag and drop capabilities to a Delphi application.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805049.34/warc/CC-MAIN-20171118210145-20171118230145-00355.warc.gz
CC-MAIN-2017-47
5,093
1
https://xenforo.com/community/threads/using-the-overlaytrigger-outside-of-the-forum.32322/
code
Im intergrating xenforo into the rest of my site. The login and logout/ register etc is all working a treat now but I want it to popup the same as it does on the forum. But it doesn't seem to be picking it up. Im sure I'm missing something really simple on this one? <link rel="stylesheet" href="/forum/css.php" /> <script src="/forum/js/jquery/jquery-1.5.2.min.js"></script> <script src="/forum/js/xenforo/xenforo.js"></script> <a href="forum/logout/" class="OverlayTrigger">Log Out</a>
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867050.73/warc/CC-MAIN-20180624180240-20180624200240-00387.warc.gz
CC-MAIN-2018-26
487
3
http://alexisbtlc481582.onesmablog.com/Little-Known-Facts-About-paraphrasing-tool--11746177
code
StyleWriter - the earth's most State-of-the-art enhancing and paraphrasing software for editing creating fashion, language use and developing expressive concision, It is not necessary to use this tool for paraphrasing Should you be great in composing and know very well how to rewrite a handy posting. It is the tool that is specifically designed for the people who are weak in English and for those who usually do not understand how to generate quality contents. On the other hand, detecting plagiarism is a long and laborous ordeal because of the high-quality line among allowable peer-peer collaboration and plagiarism. During this paper we current a metrics-based tool which aids in the whole process of detecting plagiarizers by monitoring the similarities between packages. Once you use our paraphrase tool, you’re not letting some robot convert your text into gibberish. You might know needless to say that there are real, Are living professionals who will be Individually working on your paraphrasing to give you initial, distinctive text. Superior but, they will try this for yourself rapid. Why utilizing our paraphrase on the net tool? Since our paraphrase software is: Daemon tools pro agent provides being an icon on the right facet of Home windows taskbar. It will make our jobs of mounting / unmounting. ResearchGate will be the Experienced network for researchers and researchers. Received an issue you require answered immediately? Due to the fact this can be a free to make use of paraphrasing tool, you could rely upon it for large savings, as well, whereby you don’t have to spend on paid software. SMMRY has a minimalist model but there are various characteristics to find. This time, rather than a threshold of exactly how much text to discard, you set the amount of sentence you wish the text summarized in. Also, it can be employed as an article spinner; to produce Yet another version of the short article that is exclusive sufficient to pass a plagiarism checker. It’s a double-edged sword, so utilize it at your very own chance! A lot of people wrestle with creating, they uncover it less complicated to make sure the caliber of their short article by using an post spinner tool initially and then edit their content material to just resolve the mistakes. Welcome to Search engine optimization Tools Centre Paraphrasing tool which is used to rewrite or rephrase your content articles, essay, and assignments. It's very useful for Skilled writers. Our short article paraphrase tool operates very quickly and thoroughly. SEOToolsCentre is often a reliable name while in the Search engine optimisation providers provider resulting from its high-excellent Website positioning Tools. Additionally, it highlights words made use of consistently, colour-coded as a way of relevance. It even has many different other neat attributes to control just how your summary arrives out. Whether you are a pro or beginner author, university student or scholar, StyleWriter's Sophisticated modifying characteristics may help you edit and polish your crafting into clear and concise English. What you are able to do If you feel it isn't going to go find this through properly, click on Rewrite Yet again for just a new edition. If Not one of the alternate words suit, try out shifting the initial phrase to bring about new strategies.
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039743960.44/warc/CC-MAIN-20181118011216-20181118033216-00223.warc.gz
CC-MAIN-2018-47
3,347
14
http://wiki.tagen-compana.org/mediawiki/index.php/A02-KB110_Development_of_Multiple_Skeletal_Muscle_Recognition_Technique_in_the_Thoracoabdominal_Region_for_Respiratory_Muscle_Function_Analysis
code
A02-KB110 Development of Multiple Skeletal Muscle Recognition Technique in the Thoracoabdominal Region for Respiratory Muscle Function Analysis - Primary Investigator - Naoki Kamiya(Aichi Prefectural University, Lecturer) - Susumu Sato(Kyoto University, Assistant Professor) In this study, we focus on respiratory muscle as respiratory function analysis. Our goal is to develop a complex recognition technique of the skeletal muscle in the thoracoabdominal region for respiratory function analysis using skeletal muscle. Here, we aim to develop complex recognition and analysis technology of thoracoabdominal respiratory muscle by improving automatic recognition method of deep muscle and superficial muscle region which we already established. Specifically, we construct direction and shape models of the respiratory muscle based on muscle fibers, and realize automatic site-specific recognition of respiratory muscle. This makes it possible to clarify the information of respiratory muscle of each part and the relationship between skeletal muscles necessary for elucidating the relationship between respiratory function and skeletal muscle. Then, we generate a respiratory muscle mathematical model applicable to 3 axes (space, function, time).
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583755653.69/warc/CC-MAIN-20190121025613-20190121051613-00156.warc.gz
CC-MAIN-2019-04
1,255
5
https://www.liquidweb.com/blog/ipad-web-development/
code
Ever wonder if you could use your iPad as a web development tool? Maybe even your daily go-to solution? With iPadOS having arrived in September 2019, your iPad now has software that better reflects the power that the hardware has. I’m going to walk you through how I have my iPad Pro setup to develop sites as I’ve spent the last 18 months using an iPad as my main working device. While I have a maxed out 2018 12.9” iPad Pro, I’ve been using basically the same setup since my 9.7” iPad Pro started me on the journey of developing with an iPad. I’ve even tested it with my daughter’s iPad Mini 3. While the Mini had a slow UI, it worked reasonably well once I was coding on the server. What we’re ultimately going to do is use our iPad to connect to a VPS and do our development on the VPS exactly like we’d do it on our local machine running MAMP, VVV, or XAMPP. What Software is Needed to Use the iPad for Web Development? Let’s start with the software, because the hardware doesn’t matter so much. All you need is an iPad of any recent variety and you’ll be ready to get coding. First up, you’re going to need to install Blink Shell on your iPad because much of what we’re going to use will be Linux/Unix based tools like Vim and Blink is by far the best shell on iOS for this. Blink will support custom SSH keys for your devices. It will remember and auto-fill your connections to your various server environments, and it supports MOSH. We’ll get into configuring Mosh and what it is later in this article. While I do much of my sFTP work directly via Blink currently, you’re going to need a solid FTP client, such as Secure ShellFish. For a web browser, the best option I’ve found is Inspect. It has a full set of web inspection tools, and a console so you can view an output that your site is sending to the console. It even provides a quite nice Tap to Inspect mode that lets you select HTML elements and see them in the provided developer tools. Finally, browse json files directly on your iPad with Jayson. With a simple copy and paste operation, you can view the JSON output of your work so that you can make any tweaks that are needed to get it right. The rest of the software we’re going to need to make developing on your iPad work well is found on the VPS we’re going to use. Configuring your Server For this tutorial, I’m using a 4GB VPS running Ubuntu 16.04.6 LTS, but you could use a higher or lower version depending on the needs of the sites you’ll be developing. You can also use any of the Linux based VPS configurations Liquid Web offers. One of the great things about an iPad is that it’s extremely portable, but that often means it’s on less reliable connections than a laptop is. Where my iPad connects flawlessly sitting six feet from my wireless router at home, it drops enough packets at Starbucks or on a cellular connection that a traditional SSH tunnel to our server will disconnect a few times during a work session. We can stop this frustration by getting Mosh and tmux setup on our server. What is Mosh Mosh is very similar to SSH but has been engineered to deal with mobile connections. It will stay connected to your server even if the IP changes or you move from WiFi to a cellular connection. It also resists getting put to “sleep” better than SSH does because it’s not simply a connection, Mosh builds sessions over UDP. To install Mosh on our Linux server we’re going to need to run the following commands. sudo apt-get install python-software-properties sudo add-apt-repository ppa:keithw/mosh sudo apt-get update sudo apt-get install mosh If you’re not familiar with those lines then here is a quick recap. The first one installs some of the tools we’ll need to get Mosh installed. Our second line adds the software repository needed to install Mosh. Once we’re done with that, we need to tell our Ubuntu install to update all it’s packages so that it knows about the new repository. Finally, we tell our Ubuntu install to install Mosh. Next, Mosh operates on a different port than other connection methods so we need to make sure that we have those ports open on our server. First, we’re going to need to install UFW on our Ubuntu VPS with the following command. sudo apt-get install ufw Then we need to open up the proper ports so that mosh can connect to our server on the ports it expects to connect with. sudo ufw allow 60000:61000/udp That’s it! You should now be able to use mosh in place of SSH when you use Blink to connect to your server. That means your commands will look like this. The next tool that will make your development workflow so much easier is tmux. This tool is a terminal multiplexer. What it’s going to allow you to do is use your single mosh connection to open multiple terminals on your VPS and then switch between them. I regularly use this to have multiple terminal connections: - To the Git repository I’m working in - To Vim for editing my code - Running Grunt or Gulp, or whatever my build tools are for the project I’m working on Tmux is going to be installed on our servers for you, so all you need to do to get started is type tmux and you’ll start a tmux connection. Like Vim, which we’ll talk about in a moment, tmux is keyboard based. In its default configuration, tmux looks for Ctrl+b to be pressed and then accepts the next keys as commands for what it should be doing. While there is a huge list of awesome stuff you can do with tmux, here are a few commands you need to get started. Remember every command is prefaced by CTRL+b d to disconnect from a session n to change to the next open tmux window p to change to the previous window $ to name the session or rename it c create window , name current window & kill current window a -t $name attach to a named session ls list the name sessions tmux kill-session -t $name from terminal this kills the named session and is not prefixed To dig deeper, here is a great list of all of the tmux commands available. Tmux can split panes, swap them around, and do all sorts of other fancy stuff once you’ve mastered the basics. The final piece of the puzzle to be able to develop from your iPad is having a solid Vim configuration. I focus on WordPress so I’ve built a PHP and WordPress-based vim config that I’ve shared on Github. If you’re just getting started, use an established configuration like the one above, Janus. The biggest issue with using someone else’s configuration is that sometimes they stop maintaining it. Taking Janus as an example, it hasn’t seen an update in a year and currently has 87 open issues. My own hasn’t been updated in 9 months and I know that Exuberant CTags has been abandoned so I need to look at updating to Universal CTags. Let’s go over how to install my specific Vim configuration. To start we’ll need to clone the repository: git clone https://github.com/curtismchale/WPTT-Vim-Config.git ~/.vim If you get an error that your .vim directory already exists then use rm -rf ~/.vim to remove the existing vim configuration so we can put our own in its place. Next, since the Vim version on our stock Ubuntu server is 7.4.X we’ll need to use a plugin manager to keep our vim plugins up to date. I like Vundle and it can be installed with this command: git clone https://github.com/gmarik/Vundle.vim ~/.vim/bundle/vundle Next, if you’re installing my Vim configuration on macOS, let’s make sure that our configuration for gVim and Vim will use the same file by creating symlinks so that there is a single .vimrc file that houses our entire configuration. ln -s ~/.vim/.gvimrc ~/.gvimrc && ln -s ~/.vim/.vimrc ~/.vimrc Then you’ll need to open Vim vim . and run :BundleInstall to install the full configuration. Yes, you will get an error when you try to open vim because there are a few plugins expected that we haven’t installed yet. Once you’ve run :BundleInstall you can type so ~/.vimrc to reload your vim configuration with all the plugins installed. To finish our configuration out we’ll install Exuberant CTags and Ack so that we can have full searching inside our projects. The following two commands will do this for us. sudo apt-get install exuberant-ctags sudo apt-get install ack-grep You’ll still need to configure Git with your username and email so that you can work properly, but that’s really it. We now have a full IDE like Vim setup on our remote server. I use this remote server just like I would a local development environment. I use Deploybot to deploy my changes to the staging server that my clients can look at as well as the live production server when we’re ready to go live. Where Using iPad for Web Development Isn’t Cutting it for Web Developers While I love the iPad for its portability and single-focused method of working, there are still some spots that it doesn’t cut it for developers. Specifically, if you’re doing heavy design focused work with CSS, even Inspect browser isn’t quite up to the same quality as the Developer tools you’ll find in any modern desktop browser. When I’m doing a lot of CSS work, I end up using macOS, but I use all the same tools and workflow above. The only change is using iTerm to connect to my remote server and Firefox as my browser and developer tools. Once we get better browser-based developer tools, we’ll be able to say goodbye to macOS for every part of the site development process without a drop in productivity. Even if you don’t choose to make your iPad your primary work machine as I have, the tools above can be used by any developer in a pinch when they don’t have their regular development environment on hand. Whether it’s rolling back some code from the couch with Blink and Deploybot, or making a quick change because a client edited a file and missed a semicolon, you can get a lot done without needing a traditional development environment, with a bit of prep. Build Out Your Digital Agency With Managed Hosting Curtis is a husband, father, developer and business coach. He specializes in helping people build a business that lets them spend time with their family instead of working all the time. To learn more about running an effective business visit my website Curtis McHale. Keep up to date with the latest Hosting news.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817474.31/warc/CC-MAIN-20240420025340-20240420055340-00234.warc.gz
CC-MAIN-2024-18
10,313
71
https://productivityguild.com/t/32-can-you-code-on-the-ipad/2241
code
I actually put another barrier before a call even in the form of a number of specific questions they MUST answer to book a call. All clients get this email as a reply to their initial contact. Hey $$$$name thanks for getting in touch about $$$$project. It sounds interesting but I need some more information to help me decide: - If I’m a good fit or - If someone I know is a better fit What I need to know is: - Why do you need $$$$feature now and why is it more important than something else you could be building? - Have clients or internal staff been asking for $$$$feature? - What would happen if we didn’t do $$$$feature? What opportunities would be lost? - What will happen to your business when we finish %filltext:name=feature%? How will it move your business to the ‘next level’ - How are we going to measure success of $$$$feature? (time saved, more conversions to email, more sales…) - What is your timeframe for completion? - What is the budget you have allotted for the project? - Who are the decision makers that will decide if this project moves forward? Budget is usually the hardest question here but it’s something that I need to at least have an idea on. Do you have $1000 and I need to find existing solutions that can be ‘glued’ together to meet your goals (and you’ll probably have to give up on some specifics of how it works) or do you have $30k (or more) to spend and we can build you whatever you specifically need? So even a range of where things start to feel ‘expensive’ helps me know what to think about as I sort out what works for your project. The questions above are going to help me know a few things: - if I’m the best fit for your project - if someone else is a better fit - if I’ve got the time for the project - if my costs fit with your budget - if I know of someone else that fits your budget better Thanks for the answers, and have an awesome day
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890314.60/warc/CC-MAIN-20180121060717-20180121080717-00677.warc.gz
CC-MAIN-2018-05
1,914
22
https://www.experts-exchange.com/questions/21221009/Sound-card-and-modem-card-not-working-not.html
code
Ive just moved all my expansion cards to another motherboard with some new RAM and a new processor. Everything works fine, and I get sound out of one sound card, but not the other. Also the modem isnt recognized. When I go onto the device manager, the cards are listed, but with a yellow question mark. Double clicking this reveals that the computer doesnt recognize the cards. I think its a code 28. What do I need to do?
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676596204.93/warc/CC-MAIN-20180723090751-20180723110751-00057.warc.gz
CC-MAIN-2018-30
422
2
https://attack.mitre.org/software/S0419/
code
SimBad was a strain of adware on the Google Play Store, distributed through the RXDroider Software Development Kit. The name "SimBad" was derived from the fact that most of the infected applications were simulator games. The adware was controlled using an instance of the open source framework Parse Server. |Mobile||T1624||.001||Event Triggered Execution: Broadcast Receivers|| SimBad registers for the |Mobile||T1643||Generate Traffic from Victim| |Mobile||T1628||.001||Hide Artifacts: Suppress Application Icon|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710711.7/warc/CC-MAIN-20221129200438-20221129230438-00068.warc.gz
CC-MAIN-2022-49
514
5