url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://amandarmoore.com/structural-school | code | Course: Arch 202B
In this project, I revisited the shed and considered how its spatial neutrality and industrial grade materials become the container in which program is situated through addition and subtraction, or other means in order to produce program for a roughly 12,000 sf kindergarten. Ongoing material investigations and interventions became technique for programming space. Program, as it relates to the common adage of figure vs field, will correspond with material notions both at the scale of smaller, individual spaces or rooms, as well as the scale of the larger, generic sized shed. The kindergarten will be seen as a space that primarily must engender play, as it has been considered as a particular attitude toward material that can be traced throughout the semester, and throughout work by L.A. School architects. | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986675316.51/warc/CC-MAIN-20191017122657-20191017150157-00204.warc.gz | CC-MAIN-2019-43 | 832 | 2 |
https://ksikkawork.wordpress.com/2012/11/ | code | I was trying to listen to classical Indian fusion on YouTube today and found a certain limitation during this process. Compared to Pandora (which is music recommendation service like lastfm) listening to songs on YouTube is limited. I don’t have the option of starting my own station and relax and listen.
The prime difference between YouTube and Pandora would be the limited number/expressiveness of tags that YouTube videos have or which are being currently used. For instance a classical song on YouTube is often tagged as just ‘music’ or ‘entertainment’ w/o any regards to it’s musical or video content. On the other hand Pandora has pretty descriptive tags for it’s songs, which makes it easy to find songs in same genre even though these songs might not have the same artist or usual features like name-viewers. Moreover during a small glance I also observed that the options/suggestions that YouTube provides, while viewing a video, have a similar name/viewers, than content based features like classical, rock, or other.
Thus in future it will be interesting to see if Google could use these noisy tags in an intelligent way so that a user can use YouTube depending on his preference. Thus one one day I can use it as Pandora that recommends music based on similar content or like the current YouTube. Google has also been doing some related work here, one of which I came through was published in ICCV’11 by Thomas Leung and others on using weakly supervised learning for handling noisy labels/tags (noise is other source of nuisance). Another homework that I should do is read about the recommendation system that Google used and if they are doing something similar to those employed by online retail sites that use algorithms like latent models, matrix factorization etc (mostly unsupervised). I will revisit this discussion in future.
Interesting way in which Google conducts Research by targeting not artificial datasets but real-world data. They also published a paper in Communications of the ACM.
I got this interesting (nerdy) analogy between physical attractiveness and initial conditions in an optimization problem. However before making the statement I would like to point out that this statement is based on some assumptions and may not be true in every case and you are allowed to disagree with it.
The hypothesis is that when two people meet- for instance see each other at a pub or party, the first things (in most cases) that makes them talk or adore each other is physical attractiveness of either or both. In other words they started talking because they were attracted to each other physically (citing Freund). Let’s further suppose these two people started dating each other after sometime and as is the word by sages (another assumption), physical attractiveness tends to matter less then since these two people might be over that initial phase/excitement.
Thus ‘physical attractiveness’ could be compared to initial conditions in an optimization problem, where if the initial conditions are not apt the algorithm might never reach an optima. Also the only use of initial conditions is to initialize the algorithm and they don’t really matter afterwords.
I am keeping any further interpretations or cases (like convex optimization problems) open to the readers.
This is a nice comparison of different machine learning approaches highlighting their advantages and disadvantages.
While reading wavelets I decided to go back and read the basics of Fourier transform since reading wavelet analysis wasn’t satisfying me all along. Thus I decided to re-visit signal processing esp. Fourier transform. While doing this I came across this interesting tutorial where the writer has shown simple cases of a normed-vector space and extended it to function space.
In one line, functions can be seen as points in a vector space. However since we have a function space now, we define an orthonormal basis along with notions of dot-product and norm (length).
This topic has always fascinated me since I also came across this idea while working on multiple instance learning and reading Gradient Boosting. May be my mind is still looking for a central theory (like vector algebra) to explain or break-down lot of other things. I shall write more about these connections later. Here’s the link
One question that seldom comes to my mind is whether it is necessary to have been born with extra capabilities (mind) to become a great scientist. I have changed my opinion multiple times after making new observations, however I think I have a consistent hypothesis now according to which it is not necessary to have a great mind to be a great scientist.
I was recently reading a book by Feynman, given to me by my self-proclaimed intelligent roomate and after a while I went and asked him this question- ‘Was Feynman an extra intelligent guy’. Following which Yogesh had forwarded me a video from Feynman where he says that extra-intelligence or talent is not required to be a great scientist. According to him famous scientist are normal people who became interested in their fields and put in a lot of hard-work, reading, writing, learning and problem solving to master it. His case also makes sense since the lives of great scientists contain the story of hard-work, time and commitment they have put into their work. On the other side I also believe that mind is not something static but a dynamical system that evolves and forms neural connections as you make it work. For instance, if you train your brain to learn reading, it can automatically learn patterns and re-organize itself to be able to do well at reading new books and it just goes better. I am sure not how much neuro-scientists will agree with me on this. There is also a counter-argument here where you can ask yourself of any scientist who didn’t work hard or struggled and won the Nobel prize.
Hence to be precise what requires to succeed in a field is motivation, interest, commitment and finally some work.
I am glad to share that my joint work with Abhinav Dhall on ‘Weakly supervised Pain Localization using Multiple Instance Learning’ got accepted today. We got some rave comments on this work. The idea is to learn from weakly supervised data i.e. labels mentioning if a person is in pain or no-pain in a sequence. Learning paradigm is a variant of latent methods called multiple instance learning. I gave a recent talk on this work in pixel cafe and here is the presentation.
However I am sad for the other paper that got rejected.
I should talk about latent models sometime. | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348523476.97/warc/CC-MAIN-20200607013327-20200607043327-00023.warc.gz | CC-MAIN-2020-24 | 6,600 | 18 |
https://www.cfd-online.com/Forums/openfoam-paraview/61162-parallel-visualization-wo-reconstruction-print.html | code | Hi everybody, Is there any
Is there any way to do visualization without reconstructing a parallel case?
After all, I understand that paraview can be launched as a parallel job, do the visualization in parallel and send somehow the result to a workstation.
Maybe converting to vtk format first?
Thx for any hint!
Hi Thomas, A (too?) simple w
A (too?) simple way is to run foamToVTK in the processor-directory you are interested in and view just that part in Paraview. I too would be interested to know if anyone is using the full parallel capabilities of Paraview for multi part viewing.
Actually, the workarounds are
Actually, the workarounds are only a temporary solution, which in long run for some cases does not work well. If somebody could provide nice explanation how to use paraview in parallel that would be great. Somehow in cases which I was testing, single processor was not enough, therefore I had to switch to Tecplot.
Ah, just realized watching sim
Ah, just realized watching simulation results of parallel simulation without reconstruction was easier than I thought. No need for foamToVTK, just do a soft link to system in each processor-directory and open in ParaView. (I am using the excellent reader Takuya Oshima realeased about a month ago).
(Still nothing parallel about the viewing though!).
Has anyone experience with usi
Has anyone experience with using ParaView3 in real parallel. So running ParaView3 on a cluster using mpi ???
If so, is it easy to setup?
|All times are GMT -4. The time now is 17:12.| | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171629.92/warc/CC-MAIN-20170219104611-00577-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 1,528 | 16 |
https://peatix.com/event/137254 | code | Growth Hacking Singapore: The Steps After Ideation - How To Get Your MVP [Training]
- T H E T R A I N I N G -
So you have an awesome idea for a product. Now what?
Ever heard of the concept of Minimum Viable Product (MVP)?
"The basic idea is to maximize validated learning for the least amount of effort. After all, why waste effort building out a product without first testing if it's worth it." - Eric Ries
Basically, this is when you create something that users can interact with and collect the maximum amount of validated learning from your customers with the least amount of effort possible. And of course there are correct ways to do this.
During this workshop, you will learn about:
The different types of MVP
The pros and cons to each type
The basics of Lean Startup
How to implement the build-measure-learn loop
Hands-on session of scoping an MVP through user stories
Learn the Kanban method of project managing your MVP
- T H E T R A I N E R -
- T H E P R O G R A M -
6.45pm - 7.00pm: Registration and networking
7.00pm - 9.00pm: Workshop given by Kelvin Tham
9.00pm - 9.30pm: Post-training networking and brain picking
Early Bird (until Jan 19th): $35
Regular Tickets: $40
Be one of the first 5 people to tweet or post about this workshop and you will get 75% off your ticket! Click here to share!
7:00 PM - 9:00 PM SGT
- ACE Ideation Centre
Early Bird (until Jan 19th) SOLD OUT $35.00 Regular Ticket SOLD OUT $40.00
- Venue Address
- ACE Ideation Centre - 79 Ayer Rajah Crescent #01-13, jtc LaunchPad@one-north, Singapore 139955 Singapore | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948511435.4/warc/CC-MAIN-20171210235516-20171211015516-00774.warc.gz | CC-MAIN-2017-51 | 1,550 | 26 |
https://clojurians-log.clojureverse.org/off-topic/2021-10-07 | code | This page is not created by, affiliated with, or supported by Slack Technologies, Inc.
- # babashka (30)
- # beginners (49)
- # calva (22)
- # cider (9)
- # clara (2)
- # clj-commons (1)
- # cljdoc (1)
- # clojars (7)
- # clojure (153)
- # clojure-australia (2)
- # clojure-europe (45)
- # clojure-italy (3)
- # clojure-losangeles (1)
- # clojure-nl (17)
- # clojure-portugal (3)
- # clojure-uk (6)
- # clojurescript (21)
- # conjure (4)
- # copenhagen-clojurians (5)
- # cryogen (3)
- # cursive (19)
- # datahike (14)
- # datascript (4)
- # datomic (9)
- # events (5)
- # fulcro (23)
- # graalvm (1)
- # gratitude (4)
- # helix (2)
- # holy-lambda (5)
- # improve-getting-started (2)
- # jobs (10)
- # kaocha (1)
- # leiningen (1)
- # liquid (8)
- # membrane (81)
- # off-topic (88)
- # polylith (29)
- # quil (1)
- # reitit (2)
- # remote-jobs (8)
- # reveal (8)
- # sci (1)
- # shadow-cljs (14)
- # specter (4)
- # sql (5)
- # tools-build (11)
- # tools-deps (5)
Somewhat off, somewhat on topic: is there a better way to work with CSS than "random tinkering attributes until things kinda work"? I mean, it all seems random... sometimes elements occupy 100% of the sceen when the parent asks for them to be centered, there are weird issues if you use
Also, does someone tried, or even thinking, about designing an "explainer" for CSS? Something like "why does this attribute have this value" and then the tool shows you what is influencing that behavior?
Alas, I don't think it's a surmountable task. Not only CSS+HTML is immense, browsers are also finicky as hell. A few weeks ago was dealing with an issue where Safari versions X and Z were working properly but Y, where X < Y < Z, was ignoring overflow properties on children of table cells. And of course one of my clients had version Y. And just a few days ago, encountered a bizarre issue, where some very particular combination of flex containers with inline children were causing text with links to take as much vertical space as would be required for the text if it was wrapped at each word. Even though the text wasn't wrapped at all. Very hard to stumble upon randomly and impossible to find an explanation for. Somewhat related: https://drewdevault.com/2020/03/18/Reckless-limitless-scope.html
Yeah, but nothing shows you how the combinations of those properties interact. Sometimes, you can find some explanations online, which are often along the lines of "here's this neat trick that accidentally does what you need".
For me, the devtools is only useful to get what the browser computed. Most "computed styles" are set from parents, from grids/layouts, or bizarre combinations of these (like setting
align-items: center; that sets width/height of parent elements, for example). So, I see the computed style, see that there's nothing exclusively setting that, then I start to comment attributes one by one until that "computed style" changes, so that I finally can understand why things happen the way they do...
every-layout.dev might be a valuable resource (haven't seen it before), but those are all static "top-down" explanations. I.e. they're great when you want to achieve something and that something happens to be described.
But when you have a "down-top" situation, when you have something interacting in a strange way, it won't help much.
Oh, at this point I'm so jaded by tracing issues to browsers' bugtrackers that I'm always blaming the browsers by default.
I feel that with today's standards, we could replace CSS with the original idea of having a programming language for styles. I believe it would even simplify the implementation of layout engines, to be honest...
Like, literally in the CSS for JS devs course the author says: When you make a mistake in Typescript, you get a helpful tooltip telling you exactly what you did wrong. In CSS, by contrast, you're left in the dark
It feels like old-time school programming where you had to prepare a batch of commands, send to a computer, wait a lot and then get back "segfault" 😢
css isn't great and I would also say that using
spans as primitives is a bad idea
I'm not sure if that consistency is required or even beneficial for UI. I don't have that much experience, but desktop UI development has always seemed to be much simpler. Of course, web UI and desktop UI in general have different sets of requirements. But at this point it's still unclear to me that desktop UI technologies can't be more effective that web UI ones while developing the said web UI.
> this is pretty expensive and was just released but it targets the problem pretty directly. I haven’t tried it, though https://css-for-js.dev/ Havent looked at it myself either, but the same author also maintains a pretty insightful blog: https://www.joshwcomeau.com/
I think that the amount of freedom you get with html/css/js as opposed to the fixed nature of desktop widget toolkit is both a source of complexity, as well as one of the primary reasons the web became as large and diverse as it is.
I would dare to say that desktop development provides you with even more freedom. :) I mostly have experience with Qt 4 and early 5, but you can change absolutely anything there and make it work.
@UDF11HLKC there's also the EFL framework that do offer a separation between UI and logic, so you can have both. EFL also decided to not do CSS at all, and instead have a scripting language for layouts. This made skins that essentially behave extremely different from each other, but use the same "backend" (if we can call it like that). I remember being kinda revolutionary at the time it was presented
(sure, they didn't care about backwards compatibility at all, so people decided to not use, but still 😄)
Sure, but would you still classify that as easy. I think that for many people, creating custom components is easier on the web than in a widget toolkit. Although I’m much better versed in web than in widget toolkits :’)
Yes, it was easy. Qt is amazing with documentation and examples. Well, was, at least.
web UIs are a strict subset of desktop UI options.
In terms of possibilities, yes. It's just that those possibilities are exposed in an often not-so-friendly way, if at all.
CSS is such a vast topic im dealing with for years almost every day at work and I still learn new things constantly.
What I realized a bit late was that about all properties that have to do with layouting are parameters to a layouting function set through
display. But every now and then weird things start to happen because there are all too many rules on behavior that cannot all be kept in mind the same time and in addition specificity (style overrides) make things even more complex for the mind. I would appreciate a clojuresce approach of minimizing things one have to keep in mind while doing things.
E.g. did you know that if you set width/height on a flex-child that refers to the current main axis makes that width/height behave as flex-basis? Its things like that which appear in the wild and are really hard to keep together in a small mind especially when many styley fly around.
This discussion is interesting to me because I genuinely think CSS is hard to do right, despite being a web dev since almost 10 years, so it is kind of my daily business to do this. Now many struggles described here and elsewhere often come down three issues: 1. CSS is a non-orthogonal system (like helicopter controls), with strong defaults (I don’t mean just browser defaults, but rather how declarations interact). It is very easy to get a thing right that fits right into the model, but very hard for special cases. 2. Many who struggle with CSS don’t take it seriously enough to study it. There are tons of details/interactions to know and experiment with to build up working knowledge. I recommend “CSS The Definite Guide” as a start. 3. CSS is hard to organize, especially if you don’t either use a preprocessor or a library that integrates your UI with it (css in js etc.) one reason for this is that everything is globally scoped and the cascading rules. If you are not careful and have no naming and structure conventions, then you get into a mess really really quickly.
But yeah I largely agree with how CSS works, it’s the quirks and special cases that make it hard and frustrating sometimes.
elm-ui did some cool stuff with that. If you haven't tried that design system, i'd reccomend it
with the understanding that CSS isn't going away.. if you are looking for a comprehensive book to fundamentally improve your understanding of CSS I found this one provided major insights for me and would highly recommend it: https://www.manning.com/books/css-in-depth
Step 1: Wait for elm-ui to release 2.0 with its complete animation story Step 2: Map out how to best represent that api in clojure (and react probably) Step 3: ctrl+c, ctrl+v Step 4: conference talks
But don't UI frameworks/libraries already provide such a functionality? Which is always enough only till it's not.
I rather use css frameworks. But even than I was unpleasantly surprised some menu item wasn't shown on some phones because of the resolution. You could fall back to drawing on a canvas, on a fixed size. It least less surprises..
I would propose an alternate approach. 1. Read about how designers think about layout (eg. design systems, design tools) 2. Map out how to best represent that api in clojure (probably not react) 3. Figure out how to automatically produce html/css from that representation (we already have clojure -> js!) 4. build stuff
@U7RJTCH6J got it right. For one, designers don’t think of the UI as being strictly hierarchical. For them it is more about an open set of relations, rules and principles. Also they adopt the models of their tools, which are layers and transformations. In web frontends we use a strictly hierarchical model and cram everything into it. The tools we have for this model are appropriate: css follows this tree model/traversal. An efficient translation layer between those two could possibly be a very worthwhile undertaking. And Clojure seems to be the right tool for this.
> Also they adopt the models of their tools, which are layers and transformations. I would say it's the opposite. Their tools adopt the [mental] models of their users. It's an anti-pattern to try to define everything in terms of the tools you already know (eg. React, css, divs, spans) rather than spending the time to define the right model.
That’s right. I have to say one thing about designers though. It is common for them to polish a design/prototype around a given state or input data such as screen size/ratio, text and others. I think a new paradigm should take that into account. I have the habit of opening the browser console on sites that I find interesting. A thing that stands out is that low/no-code tools never get this part right. They might provide abstractions that are closer to a designer’s model, but don’t incorporate the failure modes, the programmer thinking, the what ifs.
I think the main units of composition are a form of "masters" and instances in figma, rather than the tree
Adobe XD on the other hand can have a hierarchy but mostly works through relations of elements except you group them explicitely. I also get designs printed onto a PDF with A4 pages. No idea how those are made :thinking_face: Indesign?
eg. the dropdown item instance, will receive its properties from the main rather than from its parent
The main issue with react isn't that it has components, but how it manages state (hidden state, global state, side effects). I would also say that using divs and spans as primitives is bad idea that is common with react, but react doesn't prohibit using other primitives.
I think react + stuff is a fine option if you want to build stuff today, but I really hope that's not where we're at 2-5 years from now.
I want to explore Figma more now. The vast majority of designs and prototypes I get are made with XD and some Sketch. Designers I know are typically not very diligent about organizing into components and tokens either. Not explicitly that is.
Here's a few references: • https://www.figma.com/community/design_systems • https://www.figma.com/community/file/857042825430121164 • I would also check out their data model. It's interesting, https://www.figma.com/developers/api#node-types their blog has some interesting posts: • https://www.figma.com/blog/line-height-changes/ • https://www.figma.com/blog/behind-the-feature-shadow-spread/ Generally, I also think the design systems that different companies/organizations have published are interesting.
And again, I think the hierarchical model is a translation or mental compilation target. That shifts more modeling work towards designers so it translates well. But is it the right model?
There are also a bunch of good youtube videos about figma.
A collaborator of mine tried it out a bit, but didn’t like it because it didn’t feel right for him. My guess at the time that it was just about the Ui or the familiarity.
Constraint layout is also an interesting layouting option in Android. Android has different layout possibilities that behave slightly different from each other much alike the different CSS layouting algorithms (Flex / Grid) but quite interesting. (Downside here: XML but thats just their approach) Edit: Forgot the link: https://developer.android.com/training/constraint-layout
Just came across one of these weird CSS features: https://developer.mozilla.org/en-US/docs/Web/CSS/will-change This feels like a compiler flag/annotation (inline this function/method etc) rather than an actual styling rule. It’s one of those examples of how CSS is a super leaky abstraction (in some cases). Now it obviously has history, people might have used Z transforms to achieve the same. The Z axis also has a history of being abused to for example trigger GPU rendering for CSS animations.
Its really rather weird as all it can do is optimize animation performance. It has some quirks too though as it can lead to one-pixel shifts due to those optimizations
> is there a better way to work with CSS than "random tinkering attributes until things kinda work"? If by "better" you mean more predictable, you could put in the time and effort to become a CSS expert, like the people in the thread above. Otherwise, the approach I prefer: don't create CSS, use a library. If, like me, you're not a CSS expert, and you don't require a highly customized UI, pick the most suitable UI library and stay within its bounds. You can lightly customize it, but any CSS not documented by the library should be considered a smell. CSS is too low level an abstraction for most projects. It's like making X-Windows calls for drawing/event handling when working on a Gtk or Qt app - you should be working at a higher abstraction level. There are some use cases where that low level hacking may be necessary or worth it, but in most cases it's just not. Even if we've gotten used to the expectation that it's "part of the job". "Random tinkering attributes until things kinda work" is indicative of the depth of knowledge and understanding that is required. Not understanding of the primitives and their specs, but of platform (browser) specific implementations of the spec. I.e. it's a problem of portability, caused by excessive complexity. (Who can tell that I spend most of my time in the back-end? 😝)
@U3Y18N0UC watch everything by Jen Simmons. 1. Start with CSS grid as your default mental model. It's more declarative then it's predecessors. 2. Use something like nubank workspaces or story book to keep components and functionality isolated.
However there will always be some amount of tinkering because the output relies on human aesthetics.
> Also, does someone tried, or even thinking, about designing an "explainer" for CSS? Something like "why does this attribute have this value" and then the tool shows you what is influencing that behavior? The browser will give you the best feedback for that information.
> The browser will give you the best feedback for that information. So that translates to "no" for me 😄. The best the browser shows is still way too little...
@U3Y18N0UC Can you give an example of what the browser can't show you? In chrome if i click inspect and look at the elements it will list everything in styles that it used to compute the styles. The styles, computed, layout tabs all show the information that is used to render the page.
@U0DJ4T5U1 for example, sometimes width is calculated not by explicitly setting the width. Maybe it was a
max-width, maybe because it's a flexbox, or a grid, etc. Sometimes it's unpredictable - I was trying to use flexbox wrapping and when things wrapped, the way the browser was calculating things changed.
Other possible example is when you use
transform: scale.... Sometimes I saw the parent resizing, others don't. What I end up doing is listing styles, the toggle everything off then little by little I toggle something on, to see what's influencing the behavior. It's quite like "commenting lines of code and running things until I found out why that variable contains
-1 instead of
10", and it seems incredibly unproductive (specially because I never know if that's how things are supposed to work, if it's an implementation detail, or a bug - and working with browsers, sometimes is a combination of all three)
@U0DJ4T5U1 Browser dev tools have gotten much better I have to agree. But they show very little interaction. I mentioned above how CSS is non-orthogonal: you have to turn multiple knobs at once to get a desired result. And that part is mostly implicit when it comes to tooling, you have to know and model those interactions in your head and translate the knob tuning back into CSS rules. A simple example that I think is not obvious and not explicitly shown in dev tooling: What does X% width/height refer to? Your intuition might fool you there. Similarly X% translation, box-sizing, how to compose multiple transition properties, flex interactions, margin overlap for block vs flex. Those are just some of the more basic things from the top of my head and there are tons of more subtle ones.
@U3Y18N0UC I agree with those kind of things you are either doing black box testing or just happen to know, have studied, a ton of non-obvious interactions between rules.
and to expand: max-width, flex grow/shrink and explicit width, those have non-obvious rules as well
Those rules might be non-obvious, but if the browser tooling itself can't surface how it's computing things i can't imagine what could.
I don’t quite get what you mean there. the browser shows you the calculated pixels and your rules
I'm not sure what you mean, what tool outside the brower (e.g chrome dev tools) have you been using to get information about your css?
the flexbox tools in Firefox are pretty good tho. Same with grid 🙂.
I think there is a misunderstanding here. I meant the tooling is not sufficient to really understand what is going on
Sure, I guess I would need to see a specific example to see if it was or wasn't. But in general yea, i run into things all the time i can't easily explain 🙂. My point was just that the browser tooling is the best place to look.
I have to say though. The MDN pages and the book CSS the definite guide are excellent resources to find even the weirdest interactions
firefox developer browser is great for css: grid, flex, etc...
I think the browser could add some "debug information" about CSS. I mean, it is already rendering what's going on, and sometimes even add source-map for SASS and LESS, for example.
Yes, but they link it on the devtools, that's what I meant
I think the issue is that lots of times "whats going on" is a royal tire fire. Which is why your best bet is to use the higher level new stuff like grid and flex. If your having issues there then your likely in the same camp as me :)
like give me the function that calculates the width of that specific box, and then it could spit out something that you can navigate maybe. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650264.9/warc/CC-MAIN-20230604193207-20230604223207-00002.warc.gz | CC-MAIN-2023-23 | 20,077 | 128 |
http://sequenomcmm.com/fwpkclntsys-location.html | code | Also note the rest of the older drivers and update them to current, W10 compatible versions. Then type the valid password to proceed the recovery method. It is entirely your responsibility to fix the fatal issue from the Windows machine. If not, please comment on this topic in more detail later. To prevent this just software, and install it on your computer, and follow the steps bellow. Did that, and now I have the Australian en-au version of Security Center v11. The result is improved application and system stability.
This problem may occur due to any faulty hardware device or its incompatible driver, any recently installed software program, corrupt or conflicting system services, etc. This annoying issue may take place on your computer, just after completing the respective operating system installation. Please know that updating the drivers is a way to fix some computer problems, but you have to update the associated drivers according to the error message. Drivers can work one day, and suddenly stop working the next day, for a variety of reasons. Here are my minidump files. Driver Robot fixes all driver. Regards Please remember to mark the replies as answers if they help, and unmark the answers if they provide no help.
Error Messages due to fwpkclnt. The assembly manifest contains the assembly metadata that provides all the information that is required for an assembly to be self-describing. Finally, you need to restart the machine once to apply the change properly. In most cases, this issue can be resolved by updating the drivers of a newly installed hardware device that is causing the problem. Reinstalling Windows is an easy yet time-consuming way to fix software problems on your computer. Method 3: Run a virus scan.
From the displayed tab, choose the Windows Advanced option at first. The pool is already corrupt at the time of the current request. MmSpecialPoolStart unable to get nt! You're really my life saver! Again wold love to have them post here for malware detection and clean up. As a regular user like you, I realize that some errors are still occurring by this method. To rectify these two issues, you are to take various way out and then watch which one will work most efficiently to fix the troublesome problem.
In the minidump file analyzer, the fwpkclnt sys may get displayed as the major corrupted driver, which causes the error. Each attempt made to install the Windows 10 on your laptop may fail to get completed. Malwarebytes is designed to run alongside all of the popular antivirus programs. I've done a clean uninstall of Malwarebytes and a re-install. Over time, more and more invalid entries are left and accumulated in the registry and then lead to various errors and problems. Wish I could help you more but just not enough to go on with what is posted so far. Once enabled, administrators can enter into the safe mode by pressing F8 key, and then uninstall or update the drivers of the culprit hardware device.
Method 1: Test for hard disk corruption. Steps: Windows Vista, Windows 7 and Windows 10: a. Everything's been running smoothly until today. Regards, Matheus Rogério Reminder: In case you feel that your question has been answered, please mark it as answer. Your Printer might not print or the pointer of the mouse won't move on the monitor. My computer seems to start up very fast now and the error message does not pop up any more. If it starts happening again, I will post back here.
After the scan completes, either quarantine or remove any detected malware. An ongoing discussion about this tool is. So make sure everything is done in a stable earlier version like Windows 7, 8, and 8. For example, an accounting program may be sold by module. They throttle the supply of new software so the servers don't get overloaded and so that any unforeseen problem can be nipped in the bud so to speak. Next, from the displayed list, double click on the Windows Firewall option. Microsoft R Windows Debugger Version 6.
We do not claim any responsibility for the results of the actions taken from the content linked below - complete these tasks at your own risk. Whenever you try to login to the respective Windows system, an error message may come up. Language independent An assembly can be developed by using any one of the supported. These troubleshooting steps get progressively more difficult and time consuming, so we strongly recommend attempting them in ascending order to avoid unnecessary time and effort. If all these fail to end the error, then run the system Startup Repair method and wipe out all issues smoothly.
Therefore, the program is no longer self-contained, and the program may experience problems if the dependency is broken. If the tool wasn't run remnants of the old software could have affected it. I'm wondering if this sudden reappearance may have something to do with McAfee updates? I have bolded where Malwarebytes is indicated on your report. Alternatively Browse my computer for device software to install the drivers manually located in the hard disk. You guys are really helpful! Restart your system into Safe Mode with Networking.
If you have feedback for TechNet Support, contact tnmff microsoft. This kind of error can happen when Windows or software starts or shuts down, or maybe when you are using the computer or software. The best part is that can also dramatically improve system speed and performance. Chkdsk is scanning your system and takes some time to complete the repair. . Thank you The pool is already corrupt at the time of the current request. I've done a fresh install of Windows 7 Pro after upgrading to Windows 8 and disliking it. | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999263.6/warc/CC-MAIN-20190620165805-20190620191805-00450.warc.gz | CC-MAIN-2019-26 | 5,655 | 10 |
https://www.kimkovacik.com/post/2017/05/12/budapest-vienna | code | - Kim Kovacik
Budapest & Vienna
I only spent a couple of days in these cities, so I didn't think a full blog post would be an accurate enough account. Instead, I compiled all the photos I took in a photo gallery.
This is what I saw.
Happy Cycling- Boards of Canada | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00776.warc.gz | CC-MAIN-2023-23 | 264 | 5 |
http://forums.bistudio.com/showthread.php?18168-Gray-boxes-for-new-buildings-in-map&p=202549&viewfull=1 | code | Not sure if this is the right place for this question..
Got new buildings, created icons for them.
Can see icons in mission editor IF building placed as object in mission editor.
CANNOT see icon if placed as map object..
It seems most buildings in ofp have a icon that can be seen on pre-set maps, but where is it found and how do I create it, I know its related to the size of the building.
Its not entirly O2 but O2 could have something to do with it, I just dont know..
I hope someone can help as without all new buildings cant be seen on map.. so you could find you self on a 100 story tower with no means to get off (except jump) | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053865/warc/CC-MAIN-20131204131733-00079-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 634 | 7 |
http://ottolangegallery.blogspot.com/2009/03/holy-smoke-stack-batman.html | code | The restaurant, Club Lago, where we finished up the night following the Fresh Faces show at Judy Salsow on March 13 had a tsunami of brick showered on it 5 days later. The odd thing is that I was talking to a collector friend of mine a couple of days before who told me that he had just eaten at Club Lago the night before. Another weird thing is that I saved a draft of a "thank you" email that I was going to send to the owner because he had made accommodations for 20 people ( I was going to edit some pictures of the evening's merriment with the email). And weirdest of all, The day I got news of "hey, you know that restaurant where we ate on Friday...", I was actually editing those pictures.
Pin It Now! | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607636.66/warc/CC-MAIN-20170523122457-20170523142457-00633.warc.gz | CC-MAIN-2017-22 | 710 | 2 |
http://www.lpassociation.com/forums/archive/index.php/t-34303.html | code | View Full Version : In The End (zwieR.Z. Remix)
06-23-2011, 07:25 PM
Last month I released a remix of 'Somewhere I Belong' to celebrate reaching 1000 fans on Facebook. A few days ago I finished a remix of 'In The End' and I thought that it would be nice to release it when I reach 1500 fans!
Here's a 45-second snippet:
If you like it and you want to hear a full version, go to https://www.facebook.com/zwierzproductions and click the 'like' button ;)
06-23-2011, 07:44 PM
Sounds good, but get more original work done. Your own songs are too good to be working on remixes.
06-23-2011, 08:12 PM
Don't worry, I will be releasing a lot of original stuff in the next few weeks ;)
06-23-2011, 08:45 PM
Sounds good, the only criticism I can give is during the verse the guitar "beeping" is a little distracting and, no offense, kind of annoying.
You just got a new fan.
I'm looking forward to listening the full version!
06-24-2011, 05:11 AM
Yup, still too underrated. I've been a fan for a long time too. :D
06-24-2011, 05:44 AM
I don't like this one that much. It's way too busy...
06-30-2011, 09:45 AM
When will this be released?
EDIT: More people need to like you. You too good.
07-16-2011, 06:24 PM
Thanks for your comments! Full version is now available:
Feedback will be appreciated ;)
07-16-2011, 07:29 PM
Such a good instrumental.
Powered by vBulletin® Version 4.2.2 Copyright © 2016 vBulletin Solutions, Inc. All rights reserved. | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393146.70/warc/CC-MAIN-20160624154953-00199-ip-10-164-35-72.ec2.internal.warc.gz | CC-MAIN-2016-26 | 1,435 | 26 |
http://www.tomshardware.com/forum/35613-63-bsod-0x0000007e | code | Recently, when i switched on computer in the morning, i have BSOD when loading system. However, the computer was reset, and the second time turn on normally. That was for about 2 weeks.
I thought it was a breeze. And finally (yesterday) BSOD performed at every turn on your computer (http://ifotos.pl/zobacz/Beztytuuj_rrwxnhq.jpg/). After a few restart, computer was turn on. To correct the problem i had reinstall the network adapter drivers TP-Link WN 722N.
My computer was overcloacking - from 2.2ghz to 2.6ghz. But, was stable. Temperature was around from 38 to 40 degrees Celsius. However the northbridge is very warm. I checked by hand. And motherboard with cpu, have already been over 4 years.
BSOD is very random situation...try to bump your processor voltage more.
but if it cannot solve your problem..
according to your explanation, maybe you have problem with your powersupply,
Check your cable from psu to mobo, reseat it well, and try to assemble your computer outside casing.
and dont forget try to swap your psu with other psu.
I have all settings in default values. I reset the BIOS.
I forgot to write. Two times i have this message from BIOS: Warning! The previous performance of overclocking is failed, and the system is restored to the defaults setting.
But the settings were default.
Yeah, i still have 7B bsod.
Since your BIOS has reset to default BIOS settings, see if your SATA ports are now using AHCI instead of IDE. 0x07B is usually an inaccessible boot device error in most of my personal experiences it results from the BIOS being set to use AHCI while Windows hasn't had the AHCI drivers installed.
Like you said though, it does seem like a hardware failure somewhere because it gets worse overtime. As the faulty hardware keeps corrupting data that it writes back to your hard drive, like bad RAM would do, it will eventually corrupt your installation of Windows to the point where it can't boot or run properly.
However, it would take replacement parts for several components and probably a reinstall of Windows, or using an image of a fresh install, for every component you wanted to test to figure out which one is the problem.
Well, 0x7B errors indicate the OS can't see the HDD for whatever reason; shoddy SATA cable prehaps? Might also be a BIOS problem though; this might be one of those rare situations where a BIOS update might fix the issue. | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345776257/warc/CC-MAIN-20131218054936-00069-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 2,381 | 16 |
https://www.eclifeusa.com/products/chaise-lounge-chairs-with-adjustable-backrest-easy-assembly-waterproof-pool-lounge-chairs-with-320lbs-capacity-outdoor-patio-chaise-lounge-for-poolside-patio | code | Chaise Lounge Chairs with Adjustable Backrest, Easy Assembly Waterproof Pool Lounge Chairs with 320lbs Capacity, Outdoor Patio Chaise Lounge for Poolside Patio
- 【YOU WILL GET A SURPRISE】: Patio lounge chair provides more sturdy support with a max weight capacity of 320 lbs. This is a chaise-style lounge with no armrests for easy access and freedom of movement without restraint, allowing you to tan, doze, or relax in any way that pleases you. Besides, the pool lounge is highly breathable.
- 【DURABLE MATERIAL】: The chaise lounge is made of the HDPE with modern processing technology and physical means. Much higher than ordinary hardwood materials in terms of material density, hardness, and flexural strength. The lawn lounge chair is free of burrs, smooth, waterproof, fireproof, and easy to clean.
- 【5 ADJUSTABLE POSITION】: The outdoor chaise lounge with 5-adjustable positions can adjust the backrest to suit your body. It feels silky and luxurious and has the flexibility to bend with a person’s weight, providing unparalleled comfort. Suitable for beach, patio, pool, lawn, garden, deck, office nap, bedroom, balcony, or a temporary bed for your guest. Whatever children, adults or elders all could have leisure time on it.
- 【EASY TO ASSEMBLE】: This black lounge chair includes illustrated instructions and required tools. One person can finish the whole process in just 10 minutes! You want to be careful not to overtighten the hole at first. Tighten it up when everything is ready, and you will get nice chaise lounge chairs for outside, which makes it easy to promote sustainability in your home in a cute, stylish, and functional way. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00705.warc.gz | CC-MAIN-2023-23 | 1,669 | 5 |
https://www.comsoc.org/publications/journals/ieee-tnsm/cfp/latest-developments-federated-learning-management-networked-0 | code | Manuscript Submission Deadline
Call for Papers
Driven by privacy concerns and the promise of Deep Learning, there has been considerable amount of research that targets the applicability of Machine Learning (ML). The communication, network and service management fields are hungry for ML decision-making solutions to replace the traditional model-driven approaches to address the ever-growing complexity and heterogeneity of the modern systems. In this context, interest in Federated Learning (FL) is rising to take into consideration the limitations of centralized systems for data analysis by using distributed on-site analysis for learning statistical models. It is a privacy preserving decentralized approach, which keeps raw data on devices and involves local Machine Learning training while eliminating data communication overhead. The training and testing occur not only on end devices, including personal computers, smartphones, and tablets, but also on edge devices that generate the data. A federation of the learned and shared models is then performed on a central server to aggregate and share the built knowledge among participants.
The existing Federated Learning schemes have limitations that require the development of novel solutions to better comprehend and improve the potential and propriety of applying Federated Learning for decision-making in various real-world applications. Existing challenges for employing Federated Learning include but not limited to network management, communication efficiency, client selection and scheduling, resource management, security concerns, privacy concerns, incentive mechanisms and service management and pricing. For addressing these challenges, there are various techniques as potential solutions, including data augmentation, active learning, multi-task learning, knowledge distillation, compression, game theory, trust and reputation, multi-objective optimization, reinforcement learning, transfer learning, blockchain, and many more. These solutions can potentially offer reliable, efficient, secure, and trustworthy collective learning for participants and service providers by deriving decisions using Federated Learning models for diversity of fields and applications.
IEEE Transactions on Network and Service Management (IEEE TNSM) is a premier journal for timely publication of archival research on the management of networks, systems, services and applications. This special issue will focus on the latest developments of Federated Learning in terms of System, Network, and Resource Management solutions supported with related case studies and experiments. We welcome submissions addressing the important challenges (see the non-exhaustive list of topics below) and presenting novel research or experimentation results with system or network related case studies. Survey papers that offer a perspective on related work and identify key challenges for future research will be considered as well. We look forward to your submissions!
Topics of Interest
In this Special Issue, we focus on cutting-edge research from academia and industry with an emphasis on the system, network, and resource management to realize the deployment of Federated Learning in practice and lay the groundwork for its future. Topics of interest for this Special Issue include, but are not limited, to the following:
- Federated Machine Learning System Models & Design
- Transfer Learning in Federated Learning
- Knowledge Distillation in Federated learning
- Analysis and Solutions for Non-IID Data
- Service Pricing Models
- Optimization Algorithms for Network Management in Federated Learning
- Optimized Information Retrieval
- Incentive Mechanisms for Federated Learning Participants
- Federated Learning in Cloud/Fog/Edge Computing and Networks
- Cloud/Fog/Edge Computing and Networks for Efficient Federated Learning
- Deep Reinforcement Learning for Federated Learning Resource Management
- Routing Schemes in Federated Learning
- Federated Learning Client Selection and Scheduling
- Platforms for Trust and Reputation Between Participants
- Platforms Addressing Security Concerns in Federated Learning
- Platforms Addressing Privacy Concerns in Federated Learning
- Blockchain for Federated Learning
- Applications of Federated Learning in Wireless Networks (5G, 6G), Internet of Things, Cloud/Fog/Edge Computing and Networks, Vehicular and Mobile Networks, Urban Environments, Smart Cities, Healthcare, etc.
All papers should be submitted through the IEEE Transactions on Network and Service Management manuscript submission site. Authors must indicate in the submission cover letter that their manuscript is intended for the "the Latest Developments in Federated Learning for the Management of Networked Systems and Resources" special issue. View detailed author guidelines.
Paper Submission: 15 April 2024 (Extended Deadline)
Publication Date: 31 December 2024
Lebanese American University, Lebanon
Khalifa University, UAE
Concordia University, Canada
University of Bologna, Italy
University of Quebec at Trois Rivieres, Canada
University of Science and Technology, China | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00018.warc.gz | CC-MAIN-2024-18 | 5,124 | 34 |
https://digitalcommons.bryant.edu/cisbook/3/ | code | Visualization of Predictive Modeling for Big Data Using Various Approaches When There Are Rare Events at Differing Levels
Handbook of Research on Big Data Storage and Visualization Techniques
Many techniques exist for predictive modeling of a bivariate target variable in large data sets. When the target variable represents a rare event with an occurrence in the data set of approximately 10% or less, traditional modeling techniques may fail to identify the rare events. In this chapter, different methods, including oversampling of rare events, undersampling of common events and the Synthetic Minority Over-Sampling Technique are used to improve the prediction outcomes of rare events. The predictive models of decision trees, logistic regression and rule induction are applied with SAS Enterprise Miner (EM) to the revised data. Using a data set of home mortgage applications, misclassification percentages of a target variable with a rare event occurrence rate of 0.8% are obtained by running a multiple comparison node. The percentage is varied from 0.8% up to 50% and the results are compared to see which predictive method worked the best. | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348509972.80/warc/CC-MAIN-20200606031557-20200606061557-00288.warc.gz | CC-MAIN-2020-24 | 1,148 | 3 |
http://thealphajohn.blogspot.com/2007/05/l00k-eye-m-on-da-interwebs-faceb00k-me.html | code | In my "Introduction to Management Information Systems" class -- the one whose textbook I could write from memory without needing a single citation -- we had to build our VERY FIRST INTERNET(S) HOMEPAGE!!!!@!#@%$%^^@#$^~!@!
My cup runnith over with delight:
It should be #1 on Digg in the next 20 minutes.
How Will This Bank Fare Going Forward?
1 hour ago | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594018.55/warc/CC-MAIN-20180722213610-20180722233610-00389.warc.gz | CC-MAIN-2018-30 | 354 | 5 |
https://nzpcmad.blogspot.com/2017/08/adfs-saml-slo.html | code | SLO = Single log out.
The way this is supposed to work is described in the SAML specification.
For one customer, they had 6 RP and one of then didn't do SLO properly and didn't return a logout response.
This stopped all the others getting called, clearing cookies etc. so it was a "half a logout" solution.
Eventually, I simply removed the SLO endpoint for the RP via the ADFS wizard.
Everything then worked correctly.
The RP with issues was still logged in and if you knew the URL you could still continue but at least the bigger picture worked.
I should point out that this RP was the only one that did not use an industry standard SAML stack and had instead tried to roll their own. You may draw your own conclusions :-) | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583656577.40/warc/CC-MAIN-20190116011131-20190116032915-00045.warc.gz | CC-MAIN-2019-04 | 723 | 8 |
http://www.etherboot.org/wiki/talks | code | Members of the Etherboot Project have made regular appearances at various conferences and trade shows, given talks, and submitted papers. This page links to some of those events and papers. They provide an overview of our project and our software.
- Slides for Introduction to Network Booting.
- February 2009 FOSDEM Talk "Syslinux and the dynamic x86 boot process" by H. Peter Anvin. Includes a description of gPXELINUX at 17:00 and a terrific demo of booting over the internet at 19:28.
- August 2008 Google Tech Talk "gPXE: Modern FOSS Network Booting" by Marty Connor, H. Peter Anvin, Michael Brown
- The Etherboot/gPXE BoF from LinuxWorld 2007 by Marty Connor, H. Peter Anvin, Donald Becker, Michael Brown
- x86 Network Booting: Integrating gPXE and PXELINUX (H. Peter Anvin and Marty Connor) at 2008 ottawa Linux Symposium | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119356.19/warc/CC-MAIN-20170423031159-00413-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 828 | 6 |
http://oraclejo.blogspot.com/2006/11/aligning-oracle-forms-applet-webform.html | code | Today, while i was helping Dubai Police to go live with their new Oracle Forms10g application, we came across a problem when displaying Arabic enabled forms.
Oracle forms typically initializes and launches an applet within a regular IE browser page.
The form we were working on is large in size and its problem is that when it is first displayed, it truncates the right margin of the form (actually the applet is truncated). Since Arabic is Right to Left l oriented language, truncating the right margin means losing the leading and important parts of the labels and field. Of course, the user can still use the scroll bars and view the hidden parts of the screen, but it was becoming more and more inconnveneint for the users.
To fix such problem, one needs to incorporate an HTML tag that switches the browser to Right to Left (RTL) mode.
The tag is
HTML DIR= RTL
the above should be placed within tag sign <>
The question remains where to locate this tag.
Find your formsweb.cfg configuration file
baseHTMLjinitiator variable to locate that base HTML page that embeds the Java Applet. for example the default setting is
then open the basejini.htm file
and add the tag
Sunday, November 05, 2006
While trying to figure out what one of our ex-colleagues at REALSOFT is programming a business rule engine admin screen for the Health Insu...
Today, while i was helping Dubai Police to go live with their new Oracle Forms10g application, we came across a problem when displaying Arab...
عمان كانون ثاني ٢٠١٧ اجد نفسي، وبعد ان خال لي اني هجرت الكتابة في هذا البلوج بضع من الزمان ، اعاود طرق بابة لجمال ما قرأت وذلك بعد ا... | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323807.79/warc/CC-MAIN-20170628222452-20170629002452-00501.warc.gz | CC-MAIN-2017-26 | 1,723 | 16 |
http://skahal.com/buildron | code | Your builds, our world!
What is this?
Buildron is an free app from developers to developers. Are you a developer? No, so take a look on our game Ships N' Battles, you will enjoy it a much more than Buildron.
Well, are you still here? Oh... maybe you are a developer, or a geek... maybe both!
Buildron is what people like to call as a radiator, a Continous Integration Radiator or a Build Radiator, but we took a more immersive approach than the traditional Continous Integration Radiators on the way.
What people are saying about it?
Why use it?
As Martin Fowler said about CI:
"Everyone can see what's happening
Continuous Integration is all about communication, so you want to ensure that everyone can easily see the state of the system and the changes that have been made to it. One of the most important things to communicate is the state of the mainline build. ...Many teams like to make this even more apparent by hooking up a continuous display to the build system - lights that glow green when the build works, or red if it fails are popular."
Be sure that the whole team knowns the state of your builds is very important part o Continous Integration.
How It Looks Like?
Nowadays we have a lot of options of Continous Integrations Servers, like TeamCity, CruiseControl and Jenkins. All this amazing servers have a page that display the state of your builds, but .... we must be honest … it's so simple!
We wanna something more interactive, more visual and, what not, more FUN!
Buildron is a 3D environment where each of your build configuration became a Totem. Each Totem display some information of the build, like project name and configuration, last user that has triggered the build, and, of course, the state of build: success, running, failed and queued.
Each user on the IC Server will became a 3D avatar on the environment, a little robot that raise the arms when the build go success or put hans on head when the build failed. Buildron uses Gravatar, so you can put your photo close to the avatar (the e-mail used on CI Server will be used).
The current version supports Hudson, Jenkins and TeamCity, but we have developed using good design patterns, like Abstract Factory and so on. We just need to implement news factories for the others CI Servers. So, what will be next server supported by Buildron? You can help to choose! All you need to do is vote on our pool:
How can I Interact with it?
Would you like to interact with Buildron? Take a look on Buildron RC.
Buildron RC is a 3D remote control app for Buildron where you can:
✓ Filter the builds by status or build name
✓ Start or stop a build
✓ Sort builds by name and status
✓ Zoom in and zoom out
✓ Get closer to the builds history totem
✓ Share Buildron screenshots on Twitter
It's fun, you should try.
Oh, we need to warm you: there is some easter eggs to be found here... Free your mind
I Like the Idea, What's Next?
Well, since Buildron is free, why don’t give it a shoot? Download and put it to run, your team will see the Continous Integration with a different way.
And if you really like it, and want to support it, you can donate here:
If you like taking a picture from your TV or monitor running Buildron: send to us! We will appreciate to see this and put your Buildron picture on our gallery bellow:
Releases✓ 04/04/2013 - 1.6.0
✓ 02/02/2013 - 1.5.0
✓ 20/10/2012 - 1.2.0
✓ 08/10/2012 - 1.0.0
✓ Mac (direct download)
✓ Windows (direct download)
Yes, it can. In the "Hudson/Jenkins IP" field just type more "/view/viewName" (case sensitive). So, for example, if your server has a IP 127.0.0.1 and you want to see just builds from a view named "Infrastructure", then your IP field will be: 127.0.0.1/view/Infrastructure.
If you aren't seeing the "Buildron Configuration" dialog window in the app initialization, just press "option" key on MAc or "shift" key on Windows in the initialization to see the window again.
For users who has a dedicate machine to run Buildron and want to automate the machine wake up and shutdown we have implemented the "autostart" argument.To use it, just call Buildron with this argument and it will try to auto start and connect to CI server.
open Buildron.app --args autostartOn Windows:
Buildron.exe autostartIf you want to auto start your Windows PC you can configure the auto start time on BIOS and active the autologon on Windows:
We'd love to hear you. Please, send your suggest to our contact e-mail.
- Download Buildron
- Open it (Mac: from Applications | Windows: Buildron.exe)
- In "Buildron Configuration" screen, select the resolution and click in "Play!"
- In the next screen type the follow informations:
- TeamCity IP: your TeamCity server IP
- UserName: a TeamCity's ADMIN username
- Password: a TeamCity's ADMIN password
- Start it (click on arrow image).
- Enjoy it!
Since Buildron is free, you can buy Buildron RC or make a donation:
- A real graphic card installed on machine
- DirectX or OpenGL
Each robots represents an user who committed changes last for a particular build.
The icon is the avatar from http://www.gravatar.com. To use it, just configure your e-mail on CI server user profile and link the e-mail with your Gravatar account.
Gravatar and Buildron use cache, so, it take a while to icon be updated.
It's looks like your usernames in the TeamCity are not the same that in your VCS.
Take a look on user administration page at TeamCity and map the VCS's usernames on section "Version Control Username Settings".
More info at Managing Version Control Username Settings. | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701153998.27/warc/CC-MAIN-20160205193913-00062-ip-10-236-182-209.ec2.internal.warc.gz | CC-MAIN-2016-07 | 5,545 | 62 |
https://www.freelancer.com.co/projects/transcription/translate-something-12137776/ | code | Transcription - Convert 40 hrs of recorded (English) audio conversation to text.
41 freelancers están ofertando el promedio de ₹14494 para este trabajo
Hi, I am a hardworking and a assertive individual who likes a challenge, I am also reliable and dedicated to any given task. With this view in mind I am willing to do my best to let this job be a success.
Hi! I am Ruwangika from Sri Lanka, an undergraduate new to freelancer.com. I have a lot of free time these days and hopefully can deliver your work in time. Thanks Ruwangika
good day sir. How are you today? my name is yinka and I am interested in doing this job. I promise to deliver a good and error free work. Thank you for reading. | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578532929.54/warc/CC-MAIN-20190421215917-20190422001917-00123.warc.gz | CC-MAIN-2019-18 | 694 | 5 |
https://sourceforge.net/directory/internet/loganalysis/license:osl/ | code | Cloudbased voice solutions are common in enterprise networks and frustrating for operations teams to manage. Simplify VoIP monitoring by having a proactive analysis of on-prem, hybrid and UCaaS voice services. Try the ThousandEyes VoIP monitoring solution today, free.Advertisement
- Grouping and Descriptive Categories (3)
- Linux (3)
- Mac (3)
- BSD (2)
- Other Operating Systems (2)
- Windows (2)
- Modern (1)
- License: Open Software License 3.0 (OSL3.0) ×
ConnView is conntrack table viewer. It is php script - frontend for ip_conntrack table. You can choose filtering, sorting for connections. Script recognizes common services in conntrack table .You can see connection list, or detail list per IP, etc.1 weekly downloads
This is a program that watches your system log files, looking for hack attempts. It instanty reacts to potential security breaches by (for instance) adding firewall rules to cut off the attacker.
Site visitor support for any web site. Give a more up to date feel, support returning visitors re-finding what they looked at before. Instantly add news page, upload page, personal history, featured articles, email to friends, etc.
If you are like the rest of our user community, your IT team is busy. With pressure to deliver on-time projects, you don’t have a lot of time to spend making your management tools work. You need network monitoring tools that work for you. You want tools that makes it easy to find performance issues before your users do and resolve them before they impact the business. That’s why tens of thousands of customers around the world love WhatsUp Gold.Advertisement
NOT - Filter log files to remove events you don't care about. | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948615810.90/warc/CC-MAIN-20171218102808-20171218124808-00791.warc.gz | CC-MAIN-2017-51 | 1,685 | 14 |
http://www.gvsu.edu/experiencematters/index.cfm?action=home.experiences_view&submissionId=ABC1C5AB-F9F2-FA7A-AF0D84A82D880188 | code | Grand Valley students are doing amazing things through professional experiences outside the classroom. This site gives viewers an inside look at these experiences. See some spotlighted experiences below, or click on View Experiences above to find more!
Major: Engineering - Product Design and Manufacturing While working at Langley I was expected to complete a major project. This project focused on collecting information related to the design, assembly/integration, and launching of a small satellite. The goal eventually resulting in an accessible webpage that can be easily updates with new information. This was just the beginning of this project and there is still a lot that needs to be done. I also had the opportunity to witness and participate in a scientific balloon launch. I helped with document organization, hardware and ground support equipment packing before the launch. Once at the launch site I participated in launch day activities and data collection. The last responsibility that I had was to support the Thermal Vacuum Lab within the Systems Integration and Test Branch. This required me to write and run a Thermal Vacuum Test for space bound hardware, construct operational procedures for hardware, and help out where ever I could.
Major: Engineering - Product Design and Manufacturing This co-op term, I worked offsite as a Product Launch Coordinator for a Tier 1 automotive supplier. I was in charge of line layout, inventory, training new employees, getting our orders built on time, and shipping and receiving. I also worked at a high tech manufacturing facility as a Quality Technician for the pilot line. There, I was in charge of collecting data so that we could show the capability of our machines and processes.
Major: Engineering - Mechanical The first two weeks I was just getting familiar with the plant and processes. The manufacturing floor is split up into north and south, so I spent time with both teams. During this time I did some part gauging, tried learning how to run all the machines, and did a bit of "grunt" work. The next few weeks I spent working with the advanced team. During this time I was assigned to an engineer and it was to him that I reported. My engineer have me a project where I was to develop some new parts for use in engine installation. Here develop means design, get parts built, and test parts according to a test procedure that I wrote. As of writing there is still a little work to be done on this project. I also did some benchmarking against competitors' parts and am planning on doing some tension testing to help one of the engineers refine the FEA simulation that he designed. Now I am working with the current manufacturing team. My duties include helping with machine qualifications, R&R's, and learning what goes into getting a new product line ready for production. Overall there will be a slow day here and there where you end up waiting on someone but usually there's quite a bit that needs doing. If you ever need something to do, ask. | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393463.1/warc/CC-MAIN-20160624154953-00091-ip-10-164-35-72.ec2.internal.warc.gz | CC-MAIN-2016-26 | 3,018 | 4 |
https://www.ditii.com/wordpress-plugin-custom-admin-menu/4382/ | code | The Custom Admin Menu plugin gives you full control of your WordPress administration section, without requiring any changes to any files! All customizations are done using a very intuitive graphical interface. This increased degree of customization will turn WordPress into a real content management system. Here are just a few of the things this plugin can do:
- Change the order of all of your administration menus to whatever you like
- Change the label of any menu item
- Create as many nested sub-menus as you want
- Make any page a top-level page, or move any page to be a child of any other page
- Tons More!
- Download Custom Admin Menu v1.0, and extract to your local folder.
- Upload unzipped folder to your /wp-content/plugins folder.
- Go to Plugin Menu, and activate the “Custom Admin Menu”.
WordPress Plugin, Custom Admin Menu | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578759182.92/warc/CC-MAIN-20190426033614-20190426055614-00286.warc.gz | CC-MAIN-2019-18 | 844 | 10 |
https://buckleyplanetblog.azurewebsites.net/2011/05/the-one-thing-reaches-10000-hits.html | code | The One Thing Reaches 10,000 Hits
We’ve just passed some milestones with my video series, The One Thing You Need to Know about SharePoint 2010: we surpassed 10,000 views (in 4 months), I recorded my 100th video (still have a dozen to edit and post), and it looks like I may be filming then in a more official manner for Microsoft’s Worldwide Partner Conference and uploading them daily (and multiple times daily). For those who may be unfamiliar with these videos, they are community videos by experts, MVPs, and MCMs talking about the one (or two) features that they want people to be aware of. The topics might be broad (like Joel Oleson’s “don’t turn it all on unless you know what you’re doing” video), or very granular (like Sadie Van Buren’s video on ratings).
The following video includes segments of videos from Steve Fox (Microsoft), Jeff DeVerter (Rackspace), Ruven Gotz (Navantis), Chris McNulty (KMA), and Paul Swider (OnClick Solutions). Its purpose is to provide an overview of some of the great content available through this video collection. Thanks for watching!
To keep up on the latest videos, you can follow me on Twitter at @buckleyplanet | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648000.54/warc/CC-MAIN-20230601175345-20230601205345-00382.warc.gz | CC-MAIN-2023-23 | 1,175 | 4 |
https://elements.tv/news/smb-vulnerability-on-vfs_fruit-module/ | code | SMB vulnerability on vfs_fruit module
This vulnerability only affects ELEMENTS NAS users that have „macOS SMB optimisation“ enabled in the Workspase section or an ELEMENTS ONE or BOLT with a modified „extra SMB option: vfs objects = fruit“.
Please see here about details:
Important message regarding CVE-2021-44142 “Samba Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit”.
Recently, Samba released a patch to address an Out-of-Bounds (OOB) Heap Read/Write vulnerability found in Samba versions prior to 4.13.17. This vulnerability was disclosed at Pwn2Own Austin 2021 by Nguyễn Hoàng Thạch (@hi_im_d4rkn3ss) and Billy Jheng Bing-Jhong (@st424204) of STAR Labs.
All versions of Samba prior to 4.13.17 are vulnerable to an out-of-bounds heap read write vulnerability that allows remote attackers to execute arbitrary code as root on affected Samba installations that use the VFS module vfs_fruit.
The fruit module that ships with Samba is designed to provide interoperability between Samba and Netatalk.
The problem in vfs_fruit exists in the default configuration of the fruit VFS module using fruit:metadata=netatalk or fruit:resource=file. If both options are set to different settings than the default values, the system is not affected by the security issue.
If you have actively enabled or configured the vfs_fruit module in your smb.conf, we strongly recommend that you contact support to schedule a security check and potential patching of your ELEMENTS system.
Read more about the vulnerability here: | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474843.87/warc/CC-MAIN-20240229134901-20240229164901-00460.warc.gz | CC-MAIN-2024-10 | 1,543 | 10 |
https://www.d2gamers.com/proxies-and-bots/ | code | Setup your own army of automated bots for the ultimate Diablo 2 gaming experience.
With over 10+ years of botting and proxy IPs hosting, we guarantee the fastest servers, over 300+ IPs available in 10+ different countries, 99.99% uptime and the lowest fees anywhere.Join D2Gamers Private Discord
Kolbot Setup and Pickit Configuration For MFing/Leveling/Rushing and More!
- One on one help in setting up Kolbot and showing you how the program works.
- Multiple bot setup with tutorial on mulings, crafting, configuring pickit and more.
- Join an exclusive community of gamers who enjoy share the same interest. | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371807538.83/warc/CC-MAIN-20200408010207-20200408040707-00168.warc.gz | CC-MAIN-2020-16 | 609 | 6 |
https://powerusers.microsoft.com/t5/Microsoft-Dataverse/Model-driven-process-Recommending-Flow/m-p/347719 | code | Hi @Yahya ,
Did you mean the business processes described below?
In addition, for feature requrest, please post your idea in below forum in the future:
The message is annoying, but at present there is no official guidance on when / how Processes would be deprecated. (I don't imagine it would be until you can do a real time Flow )
That said, there are good reasons to build Async background jobs as Flows - the most important of which is that it runs outside of the System Jobs queue, which can get flooded in the event a large data migration or change is triggered.
There is not currently a timeline to deprecate classic workflows. Although, the goal is for modern Flows to replace classic processes/workflows in the fullness of time. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304515.74/warc/CC-MAIN-20220124054039-20220124084039-00253.warc.gz | CC-MAIN-2022-05 | 736 | 6 |
https://www.oreilly.com/library/view/java-web-services/9781449373856/ch04.html | code | JAX-WS is an API for producing and consuming REST-style and SOAP-style web services.
Chapter 2 introduced, with a RESTful example, the JAX-WS
@WebServiceProvider annotation, which can be used for either
a REST-style or a SOAP-based service. This chapter introduces the
@WebService annotation, in effect a refinement of
@WebService is emphatically SOAP-based.
is thus sufficiently rich and varied that it might better be described as a collection of APIs. JAX-WS
is the successor to JAX-RPC, which derives from the XML-RPC discussed in Chapter 1.
The reference implementation for JAX-WS is part of the open source GlassFish project and is named
GlassFish Metro or just Metro for short. The current version of JAX-WS is 2.2.x.
JAX-WS is officially part of enterprise Java but, with JDK 1.6 or greater, JAX-WS services can be compiled and published
using only core Java.
SOAP-based services in JAX-WS can be published with a standard Java web server such as Tomcat or
Jetty; there is also a convenient
Endpoint publisher, used earlier to publish a RESTful service.
Apache Axis2 is an alternative implementation of JAX-WS. Axis2, the successor to Axis, is based on JAX-WS but has additional features. Yet another JAX-WS implementation is Apache CXF. This chapter focuses on the Metro implementation of JAX-WS, but the next chapter includes an Axis2 service and client. The Metro, Axis2, and Apache CXF implementations of JAX-WS are sufficiently close that a programmer fluent in one implementation should be able to move easily into any other implementation.
SOAP is an XML dialect that has two W3C-sanctioned versions: 1.1 and 1.2; SOAP is officially no longer an
acronym. The differences between the versions of SOAP are more about
infrastructure than API. For example, the media type for a SOAP 1.1 message is
text/xml, whereas this type
changes in SOAP 1.2 to
application/soap+xml. The SOAP 1.2 processing model is more thoroughly and precisely specified
than is the SOAP 1.1 model; SOAP 1.2 has an official binding framework that opens the
way to using transport protocols other than HTTP for delivering SOAP messages. In practice, however, HTTP remains the
dominant transport for both SOAP 1.1 and SOAP 1.2.
In the major SOAP frameworks of Java and DotNet, SOAP 1.1 is the default, but both systems support SOAP 1.2 as well.
SOAP has a basic profile, which comes from the WS-I (Web Services Interoperability) consortium to encourage and support interoperability among web service languages and technologies. Beyond the basic profile are various initiatives, some of which are covered in later chapters; these initiatives (for instance, WS-Reliability and WS-Security) often are grouped under the acronym WS-*. WSIT (Web Services Interoperability Technology) is a related set of guidelines that promotes interoperability specifically between Java and DotNet, in particular DotNet’s WCF (Windows Communication Foundation). WCF is a framework for developing service-oriented applications that would include but also go beyond SOAP-based web services (metro.java.net/guide). From time to time, this chapter refers to one or another SOAP specification in order to clarify a particular service or client, but the emphasis in this chapter remains on coding services and their clients. Unless otherwise specified, the examples are in SOAP 1.1. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662584398.89/warc/CC-MAIN-20220525085552-20220525115552-00763.warc.gz | CC-MAIN-2022-21 | 3,339 | 27 |
http://bluelightdistrict.org/wp/2007/12/from-the-balcony-in-rennes/ | code | Woke up today to a very rainy morning in Rennes. But great news also greeted me with the start of this new day. Air France had found my luggage and the only variable now is whether its intact. I plan to pick it up at the airport Monday on my way home.
From the Balcony in Rennes by Michael Paskevicius is licensed under a Creative Commons Attribution 4.0 International License. | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400222515.48/warc/CC-MAIN-20200925053037-20200925083037-00500.warc.gz | CC-MAIN-2020-40 | 377 | 2 |
http://www.preeminent.org/squeak/copyFilesTutorial/secondEnhancement-3.html | code | Let's try out our new test code. Open up a Workspace and execute
We can see that 120 tests were run and 119 passed. The test count looks correct since we just added one. And we know we have not written the actual method to do any work on FileList yet, so it's expected that our test failed. The bottom pane of TestRunner indicates that the failure was in our new test:
Let's create the #copySelectedFileToDirectory: method on FileList but not have it do anything yet. SUnit should exercise our test code and show us that it didn't work as expected. I created the method in the "file list menu" category of the FileList class.
Bring the TestRunner window back by clicking on the "O" of it's collapsed titlebar. In the list pane at the top, in the list pane menu, select the "deselect all" menu item. Then scroll to ours and click once on the FileListTest entry to select it. Click the "Run One" button on the right side of the TestRunner window.
2 tests were run and 1 failed. The failed test is in the list pane. Click on it to bring up the debugger. I selected the line before the "halt" in the debugger.
I kept stepping the debugger until I got to the #assert: statement after our call to the new non-functioning method.
Open a browser on FileList and select our #copySelectedFileToDirectory: method. One of the enhancements we installed earlier added a variables pane to the class browser. We can see that there are instance variables named "fileName" and "directory". With the argument passed to us of "aDirectory", we should be able to write some very straightforward code to copy our file.
Open up a second class browser and examine the FileDirectory class again. There's a method #copyFile:toFile: and #copyFileNamed:toFileNamed: to review. It looked as though the #copyFile:toFile: does what we want but it assumes we already have file streams open on the files. The #copyFileNamed:toFileNamed: method doesn't do exactly what we want either since (from the comments) it assumes that both files exist in the same directory. Looks like we will have to write a method on FileDirectory that does what we need.
I created this method in the "file operations" category of FileDirectory.
copyFileNamed: fileName toDirectory: aDirectory
"Copy the contents of the existing file into a directory."
| file1 file2 |
self = aDirectory ifTrue: [^ nil].
file1 := (self readOnlyFileNamed: fileName) binary.
file2 := (aDirectory newFileNamed: fileName) binary.
self copyFile: file1 toFile: file2.
directory copyFileNamed: fileName toDirectory: aDirectory
Continue on to the next page of second FileList enhancement.
Back to the beginning of this example.kirsten price naughty office | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823657.20/warc/CC-MAIN-20181211151237-20181211172737-00587.warc.gz | CC-MAIN-2018-51 | 2,672 | 19 |
https://www.gizmola.com/blog/plugin/tag/PHP | code | I have made this project (Docker For LAMP
) publically available on Github, under the MIT license.
The target user group is php developers who want or need a simple, minimal (yet very current) LAMP development environment. I want this to be friendly to new developers, and a useful alternative to localhost environments like xamp, mamp or wamp.
Ideally it offers the type of convenience and isolation of a vagrant lamp environment except with orchestrated containers.
Continue reading "docker4lamp - A LAMP Docker development environment"
Certainly the most convenient way to develop a Symfony 5.x app is to use the symfony server. Eventually however, you may have to deploy the application. For a number of years nginx with php-fpm was the preference for many sysadmins seeking to wring the maximum performance out of a webserver that also has to run php scripts, but there are now simple ways of configuring apache to use php-fpm while achieving comparable performance to nginx.
For example a vhost setting like this one is possible:
Continue reading "Symfony 5.2 and Apache 2.4"
SetEnv ENVIRONMENT "dev"
# for Unix sockets, Apache 2.4.10 or higher
# Proxy .php requests to port 9000 of the php-fpm container
DirectoryIndex index.php index.html
Options Indexes FollowSymLinks
Require all granted
# Send apache logs to stdout and stderr
CustomLog /proc/self/fd/1 common
Having backed Fabien Potencier's "Symfony 5: The Fast Track" book on Kickstarter,
I received the book a few weeks ago, and had a chance over the weekend to start reading it.
As a Macbook/OSX user, his recommended environment includes a current locally installed version of PHP with a number of php extension libraries. You also need installation of the php standard composer tool, as well as docker. As I have a Macbook running OSX Mojave, I had to take a number of steps to be able to get started following the book and getting a working installation of the guestbook project using the book's recipe. Here's what I did:
Continue reading "Symfony 5: The Fast Track book and installing a local PHP version that works!"
So you have a private Bitbucket Repo and you want to utilize it in your project composer.json
. You may find that when you run the composer install you get an error pulling your private Bitbucket repo with messages about Oauth failure that may include "Invalid OAuth consumer provided
Continue reading "Composer install of Private Bitbucket VCS "aka" 'Invalid OAuth consumer provided'"
So you are installing a modern version of php using one of the alternative repositories, and suddenly you are confronted with a confusing choice. You want support for mysql (mysqli or PDO-mysql) in your php program. But which one to choose?
First off, you should probably be using PDO
. It's just a cleaner database interface when compared to mysqli, and also tends to be the supported option if you're using an ORM like Doctrine2.
But you probably have found that installing the PDO package doesn't get you support for MySQL.
So what are these 2 packages? Well let's see what yum under Centos shows us, once we've setup webtatic as a repo:
* webtatic: us-east.repo.webtatic.com
php56w-mysql.x86_64 : A module for PHP applications that use MySQL databases
php56w-mysqlnd.x86_64 : A module for PHP applications that use MySQL databases
In short, the mysql extension aka the mysql library is to quote Oracle/mysql
... a general-purpose client library
This was the original php approach to supporting mysql. MySQL provided a client api library, and using that c library, a php extension was created that depends upon libmysql implementing the famous mysql_ functions that allowed php to talk to mysql.
The mysqlnd package (where nd stands for "native driver") is the fruit of a project to make mysql work optimally in the php language. Again to quote the mysql site:
The mysqlnd library is highly optimized for and tightly integrated into PHP. The MySQL Client Library cannot offer the same optimizations because it is a general-purpose client library.
The mysqlnd library is using PHP internal C infrastructure for seamless integration into PHP. In addition, it is using PHP memory management, PHP Streams (I/O abstraction) and PHP string handling routines. The use of PHP memory management by mysqlnd allows, for example, memory savings by using read-only variables (copy on write) and makes mysqlnd apply to PHP memory limits.
On top of these benefits are a number of interesting enhancements and support for plugins
that might be of specific interest to you as a developer or sysadmin.
In general nothing should break in your code as the api should work the same under mysqlnd as it did with the old mysql library.
In summary, you want to use mysqlnd now and in the future.
A PHP block is started with the tag <?php
. However, there is also an alternative known as a "short open tag"
which is to only use <?
The problem with using short open tags is that they conflict with xml parsers and for that reason, support for short open tags has to be enabled. By default, it's disabled and enabling deprecated features may be impossible if hosts don't allow it.
Every so often you may come upon a code base that was written using short open tags.
Often people are first confronted with this problem when they have a legacy code base, and either move it to a new server or upgrade php only to find that the site is spewing errors and no longer functional. In a worse case scenario portions of your php code will be plainly visible to end users due to the fact that the php parser is no longer parsing those blocks and simply returning them as html text.
There are a number of different approaches you can take to solve this problem. First you can turn on the support for short open tags
, but as I mentioned previously, this is not recommended.
Continue reading "Fixing PHP short open tags" | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817002.2/warc/CC-MAIN-20240415142720-20240415172720-00312.warc.gz | CC-MAIN-2024-18 | 5,859 | 50 |
https://tldr.tech/tech/newsletter/2019-10-03 | code | Big Tech &
Google Begins Rolling Out Incognito Mode for Maps (2 minute read)
Google has started to roll out Incognito mode for its Maps app. In-app activity won't be saved when using Incognito mode to browse. Google has been rolling out a lengthy list of tools around privacy and transparency since May. An auto-delete feature which allows users to automatically remove their location and activity data from their Google Account after a period of time will be expanding to YouTube this week. Users can ask Google Assistant for information on how Google handles its data. Google Assistant can also now delete data within certain timeframes when asked to do so. A Password Checkup tool is available that allows users to run a security scan on their usernames and passwords to check for potentially compromised credentials.
Microsoft surprises with new foldable Surface Duo phone running Android (2 minute read)
Microsoft has announced a new foldable Surface Duo phone that runs Android. It resembles the dual-screen Surface Neo, except that its displays are smaller. Each display is 5.6 inches and can rotate 360 degrees, allowing it to unfold into an 8.3-inch tablet mode. The displays can run different apps at the same time, or one of the displays can be used as a keyboard or game controller. Some details on the phone are unknown, such as whether the device will have a rear camera. The device will be out during the holidays in 2020.
Putin could decide for the world on CRISPR babies (2 minute read)
A secret summit has been held in Moscow between government health officials to debate a bid by a scientist to create genetically modified babies. The first genetically modified humans were born in China last year as a part of a project to create HIV-resistant humans. Putin's eldest daughter, Maria Vorontsova, was present at the secret summit. Scientists want official rules to be set for gene editing, but it is undecided who should control the genetically modified future. The costs of gene editing are dropping and is currently around $15,500, the cost of a car. There is plenty of potential in the technology, but it can be easily abused.
Startup that aims to 3D-print rockets says it’s fully funded for its first commercial missions (3 minute read)
Relativity Space, a startup that aims to launch the first fully 3D-printed rocket into orbit, has announced that it has reached its funding goals and that the first commercial operations will begin in early 2021. By using 3D printing to create its rockets, Relativity Space can drastically cut down on costs by requiring fewer parts per rocket. The company hopes to replicate the 3D printing process on other planets. Its first rocket, the Terran 1, is a small-to-medium-sized vehicle that will stand about 100 feet tall and be able to carry up to 2,755 lbs. Relativity Space plans to increase its payload limits. The first Terran 1 rocket will be launched at Cape Canaveral Air Force Station in Florida.
Programming, Design & Data Science
ARL (GitHub Repo)
This repository contains a list of the most popular repositories, sorted by the number of stars, for each of the most favored programming languages. Users can view the number of stars, forks, issues, and when the last commit was from the database. The aim of the repository is to provide the most popular examples of how to code in every language.
New In PostgreSQL 12: Generated Columns (5 minute read)
PostgreSQL 12 has a new feature called generated columns. Generated columns are like a view, but for columns. They are designed to simplify application and server-side code by using pre-computed and cached data. A tutorial on how to make and use generated columns as well as examples of its use are available.
Eat Less Red Meat, Scientists Said. Now Some Believe That Was Bad Advice (10 minute read)
Public health officials have long been urging Americans to limit the consumption of red and processed meats due to its links with heart disease, cancer, and other illnesses. Researchers have recently revealed that the advice was not backed by good scientific evidence. Large studies have found little health benefits from eating less beef and pork. Some scientists have criticized these studies, saying that it is irresponsible to publish results that may harm peoples' health. There is a growing awareness of the environmental impact of the meat industry. Red meat consumption has fallen since 1970, and has largely been replaced by poultry. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710933.89/warc/CC-MAIN-20221203143925-20221203173925-00776.warc.gz | CC-MAIN-2022-49 | 4,465 | 16 |
https://dynobase.dev/dynamodb-errors/dynamodb-type-item-is-not-supported/ | code | Error: DynamoDB type item is not supported
What's Causing This Error
The error DynamoDB type item is not supported is caused when an invalid item is passed to a DynamoDB operation. DynamoDB supports several items, such as tables, indexes, and streams. Attempting to operate on an item of a type that is not supported by the operation will result in this error.
Solution: Here's How To Resolve It
To solve this error, you can take the following steps:
- Verify that the type of item being passed to the operation is a valid type supported by the operation.
- Check the documentation of the DynamoDB service to see what types of items are supported by the operation you are trying to perform.
- If you are trying to operate on a stream, ensure that the stream is enabled on the table and that the correct stream events are captured.
- If the issue persists, you may contact AWS support for further assistance.
- Additionally, you can use CloudWatch logs to check the logs and troubleshoot the issue.
- It is important to validate the type of item you want to operate on according to the DynamoDB documentation to avoid such issues.
Other Common DynamoDB Errors (with Solutions)
- DynamoDB Is Not Null
- cannot find module 'dynamodb-doc'
- dynamodb 1 validation error detected value
- DynamoDB GetItem no item
- could not connect to the endpoint URL dynamodb
- Boto3 DynamoDB KeyError
- why is the GSI dynamodb not showing item count
- dynamodb does not support null values
- DynamoDB Is Unsupported It Cannot Be Instantiated
- dynamodb cannot create preexisting table
- DynamoDB Failed To Compute Node presentation
- DynamoDB Invalid UpdateExpression Syntax Error Token
- Float types are not supported. Use decimal types instead.
- dynamodb cannot pickle '\_thread.lock' object
- DynamoDB ConditionalCheckFailedException
Dynobase is a Professional GUI Client for DynamoDB
Try 7-day free trial. No credit card needed.
© 2023 Dynobase | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00578.warc.gz | CC-MAIN-2023-14 | 1,931 | 30 |
https://discussions.unity.com/t/how-to-get-the-positive-or-negative-angle-between-objects/3127 | code | I need to decide if I want something to swivel left or right towards my target. Currently, angle only seems to return positive values.
I need to find out, if two objects are level, if I need to add angles to the y rotation of my object, or subtract angles in order for it to eventually face towards my target.
Is there a straightforward function in Unity I've overlooked?
You can use Mathf.Atan2 to compute the angle between 2D vectors. This only works for 2d rotations though, however often that's all you need even in a 3d game. Eg:
var localTarget = transform.InverseTransformPoint(target.position);
var targetAngle = Mathf.Atan2(localTarget.x, localTarget.z);
However, the "angle" will be in radians, not degrees, so you most probably want to convert it to degrees before using it, like this:
var targetAngle = Mathf.Atan2(localTarget.x, localTarget.z) * Mathf.Rad2Deg;
This should give you the target angle in the range -180 to 180 degrees.
You can test to see if the angle returned it more than 180 and then reverse the rotation your self (-360).
// angle code
if (Angle > 180) Angle -= 360;
// do your rotation
A nice trick for 3d: the cross product of two vectors is a vector quantity with a magnitude equal to the product of the magnitudes of the two vectors times the sine of the angle between them.
So for two normalised vectors:
angle_diff = asin(cross(v1, v2).len())
The resulting vector can be used as an axis for rotation between the two input vectors. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511053.67/warc/CC-MAIN-20231003024646-20231003054646-00388.warc.gz | CC-MAIN-2023-40 | 1,467 | 17 |
https://help.linnworks.com/support/discussions/topics/7000010050 | code | We noticed that while we process our orders, the highlighted orders get deselected after you print labels or invoices, so we have to select them again to make the next batch operation.
In example, if we have 100 open orders and we want to process them by printing an invoice, a label, and archiving them, we need to select all the 100 orders one first time, then print the invoices, after that the orders would be deselected by linnworks, so we need to select them AGAIN and print the labels. At this point the orders will be deselected the third time an we would need again to select all of the 100 orders to finally archive them.
There are two solutions to this problem
1) make the selection be permanent even after printing the labels and invoices
2) Modify the "Batch Order Processing" so it will create labels and invoices before sending the "shipped" status to the selling channels. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558030.43/warc/CC-MAIN-20220523132100-20220523162100-00456.warc.gz | CC-MAIN-2022-21 | 888 | 5 |
https://allaboutmusic.forumotion.com/t32-daddy-being-a-moderator-on-the-general-discussion-category | code | hmmm... looks like we have to reward daddy for being the most active member of this forum... nyahahaha...
anyway, let us congratulate daddy for being a moderator of the general discussion category
so you guys better behave because we have two moderators already to be your forum police
anyway, congratulations again daddy!
new FREE general directory || new music forum open for everyone | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400190270.10/warc/CC-MAIN-20200919044311-20200919074311-00310.warc.gz | CC-MAIN-2020-40 | 386 | 5 |
https://blacksportsonline.com/2013/01/i-dare-you-to-look-at-this-photo-of-49ers-michael-crabtree-not-bust-out-laughing/ | code | I am just going to assume this is how Little Richard ate his breakfast every morning.
Up early.. Newspaper and breakfast.. #yungcrab
Crab went to Instagram and acted like this was just a normal regular photo as oppose to a Kardashian-Like attention whoring one.
It is all good S-Curl, just keep catching passes it will be ok. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057371.69/warc/CC-MAIN-20210922163121-20210922193121-00032.warc.gz | CC-MAIN-2021-39 | 325 | 4 |
http://streamlined-book.blogspot.com/2013/07/deployment-is-not-source-control.html | code | But, as much as source control is a phenomenal tool, it is not the right tool for every purpose. No-one would replace vim or Sublime with Git or Mercurial. That just makes no sense. Which is why I'm always baffled when I come into a team and see deployments managed with git branches.
Deployment is the process of taking an product from environment A to environment B, usually from test (or beta) to staging (or user-acceptance), then to production. An environment isn't just the application code that lives in a single server. It's the entire stack of processes, such as the database, application(s), third-party libraries, configuration, background jobs, and services that go into providing the features of your product. Ensuring that all the different pieces of that stack are in sync at all times is the major function of deployment.
In order to do this, the deployment tool must understand dependencies. Dependencies between application code and third-party libraries on the same server is just the start of this. Dependency-tracking across server groups, between the application code and the database version, and even configuration changes are all components of this. And everything has to move in lockstep.
There is no single tool that, to my knowledge, manages the entire stack in this holistic fashion. But, an application team can make life a lot simpler for themselves by doing one simple thing - deploy with OS packages and not source control.
OS packaging tools (such as RPM and APT) have been around for decades. They are the way to deploy libraries and applications to Linux (and Windows, thanks to Chocolatey). They manage dependencies, put everything in the right place, update configuration, verify compatibility, and do everything else necessary to make sure that, when they're done, the requested thing works. Often, this means setting specific compilation switches (or even pre-compiling for specific architectures). They encode knowledge that is often hard-won and difficult to rediscover. And, finally, they let a user ask the server what is installed, revert to a previous version, or even uninstall the package (and all downstream dependencies) altogether.
Source control does not do any of those things. Source control is designed to do one and only one thing - track and manage changes between versions of groups of text files. Modern SCMs (such as Git and Mercurial) do this very very well.
Managing a deployment requires a package. When QA approves a specific deployment within their test environment, operations needs to "make prod look like test". The way ops can ensure that production will look exactly like test is to build production exactly as test was built. Server build tools (like Puppet and Chef) help ensure that the servers (or VMs) are built exactly the same every time. The application (and its configuration) needs to have the same treatment.
So, I recommend the following process:
- Do your development as you normally do right now. (I will have thoughts on the rest of this later, but those are another set of posts.)
- Once a changeset is merged into primary branch (master, for Git or default for Mercurial):
- It is tagged with the name of the changeset.
- An OS package is built and uploaded to the test package repository.
- The OS package is deployed to the test environment.
- This can happen either automatically or as a result of a user action.
- QA verifies the build.
- If it fails, issues are opened and the development process begins anew.
- If it fails catastrophically, the environment is reverted.
- When QA passes the build, the package is copied into the production package repository.
- The commit that was used to build this package is tagged with the date it was promoted to production.
- The package is applied to the production environment at the appropriate time.
At the point of merging into the primary branch, the SCM has finished its job. It's now the job of the package manager to replicate that branch out to the various environments in the correct order with the correct dependencies. | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190236.99/warc/CC-MAIN-20170322212950-00250-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 4,064 | 21 |
https://builtin.com/job/engineer/principal-python-architect/321727 | code | Principal Python Architect at Motional (Pittsburgh, PA)
Motional has an exciting opportunity to work within a world-class team of engineers including inventors of nuScenes (https://www.nuscenes.org), PointPillars (https://arxiv.org/abs/1812.05784), PointPainting (http://arxiv.org/abs/1911.10150) and LaserNet. The Sensing & Platform Team is doubling in size, and we are adding engineers and researchers to join us in our mission to launch a level 5 autonomous taxi system.
Motional is looking for a highly experienced developer to function as software architect for our Machine Learning codebase. Responsibilities include full stack solution design from requirements analysis, data management, pipeline orchestration, and applying the right ML algorithms. Experience in the application of Machine Learning is critical.
The codebase is almost exclusively written in Python with a focus on training and evaluating deep neural networks. Other parts of the code-base relate to performance evaluation of said networks, data management, and experiment runtimes. The code-base evolves quickly as we develop new products and remove obsolete features. As the Architect you will ensure the code base and related technologies grow in a sound way with an ultimate goal of minimizing development time and maximizing developer happiness. Strong communication skills are required to coordinate changes both across a large team with varied skill sets and within the larger organization.
What You'll Do
- Research, plan, and deploy updated technology stacks
- Design the structure and architecture of the ML codebase
- Coordinate and verify the deployment of architectural changes
- Help define code standards for python code throughout the company
- Improve code-quality by implementing, teaching and enforcing best practices
- Elevate the software development skills of all codebase contributors
- Support hiring for senior developers
What We're Looking For
- 10+ years of software development experience
- 5+ years of owning and guiding large python codebase development efforts
- Experience with PyTorch, TensorFlow or other Deep Learning libraries
- Experience with numpy, scipy, pandas
- Experience with CI/CD and version control systems
The Motional Pittsburgh office is located in the new Hazelwood Green development at 4734 Second Avenue, a culmination of the city’s goal of restoring an economic driver to the neighborhood in a thoughtful, inclusive, and sustainable way. With views along the Monongahela river, the Pittsburgh office is in the heart of this new state of the art development.
Motional is a driverless technology company making self-driving vehicles a safe, reliable, and accessible reality.
The Motional team is made up of engineers, researchers, innovators, dreamers and doers, who together are creating a first-of-its-kind technology with the potential to transform the way we move. We’re behind some of the industry's largest leaps forward, including the first fully-autonomous cross-country drive in the U.S, the launch of the world's first robotaxi pilot, and operation of the world's most-established public robotaxi fleet.
As a leader in an emerging industry that has the promise of creating safer, more reliable and accessible transportation for all, it’s imperative we have a diverse workforce, create an inclusive culture, and understand the communities we operate in around the world.
Diversity, Equity and Inclusion is fundamental to Motional’s success. That’s why we’ve established a team to ensure DEI is at the forefront of the candidate and employee experience, beginning with the hiring process and continuing throughout your career. We also partner with organizations like the National Society of Black Engineers, the Society of Hispanic Professional Engineers, and the Society of Women Engineers to ensure our DEI work is informed by the latest thinking and approaches.
Strategically formed by Hyundai Motor Group and Aptiv, Motional is fundamentally changing how people move through their lives. Headquartered in Boston, Motional has operations in the U.S and Asia. For more information, visit www.Motional.com and follow us on Twitter, LinkedIn, Facebook, Instagram and YouTube.
Motional AD Inc. is an EOE. We celebrate diversity and are committed to creating an inclusive environment for all employees. To comply with Federal Law, we participate in E-Verify. All newly-hired employees are queried through this electronic system established by the DHS and the SSA to verify their identity and employment eligibility. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654871.97/warc/CC-MAIN-20230608103815-20230608133815-00465.warc.gz | CC-MAIN-2023-23 | 4,559 | 25 |
https://www.electrondepot.com/linux/unable-to-get-networking-in-solution-engine-board-tx-error-5970-.htm | code | Hi , I have a Hitachi Solution engine board for which i m trying to get the Networking. I have built the Root file system from scratch having all the necessary entries for Networking. ( i installed all redhat packages for building the Root file system - nettools for Networking)
But still the Network is not up.( this i have verified by pinging from other systems, Even arping is not working)
I have checked for the important networking scripts such as
\etc\sysconfig\networking\devices\ifcfg-eth0 \etc\sysconfig\networking\devices\ifcfg-eth1 All are fine.basically there are two interfaces in my board
Some Details:1 . when I type ifconfig i m able to get all the information required such as IP address and others.
Except the Mac address The mac address looks something like this.00:00:00:00:ff:ff
Is it correct to have like this??
- when i type arp i got the output like this
hardware address incomplete
- When i tried to do arping it gets failed.
- i checked the dmesg.
it shows something like TX error: dirty_bit bla bla.......
I feel the problem is with finding the Mac address...
Please share with me you views and suggestions and any other ideas.
BTW, im a newbie to Linux Networking .
Although this topic is relevant to Networking, I have posted here so that any body having expericne with Solution engine boards can help me.
Thanks in advance. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100593.71/warc/CC-MAIN-20231206095331-20231206125331-00249.warc.gz | CC-MAIN-2023-50 | 1,353 | 17 |
https://www.readerware.com/help/html/rwBookPrefs.html | code | The Readerware Book Preferences tab is used to configure book related
By default Readerware validates each ISBN
enter. If you receive an error when entering an ISBN, it means that the
ISBN check digit validation failed. Normally you can resolve this by
the ISBN and correcting it. Occasionally you might find that Readerware
rejects an ISBN even though you entered it exactly as printed on the
Very rarely the publisher may include an invalid ISBN, this is normally
on older titles, issued when the ISBN was new.
You can tell Readerware to accept the invalid ISBN anyway using the
error dialog that is displayed.
If you want to disable ISBN validation and accept whatever you enter
without requiring you to respond to the confirmation dialog, check the
Accept Invalid ISBN Without Confirmation radio
Clear this button and Readerware will display a confirmation dialog
it encounters an invalid ISBN.
UPC Manufacturer Mapping
To convert a mass market paperback UPC or barcode to an ISBN,
Readerware needs to map the UPC manufacturer code to the ISBN publisher
code. Using this table, you can delete and change the mappings.
Normally this is handled automatically when you scan the barcode, but
you can change the mappings and add codes for publishers that have been
assigned multiple codes. More info.
The Button Panel
Once you have made your changes, click on OK to save
and have them take effect. Click on Cancel to discard
changes. Note you only have to click on OK when you have
finished all your changes, you can move between tabs and only click OK
when you are done. This will close the Readerware preferences dialog.
Top of Page
Copyright © 1999-2018 Readerware Corporation | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593302.74/warc/CC-MAIN-20180722135607-20180722155607-00386.warc.gz | CC-MAIN-2018-30 | 1,679 | 30 |
https://plus.google.com/+ArtemChivchalov | code | Hi everyone! This community is created for discussion about JW Droid application usage and development.
If you have any question regarding the app features, don't hesitate to ask it here. This community should NOT
be used for discussion on any topic not related to the app.
If you want to help with application translation
, please use this link and follow the instructions there: https://crowdin.com/project/jwdroid/invite
The code repository
is on GitHub: https://github.com/jwdroid/jwdroid
JW Droid has a public beta testing channel
on Google Play. In order to participate in beta testing, subscribe to the channel using this link: https://play.google.com/apps/testing/com.jwdroid
Once subscribed, you will receive test releases via Google Play as usual updates. These updates are available only for people who explicitly subscribed to the beta channel. | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257825048.60/warc/CC-MAIN-20160723071025-00053-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 856 | 10 |
http://www.fixya.com/support/t18976320-driver_win_7_ba75_speakers | code | I downgraded from vista to xp and now i need a sound driver compatible for my gateway:w34oui
This is another tough one.
Since GW does not have Win XP drivers available for your system, it will be difficult to find a sound driver that will work. You could try to use the Vista driver, but I would be skeptical that it will work to use that driver because of the way that sounds are processed in Vista/Win 7.
You didn't mention why you did the downgrade, but if it was performance related, Win 7 should work fine with your system. If there was a certain program etc., that you need, there is another option.
There are many USB soundcards that will will work well with Win XP, and they should not have the XP problem since their hardware is designed to work with XP. Note: If you go this route, make sure you choose one that is Win XP compatible. One other thing on this option, though. Your internal speakers may not route sound through the USB soundcard, which would mean then that you would need external speakers to get sound. I understand that may be a deal-breaker, which is why I would (unless you specifically need XP) either go back to Vista or upgrade to Win 7. Some version of Win 7 feature "XP mode" which allows you to run programs in a virtual Win XP environment. I have not had perfect luck getting XP programs to work, but it's worth a try.
May 25, 2011 |
Computers & Internet | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948125.20/warc/CC-MAIN-20180426090041-20180426110041-00148.warc.gz | CC-MAIN-2018-17 | 1,389 | 7 |
https://www.insanelymac.com/forum/profile/2447317-sapphiro/ | code | Sapphiro started following Help!!! ROG gl702zc MacOS High Sierra Installation VMware
Sapphiro posted a topic in AMDI tried using VMware 14 and following the video guide in the youtube. But I got stuck in the apple logo upon powering on the virtual machine. Is there other way I can install a MacOs in ROG GL702Zc? By the way the processor is a AMD Ryzen 7 1700. I also updated the bios to enable SVM for the virtualization. please help me to do it step by step. thanks you in advance. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247518497.90/warc/CC-MAIN-20190222155556-20190222181556-00459.warc.gz | CC-MAIN-2019-09 | 484 | 2 |
https://docs.microsoft.com/en-us/cpp/ide/preparing-a-test-machine-to-run-a-debug-executable?view=vs-2017 | code | Preparing a Test Machine To Run a Debug Executable
To prepare a computer to test the debug version of an application that is built with Visual C++, you have to deploy debug versions of the Visual C++ library DLLs that the application depends on. To identify which DLLs have to be deployed, follow the steps in Understanding the Dependencies of a Visual C++ Application. Typically, debug versions of Visual C++ library DLLs have names that end in "d"; for example, the debug version of msvcr100.dll is named msvcr100d.dll.
Debug versions of an application are not redistributable, and debug versions of the Visual C++ library DLLs are not redistributable. You may deploy debug versions of applications and Visual C++ DLLs only to your other computers, for the sole purpose of debugging and testing the applications on a computer that does not have Visual Studio installed. For more information, see Redistributing Visual C++ Files.
There are three ways to deploy debug versions of Visual C++ library DLLs together with the debug version of an application.
Use central deployment to install a debug version of a particular Visual C++ DLL to the %windir%\system32\ directory by using a Setup project that includes merge modules for the right library version and architecture of your application. Merge modules are found in the Program Files or Program Files (x86) directory in \Common Files\Merge Modules\. The debug version of a merge module has Debug in the namefor example, Microsoft_VC110_DebugCRT_x86.msm. An example of this deployment may be found in Walkthrough: Deploying a Visual C++ Application By Using a Setup Project.
Use local deployment to install a debug version of a particular Visual C++ DLL in the application’s installation directory by using files that are provided in the Program Files or Program Files (x86) directory in \Microsoft Visual Studio <version>\VC\redist\Debug_NonRedist\.
For remote debugging of your application built by using Visual C++ 2005 or Visual C++ 2008 on another computer, you have to deploy debug versions of Visual C++ library DLLs as shared side-by-side assemblies. You can use either a Setup project or Windows Installer to install corresponding merge modules.
Use the_Deploy option in the Configuration Manager dialog box in Visual Studio to copy the project output and other files to the remote computer.
After Visual C++ DLLs are installed, you can run a remote debugger on a network share. For more information about remote debugging, see Remote Debugging. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583804001.73/warc/CC-MAIN-20190121172846-20190121194846-00596.warc.gz | CC-MAIN-2019-04 | 2,509 | 9 |
https://mailman.ntg.nl/pipermail/dev-luatex/2019-March/006211.html | code | [Dev-luatex] \mathchar feature request
tex at 2krueger.de
Thu Mar 21 15:14:12 CET 2019
---- On Thu, 21 Mar 2019 14:51:25 +0100 Linas Stonys <lstonys at vtex.lt> wrote ----
> the problem is that this command appears not in math mode.
> Then it takes \textfont for character to output.
> For example one forgot \Gamma to write as $\Gamma$ and he/she
> used some packages where \Gamma appeared in pdf. But such a file comes
> to publishing system where different packages and different fonts are
> used this \Gamma will silently become some other character.
Sorry, I think I am missing something here but I still do not see your point.
If someone forgot to write $\Gamma$ instead of \Gamma
and \Gamma is a \mathchar, then \Gamma is printed outside math mode with the
appropriate \textfont. But if he would have written $\Gamma$, basically the same thing
would have happened:
The Gamma would still be written with the same \textfont, so the same slot + the same font => The same character.
How can this silently become another character? The only difference is that there are no mathon/mathoff nodes
around it and \everymath is not called.
Is the problem that `\everymath` would have changed your math fonts but this doesn't happen for non math mode mathchars?
> lets say \mathaccent doesn't compile in text mode but \mathchar does.
What does \mathaccent has to do with this? Are you concerned that a \mathchar might be implemented using \mathaccent in
> luatex sources just outputs:
> void math_char_in_text(mathcodeval mval)
> p = new_char(fam_fnt(mval.family_value, text_size), mval.character_value);
> that's why I'm asking about some other subtype that I could control
> such situations.
I do not think that this would be a bad idea, I just do not see why you need it in this situation.
But if this LuaTeX team does not want to implement this, you might be able to detect such characters by scanning
for glyph nodes using a math font and not being inside a mathon/mathoff pair
> > subtypes already have a defined meaning
> > but you can consider setting an attribute in mathmode (with everymath)
> > so that you can then (wherever) check if a character originates in math
More information about the dev-luatex | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627997508.21/warc/CC-MAIN-20190616002634-20190616024634-00149.warc.gz | CC-MAIN-2019-26 | 2,210 | 33 |
https://www.procomport.com/posted.php?id=860430 | code | QR Code Link to This Post
- Level = Couple Years to Awesome
- Salary Range = DOE + equity
- Job Location = USA-WA-Seattle
- Travel Percentage = 0%
- Position Type = Full Time
- Education Level = 4 Year Degree or certificate
- Prior Experience = At few years of engineering
Observa is an exciting young AI company headquartered in Seattle. We built out a beautiful technology platform and are selling our services in earnest. This position is for a Software Engineer that wants to move into a role with more leadership and management responsiblities. You will learn about managing people, products, and projects. Yes, we plan on mentoring you.
We know what we need to do and want you to help us get there without us micromanaging or dictating your every move. We also understand that even in the world of startups, having a life is the point of life!
Look us up on Geekwire before you apply so you understand what you might be getting into. We are fast-moving and work as a team to tackle the types of problems that large entities cannot.
We're looking for someone who's really good at some of these things
(These are also the things you would be working with here and have the opportunity to learn about even if you have no experience coming in)
- Microservices and message queues
- Server-side scripting languages, PHP
- API design and development
- App development and deployment
- AI, deep learning
- Image recognition
- Data training pipelines
- Docker containers
- Cloud based design and services
- Edge computing
- SQL databases
- NoSQL databases
Why Observa instead of a FAANG?
- Equity that means something
- Work that immediately sees the light of day
- Involvement in the entirety of the software lifecycle
- Better fit if you too have the drive to create and innovate
- Access to the company leadership and ability to become part of it
- Projects that you help define
If you're interested in joining the team and the adventure, please send a brief email describing your interest and a story from your professional life along with your resume.
Observa is committed to creating an environment free of harassment or discrimination of any kind. We are committed to the principle of equal opportunity for all. Employment decisions at Observa are based on business needs, job requirements and individual qualifications. We do not consider your gender, gender expression or identity, race, age, color, religion or belief, sexual orientation, disability, family or parental status, or any other status. We are a progressive and open-minded meritocracy and encourage members of underrepresented groups to apply. If you are smart, good at what you do, and willing to learn, we welcome you. | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145747.6/warc/CC-MAIN-20200223062700-20200223092700-00555.warc.gz | CC-MAIN-2020-10 | 2,690 | 34 |
https://thelinksmaster.com/bypass-windows-logons-with-the-utilman-exe-trick/ | code | - Youtube New Monetization Policy Rules 2018-YouTube Partner Program (YPP) to Better Protect Creators
- How To installing Windows 10 in your Laptop & Desktop PC
- How to Installing & customize a new WordPress theme via WordPress Dashboard Step by Step Guides in Hindi
- NetBSD 7.1.1 released (December 22, 2017) now available as this BSD operating system
- How to Find Network Interface Card Details On Ubuntu
Bypass Windows Logons with the Utilman.exe Trick
The Net User is a command-line tool that was introduced in Windows Vista,7,8,10 and is available in Windows tool. This tool can help system administrators to add or modify user accounts or even displays user account information.
Using net user with the appropriate parameters allows you to carry out several functions. You can use the following parameters with the net user command:
- username is the name of the user account you want to add, delete, modify, or view.
- password will assign or change a password for the user’s account.
- * will produce a prompt for the password.
- /domain performs the operation on the primary domain controller of the current domain on computers running Windows NT Workstation which are members of a Windows NT Server domain.
- /add will add a user account to the user accounts database.
- /delete will delet a user account from the user accounts database.
Net user Change Password
As an example let us say you want to change the password of a user. To change a user’s password, log on as an administrator, open an elevated command prompt type the following and press Enter:
net user user_name * /domain
You will be asked to type a password for the user. Type the new password and later again retype the password to confirm. The password will now be changed.
You could also use the following command. But this case, you will not be prompted. The password will be directly changed right away:
net user user_name new_password
- Boot up using a Windows 7,8,10 and Windows Server Installation CD/USB and press Shift+F10 when Setup starts and you will get cmd window.
You should now have a Command Prompt Window open. Type in the following commands:
ren utilman.exe utilman.exe.bak
copy cmd.exe utilman.exe
This will navigate to the system32 directory, rename utilman.exe to utilman.exe.bak, make a copy of cmd.exe and name it utilman.exe.
Remove the DVD and reboot the system.
Once the computer boots up normally, press the key combination Windows Key + U and you should get a Command Prompt. If the Command Prompt doesnt appear, press Alt+Tab as the Command Prompt may appear behind the Logon screen. From here, you can run many (if not all) of the commands you can normally use in Command Prompt.
To restore utilman.exe, in the Command Prompt type in:
ren utilman.exe.bak utilman.exe
Then reboot the system. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889542.47/warc/CC-MAIN-20180120083038-20180120103038-00191.warc.gz | CC-MAIN-2018-05 | 2,803 | 30 |
https://forum.yiiframework.com/t/cactiveform-can-you-disallow-edits-of-certain-ar-fields/57014 | code | I have had a thorough dig about and I can’t seem to find a way to do this…
It’s pretty simple - I have a system where an XML parser create AR classes based on parsed attributes and saves the class to the DB (providing it passes validation). So, I do not need to be able to create in the CRUD - it will be entered automatically.
Aside from the PK, there are 3 fields, two of which should not be edited manually, and a third that does require editting, and will be populated from CActiveForm::dropDownList. So, in essence, I will not have any of the fields accepting free-hand input.
The dropDownList is easy enough and is already in place (it is fed from an DB reference table). However, I want to know if there is any way to display the other 2 fields as just uneditable text i.e. like a label simply stating the DB value. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100527.35/warc/CC-MAIN-20231204083733-20231204113733-00412.warc.gz | CC-MAIN-2023-50 | 828 | 4 |
https://en.wikipedia.org/wiki/Expander_graph | code | In combinatorics, an expander graph is a sparse graph that has strong connectivity properties, quantified using vertex, edge or spectral expansion. Expander constructions have spawned research in pure and applied mathematics, with several applications to complexity theory, design of robust computer networks, and the theory of error-correcting codes.
Intuitively, an expander graph is a finite, undirected multigraph in which every subset of the vertices that is not "too large" has a "large" boundary. Different formalisations of these notions give rise to different notions of expanders: edge expanders, vertex expanders, and spectral expanders, as defined below.
A disconnected graph is not an expander, since the boundary of a connected component is empty. Every connected graph is an expander; however, different connected graphs have different expansion parameters. The complete graph has the best expansion property, but it has largest possible degree. Informally, a graph is a good expander if it has low degree and high expansion parameters.
The edge expansion (also isoperimetric number or Cheeger constant) h(G) of a graph G on n vertices is defined as
In the equation, the minimum is over all nonempty sets S of at most n/2 vertices and ∂S is the edge boundary of S, i.e., the set of edges with exactly one endpoint in S.
The vertex isoperimetric number (also vertex expansion or magnification) of a graph G is defined as
where is the outer boundary of S, i.e., the set of vertices in with at least one neighbor in S. In a variant of this definition (called unique neighbor expansion) is replaced by the set of vertices in V with exactly one neighbor in S.
The vertex isoperimetric number of a graph G is defined as
where is the inner boundary of S, i.e., the set of vertices in S with at least one neighbor in .
When G is d-regular, a linear algebraic definition of expansion is possible based on the eigenvalues of the adjacency matrix A = A(G) of G, where is the number of edges between vertices i and j. Because A is symmetric, the spectral theorem implies that A has n real-valued eigenvalues . It is known that all these eigenvalues are in [−d, d] and more specifically, it is known that λn = −d if and only if G is bipartite.
More formally, we refer to an -vertex, -regular graph with as an -graph. The bound given by an -graph on for is useful many contexts, including the expander mixing lemma.
Because G is regular, the uniform distribution with for all i = 1, ..., n is the stationary distribution of G. That is, we have Au = du, and u is an eigenvector of A with eigenvalue λ1 = d, where d is the degree of the vertices of G. The spectral gap of G is defined to be d − λ2, and it measures the spectral expansion of the graph G.
If we set , as this is the largest eigenvalue corresponding to an eigenvector orthogonal to u, it can be equivalently defined using the Rayleigh quotient:
is the 2-norm of the vector .
The normalized versions of these definitions are also widely used and more convenient in stating some results. Here one considers the matrix , which is the Markov transition matrix of the graph G. Its eigenvalues are between −1 and 1. For not necessarily regular graphs, the spectrum of a graph can be defined similarly using the eigenvalues of the Laplacian matrix. For directed graphs, one considers the singular values of the adjacency matrix A, which are equal to the roots of the eigenvalues of the symmetric matrix ATA.
Relationships between different expansion properties
The expansion parameters defined above are related to each other. In particular, for any d-regular graph G,
Consequently, for constant degree graphs, vertex and edge expansion are qualitatively the same.
When G is -regular, meaning each vertex is of degree , there is a relationship between the isoperimetric constant h(G) and the gap d − λ2 in the spectrum of the adjacency operator of G. By standard spectral graph theory, the trivial eigenvalue of the adjacency operator of a d-regular graph is λ1=d and the first non-trivial eigenvalue is λ2. If G is connected, then λ2 < d. An inequality due to Dodziuk and independently Alon and Milman states that
In fact, this inequality is tight. The lower bound is achieved for the hypercube , where and , while the upper bound is achieved for a cycle, where and . This inequality is closely related to the Cheeger bound for Markov chains and can be seen as a discrete version of Cheeger's inequality in Riemannian geometry.
Similar connections between vertex isoperimetric numbers and the spectral gap have also been studied:
Asymptotically speaking, the quantities , , and are all bounded above by the spectral gap .
There are three general strategies for explicitly constructing families of expander graphs. The first strategy is algebraic and group-theoretic, the second strategy is analytic and uses additive combinatorics, and the third strategy is combinatorial and uses the zig-zag and related graph products. Noga Alon showed that certain graphs constructed from finite geometries are the sparsest examples of highly expanding graphs.
Algebraic constructions based on Cayley graphs are known for various variants of expander graphs. The following construction is due to Margulis and has been analysed by Gabber and Galil. For every natural number n, one considers the graph Gn with the vertex set , where : For every vertex , its eight adjacent vertices are
Then the following holds:
Theorem. For all n, the graph Gn has second-largest eigenvalue .
By a theorem of Alon and Boppana, all sufficiently large d-regular graphs satisfy , where is the second largest eigenvalue in absolute value. As a direct consequence, we know that for every fixed and , there are only finitely many -graphs. Ramanujan graphs are d-regular graphs for which this bound is tight, satisfying . Hence Ramanujan graphs have an asymptotically smallest possible value of . This makes them excellent spectral expanders.
In 1985, Alon, conjectured that most -regular graphs on n vertices, for sufficiently large , are almost Ramanujan. That is, for , they satisfy
Reingold, Vadham, and Wigderson introduced the zig-zag product in 2003. Roughly speaking, the zig-zag product of two expander graphs produces a graph with only slightly worse expansion. Therefore, a zig-zag product can also be used to construct families of expander graphs. If is a -graph and is an -graph, then the zig-zag product is a -graph where has the following properties.
- If and , then ;
Note that property (1) implies that the zig-zag product of two expander graphs is also an expander graph, thus zig-zag products can be used inductively to create a family of expander graphs.
Intuitively, the construction of the zig-zag product can be thought of in the following way. Each vertex of is blown up to a "cloud" of m vertices, each associated to a different edge connected to the vertex. Each vertex is now labeled as where refers to an original vertex of and refers to the th edge of . Two vertices, and are connected if it is possible to get from to through the following sequence of moves.
- Zig - Move from to , using an edge of .
- Jump across clouds using edge in to get to
- Zag - Move from to using an edge of .
There are many results that show the existence of graphs with good expansion properties through probabilistic arguments. Pinsker showed that for a randomly chosen vertex left regular bipartite graph, for all subsets of vertices with high probability, where is a constant depending on that is . Alon and Roichman showed that for every group of order and every , there is some such that the Cayley graph on with generators is an expander, i.e. has second eigenvalue less than , with high probability.
Applications and useful properties
The original motivation for expanders is to build economical robust networks (phone or computer): an expander with bounded valence is precisely an asymptotic robust graph with the number of edges growing linearly with size (number of vertices), for all subsets.
Expander graphs have found extensive applications in computer science, in designing algorithms, error correcting codes, extractors, pseudorandom generators, sorting networks (Ajtai, Komlós & Szemerédi (1983)) and robust computer networks. They have also been used in proofs of many important results in computational complexity theory, such as SL = L (Reingold (2008)) and the PCP theorem (Dinur (2007)). In cryptography, expander graphs are used to construct hash functions.
In a 2006 survey of expander graphs, Hoory, Linial, and Wigderson split the study of expander graphs into four categories: extremal problems, typical behavior, explicit constructions, and algorithms. Extremal problems focus on the bounding of expansion parameters, while typical behavior problems characterize how the expansion parameters are distributed over random graphs. Explicit constructions focus on constructing graphs that optimize certain parameters and algorithmic questions study the evaluation and estimation of parameters.
Expander mixing lemma
The expander mixing lemma states that for an -graph, for any two subsets of the vertices S, T ⊆ V, the number of edges between S and T is approximately what you would expect in a random d-regular graph. The approximation is better the smaller is. In a random d-regular graph, as well as in an Erdős–Rényi random graph with edge probability d/n, we expect edges between S and T.
More formally, let E(S, T) denote the number of edges between S and T. If the two sets are not disjoint, edges in their intersection are counted twice, that is,
Then the expander mixing lemma says that the following inequality holds:
Many properties of -graphs are corollaries of the expander mixing lemmas, including the following.
- An independent set of a graph is a subset of vertices with no two vertices adjacent. In an -graph, an independent set has size at most .
- The chromatic number of a graph , , is the minimum number of colors needed such that adjacent vertices have different colors. Hoffman showed that , while Alon, Krivelevich, and Sudakov showed that if , then .
- The diameter of a graph is the maximum distance between two vertices, where the distance between two vertices is defined to be the shortest path between them. Chung showed that the diameter of an -graph is at most .
Expander walk sampling
The Chernoff bound states that, when sampling many independent samples from a random variables in the range [−1, 1], with high probability the average of our samples is close to the expectation of the random variable. The expander walk sampling lemma, due to Ajtai, Komlós & Szemerédi (1987) and Gillman (1998), states that this also holds true when sampling from a walk on an expander graph. This is particularly useful in the theory of derandomization, since sampling according to an expander walk uses many fewer random bits than sampling independently.
AKS Sorting Network and Approximate Halvers
Bounded depth -halvers are a key part of the AKS sorting network and are constructed using expander graphs. An -halver takes as input a length permutation of and halves the inputs into two disjoint sets and such that for each integer at most at most of the smallest inputs are in and at most of the largest inputs are in . The sets of inputs and are an -halving.
Following Ajtai, Komlós & Szemerédi (1983), a depth -halver can be constructed as follows. Take an vertex, degree bipartite expander with parts and of equal size such that every subset of vertices of size at most has at least neighbors. The vertices of the graph can be thought of as registers that contain inputs and the edges can be thought of as wires that compare the inputs of two registers. At the start, arbitrarily place half of the inputs in and half of the inputs in and decompose the edges into perfect matchings. The goal is to end with roughly containing the smaller half of the inputs and containing roughly the larger half of the inputs. To achieve this, sequentially process each matching by comparing the registers paired up by the edges of this matching and correct any inputs that are out of order. Specifically, for each edge of the matching, if the larger input is in the register in and the smaller input is in the register in , then swap the two inputs so that the smaller one is in and the larger one is in . After all rounds, take to be the set of inputs in registers in and to be the set of inputs in registers in to obtain an -halving. To see this, notice that if a register in and in are connected by an edge then after the matching with this edge is processed, the input in is less than that of . Furthermore, this property remains true throughout the rest of the process. Now, suppose for some that more than of the inputs are in . Then by expansion properties of the graph, the registers of these inputs in are connected with at least registers in . Altogether, this constitutes more than registers so there must be some register in connected to some register in such that the final input of is not in , while the final input of is. This violates the previous property however, and thus the output sets and must be an -halving.
- Hoory, Linial & Wigderson (2006)
- Definition 2.1 in Hoory, Linial & Wigderson (2006)
- Bobkov, Houdré & Tetali (2000)
- Alon & Capalbo (2002)
- cf. Section 2.3 in Hoory, Linial & Wigderson (2006)
- This definition of the spectral gap is from Section 2.3 in Hoory, Linial & Wigderson (2006)
- Dodziuk 1984.
- Alon & Spencer 2011.
- Theorem 2.4 in Hoory, Linial & Wigderson (2006)
- See Theorem 1 and p.156, l.1 in Bobkov, Houdré & Tetali (2000). Note that λ2 there corresponds to 2(d − λ2) of the current article (see p.153, l.5)
- see, e.g., Yehudayoff (2012)
- Alon, Noga (1986). "Eigenvalues, geometric expanders, sorting in rounds, and ramsey theory". Combinatorica. 6 (3): 207–219. CiteSeerX 10.1.1.300.5945. doi:10.1007/BF02579382. S2CID 8666466.
- see, e.g., p.9 of Goldreich (2011)
- Theorem 2.7 of Hoory, Linial & Wigderson (2006)
- Definition 5.11 of Hoory, Linial & Wigderson (2006)
- Theorem 5.12 of Hoory, Linial & Wigderson (2006)
- Alon, Noga (1986-06-01). "Eigenvalues and expanders". Combinatorica. 6 (2): 83–96. doi:10.1007/BF02579166. ISSN 1439-6912. S2CID 41083612.
- Friedman, Joel (2004-05-05). "A proof of Alon's second eigenvalue conjecture and related problems". arXiv:cs/0405020.
- Theorem 7.10 of Hoory, Linial & Wigderson (2006)
- Reingold, O.; Vadhan, S.; Wigderson, A. (2000). "Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors". Proceedings 41st Annual Symposium on Foundations of Computer Science. IEEE Comput. Soc: 3–13. doi:10.1109/sfcs.2000.892006. ISBN 0-7695-0850-2. S2CID 420651.
- Pinkser, M. (1973). "On the Complexity of a Concentrator". SIAM Journal of Computing. SIAM. CiteSeerX 10.1.1.393.1430.
- Alon, N.; Roichman, Y. (1994). "Random Cayley graphs and Expanders". Random Structures and Algorithms. Wiley Online Library. 5 (2): 271–284. doi:10.1002/rsa.3240050203.
- Hoffman, A. J.; Howes, Leonard (1970). "On Eigenvalues and Colorings of Graphs, Ii". Annals of the New York Academy of Sciences. 175 (1): 238–242. Bibcode:1970NYASA.175..238H. doi:10.1111/j.1749-6632.1970.tb56474.x. ISSN 1749-6632. S2CID 85243045.
- Alon, Noga; Krivelevich, Michael; Sudakov, Benny (1999-09-01). "Coloring Graphs with Sparse Neighborhoods". Journal of Combinatorial Theory, Series B. 77 (1): 73–82. doi:10.1006/jctb.1999.1910. ISSN 0095-8956.
- Chung, F. R. K. (1989). "Diameters and eigenvalues". Journal of the American Mathematical Society. 2 (2): 187–196. doi:10.1090/S0894-0347-1989-0965008-X. ISSN 0894-0347.
Textbooks and surveys
- Alon, N.; Spencer, Joel H. (2011). "9.2. Eigenvalues and Expanders". The Probabilistic Method (3rd ed.). John Wiley & Sons.
- Chung, Fan R. K. (1997), Spectral Graph Theory, CBMS Regional Conference Series in Mathematics, 92, American Mathematical Society, ISBN 978-0-8218-0315-8
- Davidoff, Guiliana; Sarnak, Peter; Valette, Alain (2003), Elementary number theory, group theory and Ramanujan graphs, LMS student texts, 55, Cambridge University Press, ISBN 978-0-521-53143-6
- Hoory, Shlomo; Linial, Nathan; Wigderson, Avi (2006), "Expander graphs and their applications" (PDF), Bulletin of the American Mathematical Society, New Series, 43 (4): 439–561, doi:10.1090/S0273-0979-06-01126-8
- Krebs, Mike; Shaheen, Anthony (2011), Expander families and Cayley graphs: A beginner's guide, Oxford University Press, ISBN 978-0-19-976711-3
- Ajtai, M.; Komlós, J.; Szemerédi, E. (1983), "An O(n log n) sorting network", Proceedings of the 15th Annual ACM Symposium on Theory of Computing, pp. 1–9, doi:10.1145/800061.808726, ISBN 978-0-89791-099-6, S2CID 15311122
- Ajtai, M.; Komlós, J.; Szemerédi, E. (1987), "Deterministic simulation in LOGSPACE", Proceedings of the 19th Annual ACM Symposium on Theory of Computing, ACM, pp. 132–140, doi:10.1145/28395.28410, ISBN 978-0-89791-221-1, S2CID 15323404
- Alon, N.; Capalbo, M. (2002), "Explicit unique-neighbor expanders", The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings, p. 73, CiteSeerX 10.1.1.103.967, doi:10.1109/SFCS.2002.1181884, ISBN 978-0-7695-1822-0, S2CID 6364755
- Bobkov, S.; Houdré, C.; Tetali, P. (2000), "λ∞, vertex isoperimetry and concentration", Combinatorica, 20 (2): 153–172, doi:10.1007/s004930070018, S2CID 1173532.
- Dinur, Irit (2007), "The PCP theorem by gap amplification" (PDF), Journal of the ACM, 54 (3): 12–es, CiteSeerX 10.1.1.103.2644, doi:10.1145/1236457.1236459, S2CID 53244523.
- Dodziuk, Jozef (1984), "Difference equations, isoperimetric inequality and transience of certain random walks", Trans. Amer. Math. Soc., 284 (2): 787–794, doi:10.2307/1999107, JSTOR 1999107.
- Gillman, D. (1998), "A Chernoff Bound for Random Walks on Expander Graphs", SIAM Journal on Computing, 27 (4): 1203–1220, doi:10.1137/S0097539794268765
- Goldreich, Oded (2011), "Basic Facts about Expander Graphs" (PDF), Studies in Complexity and Cryptography, Lecture Notes in Computer Science, 6650: 451–464, CiteSeerX 10.1.1.231.1388, doi:10.1007/978-3-642-22670-0_30, ISBN 978-3-642-22669-4
- Reingold, Omer (2008), "Undirected connectivity in log-space", Journal of the ACM, 55 (4): 1–24, doi:10.1145/1391289.1391291, S2CID 207168478
- Yehudayoff, Amir (2012), "Proving expansion in three steps", ACM SIGACT News, 43 (3): 67–84, doi:10.1145/2421096.2421115, S2CID 18098370
- Hartnett, Kevin (2018), "Universal Method to Sort Complex Information Found", Quanta Magazine (published 13 August 2018) | s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363515.28/warc/CC-MAIN-20211208144647-20211208174647-00286.warc.gz | CC-MAIN-2021-49 | 18,671 | 95 |
https://markstextterminal.com/2019/04/08/term-of-art-aptitude/ | code | “An individual’s ability to learn, without reference to specific instruction or prior knowledge. Aptitude is most often measured by standardized tests (for example the Wechsler Intelligence Scale for Children [WISC]) or cognitive batteries of tests that also include achievement components (such as the Woodcock-Johnson). Other important aptitude tests include the Scholastic Aptitude Test and the American College Test, each of which plays a prominent role in college admissions.
Determining whether someone has a learning disability is generally based on a discrepancy between achievement and aptitude, as measured by standardized tests. Consequently, tests of aptitude such as the WISC and the Woodcock-Johnson play a central role in determining who is eligible to receive special education services.”
Excerpted from: Turkington, Carol, and Joseph R. Harris, PhD. The Encyclopedia of Learning Disabilities. New York: Facts on File, 2006. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176922.14/warc/CC-MAIN-20201124170142-20201124200142-00450.warc.gz | CC-MAIN-2020-50 | 946 | 3 |
https://community.splunk.com/t5/All-Apps-and-Add-ons/Is-the-option-to-download-AWS-RDS-log-files-being-considered-for/m-p/275897 | code | Use Lambda function to first put logs into S3 in schedule, then you can do your regular S3 input.
I was able to use python code from this repo to archive this:
We download the rds logs via the cli and upload them to an s3 bucket on a schedule. From there we can use the s3 input. I presume aws will add the option to put rds logs in an s3 bucket, just as they do with elb logs.
Hi David, is the RDS log available via S3 bucket? If so, you can use the S3 modular input to index them. Otherwise, we need check with other customers and product management team to prioritize it.
-- Jove Z (development manager of the Splunk App for AWS) | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500288.69/warc/CC-MAIN-20230205193202-20230205223202-00473.warc.gz | CC-MAIN-2023-06 | 632 | 5 |
https://www.aftvnews.com/spmc-creator-ends-the-apps-development-and-joins-the-mrmc-team/ | code | Chris Browet, the creator of SPMC, a popular forked version of Kodi, has announced that he is joining the team behind MrMC, another popular forked version of Kodi. As a result, development of SPMC is coming to an end so that Browet, also commonly known by the handle koying, can concentrate on his new role of maintaining MrMC’s development for Android and Fire OS devices.
MrMC and SPMC are easily among the most popular forked versions of Kodi, a media center app that is used by many Fire TV owners. MrMC was created by former Kodi developers Scott Davilla (a.k.a davilla) and Željko Ametovic (a.k.a. amet). They were the two who originally ported Kodi, then called XBMC, to the Android platform. When Davilla and Ametovic left the Kodi team, Browet stepped up to handle much of Kodi’s Android development.
The Kodi team has had trouble attracting new Android developers in the past. They’ve relied heavily on advancements made by both MrMC and SPMC, which are both open source apps that have taken Kodi’s original code to new levels on mobile platforms like Android, Fire OS, and iOS. The merger of MrMC and SPMC is great news because it puts the top Android media center developers under one roof to work on the same app.
Fans of SPMC will certainly be sad to see the app’s development come to an end, but there is a free version of MrMC called MrMC Lite for those who do not want to pay $2.99 for the full version. Of course, there is also the option to switch to Kodi, which will undoubtedly continue to benefit from Davilla, Ametovic, and Browet’s development at MrMC by integrating their open source code into Kodi.
The MrMC team has also informed me that they’ll be introducing Python support into their app in conjunction with Browet’s arrival on the team. MrMC notably removed support for Python from its original Kodi base code because Python was unnecessary since the app does not support 3rd-party add-ons. Once support for Python is added in a future release, MrMC will continue to not allow user-installed add-ons in order to remain in the Amazon and Apple appstores. MrMC will, however, be adding highly requested Python-based add-ons to MrMC, starting with the Plex add-on and some more powerful skins that require Python helpers.
I donated to the SPMC developer, more of you people should have too. This is unfortunate news.
Why is this unfortunate news? This is big gain for continued support in Android.
Its unfortunate because whereas there were previously three viable projects, there are now two. That’s actually a net loss in support.
I gave to SPMC too, sorry to see the project fold. SPMC had more features than both KODI(ie. framerate switching (or at least I haven’t found it yet, maybe the current beta…)) and MrMC (free, add-in support, skins)
No, its loss isn’t a gain for us.
Correction: Upon reaquainting myself with Kodi, I found framerate switching, so I retract my earlier complaint.
Still sorry to see the SPMC project end, but it’s looking like Kodi’s Krypton build might work out nicely as a replacement. Time will tell.
(Current SPMC user here)
If I want to continue to use 3rd party addons on my fire stick I will eventually need to install Kodi?
Any idea how long SPMC will continue to work OK before I need to change over?
Any other light, android centric Kodi build like SPMC out there?
I appreciate these guys trying to get paid for their work but the lack of user add-ons will always keep them behind the eight ball.
MrMC is not available internationally, at least on the Fire TV 3 used in Colombia.
I would pay the $2.99 that it costs in order to have a Kodi alternative, but the Amazon App Store does not want me to use it
MrMC availability issues should be posted on MrMC forums, we can’t fix what we do not know about :)
Oh, i thought it was not available because Amazon App Store didnt have an official store for my country.
I Will Go to the forum if it can be solved
Good news! I have paid for MrMc but still user Kodi because of the nice skins and parental controls. If MrMc can get these basic add-ons I will start using it gladly.
I’m a big fan of MrMC on the Apple TV and I totally understand why add-ons were pulled from that platform but I have to disagree with not supporting add-ons (except the “baked in ones”) on Android.
I hope MrMC reconsiders and at least provides a side-loadable version that supports all add-ons. I’m happy to still pay/donate for it. I’d even pay extra for that “feature”.
Addons = banned from Amazon App Store = no easy FireTV install.
(I get that sideloading is not hard for many of us here, but for the average use, it’s not a viable alternative.)
They could still develop a seperate app called “Ultra MrMC” or such that wasn’t offered in the app store. I think that is what was being suggested.
Exactly! I’ve no issue with pulling add-ons in the app store version but power users need to be given a version that supports add-ons. Even if we pay more I’m ok with that.
Why would you pay more to get addon/have to side load MrMC, when this is exactly what Kodi is and it is free.
MrMC is nothing but a stripped down version of Kodi, and any features it has extra Kodi will eventually get. Considering how easy it is to side load, I dont see any reason why anyone would ever use MrMC regardless of the plugins.
You’re essentially saying they should put in the work to release an alternate version for free that has more features but does not benefit them in any way. I’m sorry, but that doesn’t make any economic sense. It’s the same as asking me to make http://www.UltraAFTVnews.com that has no ads at all but also has more articles.
Before you say that they could charge for the “Ultra MrMC” version, there is no market for a paid sideload-only APK. Saying “paid sideload” is pretty much an oxymoron. Google Play is the only place they could sell an “Ultra MrMC” but I suspect that the vast majority of their profit comes from Fire TVs and Apple TVs.
Like myself, the MrMC team are trying to make a living doing something they love. While it would be wonderful if people like us could make all decisions in a way that 100% benefits the community, we both have to consider what makes economic sense in order to keep doing what we’re doing.
Something that many people don’t realize is that MrMC is not simply a “crippled Kodi.” They aren’t just taking the latest version of Kodi, ripping out add-on support, and calling it their new release. MrMC forked off from Kodi long ago and has been growing further apart ever since. Supporting add-ons in MrMC is not an insignificant amount of work for the team, so it doesn’t make sense for them to do it when there is zero benefit to their bottom line.
Rather than release it for free, they could make it require a purchase of the origional mrmc to function.
So you still have to purchase mrmc officially to be able to run “Ultra MrMc”.
In terms of benefit to them, it could reduce some of the complaints about mrmc.
Correct. While we ‘could’ enable side-loading for Google Play, this is what would happen.
MrMC would become tainted the same way Kodi is tainted from all the pirate addons. We start getting becoming associated with piracy addons because we do nothing about them (just like Kodi does).
The next thing is Amazon gets nervous and MrMC gets kicked out of their App store. Then Apple does the same thing. Nice, we just lost our primary revenue streams. No one gets paid, we can’t pay server and licensing bills. Development grinds to a halt and stops and we start to bit rot.
Donations ? Ben there, done that before as has Koying. SPMC has had 500k-1M downloads, if all those users had donated $1, even 50 cents. We would not be having this discussion. Donations don’t work, never will. Users just don’t make the effort to donate. And what you get just does not cover the bills. Not even close.
So we charge a nominal fee to cover dev, server and licensing. And it’s for a lifetime, no silly subscription thing. Buy once, you get the most recent version and all future updates. Pretty good deal for $2.99 USD.
Would we like to allow users to pick their skin or favorite addons. Sure but there is no way to keep out the pirate addons at the same time. So catch-22. We do the next best thing, bundle in a selection of popular skins and addons. Sorry but the best we can do at the current time.
No one said do it for free.
The above reply was to AFTVnews, not MrMC like it appears to be. I understand your reasonings MrMC, free or not free isn’t going to change your mind. Understood. But I still wish there was add-on ability even if you had to police them by manually approving them before they show or something.
Do they allow you to install the official hd homerun yet?
Both hd homerun methods are supported. The older one was yanked from Kodi/SPMC long ago and MrMC brought it back for users with older hd homerun devices.
How do I install the Hdhomerun add-on. I don’t want the pvr.
Will Emby be added as a built in add-on? I don’t use plex
There is all ready an existing internal Emby client which works quite well. Including the offical Emby addon is still being discussed.
MrMcI bought MrMc after it was first added to the Amazon app store, but gave up on it because I want custom menu items I can use to point to a specific network share folder which I can easily do with a Kodi skin. Any chance that feature will be added to MrMc
Yep, that was one of the decision points to bring back python.
Thanks for the response. So will that mean we can add a skin, or you’ll have that feature built in?
depends, we will be bringing in some of the more popular skins.
There is a section on our forums dealign with skin requests.
Any easy way to transfer my Addons to Kodi from SPMC??
You might try using a backup/restore add-on. Take a backup in SPMC and restore in Kodi. Be prepared to reinstall Kodi if something goes wrong.
Excellent news. Consolidation yields a superior product. Let weak products die.
as long as third party apps can still be installed (you know the type I mean)
Apparently NOT on MrMC.
As I understand it 3rd party addons are not allowed so you would need to install Kodi then add your add-on(s).
As far as 3rd party apps (like T********?) I don’t think having MrMC on a stick/box will prevent sideloading anything, pretty sure MrMC won’t interface with them but I’d like to hear if if I’m misunderstanding that.
So is Mr mc made for local content in my external storage ?what can one do to play media etc.does it do any legit add-ons…
My understanding is that since(currently) python is neutered in MrMC you cannot install any additional add-ons. However you can use IPTV clients to get certain streaming channels.
Correction, python is not neutered. Side-loading of addons is not allowed.
Sorry, just reading directly from the article above where it states “MrMC will be introducing Python support” which let me to believe that Python currently does not exist.
I run stock Kodi, sideloaded.
However, I paid for MrMC as soon as it became availalable. I hope SPMC shutting down and the development resources moving to MrMC turns out to be a good thing. I think MrMC is a good thing. If it doesn’t meet your use case, it doesn’t make it bad —just not for you.
I wish all the MrMC devs the best of luck. If you are using android devices to run a Kodi variant, you should probably wish them luck also.
so they are coming out with an app the will not let you load 3rd party addons. why should i install it? why not just use Roku or Firestick on netflix or hulu which will have tons more comtent? why purchase a android box or anything else?? i will uninstall SPMC and go back to KODI. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943809.76/warc/CC-MAIN-20230322114226-20230322144226-00050.warc.gz | CC-MAIN-2023-14 | 11,776 | 71 |
https://rc.www.ign.com/articles/2003/04/10/golden-sun-the-lost-age | code | - More than 40 hours gameplay
- Support to carry over character data from Golden Sun
- Cartridge save (three slots)
- Link cable support for two player battles
- Only for Game Boy Advance
Though players can play the game by itself, Golden Sun: The Lost Age rewards players who have completed the original adventure by giving them the ability to move Golden Sun data into this sequel, either via two GBA systems and link cable, or an outrageously long password. Isaac, the lead character from the original game, will eventually return in The Lost Age...and players who have finished the original adventure can get the upper-hand with his original Golden Sun attributes. Without the transfer, players just get the standard Isaac attributes. This is a really excellent feature that encourages players to work through the original.
Apart from the prologue, most of the story reveals itself through extremely wordy conversations. These conversations are certainly necessary in offering all the details needed to follow the pretty convoluted plot, but Golden Sun has definitely been known for dialogue that goes on for just a little too long...and the same happens in The Lost Age, right down to the silly Yes or No questions that have no bearing on the plot and are there just to give the gamer a feeling of involvement to the storyline.
In fact, not much at all has changed from the first Golden Sun game, which is definitely not a bad thing considering it was, by far, the prettiest RPG on the system, with fantastic special effects and a powerful music soundtrack that really took advantage of the GBA's hardware. It's obvious that the Camelot focused more on the story side of things than on the graphics, since the graphic engine and music soundtrack hasn't been altered noticably. There are new events that happen during the overworld portions of the adventure (like rope climbing, a large part of The Lost Age's puzzle elements), and many of the ideas for puzzles established in Golden Sun are extended and used a lot more frequently in the sequel. Players will have to move platforms, leap over gaps, traverse weak earth, and jump on suspended pillars in order to get through several of the "dungeon" type areas just as they did in the original, but these challenges are a lot more difficult and more frequent this time around.
One of Golden Sun's main elements was its Pokemon-style collection of creatures known as Djinn. These critters are elementals that can be utilized in battle, altering a character's class depending on which Djinni he uses in a fight. But before they can be used, they must be caught, and one of the main challenges in Golden Sun: The Lost Age is locating and acquiring these creatures. The designers have incorporated these Djinn creatures within the standard puzzle design, and they're a lot more "alive" in Golden Sun: The Lost Age since there will be many times where you'll have to chase after an escaping Djinn in order to catch it. But you'll have to knock it out in battle before it'll leap onto your side, and there are plenty of opportunities for these Djinn to escape before they get caught; as long as you get them, they're yours to keep. But if it gets away, either in the overworld or in battle, that's the last you'll ever see of the creature. Helpful hint: save the game before you engage the Djinn...just in case.
With these Djinn come powerful attacks during the battle sequences, and deeper in the game players will be able to combine different types of Djinn to summon extremely powerful creatures and their attacks. It's certainly possible to go through the game without using a Djinn creature during the fight, but these creatures put forth some awesome graphical effects that just can't be missed. But overall, battle sequences haven't received much alteration from the original, as the designers stuck with exact same interface from the previous game...as well as recycled many of the same spell effect as well, both good (fire and lightning effects) and bad (earthquake's "bouncy" sprites). It's still based upon random encounters, meaning players will enter battle pretty much at any time, with no visual cue besides a startling flash before it spins players into battle.
But with the same interface comes the same annoying feature: if multiple party members target a specific creature in a group, and the first member kills it off before the second member gets off its attack, the second party member defaults to a defensive position instead of attacking the next monster in line. This is irritating residue from the first game, and goes against the mentality established in other RPG battle interfaces. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648850.88/warc/CC-MAIN-20230602172755-20230602202755-00102.warc.gz | CC-MAIN-2023-23 | 4,659 | 11 |
https://www.edureka.co/data-science-r-programming-certification-course-gurgaon | code | Thanks for applying for scholarship test.
Our career counsellor will inform you soon regarding the test details.
Annual growth forecast for data scientists in 2019- Over all growth and number of jobs available are 9700, 97% rise in Job openings.
The average salary of Data Scientist in Gurgaon is INR 10,00,000 per year- Glassdoor.
Companies hiring Data Scientist in Gurgaon are Ernst & Young, American Express, Cognizant Technology, WNS and many more.
|Jun 26 th||
|Aug 08 th||
Course Price at
Can’t find a batch you were looking for?
Your details have been successfully submitted. Our learning consultants will get in touch with you shortly.
The Data Science Certification course in Gurgaon gives you an insight into data, including visualization of various datasets and allows you to acquire in-depth knowledge of data science through our live-instructor led sessions. With Edureka’s training in Gurgaon, you will also learn the importance of data science, what is data science and its lifecycle, tools of data science, the era of Data Science and R, what is machine learning, extraction, wrangling, and exploration. Click here to know more about the course curriculum.
Edureka provides the most extensive Data Science course at the market in Gurgaon, covering the full Data Science lifecycle concepts from Data Collection, Data Extraction, Data Cleaning, Data Exploration, Data Transformation, Feature Engineering, Data Integration, Data Mining, Building Prediction Models, Data Visualization and Customer Deployment. The learning objective of this course is to have in-depth knowledge of Data Science lifecycle, and real-time industry projects which will be executed in Rstudio. Strong participation of SME throughout the data science training to learn industry norms and best practices Click here to know more about the course description.
Data science is a "concept to unify statistics, data analysis and their related methods" to "understand and analyse actual phenomena" with data. Data Science Training employs techniques and theories drawn from many fields within the broad areas of mathematics, statistics, information science, and computer science from the sub-domains of machine learning, classification, cluster analysis, data mining, databases, and visualization. The Data Science Certification Course enables you to gain knowledge of the entire life cycle of Data Science, analyse and visualise different data sets, different Machine Learning Algorithms like K-Means Clustering, Decision Trees, Random Forest, and Naive Bayes.
There is no specific pre-requisite for Data Science Training. However, a basic understanding of R can be beneficial. Edureka offers you a complimentary self-paced course, i.e. "R Essentials" when you enroll in Data Science Training.
Edureka’s Data Scientist with proficiency in R Certificate Holders work at 1000s of companies like
Edureka is most successful Instructor led online course institute. I completed many courses i.e. TOGAF, Big Data and Hadoop, MongoDB, Apache Spark, Apache Storm, PMP Preparation, Business Analytics with R , and Data Science from Edureka. Going forward i am planning to do additional courses as well when time permits. Course content is perfect to begin with new or advance in career and Instructors are also very highly knowledgeable. I recommend everyone to try courses from Edureka, thousands are satisfied and daily making improvement in their profession.
I had a great experience in taking the Hadoop course from Edureka. It is the only course in the market which facilitates the people from the Non development background to plug themselves into the Hadoop ecosystem. Edureka has provided a unique opportunity for the students around the world to connect to some of the best tutors. The tutors not only provide a very good theoretical explanation , but also help us to co-relate it with some real time examples. This gives a edge to the students and the working professional who attend the course.The best advantage of the Edureka course is the fact that we can attend the course from the comfort of our home as well as download the courses and listen to it over again and again. I am sure that Edureka will be playing a key role in filling the Gap of the Professionals which the Cloud ecosystem is currently facing. Cheers,Vijay Kalkundri - Good Session and one of the best instructor to have interfaced with at online.
The courses are top rate. The best part is live instruction, with playback. You get all the presentations and labs. Great instructions. But my favorite feature is viewing a previous class. They provide a set of videos from a previous session, so you can watch the course before you participate. This way you can get the most out of the course. Also, they are always there to answer questions, and prompt when you open an issue if you are having any trouble. Added bonus ~ you get lifetime access to the course you took!!! I have taken so many courses and then not really gotten to work with a technology until I forgot most of what was taught. Edureka lets you go back later, when your boss says I want this ASAP!" ~ This is the killer education app... I've take two courses and I'm taking two more. Love these guys."
My experience with edureka about Python is much impressed, with such quality of the training. We get access to each day class recorded sessions after the live class. Edureka is very quick reactive towards the queries of each single user, they answer and follow-up to ensure you get the correct response to resolve your query. Online recording of the course is very useful as you can go back and refer at any time. You have access to course and materials for ever, which is really helpful. More over 24/7 quality support, which is very much important to any of us. I must thank to Edureka for giving such support. Thanks guys, cheerââ¬Â¦
Clean, simple and a fantastic learning resource. The courses are a great resource for personal development and continual learning. They are well structured and provided both ease of access and depth while allowing you to go at your own pace.Support team people is also really very cooperative and helps out at there best.
The online course delivered by Edureka on big data, Hadoop - developer is really nice. The first thing of Edureka is that, the very first day of your registration, you have access the full tutorial ( record of some previous batch) and which will provide enough knowledge/teaching, so whenever you are attending your actual training session, you are not a fresher of the session, but a kind, expert and you can clear any knowledge gap.More of that, as you are getting 2 lectures for the same session, your knowledge is much more, than you would have expected. As these recording will be available you for ever, you always go again and again and again.The help/administration/support is really really good.For Hadoop big Data developer, I will recommend to join.Thanks
10th floor, Tower-B Unitech Cyber Park, Sector 39,Gurugram,Haryana, 122001.
Get a Glimpse of the course | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347422803.50/warc/CC-MAIN-20200602033630-20200602063630-00044.warc.gz | CC-MAIN-2020-24 | 7,062 | 23 |
https://community.esri.com/t5/imagery-and-remote-sensing/unwanted-empty-overview-footprints-in-the-mosaic-dataset/m-p/1063258 | code | When creating a mosaic dataset without "build footprints" step, I get empty footprints of overviews. The locations of the images are within red borders. Everything in between are empty footprints.
"Build footprints" step produces stripe holes between the images despite all possible settings combinations. A high number of vertices solves the problem in most of the cases, but for some it has to be so high that the processing never finishes. Therefore, I hope there is another solution, for example somewhere in the "mosaic properties" step.
It is possible to delete all the overview footprints that do not overlap with the border, but it seems like it shouldn't happen in first place. My concerns are performance in the web and general understanding of what is going on. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488551052.94/warc/CC-MAIN-20210624045834-20210624075834-00504.warc.gz | CC-MAIN-2021-25 | 772 | 3 |
http://forum.haphost.com/index.php?/topic/977-starting-an-urbanterror-server/ | code | This part of the guide assumes the following. You have "SHELL" access to your dedicated Linux system. It also assumes that you have a basic knowledge of the Linux OS.
If your server does not create home directories correctly issue the following commands:
chown urt /home/urt
usermod -d /home/urt urt
Download the zip file NOT the .exe installer.
You might need to chmod u+x the updater before running it, sometimes files do not come with execute rights after unzip.
tar -xvf UrbanTerror42_ded-2.tar.gz
The updater will now download all the required files to the location /home/urt/UrbanTerror42/
mv UrbanTerror42/ urbanterror42/
chown -R urt:urt urbanterror42/
chmod a+x urbanterror42/Quake3-UrT-Ded.i386
Issue the command cd ~/urbanterror42/ to make sure you are in the root urbanterror42 directory. Using your text editor, make a file called start.sh. In the file you wish to have the following:
/home/urt/urbanterror42/Quake3-UrT-Ded.i386 +set fs_game q3ut4 +set fs_basepath /home/urt/UrbanTerror42/ +set fs_homepath /home/urt/UrbanTerror42/ +set dedicated 2 +set net_port 27960 +set com_hunkmegs 128 +exec server.cfg
echo "server crashed on `date`" > last_crash.txt
This script will automatically restart your game server should it crash. Useful also because a /RCON quit command will reset you server the old fashioned way.
chmod a+x start.sh
screen -m -d -S UrT-Server sh start.sh
This will then run the server in the screen, and you will not shutdown your server when you terminate your shell.
You are finished, good job! Now go play. | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823605.33/warc/CC-MAIN-20171020010834-20171020030834-00061.warc.gz | CC-MAIN-2017-43 | 1,541 | 19 |
http://radio-weblogs.com/0110120/2005/05/10.html | code | I think we need to develop a vision / strategy that builds autonomic computing into the enterprise architecture. Anything that we can do to automate the management and maintenance of infrastructure will free up the creative ability of human resources to focus on the development and creation of new systems to enhance the way we do business and improve the services that we deliver. That is where value is found. Here's a good article on the vision of autonomic computing.
Michael Vizard mentions that Ozzie Papic of Net Integration Technologies has developed a Linux distribution that includes self healing capabilities. He writes of the benefits of such a technology:
The thing to remember is that the number of applications that computing can be applied to are huge. What's holding back our progress--and the overall industry--is the amount of money required to support an application. As those costs drop, the number of applications will increase. So instead of seeing a world where 80 percent to 90 percent of an IT budget is dedicated to ongoing support and maintenance, we could live in a world where 50 percent or more of IT budgets are actually dedicated to new applications.
I'll take a look at the NITIX product to see how it compares. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249556231.85/warc/CC-MAIN-20190223223440-20190224005440-00000.warc.gz | CC-MAIN-2019-09 | 1,246 | 4 |
http://www.thumpertalk.com/topic/1125485-wiring-question-power-supply-behind-light/ | code | I haven't got a wiring diagram
I've taken off the oem computer. The power supply for that would probably be ideal.
I can see 4 wires into the plug I think supplied the power. A brown, a white, a red/brown and a green black. Can anyone tell me if these are correct and which to tap into for positive and negative
Thanks in advance.
Edited by iggs, February 26, 2015 - 09:31 AM. | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281421.33/warc/CC-MAIN-20170116095121-00028-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 376 | 5 |
http://www.mywordsolution.com/question/what-types-of-things-must-the-team-leader-know/930047 | code | prepare critical internal partnerships and alliances should a new R&D leader maintain in the manufacturing organization? Describe.
How does formal power structure aid (or hinder) cross-functional team effectiveness? Describe.
What types of things must the team leader know about informal political landscape? In system with strong informal culture, whose aid and support must new team leader cultivate and why?
What strategy would you recommend new team leader employ to be successful? | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125881.93/warc/CC-MAIN-20170423031205-00199-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 485 | 4 |
http://www.CMStatistics.org/RegistrationsV2/CMStatistics2020/viewSubmission.php?in=507&token=o0q9s0563nqo69439o1n056p5qon545p | code | Title: Data imputation of large observations via Bayesian inference for multivariate extremes
Authors: Simone Padoan - Bocconi University (Italy)
Boris Beranger - University of New South Wales (Australia)
Isadora Antoniano-Villalobos - Ca' Foscari University of Venice (Italy) [presenting]
Abstract: Missing data is a known issue in statistics. In applications placing interest on large observations, usual data imputation methods may fail to reproduce the heavy tail behaviour of the quantities involved. Recent literature has proposed the use of multivariate extreme value theory to predict an unobserved component of a random vector given large observed values of the rest. This is achieved through the estimation of the angular measure controlling the dependence structure in the tail of the distribution. The idea can be extended and used for effective data imputation of multiple components at adequately large levels, provided that the model used for the angular measure is flexible enough to capture complex dependence structures. A Bayesian nonparametric model based on constrained Bernstein polynomials ensures such flexibility while allowing for tractable inference. An additional advantage of this approach is the natural way in which uncertainty about the estimation is incorporated into the imputed values through the Bayesian paradigm. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303868.98/warc/CC-MAIN-20220122164421-20220122194421-00036.warc.gz | CC-MAIN-2022-05 | 1,350 | 5 |
http://developer.linkedin.com/forum/known-issues | code | - [RESOLVED] Plugins not rendering in IE9
Plugins not rendering in IE9
Plugins should work cross browser, though IE9 (and possibly other versions of IE) have issues when rendered in quirks mode or compatibility view. To ensure your page is rendering in a standards compliant mod, follow these steps:
- make sure there are no compatibility flags in your markup: e.g. <meta http-equiv="X-UA-Compatible" content="IE=8" />
- make sure you are using a valid <!DOCTYPE ...> declaration
- make sure there isn't any whitespace (newline) before the <!DOCTYPE ...> declaration. Having whitespace (or anything) before the DOCTYPE can force IE to render in quirks-mode, which the LinkedIn platform also does not support.
- make sure your browser isn't forcing compatibility mode. See the blog post on MSDN about Document Mode in IE9 | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115858727.26/warc/CC-MAIN-20150124161058-00165-ip-10-180-212-252.ec2.internal.warc.gz | CC-MAIN-2015-06 | 820 | 7 |
https://www.anothereality.io/ | code | We are a software development studio specialised in interactions in immersive environments, such as virtual reality, augmented and mixed reality. Since 2014 we develop videogames, immersive corporate HR solutions, and immersive industrial solutions.
CTO & founder
CEO & founder
COO & founder
Ready to start your next project with us? That's great! Drop us a few lines describing your idea and we will get back to you as soon as possible! | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267156471.4/warc/CC-MAIN-20180920120835-20180920141235-00453.warc.gz | CC-MAIN-2018-39 | 437 | 5 |
https://steamdb.info/patchnotes/4545314/ | code | PLAYERS MAY DOWNLOAD VERSION 1.1.0 FOR FREE
Finally, I was able to finish the first update for Everyone Dies! ːSteamhappyː
I tried to take into account all the relevant requests and complaints of the players.
- Saiga-12k (randomizer)
- M1A1 Thompson (randomizer)
- ASH-12 MOD (randomizer)
- AK74M (wall)
- AUG (randomizer)
- Added a new game level - Cargo. The location is a small arena, divided into 3 parts. You need to think quickly in order to survive.
- Now 3 main levels (Bunker, Warehouse and Cargo) are available to everyone for free, without being forced to spend pts.
- Zombies are faster and more dangerous.
- Weapon Randomizer now does not give out weapons that can be bought from the wall (except for double-barreled sawed-off shotgun).
- Game prices have been adjusted.
If you find any bugs, please report this by creating a new topic in the discussions of the community center. After the release of the game, I test the game completely alone, and sometimes I can miss important errors.
Have a good game! | s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144979.91/warc/CC-MAIN-20200220131529-20200220161529-00240.warc.gz | CC-MAIN-2020-10 | 1,020 | 15 |
https://bioconductor.statistik.tu-dortmund.de/packages/3.16/bioc/vignettes/RITAN/inst/doc/choosing_resources.html | code | RITAN indexes multiple resources and choosing which of them are most relevant for your study can be a challenge. To help with this process, we provide below a set of examples from different types of studies and the thinking behind which resources were used.
While many resources contain information about protein complexes (obligate interactions) and protein-protein interactions (often transient), some use experimental techniques that are specific for physical ineractions. Determining whihc resources indicate physical, through-metabolite, and through-DNA (i.e. transcription factors) interactions, we recommend: 1) each resource’s primary publication 2) the pathguide website 3) the following guidelines | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100229.44/warc/CC-MAIN-20231130161920-20231130191920-00651.warc.gz | CC-MAIN-2023-50 | 709 | 2 |
https://lists.debian.org/debian-dpkg/2014/03/msg00018.html | code | Re: rsyslog init script breaks after package upgrade
On Wed, 2014-03-19 at 09:26:16 +0100, Ralf Jung wrote:
> this issue is still present in current wheezy, including the backports
> package. Without taking manual steps, it results in rsyslog filling up
> the disk as log rotation is completely broken - so I'd argue it should
> have a severity of important, at least (it may even be RC, as it should
> affect many packages - but only in rsyslog I see this problem, so far).
> I fixed this now on my system by replacing "--exec $DAEMON" in do_stop
> with "--name $RSYSLOGD". But that still leaves --exec rather useless for
> "stop", so I am also re-assigning the bug to dpkg (start-stop-daemon).
If --exec is supposedly broken then this would affect any daemon using
it, which I find a bit perplexing, and I'd have expected a ton of bug
reports on dpkg due to broken upgrades. I've rechecked it on current
unstable, and it still works here.
Going over the original bug report I see this very suspicious line:
chrisb@massmail:~$ sudo ls /proc/427/exe -l
lrwxrwxrwx 1 root root 0 Dec 6 01:33 /proc/427/exe -> (deleted)/usr/sbin/rsyslogd
If this is really the contents of the exe symlink, then that's the reason
s-s-d cannot find the process. The expected contents of the symlink
when the inode has been unlinked should be «/pathname (deleted)».
Chris, Ralf, what kind of kernel are you guys using? Is that a custom
one? Perhaps heavily patched? | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514046.20/warc/CC-MAIN-20210117235743-20210118025743-00731.warc.gz | CC-MAIN-2021-04 | 1,444 | 22 |
https://www.aryacollege.in/benefits-of-data-science-for-top-engineering-colleges/ | code | Benefits of Data Science for Top Engineering Colleges
Track your success with some CS terms
Data science is, among other things, a language for Top Engineering Colleges. Data scientists increasingly work across entire organizations, and communication skills are as important as technical ability. After all, it is booming in every industry, as more people and companies are investing their time to better understand this constantly expanding field. The ability to communicate effectively is a key talent differentiator.
Whether you pursue a deeper knowledge of data science by learning a specialty or simply want to gain a smart overview of the field at Computer Science Engineering at B Tech Colleges in Jaipur, mastering the right terms will fast-track the candidates to success on their educational and professional journey.
Using the following data science terms accurately will help you stand out from the crowd:
Business Intelligence (BI)
BI is the process that helps to analyze and report historical data. It helps to guide the future decision making of the students of Best Engineering Colleges in Jaipur. BI helps leaders make better strategic decisions moving forward. In addition, it determines what happened in the past using data, like sales statistics and operational metrics.
Data engineers of Top Engineering Colleges in Jaipur build the infrastructure. It helps to gather, clean, store and prepare the data for use by data scientists. Good engineers are invaluable, and building a data science team without them is a “cart before the horse” approach.
Under the umbrella of data science, decision scientists of B Tech College in Jaipur apply math and technology to solve business problems. Also, they add this in behavioral science and design thinking (a process that aims to better understand the end user).
Artificial Intelligence (AI)
AI computer systems can perform tasks that normally require human intelligence or the students of Arya 1st Old Campus. This doesn’t necessarily mean recreating the human mind. Instead involves using human reasoning as a model. Further, it provides better services or creates better products. It includes speech recognition, decision-making, and language translation.
A subset of AI, machine learning refers to the process by which a system learns from inputted data by identifying patterns in that data. Later, it applies those patterns to new problems or requests. It allows data scientists to teach a computer to carry out tasks, rather than programming it to carry out each task step-by-step.
This is a specific type of machine learning that involves the data scientist acting of Engineering Colleges in Jaipur as a guide. With this, they can teach the desired conclusion to the algorithm. For instance, the computer learns to identify animals by getting training on a dataset of images. They are properly labeled with each species and its characteristics.
Post a Comment | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100448.65/warc/CC-MAIN-20231202172159-20231202202159-00245.warc.gz | CC-MAIN-2023-50 | 2,934 | 14 |
http://forums.nexusmods.com/index.php?/topic/645015-ini-not-working-issues/?p=5083947 | code | ini not working issues.
Posted 12 April 2012 - 01:18 AM
Posted 12 April 2012 - 02:19 AM
Edited by LFact, 12 April 2012 - 02:19 AM.
Posted 13 April 2012 - 01:21 PM
Ok, so i guess i'm kinda new at this, but it doesn't appear that my ini changes are effecting anything. I'm altering the one in the oblivion folder, trying to tweak for a weaker computer, skip startup movies, etc, with no results. I had the oblivion optimised mod, but i deactivated it because i thought it might be forcing a certain config, but no change. Help?
Ok, thank you. Guess I was a little to eager to get started. No worries, I'm decent at patching up my messes, fortunately. | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645264370.66/warc/CC-MAIN-20150827031424-00037-ip-10-171-96-226.ec2.internal.warc.gz | CC-MAIN-2015-35 | 648 | 7 |
http://ubergeek316.blogspot.com/2007/01/video-dangers-of-misspelling-google.html | code | Sorry I have not posted in about a week, but I have been on vacation. I am currently trying to catch up with all the e-mail, and other stuff that I have to do that has been ignored while I was gone.
Below is an interesting video that shows a simulation of what could happen if you visit a rogue web site that can take advantage of known security holes in your applications if you don't patch your system regularly. The attacks shown in this video are plausible, but exaggerated
This video is unbalanced in that it focuses on Internet Explorer, but a security hole is a security hole. Every OS (including Linux and the Mac OS) and applications can be affected by these programming bugs. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861980.33/warc/CC-MAIN-20180619060647-20180619080647-00212.warc.gz | CC-MAIN-2018-26 | 685 | 3 |
https://listserv.heanet.ie/cgi-bin/wa?A2=ind9809&L=IRTRAD-L&P=335322 | code | | A friend of mine has a Wheatstone English concertina circa 1912 which is
| tuned flat. Anyone out there familiar with a resource to retune it to
| standard pitch? I should also say that he is somewhat concerned about
| doing this in case he destroys the character of the instrument, either
| musically or historically!
You didn't say where in the world you or your friend might
be, but ... A quick check with AltaVista turned up these
URLs that may be of some interest:
There are a bunch of others, too. | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525483.62/warc/CC-MAIN-20190718001934-20190718023934-00089.warc.gz | CC-MAIN-2019-30 | 505 | 9 |
https://qpt.teneraisha.online/carbon-rom-basketbuild.html | code | New Build is UP! In the previous build it wasn't the case like this. Dual VoLTE isn't working. How long does it take for this version to boot?
I did clean flash, wiped everything, flashed rom without gapps and magisk and its already bootlooping for 10 minutes now. XDA Developers was founded by developers, for developers. It is now a valuable resource for people who want to make the most of their mobile devices, from customizing the look and feel to adding new functionality.
Are you a developer? Terms of Service. Hosted by Leaseweb. Xiaomi Poco F1 Accessories. Suggested Apps. Navigation Gestures Customizable gesture control for any Android device. XDA Labs Labs is an independent app store that gives developers full control over their work. Substratum The ultimate, most complete theming solution for Android.
XDA Feed The best way to get cutting edge news about your device! Image Warp helps you transform pictures with manually adjustable grids April 14, Thanks Meter : 3, Discussion Loading Login to Follow Project.
CarbonROM on the Sony Xperia Z3 Compact
Senior Member. Thanks Meter : Unfortunately Sony decided not to provide any updates for the Xperia Z3 Compact anymore, as the device was already too old after nearly 3 years on the market also see my other post about this. Fortunately there was an inofficial port of LineageOS However this version had the issue that the Bluetooth connection was temporarily lost very often.
For using my smartwatch this was not a big deal as the connection was only lost for a few seconds and returned automatically, so the general usability of the smartwatch was not really affected. However for using my Bluetooth headset this problem was more than annoying — for example when I wanted to listen to some music during a journey in a train and the playback was just interrupted suddenly.
BasketBuild Downloader APK: Download Custom ROMs on your Phone
Unlocking the bootloader is possible using a service by Sony. Also see the this page in the developer area of Sony. Just be aware that you will loose the DRM keys needed for some Sony specific features, like the algorithms to optimize the pictures taken with the camera app by Sony. To do the unlocking you need a connection via USB in fastboot mode.
You can activate this mode by turning off the device and then holding the volume down button pressed while connecting the device to the PC using USB. Beside the command line tools from the Android SDK version 26 or older may required, as newer versions may not work properly for this purpose there is also a driver for Windows required, which you can get from Sony.
You find a tutorial how to do this you at HowToGeek. To get the device recognized in fastboot mode, you need a driver from the Android SDK. You can download the version I used here as well: fastboot driver as ZIP file. After you have successfully unlocked the bootloader you can continue following the tutorial at the XDA forum.
I recommed not to use the version of TWRP from the tutorial, but the version 3. Older versions of TWRP may not be able to install the custom ROM because the installation script which checks the compatibility with the device may fail.
Version 3. After you have downloaded the version from the link above, you unpack the ZIP file and then install the recovery images with the following command:. After this step the USB connection has to be disconnected again. TWRP can then be started by holding the volume down button and then turning on the device. Important: You should backup the old system in TWRP before you wipe the internal memory if you want to return to that system later! I did not use the latest version 6.
Instead I use the archived stable release version 5. However you should be aware that some hardware features and system functions may not work yet with that version. This is also neccessary if you already have used LineageOS! For this step you have to be patient — formatting the system and cache partition may take a couple of minutes. This step is only needed once. Further updates of CarbonROM can then be installed without a complete wipe.
After CarbonROM has been installed, the first reboot takes a while. However in my experience further reboots are then much quicker as with the original ROM. If TWRP is afterwards not be accessible any longer using the method described above, you can just install it again in the FOTAKernel partition using as described in fastboot mode without loosing any data. The required variant is ARM and Android 7.BasketBuild is the biggest custom ROM repository at the moment.
BasketBuild has now become the number 1 choice for custom ROM developers. BasketBuild was operating through a website so far. Recently, an application of BasketBuild made its way to the FDroid repository.
I gave a try to the BasketBuild application and I was quite impressed. The application is named as BasketBuild Downloader. Instead of going to the BasketBuild website and download the custom ROM, you can now directly download a custom ROM on the internal storage of your phone.
BasketBuild application shows you a list of all the builds of a custom ROM that you are looking for. In order to use this application, you must know the codename of your Android handset and also the custom ROM name i. AOKP or any other. BasketBuild keeps all the files on your phone. This application sorts the ROM builds on the basis of the release date.
To install the BasketBuild application on your phone, you must have the FDroid application. Drop it below. Cancel reply. Stock Wallpapers. How to. Fix Play Store This app is not compatible with your device March 21, March 16, Load more. We are only a fan site dedicated to Android and iOS.This is an unofficial build of CarbonRom 4.
I found CarbonRom 4. Great ROM. I installed your first build and for now everything works well. You can post now and register later. If you have an account, sign in now to post with your account.
Posted December 6, Cool men :D! You are now putting me in a bad situation. I think I will wait for a couple of days. Keep rocking man! Add few screenshots.Get free, customized ideas to outsmart competitors and take your search marketing results to the next level with Alexa's Site Overview tool.
Discover even more ideas with a free trial of Alexa's Advanced Plan. You'll find the tools you need to drive more traffic, including:. These are customized keyword recommendations this site could target to drive more traffic. Keyword Gaps Keywords driving traffic to competitors, but not to this site. Easy-to-Rank Keywords Popular keywords within this site's competitive power. Buyer Keywords Keywords that show a high purchase intent. Optimization Opportunities Very popular keywords already driving some traffic to this site.
These metrics show how this site compares to its competitors. The competitors list can be found next to the search input field above. The average search traffic percentage for this site's competitors. The average bounce rate for this site's competitors. The average number of sites linking to this site's competitors. Sites that share the same visitors and search keywords with this site, sorted by most overlap to least overlap.
A relative level of audience overlap between this site and similar sites. A site with a higher score shows higher audience overlap than a site with lower score.
Alexa Rank is an estimate of this site's popularity. The rank is calculated using a combination of average daily visitors to this site and pageviews on this site over the past 3 months.
The site with the highest combination of visitors and pageviews is ranked 1. This chart shows the Alexa Rank trend for this site over a trailing 90 day period. Improve results from search and content marketing. Use Alexa's keyword research tools to:. This site is not gaining any traffic from these keywords. If competitors are gaining traffic from the keyword, this may be a good investment opportunity. An estimate of the traffic that competitors are getting for this keyword.
The score is based on the popularity of the keyword, and how well competitors rank for it. The score ranges from 1 least traffic to most traffic. An estimate of how frequently this keyword is searched across all search engines.
The score ranges from 1 least popular to most popular. Boost traffic by filling gaps. An estimate of how relevant a keyword is to this site.GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.
If nothing happens, download GitHub Desktop and try again. If nothing happens, download Xcode and try again. If nothing happens, download the GitHub extension for Visual Studio and try again. You may need to reboot for these changes to take effect. Now enter the following to initialize the repository:.
Thank you and have a nice day. Please note that if you are building on Mac OS X, you are required to install coreutils from MacPorts before you continue. Initialize the environment with the envsetup. Note that replacing "source" with a single dot saves a few characters, and the short form is more commonly used in documentation. Patches are always welcome! You can do this by using these commands:. You can set up signed commits by setting up the key accoridng to these directions on the Git-SCM Site and adding them to Gerrit.
Note: ". Make your changes and commit with a detailed message, starting with what you are working with i. You can find all CarbonROM Resources that need to be themed here Let us know when there is anything else we can help with, we will gladly do. We use crowdin for our ROMs translation. If you want to help with that, you can do so here. The available projects to translate will be updated when new things come into Carbon, so be sure to keep on checking the page.
Many thanks to those who have helped translate the ROM!CarbonROM is an aftermarket firmware based on the Android Open Source Project created with the purpose of adding versatility and customization to stock Android. Stability is our highest priority; our vision is to be the best alternative to a stock operating system for your device. We have just a bit of everything; our ROM has a feature for almost every part of the operating system.
Behind-the-scenes changes allow the ROM to perform faster without compromising stability; the end result being a fluid and customizable software for your device. Core team developer; Xiaomi Pocophone F1 maintainer; loves doggos and puppers; always busy with something; Ultimate is fun. Core team developer; Essential device, not status Maintainer; doesn't know what he's doing half the time and can't Oreo bro. ROM maintainer; I can't see what I'm typing. What is CarbonROM? Features and more We have just a bit of everything; our ROM has a feature for almost every part of the operating system.
GitHub Rabih Salamey Core team developer; Essential device, not status Maintainer; doesn't know what he's doing half the time and can't Oreo bro.Carbon Rom Review for the Essential PH-1
GitHub xenreon Xiaomi Redmi 5 Plus maintainer. Patrick Campanale Retired project lead and owner; gets blamed for everything. Ryan Norris Retired project lead and owner; the team's nightowl and founder of "Moo". | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587794.19/warc/CC-MAIN-20211026011138-20211026041138-00397.warc.gz | CC-MAIN-2021-43 | 11,264 | 35 |
https://people.llnl.gov/neely4 | code | TitleProgram Coordinator for Computing Environments & CASC ADL
Rob Neely is an LLNL Computing employee with over 25 years of experience in High Performance Computing (HPC) and scientific software development. Rob is the Program Coordinator for Computing Environments in the Weapons Simulation and Computing (WSC) Program, as well as the Associate Division Leader for the Center for Applied Scientific Computing (CASC). In those roles, he works to bridge the mission-critical applications, the CS and math research community, and Livermore Computing to help ensure LLNL's continued leadership in HPC. He leads the WSC Research Coordination Council that manages a portfolio of promising research, the Sierra Center of Excellence which worked with IBM and NVIDIA in a 5 year project to prepare our applications for the heterogenous GPU-based Sierra system (#2 in the world as of 2018), and several other smaller projects.
Since 2015, Rob has also been involved in the US Exascale Computing Project, currently serving as the Software Technologies L3 lead for Software Ecosystem and Delivery. In this role, he's working with a team of people to ensure that the software created and delivered as part of the ECP is broadly available and robust, and that the ECP will be used to drive long-term improvements to how open source scientific software is developed within DOE.
Rob has been at LLNL since 1994. Much of his career has been spent in the Advanced Simulation and Computing (ASC) Program where he has been deeply involved in a breadth of areas, including strategic planning, computational research directions, software quality assurance, and workforce management. Earlier in his career, he helped lead several large software applicatoin projects – most notably as the computer science technical lead for the ALE3D (multi-physics simulation) and LEOS (materials equation of state) projects. During his time as a software developer, he spearheaded several other successful projects, including the MIDAS material science project, and Lorenz – a tool for making HPC easier and more accessible to users of Livermore Computing.
In 2010-2011, Rob took a one-year assignment in Washington DC where he worked at the non-profit Council on Competitiveness. While there, he helped establish a new public-private partnership called the National Digital Engineering and Manufacturing Consortium, aimed at increasing adoption of HPC in the small and medium sized manufacturing sector. He also helped re-launch the Council’s HPC Initiative, with its goals to continue advocating for the adoption of HPC in the industrial sector. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00347.warc.gz | CC-MAIN-2023-14 | 2,617 | 5 |
https://www.moia.io/en/blog/tech-made-in-finland-where-moias-magic-comes-from | code | In a few weeks, MOIA will launch in Hannover: So far, only a few thousand MOIA service testers could use our service, but soon we want to pick up the whole of Hannover and Hamburg, connect users with other users with a similar path and give them a ride together to their respective destinations. What only a few know: Behind this magic is MOIA’s team in Finland, a group of experts focused on the routing and pooling algorithms.
"I work on solutions so people in the city can easily get from A to B." That's what our Senior Software Developer Olli says if you ask him to explain to technically non-savvy people what he's actually working on. And it is just what it feels like for MOIA customers - easy: you get into your MOIA, for the MOIA driver it is already clear without a word where the journey is going and if another passenger wants to go in a similar direction the route will simply be re-calculated and the MOIA customer and driver get an update on their screens in the vehicle.
One ride, thousands of calculations
To keep things running this smoothly, a dedicated 15-person MOIA tech team works in Espoo, Finland, on our so-called pooling engine. Algorithms of the pooling engine for example determine which vehicle is allocated to you. Maybe because it is already occupied by a MOIA customer with a similar destination. Or maybe it's the vehicle closest to the you. The algorithm also answers how much detour a MOIA may make to provide shared rides. And finally, it's the MOIA algorithm that tells you when MOIA will pick you up and when you'll arrive at your destination.
It's not all that easy to calculate: it's a complex calculation of multiple variables, based on the number of MOIA vehicles on the roads, their current occupancy, planned routes, pick-up points and destinations, but also current traffic. And as soon as a new trip order is added, everything must be recalculated. Again, and again. Always live. A city is a living being, a moving target. You have to create a system that is capable of adapting to different circumstances.
"We help solve real urban problems"
Olli Alm is one of 15 developers and coders in Finland. Besides a few meetings, his work day is mainly determined to continuously improve the algorithm and solve existing problems or challenges. All while MOIA’s ridesharing service is online: As the 35 MOIA vehicles set off in Hannover to pick up MOIA customers and bring them to their destinations, Olli and the team in Finland continue to work on the algorithm and learn with every trip. "Our team here is very relaxed and we have lots of fun," says Olli, "but we have a big mission: Together with our colleagues in Hamburg, we want to develop a relatively inexpensive and high-quality ride-sharing service that brings people to their destination reliably and helps to reduce urban problems such as congestion, air pollution and lack of space in cities. The fact that we can help solve real problems in cities around the globe motivates us every day."
7 years of expertise in pooling algorithms
The team in Finland has several years of experience in pooling algorithms, but under a different name. When MOIA was founded as Volkswagen’s mobility start-up, it acquired Split Finland Oy over a year ago. And we had good reasons for doing so. The tech team, originally founded with the name Ajelo Oy, reinvented ridesharing for the algorithm age. In 2012, years before competitors even thought about this kind of stuff, they launched a service called Kutsuplus (Call Plus) in Helsinki in cooperation with the local transport authority, which matched passengers heading in the same direction with a minibus. The smartphone-based system allowed people to share a personalized ride that cost more than a regular bus but much less than a taxi. The goal was to find a way to prevent the kind of traffic collapse that plagues so many other cities. So, one essential thing that differentiates MOIA’s team in Finland from other tech teams is that they already have 7 years of domain experience, and they have launched a first-of-the-kind ridepooling service not only once but twice – first in Helsinki and later in Washington D.C. Many start-ups work with the paradigm ‘fake it till you make it, but the team’s goal was always to prove that their technology works from day one.
MOIA Finland continues to grow
We already have achieved a lot, but there is still a lot to do. That is why we are continuously expanding the team in Finland. If you also want to become part of MOIA and contribute to our vision to return cities to the people, we would be more than happy if you applied for our current job openings in Espoo. In addition to software engineers, we are also looking for a Principal Tech Lead, a Lead Data Scientist, a DevOps Engineer and a Quality Engineer.
And should you not be in Espoo or close by: We are also looking forward to new team members at our other locations in Hamburg and Berlin: https://www.moia.io/jobs/. | s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203326.34/warc/CC-MAIN-20190324043400-20190324065400-00045.warc.gz | CC-MAIN-2019-13 | 4,976 | 12 |
https://mathoverflow.net/questions/325264/is-there-an-elementary-proof-that-there-are-infinitely-many-primes-that-are-not | code | I'm currently in the middle of teaching the adelic algebraic proofs of global class field theory. One of the intermediate lemmas that one shows is the following:
Lemma: if L/K is an abelian extension of number fields, then there are infinitely many primes of K that do not split competely in L.
Of course this is implied by Cebotarev's density theorem, but the adelic proof uses only algebra/topology and finiteness of class number/Dirichlet's units theorem.
There is a well-known elementary proof, (see eg this MO question) that there are infinitely many primes that are split in L/K. I was wondering whether there is also an elementary argument for infinitude of non-split primes in the extension? (As usual the notion of "elementary" is flexible, but I'm looking for something that uses a minimum of machinery.)
One possibility would be to distill the adelic proof into something algebraic, although this seems hard. Another option would be to look for ideals of O_K that are not norms from O_L: any such ideal must have a factor which does not split completely.
One of the answers to the MathOverflow question linked above does mention the paper Primes of degree one and algebraic cases of Čebotarev's theorem of Lenstra and Stevenhagen, which gives an elementary proof under the assumption that L contains a nontrivial ray class field of K. But it seems that one still needs to prove the first inequality in some form to use this. | s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522741.25/warc/CC-MAIN-20220519010618-20220519040618-00396.warc.gz | CC-MAIN-2022-21 | 1,436 | 6 |
http://www.getgyan.com/show/2339/Bug_Pattern_in_Java_-_The_Impostor_Type | code | When special tags in fields are used to distinguish between types of objects, errors are possible in which a tag mislabels the associated data—a bug pattern known as the Impostor Type. We'll examine the symptoms and causes, define ways to prevent this error, and discuss some tempting hybrid implementations that don't use impostor types but hold danger nonetheless.
All but the most trivial of programs manipulate some types of data. Static type systems provide a way to ensure that a program doesn't manipulate data of a given type inappropriately.
One of the advantages of the Java language is that it is strongly typed, so that the possibility of a type error is eliminated before the program is ever run. As developers, we can use this type system to produce more robust and bug-free code. Often, though, the type system is not used to its full potential.
Many programs make less use of the static type system than they could, instead relying on special fields to contain tags that distinguish the types of data. By relying on these special fields, such programs give up the very protection that the type system was designed to provide. When one of these tags mislabels its data, it generates what I call an Impostor Type bug pattern.
In a nutshell, here is our latest bug pattern:
- Pattern: Impostor Type.
- Symptoms: A program that treats data of conceptually distinct types in the same way, or that doesn't recognize certain types of data.
- Cause: The program uses fields with tags in lieu of separate classes for the various types of data.
- Cures and Preventions: Divide conceptually distinct types of data into separate classes whenever possible.
The static type system is there to protect you from this type of bug. Use it.Weed bugs out during static checking.
About This Bug Pattern
This bug pattern results from using special fields inside classes to distinguish conceptually distinct subtypes. Because these subtypes are grouped together in the same class, static type checking is unable to catch a misuse of data that could have been caught if the subtypes were split into separate classes.
One common symptom of an Impostor Type bug is that many conceptually distinct types of data are all treated in the same (and incorrect) manner when the program is run. Another common symptom is that data doesn't match any of the designated types.
As a rule of thumb, suspect this bug pattern whenever there is a mismatch between the conceptual type of data and the way it is handled by your program.
Common symptoms include conceptually distinct types of data being treated in the same manner and data not matching any of the designated types.
To illustrate how easily bugs of this pattern can be introduced, let's consider a simple example. Suppose we want to manipulate various Euclidean forms, such as circles, squares, and so on. These forms will have no position, but they will have a scale, so that it will be possible to compute their area.
Implementation of Shapes with Impostor Types
public class Form
public Form(String _shape, double _scale)
this.shape = _shape;
this.scale = _scale;
public double getArea()
return scale * scale;
else if (shape.equals("circle"))
return Math.PI * scale * scale;
// shape.equals("triangle"), an equilateral triangle
return scale * (scale * Math.sqrt(3) / 4);
There are serious disadvantages to implementing a data type in this way, even though you see it done often. One of the most glaring drawbacks is that this method is not very extensible. If we wanted to introduce a new shape for our forms (such as "pentagon"), we'd have to go in and modify the source code for the getArea() method. But extensibility is a separate concern; how does this programming style increase our susceptibility to errors?
Consider what would happen if, in some other part of the program, we constructed a new Form object as follows:
Constructing a New Form
The form "square" has been misspelled. But as far as the compiler is concerned, this is perfectly valid code.
Now consider what will happen when we try to call getArea() on our new Form object. Because the shape of the Form won't match any of the tests in the if- then-else block, its area will be computed in the else clause, as if it were a triangle!
There will be no error signaled. Indeed, in many circumstances, the return value will appear to be a perfectly reasonable number. Even if we put in some redundancy and check that the implied condition in the else clause holds (with an assertion, for instance), the error won't be found until the code is run.
Many other similar bugs might occur with the previous code. A clause might be accidentally left out of the if-then-else block, causing all Forms of the type corresponding to that clause to be handled improperly. Additionally, because the impostor type is just a String in a field, it might be modified, either accidentally or maliciously. Either way, such modifications could wreak all sorts of havoc.
Again, the program uses fields with tags in lieu of separate classes for the various types of data.
Cures and Preventions
As you might have guessed, I suggest avoiding bugs of this type by using the type system to weed them out during static checking. Consider this alternative implementation:
Now consider what would happen if we were to mistype Square as Sqaure when creating a new Form. The compiler would signal an error, telling us that class Sqaure could not be found. The errant code would never even have a chance to run.
Similarly, the compiler would not allow us to forget to define getArea() for any of our subclasses. And, of course, it would be impossible for any object to change the type of a Form.
Related Online Articles:
- Bug Pattern in Java - Null Pointers Everywhere
- Bug Pattern in Java - Debugging & the Testing Process
- Bug Pattern in Java - Debugging & the Development Process
- Bug Pattern in Java - The Broken Dispatch
- Bug Pattern in Java - About the Bug Patterns
- Bug Patterns in Java - The Orphaned Thread
- Bug Pattern in Java - Other Obstacles to Factoring Out Code.
- Bug Patterns in Java - The Run-On Initialization
- Bug Pattern in Java - Bug Specifications & Implementations
- Bug Patterns in Java - The Fictitious Implementation
No comment yet. Be the first to post a comment. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122167.63/warc/CC-MAIN-20170423031202-00355-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 6,273 | 51 |
https://www.alexandria.unisg.ch/handle/20.500.14171/110337 | code | It’s about the process, not the result: An fMRI approach to explore the encoding of explicit and implicit price information
Journal of Economic Psychology
This research examines the neurophysiological correlates of consumers’ price memory processes. We focus on the explicit and implicit dimensions of consumers’ price knowledge and use an experimental functional Magnetic Resonance Imaging (fMRI) study to assess how the encoding of task-dependent price memory affects the choice process and neural activation. The findings of our study add to the field of consumer neuroscience by demonstrating how neural correlates of explicit and implicit task-dependent price memory can shed light on processes that guide consumer decision-making. Over the course of our experiment we found that consumers did not always make consistent decisions, but that their decisions were influenced by explicit components of price memory. Implicit price memory components seem to have a more supportive role in the decision-making process. In summary, we found that price memory is a dynamic construct that is influenced by unconscious and neurophysiological processes, and we conclude that a neurophysiological perspective can add value for consumer and marketing research.
contribution to scientific community | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510319.87/warc/CC-MAIN-20230927171156-20230927201156-00122.warc.gz | CC-MAIN-2023-40 | 1,296 | 4 |
https://forum.erepublik.com/index.php?/topic/5700-loans/ | code | Posted 13 October 2018 - 11:29 AM
Posted 13 October 2018 - 05:52 PM
No, that's so old news, it won't even work at this point. Loans mostly for like 10+ gold are uncommon currently, and the pay off success if high. And when there's problem, mods and mostly community can be really helpful.
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987750110.78/warc/CC-MAIN-20191020233245-20191021020745-00331.warc.gz | CC-MAIN-2019-43 | 360 | 5 |
http://pbil.univ-lyon1.fr/members/dray/files/articles/pelissier2003.php | code | Both the ordination of taxonomic tables and the measurements of species diversity aim to capture the prominent features of the species composition of a community. However, interrelations between ordination techniques and diversity measurements are seldom explicated and are mainly ignored by many field ecologists. This paper starts from the notion of the species occurrence table, which provides a unifying formulation for different kinds of taxonomic data. Here it is demonstrated that alternative species weightings can be used to equate the total inertia of a centered-by-species occurrence table with common diversity indices, such as species richness, Simpson diversity, or Shannon information. Such an equation defines two main ordination strategies related to two different but consistent measures of species diversity. The first places emphasis on scarce species and is based on Correspondence Analysis and species richness (CA-richness strategy). The second, in which abundant species are prominent, relies on Non-Symmetric Correspondence Analysis and Simpson diversity (NSCA-Simpson strategy). Both strategies are suitable for measuring ? and ? diversity by analyzing the centered-by-species occurrence table with respect to external environmental or instrumental variables. In this paper, these two strategies are applied to ecological data obtained in a Neotropical rainforest plot. The results are then discussed with respect to the intrinsic characteristics of the community under analysis, and also to the broad classes of floro-faunistic data used in ecology (i.e., data gathered from museum or herbarium collections, exhaustive inventories in a reference plot, or enumeration through species-by-relevés tables). The approach encompasses several well-known techniques such as Correspondence Analysis, Non-Symmetric Correspondence Analysis, Canonical Correspondence Analysis, and Redundancy Analysis, and provides greater insight into interrelations between ordination methods and diversity studies.
[ | ] Back
This file was generated by bibtex2html 1.98. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247494424.70/warc/CC-MAIN-20190220024254-20190220050254-00461.warc.gz | CC-MAIN-2019-09 | 2,072 | 3 |
https://discussions.apple.com/thread/4574611 | code | I'm a newbie when it comes to OS X configuration profiles. Does anyone have any resources on customizing or editing configuration profiles?
I've been playing around with Profile Manager for a few days and see the "Custom Settings" tab. I'm curious what kind of things I can customize here. Being a newbie I don't know where to start.... If anyone has any documentation or link to online resource or book recommendation on editing mobileconfig files or creating custom settings with payloads in Profile Manager I'd really appreciate it!! There are a lot of tweeks that I'd like to set on our computers and I'd like to see if I can do these tweeks with configuration profiles. | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398447860.26/warc/CC-MAIN-20151124205407-00219-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 674 | 2 |
http://jrobb.org/blog/2012/05/28/goodbye-factorQ.net/ | code | I have decided that I am not going to renew the factorq.net domain (again). I have not really used it recently, and truth be told, I prefer my jrobb.org domain. I have too many domains currently as it is.
factorQ.net won’t ever be what it once was, and it was fun while it lasted, but now it is time to just let it go. Now the problem is just….what to do about my email account there. dangit…I need to figure that one out in a hurry.
goodbye, old friend. | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267162809.73/warc/CC-MAIN-20180926002255-20180926022655-00383.warc.gz | CC-MAIN-2018-39 | 460 | 3 |
https://github.com/mautic/mautic/pull/7853 | code | Join GitHub today
GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together.Sign up
Fix relative date support to anniversary #7853
Please be sure you are submitting this against the staging branch.
I added TU.
Steps to test this PR:
This pull request has been mentioned on Mautic Community Forums. There might be relevant details there: | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370494331.42/warc/CC-MAIN-20200329105248-20200329135248-00032.warc.gz | CC-MAIN-2020-16 | 410 | 7 |
http://stackoverflow.com/users/1445926/naveen-kumar-yadav | code | Naveen Kumar Yadav
Apparently, this user prefers to keep an air of mystery about them.
5 Using timer to count as a stopwatch in Java Applet jun 15 '12
3 How to display a pdf file in browser by passing a search string and need to display that page 1st with contains highlighted search string using java jun 14 '12
1 Comma exist after creating array in AJAX jun 13 '12
1 Display The Reversing of the string in the applet jun 13 '12
1 Count months between two timestamp on postgresql? jun 13 '12
1 Retrieve Currency Symbol from curency code jun 13 '12 | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454702032759.79/warc/CC-MAIN-20160205195352-00270-ip-10-236-182-209.ec2.internal.warc.gz | CC-MAIN-2016-07 | 548 | 8 |
http://appbusinesspodcast.com/developer-economics-q3-2015-report/ | code | In this episode of the App Business Podcast, Andrew and Chris review the latest report from Vision Mobile, the State of Developer Nation Q3 2015.
- Surveys over 13,000 Devs
- Aims to build a comprehensive model of the software industry
- lack of female devs (6% of respondents)
- windows support of various languages (as opposed to Java/Objective C) is asset
- Android is essential (for any revenue model not based predominantly on in-app purchases)
- 37% of mobile devs target both iOS & Android and they are expecting this figure to grow
- IoT is focused on existing hardware for smarthome (hardware is hard and expensive) software is lower barrier, although they are building solutions w/o a defined audience (tinkering?) – and that’s 50% of mobile dev report dev for IoT
- 50% of mobile ecom devs make over $10k mth. 25% over $100k
The eCommerce opportunity in Mobile
The math of ecommerce apps:
$100 item, margin of 5% (affiliate), 25% (retailer) or 50% (if you own the product), = $5-50. Sell anything once to a mobile user and we are talking LTVs of at least $5-$50 per user.
Examples – from most value to least: | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690228.57/warc/CC-MAIN-20170924224054-20170925004054-00017.warc.gz | CC-MAIN-2017-39 | 1,125 | 13 |
http://www.scieneer.com/scl/doc/function/ext/make-eol-conversion-stream.html | code | |ext:make-eol-conversion-stream stream &key input output close-stream-p buffering in-buffer-size out-buffer-size mode pathname||[Function]|
Create an end-of-line conversion stream that reads or writes the given character stream and can convert between the Common Lisp convention of a single linefeed character for line termination and both the DOS convention of a carriage-return and linefeed sequence and the Mac convention of a single carriage-return character. The input stream must be buffered with a buffer length of at least two characters.
The functions file-position and file-length are fully supported on all end-of-line conversion streams when the mode is :unix or :mac and when the encapsulated binary stream also supports these functions, are are also supported when the eol-of-line conversion stream is a file input stream. However when the mode is :dos the end-of-line conversion stream is not a file input stream then file-length is not supported and file-position has only limited support for positioning to the start or end of the file. The position and length of character streams are measured in units of characters, and determining the position within a file using the :dos mode requires reading the file to count the number of characters. So if the file-length is needed or the file-position is being changed on an output file using the :dos mode then the file must also be opened for input. Overwriting a file is permitted but may change the file length or leave the file with inconsistent end-of-line terminations.
- If true, allow input operations. This is the default if neither :input or :output is specified.
- If true, allow output operations.
- If true then the target stream is closed when this stream is closed.
- Either: :unix which maintains the linefeed characters as the end of line terminator, :dos to convert between linefeed characters and a carriage-return and linefeed character sequence, :mac to convert between a linefeed character and a carriage-return character, or :any-input to read any of these conventions as a linefeed but this is only possible on input only stream. The default is the :unix mode.
- Indicates the kind of output buffer flushing to use which may be one of: :none, :line, or the default :full. Note that non-blocking writes will not wait until all buffered output has been written, so the :none and :line buffer options are not reliable when used with non-blocking writes.
- When true, the returned stream will be a subclass of the class file-stream. This should generally be true if the stream is a file-stream. | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822739.16/warc/CC-MAIN-20171018032625-20171018052625-00829.warc.gz | CC-MAIN-2017-43 | 2,576 | 9 |
https://drama-snack-ed.com/2020/08/12/chancellor-younha-walking-in-the-rain-music-review/ | code | This cooperation in between Younha & & Chancellor was launched on August fourth. While doing all my songs examines recently, I completely forgot about it. This is my first time paying attention to anything from Chancellor. Kim Jung Seung or Michael Kim is a Korean-American singer-songwriter as well as producer born on October 22nd, 1986. He is currently active in South Korea as well as managed by Million Market. Although Chancellor debuted in 2013, he has been active because 2010. As soon as a member of the hip-hop group –– Oneway as well as additionally the co-founder/former participant of the creating group –– Double Partner.
(Please note –– this is a real-time review, indicating I am typing down my precise thoughts while listening to this tune.)
Response to Official MV:
- However, I wear’& rsquo; t have English belows, yet I can always look for the translation later.
- I am currently into the guitar intro as well as soft humming.
- The dancers are lovely. Particularly the girl, she is beautiful.
- Chancellor’& rsquo; s voice is like butter. It’& rsquo; s smooth and also relaxing.
- I love the black and also white image, it seems like an old love movie.
- This track is remarkably calm, as well as the melody is wonderful. I’& rsquo; m so pleased that I determined to inspect this out.
- I missed Younha emotional vocals.
- It’& rsquo; s as if both their voices are drifting on the mix.
- I ABSOLUTELY ADORE “& ldquo; Strolling In The Rainfall & rdquo; It & rsquo; s a timeless R&B flavour that instantaneously puts its listeners in their feelings.
- Yesss, Younha honor me with those gorgeous and also uncomplicated vocal runs.
- She has such a powerful as well as versatile voice.
- I am additionally really pleased with Chancellor’& rsquo; s voice. I require to have a look at even more tracks from him.
- The instrumental is very simple with simply a guitar, so what truly brought home the track is their vocals and rich consistencies.
- I additionally love what they did with the video. The two professional dancers analyzed the belief of this track extremely well. It’& rsquo; s the ideal cute, and enchanting visual representation.
- I extensively appreciated every secondly of this song, most definitely playlist worthwhile.
- “& ldquo; Walking In The Rain” & rdquo; by Chancellor & Younha gets a 10/10 from me.
- Before leaving, below is a duet movie version of the MV – | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949694.55/warc/CC-MAIN-20230401001704-20230401031704-00357.warc.gz | CC-MAIN-2023-14 | 2,433 | 20 |
https://www.mdpi.com/1099-4300/23/3 | code | Entropy, Volume 23, Issue 3 (March 2021) – 120 articles
Cover Story (view full-size image): State changes of systems due to interventions of "intelligent beings'' that can lead to a decrease in entropy are widely discussed in the literature. We propose here to take them as examples of "conditional actions'' and to describe them mathematically as "instruments'' following the quantum theory of measurement. As a detailed case study, we calculate the imperfect erasure of a qubit, which can also be considered as a conditional action and is realized by coupling a spin to another small spin system in its ground state. This analysis casts a critical light on the widely accepted Landauer–Bennett principle. From our point of view, erasing memory content appears as an additional conditional action, but it is neither necessary nor sufficient to solve Maxwell's demon paradox. View this paper
- Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
- You may sign up for e-mail alerts to receive table of contents of newly released issues.
- PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them. | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039626288.96/warc/CC-MAIN-20210423011010-20210423041010-00364.warc.gz | CC-MAIN-2021-17 | 1,302 | 5 |
http://linfographik.com/lvextend-error/ | code | RECOMMENDED: If you have Windows errors then we strongly recommend that you download and run this (Windows) Repair Tool.
This guide shows how to work with LVM (Logical Volume Management) on Linux. It also describes how to use LVM together with RAID1 in an extra chapter.
Jul 5, 2011. lvextend: Error detected when reading from file "/etc/lvmpvg". What gives with this ? I only found one post on this and it lead to a doc that does.
Jul 17, 2014. lvextend -l 100%FREE /dev/VolGroup00/lv_root. Error. Raw. New size given ( XXX extents) not larger than existing size (XXX extents).
vgextend – lvm resizing. but im getting the error. Code:. The command "lvextend -l 100%FREE /dev/media/root" says "make the volume the EXACT SIZE of the.
RedHat RH302 exam dumps – RedHat RH302 exam is very popular in RedHat field, many RedHat candidates choose this exam to add their crede ntials, There are many resource online to offering RedHat RH302 exam dumps, Through many good feedbacks, we conclude.
Jul 1, 2017. I added new shared storage devices in my cluster and am attempting to vgextend , lvextend , or lvcreate and see errors stating "Error locking on.
I recently got the “iomega StorCenter ix2” it’s a little NAS for home or small office use. Soon it was clear to me that it runs Linux, and a Linux device.
Sep 28, 2014. First, I create a partition type 8e(LVM) on /dev/sda3, and extend current volume group size by adding physical volume into volume group u64.
Solved: I faced a problem, where I mirrored certain LVs only & rebooted the system from the mirrored disk with the original boot disk removed. Although the system
Sep 19, 2011. [CentOS] LVM lvresize/lvextend requires some space in /etc to grow a. /etc/lvm/ cache/.cache.tmp: write error failed: No space left on device.
You may get the error message "Insufficient free extents" when creating a logical volume when you think you have enough extents based on the output of the.
Hi, I have HS-23 blade server configured with 2 Emulex FC cards. I have installed RHEL 6.5. I have IBM v7000 storage connected to brocade switch 2
vgextend fails with error code 5. However, when I run the command, it returns with an error message saying "Command failed with status code 5",
Telnet Connect Error 10061 Connection refused Socket Error # 10061 Connection refused. (socket error # 10061) There is no software firewall on the server, if you can telnet to the smtp port When I try to connect to PRTG via the Enterprise Console, the software displays a socket error number 10061 and I cannot connect. However, I can still
I have Ubuntu installed on a drive. The problem is it is running low on disk space. This is installed on vmware. I expanded the virtual drive and booted into ubuntu.
Bug 236344 – lvextend -h shows mirror option – Red Hat – lvextend -h shows mirror option. Last modified: 2013-02-28. We can cover this with a special lvextend error message, because our lvextend requires a size to be.
Solved: Hello people, I hope that someone can help me or have a great suggestion. I have one vg that has 5 disks. 4 diks of 14gb and one disk of 7gb. Now I want to
A complete advanced tutorial guide to LVM(Logical Volume Management) in Linux. Understanding the components of LVM and different types of LVM (linear, striped, and.
LVM – ArchWiki – LVM on Archlinux – LVM Building Blocks. Logical Volume Management utilizes the kernel’s device-mapper feature to provide a system of partitions independent of underlying disk layout.
Error E22 Pada Printer Canon Mp145 Cara Mengatasi Error E22, 5100 Canon MP145 Kali ini saya menyajikan Cara Mengatasi Error E22 atau Kode Error 5100 pada Printer Canon MP145. 28 Apr 2015. Error E22 = Carriage error to reset this error follow the steps below-with the. SERVICE MODE (pada LCD printer akan muncul angka "0"). Home » Reseter Printer » Error
Red Hat Customer Portal Labs. To help you use Red Hat products to their full. lvextend fails with error message: "Volume group "vgname" metadata archive failed" | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591831.57/warc/CC-MAIN-20180720193850-20180720213850-00507.warc.gz | CC-MAIN-2018-30 | 4,017 | 22 |
http://www.timesandstar.co.uk/on-the-spot-jamie-reed-mp-1.1033400?referrerPath=home | code | On the spot: Jamie Reed MP
Published at 15:20, Thursday, 07 February 2013
Copeland MP Jamie Reed will be here to answer your questions live between 12noon and 1pm on Friday, February 8.
Mr Reed will take questions on last week's nuclear repository votes, the aftermath of the county council's decision and his subsequent 'campaign' to take the Stage 4 issue forward.
If you want to send a question in advance, you can email it to [email protected]
Published by http://www.newsandstar.co.uk | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375099755.63/warc/CC-MAIN-20150627031819-00062-ip-10-179-60-89.ec2.internal.warc.gz | CC-MAIN-2015-27 | 502 | 6 |
http://mail.dojotoolkit.org/pipermail/dojo-contributors/2012-June/027504.html | code | [dojo-contributors] 3-rd party compatibility as acceptance criteria?
eugene at lazutkin.com
Mon Jun 4 00:58:32 EDT 2012
On 06/03/2012 11:17 PM, Sasha Firsov wrote:
> Dear all,
> From Ticket #14546 <http://bugs.dojotoolkit.org/ticket/14546>one of
> reasons to reject was:
> "it seems more important to be consistent with the other AMD loaders."
> Now question goes to what level we should follow other libs?
> I made require+Deferred compatible with DTK and require.js to the level
> they overlap:
> | sources <http://simulationlabs.com/dojo/DojoPlay2012/lib/AMD/test/>
> original require() functionality reused and has not been changed.
> Unfortunately AMD error handling is not in agreement yet and DTK
> implementation differs. The plugin actually allows to hide the
> difference on AMD loaders implementation. But it will need additional
> conditional code to be cross-platform.
I would suggest to follow RequireJS in this respect --- its handling of
errors appears sane to me and I can't fathom a simpler implementation.
See details here:
Yes, RequireJS' implementation is based on callbacks (errbacks), but if
you want to use Deferred/Promisehere, you can easily augment the
> Question is: should the code to get accepted include the peace dedicated
> to serve 3-rd party libraries? Which ones?
It depends on our goals. One of our goals is to be interoperable with
other libraries, and we decided to do it the AMD way. Obviously we have
to take into account popular AMD implementations, and trends.
> IMO code should be enough extendable to be supported as branch for other
> environments but contributed code should be clean of foreign logic.
> Another question, what to do with neat code so it will not get lost?
Create a github repository for them, so they are not lost and can be
reused when needed? That's what I do.
> W/ respect,
> dojo-contributors mailing list
> dojo-contributors at mail.dojotoolkit.org
More information about the dojo-contributors | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584331733.89/warc/CC-MAIN-20190123105843-20190123131843-00439.warc.gz | CC-MAIN-2019-04 | 1,962 | 36 |
https://community.spiceworks.com/topic/452941-3cx-phones-showing-the-wrong-name-on-dial | code | We have 3CX as our phone system. v11.0.28976.849 SP4.
We use CISCO SPA504G phones with the 3CX system.
I have a problem at the moment. When you call an extension, the wrong name is shown.
For example, I phone 1755, and 'Kim' should come up as the contact, but 'Joe' comes up instead.
I cannot find any record in the phone, or server, even listing 'Joe'.
Now, I have checked each phone, and they are provisioned to the correct people.
In extension status on the server, each extension shows the right person.
I have restarted the server and the phones... and still have the problem.
The correct phone rings, but on the handset that is dialing - it shows the wrong name still...
I hope this makes sense, any pointers would be great! I have tried researching this already, but have found no help...
I have checked the 3cx site too.
I haven't had that problem before, but do you have entries in the "Company Phonebook" within 3CX (Settings-->Company Phonebook)?
What about resetting the phones to factory defaults and letting them "reprovision"?
What phone models?
Have you customized the provisioning templates at all? If so, I would back up yours and pull down a fresh copy under the update console (check the box and it will get a new copy even if 'up-to-date').
I will try what Nummerkins says first, if that doesn't work, I will do a factory reset.
Where is the update console? I cannot find anything in the phone, or on the server, with that name?
It's the Windows console on the 3cx server.. not web console. Log in and go to 3CX Phone System Updates and then Phone Provisioning Updates. Check them all and click the Download button. | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822116.0/warc/CC-MAIN-20171017144041-20171017164041-00634.warc.gz | CC-MAIN-2017-43 | 1,636 | 18 |
https://stat-ds.sustech.edu.cn/portal/page/science/id/14.html | code | Xiao-Hua Zhou is a PKU Endowed Chair Professor at Peking University, the Chair of the Department of Biostatistics at Peking University, and the Director of the Biostatistics and Bioinformatics Research of Peking University Beijing International Center for Mathematics Research. He is an elected Fellow of AAAS, ASA, and IMS. He is an expert in the Recruitment Program of Global Experts, and was a winner of the NSFC Fund for Distinguished Young Scholars (overseas). Between 2003 and 2018, he served as a full professor at the University of Washington. He was the P.I. for many international funded projects. Also, he has published more than 260 SCI papers on causal inference, statistical modeling related methods and applications in medical research, of which 120 papers ranked Q1 by JCR, with a total citation rate of more than 12,000. He has won the US Federal Government Research Career Scientist Achievement Award, the Mitchell Award from the International Bayesian Society for developing a new theory and method of causal inference and sensitivity analysis, and the 2015 Chinese Science and Mathematics Outstanding Paper Award for proposing the use of personalized treatment effect curve in the selection theory of the optimal personalized treatment plan.
In this talk, I introduce a new semi-parametric modeling method for heterogeneous treatment effect estimation and individualized treatment selection using a covariate-specific treatment effect (CSTE) curve with high-dimensional covariates. The proposed method is quite flexible to depict both local and global associations between the treatment and baseline covariates, and thus is robust against model mis-specification in the presence of high-dimensional covariates. We also establish the theoretical properties of our proposed procedure. I will further illustrate the performance of the proposed method by simulation studies and analysis of a real data example. This is a joint work with Drs. Guo and Ma at University of California at Riverside. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488259200.84/warc/CC-MAIN-20210620235118-20210621025118-00153.warc.gz | CC-MAIN-2021-25 | 2,010 | 2 |
http://forum.eastmans.com/printthread.php?t=535&pp=10&page=1 | code | I had seen these mentioned in Eastmans: http://www.huntinggpsmaps.com/states...downloads.html
This is just some of the info
# Public Lands with Unique Colors
# Landowner Name Appears on Each parcel in the state!
# Includes Parcels within the city
Unfortunately that info is only available for Montana. Does anyone know of any other software with this kind of info for other states? I am in Colorado. | s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051417337.23/warc/CC-MAIN-20160524005657-00242-ip-10-185-217-139.ec2.internal.warc.gz | CC-MAIN-2016-22 | 399 | 6 |
https://github.com/arbonagw/UnrealUpdater | code | A C++ updater for UDK games, built with Qt4.
UUpdater is a lightweight updater software built with Qt4, usable to deploy your UDK game simply over FTP, without additionnal work.
It was developped for the free FPS DeepVoid, and is now available for everyone to use. Right now, no major deployment has been made and the tool is still in development, use at your own risks.
When launched on client, it will trigger .NET 4 installation if not detected, since this is needed by UDK and packed in the standard installer.
User-side configuration files
There are currently a few configuration files in the Config/ folder, created on startup.
- UU_Lock.setting is generated, do not use.
- UU_AutoLaunch.setting, if existing, will trigger auto-launch of the game after updating. Delete it to abort this.
- UU_Dedicated.setting, if existing, will make the game launch on server mode using the configured map.
- UU_Map.setting contains the map name to launch on server mode, but you can very well add various parameters here for the UDK command line.
How to use
Currently, the updater use a frehs installation of your game. This means that the first condition is that you build, cook and package your game with UnrealFrontend, then install (using the packaged installer) it in a new separated folder.
This process will generate a file tree that you can use here. Do not use this process on a UDK development folder.
- First, edit the image resources in the Res/ folder to match your game's UI. Use the sample Res_Sample/ folder and rename it.
- Edit res/project.h to set your about dialog and FTP data.
- Use QTCreator to build the game. You should use a static build of Qt so that the updater is a single file.
- Edit ReleaseNotes.xml on your server to update the description on the updater main window.
- Edit Binaries/InstallData/GameManifest.xml to add a "md5" field on each "FileProperties" node with the MD5 checksum of the file.
- You should really check that all of this works locally.
- Your updater is ready, feel free to rename it and distribute it.
Beware : this is GPL'd software. You have to provide the sources (or a link to them on GitHub).
<ReleaseNotes> <Version>MajorRelease42</Version> <Date>DDMMYY</Date> <Notes>*Title* Text, text, text.</Notes> <NotUpdatedFile>UDKGame/Config/i-will-not-be-erased.ini</NotUpdatedFile> </ReleaseNotes>
<FolderProperties FolderName="."> <Folders> <FolderProperties FolderName="FolderA"> <Folders/> <Files> <FileProperties FileName="FileA" Size="889416" md5="53406e9988306cbd4537677c5336aba4"/> <FileProperties FileName="FileB" Size="45014" md5="54498899854584bd4534584bd336a544"/> </Files> </FolderProperties> </Folders> <Files/> </FolderProperties>
Contact, people, etc
UnrealUpdater is developped by Gwennaël ARBONA.
In case of bugs, questions, requests, ideas, please use the message system on GitHub. | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824204.27/warc/CC-MAIN-20160723071024-00299-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 2,846 | 26 |
http://www.mars.org/pipermail/mad-dev/2002-November/000783.html | code | [mad-dev] Statically linking madplay
Faust Andrei Tanasescu
Mon, 11 Nov 2002 18:43:42 +0000
Use ldd (command) on the madplay executable. It will list all the shared libs..
On Mon, 11 Nov 2002 14:02:59 -0800
[email protected] ([email protected]) wrote:
> I have been trying to statically link madplay but with no success. I set LDFLAGS to --static in the Makefile but when I run the file command, it informs me that there are still shared library dependencies. Can someone advise how to modify the Makefile so madplay would be a monolithic, statically linked app? I have run out of ideas. Thanks. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368703108201/warc/CC-MAIN-20130516111828-00032-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 608 | 7 |
https://answers.uchicago.edu/19383 | code | Topics Map > University of Chicago > IT Services > Phones & Internet Connections > Wireless Data Networking
Topics Map > University of Chicago > IT Services > Phones & Internet Connections > DNS Management
UChicago Identity by IP address
This article explains UChicago IP address ranges.
The University of Chicago owns and operates many domains and IP allocations. Most campus hosts are named in the ‘uchicago.edu’ zone. Below are the IP space allocations and brief description of each. Please contact IT Services Networking before making any host or application firewall policies based on this list.
Campus IPv4 Space
May be used for any host or service on campus. Hosts in this space are publicly reachable via the Internet.
184.108.40.206/16 – addresses between 220.127.116.11 and 18.104.22.168 - Public
22.214.171.124/17 – addresses between 126.96.36.199 and 188.8.131.52 - Public
184.108.40.206/19 - addresses between 220.127.116.11 and 18.104.22.168 - Public
Science DMZ IPv4 Space
May be used for any service on the Science DMZ. Hosts in this space are publicly reachable via the Internet and while considered outside the campus border, have full access to all campus resources, including RFC1918 space.
22.214.171.124/19 - addresses between 126.96.36.199 and 188.8.131.52 - Public
Campus RFC1918 IPv4 Space
May be used for any host or service on campus. Hosts in this space are _not_ publicly reachable via the Internet. Some hosts may be configured to reach Internet resources via NAT/PAT.
10.0.0.0/8 – addresses between 10.0.0.0 and 10.255.255.255 - Private
172.16.0.0/12 - addresses between 172.16.0.0 and 172.31.255.255 - Private
192.168.0.0/16 - addresses between 192.168.0.0 and 192.168.255.255 - Private
May be used for any host or services on campus. Hosts in this space are publicly reachable via the Internet.
2605:9a00::/32 - An IPv6 Address Plan is currently being developed. - Public
IP Space Usage Notice
All IP Space above is recognized as belonging to the University of Chicago. To avoid conflicting use of IP addresses, IT Services maintains the sole right of allocation and assignment of this IP space.
Any use of public or private IP space, even when such space is unattached or not connected directly to the UChicago network, must be coordinated with IT Services Networking. Please contact IT Services if you are using or would like to use any IP listed above.
UC Hospital IP Space
Below is a listing of public IP space used by the UC Hospital System. We believe this list to be complete but please contact IT Services Networking for confirmation prior to making any host or application firewall policies based on this list. UC Hospitals typically assigns hostnames in the ‘uchospitals.edu’ domain.
184.108.40.206/16 – addresses from 220.127.116.11 through 18.104.22.168 - Public
22.214.171.124/23 – addresses from 126.96.36.199 through 188.8.131.52 - Public | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320023.23/warc/CC-MAIN-20170623063716-20170623083716-00221.warc.gz | CC-MAIN-2017-26 | 2,904 | 27 |
http://adgurus.in/active-directory/ad-group-types-universal-groups-global-groups-domain-local-groups/ | code | AD Group types: universal groups, global groups, domain local groups
Distribution Groups — Used for email. Useful for programs such as MS Exchange.
Security Groups – Used to secure file/folders, printers, etc.
Local – Stored on the local SAM (Local Computers)
Domain Local – Stored on Domain Controllers.
Global Groups – Gives you a greater group scope.
Universal – Gives you an even broader group scope.
Group scope normally describes the type of users that should be clubbed together in a way that is easy for their administration. Therefore, groups play an important part in domain. One group can be a member of other group(s), which is known as Group nesting. One or more groups can be members of any group in the entire domain(s) within a forest.
- Domain Local Group: Use this scope to grant permissions to domain resources that are located in the same domain in which the domain local group was created. Domain local groups can exist in all mixed, native, and interim functional level of domains and forests. Domain local group memberships are not limited as users can add members as user accounts and universal and global groups from any domain. Nesting cannot be done in a domain local group. A domain local group will not be a member of another Domain Local or any other groups in the same domain.
- Global Group: Users with similar functions can be grouped under global scope and can be given permission to access a resource (like a printer or shared folder and files) available in local or another domain in the same forest. Simply put, global groups can be use to grant permissions to gain access to resources that are located in any domain but in a single forest as their memberships are limited. User accounts and global groups can be added only from the domain in which the global group is created. Nesting is possible in Global groups within other groups as users can add a global group into another global group from any domain. They can be members of a Domain Local group to provide permission to domain specific resources (like printers and published folder). Global groups exist in all mixed, native, and interim functional level of domains and forests.
- Universal Group Scope: these groups are precisely used for email distribution and can be granted access to resources in all trusted domain as these groups can only be used as a security principal (security group type) in a windows 2000 native or windows server 2003 domain functional level domain. Universal group memberships are not limited like global groups. All domain user accounts and groups can be a member of a universal group. Universal groups can be nested under a global or Domain Local group in any domain.
Universal Group: can contain users and groups (global and universal) from any domain in the forest. Universal groups do not care about trust. Universal groups can be a member of domain local groups or other universal groups but NOT global groups.
Global Group: can contain users, computers and groups from same domain but NOT universal groups. Can be a member of global groups of the same domain, domain local groups or universal groups of any domain in the forest or trusted domains.
Domain Local Group: Can contain users, computers, global groups and universal groups from any domain in the forest and any trusted domain, and domain local groups from the same domain. Can be a member of any domain local group in the same domain.
The short answer is that domain local groups are the only groups that can have members from outside the forest. And use global groups if you have trust, universal groups if you don’t care about trust.
When do we need to use local, global and universal group permission?
Use global security groups to group user (or computer) accounts with similar characteristics, for example members of Sales department.
Use domain local security groups to define access to resources (share, NTFS, printer),
for example you would create domain local group “DL ColorPrinter Print” and assign print permission to this group. Then you would put global security group Sales in “DL ColorPrinter Print” group to enable printing for sales department. If marketing department wants to use the same printer you have to create global group Marketing and put this group in “DL ColorPrinter Print” group. This strategy is called A-G-DL-P. Put accounts in global groups, global groups in domain local groups and assign permissions to domain local groups and you will assign permission only once. Everything else happens in Active Directory Users and Computers when you modify groups memberships.
Universal groups should only be used in multiple domain forest. Universal groups are used to nest global groups. Group strategy is then called A-G-U-DL-P.
In shot below are the details
Use these to group users with similar needs within the organisation, sales people, finance people, manager’s etc
Domain Local Groups:
Use these to specify access to resources e.g. database users, Colour Printer Users.
Use only in mulitiple domains to give forest wide privileges. | s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611089.19/warc/CC-MAIN-20210613222907-20210614012907-00617.warc.gz | CC-MAIN-2021-25 | 5,087 | 25 |
http://moneybaltimore.com/event/sba-workshop-how-to-use-marketing-to-take-your-business-to-the-next-level/?instance_id=25 | code | This is an interactive workshop that will give attendees strategies and tools to effectively market with social media. Learn tips on how to utilize social media to market your business. This session will teach business owners how to increase your company’s traffic on social media. Bring your laptop. This will be a hands-on, interactive workshop. To attend, you must register at https://www.eventbrite.com/e/marketing-with-social-media-take-your-business-to-the-next-level-tickets-33902707912
This is a collaborative event between Small Business Development Center and Small Business Administration. Will Holmes will be a facilitator, discussing marketing tools you can use to build your business. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890514.66/warc/CC-MAIN-20180121100252-20180121120252-00668.warc.gz | CC-MAIN-2018-05 | 700 | 2 |
http://toolstolife.com/users/winged_b/blog/viewpost/25308/?month=7&year=2008 | code | So it's been a few years since I've logged in. The website has changed a bit and I thought I'd start from day 1 again and give it another go! I'm currently 7 months into my first maternity leave from work. Starting to reassess things in my life again and looking for some clarity, and frankly, motivation (and me time!)So here goes ;). | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382705/warc/CC-MAIN-20130516092622-00043-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 335 | 1 |
https://techdocs.genetec.com/r/en-US/AutoVu-Sharp-Discovery-Tool/Installing-the-Sharp-Discovery-Tool | code | To detect your Sharp camera, you must install the Sharp Discovery Tool on a computer that is on the same subnet as the camera.
Before you begin
- Ensure that the computer is running Windows 7, Windows 8, or Windows 10.
- Install the latest .Net 4.5 framework.
- Install the latest version of Silverlight (minimum version: 5.0).
- Ensure that the network adapter subnet matches the Sharp subnet.
The Sharp Discovery Tool protocol uses UDP broadcasts. Network equipment might block these requests.
What you should know
- Download the Sharp Discovery Tool installation package from the GTAP Product Downloads page.
- Run the executable file and follow the on-screen instructions. | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510130.53/warc/CC-MAIN-20230926011608-20230926041608-00556.warc.gz | CC-MAIN-2023-40 | 676 | 10 |
https://www.drupion.com/blog/multi-step-registration-critical-unsupported-module-sa-contrib-2018-023 | code | Project: Multi-Step Registration
Security risk: *Critical* 16∕25
Vulnerability: Unsupported Module
With Multi-Step Registration you can create multi-step (wizard) user account
The security team is marking this module unsupported. There is a known
security issue with the module that has not been fixed by the maintainer. If
you would like to maintain this module, please read:
The security team marks all unsupported modules critical by default.
If you use the step module for Drupal you should uninstall it. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583658981.19/warc/CC-MAIN-20190117123059-20190117145059-00049.warc.gz | CC-MAIN-2019-04 | 510 | 9 |
Subsets and Splits