url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.ens.unibe.ch/about_us/staff/prof_dr_flannery_mary/index_eng.html
code
My work focuses on the intersections between literature, reputation, and emotion in later medieval England (roughly 1350-1550), as well as on the postmedieval reception of medieval literature. I have a longstanding interest in the roles that literary texts can play in spreading or suppressing gossip--good or bad--and in establishing the fame of poets and the subjects they write about. This formed the subject of my first book, John Lydgate and the Poetics of Fame (2012), as well as a number of articles I have published. I am also interested in what happens when one acquires a bad reputation, or loses a good one. My second book, Practising Shame: Female Honour in the Literature of Medieval England (2019), focused on the emotional implications of good and bad reputations for women in medieval texts. In 2018 and 2019, I was a Marie Skłodowska-Curie Research Fellow at the University of Oxford, where I examined medieval and early modern versions of The Canterbury Tales to see how scribes, readers, and editors have responded to Chaucer's obscenity, and how this has paved the way for Chaucer's modern reputation. At the beginning of 2020, I embarked on a five-year project funded by an SNSF Eccellenza Professorial Fellowship at the University of Bern that will build on my previous research by investigating ‘Canonicity, Obscenity, and the Making of Modern Chaucer (COMMode)’ from 1700 to the present day.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988961.17/warc/CC-MAIN-20210509062621-20210509092621-00067.warc.gz
CC-MAIN-2021-21
1,420
2
https://www.russianlessons.net/lessons/lesson5_main.php
code
Now that you have learnt some basic Russian phrases, it is time to start forming your own Russian sentences. To do this you need to learn about Russian verbs and pronouns. This lesson will enable you to start forming short Russian sentences. When you are learning to speak Russian it is easiest to start by just using short sentences. Often you can break a long sentence into several short ones. This is a long lesson, and introduces some of the most difficult concepts in Russian. So don't worry if you need to go slowly, or it takes some time to understand at first. You can always come back and review this lesson. When you have completed this lesson you will have taken a major step forward in understanding Russian grammar. Verbs are action words, they are things you can do. For example: run, walk, love, eat, want. Pronouns are words that can replace names. For example: I, you, he, she, him, her, it. In the sentence "I love him". "love" is the verb. The subject is "I", and the object is "him". Russian PronounsHere are the Russian pronouns that can be used as the subject of a sentence. (Known as the nominative case.) Я - I Ты - You (informal) Он - He, It (m) Она - She, It (f) Оно - It (n) Мы - We Вы - You (formal, or plural) Они - They Вы is used as the formal singular "you", and the plural "you" (slang: "yous" or "you all") when talking to more than one person. Here are the Russian pronouns that can be used as the object of a sentence. (Known as the accusative case) Меня - Me Тебя - You (informal) Его - ("yevo") - Him, It (m,n) Её - Her, It (f) Нас - Us Вас - You (formal, or plural) Их - Them You should be familiar with using different pronouns for the subject and object of a sentence ("me" instead of "I"). Just remember that unlike English,Russian uses an extra version of the word "you". You should memorise these pronouns. You will be pleased to know that Russian has only one present tense. In Russian there is only one way of saying "I work", "I am working" and "I do work". Russian verbs change their endings depending on the subject. This happens a little in English, but not as much. (Example: I work, he works). This happens according to two different patterns known as the first conjugation, and the second conjugation. (There are also some irregular verbs). Both these patterns are quite similar, and once you get the hang of it, it is not too difficult. The first conjugation The first conjugation is used for verbs ending in "ть" but not "ить". It is the most common. To form the verb for each person you need to drop the last two letters of the infinitive (normally "ть"), and add the appropriate ending ("ю", "ешь", "ет", "ем", "ете" or "ют").Let’s take a look at a verb that uses the first conjugation: работать (to work). работать - To work. (infinitive, dictionary form) Я работаю - I work Ты работаешь - You work Он, Она, Оно работает - He, She, It works. Мы работаем - We work Вы работаете - You work. Они работают - They work. Let's try some other Russian words from the first conjugation: понимать - To understand. (infinitive, dictionary form) Я понимаю - I understand. Ты понимаешь - You understand. Он, Она, Оно понимает - He, She, It understands Мы понимаем - We understand. Вы понимаете - You understand. Они понимают - They understand. Знать - To know. (infinitive, dictionary form) Я знаю - I know. Ты знаешь - You know. Он, Она, Оно знает - He, She, It knows. Мы знаем - We know. Вы знаете - You know. Они знают - They know. Remember you can make a statement negative by using the word "не" (not). For example: Я не знаю - I don't know. Я не понимаю - I don't understand. Он не понимает - He doesn't understand. You can also form questions: Ты знаешь? - Do you know? Ты понимаешь? - Do you understand? The second conjugation Verbs where the infinitive ends in "ить" use the second conjugation. Now we will introduce some verbs from the second conjugation. There are also some other verbs that use this conjugation. The second conjugation uses the endings "ю" (or "у") "ишь" "ит" "им" "ите" "ят" (or "ат"), which replace "ить". Note 1: The second conjugation is affected by the spelling rules. Note 2: The first person singuar is affected by the rule of consonant mutation. Remember, this only applies to the first-person singular (Я). говорить - To speak. (infinitive, dictionary form) Я говорю - I speak. Ты говоришь - You speak. Он, Она, Оно говорит - He, She, It Speaks. Мы говорим - We speak. Вы говорите - You speak. Они говорят - They speak. слышать - To hear. слышу - I hear. слышишь - You hear. слышит - He, She, It hears. слышим - We hear. слышите - You hear. слышат - They hear. Я говорю по-английски - I speak English Он говорит по-русски - He speaks Russian Вы говорите по-русски? - Do you speak Russian? Мы не говорим по-русски - We don't speak Russian. Собака не говорит по-английски - The dog doesn't speak English. There are a number of irregular verbs in Russian. (Verbs that don't exactly follow the above rules). However, often once you know the stem of the verb, you can often predict the endings. Even irregular verbs normally follow a similar pattern to those above. Ехать - To go (by transport). Я еду - I go (by transport). Ты едешь - You go (by transport). Он, Она, Оно едет - He, She, It goes (by transport). Мы едем - We go (by transport). Вы едете - You go (by transport). Они едут - They go (by transport). Notice that once you know the stem "Ед" it almost follows the first conjuction, except that "у" replaces "ю". Жить - To live. Я живу - I live. Ты живёшь - You live. Он, Она, Оно живёт - He, She, It lives. Мы живём - We live. Вы живёте - You live. Они живут - They live. Notice that "ё" is used instead of "е" when the stress falls on the ending. Я живу в Лондоне - I live in London. Он едет домой - He is going home Use this video to practice some phrases about languages. Take me to YouTube. You now know the main concepts involved in forming Russian verbs. This lesson contained a lot of grammar, which is some of the hardest in the Russian language, so don't worry if you found this lesson a little difficult at first. In lesson 7 you will get some more practice. In the next lesson we will introduce some grammar associated with nouns (things), so by lesson 7 we will have covered enough grammar to have some practice forming sentences. To help you remember some of the concepts learnt in this lesson, you may wish to work through the exercises.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00082.warc.gz
CC-MAIN-2023-40
7,130
104
http://www.tomshardware.com/forum/326220-28-gaming
code
I don't think there are many games currently available on the market that can really make use of the i7's full capabilities. Heck, I don't think even Windows 7 utilizes it to its full potential. No idea how long it will be until it is commonplace, safe to assume a couple years I'd say. Gaming quality in general is going to be by far more heavily influenced by your graphics card moreso than your processor. I'd go with the cheaper 2500k.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174135.70/warc/CC-MAIN-20170219104614-00639-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
439
2
https://help.sharpspring.com/hc/en-us/articles/360003112631-Adding-Trackable-Links-and-Images-to-Social-Media-Posts
code
|SharpSpring's social media tools enable you to add images and trackable links directly in the posting window. With trackable links, you have access to additional benefits that are not available for regular links. Trackable links can be used as a trigger, can show analytics on who engaged with your links, and much more. This article will detail how to add an image or Media Center trackable link to your social posts. Adding Trackable Links to Facebook or Twitter To add Media Center assets to Facebook or Twitter posts, do the following: Adding Images to Facebook or Twitter To add images to Facebook or Twitter posts, do the following: Adding Media Center Assets to LinkedIn You cannot post images to LinkedIn due to limitations with LinkedIn's API. Instead, you will need to upload images to the SharpSpring Media Center and publish the images to LinkedIn as a Media Center asset. To post Media Center assets and social media assets as images to LinkedIn, do the following: When posting media center assets as images to LinkedIn, keep to the following image parameters to ensure that the image is properly shared: Important: When typing a link (such as https://www. sharpspring.com), SharpSpring adds metadata that is tied to that link. This will automatically add a description and image, depending on the metadata available. However, in order for metadata to appear when posting a link in a social post, you must include http:// or https:// in the link. Be aware that certain website content, including images or video, may not populate in the preview in SharpSpring or on LinkedIn due to issues with the website's backend coding.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247489304.34/warc/CC-MAIN-20190219020906-20190219042906-00115.warc.gz
CC-MAIN-2019-09
1,637
14
https://forums.afterdawn.com/threads/backward-xbox-compatibility-issue.738545/
code
I have a couple of Xbox 360’s. One I have had for about 3 years and is kept upto date with system updates. I updated this console with the backward compatibility emulator from Microsoft just after buying it and it plays compatible original Xbox games. I have recently bought a second hand Xbox 360 for my Son, which is the same model as my other one (Premium 20Gb HDMI) and this has up to date system. Problem is this one will not play the original Xbox games that the other one does. Obviously it hasn’t had the backward compatibility update applied. It looks like the backward compatibility emulator is no longer available from Microsoft. Does anyone know where I can get this emulator from? or is there any other way to get these games to work on this second console.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107898577.79/warc/CC-MAIN-20201028132718-20201028162718-00485.warc.gz
CC-MAIN-2020-45
774
1
https://help.podio.com/hc/en-us/community/posts/360050372691-Reminder-email-related-to-date-field
code
Reminder email related to date field I believe this question is very easy and I try to see if someone has already asked the same... but I'm a newbie :) My goal is to send a reminder email to the client 3 days before the "briefing date". For sure I'm doing something wrong because it's not working. Bellow is what I have for now. Do you think you can help me figuring out what's not working / or what is missing? Thank you so much for your support. Allan here with the Podio team. That sounds like a serious issue - I'd like to take a closer look. Please submit a support ticket here: https://www.globiflow.com/contact.php Please sign in to leave a comment.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648850.88/warc/CC-MAIN-20230602172755-20230602202755-00313.warc.gz
CC-MAIN-2023-23
656
9
https://timheuer.com/blog/post-13988
code
the patch for windows mobile and united states daylight savings time is now available. see the article and downloads here. i also noticed that there was finally a daylight savings update on my OSX machine at home. what struck me was the size. on windows xp sp2 for example, the patch is 504KB. on OSX the patch was 9.2MB. wow, quite a difference...i'm curious why.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496669847.1/warc/CC-MAIN-20191118205402-20191118233402-00312.warc.gz
CC-MAIN-2019-47
364
2
https://github.com/f5io
code
Hide content and notifications from this user. Contact Support about this user's behavior. Performant JSONPath implementation that focuses on results An asynchronous finite state machine library for Node.js and the browser A library for Communicating Sequential Processes in Node.js, built on top of async/await A highly flexible process pooling library for Node.js ✋ stop that app dead in its tracks Seeing something unexpected? Take a look at the GitHub profile guide.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647649.70/warc/CC-MAIN-20180321121805-20180321141805-00126.warc.gz
CC-MAIN-2018-13
472
9
https://blender.stackexchange.com/questions/124938/bending-an-object-into-a-sphere
code
Im using polyhedrons created only from hexa- and pentagons to simulate tiles on a planetlike gameboard, to make my board look like a planet and not an polyhedron. I want to make it spherical while still keeping the tiles mostly intact, what would a good approch be? I cant use subdivision surface or bevel because that only rounds out the edges and leaves the faces mostly flat. The Solution probably involes subdividing the faces and then telling the object to try to become a sphere, which is the part i dont know how to do. The polyhedron i use looks like this
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525414.52/warc/CC-MAIN-20190717221901-20190718003901-00115.warc.gz
CC-MAIN-2019-30
563
3
https://h-artofafricasafaris.com/tour/sirimon-toute/
code
This route is less crowded and it is another that is rarely used but, offers magnificent scenes dotted with stunning wildlife. It takes 5 to 6 days. We are sorry, this tour is not available to book at the moment Before using google maps you must go to Google maps api console and get an api key. After you do, please proceed to Appearance -> Theme options -> Configuration settings and enter your key in the field labeled "Google maps api key"
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00385.warc.gz
CC-MAIN-2022-40
443
3
https://thedxt.ca/2023/06/onyx-mlnx-os-upgrade/
code
Onyx (MLNX-OS) Upgrade In this post I will show you how to upgrade your switch running Onyx (MLNX-OS). I will detail how to do it via command line and via the web interface. The best way to make sure your upgrade is a success is to plan your upgrade path. I recommend following the upgrade paths as sometimes jumping from an old version to the newest version isn’t supported and could lead to issues. When Nvidia purchased Mellanox some of the upgrade path planning resources became locked away behind a login/pay wall. One of the items behind the wall are the detailed release notes. The release notes are the documents that will tell you exactly which versions are supported on which switches and what your upgrade path should be as sometimes direct upgrades skipping version can cause issues. You get access to the release notes on your switch directly but only for the version you are currently running. I tried to see if I could extract the release notes from the upgrade image but they seem to be stored as blobs and I couldn’t figure out a way to open them. Fortunately Onyx is used by other OEMs like Hewlett Packard Enterprise for example. You can find a public version of the upgrade path the HPE documentation here. My SN2410 switch was originally running version 3.6.6102 my upgrade path was the following The CLI Way - SSH into the switch. - Run the show versioncommand to see what version you are currently running. - Run the command show imagesto show what upgrade images you have on your switch. - Run the command enableto elevate yourself to run all the fun commands. Storage space is almost always limited on a switch. To make sure we don’t run out of space we should always delete the old images. Deleting the old images does not delete the installed image. - Delete the old images with the command image deleteand then the image name. In my case the command is image delete image-X86_64-3.10.4006.img Now we need to get the new image onto the switch. There are a few ways to do that such as HTTP, HTTPS, FTP, TFTP, SCP and SFTP. When I tested with TFTP it was very slow. I’ll be using HTTP. - Depending on your setup you may need to tell it which VRF to use. Your command will look something like this image fetch http://IP/IMAGE.img. In my case I need to specify my VRF. The command I will run is image fetch vrf mgmt http://192.168.3.125/image-X86_64-3.10.5000.img - Install the image onto the switch with the command image installand then the image name. In my setup the command I will run is image install image-X86_64-3.10.5000.img - Tell the switch to boot off the image we just installed by running the command image boot next - Run the following command to double check everything From the output we can see that the new image is loaded into partition 2 and the next time we reboot the switch it will load partition 2 which will load the new version. - Reboot the switch by running the command - To make sure everything went as planned SSH back into your switch and run the command The Web UI Way Even if the switch Web UI is still branded Mellanox the process is the exact same the icons are just slightly different. - Login to the Web UI - Click on System - Click on Onyx Upgrade I’m going to upload the file via the browser. - Select your upgrade file - Click on Install Image - Wait while it loads the file. - Once the file has been uploaded it will show you the progress of the image install. - Once it is done click OK - It will now display the partitions and which one will be used the next time the switch reboots. In the screenshot we can see that the new image is installed to partition 2 and the next time we reboot it will use partition 2. - Click on the Reboot menu - Click Reboot - Click Reboot to confirm the reboot. - Wait for the switch to boot up again. - Once the switch boots back up it will be running the new version. That’s all it takes to upgrade Onyx (MLNX-OS) via the Web UI or CLI.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474641.34/warc/CC-MAIN-20240225171204-20240225201204-00120.warc.gz
CC-MAIN-2024-10
3,948
52
https://community.esri.com/t5/arcgis-online-questions/geoform/td-p/1011269
code
Hello, I want to create a geoform but I cannot create a subtype field. the first column should have options, but it doesn't look like that. it looks like a normal text forehead. how can i fix this?https://6grup.maps.arcgis.com/apps/GeoForm/index.html?appid=bf64b1a9301445ba825b590de6b9df87 Hi, I'd never heard of Geoform before, it looks like it could be quite useful, thanks. Does you feature have subtypes/domains initially? If so, do they work in the normal editing widget? I'm not sure you can create the subtypes from within Geoform, but only having heard of it today makes my opinion on this almost worthless. I also don't think you can create the subtypes in AGOL (though again I don't use it). Perhaps this may be of use to you - Define attribute lists and ranges—ArcGIS Online Help | Documentation Merhaba, bir jeoform oluşturmak istiyorum ancak bir alt uç alanı oluşturamıyorum. ilk sütunun boyutları, ancak öyle görünmüyor. normal bir metin alnına benziyor. bunu nasıl düzeltebilirim? https://yadi.sk/i/Y1AQqAH4H-5gYw https://6grup.maps.arcgis.com/apps/GeoForm/index.html?appid=bf64b1a9301445ba825b590de6b9df87
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506686.80/warc/CC-MAIN-20230925051501-20230925081501-00750.warc.gz
CC-MAIN-2023-40
1,137
6
https://www.easycalculation.com/physics/classical-physics/learn-total-voltage.php
code
Kirchhoff's Voltage Law means that the total amount of manipulated potential difference or voltage existing near to a network must be 'Zero'. n = Number of Voltages VT = Total Voltage Based on the below given diagram compute the total voltage of a closed circuit? VR1 = 4V VR3 = 8V VR4 = 2V VT = 20V |VT||= VR0 + VR1 + VR2 + ... + VRn| |VT||= VR1 + VR2 + VR3 + VR4| |20V||= 4V + VR2 + 8V + 2V| |VR2||= 20V - (4V + 8V + 2V)|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585449.31/warc/CC-MAIN-20211021230549-20211022020549-00010.warc.gz
CC-MAIN-2021-43
423
8
http://gauinteb.eu/chat-room-database-schema/
code
A typical failure message is similar to: cumbia callera real sex Your database migration failed: Object object Object has no method 'addUsersToRoles' (. Use the following example to get a list of invitations that a user has received. Chat version:.39.0, database locked at version: 18, database target version:. Now to insert the message into messages table we need to retrieve the total_messages count from total_messages table and then construct this SQL statement.Room, type: c chanel, d direct, p (change to g) group, v visitor "ts new Date( / Date.Contributors, in this article, this section contains sample queries for the Persistent.The identifier_message_number column has identifier appended with the message number between those two users.For example, you may have to manually apply roles to users.Liquid error: Can't find the localized string giveDocumentationFeedback for template Conceptual.Select prinName,nodeName,invID,createdOn from tblPrincipalInvites as inv, tblPrincipal as p, tblNode as n where inID 5 AND inID inID and deID deID order BY invID desc.Storing chat messages and retrieving those messages at a very fast rate is much needed for an chat app.My method doesnt require any sorting.Most bad table designs require a lot of sorting.You need to construct the identifier while producing SQL statement. But this same design can me implemented using any SQL, No-SQL or any other kind of database management system. Select prinName as Name, count as ChatMessages from tblChat, tblPrincipal where prinID userId AND dbo. Developers spend days to decide which dbms to choose and how to design tables for storing messages. Room, name (t:d - empty) lm, date, last Message Timestamp msgs, integer, messages Counter cl, boolean, if users can leave room. Note that certain new values that are vital to Rocket.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583660529.12/warc/CC-MAIN-20190118193139-20190118215139-00620.warc.gz
CC-MAIN-2019-04
1,823
9
http://www.pepysdiary.com/letters/1665/11/23/evelyn-to-pepys/
code
Thursday 23 November 1665 I am but just now ariv’d2; of which I will give you no farther account at present, because the post shall not goe without the direction you require, though it be not so particular as I could wish it: The last I receiv’d was from Mr Fillingham3, and since that he is gon very sick home to his owne house to which I have no other addresse then by Mr Fillingham; so that the most expeditious will be to enclose Sir Williams Letter in a paper to him with this superscription Mr Conny4 (who is now with me) informes me of the indispensable necessity of having an Hospital Ship, and therfor conjures me to put you in mind of the favour: Pardon dear Sir, this abrupt scribble of Your most humble Servant 7 the Clock. Source: PRO S.P. 29/137, f.84. Endorsed by P, “23.9br.65 Mr Evelyns direction how to send to Sir W[illia]m Doyley”. - MS: “Says-Court at 7 the Clock” below. Date given by P’s endorsement. E had been at Wotton, returning to Deptford this day (diary). In his own diary P reports a meeting with E the following day (24 November 1665) in which they looked at old manuscripts. There is no reference to official business, or this letter. ↩ - From a meeting with Albemarle (diary, 23 November 1665). ↩ - Bartholomew Fillingham. A number of letters of this date from E to him exist as loose MSS in the Evelyn archive at the British Library. ↩ - John Conny, a surgeon at Chatham. ↩
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802769305.33/warc/CC-MAIN-20141217075249-00158-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
1,430
10
http://www.videoforums.co.uk/threads/41022-Sony-HDR-PJ30-Editing-on-XP-with-Athlon-64-X2-5200-CPU-and-2GB-RAM
code
As a camcorder newbie, I just bought a Sony HDR-PJ30 camcorder and have a couple of questions: 1. When I plug it in, Windows assigns two drive letters: One called "PMBPORTABLE" that contains three directories ("MACMODULE", "WINMODULE", and "PMBP_Mac.app"), and a second drive as "Removable disk" that contains the JPG pictures and .CPI/.MTS files: - What is WINMODULE? Some application I should install? - Are CPI index files and MTS actual video files? 2. On an older XP host with an AMD Athlon 64 X2 5200+, 2GB of RAM, and an Asustek M2N68-AM Plus mobo, how should I edit those AVCHD files? - Should I first convert the AVCHD files into something less complex? - Are there good, affordable applications for Windows that you would recommend? FWIW, I just need to remove parts I don't need, add some text between each sequence, and join them all into a single movie.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720468.71/warc/CC-MAIN-20161020183840-00159-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
866
8
https://thefiringline.com/forums/showpost.php?p=4040710&postcount=8
code
For quality and the number of sizes of bits that are available, the Brownell's Magna-Tip is the best. These are a true professional quality set, made of the finest materials. The bits are deliberately made hard so usually the bit will break, not an expensive and hard to get gun screw. An advantage is, if you break or damage a bit, all you have to do is email Brownell's and they'll send you a new bit free. I recommend buying a set with the Law Enforcement size handle. This is the perfect size for good control. The standard handle is too big, and the stubby is too short.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171053.19/warc/CC-MAIN-20170219104611-00022-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
575
6
https://kzimmermann.0x.no/articles/updating_debian_11.html
code
Updating to Debian 11 Bullseye Though I have not daily-drived Debian GNU/Linux for a couple of years (stopped around the Jessie-Stretch area), a recent proposition of interest (the Old Computer Challenge) revived my interest in it again, where I picked it back up on the Buster release, version 10.3. Little did I know at the time, though, that there was another big release coming up just around the corner. Debian 11, codenamed Bullseye, was released a few weeks ago at this time of writing, on August 14th 2021. This was a great piece of news, as this OS not only is signature-stable and has a huge load of software ported to it, but also is the rock-solid base on which a myriad of other OSes base themselves on. With this update, the kernel 5.10 line finally makes its debut on Debian and lots of other big updates arrived as well. And with this announcement just after I did the challenge, I got to thinking: hey, it's time to update! It should be noted that most releases of distributions come with release bugs that even the most extensive of tests can't completely iron out, and usually I wouldn't do this update is such a short period after the first release. My game plan usually involves waiting out a few more weeks, perhaps a month and a half before I feel the release has matured enough - which also gives me time to catch up on backups before I jump it. Why did I do it so early this time? Because the machine I'm using is mostly a throwaway one, having been sourced - quite literally - from the trash and housing almost no data in it. If it broke, big deal! So perhaps you might wanna consider taking a little more time before updating your box if it contains important data or has a lot of services and specific software installed in it. But here's how it went for me anyway: This is the step before the update where you back up all your data and config files before jumping in the water, but for the reasons pointed above, I mostly skipped them. Here's what I would have done, though. First and foremost, back up not only your user data (which you should already have backed up regularly, right?) but also your configuration files, both at dotfile level inside $HOME and for each service run by your machine, like your web server, database server, Tor relay, etc. Sometimes their config files change per large update, and you should keep a backup to restore them if they get overwritten. Afterwards, that's where the magic starts to happen in the actual update. There are really only three basic steps to updating a Debian machine to a newer release: sources.listto a the new release. aptand install new packages. Sounds easy enough? That's because it is. But let's delve a little deeper into the process' steps next: The Debian team makes a huge effort (and by huge, I really mean huge) in building the new packages for the new release, and they are stored isolated from the previous releases so that dependency mismatch doesn't happen when installing things via the package manager. When you want to change the release, you have to explicitly tell apt to use the new package sources, which is done by configuring the file The format and default syntax for Bullseye have changed slightly from previous releases of Debian, which is hinted by its release notes in the Debian wiki. Essentially, you should change the lines for security to the following: deb http://deb.debian.org/debian bullseye main deb http://security.debian.org/debian-security bullseye-security main deb http://deb.debian.org/debian bullseye-updates main Note that the security line changed slightly since other releases. Since I enabled the other repositories, and had to install nonfree wifi drivers, I also added the following lines in my file: deb http://deb.debian.org/debian/ bullseye contrib non-free deb-src http://deb.debian.org/debian/ bullseye contrib non-free Save and close the file, now you're ready to perform surgery! Updating and installing new packages To make sure everything gets updated correctly and that nothing breaks mid-update, I started to adopt a "strict mode" preparation before any large update of a distribution, which I first talked about in my upgrading to FreeBSD 13 article. I borrowed this method from the Siduction distribution, where they recommend doing this every time you run a major update, and has served me well. First, close all your running programs, log out of the graphical session and log into the virtual console (TTY) with Ctrl+Alt+F1. Log in as root and drop to text-only mode with: # init 3 This will kill any running X session, which could break the system if running through an update, but will keep networking and etc running. Only then, issue the update command: # apt-get update # apt-get dist-upgrade apt will offer to upgrade all packages to the new distribution's ones. This is a sizeable download (mine being about 1.6GiB), and might take considerable time depending on your connection. As the files are unpacked and begin to be installed, pay attention to the changelogs (displayed once before any packages begin to be installed) and the configuration file changes (aren't you glad you backed them up before?). Since I had a rather simple barebones system here, I gladly accepted everything as per the new maintainers' versions and everything finished nice and easy. Once apt finishes its job, it's time to go ahead and reboot into your new system! Solve remaining issues after the reboot Congratulations, you're now running Debian Bullseye. Now comes the fun part: now that all the old and perfectly working packages are flushed, and you're in your shiny new system, it's time to resolve any outstanding bugs that remain after upgrade! Wait, did I really say "fun?" Perhaps there's a better word for it. Though the installation went spotless, the only issue that I found with Bullseye post reboot was with the network. Though nothing happened to the drivers I previously installed on it, it seems that Bullseye decided to abandon the previous wicd package that was used in Buster to manage the Wifi connections. As a result, I found myself with no internet, and there wasn't even wpa_supplicant to manage the connection manually like in a trick I previously used in FreeBSD. Oh fie, guess that's what you should read changelogs for! Hook up the ethernet cable, put the interface up and I'm ready to install some sort of connection manager for myself. My go-to solution was network-manager which has both graphical (applet-like) and a CLI interface, named nm-tui. I think it's also the default from Bullseye and on? Regardless, from there on, it was just a matter of detecting my network, authenticating and I'm back again! Mind you, however, that this was a very simple update on a machine that didn't have many services running. Had this been a busy server with many different services running, the story could've been much more complicated. Conclusion: excellence and ease of use wrapped into one Like always, Debian Bullseye offers a great experience to the user and no cost of usability, power or security. Perhaps not as fun as building my system from zero with a distribution like Arch or Alpine Linux, but it's very robust and you can get to speed without lagging behind on system configuration. On the server, it maintains the tradition of stability and reliability offered by the Stable line of Debian. Props to everyone working with the Debian Project for this great release! Perhaps it's time for me to start contributing and giving back to the community, after enjoying Debian for so long. I just wonder where and how. Have you installed or updated to Debian Bullseye already? How easy or hard was that? Did you find any bugs? Let me know on Mastodon! This post is number #26 of my #100DaysToOffload project. Follow my progress through Mastodon! Last updated on 08/28/21
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510412.43/warc/CC-MAIN-20230928130936-20230928160936-00053.warc.gz
CC-MAIN-2023-40
7,834
44
https://albertoromgar.medium.com/hi-markus-thank-you-for-your-response-ab0fee4fe67
code
Hi Markus! Thank you for your response! I like that definition, too. Although it doesn't cover all the spectrum. If an AI system is better than people at recognizing faces and we keep improving it, it's still AI but it doesn't reflect this definition. About understanding intelligence, that's a hard quest. Even if we build AGI sometime, it doesn't mean we'll understand intelligence. AI is at a significantly lower level and we already don't fully understand how neural networks work so well. Deep learning is unreasonably effective.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104240553.67/warc/CC-MAIN-20220703104037-20220703134037-00240.warc.gz
CC-MAIN-2022-27
534
3
https://www.draytonmanor.co.uk/animal-details/western-hognose-snake
code
IUCN red list status: For more informations, please visit iucnredlist.org The Western Hognose can be found from Southern Canada, through the United States to northern Mexico. Primarily feeding on toads, but will prey on other amphibians, lizards and eggs. Females lay on average 4-20 eggs per clutch, which hatch after 50-65 days. Western Hognose snakes can live 10-20 years. About the Western Hognose The Western hognose snake is native to North America. Their colour and pattern is highly variable between subspecies, although most specimens appear much like rattlesnakes! Western hognose snakes are usually brown or light olive green in colour with darker dorsal spots. Males are considerably smaller than females. The most noticeable feature on the western hognose snake is their upturned, pointed snout. The western hognose snake uses its upturned snout to burrow through the earth in search of toads, its main food. Other food includes frogs, lizards, mice, birds, snakes and reptile eggs. The western hognose snake uses a slightly toxic saliva to help subdue its prey, yet this is not dangerous to humans. Did you know? When warding off predators’ hognoses flatten their heads and hiss loudly to mimic the sound of a rattlesnake, which they resemble. However, if this doesn’t work they will ‘play dead’ by rolling onto their back, mouth open, remaining motionless.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662529658.48/warc/CC-MAIN-20220519172853-20220519202853-00411.warc.gz
CC-MAIN-2022-21
1,379
11
https://gkaim.com/sql-database-1-questions-answers/
code
What is an SQL Database SQL (Structured Query Language) is a standardized programming language used for managing relational databases and performing various operations on the data in them. Initially created in the 1970s, SQL is regularly used by database administrators, as well as by developers writing data integration scripts and data analysts looking to set up and run analytical queries. The uses of SQL include modifying database table and index structures; adding, updating and deleting rows of data; and retrieving subsets of information from within a database for transaction processing and analytics applications. Queries and other SQL operations take the form of commands written as statements — commonly used SQL statements include select, add, insert, update, delete, create, alter and truncate. Some Important Questions about SQL Database are listed below:- 1. What command is used to create a table by copying the structure of another table? CREATE TABLE NEWTABLE AS SELECT * FROM EXISTINGTABLE WHERE 1=2; If the WHERE condition is true, then all the rows or rows satisfying the condition will be copied to the new table. 2. What will be the output of the following query? SELECT REPLACE(TRANSLATE(LTRIM(RTRIM(‘!! ATHEN !!’,’!’), ‘!’), ‘AN’, ‘**’),’*’,’TROUBLE’) FROM DUAL; 3. What will be the output of the following query? SELECT DECODE(TRANSLATE(‘A’,’1234567890′,’1111111111′), ‘1’,’YES’, ‘NO’ ); Answer : Explanation : The query checks whether a given string is a numerical digit. 4. What does the following query do? SELECT SAL + NVL(COMM,0) FROM EMP; 5. Which date function is used to find the difference between two dates? 6. Why does the following command give a compilation error? DROP TABLE &TABLE_NAME; 7. What is the advantage of specifying WITH GRANT OPTION in the GRANT command? 8. What is the use of the DROP option in the ALTER TABLE command? 9. What is the value of ‘comm’ and ‘sal’ after executing the following query if the initial value of ‘sal’ is 10000? UPDATE EMP SET SAL = SAL + 1000, COMM = SAL*0.1; 10. What is the use of DESC in SQL? Related Link ,See once SECURITY TOOLS -Cyber Security # 4 Security Tips – Cyber Security #3 Method Of Defence – Cyber Security #2 Computer Threats – Cyber Security #1 Cyber Security Introduction World Wide G.K Facts around World History of the World
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00166.warc.gz
CC-MAIN-2023-40
2,397
30
https://exonova.neocities.org/
code
Welcome to exoNova Text Adventures A Text Adventure (otherwise known as interactive fiction) is a computer game in which the player interacts with textual environments. Text adventures were some of the earliest computer games, the first of which was released in 1976. Interactive fiction can take the form of simple stories with simple options, or they can become more complex with inventory management, battles, etc. On this site, you will be able to access and play text adventure games of my own creation. If you enjoy my games, please consider sending a tip to my CashApp: $Rowanova How do you make Text Adventures?
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066613.21/warc/CC-MAIN-20210412053559-20210412083559-00110.warc.gz
CC-MAIN-2021-17
619
5
http://test1.agwaguide.org/about/decisiontree/
code
The World Bank's Decision Tree Framework How do we better equip decision makers to face uncertainty? Which tools and options will lead to a more resilient and robust project? How can we evaluate or justify an investment with an uncertain future? The Decision Tree Framework is a robust decision scaling approach from the World Bank that provides resource-limited project planners and program managers with a cost-effective and effort-efficient, scientifically defensible, repeatable, and clear method for demonstrating the robustness of a project to climate change. The framework adopts a “bottom-up” approach to risk assessment that aims at a thorough understanding of a project’s vulnerabilities to climate change in the context of other nonclimate uncertainties (for example, economic, environmental, demographic, or political). It helps to identify projects that perform well across a wide range of potential future climate conditions, as opposed to seeking solutions that are optimal in expected conditions but fragile to conditions deviating from the expected. The book, part of the World Bank's Open Knowledge Repository, can be found here. Ray, Patrick A., and Casey M. Brown. 2015. Confronting Climate Uncertainty in Water Resources Planning and Project Design: The Decision Tree Framework. Washington, DC: World Bank. doi:10.1596/978-1-4648-0477-9. License: Creative Commons Attribution CC BY 3.0 IGO *This is an adaptation of an original work by The World Bank. Views and opinions expressed in the adaptation are the sole responsibility of the author or authors of the adaptation and are not endorsed by The World Bank. The Knowledge Platform is designed to promote and showcase an emerging set of approaches to water resources management that address climate change and other uncertainties -- increasing the use of "bottom-up approaches" through building capacity towards implementation, informing relevant parties, engaging in discussion, and creating new networks. This is an ongoing project of the Alliance for Global Water Adaptation (AGWA) funded by the World Bank Group.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347411862.59/warc/CC-MAIN-20200531053947-20200531083947-00446.warc.gz
CC-MAIN-2020-24
2,094
7
https://www.thewichitacomputerguy.com/blog/modify-windows-7-pe-usb-custom-programs
code
I hope this to become a more through blog down the road, but for now it is simply a collection of thoughts and info... Mount wim image for editing: dism /mount-wim /wimfile:winpe.wim /index:1 /mountdir:c:\[windowspe build dir]\mount Unmount WIM image: NOTE: VERY IMPORTANT! Make sure to close all Windows Explorer windows, and do not reside within the actual mount DIR if in DOS. Otherwise the unmount process won't complete successfully... dism /unmount-wim /mountdir:c:\pebuild\mount /commit Autostart / Autoexec.bat / Startnet.cmd There is no Autoexec.bat file, however there is file located in the mount\windows\system32 dir called: Startnet.cmd Note: For some reason, editing an image, then saving / commiting it multiple times, causes the image to grow in size ~800Kb / 1000Kb each time.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104204514.62/warc/CC-MAIN-20220702192528-20220702222528-00337.warc.gz
CC-MAIN-2022-27
793
10
https://blog.frankel.ch/
code
This post is part of a serie dedicated on starting development with the Ethereum blockchain. Last week, we finally developed a contract providing some value in the form of a rough-around-the-edges voting application. Ethereum comes with no tools aimed at state-of-the-art software development out-of-the-box. Since this is a huge issue, there's third-party tooling available in the form of the Truffle framework. In web applications, it's necessary to prevent impatient users from POSTing the same data over and over again. For example, to avoid the pain of putting the same item into the basket multiple times because of a browser refresh. To implement that, there's a good practice, called the Post/Redirect/Get pattern. Many people know about Bitcoin, because of its recent rise (and soon crash?). However, Bitcoin is just a currency, albeit a crypto one. As such, it’s of very limited interest to me. But it’s based on the concept of blockchain and that seems to be much more interesting. While there are a lot of resources available on the Web regarding blockchain, they mainly focus on the concept of blockchain, or how it works internally, not so much on how you can as a develo If you already had to manage some degree of randomness on Java, chances are you got acquainted with the Math.random() methods. However, the previous method returns a double. Beyond very basic use-cases, another option has to be considered, in the form of the java.util.Random class. Random An instance of this class is used to gener
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813059.39/warc/CC-MAIN-20180220165417-20180220185417-00633.warc.gz
CC-MAIN-2018-09
1,522
4
https://community.qlik.com/t5/New-to-Qlik-Sense/On-Filter-allow-only-one-selection/m-p/1753080
code
I have a filter with Emplyee_Code. How can I limit an user to select only one value from filter drop down in Qlik Sense ? I do not want user to select multiple Emplyee_Codes in the Filter List. Here i can select multiple selections but i do not want to select multiple selections only one selection should allow. Please provide the solution. What @sunsun566 has wrote to you is the only option you have but the limitation is that it's applied to the whole app. Another option could be using Vizlib filter object, take a look at (https://community.vizlib.com/support/solutions/folders/35000206472%3E) which you can set with the option "only one value selected". Vizlib extensions are free up to 5 users. I hope it can helps. If you don’t want to affect the report. You can add a new dimension, such as EMPCODE_NAME as EMPCODE_NAME_Filter. Then the user can only select a value through EMPCODE_NAME_Filter. 1- Make single selection from Emplyee_Codes 2- Click Edit sheet button on the sheet 3- Click on fields (on left side of the page) 4- Click Emplyee_Codes field, then a dialog box opens 5- Click on fields setting icon and select Always one value selected checkbox. For future reference sake I thought I'd offer this option as well. Since the "Always one value selected checkbox" affects the whole app which includes all states I wanted to find a way that was more dynamic. While not perfect, using the only() function will force the user to turn the filter off before selecting the next value. This can be placed in an aggr() function aggregated by itself to force it back to a dimension. Hi @anthonyj, thanks a bunch for the detailed explanation of aggr(only()), worked like a charm! I had the same motto to make it dynamic affecting the filters only instead of affecting the whole sheet.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100525.55/warc/CC-MAIN-20231204052342-20231204082342-00729.warc.gz
CC-MAIN-2023-50
1,794
18
https://www.teamwox.com/en/teamwox/help/chat/public/index
code
A part of the "Chat" module is the public component that allows to integrate this module into any website. Once the public component is installed, visitor of the website will be able to communicate with the TeamWox users through the chat. All chats are stored within the system. Dialogs that are bound to clients are conveniently displayed on a separate tab when viewing them in the "Organization" module. The TeamWox groupware is protected from spam attacks through the public component of the "Chat" module. After receiving a large number of requests from one IP address, a ban is set for 2 minutes to several hours, depending on the frequency of such requests. To initialize the public component, you should place the "support.html" file containing the following code at your website: <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> You can also set up different parameters of the chat window inside the "window.Chat.init()" function. To obtain the information about clients the following parameters are implemented: This group of parameters mentioned above allows to specify predefined values of fields for clients. Names, mail addresses, phone numbers and company names can be automatically filled in from the details of users registered at your website. At that these fields will be uneditable by clients. The automatic binding of dialogs to organizations by e-mail address functions in the TeamWox system. To make possible the filling in of user details (name, phone, company name, etc.) from the information kept at your website, you should add the digital signature parameter (digital_signature) to the "support.html" file. In the value of the "digital_signature" parameter you should specify the MD5 hash from the concatenation of the used field values (name, company, phone, etc.) and keyword. That keyword will also be specified in the settings of the "Chat" module. In future the checking of digital signature will be performed by the TeamWox system and, in case of success, the fields will be automatically filled out and locked for editing by users. Currently this technology is under development. In order to enable the filling in of information it is enough to assign any value to the "digital_signature" parameter. This parameter is intended for selecting a service group, that will be used as a default one in the login window. If the name of the service group consists of two words, then instead of the space between words you must specify "%20", for example: "technical%20support". Predefined topics for discussion can be created in each group. This parameter is intended for selecting a topic to be used as a default one in the logon window. As the value of this field you can specify only a part of a topic name. The system will automatically search the specified word or phrase among the created topics and select a suitable one. On default, information specified by users when trying to log in to the "Chat" is cached. In order to disable the caching, you should specify this parameter with the "false" value. The default language is the one chosen in the system. To compulsory change the language you should specify one of the following values for this parameter: This parameter allows to filtrate only necessary service groups by the keywords specified in them. In such a manner you can make available only specific groups when calling the chat from a website. We can consider as an example the English page of a website where there is no need in the Russian speaking group. If you specify "english" in this parameter and in the settings of the service group, clients will be able to see only that group. You can specify only one value in the "filter" parameter of the HTML file used on the website. However, you can specify several values in the settings of a service group. Thus, you will be able to receive messages from different websites through one group. Let us consider an example when we have two websites dedicated to different products and one group that provides their support. In this case, in the HTML file for the first website we specify the "product1" keyword: In the HTML file for the second website we specify the "product2" keyword: Then we specify both of these parameters separated by comma in the settings of the service group in the "Keywords" field: product1, product2: Now requests from both websites will be addressed to one service group. Now let us consider another example when we need to delimit the availability of different service groups for different websites. We have three versions of the website: in the English, Russian and Chinese languages. There is the "Support (en/ru)" group for the English and Russian versions and "Support (cn)" group for the Chinese version. We should specify the "en" keyword in the HTML file for the English website: For the Russian version set "ru": For Chinese set "cn": Then in the settings of the "Support (en/ru)" group we should specify the "en" and "ru" keywords separated by comma, and in the settings of "Support (cn)" - only "cn". In this case only the corresponding service groups will be available for the clients on the websites. You should specify the values that are picked up at your website (the information specified by the clients when they register at your website). There can be a situation, when a user should be authorized in the chat (enter the chat) without showing the logon window for specifying personal details. For example, if the user opens the chat from a website profile (being an authorized user), and all the required information about the user is already known (name, email, phone number, etc.). The main technical difference of such entering the chat is the absence of the request for settings to the TeamWox server: service groups, topic in them as well as the module settings (fields displayed in the logon window) are not requested. To login automatically, all the information about the users must be specified (name, phone, email, etc.). Another obligatory condition is the presence of the group_id parameter described below. The following parameters are implemented for the automatic entering the chat: In the value of this field you should specify the identifier of a service group. It is displayed in the title of the window of editing settings of the service group (specified in brackets after the # symbol). Only one identifier can be specified. The automatic login changes the behavior of this parameter as opposed to authorization through the logon window. In this case the whole value of this field will be used as the topic of the dialog. For example, in case the chat is meant to be opened from the user profile, you can specify topic=Question%20from%20user%20profile. This parameter is intended for enabling/disabling the additional fields of the login window: On default, those fields are disabled; and the fact if they're filled or not won't be checked when entering the chat. In order to add these fields, you should specify the sum of their values mentioned above as the value of the "config" parameters. For example, to display the "Company" and "Account" fields, you should specify 6 (4 + 2) as the value of the parameter. To make the automatic authorization possible, you should specify the "autologin" parameter with the value "true". If this parameter is not specified or its value is "false", the automatic authorization will be impossible. To start working you should call this HTML page in a separate window using the following scheme: Prior to starting a dialog, the client must fill out the following form: To start a dialog, it is necessary to press the "Enter" button located below the form. Here is the example of client's dialog window: The upper part of the window contains the dialog itself, the lower part is intended for writing messages. To send a message, one should press the "Send" button or the "Ctrl+Enter" key combination. This window also contains the following controls: In the upper part of the dialog a client can rate the help provided through the chat by the company employees. The following window is opened if you press on the stars: To rate the dialog, click with the left mouse button at the first star and move the cursor to one of the next ones while holding the button. A dialog can be rated by the scale from 1 to 5, the more start are selected the higher the dialog rate is. The rates are displayed in a separate column in the list of dialogs. Reports on the rates are also available in the module.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474650.85/warc/CC-MAIN-20240226030734-20240226060734-00307.warc.gz
CC-MAIN-2024-10
8,561
45
https://craigcav.wordpress.com/2009/07/
code
Monthly Archives: July 2009 I’ve spent the last few evenings catching up on some of the posts on JP Boodhoo’s blog (I’m still gutted that I can’t get the go-ahead from work to attend his Nothin’ but .NET Developer Boot Camp). In one of his posts, JP touches upon an issue that really plagues me; the trap of perfectionism. I’ve often caught myself spending longer than appropriate trying to get something done “right” first time, when it would be far more pragmatic to try the simplest thing that works then refactor. If you catch me doing this (which won’t be hard, I think I do it a lot), you have my permission to slap me! I think the trick is to making this work is doing “the simplest thing” rather than “the first thing that springs to mind that might work”. It’s also important to make small steps and refactor for this approach to work, keeping technical debt to a minimum. It’s definitely something I need to work on. A colleague of mine recently came across Stubs – a Lightweight Stub Framework for .NET and suggested I take a look. Having used both Moq and Rhino Mocks in the past, I was intrigued, and thought I should take a closer look. I may have gotten the wrong end-of-the-stick, but it seems that Stubs uses code-generation to generate stubs, rather than the more typical dynamic code approach used by other frameworks (reflection and expression trees). My initial thoughts are: - I wonder how well the code-gen approach works with TDD? I don’t fancy having to re-run a tool manually every time I create a new interface; the less friction the better! - I generally would tend to favour dynamic code (reflection, expression trees etc) over code-gen unless performance is a key-factor, since this results in less code to maintain. It may be the case that code-gen here can make a significant reduction in execution time of tests in larger code-bases, although it would be interesting to see some stats for this. It would also be interesting to see whether this approach works out favourably on a long-running project (where interfaces are likely to change) as I can see maintenance of the stubs being a potential issue. - It’s good to see Microsoft favouring type-safe code rather than using magic strings as they had in other projects (like asp.net MVC) I seems like this could be an interesting project to keep an eye on, but for the mean-while at least, I think I’ll stick to Rhino Mocks!
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267868237.89/warc/CC-MAIN-20180625170045-20180625190045-00217.warc.gz
CC-MAIN-2018-26
2,445
12
https://docs.firmachain.org/master/node-and-validators-guide/run-a-full-node/specification
code
This document provides the minimum hardware specifications and service port information required in order to join the FirmaChain network. Following are the required hardware specifications to run FirmaChain. - Disk storage - CPU & RAM - Increase maximum open files Details of the respective specifications and information are provided below. There are four strategies for pruning state. These strategies apply only to state and do not apply to block storage. To set pruning, adjust the pruningparameter in the ~/.firmachain/config/app.tomlfile. The following pruning state settings are available: everything: Prune all saved states other than the current state. nothing: Save all states and delete nothing. default: Save the last 100 states and the state of every 10,000th block. custom: Specify pruning settings with the By default, every node is in defaultmode which is the recommended setting for most environments. Apart from disk space, the following requirements should be met. Required Ports to Open: 26656: Listen for incoming peer connections. Additional Optional Ports: 22: Port for SSH access. 1317: Address of REST/API endpoint of the chain. 26657: Address of RPC endpoint of the chain. In general, most operating systems limit the maximum number of files that can be opened. (The document was written based on Ubuntu 20.04 LTS, and the default value of this OS is 1024.) However, if you open /etc/security/limits.confand modify the value as can be seen in the code below, you can raise the limit of the nofile feature * soft nofile 65535 * hard nofile 65535
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510676.40/warc/CC-MAIN-20230930113949-20230930143949-00019.warc.gz
CC-MAIN-2023-40
1,570
27
http://www.gnu.org/software/groff/manual/html_node/Diversions.html
code
gtroff it is possible to divert text into a named storage area. Due to the similarity to defining macros it is sometimes said to be stored in a macro. This is used for saving text for output at a later time, which is useful for keeping blocks of text on the same page, footnotes, tables of contents, and indices. For orthogonality it is said that gtroff is in the top-level diversion if no diversion is active (i.e., the data is diverted to the Although the following requests can be used to create diversions, simply using an undefined diversion will cause it to be defined as empty. See Identifiers. Begin a diversion. Like the de request, it takes an argument of a macro name to divert subsequent text into. The appends to an existing diversion. da without an argument ends the diversion. The current partially filled line is included into the diversion. See box request below for an example. Note that switching to another (empty) environment (with the ev request) avoids the inclusion of the current partially filled line. Begin (or append to) a diversion like the requests. The difference is that boxa do not include a partially filled line in the diversion. Before the box. .box xxx In the box. .br .box After the box. .br ⇒ Before the box. After the box. .xxx ⇒ In the box. Before the diversion. .di yyy In the diversion. .br .di After the diversion. .br ⇒ After the diversion. .yyy ⇒ Before the diversion. In the diversion. boxa without an argument ends the diversion. Diversions may be nested. The read-only number register contains the name of the current diversion (this is a string-valued register). The read-only number register .d contains the current vertical place in the diversion. If not in a diversion it is the same The high-water mark on the current page or in the current diversion. It corresponds to the text baseline of the lowest line on the page. This is a read-only register. .tm .h==\n[.h], nl==\n[nl] ⇒ .h==0, nl==-1 This is a test. .br .sp 2 .tm .h==\n[.h], nl==\n[nl] ⇒ .h==40, nl==120 As can be seen in the previous example, empty lines are not considered in the return value of the After completing a diversion, the read-write number registers dl contain the vertical and horizontal size of the diversion. Note that only the just processed lines are counted: For the computation dl, the requests handled as if box had been used – lines that have been already stored in a macro are not taken into account. .\" Center text both horizontally & vertically . .\" Enclose macro definitions in .eo and .ec .\" to avoid the doubling of the backslash .eo .\" macro .(c starts centering mode .de (c . br . ev (c . evc 0 . in 0 . nf . di @c .. .\" macro .)c terminates centering mode .de )c . br . ev . di . nr @s (((\n[.t]u - \n[dn]u) / 2u) - 1v) . sp \n[@s]u . ce 1000 . @c . ce 0 . sp \n[@s]u . br . fi . rr @s . rm @c .. .\" End of macro definitions, restore escape mechanism .ec Prevent requests, macros, and escapes from being interpreted when read into a diversion. Both escapes take the given text and transparently embed it into the diversion. This is useful for macros that shouldn’t be invoked until the diverted text is actually output. \! escape transparently embeds text up to and including the end of the line. The \? escape transparently embeds text until the next occurrence of the \? escape. Example: anything may not contain newlines; use \! to embed newlines in a diversion. The escape sequence \? is also recognized in copy mode and turned into a single internal code; it is this code that terminates anything. Thus the following example .nr x 1 .nf .di d \?\\?\\\\?\\\\\\\\nx\\\\?\\?\? .di .nr x 2 .di e .d .di .nr x 3 .di f .e .di .nr x 4 .f Both escapes read the data in copy mode. \! is used in the top-level diversion, its argument is directly embedded into the gtroff intermediate output. This can be used for example to control a postprocessor that processes the data before it is sent to the device driver. \? escape used in the top-level diversion produces no output at all; its argument is simply ignored. Emit string directly to the gtroff intermediate output (subject to copy mode interpretation); this is similar to at the top level. An initial double quote in string is stripped off to allow initial blanks. This request can’t be used before the first page has started – if you get an error, simply insert .br before the output is ignored. Use with caution! It is normally only needed for mark-up used by a postprocessor that does something with the output before sending it to the output device, filtering out string again. Unformat the diversion specified by div in such a way that ASCII characters, characters translated with the request, space characters, and some escape sequences that were formatted and diverted are treated like ordinary input characters when the diversion is reread. It can be also used for gross hacks; for example, the following sets register n to 1. .tr @. .di x @nr n 1 .br .di .tr @@ .asciify x .x asciify cannot return all items in a diversion back to their source equivalent, nodes such as \N[...] will still remain as nodes, so the result cannot be guaranteed to be a pure string. See Copy-in Mode. asciify, unformat the specified diversion. However, unformat only unformats spaces and tabs between words. Unformatted tabs are treated as input tokens, and spaces are stretchable The vertical size of lines is not preserved; glyph information (font, font size, space width, etc.) is retained.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711064.71/warc/CC-MAIN-20221205232822-20221206022822-00487.warc.gz
CC-MAIN-2022-49
5,502
92
https://practicaldev-herokuapp-com.global.ssl.fastly.net/wesen/dont-be-arrogantly-ignorant-dont-flame-814
code
There is a widespread tendency in technology to discuss specific programming languages (and their frameworks) with open contempt. Who hasn’t heard people scoff at how stupid PHP is, how backward Java programmers are, and how criminally short-sighted C++ users are? Nothing infuriates me more than this open gatekeeping, this active bullying. Putting people down is not valid technical criticism: its only goal is propping oneself up as part of an elite in-group. It is blatantly exclusionary. Discussing technology should be a dialogue driven by compassion and respect. Not putting in the effort to understand why people made a particular choice, what constraints drove them to it, and most importantly, what lessons you can learn from them. Borrowing the expression from a friend, you are being arrogantly ignorant. Knee-jerk criticism considered harmful Gatekeeping is the act of denying people access to resources that you have access to. When you derisively denounce a programming language as wrong or harmful, you are framing its users as stupid and incapable; you are implying they are not worthy of working in technology and should leave. Such statements show a screaming lack of empathy: everybody starts as a beginner and tries to make the best of what they know — you certainly did, not that long ago. A person learning to program at a young age on their personal computer, with parents in engineering, and then attending a prestigious school is just as worthy of being a programmer as someone attending a boot camp at age 35 and then hustling WordPress themes. Expecting the latter to know about dependent types because the first had the opportunity to work at that level of abstraction is shortsighted at best; privileged, and entitled at worst. PHP is one of my favorite languages, not just because I got into web programming in the wayward days of PHP2, but because of how empowering it is to beginners. When you write PHP, you always have a running website — the language feeds and sustains your motivation. Fighting pip, setting up a remote environment in WSL, and having to learn vim is why many people drop out or feel they don’t belong. With the widespread adoption of WordPress, you can, in a very short amount of time, become a professional developer: building websites for local businesses, selling themes and plugins on its marketplace, or joining one of the many consultancies and freelance marketplaces. It is hard to stress how transformative this can be for marginalized communities and people in countries outside of western Europe and the US. PHP and freelancer.com allowed me to go from making sub-minimum wage to being able to make rent in an afternoon. PHP changed orders of magnitude more lives than Haskell. Gatekeeping as the actual technological sin People write code trying to operate to the best of their capabilities. They make choices according to what they know, the industry's current state, the constraints of the problem they are trying to solve, the pressures of the market, and their personal lives. Viewed through these lenses and given how wildly successful these technologies are shows how capable and driven their users are. The only valid reason to publicly criticize a decision is when it purposefully harms people or was made by someone who fully knew that there was a better choice but chose not to for personal gain. I often went for architecture choices that I thought were not perfect: out of time pressure; to help a colleague grow by having them make their own choices; so I could hire from a broader, more diverse community. Rejecting a programming language outright makes you a poorer technologist. It closes you off to huge, vibrant, diverse communities. The lack of humility causes you to miss the creativity of engaged, practically-minded users. You might never experience the quality of their tools and how good their documentation and onboarding can be. A tool with 200,000 users and 500 contributors will quickly become better than something maintained by 3 people in academia. Beginners who get pull requests on their project in the first week promptly improve their software engineering game. Being dismissive shows that you are missing the larger context of being a programmer: building products, turning concepts into reality, and working and interacting with others. A programmer is much more than a code monkey narrowly defined by their choice of technology. By poo-poo-ing these popular languages and frameworks, not only are you keeping people from becoming better professionals; from having access to the knowledge and resources that you have—you are actively stunting your personal growth. You are staying ignorant out of arrogance. Instead of criticizing, engage and share Of course, valid criticism is essential and healthy. While everything is a matter of choice and compromise, some options are better than others; some decisions are obvious mistakes (in hindsight). Learning new languages and approaches is an essential path to growth. Criticism is valuable when everybody participates in good faith, with mutual respect. One should criticize concrete, technical points—critique shouldn’t be aimed at people and why they made a particular choice. Core contributors to languages such as C, Haskell, Typescript, and PHP have candid, deep, and respectful conversations. They know they each come from a different background, embrace each others’ choices, and know they can learn from them. Instead of putting a language and its users down, consider how you and your interlocutors can enrich each other's lives. We all love programming, working in tech, and learning. If we understand that we each have our journey, skills, motivations, successes, and struggles, we can all make better choices in the future. I will forever remember the day someone on IRC praised me for my janky PHP website and told me that I would enjoy “Structure and Interpretation of Computer Programs” by Abelson and Sussman, which transformed my career. Had they told me I was an idiot, that PHP sucked, and that I should be ashamed for having written such blatant SQL injections, I might never have gotten to where I am today. The next time you feel the urge to criticize something or someone, take a breath and reflect on where that urge comes from: do you want to feel superior, or do you genuinely want to help someone? We should all aspire to make technology more welcoming — the best way to do so is to approach every situation with humility, compassion, empathy, and a love of technology and its communities. If you think you know better, then act like it. Top comments (41) This is just wrong. There are hundreds of reasons for using a bad programming language like PHP: Working on legacy software, being more familiar with the language, simply not knowing any better, having a need for certain language features, etc. Making a statement about a language is not the same as making the same statement about its users, and acting like it is risks completely derailing the conversation. Again, this is just wrong. Nobody should have empathy with a programming language. Thus starts the aforementioned derailing. I have little to add to this, other than saying that I 100% agree. How you end up in programming is nothing more than an interesting story to share with fellow developers, not a sign of how good or bad you are at what you do. And this is where the entire argument starts rolling downhill again. First of all, it is entirely dependent on context whether someone needs to or should be expected to know about these things. If you don't need it for the job, regardless of whether you've spent 20 years in academia or have stacked bricks until two years ago, then there's absolutely no reason to expect that you should know a thing. But of course there's another side to this too: Thanks to the internet, everyone has access to this information. Universities aren't magical; all they really offer is make the decision of what information you need to learn and offer an environment for people to learn. Being self-taught is not an excuse and it shouldn't discourage people from just looking these things up and learning them. On the contrary, our effort should be focused on demystifying these more "academic" concepts. The problem isn't that we keep people out for not knowing certain things. It's that we keep them from learning these things when they absolutely could. Not only is this a very short-sighted oversimplification, even if you narrow it down to just the financial impact these languages have had on developers, it's not like PHP has achieved this success through its many design flaws, but in spite of them. This makes it all the more important to criticise the language for everything wrong with it, in a way that that doesn't really apply to a language like Haskell. Again, this is plain wrong. Your assumption here is that people who reject these technologies without further thought have never, in the past, put in the actual effort of looking at these technologies and evaluating them. But many people have. Most people who say PHP is shit will most likely have worked with it and, through this experience, concluded that they simply do not see any value in the language. So really, what you're doing here is dismissing people's professional experience as "Off-handed" simply because it does not align with your personal attachment to your first language. The only valid reason to publicly criticise a decision is when it was a bad decision. Whether it was made due to malice, incompetence or project constraints, a bad decision has no excuse that shields it from criticism. And yet here you are, defending the language you started out with, attacking those who have moved on to other technologies they like more for daring to suggest that the thing you feel emotionally attached to may be so flawed that some people just don't want to go near it if they can at all avoid it. There is this thing called the Dunning-Kruger effect. The fact that you attribute disagreement with your position to incompetence, ignorance and arrogance gives me a good hint where you roughly are in your learning process. This is what most people are doing already. This is how most conversations about poor choices of technology look like. If your experience is different, then maybe, just maybe it's your surroundings that are being toxic. Sounds to me like you're fighting Windmills here, but again, maybe you're just stuck in some really toxic communities where something like that actually happens. In my world, I can assure you, it doesn't. There is plenty to criticize about PHP, and it's necessary and healthy, but you can do so without implying that people using PHP don't know better. It will also not help anybody make better choices in the future. For example, saying "PHP makes it easy to use and misuse global variables, it is a flaw that has survived mostly to this day" I think is very valid. If you see someone using global variables, there are productive ways of pointing it out. Assuming they should have known, and are responsible for their lack of knowledge, I think lacks compassion. PHP is far from hot garbage. If your past experience left you with that absolutist statement, then I think you are missing out. I very much have strong criticism about any of the technology I use. There is a huge difference between "PHP is hot garbage" and "I think PHP is hot garbage". I'm glad you work in communities where this doesn't happen, but I see this behaviour very often, and I know how much it impacts people who are starting out or who are coming from more alternative paths. Heck, it even kept me from using Rust for years because I got piled on, called irresponsible and outright criminal because I was working in C++. Indeed. And I would agree with both statements. There's plenty of things that make me personally dislike PHP as a language, but there's also a good list of reasons why I think PHP is objectively a bad language. Things like the inconsistency of built-in function names only make it harder to use without adding anything, while features like OOP add something that others enjoy but I don't personally care about. Just like how transformer oil is used by many to deep-fry food. That doesn't automatically mean it's a good or a bad thing, it just means that lots of people do it. A more important question is: Could these same people be achieving even more if they were to use another tool instead? Unsurprisingly. As someone who hasn't tried Rust, the two cliches I predominantly associate with the language are transgender cat girls nyaaa~ and elitism (from my experience, these two seem mostly disjoint though). As far as community involvement goes, most of my experience is with the Lua community, which is rather small, so that may be an important factor. Most of the interactions I've seen are generally more leaning towards "PHP is shit, here's why, here's some alternatives and if disagree I'm curious to hear your opinion" (replace PHP with any other hated technology). In other words, people have the same strong opinions as anywhere else, but with a healthier attitude towards different perspectives. PHP is good at what it does: web oriented OOP. PHP 8 is a joy to use and the ecosystem is insane: there are few web frameworks as good as Symfony out there... Django or Rails don't match Symfony. Some php devs prefer laravel but I personally don't like when there's too much magic. My point is that in the industry, very few teams use php without Symfony or Laravel's tools. They also mostly use things like static code analysis tools to catch edgy errors. Some will argue that if those tools are needed then the language is bad... Maybe, but I don't know any language that would make me more productive than PHP and Symfony for doing SOLID server-side programming, not even nodejs. Slack dev team wrote a great article about why they they came back to PHP for their server side stuff. Thinking a bit further, "I think PHP is hot garbage" is much less valuable an opinion to hold as "I think PHP is hot garbage because I ran into these issues XYZ, and PHP made it possible. It wouldn't have happened if we had used W, etc...". When I dislike something, I try to think very deeply about it, often read old bug reports and commits to see why someone built something a certain way. I often learn something about the context in which a decision was made. It doesn't change the technical impact, or that certain things should be avoided, but it is a richer, deeper approach to technology. As I already said though, assuming that other people, just because they don't want to give you the full essay on why they hate what they hate, haven't also done the exact same thing and put in a lot of thought seems like you have a rather low opinion of your fellow developers. Sure, there's always some knobheads who just hear that a thing is bad and repeat it because it's what they heard, but I don't think it's the majority of criticism, at least not in any online space worth staying in. Thanks for the conversation, and you have a good point there. People can definitely make broad inflammatory statements out of frustration, certainly I did with this article. But I think it's easy to forget how hostile technology can be, especially for people who don't fit the usual mold. I have been mentoring quite a few people as well as hanging out in a lot of communities, and daily I will see someone explicitly putting not just a language down, but its users, often personally and viciously. I also hear the impact it has on people who come from very different backgrounds, and don't have the confidence to ignore hot takes. If you don't like a technology, and genuinely want to help people move away from it and get better, I think it's vital to check yourself and see how you can be productive. For example, I genuinely want to hear what you like about Lua, what you dislike about PHP, and vice versa. Now, when I'm talking to my buddies in private, flame away, since they know where I'm coming from. There is also value in practicing how to communicate these kinds of criticism at the workplace. That's for example why I wrote my article about RFCs. I definitely have a very high opinion of my fellow developers, and the only thing I find despicable is bullying and putting the work of others down. I'm definitely trying to find my voice with these articles, my "just be kind" takes on the problem got a very different traction than the more forcible ones. Talking with you helps me refine what I take, and indeed, be more empathetic myself. The point I wanted to make with "public" criticism is that there are people listening that might take your words differently than just "someone doesn't like XYZ because of their experiences". The latest experience that ultimately making me write this article was being at a conference, and hanging out with people who out of grad school got a haskell job, calling java programmers "brainless drones that can only program because of their IDE." What I might expand upon with regard to rejecting technologies say, on their pure technical merits, misses a lot of what programming and technical strategy is in practice. There is always a larger context, and for example WordPress, as much as a despise it when I bang my head against its database schema, is a reasonable choice for say, a small business that wants to self host. As is JAva if you come into a big, completely delusional codebase entirely written in Java. That might of course not be the kind of work you want to do, and noone forces you, but it's definitely not worth such harsh words. This. You like PHP? Okay, great, keep doing it. But don't pretend like all languages are same because they clearly aren't. You can't compare a language which was designed in a small period of time as a small group of utilities with a language designed by people with PhDs in a long period of time and which is used for completely different purposes. Of course you can compare them, that's fruitful. PHP has also tremendously evolved since the early days. If anything, I benefit a lot from my knowledge of haskell and functional programming / category theory concepts when writing PHP. The article is not about any technology, but the fact that putting down a language in order to make yourself seem smarter is harmful. I love both PHP and Haskell. What I don't like is Haskell programmer thinking PHP programmers are idiots, or, conversely, PHP programmers thinking Haskell programmers are ivory-tower headscratchers that don't know how to ship stuff. Plenty of very smart people have invested a lot of time and effort into both ecosystems. It has evolved but it's nowhere near the Haskell's level. That's a fact. I'm not saying it should be though - they are made for different purposes. Both serve their needs. 100%. In many ways, Haskell's strength is to be a playground of evolution, while PHP benefits from keeping its roots, as ugly as they might be. A big strength of PHP is the existing ecosystem around it and its widespread adoption, partly because a lot of messy legacy systems are still around and run "fine" (fine as in, they work well enough that nobody has replaced them with something else). I love experimenting and prototyping in Haskell, writing what I thought would be a simple API server with servant really did my head in. There are many concepts I experiment with in Haskell that I can easily transpose to PHP. I have a feeling you might enjoy Lua 😅 I had some good times with pico8! Made a couple of games with it. Quite a few of my buddies are into it, I haven't fully had the need for it so far, but it is quite enticing indeed. I was planning on building some with fennel-lang.org this summer on my sabbatical, but of course many other things were interesting too. The problem with gamedev is that your code turns to garbage super quickly. And sadly coroutines are quite expensive on pico8, if i remember correctly: I heard great things about the JIT but never looked closely into it. The landscape of languages that compile to Lua is also quite interesting; there's at least two lisp dialects (urn and fennel), a coffee-script-like with two different dialects (moonscript and yuescript) and even an ML-like (amulet) My current "language I want to make some money with so I can call myself a pro" is rust, which I finally picked up after being turned off of it for a while. It's really a solid improvement over C++ in the bare-metal / embedded space. After that, Lua is high on the list (or retirement, hopefully :). Any resources you particularly enjoy? Great post, well written, this deserves more likes! I think that the tendency of people to put others down (and big themselves up) mostly stems from their own insecurities, and nagging feelings of inferiority ... psychology 101 :) It's a form of bullying, not that different from classical schoolyard bullying, and driven by the same motivations. I think once people realize this, they might be inclined to stop doing it - as it's not a good look at all, ultimately you're just putting yourself down. Not even that, it's simply the ego being dumb. No true engineer will ever admit publicly that someone else has a better solution than he has. Well then I'm not a true engineer, because if I see that someone came up with a better solution then it's easy for me to admit so ;-) then you are not a true engineer and the maxim holds true Haha nice one, a classic fallacy ... no "true" engineer would ever admit they're wrong! Anyway, some people (and I tend to agree with them) say that "software engineer" is a bit of a misnomer - what most of us do is probably more "art" than "science" ... so, personally I rarely (if ever) use the "software engineer" moniker for what I do, "software artisan" comes closer, but I'll simply stick with "developer" :-D More than art, I'd just call i tinkering. Large parts of the potential artistic side of programming usually gets destroyed by business goals and what we end up with is FizzBuzz Enterprise Edition. Yeah lol not even "art", tinker is what we do :-D Personally I say that we are like journalists. We are bombarded with problems all the time we don't know much about, and our main skill is to investigate and to learn whatever is needed Hadn't looked at it that way, but when I have to maintain old legacy code I feel more like an archaeologist :) I love legacy code. You can look at weird stuff and then look at the git log and who worked on it and recognize how it came to be. It's fascinating. It is indeed! The tragedy however is that we'll then be inclined to proceed and replace that poor old cute legacy code with shiny new start-of-the art hipster code, lol ... And be just one more commit for the next archeologist to find :) I know I was prone to flaming when I was a teenager, and I wish I had known better at the time. Being inclusive, pragmatic and welcoming is now one of the things dearest to my heart. What is your take on flaming? The reason for my dislike of said languages is their frailty, that makes too easy to introduce bugs. For example, the fact the PHP and JS try to convert everything in everything else is, in my opinion, a huge issue. Someone could find it convenient, in my experience a strongly typed language catches many bugs already at compilation time. I am willing to pay flexibility to get back resiliance and reduced debug times. C gives you a lot of freedom, too much, in my opinion. C assumes that you know what you are doing and trust you; with time I maturated the idea that this assumption of C is too optimistic: people make error, even professionals with lots of experience do; therefore, you need a language rigid enough to prevent you from doing silly mistakes (which are the huge majority of mistakes out there). Someone sells C saying that being so low-level is very efficient; but I am quite skeptical. With modern CPU is not so obvious what is more efficient and, moreover, many "C optimization by hand" construction (i.e., using i=i+1) are easily done by optimizers (this kind of optimization were common already in the 80's), C++ attaches the complexity of OOP over the frail basis offered by C. Said that, this says nothing about who uses PHP, JS, C or C++. Maybe you use it because you cannot help (if you want to do web programming there is not much choice); maybe you see as an advantage what I see as a big issue (type "volatility" of PH/JS or the flexibility of C), maybe there is some other reason; honestly, I do not care. It is as with food: I like truffles, but maybe you find their aroma too strong. OK, who cares? If we know each other since long time and are friends, I could tease you for your choice of programming language (and you could do the same with me), but it is more a "bro-like" joking and none get offended. In case you are curious, if I get to choose the programming language, I use matlab (octave, actually) for number-crunching, Ruby for scripts and fast-and-dirty stuff and Ada for programs of medium to large complexity and/or very long lived. I think maybe I need to formulate my point a bit differently, because I think we completely agree. But saying “JS is flaming hot shit and people who use it are destroying the web” (you wouldn’t believe how common that is), is lazy and ignorant. I think even just saying “JS is flaming hot shit” without saying “I think JS is flaming hot shit” is insulting to JS users, and it also closes you off to some of the good things in JS. For example, I like C++ quite a bit, but I use almost no OOP patterns in it. I use the templating to enforce strong constraints on my types (for example to dismantle type coercion), and abstract virtual classes as more of a “trait/interface” like pattern. Discussing C++ at that level, comparing it do Ada and how you can use either language to enforce constraints, pre conditions, etc… Great discussion, and we both know neither language is shit, nor are its programmers. Matlab/octave is one of the languages I often see get shit as well. Mention matlab and someone is bound to say it’s utter garbage because arrays start at 1 or some nonsense. That’s what I am addressing in this article. People who flame like that and choose to stay ignorant, should never become parents. Young children, especially babies, are dependent on guidance and support for growth. With the attitude of ignorant aggressive bullies, these children would perish within two weeks. THAT is how fragile a child's life is. And why would we think that in our adulthood we would be less susceptible to this behavior and attitude? It is devastating! That's also why the "ubuntu" mentality has been adapted by a broad range of acumen in IT. When one wins, everyone should win. If one is let down, we all should feel as if it's us that is suffering. Arrogance is a spirit killer. No good comes from it. And it should be a focus to eradicate it everywhere, especially on the work floor. We've seen millennia of years of results of what arrogance leads to. It's the single most attributing factor leading up to fights, wars, conflicts everywhere. And if arrogance is all you've got, I pity you. Because that means you've never learned to grow up. You think you're big and important, but all you are is a miserable piece of burden. We all have our struggles, we all have our past and we all have our opportunities to cease every day. That makes us unique. Not better, not worse. Unique. So nobody is having a head start or is winning. You might ace in fields and suck in others. That's fine. But don't bring others down because of their struggle in areas where you thrive. The Netiquette is something less and less people are aware of. It should still be the standard online. PHP, Java, Python, C++, etc. get a lot of hate, because they are so popular that you're guaranteed to come across absolutely atrocious code. Unfortunately, capitalism rewards quality products/services not quality code. On top of that, most devs only master one language/stack. Also, the SO survey doesn't lie. Some languages are truly awful. Like C++. What I was thinking while reading this was, ok there are toxic communities out-there. this guy seems to be fighting that. Just to reply an specific: I kinda disagree here. In the end, personal preferences matter. If you just don't feel comfortable in a language/ecosystem you better change to another one you do like. Personal example: I do not like python (the ecosystem, the tools, the docs), so I avoid it as much as i can - I'm just happier with js. It does have use cases, but If the decision is on me, I will try other alternatives ==== EDIT ==== I've just read again your quote: you said " rejected a p. language outright" So I do agree xD I was replying to : "rejecting a p. language makes you...." My point is: you can have preferences and avoid those tools you just don't like... But extremism is always a bad thing 👍 That's totally fair. But saying "python is hot garbage" makes you miss potentially miss out on say, the jupyter ecosystem, maybe new patterns and libraries, or just being able to maintain a python codebase when needed. Of course, you don't have to do any of those things, but there is a difference between "python is not for me, I have better uses for my time" and "python sucks and there is no value whatsoever in it." I personally have strong distaste for python, especially for bigger projects, but I see the good in it, and surely if someone comes to me with a cool python project I won't reject it outright because it's in python. Arguing passionately about programming languages has been around since the second language was introduced. I've lived through 47 years of the phenomenon and never have tired of participating. VB.NET is your gig? I have empathy. My advice? Move on from that job. The arguments expose the pros and cons of languages, which are helpful the next time you choose one for a project. In the 80s, the emphasis was on speed and memory. That's something I still take seriously. You won't find me writing code that's interpreted or JITed or garbage collected when high bandwidth or transaction counts are involved. I'm saving the company money and doing my part for the planet. I don't begrudge anyone of their languages of choice. Most are faster to develop and maintain. If I wanted to understand data science, I'd start learning Python. I've done an awful lot of Windows and browser programs in C#.NET and enjoyed it. The right tool for the job is the thing. Having said that, VB still needs to be eliminated from computing. 😀 Wow, perfect article! I'm a beginner too and it's almost common to see arrogant people idolizing X technology. I think that many time people appear to be experienced but don't know basic things! You should rewrite this article in rust… I think I agree with the main sentiment here. Thanks for writing! I needed it so much 🥺 Does this mean we can't hack NASA anymore with the beginners? I was just adding Starlink hack to that fun hack... Hello Manuel Odendahl, thanks for your article. It's easy to read and feels very emotional without being offensive, which I respect a lot. I agree with "Discussing technology should be a dialogue driven by compassion and respect.". I also don't like gatekeeping and I think it's a lack of education on how to approach issues without being harmful. I once heard an interesting phrase that goes like this: "Don't criticize beginners but help them grow because a beginner doesn't yet have the knowledge to understand criticism or if the criticism is even valid." Some comments may only be visible to logged-in visitors. Sign in to view all comments.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00415.warc.gz
CC-MAIN-2023-14
31,793
156
https://www.e-education.psu.edu/geog160/node/1935
code
Innovators in many fields, including engineers, computer scientists, geographers, and others, started developing digital mapping systems in the 1950s and 60s. One of the first challenges they faced was to convert the graphical data stored on paper maps into digital data that could be stored in, and processed by, digital computers. Several different approaches to representing locations and extents in digital form were developed. The two predominant data representation strategies are known as "vector" and "raster." Recall that data consist of symbols that represent measurements. Digital geographic data are encoded as alphanumeric symbols that represent locations and attributes of locations measured at or near Earth's surface. No geographic data set represents every possible location, of course. The Earth is too big, and the number of unique locations is mathematically infinite. In much the same way that public opinion is measured through polls, geographic data are constructed by measuring representative samples of locations. And just as serious opinion polls are based on sound principles of statistical sampling, so, too, do geographic data represent reality by measuring carefully chosen samples of locations. Vector and raster data are, in essence, two distinct sampling strategies: vector and raster. The vector approach involves sampling either specific point locations, point intervals along the length of linear entities (like roads), or points surrounding the perimeter of areal entities (like water bodies such as lakes or oceans). When the points are connected by lines or arcs, the sampled points form line features and polygon features that approximate the shapes of their real-world counterparts. Click the graphic above to download and view the animation file (vector.avi, 1.6 Mb) in a separate Microsoft Media Player window. View the same animation in QuickTime format (vector.mov, 1.6 Mb) here. Requires the QuickTime plugin, which is available free at the Apple Quicktime download site. The aerial photograph above left shows two entities, a reservoir and a highway. The graphic above right illustrates how the entities might be represented with vector data. The small squares are nodes: point locations specified by latitude and longitude coordinates. Line segments connect nodes to form line features. In this case, the line feature colored red represents the highway. A series of line segments that begin and end at the same node form polygon features. In this case, two polygons (filled with blue) represent the reservoir. The vector data model is consistent with how surveyors measure locations at intervals as they traverse a property boundary. The vector strategy is well suited to mapping entities with well-defined edges, such as highways or pipelines or property parcels. Many of the features shown on paper maps, including transportation routes, rivers, and political boundaries, can be represented effectively in digital form using the vector data model. The raster approach involves sampling attributes for a set of cells having a fixed size. Each sample represents one cell, or pixel, in a checkerboard-shaped grid, as shown in Figure 4.14 below. The cells shown are square, but raster data can be generated with any regular subdivision into interconnected, non-overlapping cells that are identical in shape. While most raster data use square cells, rectangular and hexagonal cells are also encountered. Click the graphic above to download and view the animation file (raster.avi, 0.8 Mb) in a separate Microsoft Media Player window. View the same animation in QuickTime format (raster.mov, 0.6 Mb) here. Requires the QuickTime plugin, which is available free at at the Apple Quicktime download site. The graphic above illustrates a raster representation of the same reservoir and highway as shown in the vector representation. The area covered by the aerial photograph has been divided into a grid. Every grid cell that overlaps one of the two selected entities is encoded with an attribute that associates it with the entity it represents. Actual raster data would not consist of a picture of red and blue grid cells, of course; they would consist of a list of values (either categorical or numerical), one value for each grid cell, each number representing an entity. For example, grid cells that represent the highway might be represented with the value "1" or “H” (either of which could be used to represent the highway category) and grid cells representing the reservoir might be coded with the value "2" or “R” (representing the reservoir category). The raster strategy is a smart choice for representing phenomena that lack clear-cut boundaries, such as terrain elevation, vegetation, and precipitation. Digital airborne imaging systems, which are replacing photographic cameras as primary sources of detailed geographic data, produce raster data by scanning the Earth's surface pixel by pixel and row by row. This will be discussed in more detail in Chapter 8, Info Without Being There: Imaging Our World. Both the vector and raster approaches accomplish the same thing: they allow us to represent the Earth's surface with a limited number of locations. What distinguishes the two is the sampling strategies they embody. The vector approach is like creating a picture of a landscape with shards of stained glass cut to various shapes and sizes. The raster approach, by contrast, is more like creating a mosaic with tiles of uniform size. Neither is well suited to all applications, however. Several variations on the vector and raster themes are in use for specialized applications, and the development of new object-oriented approaches is underway. Registered Penn State students should return now take the Chapter 4 practice quiz in Canvas to take a self-assessment: Vector Versus Raster. You may take practice quizzes as many times as you wish. They are not scored and do not affect your grade in any way.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817014.15/warc/CC-MAIN-20240415174104-20240415204104-00523.warc.gz
CC-MAIN-2024-18
5,970
13
https://forum.sunstone.com/viewtopic.php?f=4&t=51050&sid=0435156f2298a94e9817e6a731f4a02e
code
A bus is a group of wires representing a bit vector. Rather than drawing and/or labeling the individual wires in a schematic, you can draw a single "bus wire" to represent all of the wires. This visiwiki page does an adequate job of explaining the concept and the schematic notation. https://vlsiwiki.soe.ucsc.edu/index.php ... _schematic Adding a bus construct to PCB123 is on the roadmap, to be sure, but as of today (6/6/2016) has not yet been put on the developer's schedule.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571086.77/warc/CC-MAIN-20220809185452-20220809215452-00453.warc.gz
CC-MAIN-2022-33
479
4
https://www.starsystem.biz/en/cloud-technologies/server-virtualization/
code
“Cloud” and “on site” design What is server virtualization? Virtualization systems indicate the possibility to abstract some IT services from their respective dependencies (networks, storage systems and hardware), enabling the execution of multiple virtual operating systems on a single physical machine, but remaining distinct. The “host” operating system (the host) actually creates a sort of partitioned hardware by running multiple “guest” operating systems (the guests). In fact, the lower part of the software stack is occupied by a single instance of an ordinary operating system that is installed directly on the server. Above this, a virtualization layer handles redirection and emulation, which in turn composes the virtual computer. The combination of these two lower layers is then called the host. The host provides the various features of the computer up to the BIOS level and is able to generate virtual machines (and independent) of your choice, based on user-defined configurations. The advantages of virtualization These are just some of the benefits of a well-designed virtualization solution: - Reduces implementation and management costs by consolidating hardware - Reduces the energy consumption of the entire data center - locate resources dynamically when and where needed - Dramatically reduces the time needed to implement new systems Easy testing and debugging of controlled environments An undeniable advantage of the virtualized structure is the ability to make a really complete backup of the machine, including therefore the operating system settings, which are often the most critical part to restore on some servers. Another important advantage is the great simplicity with which you can manage the technological evolution. If a hardware system becomes obsolete, it is possible to migrate the servers to the latest generation of machines in a fairly easy way (among other things, gaining in performance) without having to reinstall everything, but only by reinstalling the emulated layer and restoring the files of the virtual machines. Not to mention the ability to perform offline tests in a very simple way, to make the migration even more linear. The need to virtualize systems stems from the awareness that a virtual server uses much better resources at its disposal – processors, memory, disk – than a physical server, especially in the case of high reliability configurations with an active and a passive server. Moreover, it could be the solution for those companies that have CED of small size, consisting of a few RACs (network, storage and server), without the possibility of adding other cabinets and air conditioners. How it works Operating systems and applications running on virtual servers do not have direct control over resources such as memory, hard drives and network ports. Instead, the virtual machine between them intercepts requests for interaction with the hardware. On the market there are solutions that are able to “simulate” a configuration that has only a vague resemblance to the hardware actually below. For example, the host could initialize the process of a SCSI controller down to the smallest detail, convincing the guest operating system, even without the actual existence of any SCSI controller. In fact, it makes IDE drives look like SCSI drives, converts network shares about locally connected storage, converts a single Ethernet adapter into multiple adapters, and creates gateways between older operating systems and modern unsupported hardware, such as for Fibre Channel adapters.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00597.warc.gz
CC-MAIN-2023-14
3,580
15
http://www.aspmessageboard.com/showthread.php?187467-Problem-with-an-object
code
I have a form. On the form are multiple fields that the name only varies by a number (txt_issues1, txt_issues2, etc.) My form has a button that opens up a new window. I can select data in the new window, and want it to pass back to the original form into a specific one of my text fields. The only info I have about which text field is the number. I tried this code:<BR><BR>//This field hides the corresponding number for the field<BR>tmphidden = document.frmISSUES.text1.value;<BR><BR>//tried to concatenate the 2 fields to give me the field from the original form<BR>tmpvalue = "txt_Issue" + tmphidden<BR><BR>//then tried this to move it over<BR>window.opener.document.frmTmSht.tmpvalue.v alue = document.frmISSUES.Cbo_Issue.value;<BR><BR><BR><BR >If I hard code a specific field in it works, but I don't have the specific field just the number. How can I use that number to tell which specific field to pass back to?
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720615.90/warc/CC-MAIN-20161020183840-00074-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
919
1
https://stupidtom.com/2010/07/10/more-random-still-off-my-game/
code
Big Bald low-fives Bigfoot The whole fam damily Outside of the Goonies jail The boy in our hotel I hate pictures without people in them so I made Maggie present the view Because neither of us wanted to climb the spiral staircase inside this tower and for the record the family is on the top but most are backs stuck to the wall. Mom went to the falls with them the next day while I worked on wedding stuff Oh crap, out of order, that’s me from the tower
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204969.39/warc/CC-MAIN-20190326095131-20190326121131-00394.warc.gz
CC-MAIN-2019-13
455
8
https://info.snyk.io/paved-road-container-kubernetes-security-webinar
code
Snyk is excited to share our virtual airwaves with Docker Captains - some of the top experts in the world of containers and Kubernetes! They’ve spoken at events all over the world, written books, delivered training and workshops, and contributed to the open-source community and code. Security and DevOps folks - join to hear their advice for building and deploying secure applications using containers and Kubernetes. - What are the best practices for building containers with minimal vulnerabilities? - When you do have vulnerabilities - because of course you will - how do you get rid of them?! - Is there a general best practice for selecting and “blessing” base images for dev teams to use and build upon? - Kubernetes has all sorts of knobs and levers for security, but none of them are switched on or enforced by default… where do you start? - How do security teams and developers work together to achieve all of the above so that neither of them gets an unpleasant surprise and the pace of delivery remains high?
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703538082.57/warc/CC-MAIN-20210123125715-20210123155715-00556.warc.gz
CC-MAIN-2021-04
1,028
7
http://www.slideshare.net/niitstudentcare/ajs-4-c
code
Tips & Tricks Ajs 4 c Like this presentation? Why not share! Social SEO and Cross Channel Marketing by Billy Cripe, CIP Wrox Professional Microsoft Share... 4 must-do steps for successful soci... by Deeply Digital by Wenda Lyons by Paul Gillin Scg skyfollow social media sensing ... by Chris Rigatuso @c... Email sent successfully! Show related SlideShares at end Ajs 4 c , Software Developer, Web Developer Jun 04, 2012 Comment goes here. 12 hours ago Are you sure you want to Your message goes here Be the first to comment Be the first to like this Number of Embeds No notes for slide Ajs 4 c 1. CollaborateKnowledge Byte • In this lesson you will learn about: • Security Tools • keytool • jarsigner • policytool ©NIIT Collaborate Lesson 2B / Slide 1 of 23 CollaborateSecurity Tools • The Java 2 SDK provides various security tools to prevent malicious applets from performing hazardous operations, such as reading files from or writing files to a local computer. • The Java 2 SDK provides three different tools for ensuring security while running applets in a network: • keytool • jarsigner • policytool ©NIIT Collaborate Lesson 2B / Slide 2 of 23 CollaborateSecurity Tools (Contd.) • The keytool Security Tool • The keytool security tool is used to manage a keystore of private keys and the associated certificates that are used for authenticating the corresponding public keys. • An end user can administer their own public/private key pairs and certificates associated with them for self-authentication. • Public key is mainly used for enciphering the message and is distributed to a user requesting for it. • The private key is used for deciphering the message encrypted using public key but is kept secure. • A keystore is implemented as a file that stores the keys and their corresponding certificates. • A keystore guards the private keys by using a password. • A certificate represents a digitally signed statement that indicates the specified value of a public key. ©NIIT Collaborate Lesson 2B / Slide 3 of 23 CollaborateSecurity Tools (Contd.) • The keytool Security Tool (contd.) • The various roles of a keytool are: • Generates public/private key pairs. • Issues certificate requests in order to send them to a Certification Authority. • Imports certificate response retrieved from the Certification Authority. • Designates public keys that belong to other trusted parties. • A keystore file contains two different types of entries: • Key entry: Stores sensitive data about the private keys in an encrypted format in order to prevent the unauthorized access from malicious end users. • Trusted certificate entry: Holds a public key certificate, also called trusted certificate that belongs to another end user. ©NIIT Collaborate Lesson 2B / Slide 4 of 23 CollaborateSecurity Tools (Contd.) • The keytool Security Tool (contd.) • An entry in a keystore is accessed using unique aliases. • You can use the genkey command to generate a public/private key pair. • You need to use the import command to add a certificate in the list of trusted certificates. • You can use the following command to generate a new public/private key pair with a self-signed certificate that uses don as an alias: keytool –genkey –alias don –keypass donpassword • You can also change the private key password associated with the specified alias by using the following command: keytool –keypasswd –alias don –keypass donpassword –new newpassword • You create a keystore by using the –keystore option in the keytool command or by using the –genkey and -import commands. ©NIIT Collaborate Lesson 2B / Slide 5 of 23 CollaborateSecurity Tools (Contd.) • The keytool Security Tool (contd.) • The following table lists the options used with the keytool command: Option Description -genkey Generates a public/private key pair. -import Reads the specified certificate and stores it in the keystore. -export Exports the required certificate associated with the specified alias. -list Displays the content of the whole keystore. ©NIIT Collaborate Lesson 2B / Slide 6 of 23 CollaborateSecurity Tools (Contd.) • The keytool Security Tool (contd.) Option Description -storepasswd Modifies the required password that guards the integrity of the keystore. -keypasswd Modifies the required password that protects a key associated with the specified alias -delete Deletes the content of the specified keystore ©NIIT Collaborate Lesson 2B / Slide 7 of 23 CollaborateSecurity Tools (Contd.) • The jarsigner Security Tool • The jarsigner tool is used to generate and verify digital signatures for Java ARchive (JAR) files by using certificates from a keystore. • A digital signature of a message is a set of numeric values that are dependent on the value of a private key known only to the generator of the signature. • The jarsigner tool generates digital signatures for JAR files by using the private key and certificate information from a keystore, which is managed by the keytool. • The jarsigner verifies the digital signature of a signed JAR file by using the certificate. The following syntax shows how to sign a JAR file: jarsigner <filename.jar> <username> • You can use the following command to sign a JAR file: jarsigner myFile.jar mary ©NIIT Collaborate Lesson 2B / Slide 8 of 23 CollaborateSecurity Tools (Contd.) • The jarsigner Security Tool (contd.) • The following table lists the options used with the jarsigner tool Option Description -storepass Indicates the required password for accessing the keystore. -keypass Indicates the required password for protecting the private key of an alias entry of a keystore. ©NIIT Collaborate Lesson 2B / Slide 9 of 23 CollaborateSecurity Tools (Contd.) • The jarsigner Security Tool (contd.) Option Description -signedjar Indicates the required name for signing the JAR file. -verify Verifies the JAR file. -verbose Provides additional information required for signing and verifying the JAR file. -certs Provides certificate information about the signer of the jar file. The –certs option is used in conjunction with –verify and -verbose options for signing and verifying the JAR file. ©NIIT Collaborate Lesson 2B / Slide 10 of 23 CollaborateSecurity Tools (Contd.) • The jarsigner Security Tool (contd.) • You can use the required keystore by specifying the URL of the keystore with the –keystore option in the jarsigner command. • The jarsigner tool signs a JAR file using the Digital Signature Algorithm (DSA) with the SHA-1 digest algorithm, if the public and private keys are DSA keys. • The output produced on signing the JAR file using the jarsigner tool is exactly same as the input JAR file. • However, the output contains two additional files, signature file and signature block file in the META-INF directory. • A signature file contains an .SF extension and a signature block contains a .DSA extension. • The .SF file contains the information, such as filename, name of digest algorithm used, and the digest value. • The .DSA file contains the signatures in encoded form and certificate from the keystore to authenticate the public key. ©NIIT Collaborate Lesson 2B / Slide 11 of 23 CollaborateSecurity Tools (Contd.) • The jarsigner Security Tool (contd.) • The verification of a JAR file includes the following steps: 1. Verify the signature of the .SF file by ensuring that the signature stored in a .DSA file is generated by using the private key. This private key needs to correspond with the public key of the certificate that appears in the .DSA file. 2. Verify the entries for digest mentioned in the .SF file with the corresponding entry in the manifest file. The verification process matches the hash entry made in the header of .SF file with the manifest file. 3. Read all the files, which contain an entry in the .SF file of the JAR file. While reading the files, the file digest needs to be computed and compare the results with the manifest file. The verification fails, if the digests do not match. ©NIIT Collaborate Lesson 2B / Slide 12 of 23 CollaborateSecurity Tools (Contd.) • The policytool Security Tool • The Java runtime environment provides various policies that specify the different permissions required for accessing code by different users. • The information regarding the policy implementation is available in the static policy configuration files. • A user policy file is stored in the home directory of user by the name .java.policy. • You can create a policy file by typing the required commands in a text editor or by using the GUI-based policytool utility. • You can also edit and remove the settings applied in a policy file, such as policy entry, Principals, and permissions. ©NIIT Collaborate Lesson 2B / Slide 13 of 23 CollaborateFrom the Expert’s Desk In this section, you will learn: • Best Practice on: • Advantages of Using MDB over JMS in J2EE Applications • Tips and Tricks on: • Working with Java Security Infrastructure • FAQs on Cryptography ©NIIT Collaborate Lesson 2B / Slide 14 of 23 CollaborateBest PracticesAdvantages of Using MDB over JMS in J2EE Applications • JMS API introduces a middle layer in between the JMS producer and JMS consumer that helps in asynchronous messaging. • The middle layer in the JMS API enables you to send the messages to multiple JMS consumer. • Using the JMS API, a number of JMS consumers can receive messages from a single JMS producer. ©NIIT Collaborate Lesson 2B / Slide 15 of 23 CollaborateBest Practices (Contd.)Advantages of Using MDB over JMS in J2EE Applications (Contd.) • A single JMS consumer can also receive messages from multiple JMS producers. • MDB enables you to consume and process messages concurrently. • You use MDB to manage resources, transactions, and security in a multithreaded environment. ©NIIT Collaborate Lesson 2B / Slide 16 of 23 CollaborateTipsWorking With Java Security Infrastructure • The various tips for implementing security in Java applications are: • Execute the Java programs within the security manager. AppletViewer and Java-enabled browsers contain a default security manager attached to them. You can install a security manager by including the flag, Djava.security.manager at the command prompt while starting the Java. • Use a digital certificate to sign a .jar file, to setup a SSL server, or to perform encryption of messages to be transmitted. • Use the Java plug-in tool to support the Java 2 security model environment for the browsers that do not support this model. ©NIIT Collaborate Lesson 2B / Slide 17 of 23 CollaborateTips (Contd.)Working With Java Security Infrastructure (Contd.) • Install the security extensions for providing Java security infrastructure, such as JCE, JSSE, and JAAS. Java Cryptography Extension (JCE) is used in applications that require strong encryption. Java Secure Sockets Extension (JSSE) is used to provide a Java interface to SSL. Java Authentication and Authorization Service (JAAS) is used to authenticate and authorize end users. • Verify SSL server names while installing the JSSE security extension. • Customize the implementations according to an enterprise by defining the implementation of various Java classes. • Use the correct parameters while encrypting data using algorithms in JCE API, such as DES and Blowfish. ©NIIT Collaborate Lesson 2B / Slide 18 of 23 CollaborateFAQs • How is cryptography applied? Cryptography is applied using keys. Cryptography is categorized into symmetric cryptography and asymmetric cryptography. The technique that uses the same key for both encryption and decryption of data is called symmetric cryptography. Asymmetric cryptography is a technique that uses public/private key pairs for encryption and decryption of data. ©NIIT Collaborate Lesson 2B / Slide 19 of 23 CollaborateFAQs (Contd.) • What is the importance of cryptography? Cryptography is used in a variety of applications. The various applications of Cryptography are: • Used for storing passwords, as the passwords need to be stored in an encrypted form. • Guards the data stored in a computer against malicious attacks by encrypting the complete files. • Used in electronic commerce (e-commerce) for encrypting data to be transmitted over the whole network. • Controls access to satellite and cable TV by encrypting the signals to be transmitted to multiple receivers. • Used in telephones by encrypting voice at sender end and decrypting the voice back at receiver end. ©NIIT Collaborate Lesson 2B / Slide 20 of 23 CollaborateFAQs (Contd.) • How many standard time zones exist? There are 25 standard time zones. An extra time zone for UTC+12 hours and UTC-12 hours also exist. • What is the use of locale? A Locale object provides information about the specified cultural and geographical region. ©NIIT Collaborate Lesson 2B / Slide 21 of 23 CollaborateChallenge • You can have any number of Principals associated with a Subject. (True/False) • The ________ method of JMS must be called to receive messages synchronously. • JMS supports _________ and ________ messaging models. • Which of the following represents a set of numeric values that are dependent on the value of a private key and is known only to the generator of the signature? a) Public key b) Digital signature c) Digital certificate d) Algorithm 5. An untrusted applet enables you to perform operations, such as reading and writing data to a local computer. (True/False) ©NIIT Collaborate Lesson 2B / Slide 22 of 23 CollaborateSolutions to Challenge • True • receive() • Point-to-Point, Publish/Subscribe • b) Digital signature • False ©NIIT Collaborate Lesson 2B / Slide 23 of 23 Email sent successfully..
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065318.20/warc/CC-MAIN-20150827025425-00208-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
13,835
50
http://books.gigatux.nl/mirror/solaris/0131014013_ch05lev1sec4.html
code
|[ Team LiB ]| Using Solaris User Registration Solaris User Registration is a tool for gathering information about new Solaris releases, upgrade offers, and promotions. This tool automatically starts when a user first logs in to the desktop. The Solaris User Registration tool enables a user to register now or later. If you do not choose to register either now or later, click on the Never button to prevent display of the Solaris User Registration tool at each log in. The registration process provides Sun with the user's Solaris version, survey type, platform, hardware, and locale. NOTE. Solaris User Registration is not started when a user is logged in as root. If the user chooses to register, a copy of the completed form is stored in $HOME/.solregis/uprops. If the user chooses to never register, he can always start User Registration in one of the following ways. For more information, refer to the solregis(1) manual page. Accessing Solaris Solve/BigAdmin When users complete the Solaris User Registration process, they can access Solaris Solve, an exclusive Web site that offers valuable Solaris product information and solutions in one convenient location. Beginning on April 16, 2001, users of the Solaris Solve Web site are automatically redirected to the BigAdmin System Administrator's Portal. BigAdmin provides a quick and easy way for users to get the most recent information on what is happening with the latest Solaris release. BigAdmin also provides a preview of additional Sun contract and service opportunities. NOTE. Solaris Solve (redirected to BigAdmin) and SunSolve are separate Web sites. To complete the Solaris User Registration form and access BigAdmin, users can follow the steps below. Table 41 suggests ways to resolve user problems with registration. Restarting Solaris User Registration Use the following steps to restart the Solaris User Registration process. Disabling User Registration If system administrators register for your organization, you may want to disable individual user registration as part of setting up user accounts. You can disable User Registration either before or after installing Solaris software. Before Solaris software is installed, you can disable User Registration in the following ways. After Solaris software is installed, you can disable User Registration in the following ways. |[ Team LiB ]|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511002.91/warc/CC-MAIN-20231002164819-20231002194819-00362.warc.gz
CC-MAIN-2023-40
2,362
17
http://www.serv-u.com/kb/1258/Customizing-the-403-Forbidden-Message
code
Customizing the 403 Forbidden Message - KB Article #1258Related Articles -- 1432 When a client computer tries to visit a website that is banned by AllegroSurf a standardized 403 Forbidden site is displayed to the client. Information can be added to this standardized site. Open the AllegroSurf Voyager and then select the Servers area and the WWW Proxy. Here select WWW. Additional information can be entered in HTML format. NOTE: These instructions apply to AllegroSurf versions earlier than 7.0. If you are using AllegroSurf 7.0 or greater, article 1432 can explain how to customize messages further.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860684.14/warc/CC-MAIN-20180618164208-20180618184208-00235.warc.gz
CC-MAIN-2018-26
602
4
https://www.mail-archive.com/[email protected]/msg50125.html
code
On 19-03-17 21:24, Benjamin Ducke wrote: On 19/03/17 20:11, Paulo van Breugel wrote: On 19/03/2017 12:27, Benjamin Ducke wrote: On 18/03/17 12:15, Paulo van Breugel wrote: On 18-03-17 10:06, Paulo van Breugel wrote: I have a shapefile which is in CRS ESRI:37203 , which is defined in the prj file as +proj=longlat +a=6377301.243 +b=6356100.2284 Are you sure that your "+towgs84" parameters are correct? It seems to me that you intend to apply a three parameter transformation, but you are specifying a seven parameter transform with the scaling (last parameter) set to "0", which might have unintended consequences. Good question. I am not sure, I have copied that from https://github.com/klokantech/epsg.io/issues/49 (the same is given in ). This is not my area of expertise, so any tips (for dummies) how I can test or find out more about this would be great. Because your source system does not use the WGS84 datum, you should specify a datum transform. This is assuming that you wish to reproject your data at some point from the Indian Grid System into something more modern, such as UTM with WGS84 datum. If you will never need to reproject, then you can just ignore all of the following. Re. the datum transformation: You'll know there is a problem when you get a result with rather lousy accuracy after reprojection. I would expect a simple three parameter datum transform to give you ca. 5m of result accuracy. Simple datum transformations have three parameters: 1-3: x/y/z translations ... or an additional four (more accurate): 4-6: x/y/z rotations It's a common mistake to set the seventh parameter to "0", believing that this means "skip this" (and by "common" I mean: I've done this myself before). This is true for parameters 1-6 (translating or rotating by "0" does "nothing"). But it is not true for 7! Scaling a number by "0" sets its value to "0". Scaling by "1" is the operation that "does nothing". To be on the safe side, specify only the three parameters that your datum transform actually has: I have just send an email forwarding your question to the person that proposed the proj definition, so hopefully I'll get some useful feedback. This seems to be a rather nice page: It has the three parameters for your datum transform plus a bunch of very useful literature at the bottom of the page. This is very useful information, thank you! To specify a three parameter datum transform: If you really want to specify all seven parameters, but want only the first three to take effect: Question 2: In QGIS it is possible to define a custom CRS using the above. Can I do this in GRASS as well, and if so, how? Or can / should I add this to the datum information files in $GISBASE/etc/proj/ogr_csv? A link that provides further relevant information grass-dev mailing list grass-dev mailing list
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891543.65/warc/CC-MAIN-20180122213051-20180122233051-00113.warc.gz
CC-MAIN-2018-05
2,812
59
http://apsycholab.pl/team/ewa-duda/
code
I am an Adjunct Professor at The Maria Grzegorzewska University, Institute of Education. I obtained my PhD in Social Sciences. I completed a master’s degree in Mathematics at the University of Warsaw. My research interests are related to learning environment , especially focused on adult learning. I am also interested in the co-creation of learning environment issues. I am currently involved in two international projects. They use participatory approach in Education for Sustainable Development, addressing and promoting behaviour change.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649348.41/warc/CC-MAIN-20230603233121-20230604023121-00191.warc.gz
CC-MAIN-2023-23
544
2
https://www.freelancer.com/projects/flash-website-design/website-design.23273/
code
We urgently require a website designer who can re-design our logo, do 3D graphics, establish audio files throughout, and has excellent flash skills. Must be able to start immediately. The Job profile follows: -Redesign and expand current 1 page site to 5-7 page site -Establish a forum with associated programming -Implement a link to existing paypal business account -Execute secure mp3 audio throughout. (streaming only) -Implement email registration w/ password authentication for downloads -Communication between programmer and myself -Develop flash animations I require installation on my server with these customizations and all work will become our property after payment has been rendered. Please submit mockups of previous work and serious bidders only. 48 freelancers are bidding on average $756 for this job We are just the team you need - more info via PMB only on demand - flash and website redesign is our strongest [login to view URL] me know if you need to see some [login to view URL] Marius. Well, we are good at Flash - not excellent... we are excellent designers and programmers though... so if you want a good all around team, please consider us. Best regards, - Karl
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589455.35/warc/CC-MAIN-20180716193516-20180716213516-00129.warc.gz
CC-MAIN-2018-30
1,188
14
https://www.computersoftware-systems.com/sale-10680762-2gb-ram-10-pro-retail-box-italian-language-windows-10-pro-64-bit-retail.html
code
Place of Origin: Windows 10 pro OEM Win 10 Pro 64 Bit DVD Hologramm Italian Win 10 Pro Key OEM WITH SECURITY LABEL Includes all features of Windows 10 Home Domain Join, Azure AD Join, and Group Policy BitLocker & Enhanced encryption New Windows Store for Business Support for Hyper-V and Virtual machines Windows 10 Pro Use of this OEM System Builder Channel software is subject to the terms of the Microsoft OEM System Builder License. This software is intended for pre-installation on a new personal computer for resale. This OEM System Builder Channel software requires the assembler to provide end user support for the Windows software and cannot be transferred to another computer once it is installed. To acquire Windows software with support provided by Microsoft please see our full package "Retail" product offerings. Right for business You can connect to your business or school Domain or Azure Active Directory to use network files, servers, printers, and more.Get additional security with BitLocker to help protect your data with encryption and security management.Windows 10 enables you to log in with Remote Desktop to sign in and use your Pro PC while at home or on the road.Create and run virtual machines with Hyper-V so you can run more than one operating system at the same time on the same PC. Make the web work the way you do Microsoft Edge lets you move quickly from browsing to doing. Write or type notes directly on web pages and share them with others, read online articles free of distraction, and save your favourite reads for convenient access later. And with Cortana enabled, you can highlight an unfamiliar term to get a contextual explanation that doesnt take you away from where you are. Multi-doing helps you get to "done faster Get to done faster by better managing your desktop. Snap up to four things on one screen at the same time and create virtual desktops whenever you need more space or want to group things by project, like Office apps for work and games for play. Its the most personal Windows yet Cortana works across your day and your devices to help you get things done. By learning more over time, Cortana becomes more personal and useful to you. Cortanas also great at reminders, delivering them at the right time and place so you forget less and can do more. Any device can carry your content, but only Windows gives you a truly personal experience. With Windows Hello, your device authenticates and recognizes you based on your presence, providing extra security, convenience and even a friendly hello. |Processor||1 gigahertz (GHz) or faster processor or SoC| |RAM||2 GB for 64-bit| |Hard disk space||20 GB for 64-bit OS| |Graphics card||DirectX 9 or later with WDDM 1.0 driver| Cortana is only currently available on Windows 10 for the United States, United Kingdom, China, France, Italy, Germany and Spain. An Internet connection is required to perform the upgrade. Windows 10 is a large file about 3 GB and Internet access (ISP) fees might apply. The upgradeability of a device includes factors beyond the system specification. This includes driver and firmware support, application compatibility and feature support, regardless of whether or not the device meets the minimum system specification for Windows 10. If the anti-malware application is compatible and current, your application will be preserved during the upgrade to Windows 10 Windows 7 desktop gadgets will be removed as part of installing Windows 10. The number of applications that can be snapped will depend upon the minimum resolution for the application. To use touch, you need a tablet or a monitor that supports multi-touch. Microsoft account required for some features. Some games and programs might require a graphics card compatible with DirectX 10 or higher for optimal performance. The Windows you know, only better Windows 10 feels familiar so you can get more done from the get-go. The Start menu is back with space to pin your favorite apps. And simple navigation means you don't need to spend much time learning anything new. You won't have to wonder if you have the latest features or security updates. Windows automatically delivers updates, when they're ready, directly to your device. Cortana's got your back Cortana is your truly personal digital assistant who works across all your devices to help get things done. Rule the web Microsoft Edge is an all-new browser built to deliver a better web experience. You can write directly on webpages from your PC, read articles distraction free, and save your favorites to read offline later. Take your gaming further With Xbox on Windows, play and connect with your games and friends. Everywhere. Universal Apps, including Office The Store in Windows 10 is a one-stop shop for hundreds of thousands of apps including games, music, videos, as well as a new version of Office. Send your inquiry directly to us
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506646.94/warc/CC-MAIN-20230924123403-20230924153403-00867.warc.gz
CC-MAIN-2023-40
4,890
44
https://forum.iconclass.org/t/download-of-the-iconclass-dataset/57
code
is it possible to download the images of the iconclass dataset with their classfications? Are there any limitations to this (commercial license and so on)? Thak you very much You can download the dataset, which has a large collection of images and their classification codes. Please let us know how it goes and what kind of interesting things you do with it! At the moment we would like to understand the possibility to use AI for image classification. I work fo Cineca (italy). Cineca is one of the most important supercomputing center in Europe. Good to hear Giorgio. I think it is also very useful for you that Iconclass is also available fully translated into Italian. I do not speak Italian, it would be nice if a native speaker could check some of the searches in Italian - and let us know if it is working OK. Do you mind taking a look? BTW, I will be attending the VISART VI workshop at ECCV 2022 later this year, where our paper on using some AI techniques for ICONCLASS has been accepted. It will be very exciting if Cineca is also looking into this. I went through the Italian translation a bit. I didn’t see anything disturbing for a native Italian speaker. Perhaps the first letter of the definition (at the first level as in the english version) should be capitalised. In Italian we are used to capitalising only the first letter. Just an example: 4 · società, civilizzazione, cultura I would change to 4 · Società, civilizzazione, cultura I would like to know if, for your paper “The Art Historian’s Bicycle Becomes an E-Bike”, did you a train a model? In this case is the model freely available? At the moment we are using the OpenAI model with different text queries. Thank you very much We did not train a new model, but used the standard “ViT-B/32” from CLIP.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499697.75/warc/CC-MAIN-20230129012420-20230129042420-00758.warc.gz
CC-MAIN-2023-06
1,794
21
https://www.freelists.org/post/kismac/r99-compile-problems,2
code
Strangely enough, tried again today and it worked fine. No idea why it got errors opening the project yesterday - it said the XML was On 12/03/2006, at 12:29 AM, Aldenwoods wrote: I compiled yesterday fine for Universal with R99. No issues. On Mar 11, 2006, at 6:35 AM, themacuser wrote: Is anyone else unable to compile r99?
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890874.84/warc/CC-MAIN-20180121195145-20180121215145-00460.warc.gz
CC-MAIN-2018-05
325
5
http://webapps.stackexchange.com/tags/wolfram-alpha/new
code
New answers tagged wolfram-alpha When requesting sqrt(2) with "more digits" Wolfram Alpha outputs which far exceeds the accuracy of double-precision floating point variables (in which sqrt(2) is 1.4142135623730951). WA is also smart about the organization of computation, preventing the loss of significant digits. For example, sqrt(10^100+1)-10^50 outputs a correct value, slightly less ... Top 50 recent answers are included
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00168-ip-10-164-35-72.ec2.internal.warc.gz
CC-MAIN-2016-26
426
3
https://www.tomrush.net/rtm-the-100-rule/
code
Click here for a bit of background of why I am posting these tips. One of my specialities used to be impulse buying very expensive items and then find I never use them or never really needed them. A while back I read a article on lifehacker that was around impulse purchases and how to reduce or stop them. One of the ideas was called the $100 rule ( I have slightly adapted the rules to fit in with my lifestyle but the principle is the same). Basically if you see a purchase you think you want you take the total cost of the item and divide it by $100, that gives you a cool off period in days ( or in my case weeks). After the cool off period you assess if you still want the purchase and if you can afford it. If the answer is yes to both the questions you purchase it. If you want the purchase but can not afford it you delay the purchase the cool off period then reassess again. If you don’t want the item you have saved lots of money :) In remember the milk I have created a list called “$100 Rule”, whenever i see a item I really want i add it to the list and in due date add say “5 weeks” (for a $500 item). I tag it either canAfford or CanNotAfford and coolOff. Once the 5 weeks is up I capture the task in a a generic due search and assess the purchase. If I can afford the item and still want it it gets tagged with buy which gets added to my weekly shopping list. If i can not afford it I defer it for 5 weeks again. If i don’t want the item i delete it. It has really cut down my impulse spending and I have managed to save some cash. But it is not as fun :(
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487614006.8/warc/CC-MAIN-20210614232115-20210615022115-00252.warc.gz
CC-MAIN-2021-25
1,584
5
https://what-when-how.com/Tutorial/topic-647vgevdm3/Enterprise-OSGi-in-Action-120.html
code
What is a missing dependency? The notion of a missing dependency is a little subjective. It boils down to your inter- pretation of what makes up the application and what makes up your server runtime. At its heart, a missing dependency is a package import, or for servers that offer OSGi service-based provisioning, a service dependency, made by a Subsystem-Content bundle that isn't satisfied by another bundle within the subsystem content. Some people argue that if this dependency is supplied by the server runtime rather than a shared library bundle, then the dependency isn't missing; however, as server run- times differ, a dependency may be missing on one server but not on another. This scenario is the main reason that even though ESAs are portable artifacts, they still have to be redeployed if moved to a different server environment. This is the point at which resolution and provisioning can become quite intertwined, and is the reason why many people struggle to understand the difference. If an ESA specifies a version range for its application content, then how are you ever going to find its depen- dencies—you don't even know which bundles to start with! In essence, the resolver and the provisioner have to work together to provide a deployment for an ESA . The resolver typically only needs access to the metadata for a bundle, not the entire archive, so a typical resolver will generate a model from the meta- data of the bundles available in a repository. This is a comparatively small amount of information, but provides the resolver with a complete description of all the bundle dependencies. The resolver can then use this information to calculate a resolved set of bundles for the ESA . This will include all of the application content bundles and any other bundles obtained via a repository to match missing dependencies (see figure 4.4). Figure 4.4 If you want to install this application bundle into a framework, then you need to ensure that the fancyfoods.logging package is available. This is provided by a bundle that has a dependency on the common.logging.framework package, which must also be satisfied by the resolution process. In this case, you pull in a third bundle that can supply the package and has no further missing dependencies.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818072.58/warc/CC-MAIN-20240422020223-20240422050223-00075.warc.gz
CC-MAIN-2024-18
2,274
27
https://www.fanfiction.net/s/5329523/36/The-Same-Team
code
Hey, sorry to bother you all! The Same Team is done, and I'm well into the sequel. However, I had the smart idea to turn it into a web-comic (don't ask me how I have the time, because I don't). Chapter One is up, and I thought I'd put the link in case you're interested! (oh, instead of putting "." I put "(dot)" Just replace them!) Thank you so much again for reading and reviewing. It's been really fun!
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867304.92/warc/CC-MAIN-20180624234721-20180625014721-00046.warc.gz
CC-MAIN-2018-26
405
2
http://voidpatterns.org/wp-content/uploads/2014/11/worldmap-template.html
code
This map displays, for each country, the rank of the word "Satan" in black metal lyrics (from full-lenghts, eps and demos) written between 1980 and 2013. This ranking is calculated as the ratio of the total number of times "Satan" occurs over the maximum raw frequency of any term in the country's lyrics, after stopwords removal. The darker the shade of blue, the higher up in the term-ranking is "Satan" for that country. Source: Deciphering Chaos. For the original D3 template, visit this page.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517745.15/warc/CC-MAIN-20190418161426-20190418182418-00067.warc.gz
CC-MAIN-2019-18
497
1
https://pythonawesome.com/best-sup-for-mf/
code
Are you looking for the best Sup for Mf but don’t know where to start? We have done much research and analysis to present the best Sup for Mf available. There are various Sup for Mf options on the market, and you can get surprising advantages from these products. They vary in price, quality, size, and feature. This article will explore some of the top Sup for Mf out there. This comes from Sup for Mfter going through numerous customer reviews, product reviews, and research into the specifications of the products. At the end of this review, you should be able to make an educated buying decision for one or multiple Sup for Mf. Best Sup for Mf: Top 10 Compared Top 10 Sup for Mf of Review: - Application:3D Raised Front Hood Letters Compatible for 2017 2018 2019 2020 2021 2022 Sup Duty accessories 250 350 450. - Excellent Quality:Premium Material with 100% Genuine 3M Certified Adhesive.Built in last!will NOT oxidize, rust or stain. Specifically made for Automotive use Brand New, unscratched,and PERFECT!!Emblems add a customized feel to your vehicle Enhances. - 3D Design: A raised solid badge letter with a nice bevel to fit curved, complex recessed surface create a cool 3D. Heavy duty and Shiny decal really make the tailgate POP in a subtle way. - Easy Installation:Clean and dry sticking part,lightly apply then fine tune any adjustments and firmly press the letter down to seat it.Doesn’t request any technical skills,can be finished within minutes.Car wash safe and safe removal. - After-sales service: If you have any questions about our products, you can consult us. We will provide free return and exchange and 24 hours service for each household. - WIDE AND LIGHTWEIGHT SUP DESIGN – Three sizes stand up paddling board, 10’6″ long and 31”of deck width for improved stability and balance while standing.Paddle Boards Premium Paddle Board is Made Of The Highest Quality Military Grade Material. Providing The Most Durable Lightweight Board On The Market. - PREEMINM MATERIAL – Paddle Boards is Made Of The Highest Quality Military Grade Material.Max load is up to 280 lbs Providing The Most Durable Lightweight Board On The Market. Brushed Thickening blow up paddle board with Non-slip soft deck,ideal for all skill levels for less accidents or injuries should you fall! - SUPERIOR MANEUVERABILITY – The triple bottom panel fins help board improve overall speed, one big fin is removable, and two small fins are unremovable which are fixed on the board, handling and steering for easier use by kids, teens and adults alike. - VERSATILE PORTABLE STAND UP PADDLE BOARD – Easy storage – packing down to the carrying bag.FBSPORT pandle board can be used in different water including sea,lakes, rivers or small wavy ocean. And the sup boards is great for fishing, surfing, paddling, cruising, yoga, sightseeing in water. - COMPLETE PREMIUM PADDLE BOARD ACCESSORIES – Package comes with paddling essentials, including Board, Paddle, a coiled ankle cuff safety leash, Pump, And A Premium Carry Bag! - Convert any SUP to a stable platform for fishing, yoga or bringing a dog or child along - Great for beginners, rough water and plus size paddlers - Constructed of durable PVC - Inflate/Deflate in seconds with patented Speed Valves - EXTRA WIDE AND LONGER DESIGN FOR BETTER BALANCE Premium inflatable paddle board with non-slip EVA deck pad is made of high quality material that can able to withstand high pressure.33 inches width board provided great stability. - ULTRA LIGHT PADDLE BOARD THAT MADE YOU EASY TO CARRY Three detachable bottom fins help improve overall speed and handling.Inflatable stand up paddle board can be used in exploring,touring,fishing,yoga.Also suitable in the ocean,fresh water lakes,and rivers. - FAST INFLATION We provide DOUBLE ACTION HAND PUMP which can inflate and deflate quickly.The height-adjustable aluminum paddle(65-82 inches)is suitable for most people. - PACKAGE INCLUDING adjustable aluminum paddle,safety leash,hand pump,waterproof bag,upgraded backpack,three removable fins and repair kit. - BOARD DIMENSION 11ft length,33 inches width and 6 inches thickness,achieved amazing balance ability.Weight limit up to 330 lbs.We also offer 12 months parts WARRANTY and TELEPHONE service to secure customer experience - Woven straw construction - Adjustable chin strap - Wide brim visor - Cotton Roxy patch - 【PROFESSIONAL SUP DESIGN】UPWELL inflatable stand up paddle board is 10’6”x 31”x 6”. It’s weight capacity up to around 450lbs and wide design ensures higher stability and flexibility. Our unique design suitable for all beginners and all skill levels to explore and enjoy themselves in different water areas, such as ocean, lake and river, withstand both fresh and salt water. This is an all-around board that can be used for surfing, fishing, touring, yoga and family fun. - 【PREMIUM MATERIALS】Our boards are made of the highest quality military grade materials. Ultralight double wall PVC is 25% lighter than other same size products. Meanwhile, this reinforced lightweight fabric creates a firmness, anti-corrosion, wear-resistance sup board which can be used for years. Soft non-slip EVA deck pad makes you feel comfortable while ensuring your stability and safety when you stand for a long time. UPWELL paddle board is your optimal choice for water sports. - 【FULL SET OF ACCESSORIES】Purchase one you will get all gears you need: 1x inflatable stand up paddle board, 1x removable Large fin, 1x adjustable-length Aluminum alloy paddle, 1x coiled ankle leash, 1x hand pump for quick inflation and deflation, 1x roomy backpack, 1x emergency repair kit, 1x waterproof phone bag, 1x SUP kayak seat has combined polyurethane foam waterproof cushion and the best mid-sized seat back on the market. - 【ULTRA PORTABLE 】Our paddle board is designed wider and lighter only 18lbs and it’s easy to inflate and deflate quickly. Whether you’d like find a relax water place to enjoy yourself alone, or finding a perfect space to have a fun water experience with your lover or family or friends. UPWELL offer spacious and comfortable backpack that is large enough to accommodate paddle board and all accessories. While you’re having a pleasant holiday, we hope to ease a little tired of your journey. - 【100% SATISFIED CUSTOMER SERVICE】UPWELL have been devoted to research and design the stylish and high quality paddle boards for many years. Not only we attach importance to the quality of inflatable SUP, but also we care more about your purchasing and using experience. We are glad to offer a 1-year manufacturer’s warranty on the paddle boards at no additional cost. If there is any problem, please feel free to contact us. we will give you a 100% satisfactory reply within 12 hours. - Extra wide for better balance measures 10’6’’ feet long and 32 inches wide, size proportions improve stabilization, specially in higher wing environments. - Excellent maneuverability the triple bottom panel fins makes steering and handling the stand up inflatable paddle board very easy; it offers exceptional surf control; you’ll be gliding and skimming in no time. - Stable anti-slip top deck perfect for beginners; upgraded design with a no-slip soft top that cushions your fall when slips occur. It happen to the best of us, so might as well be prepared!. - Portable inflatable sup board travel-friendly, this luxury sup inflatable paddle board is perfect for travel and carry on the beach o lake. Take it with you on surfing excursions or keep it in your car for those times you want to chill. - All-in-1 blow up paddle board kit complete with must-have paddle board accessories, our sup paddle board will have you ready to hit the waves. Includes 10.6’’ inflatable sup board, coiled ankle cuff safety leash, upgraded aluminum paddle, center fin, manual air pump, storage backpack, extra rowing wooden paddle and cell phone waterproof protector. - Stable & Maneuverable: It’s easy to stand up and balance on a Drift paddle board! At 10’8″ x 33″ x 6″, the wide deck and performance shape make for fast, fun paddling for all skill levels. - Inflatable & Portable: Quickly inflates or deflates for Easy Storage – packing down to just 38″ x 18″ x 12″ and 19 lbs. Whether you’re jetting off to explore a tropical paradise or hiking into the wild to find that perfectly serene fishing spot, Drift Inflatable SUPs travel comfortably in their high-quality carrying bag backpacks. - Highly Durable: We use a High Tech process to transform military-grade PVC into a rock-solid rigid platform. With a core of composite drop-stitch fibers connected to the nearly indestructible outer skin, Drift boards stand up to anything you want to do on the water. - Complete Paddleboard Kit: Comes with all essential paddle board accessories, including coiled leash, removable fin, repair kit, 3-piece aluminum paddle, paddle board pump, and backpack carrying bag. Board Features include EVA foam deck pad, bungee straps, grab handles, 250 lb capacity, and our signature Entry Rocker style hull that sheds water and keeps the board nose up. - Limited Time Warranty. - 【WOOD GRAIN Extra Wide Stable Design】11’long x 33” wide x 6” thick, with weight capacity up to 350lbs.The extra wide SUP design is easy for beginners to stand up and keep balance. It is an ideal board for all skill levels with pets. - 【Military Grade High Quality Material】Made of the highest quality military grade material. Soft anti-slip EVA deck pad greatly improved stability and safety while standing. It is super comfortable for long time sup paddling kayaking. - 【Ultra light weight Portable SUP】5 minutes for inflate and deflate. Highpi paddle boards has a weight of only 20 pounds—that’s 20% lighter than competitors’ inflatable sup of the same size.It is very easy to carry and transport. - 【Full Accessories plus Dry Bag】length adjustable alloy floating paddle , double action hand pump with psi gauge, 1 big removable fin, safety leash, 5L water proof dry bag , detailed sup manual, repair kit and a big comfortable sup backpack. - 【100% Satisfied Customer Service】 All the HIGHPI paddle boards have passed SGS, CE and ISO quality certification. We offer a 1-year manufacturer’s warranty on the paddle boards at no additional cost. How To Choose The Sup for Mf How do you choose the Sup for Mf? You must consider many things, such as the brand name, price, and product quality. In addition, you should also consider whether it is suitable for your needs or not. So how do you choose the right Sup for Mf? Here are some tips that you can use to help you find a good product: 1. You first need to consider the product’s brand name. A good brand will always produce quality products, so a product with an established name should be good enough for your needs. 2. You need to consider the product’s price next. A high-quality product does not always mean that it will cost more, but if it costs too much, there must be something wrong, or nobody will buy it. 3. The final thing you need to look at is how well suited this item is for your needs and requirements and how well suited it is for others with similar requirements. What you Should Keep in Mind When Buying Sup for Mf When shopping for Sup for Mf, there are several things to consider. You need to think about the quality of the product, the price, and even how much it will benefit your life. However, you also need to keep these factors in mind: Purchase from a reputable Brand The finest product for you is that brand if you have your heart set on it. For instance, you should shop for a Samsung S9 phone online or at any other Samsung store if you wish to buy one. Read reviews from others who have bought the product before. You must check what other customers have said about a product before buying it online, as this will help you determine whether it is worth buying or not. Suppose there are many positive reviews about an item and no negative ones. In that case, most people are happy with their purchase and would recommend it to others too. Seal of approval Look for the seal of approval. For example, look for the Energy Star seal if you’re shopping for a new printer. It indicates that the printer uses less energy than other models in its class. It’s important to do your research before buying any new product. For example, check the minimum requirements listed on each model’s product page if you’re looking at laptops and want one with a larger hard drive. If they’re not listed, ask customer service or call the manufacturer directly before making your purchase. Complete sure the website offers free shipping if you’re getting something online so that you don’t have to pay anything extra once you make your purchase. If the website doesn’t offer free shipping, think about making your purchase from a different site that does. Many retailers offer extended warranties covering malfunctions, materials, or quality defects. If a product has this kind of coverage, it’s worth paying extra money upfront so that you don’t have to pay again later if something goes wrong with your purchase. Ultimately, our Sup for Mf reviews are designed to help you make a more informed purchasing decision. It’s much easier to decide when you know exactly what to look for and your options. We hope that this Keyword review article has helped. So if you’re looking for the best Sup for Mf, we’re glad we could help. If you’re considering purchasing Sup for Mf, we strongly recommend you look deeper at our top 10 Sup for Mf reviews. Based on our research, we have found these excellent products to be well worth the money and should be able to meet your needs.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949642.35/warc/CC-MAIN-20230331113819-20230331143819-00367.warc.gz
CC-MAIN-2023-14
13,771
64
https://programmersheaven.com/discussion/250764/please-help-with-detail-information
code
One thing should be clear that this problem is different from my previous problem which i've posted in my previous msg. ( for those who read that & replied. "that is solved" ) I'm trying to install a software which requires a library to be installed on my system. I've downloaded the src file of a library. As mentioned in the Install file i've run the ./configure n ./make files. But again when i install that software it is giving error msg of "failed dependincies". As according to my knowledge there is some link to be created but this thing is not mentioned in the installation file. Any suggestions. please help..... Thanx in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592523.89/warc/CC-MAIN-20180721110117-20180721130117-00378.warc.gz
CC-MAIN-2018-30
640
4
https://paperswithcode.com/search?q=author%3AXupeng+Miao
code
We introduce ZOOMER, a system deployed at Taobao, the largest e-commerce platform in China, for training and serving GNN-based recommendations over web-scale graphs. However, we found that the current approach of jointly training experts and the sparse gate introduces a negative impact on model accuracy, diminishing the efficiency of expensive large-scale model training. Embedding models have been an effective learning paradigm for high-dimensional data. On top of that, we design an inter-view adapter to better extract the global feature and adaptively fuse the few-shot knowledge learned from 3D into CLIP pre-trained in 2D. Unfortunately, many real-world networks are sparse in terms of both edges and labels, leading to sub-optimal performance of GNNs. In this paper, to clearly compare the efficiency of various node sampling methods, we first design a cost model and propose two new node sampling methods: one follows the acceptance-rejection paradigm to achieve a better balance between memory and time cost, and the other is optimized for fast sampling the skewed probability distributions existed in natural graphs. no code implementations • 10 Oct 2019 • Xupeng Miao, Nezihe Merve Gürel, Wentao Zhang, Zhichao Han, Bo Li, Wei Min, Xi Rao, Hansheng Ren, Yinan Shan, Yingxia Shao, Yujie Wang, Fan Wu, Hui Xue, Yaming Yang, Zitao Zhang, Yang Zhao, Shuai Zhang, Yujing Wang, Bin Cui, Ce Zhang Despite the wide application of Graph Convolutional Network (GCN), one major limitation is that it does not benefit from the increasing depth and suffers from the oversmoothing problem.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103556871.29/warc/CC-MAIN-20220628142305-20220628172305-00691.warc.gz
CC-MAIN-2022-27
1,594
8
https://help.nextcloud.com/t/printscreen-saves-to-screenshot-folder/9673
code
Hi all, I am for one very very grateful to the developers and to Linux format for my introduction to NextCloud, it’s awesome. Being a windows users and EX-DROPBOX user I am a complete newbie to Linux, yet here I am wth a 120GB cloud server running on a Raspberry Pi 3 and with SSL, so if I can do it, practially anyone can The reason I’m dumping dropbox aside from the privacy issue, is that they are stopping the ability to share files publicly, to actually embed an image, video or MP3 is brilliant, but they must have their reasons to kiss it goodbye. No other service offered that, and from what I’ve read it’s both a liability and a security issue. But that said it will be missed, embedding was brilliant. So on to the topic at hand, something else that Dropbox does is capture the clipboard after the PrintScreen key is pressed, then it stores it as a PNG in the screenshot folder. What a boon it is too. If you NextCloud devs could one day add this to the client I’d be very obliged. It does come in very useful from time to time. Many thanks for an excellent server package, P.S. I’d also appreciate when you next edit the online-help you include instructions for numpty’s like me, the experts will almost certainly know what’s what while a newbie like me just scratches their heads.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103573995.30/warc/CC-MAIN-20220628173131-20220628203131-00360.warc.gz
CC-MAIN-2022-27
1,308
10
https://www.microfocus.com/documentation/silk-performer/210/en/silkperformer-210-webhelp-en/SILKPERF-4D8D9CBF-CUSTOMIZINGWHICHTOOLBARSDISPLAY-TSK.html
code
Specifying Which Toolbars are Displayed You can customize the set of toolbars that appear on the Check the check boxes next to the toolbars that you want to have displayed. : To specify that you want to enable tooltips (roll-over UI control descriptions), check the : To specify that you want to enable “cool look,” check the Cool look replaces Windows 3.1 style drop-shadow buttons with non-drop-shadow buttons. to immediately apply your selections to the UI. Customizing Toolbars and Commands
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817181.55/warc/CC-MAIN-20240417204934-20240417234934-00094.warc.gz
CC-MAIN-2024-18
498
9
http://www12.reocities.com/ResearchTriangle/2288/
code
Look at some of my recent pictures. (updated 11/3/01) Optical Illusions (added 11/2/2001) Bookmarks (updated/verified 10/23/2001) My dad's home page Jason K's soccer team Play Pong on my site. It is a DHTML application -- no downloading necessary. Oh yeah. I have another web site. A fake virus I wrote for Windows. It doesn't really delete any files or corrupt your system in any way. It's just for fun. A stupid "game" I wrote for Jason Stroot. Try it. It's free. (Windows only.) Send a message to Jason Stroot Simple OCX Test Project1.zip for Simple OCX Text
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887621.26/warc/CC-MAIN-20180118210638-20180118230638-00225.warc.gz
CC-MAIN-2018-05
561
12
https://stackoverflow.com/questions/32403258/how-to-take-advantage-of-multi-cpu-in-c
code
I work in lab and wrote multithreaded computational program, on C++11 using std::thread. Now I have an opportunity to run my program on multi-cpu server. - Runs Ubuntu server - Has 40 Intel CPU's I know nothing about multi-cpu programming. First idea, that comes into my mind to run 40 applications and then glue their results together. It is possible, but I want to know more about my opportunities. - If I compile my code on server by it's gcc compiler, does resulting application take advantage of multi-cpu? - If #1 answer depends, how can I check it?
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998943.53/warc/CC-MAIN-20190619083757-20190619105757-00105.warc.gz
CC-MAIN-2019-26
555
7
https://constructioncrushers.tpub.com/TM-5-3820-205-10-1/css/TM-5-3820-205-10-1_29.htm
code
c. Cold Temperature Starting. (1) Follow the procedure outlined in subparagraph a above. Warning: Starting fluid is highly explosive and toxic. Handle starting fluid spray cans with extreme caution to prevent fire, explosion, and personal injury. Caution: Do not use excessive amounts of starting fluid when starting the engine. Using too much starting fluid will cause engine damage. (2) Start the engine as outlined in subparagraph b above. When pressing the starter button (step 3, fig. 29), spray starting fluid into the air cleaner intake (para 25). 15. Stopping the Engine Stop the engine in the numerical sequence as instructed on figure 30. Figure 30. Stopping the engine.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585290.83/warc/CC-MAIN-20211019233130-20211020023130-00639.warc.gz
CC-MAIN-2021-43
680
11
https://docs.rapid7.com/insightcloudsec/insights-custom-packs/
code
In addition to the built-in Compliance Packs, InsightCloudSec includes the ability to create custom Insight Packs and modify existing Insights. This page includes details on viewing, creating, and editing for Custom Packs. For details on creating a single custom Insight, check out our instructions here. A Custom Pack can be organized to provide targeted visibility into a testing environment, to expose custom compliance or security concerns, or to combine important Insights in your environment for the best visibility into your specific cloud resources. Custom Packs are Insight packs that can be created to suit your specific requirements either based on an existing pack or from a selection of filtered resources. Visiting the Insights landing page and selecting the "Custom Packs" tab will provide you with access to the "Create Pack" functionality. Custom Pack Actions From the Custom Packs main landing page, each available Custom Pack is displayed as a list item. The following actions can be accessed via the details menu (three vertical dots) to the left of the Custom Pack: Show Report Breakdown Show report breakdown The "Show Report Breakdown" option takes you to a summary page of dynamic charts that allow you to view the following: - A time series (up to 90 days) plot of total noncompliant resources categorized by what type of Insight registered the resource as noncompliant; ideally, you will see this trending down as you take actions to resolve compliance issues - Noncompliant resources, as a percentage of total resources, associated with this Insight pack - Noncompliant resources, as a percentage of total resources, within individual clouds associated with this pack Email subscriptions associated with Insight packs are available for administration through a Compliance Pack's actions menu ("..."). From the actions menu, click "Manage Subscriptions" (envelope icon) to open a page that provides a list of all subscriptions associated with the Insight Pack. You can add a new subscription or modify, send, or delete an existing subscription from this page. For more information about setting up SMTP, configuring email notifications, and creating pack-level notifications, check out our documentation on SMTP (Email Notifications). This option allows you to disable and hide an entire Insight pack from your organization. You must confirm this selection. To unhide and re-enable the pack, uncheck the Hide Disabled Packs checkbox on the main page and toggle the pack's visibility to the "on" position. Edit Insight Pack Edit Insight Pack Allows users (with the appropriate permissions) to modify the details of an existing Custom Pack, including the Name, Description, Badges, etc. Delete Insight Pack Delete Insight Pack Allows the deletion of the Custom Insight Pack (with appropriate permissions). In addition, if an Organization is removed from InsightCloudSec, all associated Insight Packs will also be removed. Viewing Custom Pack Details You can view the details of any pack by clicking on the corresponding list item name. This will take you to the Insights Library, listing the filtered individual Insights included in the pack. Insight Summary Page Clicking on the name of an individual Compliance Pack opens a summary page listing each individual Insight included with the pack. Results can be filtered, there are pagination controls, and each Insight row includes (for users with the appropriate permissions) several controls/fields, including: - An actions menu (Create Bot) - The name of the individual Insight(s) - A summary of the Impacted (noncompliant Resources) - Details on Exempted Resources (when applicable) - The associated Compliance Rules - Any associated Bots (a total count) - Severity details - Author details Note: This is simply a "filtered" Insight list; clicking on the text "This is a filtered result set. Click here to reset the filters", will reset this list to display all available Insights. General Pack Controls Depending on your permissions, you may be able to review and update details around numerous Custom Packs. Bots and compliance reporting (Impacted Resources) Bots and Compliance Reporting (Impacted Resources) Once you understand specific compliance failures, you can use Bots to notify about or remediate the issue. To learn more about this capability, check out our documentation on BotFactory. Excluding resources (Exemptions) Excluding Resources (Exemptions) In earlier versions, InsightCloudSec offered the ability to exempt resources from Insight findings using the Resource Group functionality. Check out our documentation on our dedicated Exemptions functionality for details on excluding resources. Viewing existing bots Checking for Existing Bots You can determine whether any existing Bots match the failed Insight by clicking on the Bots listed on the Insight page associated with your Compliance Pack. Creating a bot Creating a Bot You may wish to create a Bot to notify of or remediate for the failed insight. In the example below, clicking the actions menu and selecting "Create Bot" next to a specific insight allows you to create a Bot directly from that Insight. Check out details on the main BotFactory & Automation page or hop directly to Creating Bots or Working with Bots (Best Practices & Examples) to review some examples. For the best results in viewing, sorting, interpreting, and understanding data associated with both the InsightCloudSec Compliance Packs and any Custom Packs you may create, we recommend taking advantage of our Compliance Scorecard. You can download a .CSV file that includes the results for the Compliance Pack. From the Compliance Packs page, click on the name of an individual Compliance Pack. This will take you to a filtered Insights page where you can then select the download arrow. Authoring & Visibility Attribution or "Created By" information for any Custom Pack is populated based on the user who created the pack (e.g., whoever was logged in and completed the "Create Pack" process). Administrators can view all Insights regardless of who created the Insight, even for Insights that were created by a user and marked as "Viewable only by Me." Toggle Visibility applies to a single pack and a single organization. Enabling a pack as "Global" (see below) relates to a single pack across all child organizations. Creating a Custom Insight Pack When creating a new Custom Insight Pack, all characteristics are included as part of a one-time inheritance. For example: - Custom Packs created from an existing Compliance Pack will include all of the Insights in the pack and any compliance rules you've selected at the time you create the pack. - Custom Packs scoped to include "must include all Badges" will be locked to those Badges and any changes to pack scoping will require the creation of a new Custom Pack. You can create a new Custom Insight Pack from a base pack and then do the following: - Add additional Insights (either out-of-the-box or custom). - Edit the Custom Pack to remove any individual Insights you don't want to retain (select the Insight and use the "Actions" menu to "Remove from Pack). - Add existing Insights to the Custom Insight Pack. Create a custom insight pack Create a Custom Insight Pack and add Insights to it. - Go to Security > Insights. - On the Custom Packs tab, click Create Pack. - Complete the Create Insight Pack window. - Name: name your pack (up to 64 characters) - Description: give your pack a description - Base Pack: (optional) choose the base pack to allow you to create a custom pack based on an existing Compliance or Custom pack - Badges: (optional) Associate the pack with badges and select the "Must Have All Badges" if desired - Logo URL: (optional) Provide a URL to include the display of a custom logo with your pack - Global Pack: (optional) Select the "Global Pack" checkbox to allow all of your child organizations access to this pack; the pack can only be managed by the parent organization - Click Submit. The pack appears in the list on the Custom Packs tab. It will include your description of the pack, your username (as Created By), the number of Insights in the pack, the number of Badges used by the pack, and more. - To add Insights, go to Security > Insights. - Select the Insight(s) you would like to add to your custom pack. - Click the Actions button and select Add to Pack. - Select your custom pack from the list to add your selected Insights. Your custom pack will now appear on the Custom Packs page with the updated total of Insights. After creating a Custom Pack, you may want to explore more information around Compliance. For that, we recommend taking a look at our documentation around the Compliance Scorecard. Or to explore more options around automation for your Custom Pack, take a look at our BotFactory documentation!
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818374.84/warc/CC-MAIN-20240422211055-20240423001055-00612.warc.gz
CC-MAIN-2024-18
8,838
85
https://community.hubitat.com/t/i-would-like-to-be-able-to-stop-and-start-rules-from-another-rule/97731
code
Currently, you can pause and resume a rule from within another rule but you cannot start or stop a rule from another rule. And as I understand the difference between pause and stop is that when a rule is paused, it still has to respond to bound events whereas stop unbinds the events so it's sort of like the rule doesn't exist. So a pause rule still takes some processor time and likely memory. I have rules such as, I have sets of rules that are active when I am working here at home while other outside work hours rules are paused. Then at 5, the rule sets switch so it keeps work-related rules from trying to run during off hours. So I would like to see the option to also start or stop a rule from another rule. I would think this would save resources on the box. Is this possible? I realize that a rule that is stopped may not show up in the In Use By list of the properties of a device but personally, I can live with that if it improves performance It would still show as "In use by." That's determined by references to a device in the app's settings, which generally include device selectors in the UI, and those selections would remain (otherwise, the rule wouldn't know what to do when re-started--or when you're creating it in the first place). I can't speak to whether this request will or won't happen, though the means to do it doesn't appear to exist in the public Rule Machine API (just pause/resume), so it's possible there's also not an easy way to do it internally (or even if it does, perhaps there is no desire to add even more options to the UI). But for the use case you described, there is something you can do today that would already address your specific concern: a required expression. If you add one that determines whether you're at work or whatnot, the same criteria you'd use to pause or stop the rule, that would have effectively the same outcome. When the required expression is false, the trigger events are normally un-subscribed to, so the rule will not wake. That being said, none of this woud actually normally be on my list of concerns. Are you actually having problems, or do you notice high resource usage by a particular rule in App Stats? If not, this probably isn't even worth pursuing in the first place. Wouldn't another way to simply build a variable to populate based on the primary trigger rule? So that if the variable is populated with X then the secondary rule would look at that rule and exit rule and continue that way till the variable is no longer X? Yes, if I'm thinking correctly, even if you have a restriction, the event is still triggered, the restriction prevents the actions from being run, similar to the way pausing works. By stopping the rule, the rule is completely ignored taking 0 processor time. "Restrictions" haven't been a thing since the inital release (shortly thereafter removed) of Rule 4.0, but I assume you mean "required expression" (formerly called predicate rule or predicate condition)? If so, no; they work as I described above: You can test this by creating a rule with one and examining the App Status page for event subscriptions. But again, I'm not sure this is something I'd bother with unless you are noticing problems (or high app stats usage and are concerned regardless) or maybe have a particularly chatty device as a trigger. I will check that out, there are still some interface and reporting things in Hubitat I'm getting familiar with. I do use required expressions (restrictions is the WebCore term ) quite a bit. And I do have motion detectors in the areas where they can get 'chatty' as you say. So I like to manage that so the processor isn't spending time on unnecessary things. When the CPU is spending time on unnecessary things it can be doing the necessary things so it affects performance. And while a single rule may not take a lot of cycles, when you multiply that by a number of rules being fired frequently, it adds up. I have a bunch of rooms with lights in them. All of them have motion sensors. I however want the ability to be able to 'manually override' the motion rules. However I also want to be able to 'reset' manually overridden rooms back to motion rules. Here's how I implemented it using 2 global variables for every room: One indicating the room light status as set by the motion rule, and another for the room light status as set manually (be it directly in HE or via HUE app/switch): -1 = lights set off using this ruleset 0 = rule inactive (room set using the OTHER rule set (motion vs manual)) 1 = lights set on using this ruleset So whenever motion is detected, the motion rule first checks the variable for the manual rule. If it's set to 0, it will do it's thing... but if it's set to -1 or 1, it will stop executing the motion rule. The manual rule is a bit more complex, as it's triggered every single time the room lights turn on or off (be it via the motion rule, or manually). So it has to check: -> was the light set by the motion rule? -> stop rule execution -> was the light set manually? -> set manual rule variable & disable motion rule -> was the light set manually twice in 5 seconds (my current 'reset' timer)? -> re-enable motion rule It only works using CoCoHue with push events enabled.. because otherwise you might set the switch ON/OFF manually in Hue.. but Hubitat won't receive a switch status changed event for another minute when it polls the Hue bridge for switch statuses. Or ofc you could have your manual switches & lights directly linked to Hubitat. Here's my motion rule for room 'CR' and the manual rule for that same rule. (note it isn't perfect.. I still have some tweaking to do. for example toggling the switch manually 3x (or any odd number beyond 1) witin 5 seconds does something different than toggling it 4x (or any even number) within 5 seconds.. and also WHAT it does differs depending on whether motionrule or manualrule was active prior to your toggling. I ideally want to make it so that a single manual toggle always enables manual mode, and ANY amount of toggling beyond 1 within 5 seconds (re)enables auto mode.)
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474744.31/warc/CC-MAIN-20240228175828-20240228205828-00559.warc.gz
CC-MAIN-2024-10
6,093
28
https://forums.alliedmods.net/showthread.php?s=cd2fcadc74469b54247134572b1c728b&p=2669329
code
I have an L4D2 Realism server running SirPlease's Competitive Rework. A couple weeks ago, my server started randomly disconnecting everyone on the server midgame. Sometimes we can get through a whole game without it happening, sometimes it happens right away, and sometimes it takes 30 or 40 mins or so, but it is seemingly random with no association to any specific event. Everyone will just get disconnected with the auto-retry message with nothing in console other than "connection to server time out". This will occur with both a config like zonemod running, and without any configs running. It will also happen with just me on the server. After everyone gets disconnected, it is almost as if the server is restarted, as it goes back to the map that is set in the startup and you can join the server again. Some things I have done: - I installed Accelerator and turned on logging and debugging, but nothing comes up in any of the logs and I know that they are working because if I deliberately crash the server by removing a core file, the logs are populated with errors. - I have ran confogl debugging and it doesn't seem like any of the confogl debug info points to a specific issue. - I have also contacted NFO Servers support and they said there is no activity or logs on their end that would cause time-outs and they can't really help otherwise. - Tried reinstalling sourcemod core files & plugins and it still does it. So anyway, I am hoping that someone can help me with trying to troubleshoot this issue, because I am basically out of ideas.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401604940.65/warc/CC-MAIN-20200928171446-20200928201446-00571.warc.gz
CC-MAIN-2020-40
1,553
10
http://www.osnn.net/threads/monitoring-software.34978/
code
Discussion in 'General Hardware' started by silky62678, Sep 7, 2003. Im looking for a good monitoring application that capture screen shots when the cam is running Check out Fwink: Free and open-source Also take a look at SPeedY's Camportal page for some other alternatives: Is this app, programmable to start taking screen shot by itself, when the cam starts, or do i have to turn it on and off when the cam starts? How do you mean when the cam starts? what exactlyis it that you are trying to do? take a timed pic? Well, the software needs to be running in order to take pictures at regular intervals. If the cam is always on, you could add a shortcut to the app to your Startup folder so that it starts taking pictures as soon as Windows starts...if that's what you want. no, im looking for computer monitoring software, that has webcam features. Now I'm just confused I think he meant Security software, like security officers use to watch on areas. Logitech Quickcam software has it. You mean those programs that monitor keystrokes and take screenshots every couple minutes? You got it, software that records keystrokes and take screenshots. Im trying to find one that has webcam features that take screenshots of it OK just to be clear, you want to record keystrokes and screenshots, but also uses a webcam to take pictures of the person at the computer? Or by 'webcam' do you mean screenshot? YES, are there any software able to do that?
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647146.41/warc/CC-MAIN-20180319194922-20180319214922-00018.warc.gz
CC-MAIN-2018-13
1,444
15
https://cmljnelson.blog/img_8409/
code
Colin Michael Lucien Jonathan Nelson’s Blog The Longest Name in WordPress I’m a dad from Cobble Hill, BC, Canada. I work on Print My Blog, WordPress and Django, and Dead Easy Family History. Member of the Church Of Jesus Christ. And I’m on Twitter. View all posts by Michael Nelson
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818072.58/warc/CC-MAIN-20240422020223-20240422050223-00314.warc.gz
CC-MAIN-2024-18
287
5
https://www.daniweb.com/hardware-and-software/hardware/threads/294781/need-help-with-my-motherboard
code
I have a motherboard with a problem. The board was working fine when one day I tried to turn it on and nothing came on the display. Everything else worked fine, the drives started up, cooling fans run. At first I thought the processor had died, but after testing and probing around for a few hours I noticed that when I turned it on, the BIOS chip overheats. I've been looking for other problems, and trying various solutions but so far that's the only symptom I can find is with that chip. I was wondering if there could be too much power going through it but all transistors and regulators look fine. Model: Aspire ASE380-ED501A Pocessor: AMD Athlon 64x2 Duo 2.4 GH Power supply: 300W Thanks for any help anyone has. I am well aware of the possibility that my motherboard may be dead.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583795042.29/warc/CC-MAIN-20190121152218-20190121174218-00513.warc.gz
CC-MAIN-2019-04
786
5
https://www.drupal.org/project/poweradmin
code
This project is not covered by Drupal’s security advisory policy. PowerAdmin is a Drupal module that provides API and a GUI to administer the configuration of a PowerDNS Name Server, with MySQL/PostgreSQL backend. WARNING! Although things seems to start working, the code is yet too young to be safely used to administer a DNS! - Domain management - Support for editing the domain SOA in a more friendly way - Insert the TTLs as suffixed human-readable strings [TODO] - Auto-append the domain name to records [TODO] - Records management, as single entries or directly in a table form - SOA record serial auto-update [TODO] - PowerDNS configuration file auto-generation (with table prefix support) - Supermasters management [TODO] - Advanced ACLs: global, per-zone and per-record [future] - Integration with AEgir to autoconfigure domains [future] - Suport for zone templates [future] - Maintenance status: Unknown - Development status: Unknown - Module categories: Administration, Third-party Integration, Utility - Downloads: 754 - Last modified: 27 November 2014 - This project is not covered by the security advisory policy. Use at your own risk! It may have publicly disclosed vulnerabilities.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118707.23/warc/CC-MAIN-20170423031158-00211-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,199
21
https://github.com/jrochkind/sample_megasearch/
code
A demo/sample Rails application using functionality from bento_search There is a short screen showing this app in action here: http://screencast.com/t/JLS0lclrBZU This is neither supported nor maintained nor suggested for production use, it is simply sample/demo code. To run it yourself, you'll want to look at to customize the bento_search engines being used: Their auth credentials, their other configuration, which engines are included in the list. You'll want to change their item decorators, as they currently have decorators set up to change links to jrochkind's institutional link resolver, you'll want to remove or change those. It's all in the initializer.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530060.34/warc/CC-MAIN-20190420220657-20190421001721-00008.warc.gz
CC-MAIN-2019-18
666
9
https://lists.debian.org/debian-security/2003/05/msg00073.html
code
Apt-get only security patches Probably a stupid question, but one I don't know the answer for. Is there any simple way of telling apt or dpkg to *only* download and install security patches instead of other changes to a release [thinking testing or unstable here]. For example on one of my "stable" machines, the following happens when I do apt-get upgrade -u: The following packages will be upgraded 2 packages upgraded, 0 newly installed, 0 to remove and 0 not upgraded. Need to get 0B/1030kB of archives. After unpacking 105kB will be freed. Do you want to continue? [Y/n] Obviously neither is of real security importance, but will be updated nevertheless. [I don't want to remove the standard stable source from deb ftp://ftp.is.co.za/linux/distributions/debian stable main contrib deb http://non-us.debian.org/debian-non-US stable/non-US main contrib deb http://security.debian.org stable/updates main contrib non-free
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526228.27/warc/CC-MAIN-20190418181435-20190418202400-00080.warc.gz
CC-MAIN-2019-18
923
15
http://forum.linuxmce.org/index.php/topic,12696.0/prev_next,prev.html
code
I should have mentioned, but I was on 810 when I posted this. Last night I decided to re-install and started with a fresh 1004 Kubuntu. After doing an update I ran the LMCE install script and it completed successfully. I plan on having another go at installing the i2004 over the weekend. From a quick look at the admin web site, I see that there is still no i2004 or unistim device in 1004 so I've definitely got some work ahead of me. Before jumping in, I just want to clarify the steps I'll need to follow. Step 1: Install and get a softphone working for testing purposes. Back on 0810, I didn't even manage to get that right to be honest. I tried installing Linphone as I noticed that it is a listed device in the LMCE admin site. I'd like to have something working there to gain some confidence and have something to test against. Once I have this working, I imagine that I should be able to make a call between Linphone and the hibrid's softphone extension? Step 2: Install the chan_unistim library on the core's Asterisk installation. From my research, I need to provision each SIP line in the /etc/asterisk/unistim.conf file. Now, if I do this manually, should I expect this to work without the LMCE device template? Step 3: Having thought about my question in 'step 2', am I correct in assuming that the purpose of my creating the LMCE device template for unistim phones would be to auto-provision the unistim.conf file? If so then I assume creating the template involves some scripting in order to auto-edit the conf file and populate the LMCE device DB table? Step 4: If I'm right so far, then I imagine I should then delete the manual entry I created in step 2 in the unistim.conf file and them create the device "properly" from the LMCE admin web site? Step 5 (down the road): Submit the template for evaluation and inclusion into the main LMCE build? Question: Is the unistim phone device template the only LMCE artifact I need to code/create? I'm assuming that I don't have to also enhance the Asterisk interface template (assuming there is such a thing). I know I've got some more reading ahead of me, guess I'm sort of thinking out loud to get my thoughts straight. Update: I've found the wiki document called Developing_a_DCE_Device (couldn't post the link) and admittedly haven't read this yet. I assume this is my 'bible' for the next few days?
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.79/warc/CC-MAIN-20170423031203-00579-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,364
9
http://anticapitalistchronicles.libsyn.com/2019/11
code
Nov 14, 2019 Prof. Harvey is joined by CUNY Graduate Center Professor Cindi Katz to discuss social reproduction and its relation and significance to capitalism's success. The Anti-Capitalist Chronicles look at capitalism through a Marxist lens. Support the show on Patreon and get early access to episodes and more: https://www.patreon.com/davidharveyacc Having trouble logging in?
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540553486.23/warc/CC-MAIN-20191213094833-20191213122833-00453.warc.gz
CC-MAIN-2019-51
381
6
https://www.tr.freelancer.com/projects/typing/chinese-note
code
Üzgünüz, aradığınız işi bulamadık. En son işleri buradan bulabilirsiniz: Need a native Punjabi translator for our long term project from English to Punjabi. please bid only native bidders. No agencies or firm and not allowed any google or machine translation. Words: 12k Budget: $120 Deadline: 4-5 days max Note: Need to provide a short translation for quality checking. I have a website which I am unable to update or change due to the web developers using bootstrap of which I have zero knowledge. The site is [login to view URL] and I need it updated or rebuilt with improvements that were not available when it was done 5 years ago. I also need access to change things such as front page content, faqs etc, which I cannot do without emailing him a thousand times and ... I would like to have a Spanish Voiceover artist to make a demo for my Spanish app. Requirements: 1. Native Spanish speaker 2. Have voice samples 3. Understand english Thank you! Hello, I am looking for WordPress plugin developer. -> want to redirect users location wise and set the cookies or session for redirect time. will explain further idea via chat I need someone who can give me logos and business card's designs I need an experienced typist to help with a article retyping project. Deadline varies I want a 3d model character of Maa Durga, Hindu Goddess. With rigging and animation. Looking for 2 people part or full time to join our data-driven content team that publishes reports for publications such as the Education Data Initiative. You will be searching for publicly available datasets, identifying noteworthy data points, making custom calculations from that data and (ultimately) writing long-form content that presents and explains that data to the average internet user. I need all 3 letters attached together almost as I sent in the attachment. Entrance Hall - redesign Model existing space with new design elements - providing 3D renders and sketch plans & elevations for installation
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573699.52/warc/CC-MAIN-20220819131019-20220819161019-00101.warc.gz
CC-MAIN-2022-33
1,989
12
http://www.mathworks.com/help/dsp/ref/dsp.variablebandwidthiirfilter-system-object.html?requestedDomain=true&nocookie=true
code
Variable bandwidth IIR filter VariableBandwidthIIRFilter object filters each channel of the input using IIR filter implementations. It does so while having the capability of tuning the bandwidth. This filter supports double and single precision inputs. To filter each channel of the input: Starting in R2016b, instead of using the to perform the operation defined by the System object™, you can call the object with arguments, as if it were a function. For example, = step(obj,x) and y = obj(x) perform vbwIIR = dsp.VariableBandwidthIIRFilter returns vbwIIR, which independently filters each channel of the input over successive calls to the object uses a specified IIR filter implementation. The filter’s passband frequency may be tuned during the filtering operation. The variable bandwidth IIR filter is designed using the elliptical method. The filter is tuned using IIR spectral transformations based on allpass filters. vbwIIR = dsp.VariableBandwidthIIRFilter(' returns a variable bandwidth IIR filter System with each property set to the specified value. You can specify additional name-value pair arguments in any order as ( Input sample rate Specify the sampling rate of the input in Hertz as a finite numeric scalar. The default is 44.1 kHz. This property is non-tunable. Specify the type of the filter as one of IIR filter order Specify the order of the IIR filter as a positive integer scalar. The default is 8. This property is non-tunable. Filter passband frequency Specify the filter passband frequency in Hz as a real, positive scalar, smaller than the Filter center frequency Specify the filter center frequency in Hz as a real, positive scalar, smaller than Specify the filter bandwidth in Hertz as a real, positive scalar, Filter passband ripple Specify the filter passband ripple as a real, positive scalar in decibels (dB). The default is 1 dB. This property is non-tunable. Filter Stopband attenuation Specify the filter stopband attenuation as a real, positive scalar in decibels (dB). The default is 60 dB. This property is non-tunable. |reset||Reset internal states of variable bandwidth IIR filter| |step||Filter signal using variable bandwidth algorithm| Note: This example runs only in R2016b or later. If you are using an earlier release, replace each call to the function with the equivalent step syntax. For example, myObject(x) becomes step(myObject,x). This examples shows you how to tune the center frequency and bandwidth of the IIR filter. Fs = 44100; % Input sample rate % Define a bandpass variable bandwidth IIR filter: vbwiir = dsp.VariableBandwidthIIRFilter('FilterType','Bandpass',... 'FilterOrder',8,... 'SampleRate',Fs,... 'CenterFrequency',1e4,... 'Bandwidth',4e3); tfe = dsp.TransferFunctionEstimator('FrequencyRange','onesided'); aplot = dsp.ArrayPlot('PlotType','Line',... 'XOffset',0,... 'YLimits',[-120 5], ... 'SampleIncrement', 44100/1024,... 'YLabel','Frequency Response (dB)',... 'XLabel','Frequency (Hz)',... 'Title','System Transfer Function'); FrameLength = 1024; sine = dsp.SineWave('SamplesPerFrame',FrameLength); for i = 1:500 % Generate input x = sine() + randn(FrameLength,1); % Pass input through the filter y = vbwiir(x); % Transfer function estimation h = tfe(x,y); % plot transfer function aplot(20*log10(abs(h))) % Tune bandwidth and center frequency of the IIR filter if (i==250) vbwiir.CenterFrequency = 5000; vbwiir.Bandwidth = 2000; end end This filter covers frequency transformations. A lowpass IIR prototype is designed, using the elliptical method by specifying its order, passband frequency, passband ripple and stopband attenuation. The passband ripple and stopband attenuation are equal to the values The prototype passband frequency is set to 0.5. If the the prototype’s order is equal to the value of FilterType property is the prototype filter order is equal to The prototype is a Direct Form II Transposed cascade of second-order sections (Biquad filter). The prototype is transformed into the desired filter using the algorithms used in Digital Frequency Transformations. Each prototype SOS section is transformed separately. When the resulting filter remains a Direct Form II Transposed cascade of second order sections. If the the resulting filter is a cascade of Direct Form II Transposed cascade of fourth order sections. A. G. Constantinides. “Spectral transformations for digital filters”, Proc. Inst. Elect. Eng. Vol. 117, No. 8, 1970, pp. 1585-1590. Usage notes and limitations: See System Objects in MATLAB Code Generation (MATLAB Coder).
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814857.77/warc/CC-MAIN-20180223213947-20180223233947-00351.warc.gz
CC-MAIN-2018-09
4,541
64
https://python.libhunt.com/dateutil-latest-version
code
dateutil v2.8.1 Release NotesRelease Date: 2019-11-03 // almost 4 years ago 🔖 Version 2.8.1 (2019-11-03) ⚡️ Data updates - ⚡️ Updated tzdata version to 2019c. - 🛠 Fixed a race condition in the caches on Python 2.7. Reported by @kainjow (gh issue #901). - 📜 Parsing errors will now raise ParserError, a subclass of ValueError, which has a nicer string representation. Patch by @gfyoung (gh pr #881). parser.parsewill now raise tzinfosis passed a type that cannot be interpreted as a time zone. Prior to this 🔄 change, it would raise an UnboundLocalErrorinstead. Patch by @jbrockmendel (gh pr #891). - 🔄 Changed error message raised when when passing a 🛠 the time zone name to gettz in Python 3. Reported and fixed by @labrys () (gh issue #927, gh pr #935). - 🔄 Changed compatibility logic to support a potential Python 4.0 🚀 release. Patch by Hugo van Kemenade (gh pr #950). - ⚡️ Updated many modules to use tz.UTCin favor of internally, to avoid an unnecessary function call. (gh pr #910). - 🛠 Fixed issue where dateutil.tzwas using a backported version of contextlib.nullcontexteven in Python 3.7 due to a malformed import statement. (gh pr #963). - ✅ Switched from using assertWarns to using pytest.warns in the test suite. (gh pr #969). - 🛠 Fix typo in setup.cfg causing PendingDeprecationWarning to not be ⚠ explicitly specified as an error in the warnings filter. (gh pr - Fixed issue where test_tzlocal_offset_equalwould fail in certain environments (such as FreeBSD) due to an invalid assumption about 🛠 what time zone names are provided. Reported and fixed by Kubilay Kocak (gh issue #918, pr #928). - 🛠 Fixed a minor bug in 🛠 handling. Fixed by @fhuang5 (gh issue #776, gh pr #879). - 🔧 Explicitly listed all markers used in the pytest configuration. (gh - ✅ Extensive improvements to the parser test suite, including the 💅 adoption of pytest-style tests and the addition of parametrization ✅ of several test cases. Patches by @jbrockmendel (gh prs #735, #890, #892, #894). - ➕ Added tests for tzinfos input types. Patch by @jbrockmendel (gh pr - 🛠 Fixed failure of test suite when changing the TZ variable is forbidden. Patch by @shadchin (gh pr #893). - ✅ Pinned all test dependencies on Python 3.3. (gh prs #934, #962) 📚 Documentation changes - 🛠 Fixed many misspellings, typos and styling errors in the comments 📚 and documentation. Patch by Hugo van Kemenade (gh pr #952). - ➕ Added Python 3.8 to the trove classifiers. (gh pr #970) - 🚚 Moved as many keys from setup.cfgas possible. Fixed by @FakeNameSE, @aquinlan82, @jachen20, and @gurgenz221 (gh issue #871, gh pr #880). - 📜 Reorganized parsermethods by functionality. Patch by @jbrockmendel (gh pr #882). - 🚀 Switched release.pyover to using 🚀 releases, rather than direct invocations of setup.py. Fixed by @smeng10 (gh issue #869, gh pr #875). - ➕ Added a "build" environment into the tox configuration, to handle 🚀 dependency management when making releases. Fixed by @smeng10 (gh issue #870,r gh pr #876). - GH #916, GH #971 Previous changes from v2.7.5 ⚡️ Data updates - ⚡️ Update tzdata to 2018g
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.3/warc/CC-MAIN-20230923194908-20230923224908-00421.warc.gz
CC-MAIN-2023-40
3,176
72
https://authoredup.com/blog/readability-score
code
Have you ever wondered why some writing pieces are easier to read and understand than others? For instance, I am sure you've experienced the frustration of trying to read a text, whether it be a social media post, article, or email, and not being able to make sense of it. On the other side, I am also sure you've come across a piece of content that was so easy to read and understand that you breezed through it in no time. So what makes the difference between these two kinds of texts? The answer lies in readability. More precisely, in readability score. And in today's article, we'll go over everything you need to know about readability scores. We'll cover what it is, why it matters, and, most importantly, how to use it to your advantage when writing content! Let's go step by step so you can get the whole picture. A readability score is a number that tells you how easy or difficult it is to understand a given piece of text. It uses a combination of metrics such as sentence length, word complexity, syllables per word, and other factors to determine an overall score. And usually, it approximates the US grade level needed to comprehend the text. The Flesch-Kincaid Grade Level, Gunning Fog Index, and Automated readability index are the most popular. Still, there are more than 200 readability formulas for the English language, usually categorized by the industry (education, healthcare, publishing. etc.). That is why it is crucial to remember which formula is used and how that affects the final result. This article will focus on the Automated readability index (ARI), the score used by AuthoredUp, and other content creation editors, such as the Hemingway app. ARI gives you a grade level from 1 to 14, the one being the simplest text and 14 being the hardest to read. Higher the grade = harder to read Lower the grade = easier to read Here's what AuthoredUp's readability score looks like: In short, a readability score is important because it helps you gauge how challenging or accessible your writing needs to be based on the audience you're trying to reach. This can be especially helpful when writing for an audience with diverse reading levels or backgrounds. You'll know exactly how complex (or easy) each piece of content will be for them to digest. For example, let's say you're trying to explain something complicated - like quantum physics - to someone who doesn't have any background knowledge in physics. In this case, having a low readability score (which would indicate simpler language and shorter sentences) would be beneficial so that your explanation isn't too hard for them to follow. On the other hand, if you were trying to explain the same concept to someone with a Ph.D. in physics, you'd likely want to use more complex language and have a higher readability score because they would understand more complicated terms and language. Also, a readability score is important because it can help you improve your writing. By using a readability score to assess the difficulty of a given piece of text, you can identify areas that need improvement. That way, you can make sure that your content is optimized for whatever audience you're trying to reach. Using a readability score is easy. All you need to do is paste the text into chosen readability checker and wait a few seconds for the score to be calculated. When using AuthoredUp for LinkedIn posts, grade level is calculated automatically while you write. And you can see it in the footer: Once you have your readability score, you can determine if the text is easy or hard to read and make changes accordingly. If you want to lower your readability score (make the text easier to understand), then you can do a few things. One of the most effective ways to improve your readability score is to keep sentences short and concise. Aim for clarity with every sentence and ensure that each one conveys its message without unnecessary fluff or jargon. Another effective way to lower your readability score is to use simple words. Using simpler words will make it easier for readers of all literacy levels to understand what you're trying to say without having to look up unfamiliar words in a dictionary. Additionally, using simple words will make your writing sound more conversational and relatable – something that's important when it comes to connecting with an audience online. Industry jargon or technical terms specific to an industry or profession can be incredibly difficult for readers to understand, even if they're familiar with the topic. To ensure everyone can understand what you're writing about, avoid using industry-specific language whenever possible. Instead, use simpler terms and explanations so that readers don't have any trouble understanding the point you're trying to make. Long paragraphs can be intimidating for a reader and lead them straight into information overload territory before they even realize it! To keep readers engaged and ensure they're actually taking in what you've written, break up long paragraphs into shorter ones whenever possible. Doing so will help draw attention to key points and keep readers from getting lost in long blocks of text (which is never a good thing!). Readers should easily be able to move from one sentence or paragraph to the next without having to reread anything because it was unclear or confusingly written. Using simple language and transitions when appropriate to connect one idea with the next so that everything flows naturally together without any hiccups along the way. This will make for much smoother reading overall and help keep your readability score low. Although it's practical to aim for a readability grade level of 8 or lower, in some cases, you may want to increase the readability score intentionally (make the text more complex). To increase the readability score, consider these strategies: Where you want to make the text more advanced, use longer sentences. This will naturally increase the readability score since longer, and more complex sentences are harder to read. Keep them clear, concise, and easy to follow so the reader won't get lost in a long-winded explanation. Sometimes, you may want to use technical terms or jargon specific to the industry or topic. Doing so will make the text more dense and complex, thus increasing its readability score. Just explain what you mean when using these terms so that the readers can understand what you're talking about. Using more complex syntax – such as subordination and coordination – can also help boost your readability score while ensuring the text is understandable. This includes using phrases such as "although," "in spite of," and "on the other hand" to introduce more complex ideas into the text without making it too dense. Contractions, such as "can't" or "won't," can help make the text sound more conversational and relatable. However, if you want to boost your readability score, then it's best to avoid using them. Writing out the full versions of words can help make the text sound more formal and complex, thus increasing its readability score. Using more complex words can also help increase your readability score. However, make sure not to overdo it, as it's still important to ensure that the text is understandable. You don't want to use words that the readers won't know or understand, making it difficult for them to get anything out of their reading. I knew you were going to ask this question! The best readability score is subjective and depends on your audience, the purpose of your text, and many other factors. Generally speaking, a readability score of 8 or lower is considered the "sweet spot." It indicates that most people can easily read and understand the text while still being somewhat challenging enough to keep the reader engaged. However, there is a difference between content types. You don't expect the same investment and concentration when someone is scrolling through the feed, reading breaking news, or consulting technical documentation. Social media posts, including those written on LinkedIn, usually have lower readability grades. However, there's no point in having a text that is easy to read but doesn't convey valuable information or fails to drive the desired action. This balance between readability and comprehension is the key to creating effective text that will resonate with your readers. What you want to keep in mind when creating content, significantly LinkedIn posts is that people are often scrolling through their feeds quickly and skimming the text, so it would be clever to make posts as easy to read as possible without sacrificing the content's quality. A readability score is a powerful tool for content creation. It's an excellent mechanism for ensuring the message reaches its intended audience without making them feel overwhelmed, confused, or bored. So, the next time you sit at a computer screen ready to write, remember to keep the readability score in mind. It might be the difference between a post that gets read and one that gets skipped over. However, a readability grade is only one of the multiple criteria you should have in mind when writing content on LinkedIn. Ready to see what your readability score is and start making more compelling content? AuthoredUp is a new all-in-one content creation tool designed explicitly for LinkedIn. It can measure your post's readability score and help you write, preview, and format them to ensure they look perfect before you publish. Plus, you can save your posts as drafts so that you can come back and edit them later. How cool is that? Try out AuthoredUp today and see the difference for yourself. You won't be disappointed! Important notice: AuthoredUp is currently FREE to use cause it's still in beta, but it will be a PAID subscription very soon! So, don't miss out on this great opportunity and try AuthoredUp today.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00507.warc.gz
CC-MAIN-2023-50
9,895
73
https://soundcloud.com/captaincooked
code
Up front by the speakers Basically you're getting twice the bass. Your current browser isn't compatible with SoundCloud. Please download one of our supported browsers. Need help? Sorry! Something went wrong Is your network connection unstable or browser outdated?
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607120.76/warc/CC-MAIN-20170522211031-20170522231031-00326.warc.gz
CC-MAIN-2017-22
263
6
https://blogs.sap.com/2013/09/20/script-logic-passing-values-from-excel-to-script-logic-2/
code
Script logic – Passing values from Excel to Script logic Execute script logic from a Data Manager (DM) Package passing parameters for: 1. Text substitution 2. Dimension selection To document my own findings and experience on this topic which might assist you to be more effective in finding your own solution. Perhaps it might also invoke those more technical to add to the discussion and close the knowledge gaps we as functional consultants struggle with in the field. Reference (Data Manager help documentation): Overview of DM package and interface: 1. When setting up the DM package the interface to BW is ALWAYS by means of a BW process chain 2. The script language in the DM package is being executed on the client machine in the front-end while the script logic (.lgf) is being executed as part of the process chain on the BW server in the backend. These are two separate concepts with two separate syntaxes. 3. The DM script language reserved words are fairly limited and can be viewed as the parameter list which is displayed when you press “MODIFY SCRIPT” 4. The values from this part of the DM script are processed in the process chain under “MODIFY DYNAMICALLY” and bearing in mind that the parameters may not be relevant depending on the content of the process chain. In this discussion we are focussing on the /CPMB/IC_DATA process chain for executing script logic. Effectively providing a user interface to UJKT. 5. When we double-click the process chain variant, “RUN LOGIC” in this case, we find the list of fields which can be populated and recognise some as standard values set by the DM “MODIFY SCRIPT” language. This list would differ between process chains and some values may not be mandatory. 6. If we revert our attention back to the DM script language then we see that setting these values requires the use of the TASK function. The script is by default populated with the constant variables e.g. %USER% (refer to help documentation for complete list) PROMPT(TEXT,%PROMPT_VAR1%, “Text input”, , ,) The standard syntax for prompting a user for dimension input is: PROMPT(SELECTINPUT, [variable], [second variable], [label], [dimensions]) The default prompt for user input of the standard dimensions (E/C/R/T) is: PROMPT(SELECTINPUT,,,,”%ENTITY_DIM%,%CATEGORY_DIM%,%CURRENCY_DIM%,%TIME_DIM%”). Firstly notice the absence of the second parameter for [variable] but if you refer to the help doc. you will see that when omitted the default value of %SELECTION% is used. You could therefore override or add to the prompt your own dimension(s), add a personal variable and set the SELECTION property e.g. PROMPT(SELECTINPUT,%MYVAR%,,”Time”,”TIME”) and TASK(/CPMB/ICDATA_LOGIC,SELECTION,%MYVAR%) Also note that the use of the “%” for denoting variables is optional and purely used out of convention for readability. The net effect of these two lines of syntax is to dynamically set what you would otherwise have hard-coded in script logic as an *XDIM_MEMBERSET function. For completeness sake you would therefore EXCLUDE any dimensions from *XDIM_MEMBERSET scoping that you have passed using the SELECTION property. Also note that it is not possible to “hand-shake” the selection set created by your user input dialog prompt variable (DM variable) and your script logic file variables. The DM variable contains multiple dimensions each with multiple selections so your script logic has no ability to “unravel” these sets into usable script logic variables. Rather think of the SELECTION property as a *XDIM_MEMBERSET statement sent from DM. Managing individual values must be done using *WHEN functions or other. You can check your scoping via the SELECTION property in two ways after the script logic has been executed and you review the log file (DM View status): a) The Package log will confirm the values of the user inputs against the DM variable. b) The selection part of the log file will show you the resolved result of the exact full scope i.e. the combination of the user selections passed by SELECTION and the *XDIM scope. REPLACEPARAM is the property used to pass a TEXT string from DM to script logic whether this is collected via a dialog prompt such as PROMPT(TEXT… or not. Receiving this value into the script logic file requires the same parameter value enclosed in “$” as we are fairly familiar with. Having this basic understanding of how the interface works should better assist you in finding functional solutions for typical interface issues. Typical functional requirements may be to: a) Use the current context selection to drive script logic. (Context / Current view available in BADi but not in DM to pass as a parameter) b) Limit the dialog box selections for end users (Use security settings) c) Have the REPLACEPARAM functionality for a single selection but based on a dimension selection. (not possible) d) Assign dimension selection to text variable in DM. (Not possible)
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.87/warc/CC-MAIN-20231130031610-20231130061610-00520.warc.gz
CC-MAIN-2023-50
4,973
31
https://forum.defold.com/t/hyper-dot-hyper-casual-game-my-first-game-with-defold/49842
code
I finally had a bit of time to make a game with defold. Feel free to try it out and give feedback, ideas and suggestions on it. iOS version is still waiting review with Apple, it has been a few days so hopefully should be on reviewed soon. Huge thanks to @aglitchman for his hypertails library which I used in the game it works well Also thanks to @AGulev for the unity ads extension which I am trying out.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256426.13/warc/CC-MAIN-20190521142548-20190521164548-00135.warc.gz
CC-MAIN-2019-22
406
4
https://resources.infosecinstitute.com/topic/goldeneye-1-ctf-walkthrough-part-1/
code
GoldenEye 1: CTF walkthrough, part 1 In this article we will attempt a capture-the-flag (CTF) challenge called “GoldenEye 1.” This CTF was posted on VulnHub by the author Creosote. Per the description given by the author, this is an intermediate-level machine designed as an OSCP type of vulnerable machines. The goal of this challenge is to read the flag hidden in the root directory. For those who are new to my articles, vulnhub.com is a platform which provides vulnerable machines for security practitioners to gain hands-on experience in the field of information security. You can go through my previous articles to find solutions to several other machines and learn new techniques. There are a lot of challenging CTF exercises available on vulnhub.com and I highly suggest attempting them, as it is a good way to keep your skills sharp and learn new techniques in a safe environment. Let’s start to setup this machine for solving the challenge. Please Note: For all of these machines, I have used Oracle Virtual Box to run the downloaded machine. I will be using Kali Linux as an attacker machine for solving this CTF. The techniques used here are solely for educational purposes, and I am not responsible if the listed techniques are used against any other targets. After running the machine in Virtual Box, we need to identify the target machine IP address. I have used the Netdiscover command for this purpose. The command output can be seen in the screenshot given below: Command Used: netdiscover We’ve found it! The target machine IP address for this CTF is 184.108.40.206. Please Note: The target and the attacker machine IP address may be different depending on your network configuration. Let’s start exploring the machine. The first step is to find out the available open ports and services on the target machine. So I started an Nmap full port scan on the target machine, which can be seen in the screenshot given below. Command Used: nmap 192.168.1.10 -Pn -p- -sV In the above screenshot, we can see that there are four open ports available on the target machine. As port 80 is available on the target machine, let’s check the application first. I opened the target machine IP on the browser and it showed an interesting web page: In the above screenshot, there is a clue mentioned in the text displayed. It states to “navigate to /sev-home/ “ So let’s open this folder on the browser and find out where it takes us. It can be seen in the following screenshot. You can see that the above page requires authentication, as it prompted us to enter a username and password. I started checking the html content of the homepage for any useful hints. After some time, I found that the index page has something interesting which can be explored further. It can be seen in the screenshot given below. We have found two usernames in the comments section. They are listed below: We have also found an encoded string which can be seen in the highlighted area in the above screenshot. It is mentioned in the user comments that this is the password. Let’s decode the string and try to login on the application with these credentials. Encoded String is given below. For decoding the string, I used the Burp Decoder tool with the HTML decoder settings. You can see the result in the screenshot given below. As you can see, we have decoded the password. As we already have two valid usernames found above, let’s try to log into the application with these credentials. Decoded Password: InvincibleHack3r It can be seen in the above screenshot that we have successfully logged into the “GoldenEye” application. There is some information given on the home page which is worth noting. It can be seen in the highlighted area in the above screenshot. The highlighted message is as follows: “Remember, since security by obscurity is very effective, we have configured our pop3 service to run on a very high non-default port …” From the above message, we can understand that there is an active POP3 service running on some non-default port. As we have already conducted a full Nmap scan on the target IP in the very first step, so, we already know the port on which the POP3 server is running. Also, while analyzing the HTML content of “terminal.js” we found a note in comments that the target system is using default passwords. So let’s try to brute-force the pop3 service with Hydra, using the username “boris” which was found in the previous step. The output of the Hydra command can be seen in the following screenshot. Command Used: hydra -l boris -P /usr/share/wordlists/fasttrack.txt -f 192.168.1.10 -s 5007 pop3 In the highlighted area in the above screenshot, we can see that the brute-force attack was successful, and the tool has cracked the password for the user “boris.” Let’s repeat the same process for the other user, “natalya.” This second scan was successful, and the result provided us with the password for the user ”natalya”. It can be seen in the screenshot given below. Command Used: hydra -l natalya -P /usr/share/wordlists/fasttrack.txt -f 192.168.1.10 -s 55007 pop3 So now we have two username-and-password combinations which can be seen in the following table. Let’s try to log into the target application with these credentials. I used the Netcat utility to log into the target server through the pop3 port and using user “boris” credentials. It can be seen in the screenshot given below. - nc 192.168.1.10 55007 (Used Netcut to connect to target system on port 55007) - USER boris (Used this command to enter the username boris) - PASS secret1! (Used this command to enter the password of the user. After that, we received a success message from the target machine now we have successfully authenticated on the target system) - LIST (Used to list all the emails which are available on the target system) So by the above command, we found that there are three emails on the target system. Let’s read these emails to see whether we can find any useful hint about the target machine. I have attached a screenshot of each email: In the above screenshot, there is an email sent by the root user on the target machine to user “boris” that states that the root user does not scan emails for security risks. The second email can be seen in the screenshot given below. This email is from user “natalya,” stating she can break Boris’s codes. Now let’s check the third email. In the above screenshot, we can see that there is an email in which GoldenEye’s access codes are sent as attachments, which are kept inside the root directory. But we cannot read the attachments from here. Let’s move to “natalya” and check the contents. In the following screenshot, it can be seen that we have logged in as user “natalya” using the same process as used for “boris.” After logging in as user “natalya,” we have seen that there are two messages in that folder. Let’s read these messages. First message can be seen in the following screenshot. In the above screenshot, we can see that there is an email from the root user on the target machine. Let’s check the second email. In the above screenshot, we can see in the highlighted area that we have found some useful information. There was another set of user credentials, which is given below. We will use this information to proceed further in this CTF in the next article. ‘Til then, I want you to try by yourselves till this point and follow the instructions given in the above message. In part 2 of this article, we will complete this challenge and capture the flag from the root directory. - POP3 Commands, Electric Toolbox - Moodle – Remote Command Execution (Metasploit), Exploit Database - Vulnerability & Exploit Database, Rapid7 - ‘overlayfs’ Local Privilege Escalation, Exploit Database - GoldenEye: 1, VulnHub - Download GoldenEye, VulnHub - Download GoldenEye (torrent), VulnHub
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945279.63/warc/CC-MAIN-20230324082226-20230324112226-00349.warc.gz
CC-MAIN-2023-14
7,950
52
https://www.lawnsite.com/threads/dandelion-pulling-technique.73430/
code
In Northern Ontario the dandelions overwinter and in the spring start growing. They flower in late spring (right about now). Soon they will turn to seed and the new weeds will start to germinate in late July. Anyway my questions are: 1) Are the above statements true? and 2)If using manual eradication does the entire root have to be removed, or just the "button"?
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948569405.78/warc/CC-MAIN-20171215114446-20171215140446-00111.warc.gz
CC-MAIN-2017-51
364
1
https://www.reddit.com/r/AskReddit/comments/1634v0/i_am_writing_a_college_app_essay_that_asks_me_to/
code
Im applying for undergrad at University of Michigan at Ann Arbor if anybody is interested in knowing that. Here is the full question:Everyone belongs to many different communities and/or groups defined by (among other things) shared geography, religion, ethnicity, income, cuisine, interest, race, ideology, or intellectual heritage. Choose one of the communities to which you belong, and describe that community and your place within it. I think reddit overall is an outstanding community that i learn a lot from. On many occasions I have witnessed extreme acts of kindness and people giving outstanding and well thought out advice. Any opinions on either my topic for the essay or reddit being a community would be greatly appreciated. Thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720468.71/warc/CC-MAIN-20161020183840-00325-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
745
3
http://www.sci.tamucc.edu/wiki/AmandaMarquez/KeyTermsFromLectureAndReading-Spring2019B
code
What have you learned thus far? Unit 1: Studying Sociology, The Fundamentals Main ideas "TAKEN AWAY" from Sociology Lecture: - social norms and social institutions govern our lives - history affects those norms: shapes our values and interactions with others - a way of looking at life and the world around you 4 assumptions of sociology: - humans are social beings and part of social groups, and we like to interact with others as we organize ourselves in groups. - individuals experiences are socially determined: the way you act, the way you were raised, predispositions - identity is socially bestowed: how other people see us and view us in their eyes. - we create,sustain, and create social forms: our actions shape our lives and the others lives around us. People make up social groups, social structures shape our lives in society. We have to be the change - continuous interaction makes social change possible( through collective action- is not a simple process/ takes time). (Ex: Marriage Equality) - What is the Sociological Imagination? How does it help you to examine the human social world? What are personal troubles/ public issues? - What is Conflict Theory? How does it help you to examine the human social world? Unit 2 Social Class - What did you learn as a result of the in class exercise on Tuesday 2/5? - Budgeting is hard, financial instability is REAL, kids are expensive, pets costs money, schools(Montessori schools education quality matters when it comes to a child's life chances), costs of transportation, Health insurance= access to these things depends on how much your household income is. - What about the bare necessities? Personal needs? Car insurance? Not even a consideration if your household income was not substantial enough- must have to accept doing without. - How did you use your Sociological Imagination to be able to complete the exercise? Key terms/"take aways" from lecture: Section 141: 11 am class - Most people assume that there are 3 SOCIAL CLASSES- LOWER, MIDDLE AND HIGHER - SOCIAL CLASS IS BASED ON INCOME/ Household income - AWARENESS OF SOCIAL CLASS STATUS OCCURS IN MIDDLE SCHOOL- INDIVIDUALS START TO TAKE NOTICE OF DIFFERENCES THEY EXPERIENCE ON THEIR OWN - MANY PEOPLE DON'T HAVE CLEAR UNDERSTANDING OF SOCIAL CLASS- BROAD CATEGORY "THE MIDDLE" - often see themselves there. - SOCIAL STATUS "MARKERS" - ECONOMIC= WHERE THEY LIVE, BUY/MATERIAL POSSESSIONS, SOCIAL GROUPS, THAT THEY ARE A PART OF SCHOOLS, EDUCATION/JOB - RACE/ETHNICITY- DEPENDS ON HOW YOU GROW UP, SOCIAL LOCATION, EXPOSURE TO DIFFERENCE - "CONSPICUOUS CONSUMPTION" - PERFORMING STATUS( INCREASE YOUR ECONOMIC STATUS), DETERMINED BY WHAT YOU BUY (ex: Air pods, Apple Products, Lulu Lemon, NIKE/JORDANS, YEEZY'S, PURSE(MICHAEL KORS), CARS, KENDRA SCOTT/JAMES AVERY, JAMES CHARLES) - EVERYONE PARTICIPATES IN IT WHETHER WE ARE AWARE OF IT OR NOT = STATUS MAXIMIZATION, DEPENDING ON THE SOCIAL CONTEXT YOU ARE IN, YOU WILL FIND DIFFERENT WAYS OF DOING THAT. Section 140: 1 pm class - Social class- some people don't know what they are, there tends to be three(lower, middle, high) - Most people place themselves in the "Middle" - Dominant patterns based on the data- most people try to maximize their social class/ social status- - How do people try to maximize their social status/class? - Meet certain criteria, income= determines what a individual can buy; credibility - Social markers/ social cues that we adopt to perform our social status- consumer- participate in conspicuous consumption- performance of social class/status (Ex: Air pods, IPhone? X, Michael Kors purses, James Avery/Kendra Scott,RTIC/YETI) - Educational Attainment/ School Systems, Job/income, Race/Ethncity, Family Dynamics, Culture,/religion, Social Location(where you live/where you are from) DETERMINE YOUR LIFE CHANCES
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348513230.90/warc/CC-MAIN-20200606093706-20200606123706-00499.warc.gz
CC-MAIN-2020-24
3,821
36
https://dobetter.libsyn.com/ep006-alison-bing-travel-writer
code
Mar 1, 2018 Alison Bing is a graduate of the Fletcher School of Law and Diplomacy, the author of many travel guide books for Lonely Planet and the BBC, her articles, essays and reviews litter the web from one hemisphere to the other. We talk the history and uniqueness of San Francisco, the hustle of being an independent writer, the value of travel and experiences, North Africa and the Middle East and the history of the color purple. Google Play: https://play.google.com/music/m/Itdo6vhbqj65fulcrzyx6ypwzya?t=Do_Better Whisper at Night: http://www.whisperatnight.com
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141735600.89/warc/CC-MAIN-20201204101314-20201204131314-00394.warc.gz
CC-MAIN-2020-50
569
4
https://kernel.googlesource.com/pub/scm/linux/kernel/git/mchehab/linux-next/+/0c22be0712b8771011880972aa30d3412aa3334e
code
kbuild: Make NOSTDINC_FLAGS a simply expanded variable During a simple no-op (nothing changed) build I saw 39 invocations of the C compiler with the argument "-print-file-name=include". We don't need to call the C compiler 39 times for this--one time will suffice. Let's change NOSTDINC_FLAGS to a simply expanded variable to avoid this since there doesn't appear to be any reason it should be On my build this shaved ~400 ms off my "no-op" build. Note that the recursive expansion seems to date back to the (really old) commit e8f5bdb02ce0 ("[PATCH] Makefile include path ordering"). It's a little unclear to me if the point of that patch was to switch the variable to be recursively expanded (which it did) or to avoid directly assigning to NOSTDINC_FLAGS (AKA to switch to +=) because someone else (out of tree?) was setting it. I presume later since if the only goal was to switch to recursive expansion the patch would have just removed the ":". Signed-off-by: Douglas Anderson <[email protected]> Signed-off-by: Masahiro Yamada <[email protected]> 1 file changed
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488560777.97/warc/CC-MAIN-20210624233218-20210625023218-00535.warc.gz
CC-MAIN-2021-25
1,081
18
http://davidsonmedia.weebly.com/techno-blog/category/answers
code
One of the great advantages of using Confluence for your technical documentation is that colleagues can collaborate on a project, which basically means adding and editing content in one central place. This is somewhere all the content for that project is created and kept, and a place that automatically informs all the team members about updates as and when these are made. Confluence does this all day long, standing on its head. After a few clicks to set it up, you're done and can forget about everything but adding content. But there's another form of collaboration too, one that we all know about but it's usually tucked away out of sight and only used when needed. I'm talking about the user forum, or as it is called in this case, Atlassian Answers. There are several reasons why this is a great user resource, for example: - I don't know about other forums, but the Atlassian one is excellent because you post a question and, almost without fail, you'll get a response in less than an hour, and often within a matter of minutes. These responses come from both other users and Atlassian staff. - I find there is feeling of community because everyone is here to be helpful. And the fact that you know that Atlassian staff, who are already busy with their day jobs, are keeping an eye on things, makes it even better. - You ask questions, you get rewards. Like badges and karma points. Ok, these might seem like a bit of froth, but in fact it's good to know that by asking a question or supplying an answer that other people also benefit from it. Many's the time that I've hung my head and asked what seems to be a dumb question, only to find that other people also want to know the answer. Suddenly it's not a dumb question at all: you've done everyone a favour in fact. - The questions you ask and answer all add to the general knowledge base of user info. And your input and experience will be different to other people's. This broadens everyone's understanding of how people are using Atlassian's products. - You also get to know (and trust) other people whose knowledge of the products is greater than yours. This may lead to other forms of collaboration. For example, you may end up doing business with them because they can supply the skills you need but don't have in-house. I'm sure there are plenty of other good reasons and benefits of using the forum, and while I'd be the first to admit it is often my last port of call (because I either try to figure it out myself or I use Atlassian's extensive user information), it's normally the quickest way to get answers and resolve problems.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348519531.94/warc/CC-MAIN-20200606190934-20200606220934-00374.warc.gz
CC-MAIN-2020-24
2,602
12
http://forum.xda-developers.com/showthread.php?p=50560096
code
Someone please write up a tutorial to mod status bar! I know Omkar has already made some status bar n those are good but i like stock statusbar with same icons but without SIM icon. I successfully decompiled systemui.apk but i don't know what i will have to remove from it to remove SIM icon. So if anyone can write a tutorial on modding statusbar then it would be a great help to novice android users like me. I have already gone through that article.But i didn't find the thing i want to do.This article is about changing the transparency,changing icons in quick toggle(not the home screen status bar that actually i want to change). I edited the above post and have added an image showing the icons that i want to remove. XDA Developers was founded by developers, for developers. It is now a valuable resource for people who want to make the most of their mobile devices, from customizing the look and feel to adding new functionality. Are you a developer?
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657123284.86/warc/CC-MAIN-20140914011203-00111-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
CC-MAIN-2014-41
959
5
https://beta.groups.io/g/main/message/18166
code
On Mon, Sep 3, 2018 at 11:10 AM, J_Catlady wrote: This kind of comment is exactly why I did not want to get into the specific applicationI'm sorry. I tend to get exasperated when people don't understand me after I've failed to explain myself. ;) The idea is that either the member or the mod applies the hashtag at some point, thus *eliminating* the need to moderate on a per-message basis and/or add it later. In our group, we deal with one main disease that has subdiagnoses. We know a priori when a member joins which their cat has (or the cat may be diagnosed with it later). We would apply the hashtag to the member immediately upon joining, or when their cat's diagnosis becomes known. I've started a separate thread about this, since it's a different feature on its own. Messages are the sole opinion of the author, especially the fishy ones. I wish I could shut up, but I can't, and I won't. - Desmond Tutu
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057371.69/warc/CC-MAIN-20210922163121-20210922193121-00337.warc.gz
CC-MAIN-2021-39
914
6
https://percicilan.wordpress.com/2008/10/10/overwhelmness-if-there-is-such-a-word/
code
I call her twice or three times a day. And yet I still cannot shake off the utter guilt that haunts me to no ends. That I am here and not there. That I am not the one by the hospital bed daily but the others are. That I can do just that 2 or 3 times phone calls a day to her ward and nothing else. Nothing else… save maybe for prayers here and there. Am I useless or what? Damn it. Oh damn it.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863519.49/warc/CC-MAIN-20180620124346-20180620144346-00618.warc.gz
CC-MAIN-2018-26
395
3
https://github.com/detroit-labs/AmazeKit/releases
code
You can clone with HTTPS or Subversion. Merge branch 'master' of github.com:detroit-labs/AmazeKit Fix bad spec file. Update to version 0.13.1. Merge remote-tracking branch 'upstream/master' Bump version number. Update version to 0.12.0. Update version to 0.11.0. Update to version 0.10.0. Whoops, add in ImageIO. Update to 0.91 Bumping version to 0.9.0 Bump version to 0.8.2. Add dictionary of previously-rendered images. Use edge distance. Support multicore rendering. Update podspec. Should have been doing this all along. Turn on -Weverything and -Werror. Fix resulting issues. Fix for UIVIews that don’t belong to a window currently. Fix memory leaks. Since we might be creating a non-opaque image, set opaque to NO. Add an options key to support initial background color. Fix crash on oddly-shaped images. Fix bug with bevel being a bit overzealous. Mask implementation that works Add first steps for image caching. Add pattern image effect in project. Set the background image of a button, not the foreground image. Fix memory leak. Update podspec to require ARC. Correct version number in podspec file. Use private URL for podspeec.
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131299877.5/warc/CC-MAIN-20150323172139-00123-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
1,141
33
http://www.dbstalk.com/topic/199019-genie-the-good-stuff-discussion/page-6
code
If S/PDIF is a 75ohm coax what is the standard RG6 we use for SAT signals? 75 ohm as well. RG6 is a cable designed for higher frequencies than low level audio and video interconnects, but should still work. That's why they have quad shield RG-6 because at higher frequencies the cable starts acting like an antenna and starts radiating the signal out of the dielectric and shielding, I.e. skin effect. This is exactly why there is indeed some differences in cheap vs well designed and constructed cables like JPS Labs, Monster, etc. but of course they go overboard with their claims and prices and if you look hard enough will find affordable well made and designed cables elsewhere (monoprice, blue jeans, etc.) Edited by harperhometheater, 29 November 2012 - 04:30 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988725475.41/warc/CC-MAIN-20161020183845-00299-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
770
3
https://forums.support.roxio.com/profile/117025-blaxs/
code
FotoMagico is not allowing me to select Toast as the app I will be using to burn my Slideshow to DVD. When I try to select Toast, Toast is greyed out when I should be able to select Toast... Here is the screenshot: http://tech4eleven.com/shots/Screen_Shot_20131105_at_3.53.20_PM.png_20131105_155438.jpg I have attached the file in-case the link does not work. I went into the FotoMagico Forum and the Moderator (Boinx) said): It looks like that Toast has discontinued the scripting abilities of its application, so that we aren't able to send the file to Toast directly anymore. Has anyone have a solution?
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402101163.62/warc/CC-MAIN-20200930013009-20200930043009-00066.warc.gz
CC-MAIN-2020-40
606
6
https://beamstart.com/profile/267207
code
Redskies Corporation is an entity born of a result of a feasibility study on attaining internet radio broadcast services globally done by three friends - now it's business model has grown from digital broadcasting to; business, fintech explorations, artificial intelligence, music online sale and software to a mirage of business exploration. We believe that data, technology, and products can solve some of the most complex problems by revolutionizing the way organizations and leaders make decisions. With this idea of solving problems and facilitating collaboration, we regularly host events that bring together people from technology, data science, and startup groups at our HQ in Delhi. Google Developer groups, Women who code, Elastic user groups and the first ever R User Meetup by R Consortium - we have in the past collaborated with some of the global technology communities to host their meetups. Sounds like something that you would want to join? We would love that! Subscribe to our newsletter and we will keep you posted on all the awesome events that we host and things that unfold: https://soco.ps/2nqIFCy BEAMSTART brings you the latest news, jobs, and events from all around the world on startups, technology, and business. Stay updated with industry news, plug-in to exciting events, and discover incredible career opportunities with the world's most innovative companies.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335326.48/warc/CC-MAIN-20220929065206-20220929095206-00133.warc.gz
CC-MAIN-2022-40
1,390
6
https://unix.stackexchange.com/questions/467223/ssh-agent-for-nested-tmux-session
code
tmux in first sessionA but using this command to wake it: ssh-agent tmux that I expect new nested sessionB will have its own ssh-agent listen for it. And output of ps aux | grep agent will show something like: ... 0:00 ssh-agent tmux But instead I pass some options to ssh-agent tmux <...> and expect ssh-agent still stay in-process for my new nested session, turn out it does but quickly ended/exited and the output of ps aux | grep agent doesn't show ssh-agent tmux <...> there. ssh-agent tmux <...> get ended?
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.22/warc/CC-MAIN-20220930181143-20220930211143-00418.warc.gz
CC-MAIN-2022-40
512
12
https://sqlwithmanoj.com/2017/01/06/connect-sql-server-on-linux-with-ssms-from-a-windows-machine/
code
Connect SQL Server on Linux with SSMS from a Windows machine In [previous post] we saw how to install & setup SQL Server on Linux. We used PuTTY to connect to the Linux Azure VM and query SQL Server there. Here in this post we will try to connect to SQL Server on Linux via SSMS from a Windows machine. So to connect remotely to SQL Server on an Azure VM, you have to configure an inbound rule on the network security group. The rule allows traffic on the port on which SQL Server listens (default is 1433). –> Setup Inbound Rule: 1. You need to go to portal.azure.com and login with your credentials. On the Dashboard you will see your Linux VM as shown below: 2. Click on the Linux VM widget, it will open up and list out the Settings, click on Network Interfaces, and select the available Network Interface from the list. 3. Now click on the Network Security Group: 4. On the Network Security Group page, select the Inbound security rules, and click on the “+” button create new for SQL Server: 5. On the Add inbound security rule page, provide a name to this rule, select “MS SQL” under Service drop-down, and click OK: –> Connect using SSMS: 6. Now from any Remote machine or even you PC which has SSMS installed and have internet connection, try connecting the SQL Server Linux Instance: – Server Name: provide the IP address of the Linux VM (you can get it by opening the “Linux VM widget” and clicking on “Connect” button at top) – Authentication: should be SQL Server Authentication – Login: “SA” – Password: apply the same password that you set it up while Configuring SQL Server on Linux. 7. On successful authentication you will see the Object Explorer showing the SQL instance that’s running on a Linux machine. On a glance you can’t make out any difference b/w a Linux SQL instance or a Windows SQL instance. Thus I executed the SELECT @@version statement which shows the SQL Server version and on which Operating system its running. You can even see the Database SQLdbOnLinux that we created by connecting from the PuTTY client. That’s it for now, will write more about SQL on Linux on coming updates from Microsoft !!! –> You can also watch this on YouTube:
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189032.76/warc/CC-MAIN-20170322212949-00154-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
2,213
21
https://cloudblogs.microsoft.com/sqlserver/2011/05/16/microsoft-introduces-the-cloud-ready-information-platform/
code
TechEd North America is upon us today and we couldn’t be more thrilled. Microsoft continues to evolve and invest in the Information Platform and today during the TechEd Foundational Session, Microsoft SQL Server: The Data and BI Platform for Today and Tomorrow, Quentin Clark, Corporate Vice President spoke to the Microsoft Cloud-Ready Information Platform. The data explosion is happening at every level across every imaginable device, application and individual. Meanwhile IT needs to balance the proliferation of applications, globalization, increasingly powerful commodity hardware, demand for accessible insights, and new form factors such as the cloud, appliances and mobile devices. And they have to do this with an uptime and level of compliance that is simply expected. The next wave of SQL Server investments brings customers a Cloud-Ready Information Platform that will help them tackle the data explosion and evolve into the future through integrated private and public cloud offerings, optimized appliances, complete and scalable data warehouse offerings, scalable end-to-end business intelligence, and of course continued investments in the SQL Server database software. So what does this mean? Well, it means you can start to break free from tradition and move the business forward with mission critical confidence, breakthrough insight and cloud on your terms. The cloud-ready information platform will protect an organization’s infrastructure – getting you the nines and performance you need at the right price, especially for mission critical workloads, with the new availability solution, SQL Server AlwaysOn and blazing-fast performance with Project “Apollo.” With Microsoft, customers reduce the need to trade off uptime for security patching– SQL Server continues to lead major database vendors with the fewest number of vulnerabilities [nist.org] and in turn this reduces the need to sacrifice uptime for patching. Customers who bet on Microsoft get more than a trusted platform; they get a trusted business partner and a huge ecosystem of experienced vendors. Customers will quickly unlock breakthrough insights across thousands of users through highly interactive web-based data visualizations with Project “Crescent,” as seen in the TechEd keynote, managed self-service analytics with PowerPivot, and unified with the new BI semantic model. Insights are backed by credible consistent data made possible by new Data Quality Services and complete data warehousing solutions including Parallel Data Warehouse and Fast Track. Cloud On Your Terms Additionally, SQL Server will offer organizations the agility to quickly create and scale solutions that solve challenges and fuel new business opportunity from server to private or public cloud linked together by common tools—build once, deploy and manage wherever with SQL Server Developer Tools code name “Juneau.” What does cloud-ready mean for you? SQL Server Code Name “Denali” will help customers bridge applications and workloads from traditional servers to private cloud to public cloud. Customers can take advantage of private and public clouds by scaling on demand with flexible deployment options, a common set of developer tools, and solutions to extend the reach of data across private and public cloud environments. SQL Server Code Name “Denali” will deliver key features that help customers move to the cloud when they are ready and without the need to rewrite or retool investments. - Scale on demand with flexible deployment options: A common architecture which spans traditional, private cloud and public cloud environments giving customers the ability to scale beyond the constraints of any one environment for maximum flexibility in deployments - Fast time to market: A range of options for rapidly provisioning resources and reducing IT burden including Fast Track reference architectures to build private cloud solutions, pre-configured and optimized SQL Server appliances for ready-made solutions, and public cloud data services with SQL Azure - Common set of tools across on-premises and cloud: Integrated set of developer tools and management tools for developing and administering applications across private cloud and public cloud giving developers and IT professionals maximum productivity, faster time to solution and lower on-ramp to building cloud solutions. Also, enhancements to the Data-tier Application Component (DAC) introduced in SQL Server 2008 R2 further simplify the management and movement of databases from on premises to cloud. - Solutions to extend the reach of data: Support for technologies such as SQL Azure Data Sync to synchronize data across private and public cloud environments, OData to expose data through open feeds to power multiple user experiences and Windows Azure Marketplace DataMarket to monetize data or consume from multiple data providers. Get ready for the evolution The next SQL Server Code Name “Denali” CTP is coming this summer! Sign up today for the notification and be among the first to test the exciting new features and functionality.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101779.95/warc/CC-MAIN-20231210092457-20231210122457-00894.warc.gz
CC-MAIN-2023-50
5,114
16
http://lists.opencsw.org/pipermail/maintainers/2013-August/018353.html
code
[csw-maintainers] Python 2.7 pfelecan at opencsw.org Thu Aug 1 20:16:29 CEST 2013 "Maciej (Matchek) Bliziński" <maciej at opencsw.org> writes: > 2013/8/1 Peter FELECAN <pfelecan at opencsw.org>: >> "Maciej (Matchek) Bliziński" <maciej at opencsw.org> writes: >>> CSWpython - install or not install as you wish >>> CSWpython27 - install or not install as you wish >>> CSWpy-foo - when you install it, it will work fine with CSWpython (if >>> installed) and / or CSWpython27 (if installed). If you install both, >>> it will work with both. >>> That's all. Everything works as expected. I don't see what's wrong >>> with this setup. >> One thing that I think of: by default, 2.6 is /opt/csw/bin/python. If >> a module doesn't use a shebang or other wizardry it will fail because it >> needs 2.7 but gets 2.6 > Modules generally do not and should not have hashbang lines. Only > executables do. By the time you're loading a module, you've already > started the interpreter, so the hashbang line doesn't have any > feasible way of influencing the course of action. > If there's a module which needs the 2.7 interpreter, it will not > provide any files in the /opt/csw/lib/python/site-packages or > /opt/csw/lib/python2.6/site-packages directories. BTW, have you seen my proposal in More information about the maintainers
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578577686.60/warc/CC-MAIN-20190422175312-20190422201312-00210.warc.gz
CC-MAIN-2019-18
1,317
25
http://www.tomshardware.com/forum/284557-32-ubuntu-partitioned-drive-ext4-partition-data-recoverable
code
I used Photorec in linux, and it was pulling mad gigs of info but all of it was labeled by almost serial number like names. If R-Studio would organize the stuff a little better or even pull the names thatd be helpful because sifting through windows system txt's for what I need is a pain. But I will not be using that hard-drive for anything other than recovering files, thanks for the help, any additional help would be appreciated. You guys rule. On a side-note, I have a 1TB caviar green Western Digital that beeps and doesnt show up in bios... is it dead? ill make a new post if i must, you guys rule!
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424088.27/warc/CC-MAIN-20170722162708-20170722182708-00654.warc.gz
CC-MAIN-2017-30
605
2
https://choidesign.com/blog/2017/5/3/types-of-prototypes/
code
CHOi Design utilizes prototypes at each stage of the design process. As defined by wikipedia, A prototype is an early sample, model, or release of a product built to test a concept or process or to act as a thing to be replicated or learned from. Another way to look at characterizing a prototype is to think of it as a portrayal of a design idea. In the article, What do Prototypes Prototype?, Stephanie Houde and Charles Hill expand on their observations that the term “prototype” has different meanings to different disciplines. Thus a prototype can exist in many different forms, some looking market ready while others simple foam or clay forms. No matter what the appearances may suggest, each of these prototypes has an important purpose and may prove to be pivotal in a product’s success. To stay consistent with the terminology, as defined by Houde and Hill, I will use artifact in reference to the object or system being designed. I will also apply the 3 aspects they defined as the dimensions of a prototype: role (the function served for a user), look and feel (sensory experience), and Implementation (functional components). Every prototype helps a designer interpret and iterate on at least one of these dimensions. As we have established that there are numerous different types of prototypes for the many industries and designers, I want to highlight some of the prototype forms that Industrial Designers most often put to use. While not a 3D model, Storyboards are great prototypes for exploring the “Role” dimension. Often illustrating a user’s interaction with the artifact, a storyboard is a great tool for focusing attention on the identify of the artifact within an environment and the target role it serves the user. The appearance or details of the artifact within these storyboards is not important, all that is necessary is for the general form to exist within the situation you are illustrating. This type of prototype serves to explore the “look and feel” dimension. Having the appearance of the artifact, designers can use these models to examine shape and size. While it will have the physical representation of the artifact, these models are rarely functional. Sometimes referred to as appearance models or mock-ups, it can be beneficial to both designers and their clients to see a design concept in it’s physical form. Proof-of-Concept prototypes explore the “Implementation” dimension. This form of model will demonstrate how the product works, providing functional validation. This will not be a perfect and pretty model; components will often be chosen based on price and accessibility, utilizing simple fabrication to communicate the artifacts potential. A presentation prototype explores the look and feel as well as the implementation dimension. This model is one of the closest representations of the final artifact; it will often be made from production grade or closely comparable materials and include the artifact’s functionality, albeit a mix of bespoke and ‘off-the-shelf’ components. Presentation prototypes are often used for promotional purposes, to show product viability prior to manufacturing, and to help designers license their artifacts to manufactures. For further information on the types of prototypes, I recommend reading the article I referenced at the beginning of this post: What do Prototypes Prototype?, by Stephanie House and Charles Hill. Researcher atCHOi Design Inc.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817081.52/warc/CC-MAIN-20240416093441-20240416123441-00467.warc.gz
CC-MAIN-2024-18
3,461
10
https://feedback.telerik.com/wpf/1353811-allow-using-custom-transport-for-xmla-request-and-response
code
Allow using custom transport for XMLA request and response Allow customizing provider for sending xmla request and response from/to SSAS. Currently it's can only be done with System.Net.WebClient and msmdpump.dll (IIS)... Posted on:03 Aug 2016 11:58 Thank you for providing these details. We'll approve this feature request and will consider it if there is demand. Posted on:02 Aug 2016 12:32 Thank you for your reply. 1. This functionality intended for the RadPivotGrid, RadChart and others who uses XmlaDataProvider. 2. Yes, by "provider" I mean XmlaDataProvider. 3. How it works today. We have to specify connectionstring: Cube, Database, ServerAddress (http://docs.telerik.com/devtools/wpf/controls/radpivotgrid/populating-with-data/data-xmla.html) In runtime dataprovider build XMLA query based on configuration (row/column/filter descriptors) and send it to SSAS cube using System.Net.WebClient and msmdpump.dll which is working under IIS (https://msdn.microsoft.com/en-us/library/gg492140.aspx) What we need. We don't have IIS, we have an WCF service. In desktop application we need the possibility to inject our object (ex. IXmlaRequestHandler) into instance of XmlaDataProvider. This object sends Xmla request from dataprovider to WCF service and get Xmla response from WCF service. Then the response is handled with dataprovider. See attach for details. Can you please specify what you would wish to achieve in more detail: - Is this functionality intended for the RadPivotGrid control; - By "provider" you are referring to the XmlaDataProvider; - By custom transport do you mean custom mdx queries; - How would the response from the custom queries affect the RadPivotGrid? Looking forward to your reply.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817463.60/warc/CC-MAIN-20240419234422-20240420024422-00775.warc.gz
CC-MAIN-2024-18
1,714
22
https://in1touch.com/site/learn
code
Most modular platforms force you to choose: change your business processes to adapt to their system limitations, or write custom-code to get what you want. There is a better way. Software that is flexible enough for adaptive planning, evolutionary development, early delivery, continuous improvement, and rapid and flexible response to change. Let's face it: your business needs will change, both from "better way" discoveries made during implementation, and from "better way" business decisions you make post Go Live. Don't be penalized for finding a "better way", embrace it by using in1touch. Many solutions will be claim to be flexible enough to support "better way" thinking, few can deliver. Seeing is believing. Not all your software options are the same. There is a better way. in1touch.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659417.14/warc/CC-MAIN-20190117224929-20190118010929-00309.warc.gz
CC-MAIN-2019-04
795
5
https://frontendmasters.com/courses/intermediate-gatsby-v2/configure-a-gatsby-theme-file-shadowing/
code
Transcript from the "Configure a Gatsby Theme & File Shadowing" Lesson >> What I wanna do is, I wanna show what happens, like what if I wanna change this. So what if I decide that I want my header to be blue. If I wanna do that, well how do I even get to the code, if I had installed this as a package instead of installing it like having it in a mono repo like this. [00:00:25] I don't have access to this source code, so it might just out of luck do I need to fork this theme and make my own fortunately gatsby thought through this. Gatsby themes were designed by Christmas guardian John tender and a couple other really, really smart folks and they were kinda thinking okay, what is this experience gonna be? [00:00:45] And the concept they came up with is something they call shadowing. Which is the idea that I can selectively replace a file from a theme, by creating a specific path in my project. So let's do a little bit of file shadowing here. And what I'm gonna do is the reason we set up that variables dot CSS is so that we could only shadow the color variables. [00:01:10] And that's why it was important to make that just a tiny little file cuz, otherwise, we'd have to copy out the whole thing. So what I'm gonna do is I'm gonna take this variables file, I'm gonna copy it, so I'm just doing copy. And then in my site source folder, I'm gonna create a folder called gatsby-theme-shared-nav. [00:01:31] And then inside of that, we're going to treat this as if it were the source folder of gatsby-theme-shared-nav. So I wanna get into styles and then inside of that we're gonna put in variables.CSS. So lemme oops create a new folder called styles. And then inside of that, I'm gonna paste our variables.CSS, and I'm going to change our black to a dark blue. [00:01:55] That should be still be enough contrast to work. And I'm going to stop and restart because when you do shadowing you're changing the file system, you need to basically get gatsby to get a fresh look at it for that to work properly. So this is probably one of those like, it's not the most straightforward thing the first time you're looking at it, because basically what we just did, is we told gatsby use this theme. [00:02:26] But look in this folder where I named it specifically to match this theme and replace variables dot CSS into the theme with this file. And otherwise use it exactly the same, so the cumulative effect of what we've done, is if we were to just edit the theme. As far as the theme is concerned, this file no longer exists, it's now this one. [00:02:52] And that's how shadowing is designed. It's a really powerful approach that gives us the ability to modify themes without having to fully eject from them. There's a concept that I really like that I've written about in the past called progressive disclosure of complexity. And what progressive disclosure of complexity is this kind of concept of teaching. [00:03:19] And so this is in UX, Nielsen Norman group has written about it, and I've written about it in the terms of just kind of like teaching and learning in general. But the idea is that you let somebody get into something without having to touch anything. And then as they wanna get deeper into it, they can only get it the extra complexity that they need. [00:03:43] It's not all or nothing I think if you ever use create react app back in the day, the experience was you could use create react app until you wanted to change literally anything and then you had to eject and then you owned all of the code. For create react app, and it was separate from the create react app cord. [00:04:00] And so this was an idea, it was easy until you injected to all of the complexity. You either had full automation or fully manual. And with progressive disclosure, what you're getting is this concept of, I want automatic until I need to customize one thing, and then lemme make that one thing manual. [00:04:19] So that's what we're doing here. We've said I wanna use everything about this theme, except I wanna modify this color. So I shadow the variables, and then I can replace the colors that I want and if I want to do a full theme, I could do that as well. [00:04:35] And now the site is showing this dark blue. So that's a really kind of lightweight look at how shadowing works, any of the other examples that we could do would be a little heavier handed. Just because there's not too much going on in this theme. So I want to show something that would illustrate the concept without getting into the weeds. [00:05:00] And this is I think a pretty good look at it. So that's how file shadowing works.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817144.49/warc/CC-MAIN-20240417044411-20240417074411-00210.warc.gz
CC-MAIN-2024-18
4,620
15