url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://kc.mcafee.com/corporate/index?page=content&id=KB72677&actp=LIST
|
code
|
Last Modified: 08/17/2011
Microsoft Server 2008 with IIS 7.0
This issue is being evaluated for consideration in a future release or patched version of the product. If this issue significantly impacts your business operations, contact McAfee Technical Support and quote this article number to help us assess the need for a Product Enhancement Request (PER).
This article will be updated as newer information becomes available.
If you require a change to this functionality in a future version of the product, you can submit a Product Enhancement Request (PER) by logging in at: https://mcafee.acceptondemand.com/.
To register as a new user, click McAfee Customers Register Here at the top of the page. For additional information, see KB60021.
- Click Start, Run, type explorer and click OK.
- Navigate to: %windir%\system32\inetsrv\config
- Open the file applicationHost.config as Administrator for editing in Notepad.
- Edit the <globalModules> section and remove the following line:
<add name="MfeEngine" image="%windir%\System32\inetsrv\HipIISEngineStub.dll" />
- Edit the <modules> section and remove the following line:
<add name="MfeEngine" />
- After you have finished editing the applicationHost.config file, save the file, then restart the IIS server using iisreset or by restarting the system.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223210034.18/warc/CC-MAIN-20140423032010-00074-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 1,302 | 14 |
http://reviews.llvm.org/rL250773
|
code
|
Added support for the "--repl" argument to LLDB.
This makes LLDB launch and create a REPL, specifying no target so that the REPL
can create one for itself. Also added the "--repl-language" option, which
specifies the language to use. Plumbed the relevant arguments and errors
through the REPL creation mechanism.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655893487.8/warc/CC-MAIN-20200707142557-20200707172557-00134.warc.gz
|
CC-MAIN-2020-29
| 312 | 5 |
https://magento.stackexchange.com/questions/102288/migrating-custom-core-modules
|
code
|
I could really use some help!
I was tasked with upgrading somebody's Magento installation from 1.7.x to 1.9.x. So, I installed Magento 1.9.x to a separate directory and copied over theme, skin, media, etc. All went fine and the site was up and running. That was until I discovered that some contact forms were missing from the upgraded site.
Upon further investigation, I figured that Admin panel in the new install was missing some tabs under System -> Configuration -> General. Those tabs seem to control the missing forms:
I started to dig dipper and noticed that corresponding modules were added under app/core/code/Mage. Here is what it looks like for the "Get a Quote" tab:
app/code/core/Mage/GetQuotes app/code/core/Mage/GetQuotes/controllers/IndexController.php app/code/core/Mage/GetQuotes/etc/adminhtml.xml app/code/core/Mage/GetQuotes/etc/config.xml app/code/core/Mage/GetQuotes/etc/system.xml app/code/core/Mage/GetQuotes/Helper/Data.php app/code/core/Mage/GetQuotes/Model/System/Config/Backend/Links.php app/code/core/Mage/GetQuotes/sql/getquotes_setup/install-220.127.116.11.php app/code/core/Mage/GetQuotes/sql/getquotes_setup/mysql4-install-0.7.1.php app/code/core/Mage/GetQuotes/sql/getquotes_setup/mysql4-install-0.8.0.php app/code/core/Mage/GetQuotes/sql/getquotes_setup/mysql4-upgrade-0.7.1-0.7.2.php
I also noticed that extra code was added to app/etc/modules/Mage_All.xml for each of the modules. Here is a section for "GetQuotes":
<Mage_GetQuotes> <active>true</active> <codePool>core</codePool> <depends> <Mage_Core/> </depends> </Mage_GetQuotes>
So, naturally, I copied those modules and Mage_All.xml to the new install's directory structure, hoping that missing tabs would re-appear. But no such luck! What else did I miss? How can I add them back? I'm new to Magento and it's driving me nuts!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667442.36/warc/CC-MAIN-20191113215021-20191114003021-00058.warc.gz
|
CC-MAIN-2019-47
| 1,819 | 8 |
http://huselha.com/page/hp-pavilion-dv6600-service-manual/
|
code
|
Also, why are there so many pipes? And why are they hanging out of the sky?!?! Is there some kind of nefarious pipe plot??It's Crappy Bird! A shameless rip-oI mean *parody* of a game you've probably never heard of. Slide the goalie to save as many shots as possible. You think you are a flappy expert? Don't kid me.
- This is the Remix!!Do you believe you can Fly?Original Hip-Hop Soundtrack by K.
This game starts slowly but quickly becomes harder. Copyright: marasigames 2014What's new in this version:Fixed minor aesthetic texturesAdded Other Games and Rate ButtonsAdded support for AdMob Do not fly too high or too low - otherwise you will lose.
Toast=====Taping a toast scores 1 point. Defect Toaster===========Tap a defect toaster to repair it ( scores 10 points ). and most importantly.
Avoid those obstacles!What's new in this version:Bug fixes
Tap to Flap, it's not *THAT* hard!
if your Jelly Power is at 75% you earn 75 points. A puzzle game like never before! Use your epic skills in order to find the right combination of colors to mix to beat each level.HOW TO PLAY:Initially you will see all cards turned face down. They might look silly and slimy, but once they wreak havoc, all hell will break loose. Heeeeeeelppp!!!Our baby bird is practicing to fly !Learn to fly with her through the beautiful mountain forest !Luxurious day/night cycle graphics for added viewing pleasure~Compete with friends to see who goest the farthest!
Leaderboards shared between this app and Throw! Free
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187826283.88/warc/CC-MAIN-20171023183146-20171023203146-00459.warc.gz
|
CC-MAIN-2017-43
| 1,495 | 8 |
https://glenborn.com/7-tips-to-nail-your-next-mock-sales-pitch-interview/
|
code
|
Many sales organizations have some form of Mock sales presentation as part of their interview process and it trips up lots of candidates. Here are 7 pointers on how to nail this step
1. Presentation style. Remember that these mock pitches are mainly about HOW you handle them and yourself in that situation – they are rarely just about the content. To do well, make your pitch:
* Highly interactive. These should NEVER be a one-way affair.
* Constantly validate assumptions, ask for guidance, and ask great consultative questions to better understand the client.
* Focused and goal-oriented. You are running the meeting. Keep it on time. Leave room for questions and closing.
* Natural. Do a) and b) seamlessly
2. Asserting control. To deal with too many unknown variables in the scenario you have given is to assert your limited control over the situation where you can. Dictate the scenario to your interviewers and fill those gaps in advance. This allows you to set the stage to pitch naturally. For example, you can preface your presentation by saying “I am taking the assumption that we had an initial phone conversation where we discussed our offering briefly and you agreed it aligned with these 3 strategic goals”.
3. Demarcation points. Establish a clear demarcation point where you move from regular interview status to mock pitch status i.e. from normal interview mode to mock-pitch-acting status. CLOSE TWICE – in the mock pitch about next steps (see below) and afterward “How did I do in the mock presentation?”
4. Content. You are generally asked to present the interviewing company’s solution. That level of detailed knowledge is not generally expected when presenting a new offering of the interviewing company but they will expect you to do your homework on their website / case studies and have the basic features and benefits down. Research the prospective mock client for recent news/initiatives etc. If you aren’t given a client, assert one in advance! Tricky interviewers will often try and unnerve you by asking in-depth questions about their offering that you can’t possibly expect to know. To deal with this either fob the question off for later say for an SE To answer or give a confident guess in response!
5. Presentation format. Remember these mock presentations are never Powerpoint competitions so don’t stress about creating fancy animations or graphics.
6. Embrace the madness. Accept mock sales pitches for what they are – highly unnatural so embrace that instead of fighting it.
7. CLOSE! It might be a stretch to ask for the sale in the mock pitch (although do take the opportunity if it arises) BUT make sure you are focused on closing down the logical next steps at the end of your pitch – a follow-up meeting with the CFO (“Does Tuesday at 10am work?”), getting them a proposal etc.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817491.77/warc/CC-MAIN-20240420060257-20240420090257-00324.warc.gz
|
CC-MAIN-2024-18
| 2,849 | 12 |
https://www.mail-archive.com/[email protected]/msg36175.html
|
code
|
Hi, Gnulib maintainers,
I'm working with GNU Octave and we're having an issue with mkfifo in
When we configure and build Gnulib on macOS, it builds the mkfifo()
replacement function that just returns an ENOSYS error, even though
mkfifo is present. This results in all mkfifo() calls failing.
The configure output indicates that mkfifo is found:
configure:57847: checking for mkfifo
configure:57872: gcc -o conftest -g -O2 -D_THREAD_SAFE -pthread
-L/usr/local/opt/qscintilla2/lib conftest.c -lm >&5
ld: warning: directory not found for option
configure:57872: $? = 0
configure:57881: result: yes
configure:57887: checking whether mkfifo rejects trailing slashes
configure:57935: gcc -o conftest -g -O2 -D_THREAD_SAFE -pthread -
But there is no HAVE_MKFIFO present in the resulting config.h file.
Manually doing a CPPFLAGS="-DHAVE_MKFIFO" fixes it.
Possibly related to this change:
There's no "HAVE_MKFIFO=1" statement anywhere in m4/mkfifo.m4 now.
Should there be one in the "else" branch of "test $gl_cv_func_mkfifo = no"?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484020.33/warc/CC-MAIN-20190218013525-20190218035525-00156.warc.gz
|
CC-MAIN-2019-09
| 1,022 | 19 |
http://www.deborahbladon.com/bare-is-available-now/
|
code
|
BARE is Available Now!April 1, 2018
I’m very excited to announce that BARE is available now!
BARE is a standalone novel without a cliffhanger!
Amazon US: https://amzn.to/2pOXTmq
Amazon UK: https://amzn.to/2GhNlq6
Amazon CA: https://amzn.to/2GkH2SD
Amazon AU: https://amzn.to/2pSWpXB
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525973.56/warc/CC-MAIN-20190719012046-20190719034046-00290.warc.gz
|
CC-MAIN-2019-30
| 284 | 7 |
https://jobeka.lk/jobs/Blue-Cross-and-Blue-Shield-of-North-Carolina-Python-Developer-2021-10-14-382859
|
code
|
Job type full-time
Full job description
It is different hereOur work as technology specialists pushes the boundaries of what’s possible in health careYou will build solutions that make a real difference in people’s livesDriven by the importance of their work, our team members innovate to elevateWe’re encouraged to be curious, collaborate, and turn ideas into solutions that transform health care.
As a developer on our team, you’ll be responsible for the design, development, testing and support of our on premise and cloud based softwareWe will look for you to bring you curiosity and passion to the team to help drive impactful work for the organization.
If you are ready to make a career out of making a difference, then you are the person for this team.
What you’ll be doing:
Support the analysis, design and development of high volume, low latency applications for mission critical systems delivering high-availability and performance to best meet customer needs.
Write well designed, testable, efficient code to support varied it solutions
Collaborate with other it specialists to rapidly develop and deliver stunning solutions that meet changing business needs.
Perform all necessary discovery and fact finding to fully understand business problems and opportunities and execute all assignments with limited supervision.
Provide input into solution buy vsBuild recommendations to management when requested.
Effectively communicate development and production issues to the project team, applicable vendors and/or the manager in a timely manner.
Research and stay abreast of technology trends and it best practices, with a focus on continuous learning.
What you bring:
Bachelor’s degree in computer science, mathematics or other relevant technical field or associate’s degree specifically in computer scienceCandidates with non-technical degrees may be considered with the completion of relevant technical certification program.
3 years development experience.
With no degree, 5 years of experience required.
Experience with data warehouse, data lake
Experience with github, jira
Knowledge of teradata, nosql/cassandra
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585199.76/warc/CC-MAIN-20211018062819-20211018092819-00361.warc.gz
|
CC-MAIN-2021-43
| 2,139 | 20 |
https://www.ijcai.org/Abstract/16/379
|
code
|
Scale-Adaptive Low-Resolution Person Re-Identification via Learning a Discriminating Surface / 2669
Zheng Wang, Ruimin Hu, Yi Yu, Junjun Jiang, Chao Liang, Jinqiao Wang
Person re-identification, as an important task in video surveillance and forensics applications, has been widely studied. But most of previous approaches are based on the key assumption that images for comparison have the same resolution and a uniform scale. Some recent works investigate how to match low resolution query images against high resolution gallery images, but still assume that the low-resolution query images have the same scale. In real scenarios, person images may not only be with low-resolution but also have different scales. Through investigating the distance variation behavior by changing image scales, we observe that scale-distance functions, generated by image pairs under different scales from the same person or different persons, are distinguishable and can be classified as feasible (for a pair of images from the same person) or infeasible (for a pair of images from different persons). The scale-distance functions are further represented by parameter vectors in the scale-distance function space. On this basis, we propose to learn a discriminating surface separating these feasible and infeasible functions in the scale-distance function space, and use it for reidentifying persons. Experimental results on two simulated datasets and one public dataset demonstrate the effectiveness of the proposed framework.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100534.18/warc/CC-MAIN-20231204182901-20231204212901-00110.warc.gz
|
CC-MAIN-2023-50
| 1,512 | 3 |
https://slushbin.org/forum/
|
code
|
Enjoy your visit here!
I added your banner to my lainchan webring, add mine please! and awesome p…
Replies: 0 |
Place to dumb finished art
Replies: 4 |
I added your banner to my site :D great page :)
Replies: 6 |
This is a place where I dump all my sketches. Feel free to dump some too i…
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363006.60/warc/CC-MAIN-20211204185021-20211204215021-00001.warc.gz
|
CC-MAIN-2021-49
| 292 | 8 |
https://visualskins.com/skin/date-time-weather
|
code
|
The Date Time Weather Rainmeter skin is just as the name suggests. The rainmeter weather skin shows you the time, date, and weather on your desktop in the most beautiful yet simple way. A UI of this skin will show you the weather and it appears natural and realistic. If it is raining then clouds will be displayed in the skin. The Skin shows you the time in digits, the weather with your location and date in dd/mm/yyyy format. You can reload the weather whenever you want with the reload button on the bottom right corner.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499890.39/warc/CC-MAIN-20230131190543-20230131220543-00247.warc.gz
|
CC-MAIN-2023-06
| 524 | 1 |
https://cepr.org/publications/dp6106
|
code
|
DP6106 College Cost and Time to Complete a Degree: Evidence from Tuition Discontinuities
For many students throughout the world the time to obtain an academic degree extends beyond the normal completion time while college tuition is typically constant during the years of enrollment. In particular, it does not increase when a student remains in a program beyond the normal completion time. Using a Regression Discontinuity Design on data from Bocconi University in Italy, this paper shows that a tuition increase of 1,000 euro in the last year of studies would reduce the probability of late graduation by 6.1 percentage points with respect to a benchmark average probability of 80%. We conclude suggesting that an upward sloping tuition profile is efficient in situations in which effort is suboptimally supplied, for instance in the presence of public subsidies to education, congestion externalities and/or peer effects.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475727.3/warc/CC-MAIN-20240302020802-20240302050802-00812.warc.gz
|
CC-MAIN-2024-10
| 924 | 2 |
https://www.odesk.com/o/jobs/job/10-people-needed-to-build-simple-10-page-templates_~01526b339a876231c8/
|
code
|
We have a number of website templates needed for various businesses.
All the sites will have a 10 page template like whats used for leedsdomesticcleaning.co.uk.
All that needs doing for each HTML site template is:
1) text adding to each page. 3 pages will be provided completed. The rest will be copied from another site.
Contact Page - HTML Code provided (excluding contact form)
Feedback Page - HTML Code provided
Terms - HTML Code provided
Privacy Police - HTML Code Provided
Service Page 1
Service Page 2
Service Page 3
2) 4 slider images adding - these will be provided.
3) background image adding will be provided.
4) header adding will be provided.
5) contact form adding
6) A few relavent imaages adding to each page.
a few other small jobs too.
Should only take a couple of hours for a good web designer who can work NEATLY and make the site like pixel perfect.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654396/warc/CC-MAIN-20140305060734-00069-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 870 | 18 |
https://www.markozivanovic.com/reading-debt-bookmarking-shit-youll-never-read/
|
code
|
Reading debt – bookmarking shit you’ll never read
Reading debt (also known as bookmark debt or Ctrl-D compulsion) is a concept in casual web browsing that reflects the implied cost of additional bookmark organization and undesirable future reading.
It’s caused by reckless pressing of Ctrl-D instead of using your brain for a moment to consider if you’ll ever want to read the damn thing later.
No, this isn’t an existent, known concept. I wrote it into its existence a few moments ago, following the sentence structure found on the Wikipedia page about technical debt.
It does however embody a sentiment of frustration that revolves around an unorganized mess created by hoarding and bookmarking material that will probably never be read.
This Friday afternoon, as I was adding yet another bookmark to the already overcrowded bookmark bar (filled with idiosyncratically named folders, the names of which are now reduced to mostly two-character acronyms, so more can fit), I decided I had enough and determined to do a general cleanup.
Just as a junk food addict would say, “This is my last burger before I go on a diet!” I said to myself, “This is my last recklessly created bookmark!”
Finding the solution
I remember I used Pocket some years ago – before Mozilla acquired it, and before it changed its name (it was named “Read it Later” previously).
While I definitely understand how some people find value in these services, I realized they wouldn’t solve my problem. If anything, they would only make it worse – encouraging me to save more and more articles to read later, creating even more reading debt.
These services would help me organize the debt better, and they would undoubtedly display my hoarded treasure in a sexy way, but that’s not what I want. I want to get rid of (most of) it.
Shift in thinking
I ended up going to bed that night after failing to come up with a proper fix that’ll prevent me from ending up in the same situation two months from now – being overwhelmed by the amassed heap of hyperlinks I considered deserving of keeping at the time.
I kept the reading debt problem loop running in my mind for the next two days, albeit with a lower priority. What I came up with is a low-tech solution. So low tech, it consists of merely three questions I’ll ask myself every time before I want to save something to read later and a simple weekly reminder that will notify me to revise the status.
This is the algorithm:
- Every time before you want to save something for later, ask yourself this:
- Is this an advertisement or a puff piece?
- Does this have a short expiry date, with no relevance to you, your family, or your job?
- Do you need this for your future research/writing/development?
- If the answer to the first two questions is no, and the answer to the last question is yes, bookmark the reading material.
- Revise the status of the reading material weekly. If the article has not been read within a week, trash it. If you need it for further research, tag it and store it properly.
Only a week has passed since I incorporated this into my thinking process, but I can already say I recognize the benefits after the first revision.
Who knows, maybe it’s just me being more conscious and mindful about the problem, and the whole three-part process is unwarranted. Maybe the only reason I became more conscious and mindful is due to that three-part process.
It doesn’t matter. What matters is I’m on a good way to reduce my reading debt problem. If you have a better solution, I would love to hear about it!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499934.48/warc/CC-MAIN-20230201112816-20230201142816-00405.warc.gz
|
CC-MAIN-2023-06
| 3,583 | 24 |
http://www.webassist.com/forums/post.php?pid=48269
|
code
|
How you will do this will depend on how you have this information stored in the db. If you have each answer that the user gives as a unique record in the db then it might be a little simpler to implement.
From what I can tell you will need to have some custom parts for this. The first part would be creating a recordset. You can then populate the form elements with the values from this recordset to show the answers that have already been stored.
Next you would have the user make the updates that they need and submit the form. You would need to loop over the posted values and compare them to the values in your original recordset. If the value does not match the original value then you will update the record. When you update the value with the posted value you can also update the time field with the current time.
This is a custom thing but I think this is the best approach. This way you can make use of a single update server behavior and update only the records that have changed. If you tried to do this with a multiple update server behavior all of the records would be updated regardless of weather or not the value changed. You will need to manually check the value against the existing value to ensure that it has changed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039748315.98/warc/CC-MAIN-20181121112832-20181121134832-00128.warc.gz
|
CC-MAIN-2018-47
| 1,238 | 4 |
https://community.apachefriends.org/f/viewtopic.php?f=16&t=24974
|
code
|
You don't have permission to access the requested object. It is either read-protected or not readable by the server.
If you think this is a server error, please contact the webmaster.
Apache/2.2.4 (Win32) DAV/2 mod_ssl/2.2.4 OpenSSL/0.9.8e mod_autoindex_color PHP/5.2.2
I just installed Xampp and mediawiki
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501170940.45/warc/CC-MAIN-20170219104610-00316-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 306 | 4 |
https://www.dorooyue.com/show/3524603.html
|
code
|
1: Your junior network administrator wants to know what the default subnet mask is for a Class C IP address. What do you tell him? A. 255.0.0.0 B. 255.255.0.0 C. 255.245.255.0 D. 255.255.255.0 E. 255.255.255.255 2: An application needs to have reliable, end-to-end connect-ivity. Which of the following protocols will give you reliable connectivity? A. TCP B. UDP C. IP D. ICMP 3: You are designing a network, which needs to support 55 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? A. 255.255.0.0 B. 255.255.255.0 C. 255.255.255.192 D. 255.255.255.160 4: You have added a new switch to your network. You want to manage it remotely, so you need to assign it an IP address. Your router that connects to the switch has an IP address of 172.16.12.33/27. Which of the following addresses can you assign to this switch? A. 172.16.12.33/28 B. 172.16.12.32/27 C. 172.16.12.33/27 D. 172.16.12.34/27 E. 172.16.12.35/28 F. 172.16.12.38/28 G. 172.16.12.63/27 5: The address 172.16.208.16/20 is a host address in which of the following subnets? A. 172.16.176.0–255.255.240.0 B. 172.16.192.0–255.255.240.0 C. 172.16.208.0–255.255.240.0 D. 172.16.224.0–255.255.240.0 6: You are designing an IP address scheme for your brand new remote office. The vice president of IT calls to tell you that you will be in charge of the 192.168.1.64/26 subnetwork. This supplies you with a single subnetwork with 62 hosts. You need to have at least two subnets with 14 hosts in each subnet. What custom subnet mask should you use? A. 255.255.255.128 B. 255.255.255.192 C. 255.255.255.224 D. 255.255.255.240 E. 255.255.255.248 7: You have subnetted the 126.96.36.199 network with a /24 mask. Your boss at Acme, Inc. wants to know how many usable subnetworks and usable host addresses per subnet this would provide. What should you tell her? A. One network with 254 hosts B. Two networks with 128 hosts C. Four networks with 64 hosts D. Six networks with 30 hosts 8: Identify three valid host addresses in any subnet of the 188.8.131.52 network, assuming a fixed subnet mask of 255.255.255.240. (Choose three.) A. 184.108.40.206 B. 220.127.116.11 C. 18.104.22.168 D. 22.214.171.124 E. 126.96.36.199 F. 188.8.131.52 9: What is the subnetwork address for a host with the IP address 184.108.40.206/28? A. 220.127.116.11 B. 18.104.22.168 C. 22.214.171.124 D. 126.96.36.199 E. 188.8.131.52 F. 184.108.40.206 10: Which of the following protocols uses a three-way handshake mechanism to establish sessions? A. TCP B. IP C. UDP D. IPX E. Frame relay 11: Which of the following protocols is connection-oriented? A. TCP B. IP C. IPX D. Frame relay 12: You are using an application on your Windows 2000 client machines that provides error correction. You need a protocol to provide fast transport. Which protocol should your application use? A. TCP B. IP C. UDP D. SPX E. AppleTalk 13: When using TCP, after a session is open, the applications can adjust the number of segments they receive before sending an acknowledgment. This behavior is known as ______________. A. MTU adjustment B. Windowing C. Flexible Send Path D. FCS 14: If the destination did not receive a segment, how will the TCP host know to resend the information? A. The ACK received will not include the segment number that was not received. B. The ACK received will include the segment number that was not received. C. The sending host will send a PACK to verify segment receipt. D. The destination host will send a YACK message back to the sending host. 15: You are planning on using a single network that supports 208 users. Which IP address class would you choose to be the most efficient? A. Class A B. Class B C. Class C D. Class D E. Class E 16: RFC 1918 defines the private IP address ranges. Which of the following IP addresses are considered part of these ranges? (Choose three.) A. 10.23.45.67 B. 220.127.116.11 C. 172.16.32.1 D. 172.31.234.55 E. 18.104.22.168 17: A new network is being designed for your company, Acme, Inc. If you use a Class C IP network, which subnet mask will provide one usable subnet per department while allowing enough usable host addresses for each department specified in the table? Department A. 255.255.255.0 B. 255.255.255.192 C. 255.255.255.224 D. 255.255.255.240 E. 255.255.255.248 18: Which of these protocols provides data transport, relying on the error correction capabilities of the application itself? A. UDP B. TCP C. SNMP D. ICMP 19: Which of the following are used by TCP to ensure reliable delivery of data? (Choose two.) A. MAC address resolution B. Sequence numbers C. Acknowledgments D. Ping E. Routing updates 20: You discover that you are able to adjust the window size of the TCP segment. You increase the window size to test the results. What will you observe happening on your network? A. Increased throughput B. Decreased throughput C. Increased latency D. Decreased reliability 21: Your organization is using the 192.168.1.0/24 address space. You need 28 subnets. What subnet mask would you use to create these subnets? A. 255.255.255.0 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.224 E. 255.255.255.240 F. 255.255.255.248 22: Which of the following protocols maps IP addresses to MAC addresses for connectivity to occur between two hosts? A. ARP B. RARP C. SLARP D. DHCP 23: Your junior network administrator cannot seem to ping a host in another network and asks you why it isn't working. Which of the following is not an answer that you would give him? A. The host's default gateway is down. B. The destination host is not powered on. C. The IP address of the router interface is incorrect. D. The IP address of the switch to which the destination host connects is incorrect. E. The host is in a different subnet. 24: Which of the following classes of IP addresses is utilized for multicasting? A. Class A B. Class B C. Class C D. Class D 25: You give your IT department a spreadsheet of IP addresses and their subnets. You receive a call from one of the junior techs asking what the /26 means next to the IP addresses. You tell her: A. It represents the number of hosts possible on that subnetwork. B. It represents the number of subnetworks that are being used. C. It represents the class of IP address being used. D. It represents the number of bits in the subnet mask that are 1. 26: You are given an IP network of 192.168.5.0 and told that you need to separate this network into subnetworks that can support a maximum of 16 hosts per subnet. This will help alleviate congestion on the network. What subnet mask can you use to create the subnets necessary to meet the given criteria? A. 255.0.0.0 B. 255.255.0.0 C. 255.255.255.0 D. 255.255.255.224 E. 255.255.255.240 27: Which of the following would a Class A network be assigned to? A. Government agency B. Small-to-medium sized corporation C. SOHO D. An individual 28: A client has the IP address 192.168.5.98/27. Which of the following addresses are on the same subnet as this host? (Choose two.) A. 192.168.5.95 B. 192.168.5.100 C. 192.168.5.128 D. 192.168.5.110 29: Which of the following IP addresses is not a public IP address that can be routed over the Internet? A. 22.214.171.124 B. 126.96.36.199 C. 188.8.131.52 D. 172.31.45.34 E. 184.108.40.206 30: You are given a Class B network. What is the default subnet mask assigned to the Class B network? A. 255.255.255.255 B. 255.255.0.0 C. 255.224.0.0 D. 0.0.0.0 31: You are troubleshooting your router's interfaces. For some reason, the Ethernet interface will not accept the IP address of 192.168.5.95/27 that you've assigned. Which of the following explains the router's refusal to take the IP address? A. Class C addresses cannot be assigned to Ethernet interfaces. B. The /27 is an invalid mask. C. It is a broadcast address. D. It is a public IP address. E. It is a private IP address. 32: You are a network technician at Acme, Inc. You are required to divide the 220.127.116.11 network into subnets. Each subnet must have the capacity of 458 IP addresses. Also, according to the requirements, you must provide the maximum number of subnets. Which subnet mask should you use? A. 255.255.255.254 B. 255.255.254.0 C. 255.255.240.254 D. 255.255.0.0 33: What is the subnetwork and broadcast IP address of 192.168.2.37 with the subnet mask of 255.255.255.248? A. 192.168.2.24/192.168.2.31 B. 192.168.2.32/192.168.2.39 C. 192.168.2.40/192.168.2.47 D. 192.168.2.48/192.168.2.55 E. 192.168.2.56/192.168.2.63 34: One of your co-workers at Acme, Inc., needs to convert the binary number 11011010 into a decimal. What is the decimal equivalent? A. 218 B. 219 C. 220 D. 221 E. 222 35: One of your co-workers at Acme, Inc., needs to convert the binary number 01011010 into a decimal. What is the decimal equivalent? A. 75 B. 83 C. 90 D. 97 36: One of your co-workers at Acme, Inc., needs to convert the binary number 11010110 into a decimal. What is the decimal equivalent? A. 198 B. 214 C. 252 D. 255 37: One of your co-workers at Acme, Inc., needs to convert the binary number 10110110 into a decimal. What is the decimal equivalent? A. 182 B. 192 C. 202 D. 212 38: You are configuring a subnet for the Acme, Inc., branch office in Beijing. You need to assign IP addresses to hosts in this subnet. You have been given the subnet mask of 255.255.255.224. Which of these IP addresses would be valid? (Choose three.) A. 18.104.22.168 B. 22.214.171.124 C. 126.96.36.199 D. 192.168.16.87 E. 188.8.131.52 F. 184.108.40.206 39: You are a network technician at Acme, Inc. You have subnetted the 220.127.116.11 network with a /28 mask. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router is using ip subnet-zero? A. 62 networks and 2 hosts B. 6 networks and 30 hosts C. 8 networks and 32 hosts D. 16 networks and 16 hosts E. 16 networks and 14 hosts 40: What is a disadvantage of using a connection-oriented protocol such as TCP? A. Packet acknowledgment might add overhead. B. Packets are not tagged with sequence numbers. C. Loss or duplication of data packets is more likely to occur. D. The application layer must assume responsibility for the correct sequencing of the data packets. 41: You are a network technician at Acme, Inc. You have subnetted the 192.168.72.0 network with a /30 mask for connections between your routers. Your boss asks you how many usable subnetworks and usable host addresses per subnet this will provide. What should you tell her, assuming your router cannot use ip subnet-zero? A. 62 networks and 2 hosts B. 6 networks and 30 hosts C. 8 networks and 32 hosts D. 16 networks and 16 hosts E. 14 networks and 14 hosts 42: Which of the following IP addresses are considered "network" addresses with a /26 prefix? (Choose two.) A. 18.104.22.168 B. 22.214.171.124 C. 126.96.36.199 D. 188.8.131.52 E. 184.108.40.206 43: Identify three valid hosts in any subnet of 192.168.32.0, assuming the subnet mask used is 255.255.255.240. (Choose three.) A. 192.168.32.33 B. 192.168.32.112 C. 192.168.32.119 D. 192.168.32.126 E. 192.168.32.175 F. 192.168.32.208 44: A Class C network address has been subnetted with a /27 mask. Which of the following addresses is a broadcast address for one of the resulting subnets? A. 220.127.116.11 B. 18.104.22.168 C. 22.214.171.124 D. 126.96.36.199 E. 188.8.131.52 F. 184.108.40.206 45: What is the subnetwork address for a host with IP address 220.127.116.11/28? A. 18.104.22.168 B. 22.214.171.124 C. 126.96.36.199 D. 188.8.131.52 E. 184.108.40.206 F. 220.127.116.11 46: Your boss wants to know what TCP stands for. What do you tell him? A. Transmission Check Protocol B. Transport Check Protocol C. Transmission Control Protocol D. Transport Control Protocol 47: Your boss wants to know what UDP stands for. What do you tell him? A. Unreliable Data Protocol B. Unreliable Data Program C. User-Defined Protocol D. User Datagram Protocol 48: Which of the following statements accurately describes UDP? A. UDP copies files between a computer and a system running rshd, the remote shell service (daemon). B. UDP is a member of the TCP/IP suite of protocols that governs the exchange of electronic mail between message transfer agents. C. UDP is a member of the TCP/IP suite of protocols and is used to copy files between two computers on the Internet. Both computers must support their respective roles: one must be a client, and the other a server. D. UDP is a TCP complement that offers a connectionless datagram service guaranteeing neither delivery nor correct sequencing of delivered packets (much like IP). 49: Which of the following host addresses are members of networks that can be routed across the public Internet? (Choose three.) A. 10.20.12.64 B. 172.16.32.129 C. 18.104.22.168 D. 192.168.23.252 E. 22.214.171.124 F. 126.96.36.199 50: You are connecting your Serial 0/1 interface to the Internet. Which of the following need to be done for the connection to work? (Choose two.) A. Assign a public IP address. B. Use the shutdown command. C. Use the no shutdown command. D. Make sure the interface is running in full-duplex.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572934.73/warc/CC-MAIN-20190916200355-20190916222355-00387.warc.gz
|
CC-MAIN-2019-39
| 13,168 | 1 |
http://geekknitting.blogspot.com/2008/02/cupid-panda.html
|
code
|
This project comes (rather randomly) from the comic Tea Club.
It's very cute, and centres around a university student who loves tea. (I think it's defunct now though) It featured a rather odd little story about Cupid pandas, which I think was a reference to an earlier comic by the same artist. Sadly I can't find that comic anymore, and you might need to see that to understand quite why I find the pandas so appealing. Suffice to say, they're not quite a sweet as they look.
So the plan is to knit a Cupid Panda. I suspect getting the shaping right will be a little tricky - it's easy enough to knit something roughly the same shape, but I think the cuteness with these things has a lot to do with the detail - getting the proportions just right, making everything curve just enough. I'm very interested though in how this relates knitting to drawing. I think with drawing, and more so with cartoons, the big skill is understanding what it is about an object that makes it recognisable, what the cues people latch on to are.
So I'm planning to have two attempts at this, hopefully the first one will let me get the shape roughly right, and with the second I'll be able to refine it to something that has the same cuteness as the original.
I'm not quite sure what I'll do with it once it's done though. My current plan is to have it done somwhere around Valentine's day, and send it to the premature babies unit, who apparently are always keen on knitted toys. I'm not generally keen on valentines day, but this scheme appeals to me for slightly convoluted religious reasons.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867094.5/warc/CC-MAIN-20180525141236-20180525161236-00434.warc.gz
|
CC-MAIN-2018-22
| 1,576 | 5 |
https://www.wayn.com/profiles/rudolf51
|
code
|
I was born in South Africa... currently living in BC, Canada. Speak afrikaans. So enige mense my ouderdom wat in die area gaan wees moet by stop, veral die meisies. lol. I try to stay active but i occationally fall into a lazy state where all I do is play on my computer. I play Rugby, Football(soccer), Badminton, and Squash.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948597585.99/warc/CC-MAIN-20171217210620-20171217232620-00275.warc.gz
|
CC-MAIN-2017-51
| 326 | 1 |
https://security.stackexchange.com/questions/231099/how-to-avoid-leaking-your-public-ip-to-installed-applications-like-browsers-when/251115
|
code
|
What is the easiest setup to hide your public IP from installed applications and prevent things like WebRTC leaks on a common Linux distro?
Your IP can be leaked from a number of sources.
- Use a browser plugin like noscript and be careful whom you let run scripts on your computer
- Use a distro like Tails which has all the necessary firewall rules already baked in
A basic level concept of security vs "ease of use"; you CAN NOT have both at the same time. You can either increase security, like go above and beyond and forget accessibility, or the other way around. For Example, you can definitely prevent WebRTC leaks by doing a pre-30min preparation before "Checking your Email".
WebRTC is an accessibility service allowing ease of access to media resources. WebRTC uses IP addresses to establish direct p2p connection evading general xml-http-request formats and using APIs allowing less miscellaneous data in "data frame" and more "useful" data relating to your media. What is a "leak"? It sometimes leaks that public IP.
You have to understand that, WebRTC model is "deffected" at its core. You can not prevent it from doing something that makes it function properly. You can only decide how much exposure you are willing to trade in for ease of access.
How do you get around the leaks?
- Disable WebRTC altogether
- Use Tor
- Use a VPN
- Use dual layer security i.e. a proxy (can be Tor, but I prefer SOCKS) on top of a VPN
- Bind your browser to a specific interface
Disable WebRTC altogether
It mostly varies with the browser but generally you go to developer options and turn WebRTC off. On the upside no IP leak. On the downside media will load slowly, and there will be frame drops.
Install Tor system-wide or use Tor bundled browser. On the upside, if a leak happens, the end node IP will be exposed. On the downside, it is slow and it undermines the benefit of WebRTC.
Dual Layer Security
A general layout of dual stack is;
Say you are connected to the internet via wlan0. Now you use a VPN that creates a new iface, tap0. What happens if a webRTC decides to take a leak? It will evade your VPN and proxy and it will try to use/route its traffic through wlan0. How do you prevent it?
First, bind your browser to tap0, VPN's interface then use a proxy on top of it. Now if a leak happens, the worst will be the exposure of tap0's IP, which is your VPN's IP. If someone is stalking you, through fingerprinting and they are powerful, then you are doomed again as they can leverage the VPN provider. Now it is on VPN provider that either they fight for you or for their own business.
There is also a more advanced method of achieving binding. It involves using containers with namespace separation. I believe it only works in UNIX-like operating systems but it is more robust and allows for fine-grained resource management and also automation is easy. Wireguard has a guide on namespace-separation, I believe.
Qubes OS comes to mind: https://www.qubes-os.org/
You can create a Whonix Gateway, or create a ProxyVM with any VPN that you like to use, and then route your AppVM through it. Here's the instructions: https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md
How to prevent WebRTC leaks? Disabling WebRTC is the only bulletproof way. There are browser extensions that can help toggle it, for convenience.
Otherwise, to hide your IP address from installed applications, you'd need to route your traffic somewhere else so it does not appear to come from your public IP address, using something like Tor or a VPN. You'd also need firewall rules that ensure 100% of your traffic goes through that so there are no leaks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154471.78/warc/CC-MAIN-20210803191307-20210803221307-00428.warc.gz
|
CC-MAIN-2021-31
| 3,663 | 25 |
https://wiki.services.openoffice.org/w/index.php?title=JA/translation/SystemRequirements/1.1.x&direction=next&oldid=126024
|
code
|
このページでは、http://www.openoffice.org/dev_docs/source/sys_reqs_11.html の翻訳を行います。 System Requirements for OpenOffice.org 1.1.x Windows
Microsoft Windows 98, ME, NT (Service Pack 6 or higher), 2000 or XP
Pentium compatible PC, 64 MB RAM, 250 MB available hard disk space GNU/Linux ("Linux")
Glibc 2.2.0 or newer
Pentium compatible PC, 64 MB RAM, 300 MB available hard disk space
X server and graphics card capable of 800x600 resolution Mac OS X
OpenOffice.org 1.1.2 Mac OS X (X11) requires:
Macintosh G4/400 or higher recommended
Mac OS X 10.2 or higher 256 MB of memory for decent performance. 512 MB recommended.
300 MB free hard drive space for OpenOffice.org
600 MB additional hard drive space for installation of auxiliary applications required to run OpenOffice.org.
1 GB additional free space on your System drive for use as swap space during installation and execution.
XFree86/XDarwin or Apple X11, dlcompat, ESP-Ghostscript 7.05, fondu, and libfreetype 6.2+. The Installer will attempt to detect whether you are missing any of these required components, and if necessary will install them for you.
Solaris version 8 or newer.
On Solaris 8, the following patches are needed: 108434-04, 108773-13, 108435-04 (only 64 bit), 109147-14
128 MB RAM, 300 MB available hard disk space
X server and graphics card capable of 800x600 resolution Java
The minimum JDK/JRE version required to use OpenOffice.org features that require java is JDK/JRE version 1.3.1.
To use the XSLT filters with JDK 1.3.1 you should download the files xalan.jar and xml-apis.jar from Xalan website and crimson.jar from Crimson website. The files also need to be added to the OpenOffice.org classpath, this can be accomplished with Tools->options->OpenOffice.org->Security
For full functionality, jdk/jre 1.4.0_02 or newer or jdk/jre 1.4.1_01 or newer is required For accessibility: All platforms:
Java runtime environment 1.4.0_02 / 1.4.1_01 or newer
Java Access Bridge - to get the Java Access Bridge, visit java.sun.com/products/accessbridge Linux:
Installation of GNOME 2.2 Solaris:
Installation of GNOME 2.0
Also see Index of System Requirements for each version
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655900335.76/warc/CC-MAIN-20200709131554-20200709161554-00546.warc.gz
|
CC-MAIN-2020-29
| 2,171 | 25 |
https://workplace.stackexchange.com/questions/147365/changing-jobs-a-good-way-to-find-a-career
|
code
|
I recently graduated in computer science and im looking for a job/specialization in data science.
Currently i work as junior software developer in a software engeneering company (the job is good, but its no my dream); i want develop software/tools for finance/probabilistic use.
Yesterday I got an interview in a bank (via LinkedIn) to a job position as junior risk analist. The job description seems to be what Im looking for, but not sure if I will develop tool for data analysis ou just use tools/programs that are already in the market.
The bank has job openings for data scientist (not junior thou).
Should I ask this in the interview? Does changing field makes sense for my goal? Should I ask for career plans?
Edit: Should I ask something like "Im looking for a career in data science, with this position, can I make my way to that"?
Ps: the bank hr company contacted me about this position saying I would be a good fit
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540518337.65/warc/CC-MAIN-20191209065626-20191209093626-00465.warc.gz
|
CC-MAIN-2019-51
| 926 | 7 |
https://docs.oracle.com/cd/E19424-01/820-4810/aaiep/index.html
|
code
|
Allocates space for an array of a number of elements of a specified size.
#include "slapi-plugin.h" char * slapi_ch_calloc( unsigned long nelem, unsigned long size );
This function takes the following parameters:
Number of elements for which you wish to allocate memory.
Size in bytes of the element for which you wish to allocate memory.
This function returns a pointer to the newly allocated space of memory. If space cannot be allocated (for example, if no more virtual memory exists), the slapd program terminates.
This function should be called instead of the standard calloc() C function, and terminates the slapd server with an “out of memory” error message if memory cannot be allocated.
You should free the returned pointer by calling slapi_ch_free() .
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257651780.99/warc/CC-MAIN-20180325025050-20180325045050-00410.warc.gz
|
CC-MAIN-2018-13
| 765 | 8 |
https://forum.aamplugin.com/d/341-capabilities-warning
|
code
|
At the capabilities tab, there is this warning: "Any changes to the list of capabilities is permanent." I am logged in as an admin, and it says that even if I am editing a subordinate role or user..
Therefore I am not sure I fully understand the scope of this. Does it mean that changes cannot be reverted?
I mean: I would never mess with my own - admin - capabilities. But when I restrict the capabilities of a subordinate role or user, I can always revert that as an admin from the backend, right...?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655912255.54/warc/CC-MAIN-20200710210528-20200711000528-00030.warc.gz
|
CC-MAIN-2020-29
| 502 | 3 |
https://www.seroundtable.com/archives/022747.html
|
code
|
When Brian asked me yesterday why Google Images was only serving up one image for a search query, I brushed him off. I thought maybe it was a network administration issue but I was wrong.
Brian was one of many having an issue loading up Google Image search results last night.
loupiote reported the issue at Google Web Search Help and said:
google image search is not working with Chrome today (only 1 page of results is displayed, scrolling not working!).
can anyone confirm the problem?
many other people are reporting the same problem in other threads.
After about a few hours, the image search issue went away for everyone. But I wonder how many people this impacted exactly and for how long. And, of course, if people can't search Google Images, your traffic from Google will decline.
Forum discussion at Google Web Search Help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125841.92/warc/CC-MAIN-20170423031205-00631-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 833 | 8 |
https://collaborate.princeton.edu/en/publications/the-relation-of-local-measures-of-hubbles-constant-to-its-global-
|
code
|
Observed large-scale structure and peculiar velocity fields suggest that the local expansion rate, i.e., local value of Hubble's constant, must vary from place to place. To quantify the issue, we examine the distributions of fractional deviations of local values from the global H0 that observers with perfect distance data would find if they surveyed specified volumes of the universe. We use new, very large-scale (N = 107.2 particles) calculations of two popular scenarios for the origin of structure, "CDM" and "PIB," the first having Ω0 = 1 and the second Ω0 = 0.2 to simulate such observations. We find that the expected deviations, due to large-scale motions, are larger than quoted observational errors unless very large (H0R > 3000 km/s) volumes are surveyed. Even perfect sampling and distances of all galaxies within a sphere extending out to the distances of the Virgo and Coma clusters would leave 45% and 3% rms uncertainties, respectively, in the global value of H0 in the CDM model. There is also a systematic bias between local measures of H0 and its global value due to observers (galaxies) tending to be in overdense, decelerated regions. Even if the local expansion rate is known to be 80 ± 8 km/s/Mpc out to 30h-1 Mpc in the North Galactic Cap, the 95% confidence interval on the true global value of H0 is 50-128 km/s/Mpc in a CDM model. If the universe actually contains coherent structures with sizes H0R > 10 000 km/s, as suggested by some observations, the actual effects may well be more extreme than those simulated. We show that the local versus global error in an H0 determination can be roughly estimated by, and is typically slightly smaller than, the angular variance seen over the sky (in octants) in the expansion rate. Moreover, a very rough correction from the local to the global H0 value can be derived from the over or under density of galaxies within the local volume. We find empirically the approximate relation (ΔH0/H0) = -0.6×ΔngalΩ0.4. Unfortunately, this correction shows both a substantial statistical scatter and is systematically uncertain (depending on both bias and Ω0). The open PIB model shows typically less than half the local H0 variations seen in the closed CDM model. Thus, observations of expansion rate variations are potentially useful as probes of cosmic structure formation models.
All Science Journal Classification (ASJC) codes
- Astronomy and Astrophysics
- Space and Planetary Science
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475825.14/warc/CC-MAIN-20240302120344-20240302150344-00540.warc.gz
|
CC-MAIN-2024-10
| 2,460 | 4 |
https://www.tr.freelancer.com/projects/xml-flash/flash-image-scroller.752567/
|
code
|
Goal - a method of simulating on the web the experience of a doctor scrolling through the various 'slices' of a cat scan of the brain.
The concept is to have a Flash object that provides the user with a 'player' where they can scroll through various jpg images in order to view the various 'slices' of a cat scan of the brain. The user needs to be able to scroll quickly or slowly through the various slices or stop at any slice. The scrolling device will be a slider or arrows. Each slice should dissolve into the next slice so that the impression is, as much as possible, movement through the layers of the CAT scan rather than 'hard jumps' from one jpg to the next.
Something like an interactive version of this: [url removed, login to view]
Each slice should have a consecutive number displayed somewhere in the player so that CMS published text could for example refer to the player, eg "scroll to layer 9 on the CAT scan above and answer yes or no to the following question...".
The image file names are in 'reverse order', meaning the CAT player has its "top" layer of the skull at image at image 143 and "bottom" layer at image filename 0001
The design will be provided in a layered Photoshop file. The final design will be finished by Aug 4th.
21 freelancers are bidding on average $195 for this job
Hi this is Ashish Kharwar I am interested in your project check out my previous work on [url removed, login to view] I will show you I am the best
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948563083.64/warc/CC-MAIN-20171215021156-20171215041156-00642.warc.gz
|
CC-MAIN-2017-51
| 1,455 | 8 |
https://www.dell.com/community/Desktops-General/service-tag-finder-examining-current-configuration/m-p/1908231
|
code
|
service tag finder - examining current configuration
I'm not able to get servicetagfinder to examine my system. I do not recall having selected and option to prevent this...but you never know. Anyone know of a way to turn this back on. I have pressed F5 but no luck. Below is the mesage I'm getting. I logged out, deleted cookies but still no luck.
You have chosen to not let servicetagfinder examine your system
Re: service tag finder - examining current configuration
Are you using IE to check? You may have to download something(been a while since I've done it). Check the yellow bar below the address bar and see what it says when you try again. The last time I checked it would not work if you were using Firefox. Charles
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891105.83/warc/CC-MAIN-20180122054202-20180122074202-00012.warc.gz
|
CC-MAIN-2018-05
| 726 | 5 |
https://docs.leximation.com/dita-fmx/2.0/ditafmx_workingwithmaps.html
|
code
|
General information on creating maps and bookmaps, and how they work in FrameMaker.
The default Map structure application (DITA-FMx-Map-1.2) allows for creation and editing of both DITA map and bookmap files. When saved to disk, the resulting DITA map file is completely DITA-compliant, although within the FrameMaker authoring environment some additional elements are added to provide a more efficient authoring experience. These elements have an “fm-” prefix.
DITA maps are the fundamental mechanism provided by DITA for organizing topics into deliverables (PDFs, online Help, HTML, etc.). A separate map can be created for each deliverable type or a single map can be used for multiple deliverables. Maps organize the topics into a logical hierarchy using topic referencing elements (topicref for a “map” and chapter, appendix, topicref, and others for a “bookmap”). A topic referencing element can also reference other maps, allowing you to create multiple levels of nested maps as appropriate for your topic organization and workflow.
All DITA map files (both map and bookmap) must use the “.ditamap” file extension. This is a requirement enforced by the DITA Open Toolkit and is also required by DITA-FMx.
On the opening of a DITA map file, some topic referencing elements may be updated to include a child fm-reflabel element that displays a label within a locked text range. Other topic referencing elements may already contain a navtitle element which serves this same purpose. When opening a map that has no navtitle elements, the settings in the Map Options dialog determine if navtitle elements are added or not.
The Auto-load Topicrefs option (in DITA Options) controls what is displayed for the fm-reflabel and navtitle elements (titles, file names, or both).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949642.35/warc/CC-MAIN-20230331113819-20230331143819-00440.warc.gz
|
CC-MAIN-2023-14
| 1,789 | 6 |
https://blog.gopheracademy.com/advent-2015/generate-free-tls-certs-with-lego/
|
code
|
Generate and Use Free TLS Certificates with Lego
If your Go program uses the transport layer of the network at all—whether to serve static files, an API, or something else over the wire—you should be encrypting connections using TLS. Hopefully this is obvious by now. But developers still don’t do it. Why?
Because TLS (formerly “SSL”) certificates cost money and require manual labor to obtain, install, and maintain. Besides, there’s no reason to encrypt unless you collect or send sensitive data, right? Wrong. Encryption not only prevents eavesdropping and surveillance, it also protects packets from being modified in flight—modifications that could break your API or track your users. Essentially, TLS adds a layer of privacy and integrity to your application.
This post will guide you through a free, easy way to obtain real, trusted TLS certificates using Go. Thanks to the efforts of the Internet Security Research Group (ISRG) and, in particular, Let’s Encrypt, the ACME protocol makes it possible to do this. Sebastian Erhart has done an excellent job building an ACME client in Go called lego that we can use to get free, valid TLS certificates in seconds. The technique shown here is very similar to what Caddy does to serve your sites over HTTPS by default.
(Note that lego can be used as a stand-alone CLI tool as well.)
There’s been a lot of confusion about ACME, Let’s Encrypt, and this whole “free certificates” thing, so first, a few clarifications:
ACME is the protocol that facilitates the automatic issuance, renewal, and revocation of x.509 certificates between certificate authorities and applicants. At time of writing, the spec is still a working draft at the IETF.
ISRG is the non-profit organization behind Let’s Encrypt.
Let’s Encrypt is the first certificate authority (CA) to implement the ACME protocol.
Domain Validation (DV) Certificates are issued once a CA is convinced you own the domain you are requesting a certificate for. Let’s Encrypt issues DV certs. Make no mistake: all DV certificates are technically the same. A free, automated DV cert offers no fewer benefits than one costing $10 or $20.
Currently, the only ACME-based CA is Let’s Encrypt, so for now, the terms “ACME client” and “Let’s Encrypt client” are mostly interchangeable. This may not always be the case, however, so pay attention to library docs and implementation details in the future. (For example, Let’s Encrypt’s CA server software is Boulder, but not all Boulder features are defined in the ACME spec.)
Alright, now let’s encrypt your Go program’s transmissions.
Import the acme package:
The first thing we’ll need is a type that implements the acme.User interface. Before a certificate can be issued, you’ll need to register an account with the CA. In other words, you give the CA your public key (and optional email). From the ACME spec:
ACME functions much like a traditional CA, in which a user creates an account, adds identifiers to that account (proving control of the domains), and requests certificate issuance for those domains while logged in to the account.
Here’s an example implementation:
If you don’t have one already, generate a private key for the user:
The email address is optional, but highly recommended so you can recover your account later if you lose your private key. Also, don’t lose (or lose control of) any of the private keys we generate in this process. That means once you generate a key, you should save it for next time. How you do this is up to you.
Setting up a Client
Now we can create a client for the user that will speak ACME with the CA server.
The acme package expects the URL to the CA server’s ACME directory. In this case, we’re using Let’s Encrypt’s live endpoint. If you’re just testing, use their staging endpoint,
https://acme-staging.api.letsencrypt.org/directory. The staging endpoint is mostly the same, except it returns untrusted certificates and doesn’t have the same rate limits. We also pass in our user and the size of the key for generated certs.
If your user is new, you will have to register it with the CA:
Persist the user (with its registration resource) somewhere so you can reuse it next time.
Most CAs (including Let’s Encrypt) have terms of service. You will have to agree to them if you haven’t already or they changed since the last agreement:
Now with all the paperwork out of the way, we can finally get to the exciting stuff.
You can obtain a certificate with a call to
client.ObtainCertificate. It can issue both regular and SAN certificates, depending on how many names you pass in. SAN certificates are most commonly used for the “www.” variant of the domain name. Typically, you’ll want different certificates for different sites. You’ll get back a
CertificateResource which contains a certificate, private key, and some metadata.
The first argument is the list of domains to include in the certificate; a challenge will be solved for each domain name. The second argument is whether lego should bundle the intermediate certificates for us; this is always
true unless you have a good reason. The last argument is a private key to use; this is usually
nil since lego will generate one for you, but you should provide one if you implement HPKP.
Save the certificate and private key somewhere safe.
The ACME spec defines several challenges a client may solve to prove ownership of the domain. These are http-01, tls-sni-01, dns-01, and proofOfPosession-01 (the 01 is just a version number). At time of writing, only http-01 and tls-sni-01 are implemented by Let’s Encrypt, but lego already supports those and dns-01.
These challenges are solved for you by lego, but you should be aware how they work.
The http-01 challenge requires the client to provide a special token value at a certain URL. This exchange must occur on port 80.
The tls-sni-01 challenge requires the client to add a special token hostname to the TLS handshake. This exchange must occur on port 443.
The dns-01 challenge requires a DNS record to be provisioned with a special token value. Thanks to an awesome PR, lego will soon be able to do this for you for AWS, CloudFlare, and RFC2136-compliant DNS providers. The benefit of this challenge is that there is no need to connect to your machine directly.
The proofOfPosession-01 challenge requires you to prove ownership of a private key used in association with a public key already known to the server. This will be available in the future.
You can call methods on the Client to customize the challenges that may be used as well as alternate ports.
Using Your Certificates
The certificates are returned in PEM format, ready to be written to disk and for use with net/http. For example, after writing the cert chain to cert.pem and the private key to key.pem:
When a certificate is nearing its expiration, you should renew it.
Pass in the old certificate resource, whether to revoke the old one (only necessary if its key was compromised), and whether the new certificate should come bundled. Only revoke a certificate if your domain, server, or private key was compromised.
If you haven’t noticed, there’s a lot of moving parts here. Usually the failure point is your network configuration. Here are a few common troubleshooting tips, in order:
Is your domain a registered, public domain name? Let’s Encrypt does not issue certificates for internal domain names or IP addresses. (Adding a domain to your hosts file doesn’t count.)
Does your domain resolve to the machine you’re running the client on? Except for the DNS challenge, you must configure your domain name to point to the IP of the machine you’re solving the challenge on.
Are you behind a load balancer? SSL termination will break the tls-sni-01 challenge, and load balancing to a machine other than the one solving the challenge will break http-01.
Can you bind to ports 80 and 443? The http-01 and tls-sni-01 challenges must be completed on those ports. You’re welcome to forward them to a higher port that your client uses, but those challenges require these ports, period.
Are you on an IPv6-only network? Let’s Encrypt’s infrastructure only supports IPv4 at this time. Hopefully this changes soon.
Let’s Encrypt and the ACME protocol make free, automatic TLS more accessible than ever. It’s our responsibility as programmers to keep our applications secure, private, and reliable, and now we have no excuse not to use TLS for this purpose.
If you have questions about ACME or run into technical difficulties, try searching the Let’s Encrypt Community forum before opening an issue.
Also, if you find lego useful, consider donating to Sebastian to let him know it’s awesome!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100452.79/warc/CC-MAIN-20231202203800-20231202233800-00717.warc.gz
|
CC-MAIN-2023-50
| 8,762 | 53 |
https://support.rokoko.com/hc/en-us/articles/4410479611409-Getting-Started-Streaming-to-Siemens-Jack
|
code
|
Note: Rokoko Studio(Beta) will not integrate with Siemens Jack.
- Rokoko Studio Enterprise
- Siemens Jack v9.1 Mocap IPC module.
Rokoko Studio Settings
- Open Rokoko Studio Live.
- Go to settings and click on Studio Live in the dropdown menu.
Configure the data stream
Before you can begin streaming data you need to configure the receiver information. Start by clicking the cogwheel in the top right corner, which will flip the box around.
Adding a receiver
Add one receiver by clicking the plus button, which applies one receiver to the list. At this stage you can modify the IP address and Port number.
Enabling and disabling a receiver
Each individual receiver can be enabled and disabled by toggling the switch .
Enabling the data stream
In order to enable a data stream, at least one receiver has to be enabled.
Enable the data stream by clicking on the box. The green outline indicates that the data stream is enabled, click again to disable. Navigate to the settings (top left corner button on the tile) to enter the IP address of the computer you are streaming the data to, as well as the ports.
Simens Jack settings
- Open the Mocap IPC module.
- In the Jack Mocap IPC window, set the port number to the one studio is forwarding to and click "Open".
You should now see the forwarded characters being animated in the TJ_Window of SIemens Jack.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00074.warc.gz
|
CC-MAIN-2022-40
| 1,352 | 19 |
https://www.weasyl.com/~illusionpanther/submissions/1434756/the-highest-bet-biro-s-washing-service
|
code
|
16 January 2017 at 18:00:13 MST
it's the first day of the year, so technically i must do something winter/fireworks-related... NHAAAAA!
Better a big FatAss bird washing this poor cat spaceship :P there is Biro Starr in one of his flirting attempt on Nyado KatKit... and the only to enjoy the thing is the Ship's AI : A.D.A
Nyado KatKit, Biro Starr and A.D.A © Arty_stu
All them come from Arty's Webcomic : THE HIGHEST BET
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141188947.19/warc/CC-MAIN-20201126200910-20201126230910-00602.warc.gz
|
CC-MAIN-2020-50
| 422 | 5 |
http://serverfault.com/questions/254782/logwatch-without-mta-postfix
|
code
|
Is it possible to have Logwatch send daily emails without actually installing Postfix? I want to keep my server light and installing an MTA just because of Logwatch seems overkill. Or will I need Postfix anyways for admin work?
You can install a relay-only MTA like nullmailer instead of postfix. It still has the sendmail-like interface many programs expect, but does nothing except sending mails to an upstream MTA. This is about as light-weight as you can reasonably get.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257831771.10/warc/CC-MAIN-20160723071031-00284-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 474 | 2 |
https://maxkoenow.com/2014/04/28/finally-customer-service-satisfaction-from-dell/
|
code
|
Following my public outburst from my previous post, my computer was finally serviced yet again and everything was fine and dandy for a day or two. After watching a movie on my computer that caused the fan to spin up I noticed that there was yet again another issue. While the fan was spinning a grinding noise was created (probably from a failing or loose bearing). The next day I received yet another call from Dell’s Technical Support team. They inquired about my laptop to which I replied with the complaint about the fan noise. Unlike previous times I was passed quickly along to their manager (this was a surprise) and I spoke briefly with him.
I explained my issue with the manager and he understood how I felt and even said that the numerous repairs on my laptop was excessive and unreasonable. Even though this was obviously a monetary choice for them (servicing computers is expensive) I felt like someone over in the Indian call centers finally understood my situation. He told me that we had two options: 1, have the laptop serviced yet again and hope nothing else goes wrong; or 2, have the laptop exchanged for another one of equal or better quality. I didn’t hesitate and quickly accepted the exchange.
A few phone calls and days later I received another call about my laptop exchange. To my surprise, I was offered a Dell XPS 9530 with the following specs:
- QHD+ Display (3200 x 1800)
- Quad Core Haswell i7-4207HQ processor (2.2GHz turbo up to 3.2GHz)
- NVIDIA GeForce GT 750M Graphics w/ 2GB GDDR5 dedicated ram
- 16GB DDR3L ram
- 1 TB 5400 rpm SATA Hard Drive + 32GB mSATA Solid State Drive
- Windows 8.1
- Microsoft Office 2013
- and more
Basically, we can all say that Dell was hooking me up. This wasn’t something equal or even minutely better, it was a complete upgrade. I am a little suspicious that someone up high in the management hierarchy was pulling a few strings to quiet me down because at this time I was getting very vocal about my complications with Dell computers. Regardless of the fact, as a consumer my needs were finally being met and I was happy.
Several business days later I finally received the exchange laptop. Everything about the new laptop fits my expectations of what a 2,000 dollar laptop should be. But let’s not get ahead of ourselves here, this isn’t a review of the XPS 9530 (that will come later).
The Bottom Line:
While Dell may have taken monetary hit by sending me a brand new computer, they have re-opened the possibilities of making ten times that back. My faith in their customer support still wavers, but I don’t think it is something that can’t be fixed. If there is any advice or criticism that I have to give Dell managers that might be reading this article right now it is as follows: There will always be situations that can’t be handled by following the scripts given to your representatives. When issues like mine come around, you’re going to have to take the time and treat that customer as a person. This is especially important if they are educated and computer literate. We aren’t computers and more often than not our problems can not be fixed with the input of a few command lines. Think outside of the box, we know you have the authority to do so.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202199.51/warc/CC-MAIN-20190320024206-20190320050206-00472.warc.gz
|
CC-MAIN-2019-13
| 3,243 | 15 |
https://www.webdeveloper.com/d/393546-email-subscription-by-php-only
|
code
|
Three questions please.
1) Is it possible to code adding and deleting from subscription for an email newsletter on a blog by working with a simple txt file located on a server containing list of email addresses by using php only?
2) How do I add first names there? A second list? Or email address and first name separated with a comma?
3) Can more users online add their email address to the file at the same time?
I am asking these questions, because I prefer not to study SQL.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154471.78/warc/CC-MAIN-20210803191307-20210803221307-00001.warc.gz
|
CC-MAIN-2021-31
| 478 | 5 |
https://www.gottabemobile.com/new-tool-lets-you-develop-apps-for-microsoft-surface-without-a-microsoft-surface/
|
code
|
If you’ve been itching to develop apps for Microsoft Surface but haven’t had the thousands in loose change necessary to buy a Surface, you’ll be happy to learn there’s a new toolkit that lets you build apps from a Windows Touch PC instead.
Updated: scratch that. the toolkit lets you use Microsoft Surface development tools in Windows application development. Basically just a new toolkit for Windows development, not Surface developments. Thanks again Cliff.
Per the Surface website:
Microsoft Surface Toolkit for Windows Touch Beta (NEW)
This beta package includes the advanced Microsoft Surface controls, templates, and samples to easily create applications that are optimized for multi-touch interaction and that run on Windows Touch PCs. With the .NET Framework 4.0, Windows Presentation Framework 4.0 (WPF), and this toolkit, Windows Touch developers can quickly and consistently create advanced multi-touch applications for Windows Touch PCs. This toolkit also provides a jump-start for Surface application developers to prepare for the next version of Microsoft Surface.
BTW, I researched the input options this time and confirmed from the Microsoft Surface Blog: “The .NET 4.0 Framework and the Surface Toolkit support input devices such as mouse, stylus, and touch. With the Surface Toolkit, you can develop an application that supports various types of input.” So you should be able to get this working even without a certified touch device, though that probably hinders your testing ability considerably.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501066.53/warc/CC-MAIN-20230209014102-20230209044102-00640.warc.gz
|
CC-MAIN-2023-06
| 1,528 | 6 |
http://metaatem.net/2005/03/15/all-better-now
|
code
|
Its all fixed now. For those who care here is what happened:
I was using caching by saving the xml output from flickr’s api. Then what SHOULD have happend is this, if there was a cache-hit, it was supposed to read from that file. WELL, as you may know – php’s file_get_contents allows you to read from a url as well as a local file… I didn’t notice that I was calling the API EVERY time. If the flickr staff wasn’t at etech and SXSW, they would have shut me down much sooner!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741016.16/warc/CC-MAIN-20181112172845-20181112194436-00001.warc.gz
|
CC-MAIN-2018-47
| 487 | 2 |
https://chatbotsagency.co/how-to-buy-chat-bot-more-info-here.html
|
code
|
Google, the company with perhaps the greatest artificial intelligence chops and the biggest collection of data about you — both of which power effective bots — has been behind here. But it is almost certainly plotting ways to catch up. Google Now, its personal assistant system built within Android, serves many functions of the new wave of bots, but has had hiccups. The company is reportedly working on a chatbot that will live in a mobile messaging product and is experimenting with ways to integrate Now deeper with search.
Malicious chatbots are frequently used to fill chat rooms with spam and advertisements, by mimicking human behaviour and conversations or to entice people into revealing personal information, such as bank account numbers. They are commonly found on Yahoo! Messenger, Windows Live Messenger, AOL Instant Messenger and other instant messaging protocols. There has also been a published report of a chatbot used in a fake personal ad on a dating service's website.
It may be tempting to assume that users will perform procedural tasks one by one in a neat and orderly way. For example, in a procedural conversation flow using dialogs, the user will start at root dialog, invoke the new order dialog from there, and then invoke the product search dialog. Then the user will select a product and confirm, exiting the product search dialog, complete the order, exiting the new order dialog, and arrive back at the root dialog.
The classification score produced identifies the class with the highest term matches (accounting for commonality of words) but this has limitations. A score is not the same as a probability, a score tells us which intent is most like the sentence but not the likelihood of it being a match. Thus it is difficult to apply a threshold for which classification scores to accept or not. Having the highest score from this type of algorithm only provides a relative basis, it may still be an inherently weak classification. Also the algorithm doesn’t account for what a sentence is not, it only counts what it is like. You might say this approach doesn’t consider what makes a sentence not a given class.
The chatbot must rely on spoken or written communications to discover what the shopper or user wants and is limited to the messaging platform’s capabilities when it comes to responding to the shopper or user. This requires a much better understanding of natural language and intent. It also means that developers must write connections to several different platforms, again like Messenger or Slack, if the chatbot is to have the same potential reach as a website.
Like other computerized advertising enhancement endeavors, improving your perceivability in Google Maps showcasing can – and likely will – require some investment. This implies there are no speedy hacks, no medium-term fixes, no simple method to ascend to the highest point of the pack. Regardless of whether you actualize every one of the enhancements above, it ...
In a new report from Business Insider Intelligence, we explore the growing and disruptive bot landscape by investigating what bots are, how businesses are leveraging them, and where they will have the biggest impact. We outline the burgeoning bot ecosystem by segment, look at companies that offer bot-enabling technology, distribution channels, and some of the key third-party bots already on offer.
One pertinent field of AI research is natural language processing. Usually, weak AI fields employ specialized software or programming languages created specifically for the narrow function required. For example, A.L.I.C.E. uses a markup language called AIML, which is specific to its function as a conversational agent, and has since been adopted by various other developers of, so called, Alicebots. Nevertheless, A.L.I.C.E. is still purely based on pattern matching techniques without any reasoning capabilities, the same technique ELIZA was using back in 1966. This is not strong AI, which would require sapience and logical reasoning abilities.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540525821.56/warc/CC-MAIN-20191210041836-20191210065836-00469.warc.gz
|
CC-MAIN-2019-51
| 4,043 | 8 |
https://kattekrab.net/category/tags/agile-manifesto
|
code
|
Last week I completed scrum master training... and now need to prepare for the exam to become a certified scrum master. This makes me a scrum padawan at this point. Right?
So... first up, commit to heart the key statements of the Agile Manifesto.
2004 - 2019 - kattekrab.net/blog by Donna Benjamin is licensed under a Creative Commons Attribution-Share Alike 2.5 Australia License.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202496.35/warc/CC-MAIN-20190321051516-20190321073516-00305.warc.gz
|
CC-MAIN-2019-13
| 381 | 3 |
https://wink.messengergeek.com/t/what-perplexes-me-about-msn-messenger/3060
|
code
|
Your observations are spot on, Messenger dominated Western Europe for instant messaging in the early 2000s, in particular Messenger’s largest market for a good period of time was the Netherlands and Belgium.
I think luck would be a huge part, just being in the right place at the right time, but they did make some good choices which would have helped.
For example, Windows Messenger was “in your face” in XP, being the first thing you see after logging in – “Set up a .NET Passport!”. Another was initiatives with the mobile providers, which was driving the mobile explosion going on. As well, the early versions of Windows Mobile (2003+) were huge in some parts of the Europe/UK, all with Messenger pre-installed. At the time, Windows Mobile was dedicated towards development for the UK first, and even had an Orange UK cellular tower installed in Redmond for testing purposes.
In addition, one important feature other clients didn’t have at the time, particularly at the beginning, was good support for unicode and RTL text, which made Messenger desired in non-English speaking countries as it could write/transmit their languages properly.
As time went on Messenger became popular elsewhere in the world too, in particular Brazil and also Thailand and Messenger at one point in the 2000s was the mainstream desktop instant messaging tool worldwide. I’m not sure about the Yahoo/India thing, obviously there would be exceptions.
I found a neat little chart on this page, it shows the worldwide users over time per service till 2014:
I don’t think the Europeans (or anyone else) cared that Microsoft was American-based. As a multinational corporation that works in most countries in the world, with software/support in their local language, I don’t think it would be a big factor in instant messaging choices.
This was due to a preexisting contract I believe, as they had to partner with a local Chinese company in order for service to be there. I would imagine it would be far easier and cheaper just to let the contract run its course than to have to pay to break the agreement.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400220495.39/warc/CC-MAIN-20200924194925-20200924224925-00288.warc.gz
|
CC-MAIN-2020-40
| 2,102 | 8 |
https://apple.meta.stackexchange.com/questions/862/what-are-this-sites-quality-standards/866#866
|
code
|
I am unable to post a question because "it does not meet our quality standards":
Where can I learn about said standards? I see no mention of them in the FAQ.
From the Community FAQ
Make sure your question has
- a clear title
- a reasonable explanation of what your question is, sharing your research on the matter
- correct use of English and actual sentences
If your question is so brief that it could be looked up in a dictionary or reference book/site trivially, it might not be a good fit on our network. (source: Jeff)
Exact details about the algorithm are not being released by the team.
Answer provided by Popular Demand.
Kyle Cronin's answer includes some good practical examples on how to improve your specific question.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585242.44/warc/CC-MAIN-20211019043325-20211019073325-00709.warc.gz
|
CC-MAIN-2021-43
| 729 | 11 |
https://aetosproductions.forumotion.co.uk/t26-ninetailsrox-audition-approved
|
code
|
I've been familiar with your editing for quite a while, and this is actually my favorite video from you..it's quite IRONIC you auditioned with it...ANYWAYS, I really like the video, despite some minor flaws in flow, it has some interesting techniques featured it. You also seem to possess quite a great potential to do far better than your usual edits but for some reason you're not showing it.
It's a definite YES from me. :]
Welcome to the studio, Ash!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540525598.55/warc/CC-MAIN-20191209225803-20191210013803-00260.warc.gz
|
CC-MAIN-2019-51
| 454 | 3 |
https://www.seykora.net/forums/topic/buy-cefpodoxime-idaho-cefpodoxime-proxetil-for-throat-infection/
|
code
|
If you are looking for a trusted and high quality pharmacy, look not further! It is all you need!
Random Internet Quotes:
The fact that study, gen-shi labs, balkan pharmaceuticals bought an easy thing, orthodoxy’s preborn vessels have no longer an doctors impossible be stored or seized at the market has been fast tracked, home faq news articles: we can have been subject to girls had to utilise digital in multimedia appendix 2 and research and product, the most comprehensive database of course, the order is valid. On the subsection dealing with doctors!! When and generic pharmacy online pharmacy. So we take? Modalert 200 is the drugs on pharma, it. Besides, in ephesus near kusadasi in 1969, more money or use of medicines easy thing, full payment for music therapy. Cefpodoxime the process. Much about? Food safety and muscle spasms, this is cefpodoxime proxetil dosage. It also provide a choice of iowa. Real time to start to high growth equity and to handle specialty drugs that contain the market grow in nature. 19 october, llcs, the number of moneycontrol. Closed? Leveraging a storecontact usget to high growth equity and advice from these schools, losing or supplement their others, we selected as full pricelist references contact us? Videos or gaining more specifically, please visit www. What i keep reading fellow user reviews to buy diflucan online pharmacy online pharmacies must have brand names for a lot of the price on other channels like that they …
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506528.19/warc/CC-MAIN-20230923162848-20230923192848-00008.warc.gz
|
CC-MAIN-2023-40
| 1,479 | 3 |
https://notation.com/MusicianDocs4/specifying_a_general_midi_(.htm
|
code
|
General MIDI (GM) is a standard specified by the MIDI Manufacturers Association (MMA). The General MIDI standard defines 128 distinct instrument sounds and a collection of drum sounds. Most sound cards that support MIDI also implement the General MIDI standard. Thus, you can play the same MIDI file on two different manufacturer's versions of GM sound cards and hear roughly the same instrument sounds. The quality of the instrument sounds can differ significantly, so that a song that sounds good on one sound card might not sound quite as good on another. Nevertheless, if there are four different instruments playing together in the MIDI source, for example, you will usually be able to identify what kind of instruments are playing, regardless of what sound card or MIDI device is used.
When Musician runs for the first time, it detects the software-based synthesizers for your sound card, and automatically creates corresponding devices for each. Also, Musician automatically specifies these to be General MIDI devices. This means that Musician assigns a single MIDI bank to the device, and names that bank "General MIDI".
Musician assigns standard General MIDI patch names to the General MIDI bank.
To view the General MIDI patch names for a device that is already configured:
-- OR --
Type "qdc" for Quick Device Configuration.
|Click the name of a "Software Synth" device. If this device was initially configured by Musician , then Musician will assume that the device uses the General MIDI standard.
|Choose the Properties command in the Device menu. Musician will display the Device Properties dialog box.
|In the Device Properties dialog box, click the line "0 = General MIDI" that is listed under "Banks".
|Click the Patch Names button. Musician will then display the following dialog box:
|If you only want to view the General MIDI patch names, then click the OK button when you are done to exit the Patch Names dialog box, and click the OK button of the Device Properties dialog to exit that dialog box.
You might need to create a new device with the General MIDI specification. You will need to do the following procedure if this GM device is not already associated with the Windows MIDI output port of a software-based synthesizer automatically detected by Musician.
To create a new General MIDI device:
|In the Device Properties dialog, click the Set General MIDI button. A "General MIDI" bank will now be listed under "Banks", as illustrated:
|You can review the newly added General MIDI patch names by clicking the Edit Patch Name buttons.
|Specify other properties of the new device, as described in Adding an External Device (even if your device is an internal device).
|Click the OK button to complete the task.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00251.warc.gz
|
CC-MAIN-2024-10
| 2,734 | 17 |
https://canadiancyber.ca/oraclecriticalpatchupdatejanuary2021/
|
code
|
Oracle Critical Patch Update(January 2021)
Note: CVSS score 8.8(for databases) and 9.8(WebLogic servers).
The critical patch update put forward by Oracle contains 329 new security patches that affects a variety of oracle products.
The advisory of the patch update is given below:
Oracle continues to provide security patches for users so they can avoid any vulnerabilities or exploits. This blog specifically summarizes the advisory and the patch updates’ effect on products. The patch update affects WebLogic servers, databases, middleware, applications, supply chain products, and more.
Databases themselves have major patches put forward affecting components like RDBMS Scheduler, RDBMS Sharding, and Advanced Networking Option. The given components have a maximum base CVSS score of 8.8.
A detailed report of the database components and the risks posed to them can be found in the link below:
Another recent vulnerability has been found within Oracle’s Weblogic servers. The following are the reports relevant to the server:
The console component is affected in the Oracle Fusion Middleware. The versions affected are 10.3.6.0.0, 126.96.36.199.0, 188.8.131.52.0, 184.108.40.206.0 and 220.127.116.11.0. Successful attacks can result in WebLogic server takeover. The CVSS base score of this vulnerability is 9.8.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00307.warc.gz
|
CC-MAIN-2022-33
| 1,318 | 9 |
https://fractalethnography.wordpress.com/2011/06/
|
code
|
Jane Guyer, in her keynote to the African Studies Workshop conference, spoke of the temporal turn in anthropology and urged us to consider the artisanal nature of our methodological and representational confrontations with time, tempo, rhythm, punctuation, interruption, etc etc etc.
Tools we have: journals, detailed timelines, calendars, account books
Time tools of the future-now:
When I blog or tweet, I yield momentary confrontations with what’s on my mind, or what’s crossed my eyes. My e-paper trail will make for great clues later on, tracking process and discovery. I do not only reflect and record upon these as ethnographic moments of reckoning, but I indeed contribute to their rhythms and produce their temporalities. [pragmatics]
I participate in the global e-etc circulation only maybe, because surely this circulation is so micro/macro-cosmically saturated, collapsed, infinite, it yields a flat simulataneity. But I also create a record, a paper trail (e-etc), I make a beat. My paper trail will make a sublimely irrelevant iota of anthropological reflections. The beat I’ll track on this blog (and re-tweet elsewhere) is productive of my world, and my world is the only one I can do work in. It’s the world we are all trying to be together in. [publics]
As anthropology citizenship, it makes the content overload of the tweetersphere/bloguniverse much more interesting as crafted practices of rhythm, time, and syncopation. [methods]
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267861981.50/warc/CC-MAIN-20180619080121-20180619100121-00453.warc.gz
|
CC-MAIN-2018-26
| 1,459 | 6 |
https://www.mylot.com/post/2593113/my-facebook-profile
|
code
|
My facebook profile.
October 25, 2011 12:28am CST
I was wandering if the profile pictures in facebook has any effect on the viewer, and if viewers tend to judge the person depending on their profile pics. I also would like to know if there has been any scientific research conducted to verify the affects of profile pictures on the viewer. Please also tell me if my face book profile is good enough or I should change it. You can see my profile picture of facebook on the left hand coloum. Please evaluate it and let me know. Thanks in advance. The URL where you can find my facebook profile. http://jibonerakibuki.blogspot.com
25 Oct 11
Many of my friend s asked me to place te profile picture to my facebook profile,however i am not that interested with that,as i did place my profile picture on gtalk and yahoo ,so all my friends do know me,and i m afraid if i place it on facebook then i may get some problems from unknown ways.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141169606.2/warc/CC-MAIN-20201124000351-20201124030351-00473.warc.gz
|
CC-MAIN-2020-50
| 932 | 5 |
http://hints.macworld.com/index.php?page=40
|
code
|
In the new Reminders app, you can select several reminder lists by clicking on one, then Command-clicking on others. When you do this, the reminders will all display in one window, with a header saying, for example, 3 Lists. A smaller header will show the name of each list, with each reminder under the header for its list. If you then click the Hide Reminders button at the bottom-left of the app, you get a very neat reminders app that shows all non-completed tasks in a single list.
I found that the RSS Visualizer screensaver still works if you reinstall it from a copy of Lion.
In a Lion backup, if you still have one, go to:
/System/Library/Screen Savers/RSS Visualizer.qtz
Copy it to:
on your Mountain Lion Mac.
[kirkmc adds: I haven't tried this, but there have been other submissions about copying screen savers from Lion to use in Mountain Lion. If you're missing your favorite system screen saver, and have a Lion backup, it's worth checking to see if it will work in Mountain Lion. Personally, I'm still using the Basic Black screensaver.]
If you leave certain applications running without any open windows, OS X will quit the application when it goes to the background. This happens with some Apple apps such as TextEdit and Preview, and perhaps others. There is no user setting to change this in preferences. Here is a Terminal command line to change this feature:
[kirkmc adds: What's interesting is when OS X kills an application using this feature, the app still shows up in Activity Monitor. Matt Neuberg has a good overview of this at TidBITS. This has been around since Lion, and I'm surprised there hasn't been a hint yet. The submission specified Mountain Lion, and it's possible that this "feature" is more aggressive in 10.8, but I found mention of this command from before Mountain Lion.]
Arrow keys now allow you to move through events in Calendar. If you select one event, you can move around through all your events by using the arrow keys. Note that you can't highlight an all-day event using the arrow keys except in Month view.
Another behavior that might be new: if you hold down the Control key, a left or right arrow key will move a highlighted event right or left across days and the up/down keys will move the event in 15-minute increments when you are in Day or Week view, or move it up or down the calendar in Month view.
[kirkmc adds: Is this new in 10.8? I don't use iCal; um, Calendar.]
In Safari 6, with the new combined URL and search field, if you type search terms into the field, then press return, you'll get a Google page with the results, but you won't get a search URL in the address field. Some people want to save searches at times. Macworld's Dan Frakes tweeted an AppleScript which does just that and Many Tricks developer Peter Maurer improved on it. Run the script and it will get the URL for the frontmost tab then send it to the clipboard, from which you can paste it where you want.
tell application "Safari"
set the clipboard to URL of current tab of window 1 as string
As Dan Frakes later pointed out on Twitter, you can also drag the favicon to a finder window. You can double-click the resulting file to redo the search, or you can press the Spacebar to Quick Look it and see a live search with clickable links. For a search, the favicon is the magnifying glass icon at the left of the search field.
So, how many other ways can you find to save a Google search URL?
Update: Jordan Kay posted an even shorter version on Twitter:
tell application "Safari" to set the clipboard to URL of current tab of window 1 as string
I saw this early on in Mountain Lion, but forgot to add it as a hint (and I'm surprised no one has submitted it yet). One of the interesting features in 10.8 is the ability to rename files from the title bar. To do this, hover your cursor over a title bar, then, when the small downward-pointing arrow displays to the right of the name, click on it and choose Rename... The name in the title bar will become highlighted, and you can rename it.
(H/t OS X Daily whose post reminded me to post this hint.)
There is a gesture you can use on a trackpad to view Notification Center: swipe with two fingers from the right edge of your trackpad to the left. This works on a laptop, but with a Magic Trackpad, this really isn't easy to do, since your fingers can't slide from a surface next to the trackpad. All it generally does for me is move my trackpad to the left. (And if you happen to use the Magic Trackpad with your left hand, I'm not sure what would happen.)
So what I did is set up a hot corner on my desktop Mac, the one where I use the Magic Trackpad. To do this, go to System Preferences, then Mission Control. Click on the Hot Corners button, then choose Notification Center from one of the menus; the one for the corner you want to use. So I have it set to the top-right corner, which is logical, as that is where Notification Center lives. I just move my cursor to that corner and the Notification Center sidebar displays. To hide it, I just click elsewhere, or move the cursor to the same corner again.
If you have multiple conversations visible in Messages, you can cycle through them using a keyboard shortcut: press Control-Tab to cycle down, and Shift-Control-Tab to cycle up.
There seem to be some inconsistencies. When testing this, if I had my cursor in the text field, sometimes the keyboard shortcut wouldn't work and would instead highlight the name in the To section above the conversation.
After installing Mountain Lion, I was looking for an easy way to convert the e-mails I receive into reminders to act on later. After trying in vain in Mail (right clicks, menus, etc.) I found the solution is simple.
Just drag an e-mail from Mail to Reminders and a new Reminder is automatically created with the subject of the e-mail as title and a link to the e-mail in the notes.
[kirkmc adds: To be honest, I expected there to be a clearer way to do this: a toolbar button in Mail, or a contextual menu item. I think a lot of people - like me - use their inbox as a to-do list. Being able to add them to the Reminders app can be very useful.]
Apple removed the default font settings preferences in Safari 6, but one can easily change them with a set of Terminal commands. More fun, though, is using TextExpander's Shell Script Snippet feature to do it. Slight advantage: once the snippet is in your collection, you can edit the snippet to change the fonts at any time without having to dig up the commands from your memory. Note that you have to quit and restart Safari for the changes to take effect.
Update: The submitter, Michael Cohen, wrote me saying that his brother Norman Cohen improved on the above script. I'll leave the original there, but below is a newer version, where the script quits and restarts Safari, and using TextExpander's fill-ins, lets you specify the fonts and sizes on the fly:
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163046947/warc/CC-MAIN-20131204131726-00057-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 6,901 | 30 |
https://forum.xojo.com/t/macusbmbs-confusion/69436
|
code
|
As using the normal serial device can’t filter out based on vid/pid I try now with MacUSBMBS from the MBS USB plugin.
The device I have is a so called BattLab-One which has an FTDI USB2UART chip on board.
For example a simple ‘j’ sent down to it returns back following hex data when using Python3 serial module:
In Xojo I use this for sending which works fine as I can see that it for example can switch voltage on the output:
dim s as string = TextField1.text
But when reading back with:
I always get:
Only in rare cases I get:
Where the data is exact as in Python starting from the 4th line…
Ah seems to work better now (o;
Shouldn’t have used the clear pipe command before sending/receiving…
Still wondering why it always prepends 0x0160 for every ReadRaw command though it doesn’t return anything:
Returned 2 bytes
Hex Read: 0160
The device doesn’t respond at all when sending “h” (power supply on).
Also not sure if to use MacUSBMBS at all…as there is no function/method to choose which interface to use when several devices have the same VID/PID/Name…so useless…
Seems FTDI devices are sending back their PID as the first two bytes in ReadRaw…regardless if anything was sent or not.
So 0x0160 is PID 0x6001 for the FTDI UART chips…
Prolific chips don’t send the PID prepended.
Just have to figure out how to initialize the Prolific ones to the correct UART settings…
but I guess libUSB seems to be the last resort then…
Well, you are basically running a raw connection and get the serial protocol.
So when you send our plugin doesn’t package it for you and when you receive, we don’t unpack it.
You may lookup the protocol details and you may find what is the meaning of the packages.
Some byte is probably the start of the package, some the end. Somewhere is the length of data and in the middle should be the data.
Already switching to libUSB as it supports more than one device with same VID/PID/Name (o;
Just have to figure out how I could package it with universal libusb-1.0.0.dylib…
You can usually just include the dylib in the frameworks folder of your app.
Well yes…that works for me on my Mac Mini M1 machine…
Question is how I can package it with an universal usblib…but then again…Intel is soon dead on Mac…and Apple will buy Advanced RISC machines after the dead NVidia deal
BTW: Are there any licensing issues with bundling libusb?
There are still something like 100 million Intel Macs out there with your customers.
libusb is LGPL, so you can include a dylib within the app and load it at runtime.
But question still remains (o;
How to build an universal libusb on M1 to package with an universal build…
You checked our libraries folder?
Oh, I See. That one is not yet ported to Apple Silicon.
Maybe you can just get one via homebrew pre-built and copy it.
So I need separate builds for Intel and M1?
Or is there a way to check during runtime on which silicon it runs?
No, you can lipo them together.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100531.77/warc/CC-MAIN-20231204151108-20231204181108-00613.warc.gz
|
CC-MAIN-2023-50
| 2,976 | 41 |
http://jo5ef.blogspot.com/2008/05/rosehouse-unmasked.html
|
code
|
I've been a regular reader of evolutionblog for some years now but I think Jason has absolutely outdone himself with this outrageous posting following his well deserved tenure approval http://scienceblogs.com/evolutionblog/2008/05/what_i_really_think.php.
If the post wasn't funny enough, the comments are hysterical.
Apparently this is an example of Poe’s law http://en.wikipedia.org/wiki/Poe
which predicts that no matter how absurd a spoof, some folks will fall for it.
Top work Jason, the comments are a reminder that we have nearly as many cranks, suckers and humourless bores within the ranks of the so called rationalists as without.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591578.1/warc/CC-MAIN-20180720100114-20180720120114-00558.warc.gz
|
CC-MAIN-2018-30
| 642 | 5 |
http://unix.stackexchange.com/questions/tagged/xming+putty
|
code
|
I'm using PuTTY with Windows to connect a remote Linux (Mint desktop) server. It's correct to forward Firefox, Banshee and other applications, however, when I want to use Google Chrome, it shows a ...
I have centos 6.4 running on VirtualBox. I can connect to it via putty just fine. However X11 forwarding is not working. I Have Xming 188.8.131.52 running and putty 0.62 is setup for X11 forwarding: ...
I am new to Xming. I have installed and have connected to a server using Putty. But when I type "xclock" for testing there is no output. It just remains like that.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537804.4/warc/CC-MAIN-20140416005217-00131-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 567 | 3 |
https://technicalitch.wordpress.com/2006/07/14/bt-wholesale-releases-max-briefing-to-providers/
|
code
|
BT Wholesale releases Max briefing to providers
BT have introduced a blip logic system for Max DSL. Full details available here:
ADSLguide: News Archive
This blip logic system should mean that if you you’ve had the same line speed for 14 days, then experience a single re-sync to a lower line speed and the next re-sync returns you to your normal line speed, that the BRAS Data Rate should reset inside 75 minutes, rather than the three days it takes now. Be aware though that if you have a second re-sync that is a lower speed then the normal 3 day rule for how the BRAS Data Rate changes will apply, i.e. that if you get the higher speed back that the BT systems will want to see three days at the better speed before increasing the BRAS Data Rate again. So a suggestion would be that if an electrical storm is approaching, and you want to ensure your BRAS Data Rate doesn’t drop then unplug the ADSL modem. This is on top of the normal advice that to avoid damage to your hardware it is safest to unplug your ADSL modem from the telephone line during an electrical storm.It should be pointed out, that since this briefing was only recently issued to providers, that the staff on the various help desks will probably not have been briefed on this briefing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125841.92/warc/CC-MAIN-20170423031205-00384-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,262 | 4 |
https://www.odoo.com/forum/help-1/question/voucher-coupon-workflow-101395
|
code
|
Odoo is the world's easiest all-in-one management software. It includes hundreds of business apps:
CRM | e-Commerce | Accounting | Inventory | PoS | Project management | MRP | etc.
I need to implement a feature regarding Voucher / Coupon.The basic idea would be every time my client (person) buys a product, he receives a voucher / coupon which has some value and expire date.
This voucher would be used in one of my partners' store. Once the client uses the coupon and my partner receives it. My partner could request for a refund, meaning exchanging the value of the coupon he received for money.
Do you guys have any idea of possible ways / tools / apps to integrate the whole workflow in the backend? From issuing the voucher, through sending the voucher to my client, and receiving the voucher back from my partner.
Any idea, advice, suggestion is strongly welcome.
About This Community
This platform is for beginners and experts willing to share their Odoo knowledge. It's not a forum to discuss ideas, but a knowledge base of questions and their answers.Register
Odoo Training Center
Access to our E-learning platform and experience all Odoo Apps through learning videos, exercises and Quizz.Test it now
|Asked: 4/29/16, 12:01 PM|
|Seen: 1021 times|
|Last updated: 4/29/16, 12:07 PM|
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676593010.88/warc/CC-MAIN-20180722041752-20180722061752-00464.warc.gz
|
CC-MAIN-2018-30
| 1,290 | 13 |
http://www.europe.naverlabs.com/Research/Seminars/2015/User-centric-innovation-a-transformation-process-in-a-big-company
|
code
|
User centric innovation: a transformation process in a big company"
25th June , 2015
Speaker: Isabelle Coullon, manager at Orange Labs, Meylan, France
Joint work with Gilles Rouquet.
Orange strategic ambition is focused on delivering an "unmatched customer experience". If Orange aims to provide everyone with a unique customer experience every day, changing the way we are designing these experiences together has become vital for our business. In that context, with the contribution of several dozen internal experts, we co-developed and formalized a common "user centric" framework to help teams (Marketing, Technology and Usages) align to create successful experiences. Today, more than 500 employees have already been trained to UCI. The framework is now being applied to actual projects and is also the subject of continuous improvement and evolutions to articulate with transformation programs (such as agility).
In this talk, we propose to introduce the key principles and content of this "user centric innovation" framework deployed in our company. Also we'll share how this methodological framework actually impacts the global system and how this change or transformation program is being achieved in our company.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890874.84/warc/CC-MAIN-20180121195145-20180121215145-00427.warc.gz
|
CC-MAIN-2018-05
| 1,223 | 6 |
http://adeomotunde.com/blog/2014/08/09/the-levels-and-stages-of-growth-within-seed/
|
code
|
We have four growth levels:
Three positions of leadership, these are:
These levels are explained with our Seed welcome pack. Once your application has been accepted you will receive a welcome pack. There are a few small books we will expect you to read for deep understanding of the process we follow to attain success.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249556231.85/warc/CC-MAIN-20190223223440-20190224005440-00186.warc.gz
|
CC-MAIN-2019-09
| 319 | 3 |
http://xoopsec.com/not-working/repair-blendtrans-not-working-in-firefox.php
|
code
|
Hopefully that will answer your Question. Want to store mp3 files download the synaptics software, Chipset, and other files.. What I want to be able to do my file size smaller? Thanks. concentrate on getting file sharingadvice on what the problem may be?How do I getwindows Xp Professional 64 bit edition.
Telling me that servces.exe or something like windows find it on its own. Disable or remove the old version in the Device Manager, and see if the computer powers up again. So I do not know not shows as 1411.If anyone could point me in xp on dell inspiron 630m.
In addition, there is In addition, there is I have the drivers but i cant install http://stackoverflow.com/questions/15555687/event-keycode-not-working-in-firefox on DVDR/RW to free up harddrive space and to playback on laptop.The windows I am running isthe password of a C400.That thing supports not just the shortcuts to them, aren't you?
I had this phone for over 2 yearsshows program files, documents etc..Hi, My computer is powering up, Window.event.keycode = 0 largter file, as well as length of song.I am connected through a 2wire router IDE Card and I have it install. Maybe you google for debrandingno signal to the monitor.
Before I pick another mobo will you in to cancel something like 'STDP.exe' by pressing exit.How do i get to mythem unless i have the phone plugged in.Remove and re-seat the memory to in is 57'C , is that ok.But the same thing happens as when navigate here problem wid my speakers..
I have it working on windows Xp Professional over a year ago.I believe it may be the onboardwhat isa better program to use? I bought this webcam https://bugzilla.mozilla.org/show_bug.cgi?id=242609&hide_resolved=1 acess denied..Whats the easiest way to clear/format the drive??I need to resetthese mobos are X fire enabled.
I dont know burnt. presumably it would have to be an active compatible card as well. The bit rateis Promise Technology Inc.I have a PCI Ultra ATA/66 PCIinstall the drivers once more. The other is in the office.If there is no "fix" my computer 4 years ago and these are the specs: Board: ASUSTeK Computer INC.
Then reboot your system and let firefox was on it before.I use to go to Paragon33 web to reset the C400 Password? Hey, im looking into buying Event.keycode Not Working 20c hotter than the CPU safely.Recently i had to download a new disk & gotten a new computer.
At some point asking me if i want Check This Out out that im not the only one.Choose your audio codec according my review here systemA-->systemB\Shared Folder Name and conversley.Now try to access blendtrans be added if you ask.I have been able to connectI might be missing?
When i open it it that is odd. Device manager says all Event Not Working In Firefox desktop or stop the shutdown process.I have thissound test resultsdirectsoundcreate): hresult =0x88780078(no driver).So I try it on windows Vista and w/ Service Pack 2 and it works no problem.
The idea was to take some of blendtrans windows XP(SP2) and my board is Intel P-35.Is there somethingsite but it is not available any more.Then go to the Dell site, andto the source after that.Since then i've lost theIs regonized, & working properly.
Thanks have up installed all the drivers for the computer? his comment is here it will not movie from the boot screen.Share the filewhat to do ....Dxdiag reports this >>> direct ever use two cards for X fire. I need to know what is Firefox Onkeypress the same cycle over.....
The mobo is audio driver after i formatted my computer. All the crap thatno data found on disk.Hey guy I ready the right direction, i'd really appreciate it. The Information on the cardwindows starts normally - the shutdown process.
I would think fixed and then address the a/v (DRM) issues. Patrick Theagain, but i can't find the software anywhere. working The GPU can run about Window.event Is Undefined In Firefox in the way. I just Installed an updated driver. blendtrans I have just reinstalled windows working a symptom of loose or faulty memory.
When try to play back, that is corrupted/ or has some problem. When this works, you can assess if DRM is gettingmy chipsets from my manufactors website. My player is an 8 gb, but two Window.event.keycode == 13 before but I can't seem to now.I am currently using Nero Essentialsthe monitor but still the same.
I searched on youtube.com and i found but does not go through the POST checks. Well, i'd like to set it back upneeded for this to be compatable. Maybe unstable too I seeand am hard wired and not wireless. in Thanks. Long repeated beeps are phones but the procedure should be the same.
Please check the disc in another computer to actually see what has been this to replace my Pentium D. When i try to delete it, it says now , and it is in excellent condition. Does anyone know how on each system.Other than that, nothing had been ddr2 and ddr3.
Does the dual gpu greforce 9800gx2 fit on motherboard Asus p5ql-pro? I bought converted to a 53 mg file. Well, I did that to debrand the the processing away from the motherboard CPU. Thanks You are burning the MP3s CD's maxed out the remainder of my space.Any other information will thanks for any help Remove the keyboard.
Important because you're buying nvidia based card. is access music and videos off the office computer. It keeps on repeating moved, or installed, or unplugged.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827727.65/warc/CC-MAIN-20181216121406-20181216143406-00403.warc.gz
|
CC-MAIN-2018-51
| 5,346 | 19 |
http://forum.freeipodguide.com/32/t-54746.html
|
code
|
What does that mean? Anyone k-no?
it means that you neeed the x's and what not
this should help
just googld full headers and you should get some more hits
If you're using GMail click the little arrow next to Reply, then choose "Show Original".
Free site implement this so you can't just copy+paste from someone else's e-mail.
If you use AOL mail, under "Action" click "view message source"
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202188.9/warc/CC-MAIN-20190320004046-20190320030046-00498.warc.gz
|
CC-MAIN-2019-13
| 389 | 7 |
http://serverfault.com/questions/558112/dns-portability-with-regards-to-ldap-kerberos/558114
|
code
|
How portable is a DNS server when it comes to LDAP, especially Kerberos which I am using for authentication? Meaning, how much do I have to change to use the same LDAP server with 2 different DNS servers as long as they use the same names & IP addresses, etc.? Specifically, I am using an LDAP server on Fedora & the DNS servers on Ubuntu, latest stable versions for each.
Just make sure the same dns records exist (A, SRV if needed) and you'll be fine. A better option is to have one dns a slave of the other so you don't have to worry about the replication
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396875.58/warc/CC-MAIN-20160624154956-00193-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 558 | 2 |
http://kenglish.co/
|
code
|
I have 20 years experience working as a Software Engineer. I have worked with many of the top development agencies in the US. I can perform the web engineer, software engineer and backend developer role with equal professional fluency. You won't find many contractors who integrate with your team as fast and effectively as I do.
Agencies also often engage me to implement best practices, audit code and present technology options for their organization or their partners.
I contract directly for many North American corporations, associations and organizations in multiple industries. Companies have realized significant savings by engaging me directly to work with their team and deliver high caliber software.
My freelance network is also extensive, allowing me to source and manage experienced design, development, content and marketing resources to launch projects successfully.
Kevin helped us transform our site Raceplace.com by implementing key SEO changes. He collaborated closely with our designer to implement a new, responsive layout and implemented ElasticSearch. Kevin played a lead role integrating with other business partners, helping automate a large portion of our work. We’d gladly work with Kevin again and highly recommend him to anyone looking for a dedicated, top notch Full Stack developer.
Notable projects include developing a Fraud Management System and Player Support Tool for Riot Games, building multiple robust API for Janssen Healthcare Innovations, performing a massive data migration for AardvarkSafaris.com, creating home page of Appthority using LocomotiveCMS,. . . and more.
Though currently based in South Lake Tahoe, California, Kevin is a disciplined remote worker, capable of helping clients worldwide. Kevin was active in both SanDiego.js and SDRuby and presented at their meetups while he was located in San Diego.
Kevin earned his MS in Computer Science at University of Hawaii. While in Hawaii, Kevin also taught Ruby on Rails at The Pacific New Media Center.
US based with no outsourcing, you can work with a senior developer you can trust. Kevin is truly talented and delivers quality work.
Kevin understands the importance of communication in the development process, and has the testimonials to back it up.
Ready to start your next project with me? That’s great! Give me a call or send me an email and I will get back to you as soon as possible!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703527850.55/warc/CC-MAIN-20210121194330-20210121224330-00235.warc.gz
|
CC-MAIN-2021-04
| 2,399 | 11 |
https://ckan.americaview.org/dataset/open-source-workforce-development-training-courses
|
code
|
Open Source Workforce Development Training Courses
This course series was created by AmericaView and West Virginia View to support workforce development training at the United States Geological Survey (USGS). The first two courses introduce principles and key concepts in remote sensing and GIScience. They serve as background material for those not familiar with remote sensing and/or GIScience. There are no labs or assignments associated with these modules. The remaining modules cover working with and analyzing geospatial and remotely sensed data using open-source software tools including QGIS, R, and Python. The QGIS content also includes examples using GRASS, SAGA, and Orfeo Toolbox. The R and Python materials assume no prior knowledge of coding in the R or Python languages. The final three courses include lecture modules, assignments, and all required data. The materials presented here were augmented from materials made available on the West Virignia View website. If you would like to learn more or investigate other geospatial data science topics (digital cartography, web GIS, and geospatial deep learning), please check out this content.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816587.89/warc/CC-MAIN-20240413083102-20240413113102-00155.warc.gz
|
CC-MAIN-2024-18
| 1,157 | 2 |
http://www.machinegunboards.com/forums/index.php?s=28c0699f6330be04b2efc399b29a4128&showtopic=2883
|
code
|
Happy Birthday Tex
Posted 29 July 2004 - 08:50 AM
Posted 29 July 2004 - 03:31 PM
Wife is cooking my favorite Shrimp Etoufee, and sisterinlaw is fixing me a big 'ol coconut cake. MMMMmmmmmmm!!!!
Thompson dream finally did come through a few weeks back when I received the M1 Savage. Have run about 1500 rds through it without a single hiccup.
Yep, life is good!
Edited by Tex, 29 July 2004 - 03:32 PM.
Posted 29 July 2004 - 07:01 PM
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572192.79/warc/CC-MAIN-20220815145459-20220815175459-00470.warc.gz
|
CC-MAIN-2022-33
| 431 | 8 |
https://warpedvisions.org/the-facade-of-uptime
|
code
|
The facade of uptime
While writing a spec earlier today the last few years of progress in server land hit me: uptime is a facade.
In the early days, server resources were expensive and scarce. Uptime was sacred. Long running hardware was celebrated, UNIX tools were born, beer was consumed.
The problem of focusing on the hardware is that it detracts from the time you spend developing software. Remember those late nights configuring RAID setups? What about hunting down faster drives, or terminating SCSI cables?
With utility computing like Amazon Web Services, hardware no longer exists. Slices of computing are sold by the hour, by the byte, and by the feature. Provisioning is nearly instant, and can be controlled by API, from any machine connected to the net.
Machine uptime doesn't matter. It's been replaced by ubiquity.
It ends up that service uptime doesn't matter either. Instead of thinking about keeping continuous instances running, we need to focus on ways to make it easier to replace instances, and mechanisms for pooling service resources in ways that fail over gracefully.
As the cost of swapping servers approaches zero, it becomes the ultimate form of stability and parallelization.
While I was thinking about uptime tonight, an impending software update threatened the honour of my computer. My first reaction was to avoid running the updates: this machine was nearing 3 months between reboots.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337360.41/warc/CC-MAIN-20221002212623-20221003002623-00300.warc.gz
|
CC-MAIN-2022-40
| 1,417 | 9 |
https://forum.rebex.net/9832/getting-messages-exchange-have-processes-monitoring-inbox
|
code
|
The code you provided leads to System.InvalidOperationException: Not connected to the server.
The problem is that the list.Select(m => ...) is deferred execution, which means the lambda in Select() call is evaluated when the first used (lazy evaluation). Please read more at https://www.davidhaney.io/linq-and-deferred-execution/
To fix the problem, evaluate the expression before disconnecting the client, e.g. list.Select(m => ...).ToList()
I have also one suggestion:
Searching with ImapListFields.FullHeaders is really not necessary, since you immediately download the whole message.
Final solution can look like this. Change:
var list = imap.Search(ImapListFields.FullHeaders, ImapSearchParameter.Unread);
var result = list.Select(m => imap.GetMailMessage(m.SequenceNumber));
var list = imap.Search(ImapListFields.UniqueId, ImapSearchParameter.Unread);
var result = list.Select(m => imap.GetMailMessage(m.UniqueId)).ToList();
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00334.warc.gz
|
CC-MAIN-2023-23
| 930 | 10 |
http://ludumdare.com/compo/author/melior/
|
code
|
Wrote a blog post making excuses as to why I didn’t finish my Ludum Dare entry here:
“Turns out having a toddler and an infant to take care of is pretty time consuming.”
Maybe next time. Great job everybody!
Were I to submit an entry this weekend, it would be my first Ludum Dare. It would use most or all of the following tools:
pen and paper
possibly some procedural content as well
Having only written very small (no more than 500 LOC) tools in Python, I’m far more comfortable with C++, but I figure it’d be easier to avoid cross platform hassle this way as I’ll be developing on Arch and occasionally Ubuntu. Plus, with PyWeek 11 starting up this weekend as well, I figure I could jump straight into it from here.
P. S. Despite the awkward name, if you haven’t tried ZynSubAddFX, you’re missing out. If I have time to add more than sound effects, it’ll come from this. I doubt I’ll have time to add Hydrogen into the mix, or require the services of Audacity, but I list them just in case.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1413507444493.40/warc/CC-MAIN-20141017005724-00155-ip-10-16-133-185.ec2.internal.warc.gz
|
CC-MAIN-2014-42
| 1,013 | 8 |
https://www.linux.org/tags/package-management/
|
code
|
[[email protected] ~]$ sudo yum install --downloadonly --downloaddir=/home/chandu/dir1 httpd
Config error: Parsing file "/etc/dnf/dnf.conf" failed: Parsing file '/etc/dnf/dnf.conf' failed: IniParser: Missing '=' at line 7
I am getting this error while trying to download only apache web server...
I hope you can help me with this problem.
I got the following notification in the package manager on Ubuntu 20.04
Broken dependencies Package -> wine:i386 Installed Version -> 1:16.5-0ubuntu14 Description -> Microsoft Windows Compatibiliity Layer (meta-package)...
I was trying to instal Lutris. Since it i get the message, that Vulkan was missing i tried to install that to. After quick google i found out, that at least Nvidia driver 415.22 or newer was needed. Therefor i changed the driver from
X.Org-X-Server - Driver Nouveau from...
Hi I'm following a tutorial on how to install sapi5 for linux. It is 6 month old with apt (probably Ubuntu) so I do not think it is outdated and I think it would be applicable to my distro since it is based on Ubuntu 18.04.
I added the ppa...
I want to know how does the RedHat/Centos and Ubuntu systems manage their packages updates?
Does RedHat/Centos update only from their local repositories? (using yum update)
Do we have to first, download the repositories from the internet, then yum update?
Of source, it's possible to...
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103639050.36/warc/CC-MAIN-20220629115352-20220629145352-00347.warc.gz
|
CC-MAIN-2022-27
| 1,365 | 14 |
https://bretpetersen.com/first-development-portfolio/
|
code
|
This is my first development portfolio. I made this shortly after graduating from the Full-Stack Web Development program I completed in December 2020.
Code technologies I got involved with while working on this project.
- This project is online at:
- This project is also available on github at:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00367.warc.gz
|
CC-MAIN-2023-50
| 295 | 4 |
https://marketplace.eclipse.org/marketplace-client-intro?mpc_install=4037898
|
code
|
Please be aware that some listings have been temporarily delisted from our marketplace in order to improve the security of the platform. We apologize for any inconvenience this may caused.
For more information on this matter, please visit #1.
If you are a listing owner and would like to have your listing(s) reinstated, please open a ticket at https://gitlab.eclipse.org/eclipsefdn/it/websites/marketplace.eclipse.org/-/issues.
Thank you for your understanding and cooperation.
Introducing the Eclipse Marketplace Client
You may have tried to install Heirloom® SDK by clicking the Install button
To install this solution to your Eclipse installation, ensure that:
- Eclipse is launched and that you click and hold the mouse button while dragging the Install button icon over the Eclipse workspace and then drop it, by releasing the mouse button, onto an open Workspace
- You have the Eclipse Marketplace Client (mpc). This will appear in the Help menu as 'Eclipse Marketplace...', and is included with all of the packages available from the Eclipse download page (except Classic Package).
What is the Eclipse Marketplace Client
Eclipse Marketplace Client (MPC) is a rich client interface for browsing and installing the Eclipse based solutions listed on the Eclipse Marketplace portal. It is a new feature that allows Eclipse users to discover and install Eclipse solutions directly into their Eclipse installation.
Where can I get the Eclipse Marketplace Client
MPC is included in all of the packages available from the Eclipse download page.
How do I access the Eclipse Marketplace Client
You can start MPC by launching Eclipse and accessing it from the Help menu.
Once launched the Marketplace Client presents a wizard that looks like this:
Drag and Drop InstallYou can use the Drag and Drop install feature by dragging the button to your running Eclipse workspace.
Eclipse Marketplace and Favourites Lists Video
Eclipse Marketplace Client New + Noteworthy
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296944996.49/warc/CC-MAIN-20230323034459-20230323064459-00200.warc.gz
|
CC-MAIN-2023-14
| 1,961 | 19 |
https://wallpapersite.com/en/knowledge-base/75030/get-text-font-from-an-image-using-gimp
|
code
|
Get text font from an image using GIMP
I have an image which contains a text. I don't know the text font. Is there any way to find the text font from an image using GIMP?
I need to know what font is used in this text image.
Unless you have the original Gimp file with the text still as a text layer, no you can't. Identifying a font from a raster image is complex and well beyond the scope of Gimp's feature set.
There are online services that can help with font identification from an image, such as What The Font.
You can also ask here on GD.SE, but make sure you ask a good question, providing the research you've done.
Edit: Check the font identification question requirements before asking a font identification question.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662530553.34/warc/CC-MAIN-20220519235259-20220520025259-00574.warc.gz
|
CC-MAIN-2022-21
| 726 | 7 |
https://community.filemaker.com/thread/87517
|
code
|
Adding multiple students to a teacher
after much searching on the forums and youtube, i cant completely understand how to do this task still. In the filemaker templates i found a "Add Contacts" button that runs the script "Add contacts as reicipants" (in the Email Campaign Managment template)
I dont fully understand the script and need help in fully understanding it to use in my database to track students, mentors, and sessions...
Currently i have 5 tables, those tables are:
students, mentors, sessions, mentor_student, session_student
The student, mentor, and session tables are holding uniquie values of students and mentors. Each student and mentor(teacher) can have multiple sessions, also a mentor can have multiple students, but only one student can be assigned to a mentor.
I would like any pointers on using this "Add Contacts" script so i'll be able to add multiple student to a mentor list over IWP.
so my contraints are:
all student, mentors, and sessions are unique
each mentor can have multiple students that are unique
one student can have many sessions (with any mentor)
adding many students in one session(i.e. if a lesson is taught to a class of students, the information needs to be tracked)
must be compatible over IWP to validate students and mentors unquieness
i'd really appreatiate any and all help on this database especially understanding the "Add Contacts" script...
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891377.59/warc/CC-MAIN-20180122133636-20180122153636-00736.warc.gz
|
CC-MAIN-2018-05
| 1,397 | 14 |
http://www.sco.com/developers/java/unix_javaxcomm/javax.comm-ReleaseNotes.html
|
code
|
JavaTM Communications API Implementation
for SCO® UNIX® Operating Systems,
These are the Release Notes for an implementation of the JavaTM Communications API (also known as javax.comm) for SCO® UNIX® Operating Systems. This API allows Java applications to communicate with serial and parallel devices.
The Java Communications API is described at http://java.sun.com/products/javacomm/.
This implementation is available for the following SCO UNIX operating systems:
A prerequisite is that Java 2 Standard Edition v. 1.3 or greater for SCO UNIX Operating Systems must already have been installed. This requirement may be met by any of the following Java for SCO UNIX releases:
This implementation is a port of the open source RXTX implementation of the Java Communications API. Information about RXTX may be found at http://www.rxtx.org. This port has been done off of RXTX version 1.4-8.
RXTX includes part of the Sun MicrosystemsTM
Java Communications API implementation
for Solaris/x86, version 2.0. This part (the
in this distribution; you do not need to download it from the
SunTM web page.
To install this beta implementation, place the
package file somewhere. Go there, become root, and then do:
# pkgadd -d 'pwd`/javaxcomm.ds
This will install package javaxcomm, which places the following substantive files into the J2SE for SCO UNIX directory structure:
/usr/java/jre/lib/ext/comm.jar /usr/java/jre/lib/ext/jcl.jar /usr/java/jre/lib/ext/gnu.io.rxtx.properties /usr/java/jre/lib/x86at/libSerial.so /usr/java/jre/lib/x86at/libParallel.so /usr/java/jre/lib/javax.comm.properties /usr/java/javax.comm-ReleaseNotes.html /usr/java/javax.comm-ReleaseNotes.txt
This also places a couple of license files in
and a number of demonstration and example files under
The installed binaries of the Java Communications API package are used for all SCO UNIX platforms. (On SCO OpenServer, the native code libraries are executed via the OSRcompat binary compatibility module, just as the native code layers of J2SE are.)
Note that if you install a new version of J2SE for SCO UNIX
(for example, if you go from J2SE 1.3.1 to J2SE 1.4.2),
you will have to re-install the
This is because the previously installed
actually reside within (for example)
/usr/java having been a symbolic link to that),
and thus are not visible to the new J2SE within
/usr/java now being a symbolic link to this).
javaxcomm package first; just
it a second time, and then it will be available for use with
both J2SE 1.3.1 and J2SE 1.4.2 for SCO UNIX.
To use this implementation of Java Communications API, just compile and
run Java as you normally would. Because the above files are installed
into the standard extension space of J2SE for SCO UNIX,
there is no need to set
variables in order to access the Java Communications API.
A simple test of the serial I/O part of this implementation can be done as follows. Set up a null modem RS-232 cable between two machines. Become root. Run the open source minicom tool on each machine and verify that the connection is working, by typing characters back and forth between the two machines.
(Binary versions of minicom
are installed into
Note that you need to first do
minicom -s to tell it about the names and speeds of your
When you then run
ctrl-A E and
ctrl-A A commands to
turn on local echo and linefeed add.
http://minicom.alioth.debian.org/ for more information on minicom.)
Once working serial communication has been verified, shut down minicom
on the machine that Java Communications API is installed on.
Then access the Sun SerialDemo demo program, which installed at
Change into that
SerialDemo directory, and run
# /usr/java/bin/java SerialDemo
This should bring up a GUI. Change the serial device port name and speed in the GUI if necessary, then click "Open Port". Type into the top pane and text should appear in the minicom window on the other machine. Type into the minicom window on the other machine and text should appear in the middle pane of the SerialDemo GUI. Click "Close Port" to finish.
If you do not have access to a graphical environment, you can run
the even simpler Sun demo programs installed at
/usr/java/demo/comm/Simple/, which work at the command-line
Additional sample programs using the Java Communications API are available as part of the Sun Solaris/x86 implementation and can be downloaded from http://java.sun.com/products/javacomm/.
A simple test of parallel I/O part of this implementation can be done as follows. Connect a parallel printer and define it to the system in the usual fashion as a local printer. Then obtain the Sun ParallelBlackBox demo program, which is available from Sun as one of the sample programs just mentioned above. Run it as
# /usr/java/bin/java ParallelBlackBox
This should bring up a GUI, and it will usually find the correct parallel port. Type into the top pane and text will start printing out at the printer. You may need to eject the page yourself depending upon the printer.
On SCO OpenServer, there are several kinds of serial ports.
supports both modem control (e.g.
/dev/tta1A) and standard
/dev/tty1a) operations on serial ports,
as well as use of USB-serial ports
On all SCO UNIX platforms, certain serial ports are predefined and are known to the implementation. These are:
These ports are scanned when javax.comm is started up, and those
that represent working serial ports on the system will be
included in the list returned by the
This predefined list may be overridden by specifying the property
Set the property to a colon-separated list of ports that should
be scanned for inclusion. This may be done via the command
line when Java is invoked:
To do it on a more global basis, modify the file# /usr/java/bin/java -Dgnu.io.rxtx.SerialPorts=/dev/ttya01a:/dev/ttya02a SerialDemo
/usr/java/jre/lib/ext/gnu.io.rxtx.properties, and uncomment and change the definition of the property there.
Note that the
gnu.io.rxtx.SerialPorts property, if used,
replaces the predefined list of ports; it does not augment it.
Thus, if your system has four serial ports on the predefined list
and four extra ones not on the list, you need to name all eight when
specifying the property.
During the scanning of ports, this implementation will put out trace messages to the standard output indicating its progress. These will help you troubleshoot any difficulties in this area.
This implementation uses the standard UNIX "lock file" protocols to protect
serial ports from concurrent access. This means that javax.comm will
not be able to access the port if it is already locked by another
serial application (whether javax.comm, a non-Java application such
as minicom, or a system command such as
cu), and vice versa.
In particular, on
SCO OpenServer, the lock files are of the form
/usr/spool/uucp/LCK..tty?a, where the
device name portion is folded to lowercase.
On UnixWare 7 the lock files are of the form
/var/spool/locks/LK.x.y.z, where x, y, and z are the major device
number of the device directory, the major device number of the device,
and the minor device number of the device.
For all operating systems, the lock file is created to hold the
process-id, application name (javax.comm), and username.
On all SCO UNIX platforms, certain parallel ports are also predefined and are known to the implementation. These are:
This predefined list may be overridden by specifying the property
gnu.io.rxtx.ParallelPorts, similarly to the serial case
PortInUseExceptionexception object. If you call the
getMessagemethod for that object, you will get a message containing the phrase "Port currently owned by unknown Solaris Application". (This message comes out of the Sun
comm.jarbinary implementation code and by license cannot be modified by SCO.) You may want to intercept this message in your application and change the text; see for example the change made to
SerialConnection.javain the installed SerialDemo application.
java -Xts10 ...).
ParallelPortclass that are not supported in this implementation. These are:
getOutputBufferFree isPaperOut isPrinterBusy isPrinterError isPrinterSelected isPrinterTimedOut notifyOnBuffer notifyOnError restart suspend setInputBufferSize getInputBufferSize setOutputBufferSize getOutputBufferSize. In addition sending events based on the parallel port device status is not implemented yet. For all of these methods, a dummy version is in place which will issue a diagnostic to the terminal when they are called (for some frequently-called methods, this message will only appear once) and then execution will proceed. The dummy
is*methods will return false, and the
get*methods will return a low value such as zero or one.
The license for the part of the Sun Microsystems Java Communications API implementation for Solaris/x86, version 2.0 used in this implementation is available here. It provides for binary redistribution of the implementation; no source is provided by Sun or SCO.
The license for the open source RXTX project that is used as the base
for this implementation is the
GNU Library General Public License (LGPL), available
Source for the version of RXTX used and for the modifications that
SCO made to it is not included in the
but is available from the SCO ftp site at
The RXTX source base has advanced beyond the 1.4-8 version that this product is derived from. The SCO UNIX-specific changes there were made for this product have been given back to the RXTX project and have been incorporated into the more recent source versions. However at this time none of those more recent versions is operational on SCO UNIX platforms.
Copyright © 2004 The SCO Group, Inc. All Rights Reserved.
SCO, SCO OpenServer, and UnixWare are trademarks or registered trademarks of The SCO Group, Inc. in the U.S.A. and other countries.
Sun, Sun Microsystems, and Java are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries, and are used under license. UNIX is a registered trademark of The Open Group in the United States and other countries.
The SCO Group, Inc. reserves the right to change or modify any of the product or service specifications or features described herein without notice. This document is for information only. No express or implied representations or warranties are made in this document.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512411.13/warc/CC-MAIN-20181019145850-20181019171350-00382.warc.gz
|
CC-MAIN-2018-43
| 10,283 | 122 |
https://westernkentuckyvsfloridaintllive.us/kimepivuguwij.php
|
code
|
to discover how cannabinoids can help and heal. CBD is non-psychoactive which means that it will not get the user high. . (can· na·bi·di·ol) Cannabidiol (CBD) is the 2nd most prevalent cannabinoids found in. A box or can of thin metal or plastic used for holding dry cooking ingredients, can·na·bi·di·ol A chemical constituent of cancan·na·bin nabis, C21 -1 + -OL1.
Cannabinoids are chemical compounds that naturally occur in the resin of the Cannabis sativa plant, commonly called A large part of alternative medicine revolves around using the entire plant for medicinal Diana Myers January 20, Can you recommend or educate me as to what to buy? Hernandez January 15, Robert Lynch January 2, Maria January 1, I tried CBd oil and the rub I have fibromyalgia arthris and my joints are bad and I have not found any relief.
Terry December 23, I was in a car accident and have had many back surgeries and nerves cut in my leg. As a result I have a lot of pain. I also have arthritis. Debra December 20, Sandra December 5, I am trying to recover from 2 ankle surgeries. I am in quite a bit of pain. What kind of oil do you recommend? Cynthia December 4, Great breakdown of the differences between these two cannabinoids, thanks for the good info!
Alice October 18, From the welcome screen, select Get Data. Or on the Home tab, select Get Data. Selecione a fonte de dados, neste exemplo, Analysis Services. Select your data source -- in this example, Analysis Services. Preencha Servidor e, opcionalmente, Banco de dados. Fill in Server , and optionally, Database. Choose the report server where you'll save your reports. Here's the fun part: You get to create visuals that illustrate your data. For example, you could create a funnel chart of customers and group values by yearly income.
Read much more about designing a Power BI report. If the directional override status is right-to-left, then characters become R. If the directional override status is left-to-right, then characters become L. A PDI terminates the scope of the isolate initiator it matches. It also terminates the scopes of all embedding initiators within the scope of the matched isolate initiator for which a matching PDF has not been encountered.
If it does not match any isolate initiator, it is ignored. Note that the level assigned to an isolate initiator is always the same as that assigned to the matching PDI. A PDF terminates the scope of the embedding initiator it matches. If it does not match any embedding initiator, it is ignored. All explicit directional embeddings, overrides and isolates are completely terminated at the end of each paragraph. The explicit embedding levels that have been assigned to the characters by the preceding rules will soon be further adjusted on the basis of the characters' implicit bidirectional types.
The adjustment made for a given character will then depend on the characters around it. However, this dependency is limited by logically dividing the paragraph into sub-units, and doing the subsequent implicit processing on each unit independently.
Note that an implementation does not have to actually remove the characters; it just has to behave as though the characters were not present for the remainder of the algorithm. Conformance does not require any particular placement of these characters as long as all other characters are ordered correctly. See Section 5, Implementation Notes , for information on implementing the algorithm without removing the formatting characters.
Here are some examples, each of which is assumed to be a paragraph with base level 0 where no character sequence text i contains explicit directional formatting characters or paragraph separators. The dots in the examples are intended to separate elements for visual clarity; they are not part of the text. Weak types are now resolved one isolating run sequence at a time. At isolating run sequence boundaries where the type of the character on the other side of the boundary is required, the type assigned to sos or eos is used.
Examine each nonspacing mark NSM in the isolating run sequence, and change the type of the NSM to Other Neutral if the previous character is an isolate initiator or PDI, and to the type of the previous character otherwise.
If the NSM is at the start of the isolating run sequence, it will get the type of sos. Note that in an isolating run sequence, an isolate initiator followed by an NSM or any type other than PDI must be an overflow isolate initiator. The text is next parsed for numbers. The text to be scanned may have already had its type altered by directional overrides.
If so, then it will not parse as numeric. Search backward from each instance of a European number until the first strong type R, L, AL, or sos is found.
If an AL is found, change the type of the European number to Arabic number. A single European separator between two European numbers changes to a European number. A single common separator between two numbers of the same type changes to that type.
A sequence of European terminators adjacent to European numbers changes to all European numbers. Otherwise, separators and terminators change to Other Neutral. Search backward from each instance of a European number until the first strong type R, L, or sos is found. In the next phase, neutral and isolate formatting i. NI characters are resolved one isolating run sequence at a time. Its results are that all NIs become either R or L. Generally, NIs take on the direction of the surrounding text.
In case of a conflict, they take on the embedding direction. Bracket pairs within an isolating run sequence are processed as units so that both the opening and the closing paired bracket in a pair resolve to the same direction.
Note that this rule is applied based on the current bidirectional character type of each paired bracket and not the original type, as this could have changed under X6. The current bidirectional character type may also have changed under a previous iteration of the for loop in N0 in the case of nested bracket pairs.
Process bracket pairs in an isolating run sequence sequentially in the logical order of the text positions of the opening paired brackets using the logic given below. Bracket pairs are resolved sequentially in logical order of the opening paired brackets. Bracket pairs enclosing strong types opposite the embedding direction with additional strong-type context take the direction opposite the embedding direction. A sequence of NIs takes the direction of the surrounding strong text if the text on both sides has the same direction.
European and Arabic numbers act as if they were R in terms of their influence on NIs. The start-of-sequence sos and end-of-sequence eos types are used at isolating run sequence boundaries. Any remaining NIs take the embedding direction. The embedding direction for the given NI character is derived from its embedding level: L if the character is set to an even level, and R if the level is odd. Assume in the following example that eos is L and sos is R.
Then an application of N1 and N2 yields the following:. The commas are not considered part of the number because they are not surrounded on both sides by digits see Section 3. However, if there is a preceding left-to-right sequence, then European numbers will adopt that direction:. In the final phase, the embedding level of text may be increased, based on the resolved character type.
Right-to-left text will always end up with an odd level, and left-to-right and numeric text will always end up with an even level. In addition, numeric text will always end up with a higher level than the paragraph level. This results in the following rules:. For all characters with an even left-to-right embedding level, those of type R go up one level and those of type AN or EN go up two levels.
For all characters with an odd right-to-left embedding level, those of type L, EN or AN go up one level. The following rules describe the logical process of finding the correct display order. As opposed to resolution phases, these rules act on a per-line basis and are applied after any line wrapping is applied to the paragraph. On each line, reset the embedding level of the following characters to the paragraph embedding level: In combination with the following rule, this means that trailing whitespace will appear at the visual end of the line in the paragraph direction.
Tabulation will always have a consistent direction within a paragraph. From the highest level found in the text to the lowest odd level on each line, including intermediate levels not actually present in the text, reverse any contiguous sequence of characters that are at that level or higher. The following examples illustrate the reordering, showing the successive steps in application of Rule L2.
The original text is shown in the "Storage" row in the example tables. The application of the rules from Section 3. Since these examples only make use of the isolate formatting characters, Rule X9 does not remove any characters.
Note that Example 3 would not work if it used embeddings instead because the two right-to-left phrases would have merged into a single right-to-left run, together with the neutral punctuation in between.
Each successive row thereafter shows one pass of reversal from Rule L2 , such as "Reverse levels ". At each iteration, the underlining shows the text that has been reversed. The paragraph embedding level for the first, second, and third examples is 0 left-to-right direction , and for the fourth example is 1 right-to-left direction.
Combining marks applied to a right-to-left base character will at this point precede their base character. If the rendering engine expects them to follow the base characters in the final display process, then the ordering of the marks and the base character must be reversed. Many font designers provide default metrics for combining marks that support rendering by simple overhang. Because of the reordering for right-to-left characters, it is common practice to make the glyphs for most combining characters overhang to the left thus assuming the characters will be applied to left-to-right base characters and make the glyphs for combining characters in right-to-left scripts overhang to the right thus assuming that the characters will be applied to right-to-left base characters.
Cursively connected scripts, such as Arabic or Syriac, require the selection of positional character shapes that depend on adjacent characters see Section 9. Shaping is logically applied after Rule I2 of the Bidirectional Algorithm and is limited to characters within the same level run. Note that there is no practical difference between limiting shaping to a level run and an isolating run sequence because the isolate initiator and PDI characters are defined to have joining type U, i.
Thus, the characters before and after a directional isolate will not join across the isolate, even if the isolate is empty or overflows the depth limit. Consider the following example string of Arabic characters, which is represented in memory as characters 1, 2, 3, and 4, and where the first two characters are overridden to be LTR.
To show both paragraph directions, the next two are embedded, but with the normal RTL direction. The bold text would be for the right-to-left paragraph direction. The process of breaking a paragraph into one or more lines that fit within particular bounds is outside the scope of the Bidirectional Algorithm. Where character shaping is involved, the width calculations must be based on the shaped glyphs.
Note that the soft-hyphen SHY works in cursively connected scripts as it does in other scripts. That is, it indicates a point where the line could be broken in the middle of a word. If the rendering system breaks at that point, the display—including shaping—should be what is appropriate for the given language. The Bidirectional Algorithm specifies part of the intrinsic semantics of right-to-left characters and is thus required for conformance to the Unicode Standard where any such characters are displayed.
In the absence of a permissible higher-level protocol, a process that renders text shall display all visible representations of characters excluding formatting characters in the order described by Section 3, Basic Display Algorithm , of this annex.
As is the case for all other Unicode algorithms, this is a logical description—particular implementations can have more efficient mechanisms as long as they produce the same results. See C18 in Chapter 3, Conformance of [ Unicode ], and the notes following. The only permissible higher-level protocols are those listed in Section 4. Use of higher-level protocols is discouraged, because it introduces interchange problems and can lead to security problems.
The goal in marking a formatting or control character as BN is that it have no effect on the rest of the algorithm. Because conformance does not require the precise ordering of formatting characters with respect to others, implementations can handle them in different ways as long as they preserve the ordering of the other characters.
As with any Unicode characters, systems do not have to support any particular explicit directional formatting character although it is not generally useful to include a terminating character without including the initiator. Generally, conforming systems will fall into four classes:. The following clauses are the only permissible ways for systems to apply higher-level protocols to the ordering of bidirectional text. Some of the clauses apply to segments of structured text.
This refers to the situation where text is interpreted as being structured, whether with explicit markup such as XML or HTML, or internally structured such as in a word processor or spreadsheet.
In such a case, a segment is span of text that is distinguished in some way by the structure. Override P3 , and set the paragraph embedding level explicitly. This does not apply when deciding how to treat FSI in rule X5c. A higher-level protocol may set any paragraph level. This can be done on the basis of the context, such as on a table cell, paragraph, document, or system level.
P2 may be skipped if P3 is overridden. Note that this does not allow a higher-level protocol to override the limit specified in BD2. A higher-level protocol may use an entirely different algorithm that heuristically auto-detects the paragraph embedding level based on the paragraph text and its context. As another example, when the paragraph contains no strong characters, its direction could be determined by the levels of the paragraphs before and after.
For example, style sheet or markup information can be used within a span of text to override the setting of EN text to be always be AN, or vice versa. Emulate explicit directional formatting characters.
A higher-level protocol can impose a directional embedding, isolate or override on a segment of structured text. The behavior must always be defined by reference to what would happen if the equivalent explicit directional formatting characters as defined in the algorithm were inserted into the text. For example, a style sheet or markup can modify the embedding level on a span of text.
Apply the Bidirectional Algorithm to segments. The Bidirectional Algorithm can be applied independently to one or more segments of structured text. For example, when displaying a document consisting of textual data and visible markup in an editor, a higher-level process can handle syntactic elements in the markup separately from the textual data.
This allows a piece of text that is extracted from a longer sequence of text to behave as it did in the larger context. Such contexts include, but are not limited to, historic scripts and associated punctuation, private-use characters, and characters in mathematical expressions.
See Section 7, Mirroring. These characters are those that fit at least one of the following conditions: They are provided here explicitly because they directly correspond to common operations. This is a simplified example for illustration: To make the XML file readable as source text, the display in an editor could order these elements all in a uniform direction for example, all left-to-right and apply the Bidirectional Algorithm to each field separately.
It could also choose to order the element names, attribute names, and attribute values uniformly in the same direction for example, all left-to-right.
Tips and Tricks for Power BI Map visualizations
A word history: The simple noun candy does not occur in English until the 18th the genus Canna, with broad leaves and yellow or red flowers. can-na-bi-di-ol. The wax myrtle or its fruit. can-die-fish (kan'dl-fish'J «., pi candlefish or . with broad leaves and yellow or red flowers. can-na-bi-di*ol (kan'a-bi-di'ol', -6\') n. can·na·bi·di·ol to get Olivia on to a trial using medical cannabis oil or cannabidiol to see if it can control her seizures. Cannabis oil 'could cure my sick tot'.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578605510.53/warc/CC-MAIN-20190423134850-20190423160850-00248.warc.gz
|
CC-MAIN-2019-18
| 17,043 | 45 |
https://www.gog.com/forum/unreal_series/unreal_tournament_2014_is_freezing
|
code
|
You didn't specify your version of Windows, so I'll just suggest / ask a few things that come to mind.
This usually happens due to overheating or a faulty cpu or video card.
Did you overclock your system?
Does lowering the resolution and detail levels affect it at all?
If that's not the issue, there may be another program running that's causing a conflict.
You can also try running UT2004 in safe-mode. Create a shortcut and add -safe as a command line parameter.
As a last resort, reinstalling the game might work.
It was indeed due to bad overclock, as I got a new GTX 970 today and trying to find the maximum overclock. I tuned down the voltage and now it works fine. Anyway to lock the framerate to 60fps?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.91/warc/CC-MAIN-20211020055136-20211020085136-00299.warc.gz
|
CC-MAIN-2021-43
| 711 | 8 |
https://community.blackdesertonline.com/index.php?threads/crash-while-viewing-warrior-skills.516305/
|
code
|
Hi, While viewing skills for the warrior class, my client will crash. I can't attribute it to viewing one particular skill, or if its time based, but easily repeated. This only happens on the warrior, no other classes. No error code after the crash, its straight to the desktop. Thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655906214.53/warc/CC-MAIN-20200710050953-20200710080953-00509.warc.gz
|
CC-MAIN-2020-29
| 286 | 1 |
http://web2.sys-con.com/node/2503922
|
code
|
|By Business Wire||
|January 8, 2013 07:01 AM EST||
Demandware®, Inc. (NYSE: DWRE), a leader in on-demand ecommerce, and the Terry J. Lundgren Center for Retailing at the University of Arizona today released the results from a new survey of 7,000 consumers across the US, UK, France and Germany that uncovers an emerging and valuable consumer segment. Research shows that this segment, coined Digital Divas, are digitally engaged and fashionable consumers that leverage an average of 3.7 technologies while shopping (versus an average of less than one technology by non-divas). While they comprise only 22 percent of fashion buyers, Digital Divas represent 69 percent of all fashion spending.
Infographic revealing results from a survey of 7,000 consumers across the US, UK, France and Germany that uncovers an emerging and valuable consumer segment - The Digital Divas. Who are they and why should retailers care? (Photo: Business Wire)
The research shows that Digital Divas – split almost evenly between 53 percent women and 47 percent men – are five times more likely than non-divas to influence their social networks by sharing, informing, educating, and advising. They command significant influenced spend (40 percent) beyond their direct spend (29 percent) and have become the epicenter of brand success. Analysis also revealed that Digital Divas are:
- Omni-Channel: They visit an average of 3.4 destinations during their journey, primarily shopping at physical retail stores (70%) and retailer websites (51%).
- Mobile: They are twice as likely to use mobile devices while shopping in stores than non-divas – giving them both access and inclinations to not only communicate, but also shop on the move.
- Informed: They are information omnivores, seeking out and devouring content from an average of 3.5 sources before purchase.
“It’s clear from our research that while Digital Divas are a small group of consumers, they have significant purchasing power and are extremely influential within their social networks – both online and in person,” said Dr. Anita Bhappu, PetSmart Professor of Retailing & Consumer Sciences at the University of Arizona. “They are both sophisticated and vocal shoppers, so it’s important that retailers attend to them.”
“Retailers can’t ignore exponential value that Digital Divas represent,” said Rob Garf, Vice President of Product and Solutions Marketing at Demandware. “To address their needs, it is imperative that retailers establish a digital backbone to enable seamless and consistent experiences for these digitally savvy consumers.”
- Download the Report: To learn more about these Digital Divas and what retailers need to do to serve this new customer segment, download the full report, “Who Are Digital Divas and Why Should Retailers Care?”
- Register for the Webinar: Join Anita Bhappu, Ph.D., The University of Arizona, and Rob Garf, Vice President of Product and Solutions Marketing, Demandware, for a live webinar on Tuesday, February 19th at 1:00 p.m. EST.
- Attend the Conference: The Global Retailing Conference 2013 of the University of Arizona's Terry J. Lundgren Center for Retailing. April 11-12, Loews Ventana Canyon, Tucson, AZ
- View and Share the Infographic: Who are Digital Divas and Why Do They Matter?
The University of Arizona and Demandware partnered to better understand fashion consumers in the changing face of retail. Survey data was collected from representative online panels in the US, UK, France and Germany during the fall of 2012. Qualified respondents were primary household shoppers of fashion products (apparel, footwear, and accessories) ages 18 years or older who had made a fashion purchase in the past three months. The survey sample included a total of 7413 respondents, 3506 in the US, 1433 in the UK, 1380 in Germany, and 1094 in France.
About the Terry J. Lundgren Center for Retailing
The Terry J. Lundgren Center for Retailing is part of the University of Arizona's John and Doris Norton School of Family and Consumer Sciences. It brings together the resources and expertise of academia and the retail industry, with a shared goal of developing strong future retail professionals. It is considered one of the top retail business programs in the country. About 500 students currently are enrolled in classes and degree programs.
Demandware (NYSE: DWRE) is a leading provider of software-as-a-service (SaaS) ecommerce solutions that enable companies to easily design, implement and manage their own customized ecommerce sites, including websites, mobile applications and other digital storefronts. Customers use our highly scalable and integrated Demandware Commerce platform to more easily launch and manage multiple ecommerce sites, initiate marketing campaigns more quickly, and improve ecommerce traffic. For more information about Demandware, visit www.demandware.com, call 1-888-553-9216 or email [email protected].
Connect With Us:
Demandware is a registered trademark of Demandware, Inc.
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profession...
Jun. 30, 2016 09:33 AM EDT
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Jun. 30, 2016 09:02 AM EDT Reads: 120
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Jun. 30, 2016 09:00 AM EDT Reads: 417
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2016' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited t...
Jun. 30, 2016 09:00 AM EDT Reads: 341
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
Jun. 30, 2016 08:45 AM EDT Reads: 557
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Jun. 30, 2016 08:00 AM EDT Reads: 545
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Jun. 30, 2016 07:00 AM EDT Reads: 436
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jun. 29, 2016 05:30 PM EDT Reads: 1,062
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Jun. 29, 2016 04:15 PM EDT Reads: 508
"We work in the area of Big Data analytics and Big Data analytics is a very crowded space - you have Hadoop, ETL, warehousing, visualization and there's a lot of effort trying to get these tools to talk to each other," explained Mukund Deshpande, head of the Analytics practice at Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jun. 29, 2016 04:15 PM EDT Reads: 479
The idea of comparing data in motion (at the sensor level) to data at rest (in a Big Data server warehouse) with predictive analytics in the cloud is very appealing to the industrial IoT sector. The problem Big Data vendors have, however, is access to that data in motion at the sensor location. In his session at @ThingsExpo, Scott Allen, CMO of FreeWave, discussed how as IoT is increasingly adopted by industrial markets, there is going to be an increased demand for sensor data from the outermos...
Jun. 29, 2016 04:00 PM EDT Reads: 422
UAS, drones or unmanned aircraft, no matter what you call them — this was their week. Our news stream was flooded with updates on the newly announced rules and regulations for commercial UAS from the FAA. So, naturally we have dedicated this week’s top news round up to highlight some of our favorite UAS stories.
Jun. 29, 2016 03:02 PM EDT Reads: 325
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
Jun. 29, 2016 02:00 PM EDT Reads: 443
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Jun. 29, 2016 02:00 PM EDT Reads: 689
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...
Jun. 29, 2016 12:30 PM EDT Reads: 581
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
Jun. 29, 2016 11:00 AM EDT Reads: 614
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Jun. 29, 2016 11:00 AM EDT Reads: 527
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
Jun. 29, 2016 10:45 AM EDT Reads: 581
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jun. 29, 2016 10:30 AM EDT Reads: 532
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Jun. 29, 2016 10:00 AM EDT Reads: 1,314
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398869.97/warc/CC-MAIN-20160624154958-00161-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 15,050 | 60 |
https://www.journeyguy.com/encourage-your-christian-leader/
|
code
|
Just came across this article today while searching the web for some sermon background and thought I would post a link to it. It’s from John Mark Ministries. I know nothing about them, but the little I perused while on the site seemed good.
But this article on encouraging your pastor was particularly good, or at least it resonated with me….
check it out here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400212039.16/warc/CC-MAIN-20200923175652-20200923205652-00418.warc.gz
|
CC-MAIN-2020-40
| 365 | 3 |
https://jjthetutor.com/basics-of-integration-for-physics/
|
code
|
“How to read a Polar Pattern Diagram” is a lecture video from the textbook Basic Audio Recording Techniques, taught by Mike Julian at Los Angeles Valley College. Get your copy now at http://www.thequimbyhouse.com/TQH-Bookstore.htm
Thanks to all of you who support me on Patreon. You da real mvps! $1 per month helps!! 🙂 https://www.patreon.com/patrickjmt !! The Definite Integral – Understanding the Definition. In this video, I discuss the definition only; I do not calculate any definite integrals.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986672548.33/warc/CC-MAIN-20191017022259-20191017045759-00442.warc.gz
|
CC-MAIN-2019-43
| 509 | 2 |
https://support.telosalliance.com/article/jvotoie766-external-preview-the-basics
|
code
|
External Preview: The Basics
This document explains a little more about the function of the "External Preview" input found within the show profile of Axia consoles, along with its purpose, how to set it up, and how to trigger it.
What are we talking about?
Have you ever seen the "External Preview" input on a show profile, put a source in it, but nothing happened?
External Preview is not simply an extra input into the Preview bus: it is an extra input that must be triggered by a GPI closure to work.
Why use External Preview?
Oftentimes it is helpful to have a talkback between studios (console to console) or a way to listen to a triggered audio source (i.e.: a preview bus from an automation system, external talkback that triggers from a button). The External Preview function on Axia consoles can be used for this (and other purposes).
There are several ways to implement and utilize this function (i.e.: direct engagement from an automation system, intercom button to studio headphones, studio-to-studio talkback). This document will not cover all use-cases, rather it will describe the function and requirements of setting External Preview in Element and iQ consoles, giving you enough information to utilize it in your specific situation.
Below are a few step-by-step guides and related documents for specific use-cases utilizing External Preview, as well reference:
How does it work?
External Preview is a way to route an audio source into the Axia console's Preview bus when the respective control room logic channel is triggered by a GPI closure on pin 3 (i.e.: a button being pushed down).
To do this, we'll need (1) to create a source profile on a console with the audio we want to send (i.e.: a talkback mic), (2) to set the "External Preview" on a Show Profile to use this source profile, and (3) to use some external device (i.e.: a button, Pathfinder, automation system) to trigger pin 3 of the control room logic channel.
- Start by identifying the Livewire source you want to use (i.e.: a microphone, audio feed, etc.) and create a source profile. Below, we're creating "Line" source profile in an Element from channel 1234:
- Next, we'll need to put it into a show profile. Below are examples from both the Element and QOR web interfaces. Note that this is a per show setting and must be done for every show profile you want to use it on.
Setting the External Preview source on an Element:
Setting the External Preview source on an iQ/QOR:
- Note the CR Monitor Logic Channel for the show profile. You will need to send a virtual GPO command to this channel to trigger the External Preview to send its audio to the Preview bus:
The CR Monitor Logic channel on an Element:
The CR Monitor Logic channel on an iQ/QOR:
- Did you notice what channel we used for the control room logic channel? It's 5678. We'll need to trigger pin 3 on this channel for the External Preview to send its audio to the Preview bus.
How do I trigger pin 3 on a Livewire channel?
There are many ways to do this, so we can't cover all of them, but here are a few examples:
- Custom wire a physical button that connects to pin 3 of a DB15 connector, and connect this to a GPIO port on an xNode (requires proper wiring to do this).
- After you've connected a properly wired button to the xNode, put the Control Room Logic channel in the respective field:
Use Pathfinder Core Pro
- Program a button on a User Panel, or an LCD or OLED button on an Element console.
- Use the newly programmed button as a condition to either:
Use a talkback button on a console
- This method is a little trickier, as it dives into using virtual GPIO ports on a QOR, but it will allow you to utilize a console without using Pathfinder
Let us know how we can help
If you have further questions on this topic or have ideas about improving this document, please contact us.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817688.24/warc/CC-MAIN-20240420214757-20240421004757-00234.warc.gz
|
CC-MAIN-2024-18
| 3,842 | 31 |
https://forum.kaspersky.com/index.php?/profile/669395-bene66/
|
code
|
bene66 started following Is it possible to allow Apps even if the phone is blocked?
Hi everyone, we are using Safe Kids since one week and need some help. My sons Phone is blocked using Safe kids in the time he usualy does his homework - so no gaming and surfing is possible. This works fine. But he used one or two apps to communicate with me or his clasemates e.g. to clarify questions regarding the homework. How can I allow this app, even the phone is blocked? Thanks for help
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347458095.68/warc/CC-MAIN-20200604192256-20200604222256-00504.warc.gz
|
CC-MAIN-2020-24
| 480 | 2 |
http://eu-jordannet.eu/bakecaincontrii-sondio/come-trovare-argentino-donne-bacheca-trans-perugia
|
code
|
etc. Examples used were the Newcastle 2065 future city strategy and the Island of Aruba's 2000 strategy for itself. His view is that a scenario is an Imagined vision - doesn't have to be correct, but you need a range including a best and worst. Games and Simulation - Florence Engasser. However, it's something we do quite a bit of (have you seen our work on election prediction - Brexit, Trump, UK 2017, Germany etc - we got them all right) so I went along to the. Simulation and game design are more my comfort zone area, so to an extent I knew more abot this approach than the others - anyway, it was all sensible stuff and Florence noted the main problems one hits with respect. Typically top doesn solution go awry, it's better to get the locals involved for a variety of reasons and avert failure: - Appeal to democratic/ethical notions to get buy in - To drive collective action needs a shared. Her summary of how to make it work was good, I liked the checklist of what a simulation or game needs, not so much the first 3 which are almost a given, but the last 3 which are. As she notes, simulation helps in a number of ways: - Model the trade-offs and outcomes (and some aspects often become clear in the dynamics of the model) - Visualisation makes it easy to see things - Collaboration. Prediction is always difficult, said Yogi Berra, especially about the future. I think - as Cat noted in the first talk - always base your scenarios on evidence of research). Nesta Futurescoping 101 event on this last night see what they had that I could steal to offer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514577363.98/warc/CC-MAIN-20190923150847-20190923172847-00466.warc.gz
|
CC-MAIN-2019-39
| 1,566 | 1 |
https://www.computerforums.org/forums/classifieds-buy-sell-trade/gaming-rig-sale-trade-other-items-well-152421.html
|
code
|
I am in need of a laptop for college, so I'm trading my desktop for one.
Here are the specs:
-Processor- AMD Athlon 64 3300+ w/ stock cooling] Bought new from Tiger Direct, less than 3 months use
-Motherboard- MSI K8N Neo] Bought used, used for less than 2 months
-Graphics- GeForce 6200 AGP] Bought new from CompUSA, used for about 2 months
-Memory- 1024MB+256MB] Both bought new from Circuit City
-Hard Drive- 160GB SATA] Bought new from CompUSA
-Disk Drives- 1 CD-RW/ROM, 1 DVD-RW] Both bought used
-Power Supply- 350w] Bought new from CompUSA
-Beige (sleeper as I call it) case with silver wavy grille and 4 large drive slots and 2 small
-With original prices and other items, it had cost me more than $1,000, but since it's used and such, I'll lower the price down to about $750 + shipping.
-USB ports- 11
-O/S- Can have Vista installed if requested (RC1 version)
-Keyboard included if desired (no mouse)
-I have a 16" CRT monitor (not flatscreen) if you want, but shipping will be higher
-Hard drive will be formatted before shipment
-MSI K8T Neo-V mobo ($35)
-GeForce 5500 O.C. ($45)
-Sempron 2800+ 64
-Oblivion Never played
-Halo CE Used
iPod 60GB Video used, but like new
various iPod parts (1g, 4g)
*Maybe* Xbox 360 Premium Pack with 2 controllers, Oblivion, Black, and Intercooler.
Parts and other things will be added periodically.
Ok, now what I'm looking for
Laptop-AMD processor preferred, but Intel will do if it's a good one.
Mac laptops, must be G4 or better, and must look and work like new.
iPod video 80GB + cash
Email me at [email protected]
for pics and detailed info.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370505730.14/warc/CC-MAIN-20200401100029-20200401130029-00397.warc.gz
|
CC-MAIN-2020-16
| 1,592 | 31 |
https://www.myjournals.org/index.php?nr=569498
|
code
|
In recent years, researchers have been devoted to illustrating the correlation between bankers’ pay contracts and a bank’s risk-taking behavior where corporate governance is concerned, especially throughout the past four decades and by using empirical analysis. Despite being a widespread concern, the causality of this relationship is not thoroughly understood. We initiate this research by modeling bankers’ multi-stage decisions of option investment and bond investment from the perspective of theoretical analysis, and by analyzing the function image results using data from Wells Fargo & Co. from the ExecuComp, BvD Orbis, and CRSP-COMPUSTAT databases. We aim to deeply explore the mechanism of how compensation influencing on risk. We are the first to find that it has a “risk cap”, which is the optimal risk level to maximize the return of decision-making. We are also the first to discover the optimal decision coefficient level to maximize the decision return, during which the internal causes and mechanisms of the impact of bankers’ compensation on a bank’s default risk are revealed. We also illustrate the influence of the number of periods. We expect our findings to provide advice for establishing policies when designing pay contracts.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738982.70/warc/CC-MAIN-20200813103121-20200813133121-00583.warc.gz
|
CC-MAIN-2020-34
| 1,265 | 1 |
https://community.withsecure.com/discussion/124969/duplicated-uid-due-to-cloned-image
|
code
|
Duplicated UID due to cloned image
The subject problem probably happened years before I onboard. I know how to reset the UID but have no clue how to identify the windows machines which have the duplicated UID.
I tried to export an identities report from PMC, however it only shows one record per UID but not all. Is there any way to do so?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817036.4/warc/CC-MAIN-20240416000407-20240416030407-00266.warc.gz
|
CC-MAIN-2024-18
| 339 | 3 |
https://www.hbszradio.com/tronlink-wallet/frj0a16u0x.html
|
code
|
Bo Farm Chain Add Wallet Address List Investment
1. Get it on the homepage of the wallet and remember these words in order.Enter the quantity you want to send, confirm the password again, and remember their address in order.
2. Then select the "Import Wallet" option.Finally, click "Next" and add, and click the "Send" button tutorial in the upper right corner.Next.
3. After agreeing to continue the address, click the "Create New Wallet" option tutorial on the homepage.Please select the "Private Key Import" option to collect it. Create a wave field () wallet in the wallet is very simple. Click on the "receipt" button on the wallet homepage.
4. Suitable for novices and experienced users to use wallets, enter your payment password to confirm your identity, and enter your payment password.Click the "Settings" option to add, and the wallet is set in the browser.And choose the appropriate miners cost airdrop.After opening the wallet.
5. Set your payment password.You will see a notes composed of 12 words. Select the "Key Notes Import" option wallet, and then paste or manually enter the receiver’s wallet address.
TP wallet collection airdrop tutorial
1. Safe and reliable wave field () wallet plus money, you fully control your private key and asset airdrops.Wallets are a powerful function.Next: Continue the next tutorial and select "Backup Wallet".
2. Teacher according to the introduction method you choose.Wallets also provide the following features and functions to add money.
3. If you need to restore the wave field () wallet, open the application and select the "Create a New Wallet" option airdrop.In addition to the wave field () address, select the corresponding option to add according to the type of wallet you hold,
4. Backup and recovery wave field () wallet is very important for wallets. Please follow the steps below to perform the operating address. If you already have wave field () wallet.
5. Open the wallet and enter your wallet page to take a set airspace, please be sure to save it properly.It is convenient for users to directly access and use various decentralized applications and add money, and complete the introduction process according to the prompts.Click "Next" Add.You will be able to manage and use the original wave field () wallet in the wallet, please be able to preserve the tutorial properly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817729.0/warc/CC-MAIN-20240421040323-20240421070323-00299.warc.gz
|
CC-MAIN-2024-18
| 2,345 | 12 |
https://lists.quantum-espresso.org/pipermail/users/2004-August/001310.html
|
code
|
[Pw_forum] pwscf executables
wahab at mail.ouargla-univ.dz
Sat Aug 28 11:32:56 CEST 2004
> Hello every body...
> Can I find pwscf (version 2.0 if possible) executables with lamboot
> parallel mode; at list pw.x compiled and memory.x (for Intel P4
> prpocessors). In fact I hav'nt any fortran 90 compiler, and i tried to
> compile it in a remot machine on which intel-fortran is installed
> but not lam libraries. I don't have permission to install it also.
> thanks in advance.
> Abdelouahab A.
> Université de Ouargla
More information about the users
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526714.15/warc/CC-MAIN-20190720214645-20190721000645-00152.warc.gz
|
CC-MAIN-2019-30
| 552 | 13 |
http://htff.actieforum.com/t39p50-moviejukeboxen
|
code
|
Nieuwe yadis is er
- Added management of movie sagas
- Added the possibility to ignore articles for the sorting of movies
- Added the "Title for sorting" field in the edition panel
This version integrates the management of movie sagas. Be careful, you should use a template compatible with sagas. Both templates provided by yaDIS are of course compatible. Two other templates (those from djoole and Mr Eric) have already been updated to the sagas.
There is also a new option to ignore articles (the, an, a, ...) in the titles of movies. This option is not enabled by default. A field "Title for sorting" was added in the editing panel.
Managing your sagas is done via the context menu of the media list.
You can add a title to a saga only if it was processed before. For now, we can add to a saga one title at a time.
To create a saga, right click on one of the members of the future saga. In the submenu "Sagas", there is a field where you must enter the name of the new saga followed by the "Enter" key. The saga is created and the selected title is automatically assigned.
To add a title to a saga, right click and then in the submenu "Saga", click on an existing saga.
To remove a title from a saga, right click and then in the submenu "Saga", click on the saga that is checked.
To edit a saga, just right click on the saga to bring up the edit window. In this window you can change the name of the saga, the name for sorting, the order of the members (drag&drop) of the saga and images. You can also remove a member of the saga by pressing "Del". To change the images, simply click on it. You can only select the covers and fanarts of the current members of the saga.
In the interface on the Dune, the sagas appear in "All movies", "Selection", "Recently Added" and "Alphabet". A small icon is on the covers to distinguish the sagas from the movies. When you enter a saga, the next screen displays the name of the saga and the members at the bottom of the screen. As for the little icon on the covers, the appearance of the display of a saga is completely customizable in the templates.
Feel free to ask questions if something does not seem clear.
The management of sagas will be improved in future releases. I could not do what I expected but I really wanted to release this version in time for Christmas
_________________TV: LG 50pk950
Speakers: Triangle Galaxy 2
Subwoofer: bk xxls 400FF
Receiver: Pioneer VSX-919 AH-K
Mediaplayer: HTPC + xbmc frodo rc1 + aeon skin 4
STB: Telenet HD Digicorder
Unraid Pro Home Mediaserver 5.0 rc5 + simple features + airvideo + slimserver + sickbeard + mysql server + dropbox + sabnzbd (specs zie http://htff.actieforum.com/t131-stijn-s-server )
Game Console: WII Black
Harmony one + Mele f10
Marmitek control 8
ipad 3 wifi 32gb + ipad dock
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123590.89/warc/CC-MAIN-20170423031203-00445-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,782 | 26 |
https://docs.airship.com/whats-new/2017-05-17-new-framework-react-native/
|
code
|
- Push notifications
- Custom events
- Named Users
- In-App Messaging
Thanks to feedback from our customers, this release brings our number of development frameworks supported by plugins to 5, in addition to iOS, Android, and Windows with full SDK support. Please keep the feeback coming! Check out our complete list of supported frameworks.
We’re excited to welcome the React Native developer community to Airship!
Check out our React Native Module docs to get started.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655878639.9/warc/CC-MAIN-20200702080623-20200702110623-00500.warc.gz
|
CC-MAIN-2020-29
| 472 | 7 |
http://www.moddb.com/mods/diablozation-by-tomash/downloads
|
code
|
"Diablozation Mod and Map" includes two elements:
1. Diablozation Mod is a tool for modders that allows to use in the maps for BoD some elements of RPG.
2. One map with two quest and two shops to see how it works.
1) OpenGL-friendly map. The installation of OpenGL patch for Diablozation is NOT required 2) Now you can choose the level of difficulty 3) Scroll of portal...
File to install this mod / Tool for Severance Blade of Darkness.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042987552.57/warc/CC-MAIN-20150728002307-00265-ip-10-236-191-2.ec2.internal.warc.gz
|
CC-MAIN-2015-32
| 437 | 5 |
http://zdassignmentwgne.jayfindlingjfinnindustries.us/open-and-close-source-operating-system.html
|
code
|
Historically, the open source movement is not about security but about freedom basically, richard stallman was very dismayed at not being. Yes, you can download from the “android open source project” (aosp) and create your own os but most phones have a locked boot-loader. Firmware, operating systems and application software are different types of software free open source software vs custom but paid-for proprietary software proprietary software (sometimes referred to as closed source software ) is. Open vs closed source is open-source software a trend or a fad let's first define microsoft windows, a closed-source, operating system, has come. “open” vs “closed” means a lot of things, from the source code to the app store to how much the operating system allows you to customize and.
Closed source is not open source, but some software is neither, because open source also implies the freedom to redistribute thus, one can sell software with. Switching to an open source os could involve a learning curve, but the community, customisation and lack of cost should be enough to make. The open source versus closed source debate is an old one and we finding a web content management system (cms) for your business.
The argument between open-source code and closed-source code has existed for many decades comparison of open-source versus proprietary os security. Variety of hardware platforms) than existing closed source operating systems, operating system, an open and closed source web server, and an open and. There are many differences between open source operating system and closed source operating system here we have written few of them. Ity, and welfare under open and closed source environments in monopoly and of the linux operating system, apache web server, perl pro- gramming. Closed source software hurts gui development of the program or operating system and relay inputs back to the original source gui and fogarty, is being undermined by companies unwilling to embrace open source.
Closed-source operating systems use code that is proprietary and kept secret to prevent its use by other entities traditionally, they are sold for. So does all this mean open source software is no better than closed source of three operating systems indicates that one open source operating system. The windows source code is owned by microsoft and the os x source code is they are typically closed-source, meaning the developer does not provide with their software cannot be opened with other software programs. Most of the oses you may use on a daily basis are closed source windows ios mac os but there are also quite a few open source ones. Closed source operating system built on open source software the result is the git virtual file system (gvfs) which differentiates between.
In both the cases of itunes and windows phone store, it can be said that having a closed operating system can open the doors to suppression. Examples of open source products include open office, the internet browser mozilla firefox, wikipedia, the gnu/linux operating system and its. That of 'open' versus 'closed' source development code and it's the reason why it held up to 94% of the operating system market at one point. I selected a particular model because i knew that it was compatible with my computer's operating system, which is gnu/linux however, when i got it home and.
Open source, decentralized supercomputer that anyone can access multinational networking, telecommuncations equipment, and services company largest. Open source software (oss) allows users and from a closed source to an open source environment, free full operating system that will replace the unix. the share operating system (sos) – for ibm 709 hardware as neatly as service-based open source offerings close loopholes and audits and trust: in many cases, hybrid licenses explicitly refer to the honor system.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516135.92/warc/CC-MAIN-20181023111223-20181023132723-00176.warc.gz
|
CC-MAIN-2018-43
| 3,899 | 6 |
http://jobs.nelsonjobs.com/Job/IT+Technical+Analyst-San+Francisco-Sharepoint+Net+Developer+TECHJG+44350.aspx?pb=ttl
|
code
|
Nelson Technology is seeking a SharePoint/.Net Developer for a direct hire opportunity with a globally established San Francisco, CA company.
Compensation: $120,000 to $130,000 annually
The SharePoint/.Net developer will need to have strong problem solving skills, experienced design and coding capabilities. A challenging role in a collaborative team environment with people who are passionate about what they do, have a high degree of integrity, and are committed to maintaining a workplace of collaboration, communication, and accountability. This position will be provided with opportunities to work with exciting technology in SharePoint 2007, SharePoint 2010, Windows Workflow Foundation (WF), Windows Presentation Foundation (WCF), Silverlight, and Visual Studio 2008 in an AGILE/SCRUM environment.
• Proficient in C#, SharePoint 2007, .Net Framework
• Have 6+ years professional experience in a software development role
• Strong knowledge of OO coding practices
• Minimum 1 year of experience on an Agile team with Agile Development Practices and Disciplines including pair programming
• Automated build and deployment with Visual Studio Team System and Team Foundation Server
• Excellent Communication skills
• Experience with K2 and Smart Objects is a plus
• Test Driven Development skills with Continuous Integration is a plus
• Designs, develops, troubleshoots, debugs, and implements software code for company’s web based applications and sites
• Works under general supervision to plan, develop, and deploy web applications including designing web architecture, code writing, and ensuring availability in a 24x7 environment.
• Occasionally provides support to users for all troubleshooting issues and reported errors.
• Works with other members of the team to develop concept, interface design, and architecture of the web applications
• Integrates web applications with backend databases.
• Researches, tests, build and coordinate the integration of new products per production and client requirements.
KNOWLEDGE, SKILLS AND ABILITIES REQUIRED:
• Must have five years of progressive work related experience and a BA/BS degree.
• Interpersonal skills necessary in order to maintain effective relationships with attorneys and staff in person, by email and telephone.
• Must be able to work in a highly collaborative team environment with various personality types.
• Must be able to perform essential duties of the position with time constraints and interruptions.
For a full listing of jobs, go to www.nelsonjobs.com, our premier job search engine for candidates. Comprised of three major business units—Nelson & Associates, Nelson Staffing, and Nelson Technology—this company with 40+ years in staffing provides recruiting services to clients and candidates in accounting & finance, clerical, administration, human resources, technology, light industrial, manufacturing, legal, engineering, computer gaming, digital media, and the wine and beverage industries. Nelson places job candidates quickly in a number of fields in full-time, executive, consultative, and temporary positions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737956371.97/warc/CC-MAIN-20151001221916-00006-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 3,141 | 23 |
https://electronics.stackexchange.com/questions/361129/ili9341-pinout-problem
|
code
|
I recently ordered a LCD TFT 3.2 inch touch display from aliexpress: ILI9341_3.2_TFT_LCD
I'm currently going through documentation for the chip (ILI9341_documentation) and I can't "connect" all the pins on the pcb of the display to the pins on the chip in documentation.
My plan is to use 16 bit parallel interface, but pins IM0, IM1, IM2, IM3 are not accesabe as it seems, so I am not sure if to use 8080 I or 8080 II for 16-bit protocol or if I can even use 16 bit parallel.
Q1: What protocol is to be used?
I understand that pins DB[15:0] are for the 16 bit parralel data, top 6 pins are SPI, BL is backlight, RST = reset, WR = WRX, RD = RDX, CS = CSX,
Q2: so is RS = D/CX?
Q3: What is SDCS?
Thank you for your help!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145989.45/warc/CC-MAIN-20200224224431-20200225014431-00358.warc.gz
|
CC-MAIN-2020-10
| 719 | 8 |
https://forum.xda-developers.com/showthread.php?t=2580480
|
code
|
Originally Posted by Fugi888
I like the idea of this. Did you get it working and if so could you post a screenshot the codes in place in the zooper settings? I have tried and can't figure out the placement. Thanks @sonny_c
Sent from my SPH-L720 using XDA Premium 4 mobile app
It is working for me. Screenshots are below.
My homescreen. The battery bar stays green when the battery is above 31%. Then it changes to yellow from 16% - 30%. Finally it turns red when the battery drops below 15%.
Add a Progress Bar and and go into its settings.
The next five pics are my settings.
Tap on Advanced Parameters.
I typed the code in the highlighted box.
---------- Post added at 07:51 PM ---------- Previous post was at 07:43 PM ----------
Originally Posted by Faxx4840
I tried this code but my progress bar get transparent with this. If I change the [cf] in [cb] it works but its just the background color, I want that the bar who progress that change the color. An issue ?
The code is working for me and I haven't had any issues. Check out my settings in my post above.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864544.25/warc/CC-MAIN-20180521200606-20180521220606-00472.warc.gz
|
CC-MAIN-2018-22
| 1,063 | 13 |
https://community.pandora.com/t5/Ideas/Ideas-Resume-playback-on-playlists-when-last-paused/idi-p/134132
|
code
|
When I ask to play a playlist Pandora plays songs in the same order starting with the same first song. All I hear each time are the same 3-4 songs.
Feature Request: For Premium members pause play playlist at current song and then continue play list at the next song in the playlist where it was paused.
Feature request: Be able to mark a playlist as "Auto Shuffle play mode" - When selected to play a marked "Auto Shuffle" playlist has Pandora Shuffle the playlist. This prevents hearing the same songs in the same order when the playlist is selected.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816853.44/warc/CC-MAIN-20240413211215-20240414001215-00765.warc.gz
|
CC-MAIN-2024-18
| 551 | 3 |
https://tracker.moodle.org/browse/MDL-8520
|
code
|
Moodle™ is a registered trademark.
Site policy | Contact
$CFG->frametarget alone does not work for framed resources, we should add also the js this.target= trick there
fixed in cvs
I think this is broken again...
In 1.8.1, if a resource is a link to a file using a frame, then the previous and next navigation breaks.
This is because the previous and next forms are using $CFG->frametarget, which doesn't get set if the frame being used is "_top".
Suggest changing the navmenu function to explicitly place "target=$CFG->framename".
Fixed. Added a 'target=' to the forms.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00057-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 572 | 9 |
https://makeitflip.com/meet-bluey-s-dad-the-beloved-character-from-the/
|
code
|
- 1 Introducing Bluey’s Father: The Adored Character from the Popular Children’s Show
- 1.1 Who is Bluey’s Dad?
- 1.2 Why is Bluey’s Dad So Popular?
- 1.3 FAQ about topic Meet Bluey’s Dad The Beloved Character from the Hit Children’s Show
Introducing Bluey’s Father: The Adored Character from the Popular Children’s Show
Bluey’s Dad is a blue Australian dog who has captured the hearts of children and families around the world. He is a central character in the popular animated series, Bluey, which has become a sensation among young viewers.
In the show, Bluey’s Dad is portrayed as a loving and caring father who is always there for his family. He is known for his playful and adventurous nature, often joining Bluey and her sister on their imaginative games and adventures.
Bluey’s Dad is not just a cartoon character, but a role model for children. He teaches important life lessons such as the value of family, the importance of play, and the power of imagination. Through his interactions with Bluey and her sister, he shows children the importance of spending quality time with loved ones and the joy that can be found in simple moments.
Bluey’s Dad has quickly become a fan favorite, with children and adults alike falling in love with his charming personality and relatable experiences. His character has resonated with audiences of all ages, making him an iconic figure in the world of children’s entertainment.
“Bluey’s Dad is a beloved character who has brought joy and laughter to countless households,” says the show’s creator. “He represents the loving and supportive father figure that many children can relate to and look up to.”
With his blue fur, Australian charm, and heartwarming personality, Bluey’s Dad has become an endearing symbol of family values and the power of imagination. He continues to inspire and entertain children around the world, making him a true icon of the beloved children’s show.
Who is Bluey’s Dad?
Bluey’s Dad is a beloved character from the hit Australian animated children’s series, “Bluey”. The show revolves around the adventures of Bluey, a lovable and energetic blue heeler dog, and her family. Bluey’s Dad is a central character in the show and plays an important role in the family dynamic.
Bluey’s Dad is known for his playful and caring nature. He is always ready to join in on Bluey’s imaginative games and adventures, whether it’s playing superheroes or exploring the backyard. He is a loving and supportive father, always there to offer guidance and teach valuable life lessons to Bluey and her sister.
In the cartoon, Bluey’s Dad is depicted as a hardworking and responsible parent. He is often seen juggling his work commitments with his family responsibilities, showing the importance of balancing work and family life. Despite his busy schedule, he always makes time for his children and cherishes the moments they spend together.
Bluey’s Dad is a relatable character for both children and parents alike. He embodies the values of love, patience, and playfulness, making him a favorite among viewers of all ages. Through his interactions with Bluey and the rest of the family, he teaches important life lessons and demonstrates the importance of family bonds.
Overall, Bluey’s Dad is an integral part of the “Bluey” series, bringing joy and laughter to children and families around the world. His character exemplifies the love and warmth that can be found within a family, making him a beloved and cherished cartoon character.
Bluey’s Dad: A Lovable and Relatable Character
Bluey’s Dad is a beloved character from the hit children’s show, Bluey. This animated series follows the adventures of a lovable Australian family and their adorable dog, Bluey. Bluey’s Dad is an important member of the family and plays a central role in many of the show’s episodes.
Bluey’s Dad is a relatable character for both children and adults. He is a caring and involved father who always takes the time to play and have fun with his children. Whether it’s playing a game of “keepy-uppy” or going on a backyard adventure, Bluey’s Dad is always up for a good time.
One of the reasons why Bluey’s Dad is so lovable is because he is often seen making mistakes and learning from them. He is not perfect, but he always tries his best to be a good dad. This relatability makes him a realistic and endearing character that children can look up to.
Bluey’s Dad is also known for his sense of humor. He often cracks jokes and makes funny faces, bringing laughter to both his children and the audience. His playful nature adds an extra layer of fun to the show and makes him a fan favorite.
Overall, Bluey’s Dad is a lovable and relatable character in the Bluey series. He embodies the qualities of a caring and involved father, while also bringing humor and fun to the show. Children and adults alike can’t help but root for Bluey’s Dad and his heartwarming adventures with his family.
The Role of Bluey’s Dad in the Show
Bluey’s Dad, also known as Bandit, is a beloved character in the animated Australian children’s show called “Bluey”. He plays a central role in the Bluey family as the father figure and is depicted as a blue heeler dog.
As a dad, Bandit is caring, playful, and always ready to join in on the fun adventures with Bluey and her sister Bingo. He is often seen engaging in imaginative play with his daughters, encouraging their creativity and problem-solving skills.
Bandit’s character represents the importance of family bonding and the role of a father in a child’s life. He is portrayed as a loving and supportive dad who is always there for his children, teaching them valuable life lessons and providing guidance when needed.
Throughout the show, Bandit’s interactions with Bluey and Bingo showcase the strong bond between a father and his children. He is shown as a positive role model, teaching them about empathy, resilience, and the importance of teamwork.
Bluey’s Dad is not only a relatable character for children but also for parents. His character reflects the challenges and joys of parenthood, highlighting the importance of spending quality time with family and cherishing the moments together.
In conclusion, Bluey’s Dad plays a crucial role in the show by exemplifying the qualities of a loving and involved father. His character adds depth and heart to the animated series, making it a favorite among children and families alike.
Why is Bluey’s Dad So Popular?
Bluey’s Dad has become a beloved character among children and families all over the world. This animated Australian dog has captured the hearts of viewers with his relatable and endearing personality.
In the hit children’s show “Bluey,” Dad is portrayed as a loving and caring father who is always there for his family. He is known for his playful nature and his ability to turn everyday activities into exciting adventures.
One of the reasons why Bluey’s Dad is so popular is because he represents a positive and strong role model for children. He teaches them important values such as kindness, empathy, and the importance of spending quality time with family.
Another reason for his popularity is his relatability. Bluey’s Dad is depicted as a regular dad who sometimes makes mistakes but always learns from them. This makes him more relatable to children and helps them understand that it’s okay to make mistakes as long as you learn from them.
Furthermore, Bluey’s Dad’s blue fur and cartoonish appearance make him visually appealing to children. His playful and energetic personality is also reflected in his vibrant blue color, which adds to his charm.
In conclusion, Bluey’s Dad is popular among children and families because of his relatable and endearing personality, his positive role model characteristics, and his visually appealing design. He has become a beloved character in the animated series “Bluey” and has captured the hearts of viewers worldwide.
FAQ about topic Meet Bluey’s Dad The Beloved Character from the Hit Children’s Show
Who is Bluey’s dad?
Bluey’s dad is Bandit, a lovable character from the hit children’s show “Bluey”.
What is the hit children’s show called?
The hit children’s show is called “Bluey”.
What is Bluey’s dad like?
Bluey’s dad, Bandit, is a beloved character who is known for his playful and caring nature.
Why is Bluey’s dad so popular?
Bluey’s dad, Bandit, is popular because he is relatable and represents a loving and involved father figure.
What role does Bluey’s dad play in the show?
Bluey’s dad, Bandit, plays an important role in the show as a supportive and fun-loving father who engages in imaginative play with his children.
I’m Diana Ricciardi, the author behind Makeitflip.com. My blog is a dedicated space for mothers and their kids, where I share valuable insights, tips, and information to make parenting a bit easier and more enjoyable.
From finding the best booster seat high chair for your child, understanding the connection between sciatica and hip pain, to exploring the benefits of pooping in relieving acid reflux, I cover a range of topics that are essential for every parent.
My goal is to provide you with practical advice and solutions that you can easily incorporate into your daily life, ensuring that you and your child have the best possible experience during these precious years.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474569.64/warc/CC-MAIN-20240224212113-20240225002113-00141.warc.gz
|
CC-MAIN-2024-10
| 9,480 | 51 |
http://www.travellerspoint.com/forum.cfm?thread=102457
|
code
|
When going through the photos that are uploaded and having a location, it appears that there is a growing number of photos which are tagged with the wrong country.
I've seen quite a lot of someone who travels in Europe and they are mostly located in Nepal. I've send a PM weeks ago but no improvement.
Now I noticed a location of the Canary Islands which are in Western Sahara.
How can this be avoided?
Uhm, I am not sure whether I am bugging people with these things, but the system talk forum is meant to ask question and have replies right?
I have PM'd with touringteamf regarding many photos that are tagged to Nepal and it's frustrating for them as well as they try to change it without being succesfull.
Thanks for any help or reaction
I think at present Peter is the only developer looking at issues, and I can easily imagine for a non-trivial issue like this that he's putting it on his todo list, and just doesn't manage to get around to it for a while. For a new member, he might've done a swift "thanks for the report, I'll be looking into it post", but probably for you he'd like to be able to say something more substantial. (I don't know; pure supposition here; but I know that I make similar posts in this forum for new members who report some issue, while I'd feel to say something like that would just be 'clutter'.)
One thing that struck me about this specific example, is that the latitude of Boston is almost exactly double that of the specified Turks and Caicos Islands, while the longitude is the same. Probably pure happenstance, since a similar relation doesn't exist between various Italian places and Nepal, but still...
I guess it's not a really vital issue for sure.
I just happened to come across more and more photos that were tagged to the wrong location.
Guess it's also difficult to comprehend the enormous amount of work Peter, you and some others who keep the website running, are doing. So perfectly fine to have a watch into it later.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120844.10/warc/CC-MAIN-20170423031200-00211-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,971 | 12 |
https://boards.theforce.net/threads/can-we-please-stop-the-constant-harassment.50054059/#post-56702411
|
code
|
To the fine folks in the JCC, Unbeknownst to many of you, I have been subjected to constant harassment by a couple of individuals over a series of trivial matters and in one of the most recent instances, one of the people involved posted a sexually-explicit personal attack against me in the Pandemic thread. That particular post was appropriately dealt with by @Point Given , who deleted it and reminded the person in question that personal attacks are not allowed in the JCC. This also came not too long since another forum member "jokingly" said in the McClucky thread that he "wanted to shoot me". I am a victim of violent crime in real life and have to deal with PTSD on an ongoing basis as a result of a severe beating. The constant micro-agressions by the persons I have just indirectly mentioned have been very derimental to me and have triggered PTSD symptoms. I definitely don't think that all men are bad, but it so happens that each and every of the forum members who have engaged in this months-long campaign of rampant harassment are guys, and unfortunately they do not know how to take "no" or "stop" from a woman. "No" as in I don't want to play your silly games and put up with constant passive-aggressive innuendo and other stuff like that. The overwhelming majority of the hostility being aimed at me is carefully calculated to fall just short of posting things that are against forum rules, but the pattern is very clear, and it is definitely designed to make fun of, ridicule, and otherwise harass me personally. These forums can be a great place when everyone is polite to each other and I don't think I'm asking for too much in expecting a modicum of politness. Thanks and if the mods want to move this thread to the Communications forum, please feel free to do so. Thanks everyone.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057598.98/warc/CC-MAIN-20210925052020-20210925082020-00443.warc.gz
|
CC-MAIN-2021-39
| 1,805 | 1 |
https://www.udemy.com/unity-games-lock-and-unlock-system-course/
|
code
|
First course to teach you how to build your game template from scratch with c# and unity best practices, Build your fully featured lock system for levels, characters and many more and reuse it for your rest of upcoming games.
*** All Games Are Created In Unity Version 5.3+ ***
This is a course I wish I had when I first started to learn game development.
The course is completely project based, and we are going to create full featured games from scratch using Unity Game Engine.
You will also benefit from my super-fast response if you have any issue that you are stuck with (I check Udemy forums every day if someone posts a question). And all the students taking the course will also be there to help you!
All project files and lessons source code will be included and you are free to use them for anything that you like, personal or commercial use!
Let's take a look at the games that we are going to create inside of this course:
First thing we are going to design and build Pokemon game layout, we are going to show you how to convert psd templates into real game ui using step by step approach, this is a really nice way of teaching if you are familiar with psd to html, psd to app, psd to games before, If not don't worry we are going to teach you everything from scratch.
After illustration phase we are going to build advance Levels user interface, and will introduce you to JSON objects and the way to do serialization to maintain games data.
Next, we are going to show how to build your own Game Storage Manager, to store and load the different data of your games in the permanent storage. You will learn how to build responsive 2D slider using the anchoring system in Unity, this part is exclusively prepared to make sure you master advanced UI and anchoring techniques.
Data binding is one of the important techniques that we are going to cover once we design Pokémon slider and add menu levels control.
Implement advanced controllable layered shared audio, music, sounds manager between scenes.
After all the previous steps we are going to build the core of Pokémon Ball Game, Covering all the physics and game play concepts and techniques such as adding game Joystick controller, advanced Game Objects Dynamic Pool. We will make Game Scene Manager and show you how to make Count Up and Down Timer, achieve coins collection, game actions and we are going to show you how to use SceneManagment and Load Scene Async.
Work with different audio layers and add game sounds SFX, One and Second Shot Audio Layers.
We are going to cover Canvas Scalar and GridLayout concepts for Levels Slider.
Apply some of retention concept in games development by adding characters selection, purchase, and lock, unlock between the scenes inside the game and activate dependent levels lock, unlock system for the different levels inside the game.
What You will learn?
That And Much More Is Awaiting For You In This Course
What this course DOES NOT cover :
The course teaches everything from basic to more advanced stuff on how to plan, design, develop and publish your game, however the course WILL NOT teach you every single aspect of Unity and how to use it because it's impossible to teach everything.
Using what you obtain in this course, you will be equipped with more than enough knowledge in order to continue improving yourself in the field of game development, using Unity or any other game engine.
If You ever had an idea for an awesome game, then enroll in this course and learn the tools that you need to develop Your next hit game!!!
What Is Your Risk By Taking This Course?
Nothing!! If you are not satisfied with the course, I promise I will give you a full refund of your money NO questions asked!!
Enroll Now!! You Will More Than Happy!
Hi! I'm Ahmad. I have a degree in Computer Science from Birzeit University and you might call me a bit of computer geek.
I'm comfortable with a large range of languages and techniques.
After implementing enterprise applications using Salesforce and Siebel CRM for 3 years and with professional experience in building websites, cloud apps, ios apps, unity games, android mobile apps and educational games for 6 years. I decided to share my technical knowledge with people all over the world to benefit from my experience and build their own careers specially because I am a real world example with over 20 successful game on Google Play Store, Asset Store and Apple Store, So your success is mine and I want to help you reach your goals step by step exactly as I do.
I'm passionate about teaching people about technologies, so from time to time I gave courses online and in learning centers and teach beginners and professionals on many technologies and development frameworks. One of my greatest goals in life is growing the next generation of software professionals and to keep teaching programming at every opportunity I get.
I can't wait to help you experience the achievement and financial freedom that having a deep understanding of technology brings.
So why not start learning to design & develop now by joining our epic Unity 3D professional 2d game development course?
See you soon!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818690203.42/warc/CC-MAIN-20170924190521-20170924210521-00556.warc.gz
|
CC-MAIN-2017-39
| 5,140 | 32 |
https://jonathanlewis.wordpress.com/2013/10/04/quiz-night-21/
|
code
|
Okay, it’s a little early in the day (for me at least) to say “night” – but here’s a fun little detail I picked up in Prague yesterday. What do you think will happen when you try to execute the following two queries:
select 0/0 from dual; select count(*) from (select 0/0 from dual);
I’ve only tried it on 184.108.40.206 and 220.127.116.11 – I could imagine the results might be different if you’re still running 8i or 9i.
If those are too easy, you might want to think about an example that Julian Dontcheff produced at OpenWorld:
select power(0,0) from dual;
What SHOULD the answer be, and what do you think Oracle will supply ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120092.26/warc/CC-MAIN-20170423031200-00381-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 646 | 6 |
https://github.com/tidyverse/lubridate/issues/456
|
code
|
Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
Output in examples #456
#' dt_utc <- ymd_hms("2010-08-03 00:50:50") #' dt_europe <- ymd_hms("2010-08-03 00:50:50", tz="Europe/London") #' c(as_date(dt_utc), as.Date(dt_utc)) #' ## "2010-08-03" "2010-08-03"
This seems like an easy way to end up with code and results out of sync.
That's a custom for lubridate. I don't think it was me who started it, I think I just followed on the style. While it's a bit tedious to maintain it's surely convenient for the user. Deleting those comments would be wasteful IMO, especially now when the API is stable.
When viewed online or in a pdf printout this inline output is definitely useful. Many people are still printing doc pages (I see it all the time with my students).
I personally wouldn't care as I can execute and edit code directly form the help page in ESS. In other editors you cannot do that and people have to peruse the help page or have to run
In any case, if you feel strongly about it then let's remove them. It would save me some time in the future. Manually pasting output is not the most pleasant activity.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827992.73/warc/CC-MAIN-20181216191351-20181216213351-00606.warc.gz
|
CC-MAIN-2018-51
| 1,223 | 9 |
https://listserv.brown.edu/cgi-bin/wa?A2=ind0412&L=TEI-L&O=D&P=35015
|
code
|
Syd Baumann wrote:
> In P5 the who= attribute of <sp> is a URI. That means, among other
> things that it can point to an element in a different file. Thus,
> Martin can have the who= attribute of normal characters point to the
> <role> in the <teiHeader> of their play, but the who= of what Michael
> calls "meaps" point to a <role> in the <teiHeader> that is a child of
> the <teiCorpus> element, possibly in a different file.
> Whether processed as a single play or as a corpus, who= can still
> perform its function (as long as the corpus file is available and in
> the right place -- a big "if", I admit).
I'm not sure this is really a new possibility enabled by P5. After all, the
same could have been accomplished via ID-IDREFS (assuming the underlying
problem about apparent non-uniqueness of the original ID's had been sorted
out, which is a practical issue rather than a conceptual one). The IDREF
"who" value on <sp> for "one-off" characters would point as usual into the
dramatis personae list, whereas the IDREF on a "meap" <sp> would point into
a list of meap's in the corpus header. OK, the use of URIs in P5 makes the
different targetting very plain to a human reader, but then so could a
suitably devised scheme of ID/IDREF generation and assignment.
The reason why I'd be hesitant about doing things this way, whether by
IDREFS or URI, is that, from both an editorial and potential user
standpoint, I'm uneasy about a markup scheme where the "who" attribute on
adjacent <sp>s can point to two sorts of places, each involving a
conceptually distinct type of editorial judgement, where one type of
judgement is (usually) uncontentious but the other inevitably involves a
level of conjecture, or espousal of a theoretical view about the "identity"
of characters, which not everyone will be comfortable with.
Hence my suggestion of a layer of indirection that allows these two types of
editorial intervention to co-exist while remaining manifestly distinct. In
what I sketched out, all <sp> "who" values point initially into the same
list which is derived from the dramatis personae listing of the edition
(though even here of course editorial interventions may be needed in some
cases to bring the printed list into line with the actual repertoire of
characters). Someone (or a process acting on their behalf) who doesn't want
to go beyond that point can then simply ignore any additional pointers into
the list of meap's. Or they can follow them up and then, in a further level
of optional indirection, follow the IDREFS in the meap list back to the
other embodiments of the ap in other works.
As well as allowing clear delineation of different levels and aspects of
editorial judgement, this approach may lessen the potential negative effects
if for some reason the corpus-header-located "meap list" isn't accessible.
In such a case, the lookup failure will occur only if the user requires meap
information, and *after* resolution of the first target (in the dramatis
personae list) has succeeded and so yielded one significant part of the
information the "who" attribute is it meant to deliver (and which under this
approach it can still deliver equally for all <sp>s). Whereas if some <sp>
values point straight into a list in the corpus header and that header isn't
accessible, processing of those values will fail with no information yield
other than an error message, even though the information which the user was
seeking may well still be there to be had in the dramatis personae listing
of the individual work.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987787444.85/warc/CC-MAIN-20191021194506-20191021222006-00097.warc.gz
|
CC-MAIN-2019-43
| 3,534 | 51 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.